ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Go
GHSA-9h4h-8w5p-f28w
Denial of Service in geth
cmd/evm/runner.go in Go Ethereum (aka geth) allows attackers to cause a denial of service (SEGV) via crafted bytecode.
{'CVE-2018-19184'}
2021-05-20T18:58:40Z
2021-06-29T21:23:15Z
HIGH
null
{'CWE-476'}
{'https://github.com/ethereum/go-ethereum/issues/18069', 'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19184', 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}
null
{'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef', 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}
{'https://github.com/ethereum/go-ethereum/commit/83e2761c3a13524bd5d6597ac08994488cf872ef', 'https://github.com/ethereum/go-ethereum/commit/fb9f7261ec51e38eedb454594fc19f00de1a6834'}
Go
GHSA-h563-xh25-x54q
Workflow re-write vulnerability using input parameter
### Impact * Allow end-users to set input parameters, but otherwise expect workflows to be secure. ### Patches Not yet. ### Workarounds * Set `EXPRESSION_TEMPLATES=false` for the workflow controller ### References * https://github.com/argoproj/argo-workflows/issues/6441 ### For more information If you have any...
{'CVE-2021-37914'}
2021-08-30T23:23:11Z
2021-08-09T20:37:50Z
MODERATE
null
{'CWE-20'}
{'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h563-xh25-x54q', 'https://github.com/argoproj/argo-workflows/issues/6441', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37914', 'https://github.com/argoproj/argo-workflows/pull/6285', 'https://github.com/argoproj/argo-workflows/pull/6442', 'https://git...
null
{'https://github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1'}
{'https://github.com/argoproj/argo-workflows/commit/2a2ecc916925642fd8cb1efd026588e6828f82e1'}
Go
GHSA-36xw-fx78-c5r4
containerd-shim API Exposed to Host Network Containers
## Impact Access controls for the shim’s API socket verified that the connecting process had an effective UID of 0, but did not otherwise restrict access to the abstract Unix domain socket. This would allow malicious containers running in the same network namespace as the shim, with an effective UID of 0 but otherwise...
{'CVE-2020-15257'}
2021-05-27T19:46:55Z
2021-05-24T17:00:22Z
MODERATE
null
{'CWE-669'}
{'https://github.com/containerd/containerd/releases/tag/v1.4.3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNKXLOLZWO5FMAPX63ZL7JNKTNNT5NQD/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15257', 'https://research.nccgroup.com/2020/12/10/abstract-shimmer-cve-2020-1525...
null
{'https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad'}
{'https://github.com/containerd/containerd/commit/4a4bb851f5da563ff6e68a83dc837c7699c469ad'}
Go
GHSA-68wm-pfjf-wqp6
Authentication bypassed with malformed request URI on nginx
### Impact This affects uses who are using nginx ngx_http_auth_request_module with Authelia, it allows a malicious individual who crafts a malformed HTTP request to bypass the authentication mechanism. It additionally could theoretically affect other proxy servers, but all of the ones we officially support except nginx...
{'CVE-2021-32637'}
2021-05-28T18:08:47Z
2021-12-20T16:57:16Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda', 'https://github.com/authelia/authelia/security/advisories/GHSA-68wm-pfjf-wqp6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32637'}
null
{'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}
{'https://github.com/authelia/authelia/commit/c62dbd43d6e69ae81530e7c4f8763857f8ff1dda'}
Go
GHSA-m6wg-2mwg-4rfq
Use After Free
The proglottis Go wrapper before 0.1.1 for the GPGME library has a use-after-free, as demonstrated by use for container image pulls by Docker or CRI-O. This leads to a crash or potential code execution during GPG signature verification.
{'CVE-2020-8945'}
2021-05-17T22:00:21Z
2021-05-18T15:29:42Z
HIGH
null
{'CWE-416'}
{'https://access.redhat.com/errata/RHSA-2020:0689', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXV7NZELYWRRCXATXU3FYD3G3WJT3WYM/', 'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8945',...
null
{'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733', 'https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1'}
{'https://github.com/containers/image/commit/4c7a23f82ef09127b0ff28366d1cf31316dd6cc1', 'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733'}
Go
GHSA-9c4x-5hgq-q3wh
Instance config inline secret exposure in Grafana
### Impact Some inline secrets are exposed in plaintext over the Grafana Agent HTTP server: * Inline secrets for metrics instance configs in the base YAML file are exposed at `/-/config` * Inline secrets for integrations are exposed at `/-/config` * Inline secrets for Consul ACL tokens and ETCD basic auth when config...
{'CVE-2021-41090'}
2021-12-14T15:32:21Z
2021-12-08T19:52:40Z
MODERATE
null
{'CWE-312', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41090', 'https://github.com/grafana/agent/releases/tag/v0.21.2', 'https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21', 'https://github.com/grafana/agent/pull/1152', 'https://security.netapp.com/advisory/ntap-20211229-0004/', 'https://github.com/g...
null
{'https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21', 'https://github.com/grafana/agent/commit/a5479755e946e5c7cddb793ee9adda8f5692ba11'}
{'https://github.com/grafana/agent/commit/af7fb01e31fe2d389e5f1c36b399ddc46b412b21', 'https://github.com/grafana/agent/commit/a5479755e946e5c7cddb793ee9adda8f5692ba11'}
Go
GHSA-7mqr-2v3q-v2wm
Ignored errors on token revokation in github.com/ory/fosite
### Impact The `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. ### References [RFC 700...
{'CVE-2020-15223'}
2021-05-24T12:53:07Z
2021-05-24T16:57:39Z
HIGH
null
{'CWE-755'}
{'https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm', 'https://tools.ietf.org/html/rfc7009#section-2.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15223', 'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319'}
null
{'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319'}
{'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319'}
Go
GO-2021-0081
null
The HTTP client used to connect to the container registry authorization service explicitly disables TLS verification, allowing an attacker that is able to MITM the connection to steal credentials.
{'CVE-2019-10214'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/containers/image/pull/669', 'https://github.com/containers/image/issues/654', 'https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214'}
null
{'https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf'}
{'https://github.com/containers/image/commit/634605d06e738aec8332bcfd69162e7509ac7aaf'}
Go
GHSA-wpfr-6297-9v57
User object created with invalid provider data in GoTrue
### Impact _What kind of vulnerability is it? Who is impacted?_ Under certain circumstances a valid user object would have been created with invalid provider metadata. This vulnerability affects everyone running an instance of GoTrue as a service. We advise you to update especially if you are using the provider metad...
null
2022-02-09T22:29:01Z
2022-02-09T22:29:01Z
MODERATE
null
null
{'https://github.com/netlify/gotrue/releases/tag/v1.0.1', 'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83', 'https://github.com/netlify/gotrue/pull/313', 'https://github.com/netlify/gotrue', 'https://github.com/netlify/gotrue/security/advisories/GHSA-wpfr-6297-9v57'}
null
{'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83'}
{'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83'}
Go
GO-2020-0025
null
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840', 'https://snyk.io/research/zip-slip-vulnerability'}
null
{'https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840'}
{'https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840'}
Go
GHSA-wxc4-f4m6-wwqv
Excessive Platform Resource Consumption within a Loop in Kubernetes
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
{'CVE-2019-11254'}
2021-05-07T17:24:04Z
2021-12-20T16:55:06Z
MODERATE
null
{'CWE-1050'}
{'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://github.com/kubernetes/kubernetes/issues/89535', 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11254', 'https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yH...
null
{'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8', 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}
{'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8', 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48'}
Go
GHSA-6c7m-qwxj-mvhp
Broken encryption in EdgeX Foundry
### Summary Broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. ### Detailed Description The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing p...
{'CVE-2021-41278'}
2021-11-24T19:01:48Z
2021-11-19T20:55:16Z
MODERATE
null
{'CWE-327'}
{'https://github.com/edgexfoundry/app-functions-sdk-go', 'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165', 'https://github.com/edgexfoundry/app-functions-sdk-go/security/advisories/GHSA-6c7m-qwxj-mvhp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41278'}
null
{'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165'}
{'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165'}
Go
GO-2020-0005
null
Malformed WALs can be constructed such that [`WAL.ReadAll`][] can cause attempted out of bounds reads, or creation of arbitarily sized slices, which may be used as a DoS vector.
{'CVE-2020-15106'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07', 'https://github.com/etcd-io/etcd/blob/master/security/SECURITY_AUDIT.pdf', 'https://github.com/etcd-io/etcd/pull/11793'}
null
{'https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07'}
{'https://github.com/etcd-io/etcd/commit/f4b650b51dc4a53a8700700dc12e1242ac56ba07'}
Go
GHSA-jcxc-rh6w-wf49
Link Following in Iris
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
{'CVE-2021-23772'}
2022-01-05T18:09:47Z
2022-01-06T21:36:19Z
HIGH
null
{'CWE-59'}
{'https://github.com/kataras/iris', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169', 'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23772'}
null
{'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08'}
{'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08'}
Go
GHSA-7v5r-r995-q2x2
SSRF in repository migration
Gogs is a self-hosted Git service. The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5...
{'CVE-2022-0870'}
2022-03-24T23:23:21Z
2022-03-12T00:00:34Z
MODERATE
null
{'CWE-918'}
{'https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531', 'https://github.com/gogs/gogs', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0870', 'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb'}
null
{'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb'}
{'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb'}
Go
GO-2020-0013
null
By default host key verification is disabled which allows for man-in-the-middle attacks against SSH clients if [`ClientConfig.HostKeyCallback`] is not set.
{'CVE-2017-3204'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://go-review.googlesource.com/38701', 'https://bridge.grumpy-troll.org/2017/04/golang-ssh-security/', 'https://github.com/golang/crypto/commit/e4e2799dd7aab89f583e1d898300d96367750991', 'https://github.com/golang/go/issues/19767'}
null
{'https://github.com/golang/crypto/commit/e4e2799dd7aab89f583e1d898300d96367750991'}
{'https://github.com/golang/crypto/commit/e4e2799dd7aab89f583e1d898300d96367750991'}
Go
GHSA-jq7p-26h5-w78r
Out-of-bounds read in Apache Thrift
In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.
{'CVE-2019-0210'}
2021-05-17T21:09:18Z
2021-05-18T15:32:04Z
HIGH
null
{'CWE-125'}
{'https://lists.apache.org/thread.html/r2832722c31d78bef7526e2c701ba4b046736e4c851473194a247392f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rab740e5c70424ef79fd095a4b076e752109aeee41c4256c2e5e5e142@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https:/...
null
{'https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2'}
{'https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2'}
Go
GO-2021-0058
null
Due to the behavior of encoding/xml, a crafted XML document may cause XML Digital Signature validation to be entirely bypassed, causing an unsigned document to appear signed.
{'CVE-2020-27846'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9', 'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
null
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
Go
GHSA-xg75-q3q5-cqmv
Denial of Service in http-swagger
### Impact Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system. ### Patches Yes. Please upgrade to v1.2.6. ### Workarounds A workaround is to restrict the path prefix to the "GET" method. As shown below ``` func main() { r := mux.NewRouter() r.PathPrefix("/swagger/").Handl...
{'CVE-2022-24863'}
2022-04-22T20:55:52Z
2022-04-22T20:55:52Z
HIGH
null
{'CWE-400', 'CWE-755'}
{'https://github.com/swaggo/http-swagger', 'https://github.com/swaggo/http-swagger/pull/62', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863', 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6', 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/swaggo/http-...
null
{'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}
{'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e'}
Go
GHSA-jp4j-47f9-2vc3
Integer Overflow or Wraparound in NATS Server
An integer overflow in NATS Server 2.0.0 allows a remote attacker to crash the server by sending a crafted request.
{'CVE-2019-13126'}
2021-05-17T16:35:04Z
2021-05-18T18:14:55Z
HIGH
null
{'CWE-190'}
{'https://github.com/nats-io/nats-server/commits/master', 'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda', 'https://github.com/nats-io/nats-server/pull/1053', 'https://github.com/nats-io/nats-server/pull/1441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13126', 'https://www.twis...
null
{'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'}
{'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'}
Go
GHSA-f5fj-7265-jxhj
Information Exposure
Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vu...
{'CVE-2018-1000803'}
2021-05-12T18:09:38Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803', 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57', 'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3', 'https://github.com/go-gitea/gitea/pull/4664'}
null
{'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'}
{'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3'}
Go
GHSA-jj6m-r8jc-2gp7
Asymmetric Resource Consumption (Amplification) in Docker containers created by Wings
### Impact All versions of Pterodactyl Wings preior to `1.4.4` are vulnerable to system resource exhaustion due to improper container process limits being defined. A malicious user can consume more resources than intended and cause downstream impacts to other clients on the same hardware, eventually causing the physica...
{'CVE-2021-32699'}
2021-10-21T13:26:03Z
2021-06-23T18:03:18Z
MODERATE
null
{'CWE-405'}
{'https://github.com/pterodactyl/wings', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32699', 'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3', 'https://github.com/pterodactyl/wings/security/advisories/GHSA-jj6m-r8jc-2gp7'}
null
{'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}
{'https://github.com/pterodactyl/wings/commit/e0078eee0a71d61573a94c75e6efcad069d78de3'}
Go
GHSA-mr6h-chqp-p9g2
SQL Injection in gogs.io/gogs
SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues.
{'CVE-2014-8681'}
2021-05-19T21:48:08Z
2021-06-29T18:32:44Z
MODERATE
null
{'CWE-89'}
{'http://seclists.org/fulldisclosure/2014/Nov/31', 'http://gogs.io/docs/intro/change_log.html', 'http://packetstormsecurity.com/files/129116/Gogs-Label-Search-Blind-SQL-Injection.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98695', 'https://www.exploit-db.com/exploits/35237', 'https://web.nvd.nist.gov/v...
null
{'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
{'https://github.com/gogits/gogs/commit/83283bca4cb4e0f4ec48a28af680f0d88db3d2c8'}
Go
GHSA-4fqx-74rv-638w
SQL Injection
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
{'CVE-2019-3792'}
2021-05-12T18:21:05Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3792', 'https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1', 'https://pivotal.io/security/cve-2019-3792', 'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}
null
{'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}
{'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}
Go
GHSA-fx95-883v-4q4h
Path traversal in github.com/valyala/fasthttp
The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.
{'CVE-2022-21221'}
2022-03-29T22:03:08Z
2022-03-18T00:01:11Z
HIGH
null
{'CWE-22'}
{'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866', 'https://github.com/valyala/fasthttp', 'https://github.com/valyala/fasthttp/...
null
{'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1'}
{'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1'}
Go
GO-2020-0029
null
Due to improper HTTP header santization, a malicious user can spoof their source IP address by setting the X-Forwarded-For header. This may allow a user to bypass IP based restrictions, or obfuscate their true source.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/gin-gonic/gin/commit/0099840c98ae1473c5ff0f18bc93a8e13ceed829', 'https://github.com/gin-gonic/gin/pull/182'}
null
{'https://github.com/gin-gonic/gin/commit/0099840c98ae1473c5ff0f18bc93a8e13ceed829'}
{'https://github.com/gin-gonic/gin/commit/0099840c98ae1473c5ff0f18bc93a8e13ceed829'}
Go
GHSA-4cxw-hq44-r344
Off-by-one Error in v2fly/v2ray-core
v2fly/v2ray-core prior to 4.44.0 is vulnerable to an off-by-one error. Indexing operations on arrays, slices, or strings should use an index at most one less than the length. If the index is checked for being less than or equal to the length (`<=`), instead of less than the length (`<`), the index could be out of bound...
{'CVE-2021-4070'}
2022-03-03T19:17:50Z
2022-02-24T00:00:52Z
CRITICAL
null
{'CWE-193'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4070', 'https://github.com/v2fly/v2ray-core', 'https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877', 'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}
null
{'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}
{'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}
Go
GHSA-465w-gg5p-85c9
Insufficient Session Expiration in Kiali
An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration.
{'CVE-2020-1762'}
2021-05-18T20:45:55Z
2021-05-18T21:09:01Z
HIGH
null
{'CWE-613', 'CWE-384', 'CWE-295'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1762', 'https://bugzilla.redhat.com/show_bug.cgi?id=1810387', 'https://kiali.io/news/security-bulletins/kiali-security-001/', 'https:...
null
{'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1'}
{'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c'}
Go
GHSA-63qx-x74g-jcr7
Path traversal and dereference of symlinks in Argo CD
### Impact All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts. Additionally, it is possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the reposi...
{'CVE-2022-24348'}
2022-02-07T19:06:18Z
2022-02-07T19:06:18Z
HIGH
null
{'CWE-200', 'CWE-22'}
{'https://github.com/argoproj/argo-cd', 'https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments/', 'https://github.com/argoproj/argo-cd/releases/tag/v2.1.9', 'https://github.com/argoproj/argo-cd/releases/tag/v2.2.4', 'https://nvd.nist.gov/vuln/detail...
null
{'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'}
{'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'}
Go
GHSA-c52f-pq47-2r9j
plugin.yaml file allows for duplicate entries in helm
### Impact During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a loca...
{'CVE-2020-15187'}
2021-11-19T15:21:02Z
2021-05-24T16:57:21Z
LOW
null
{'CWE-694', 'CWE-74'}
{'https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15187', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b', 'https://github.com/helm/helm'}
null
{'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946'}
{'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b'}
Go
GHSA-gfh2-7jg5-653p
Denial of Service in docker2aci
docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain.
{'CVE-2016-8579'}
2021-05-20T16:29:42Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8579', 'https://www.securityfocus.com/bid/93560', 'https://github.com/appc/docker2aci/issues/203', 'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f', 'https://github.com/appc/docker2aci/releases/tag/v0.13.0', 'https://web.nvd.nist....
null
{'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'}
{'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'}
Go
GHSA-q9vw-wr57-xjv3
Information Exposure in Heketi
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
{'CVE-2017-15104'}
2021-05-19T22:48:28Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-200', 'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15104', 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00', 'https://access.redhat.com/security/cve/CVE-2017-15104', 'https://github.com/heketi/heketi/releases/tag/v5.0.1', 'https://access.redhat.com/errata/RHSA-2017:3481', 'https://bugzilla.re...
null
{'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'}
{'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'}
Go
GO-2021-0063
null
Due to a nil pointer dereference, a malicously crafted RPC message can cause a panic. If handling RPC messages from untrusted clients, this may be used as a denial of service vector.
{'CVE-2020-26264'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/ethereum/go-ethereum/pull/21896', 'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46'}
null
{'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46'}
{'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46'}
Go
GO-2020-0028
null
Due to a nil pointer dereference, parsing a malformed zone file containing TA records may cause a panic. If parsing user supplied input, this may be used as a denial of service vector.
{'CVE-2018-17419'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d', 'https://github.com/miekg/dns/issues/742'}
null
{'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d'}
{'https://github.com/miekg/dns/commit/501e858f679edecd4a38a86317ce50271014a80d'}
Go
GHSA-h395-qcrw-5vmq
Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin
This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
{'CVE-2020-28483'}
2021-05-12T21:46:50Z
2021-06-23T17:53:21Z
HIGH
null
{'CWE-113', 'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28483', 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711', 'https://github.com/gin-gonic/gin/pull/2632', 'https://github.com/gin-gonic/gin/pull/2474%23issuecomment-729696437', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736', 'h...
null
{'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'}
{'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'}
Go
GHSA-v592-xf75-856p
Erroneous Proof of Work calculation in geth
### Impact An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. ### Patches This issue is also fixed as of...
{'CVE-2020-26240'}
2021-05-21T21:52:58Z
2021-06-29T21:12:56Z
MODERATE
null
{'CWE-682'}
{'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240', 'https://github.com/ethereum/go...
null
{'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'}
{'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'}
Go
GHSA-4cx6-fj7j-pjx9
Code injection in Stripe CLI on windows
### Impact A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerabilit...
{'CVE-2022-24753'}
2022-03-18T21:10:48Z
2022-03-10T18:17:50Z
HIGH
null
{'CWE-78'}
{'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd', 'https://github.com/stripe/stripe-cli', 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24753'}
null
{'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'}
{'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'}
Go
GHSA-mh3m-8c74-74xh
Denial of Service in graphql-go
### Impact This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ...
{'CVE-2022-21708'}
2022-01-31T21:59:33Z
2022-01-27T15:28:06Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21708', 'https://github.com/graph-gophers/graphql-go', 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe', 'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh'}
null
{'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'}
{'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'}
Go
GHSA-557g-r22w-9wvx
Incorrect Permission Assignment for Critical Resource in Singularity
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can c...
{'CVE-2019-11328'}
2021-05-17T15:50:05Z
2021-12-20T18:25:33Z
HIGH
null
{'CWE-269'}
{'http://www.openwall.com/lists/oss-security/2019/05/16/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/', 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31', 'http://lists.opensuse.org/opensuse-sec...
null
{'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}
{'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}
Go
GHSA-vrxp-mg9f-hwf3
Improperly Implemented path matching for in-toto-golang
### Impact Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path...
{'CVE-2021-41087'}
2021-09-21T21:51:18Z
2021-09-22T20:37:09Z
MODERATE
null
{'CWE-345', 'CWE-22'}
{'https://github.com/in-toto/in-toto-golang', 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3', 'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41087'}
null
{'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'}
{'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'}
Go
GHSA-q9mp-79cp-9g8j
Improper Authentication
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
{'CVE-2019-20894'}
2021-08-02T22:18:22Z
2021-09-02T22:00:09Z
HIGH
null
{'CWE-287', 'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20894', 'https://github.com/containous/traefik/issues/5312', 'https://github.com/containous/traefik/pull/7008', 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}
null
{'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}
{'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}
Go
GHSA-8wrg-m8vm-5fvj
Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server
### Impact Authentication Bypass by Primary Weakness (CWE-305) Commit: https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1 ALL Users is impacted. ### Patches Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6
{'CVE-2021-21403'}
2021-05-20T22:25:09Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-305'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21403', 'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj', 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
null
{'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
{'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
Go
GHSA-mqf3-28j7-3mj6
Information Exposure in Kubernetes
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
{'CVE-2015-7528'}
2022-04-12T22:40:14Z
2022-04-12T22:40:14Z
MODERATE
null
{'CWE-200'}
{'https://github.com/kubernetes/kubernetes/pull/17886', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7528', 'https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5', 'https://github.com/kubernetes/kubernetes', 'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671', 'http:...
null
{'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671'}
{'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671'}
Go
GO-2021-0075
null
Due to improper argument validation in RPC messages, a maliciously crafted message can cause a panic, leading to denial of service.
{'CVE-2018-12018'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://peckshield.com/2018/06/27/EPoD/', 'https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4', 'https://github.com/ethereum/go-ethereum/pull/16891'}
null
{'https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4'}
{'https://github.com/ethereum/go-ethereum/commit/a5237a27eaf81946a3edb4fafe13ed6359d119e4'}
Go
GHSA-pf59-j7c2-rh6x
Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,...
{'CVE-2020-13597'}
2021-05-14T16:27:14Z
2022-02-15T01:57:18Z
LOW
null
{'CWE-200', 'CWE-201'}
{'https://github.com/kubernetes/kubernetes/issues/91507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8', 'https://github.com/containernetworking/plugins/pull/484/', 'https://github.com/containernetworking/plugins/commit/ad10b6fa91aa...
null
{'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965'}
{'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965'}
Go
GO-2020-0045
null
CSRF tokens are generated using math/rand, which is not a cryptographically secure rander number generation, making predicting their values relatively trivial and allowing an attacker to bypass CSRF protections which relatively few requests.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/dinever/golf/issues/20', 'https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe', 'https://github.com/dinever/golf/pull/24'}
null
{'https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe'}
{'https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe'}
Go
GO-2021-0059
null
Due to improper bounds checking, maliciously crafted JSON objects can cause an out-of-bounds panic. If parsing user input, this may be used as a denial of service vector.
{'CVE-2020-35380'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/tidwall/gjson/issues/192', 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'}
null
{'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'}
{'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc'}
Go
GHSA-rfq3-w54c-f9q5
OAuth2 Redirect URL validity does not respect query parameters and character casing for loopback addresses
### Impact [fosite#400](https://github.com/ory/fosite/pull/400) (released as v0.30.2) introduced a new feature for handling redirect URLs pointing to loopback interfaces ([rfc8252#section-7.3](https://tools.ietf.org/html/rfc8252#section-7.3)). As part of that change new behavior was introduced which failed to respect ...
{'CVE-2020-15233'}
2021-11-19T14:42:56Z
2021-05-24T17:00:12Z
MODERATE
null
{'CWE-601', 'CWE-20'}
{'https://github.com/ory/fosite/pull/400', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15233', 'https://github.com/ory/fosite', 'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf', 'https://github.com/ory/fosite/security/advisories/GHSA-rfq3-w54c-f9q5'}
null
{'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}
{'https://github.com/ory/fosite/commit/cdee51ebe721bfc8acca0fd0b86b030ca70867bf'}
Go
GHSA-rqjq-mrgx-85hp
Allocation of Resources Without Limits or Throttling in Hashicorp Consul
HashiCorp Consul and Consul Enterprise include an HTTP API (introduced in 1.2.0) and DNS (introduced in 1.4.3) caching feature that was vulnerable to denial of service. Fixed in 1.6.6 and 1.7.4.
{'CVE-2020-13250'}
2021-07-29T18:19:34Z
2021-05-18T18:21:35Z
HIGH
null
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13250', 'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/8023', 'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md'}
null
{'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'}
{'https://github.com/hashicorp/consul/commit/72f92ae7ca4cabc1dc3069362a9b64ef46941432'}
Go
GO-2020-0012
null
An attacker can craft an ssh-ed25519 or sk-ssh-ed25519@openssh.com public key, such that the library will panic when trying to verify a signature with it. If verifying signatures using user supplied public keys, this may be used as a denial of service vector.
{'CVE-2020-9283'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://go-review.googlesource.com/c/crypto/+/220357', 'https://groups.google.com/g/golang-announce/c/3L45YRc91SY', 'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'}
null
{'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'}
{'https://github.com/golang/crypto/commit/bac4c82f69751a6dd76e702d54b3ceb88adab236'}
Go
GHSA-ch68-7cf4-35vr
Limited ability to spoof SAML authentication with missing audience verification in Fleet
### Impact This impacts deployments using SAML SSO in two specific cases: 1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same...
{'CVE-2022-23600'}
2022-02-07T21:57:38Z
2022-02-07T21:57:38Z
MODERATE
null
{'CWE-287', 'CWE-284'}
{'https://github.com/fleetdm/fleet', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23600', 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr', 'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}
null
{'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}
{'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}
Go
GHSA-2v6x-frw8-7r7f
Exposure of Sensitive Information to an Unauthorized Actor in kube-state-metrics
A security issue was discovered in kube-state-metrics 1.7.x before 1.7.2. An experimental feature was added to v1.7.0 and v1.7.1 that enabled annotations to be exposed as metrics. By default, kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default kubectl behavior and this n...
{'CVE-2019-17110'}
2021-05-17T21:04:15Z
2021-05-18T15:38:54Z
MODERATE
null
{'CWE-200'}
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17110', 'https://github.com/kubernetes/kube-state-metrics/releases/tag/v1.7....
null
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}
{'https://github.com/kubernetes/kube-state-metrics/commit/2a9ab3a9a0f1c4dbecb6a5577185b33bfac86a96', 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}
Go
GO-2020-0004
null
If any of the `ListenAndServe` functions are called with an empty token, token authentication is disabled globally for all listeners. Also, a minor timing side channel was present allowing attackers with very low latency and able to make a lot of requests to potentially recover the token.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3', 'https://github.com/nanobox-io/golang-nanoauth/pull/5'}
null
{'https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3'}
{'https://github.com/nanobox-io/golang-nanoauth/commit/063a3fb69896acf985759f0fe3851f15973993f3'}
Go
GHSA-q8q8-93cv-v6h8
Lookup function information discolosure in helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.1.2. ### Impact `lookup` is a Helm template function introduced in Helm v3. It is able to lookup resources in the cluster to check for the existence of specific resources and get details about them. This can be used as ...
{'CVE-2020-11013'}
2021-05-24T21:15:16Z
2021-05-27T18:44:56Z
HIGH
null
{'CWE-200'}
{'https://github.com/helm/helm/releases/tag/v3.2.0', 'https://github.com/helm/helm/pull/7969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11013', 'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008', 'https://github.com/helm/helm/security/advisories/GHSA-q8q8-93cv-v6h8'}
null
{'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'}
{'https://github.com/helm/helm/pull/7969/commits/c67b644a791a8fa61c760a3a0474533e63e74008'}
Go
GHSA-c8xp-8mf3-62h9
OctoRPKI lacks contextual out-of-bounds check when validating RPKI ROA maxLength values
Any CA issuer in the RPKI can trick OctoRPKI prior to https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422 into emitting an invalid VRP "MaxLength" value, causing RTR sessions to terminate. ### Impact An attacker can use this to disable RPKI Origin Validation in a victim network (for ...
{'CVE-2021-3761'}
2021-09-03T21:40:39Z
2021-09-07T23:02:18Z
HIGH
null
{'CWE-787', 'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3761', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.3.0', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-c8xp-8mf3-62h9', 'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0...
null
{'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'}
{'https://github.com/cloudflare/cfrpki/commit/a8db4e009ef217484598ba1fd1c595b54e0f6422'}
Go
GHSA-86f3-hf24-76q4
Use of Hard-coded Cryptographic Key in Netmaker
### Impact There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients. ### Patches This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10....
{'CVE-2022-23650'}
2022-02-22T19:40:23Z
2022-02-22T19:40:23Z
HIGH
null
{'CWE-321', 'CWE-798'}
{'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080', 'https://github.com/gravitl/netmaker', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650', 'https://github.com/gravitl/netmaker/security/advisorie...
null
{'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080'}
{'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080'}
Go
GHSA-99cg-575x-774p
Improper Input Validation in AKPublic.Verify with attacker-controlled TPM Quote
### Impact An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication per...
{'CVE-2022-0317'}
2022-02-11T15:06:33Z
2022-02-01T00:43:17Z
MODERATE
null
{'CWE-20'}
{'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788', 'https://github.com/google/go-attestation/', 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0317'}
null
{'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'}
{'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'}
Go
GHSA-pw59-4qgf-jxr8
Cache Manipulation Attack in Apache Traffic Control
When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to I...
{'CVE-2020-17522'}
2022-04-04T21:27:42Z
2021-06-18T22:04:32Z
MODERATE
null
{'CWE-525', 'CWE-732'}
{'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b', 'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E', 'https://github.com/apache/trafficcontrol', 'https://lists.apache.org/thread.html/rc8bfd7d4...
null
{'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}
{'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b'}
Go
GHSA-82mm-ffjr-h86c
Authorization bypass in Istio
"In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy."
{'CVE-2020-16844'}
2021-05-12T21:59:07Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-16844', 'https://istio.io/latest/news/security/istio-security-2020-009/', 'https://istio.io/latest/news/releases/1.5.x/announcing-1.5.9/', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'https://istio.io/latest/news/releases/1.6.x/announcing...
null
{'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c'}
{'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace'}
Go
GO-2020-0024
null
The RemoteAddr and LocalAddr methods on the returned net.Conn may call themselves, leading to an infinite loop which will crash the program due to a stack overflow.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc'}
null
{'https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc'}
{'https://github.com/btcsuite/go-socks/commit/233bccbb1abe02f05750f7ace66f5bffdb13defc'}
Go
GHSA-93p5-8fqw-wjx3
Authentication bypass by capture-replay in github.com/cosmos/ethermint
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
{'CVE-2021-25834'}
2021-05-12T21:17:36Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-294', 'CWE-287'}
{'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72', 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1', 'https://github.com/cosmos/ethermint/issues/686', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25834'}
null
{'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72'}
{'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72'}
Go
GHSA-6rrw-4fm9-rghv
Use of Hard-coded Cryptographic Key in Netmaker
Netmaker prior to versions 0.8.5, 0.9.4, 0.10.0, and 0.10.1 uses a hard-coded cryptographic key.
{'CVE-2022-0664'}
2022-02-23T15:45:21Z
2022-02-19T00:01:36Z
HIGH
null
{'CWE-321'}
{'https://github.com/gravitl/netmaker', 'https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0664', 'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}
null
{'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}
{'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}
Go
GHSA-rrp4-2xx3-mv29
Command injection in gh-ost
Gh-ost version <= 1.1.2 allows users to inject DSN strings via the `-database` parameter. This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious `gh-ost` command on a host running `gh-ost`, plus network access from host running `gh-...
{'CVE-2022-21687'}
2022-02-07T21:07:25Z
2022-02-01T00:47:33Z
MODERATE
null
{'CWE-20', 'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21687', 'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f', 'https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29', 'https://github.com/github/gh-ost'}
null
{'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}
{'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}
Go
GHSA-5wmg-j84w-4jj4
Arbitrary File Write via Archive Extraction in mholt/archiver
mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002207'}
2021-05-20T16:56:29Z
2022-02-15T01:57:18Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002207', 'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3', 'https://github.com/snyk/zip-slip-vulnerability', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARCHIVER-50071', 'https://snyk.io/research/zip-slip-vulnerability', 'htt...
null
{'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3'}
{'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3'}
Go
GHSA-579h-mv94-g4gp
Privilege Escalation in Kubernetes
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connec...
{'CVE-2018-1002105'}
2021-05-20T20:40:04Z
2022-02-15T01:57:18Z
CRITICAL
null
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002105', 'https://access.redhat.com/errata/RHSA-2018:3624', 'https://www.openwall.com/lists/oss-security/2019/06/28/2', 'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905', 'https://access.redhat.com/errata/RHSA-2018:3752', 'https://acc...
null
{'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905'}
{'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905'}
Go
GO-2020-0032
null
Due to improper santization of user input, Controller.FileHandler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/goadesign/goa/pull/2388', 'https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39'}
null
{'https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39'}
{'https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39'}
Go
GO-2021-0096
null
Due to improper setting of finalizers, memory passed to C may be freed before it is used, leading to crashes due to memory corruption or possible code execution.
{'CVE-2020-8945'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733', 'https://github.com/proglottis/gpgme/pull/23'}
null
{'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733'}
{'https://github.com/proglottis/gpgme/commit/92153bcb59bd2f511e502262c46c7bd660e21733'}
Go
GHSA-vc3x-gx6c-g99f
Denial of Service in Bytom
In the client in Bytom before 1.0.6, checkTopicRegister in p2p/discover/net.go does not prevent negative idx values, leading to a crash.
{'CVE-2018-18206'}
2021-05-20T18:55:02Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18206', 'https://github.com/Bytom/bytom/pull/1307', 'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
null
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
Go
GO-2021-0079
null
A malformed query can cause an out-of-bounds panic due to improper validation of arguments. If processing queries from untrusted parties, this may be used as a vector for denial of service attacks.
{'CVE-2018-18206'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42', 'https://github.com/Bytom/bytom/pull/1307'}
null
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
{'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}
Go
GHSA-qj26-7grj-whg3
Privilege Escalation in fscrypt
The pam_fscrypt module in fscrypt before 0.2.4 may incorrectly restore primary and supplementary group IDs to the values associated with the root user, which allows attackers to gain privileges via a successful login through certain applications that use Linux-PAM (aka pam).
{'CVE-2018-6558'}
2021-05-20T21:04:58Z
2021-06-23T17:18:49Z
MODERATE
null
null
{'https://launchpad.net/bugs/1787548', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b', 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66', 'https://github.com/google/fscrypt/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6558'}
null
{'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b', 'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66'}
{'https://github.com/google/fscrypt/commit/315f9b042237200174a1fb99427f74027e191d66', 'https://github.com/google/fscrypt/commit/3022c1603d968c22f147b4a2c49c4637dd1be91b'}
Go
GO-2020-0049
null
Due to improper validation of caller input, validation is silently disabled if the provided expected token is malformed, causing any user supplied token to be considered valid.
null
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/justinas/nosurf/pull/60', 'https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314'}
null
{'https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314'}
{'https://github.com/justinas/nosurf/commit/4d86df7a4affa1fa50ab39fb09aac56c3ce9c314'}
Go
GHSA-599h-8wpj-75xj
Authentication Bypass in tyk-identity-broker
The package github.com/tyktechnologies/tyk-identity-broker before 1.1.1 are vulnerable to Authentication Bypass via the Go XML parser which can cause SAML authentication bypass. This is because the XML parser doesn’t guarantee integrity in the XML round-trip (encoding/decoding XML data).
{'CVE-2021-23365'}
2021-05-20T21:24:49Z
2021-06-23T17:23:30Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/TykTechnologies/tyk-identity-broker/pull/147', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKIDENTITYBROKER-1089720', 'https://github.com/TykTechnologies/tyk-identity-broker/releases/tag/v1.1.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23365', 'https://github.com/TykTechnologies/t...
null
{'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0'}
{'https://github.com/TykTechnologies/tyk-identity-broker/commit/243092965b0f93a95a14cb882b5b9a3df61dd5c0', 'https://github.com/TykTechnologies/tyk-identity-broker/commit/46f70420e0911e4e8b638575e29d394c227c75d0'}
Go
GHSA-vj54-cjrx-x696
Observable Discrepancy in Argo
Fixed in v1.5.1, Argo version v1.5.0 was vulnerable to a user-enumeration vulnerability which allowed attackers to determine the usernames of valid (non-SSO) accounts within Argo.
{'CVE-2020-11576'}
2021-07-29T16:07:15Z
2021-12-09T19:59:24Z
MODERATE
null
{'CWE-203'}
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11576', 'https://github.com/argoproj/argo-cd/pull/3215'}
null
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}
{'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}
Go
GO-2021-0110
null
Uniqueness of JWT IDs (jti) are not checked, allowing the JWT to be replayed.
{'CVE-2020-15222'}
2021-07-28T12:00:00Z
2021-07-28T12:00:00Z
null
null
null
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9', 'https://github.com/ory/fosite/security/advisories/GHSA-v3q9-2p3m-7g43'}
null
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}
{'https://github.com/ory/fosite/commit/0c9e0f6d654913ad57c507dd9a36631e1858a3e9'}
Go
GHSA-q3j5-32m5-58c2
Privilege Elevation in runc
libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
{'CVE-2016-3697'}
2021-10-05T16:34:17Z
2021-12-20T18:21:34Z
HIGH
null
null
{'https://github.com/opencontainers/runc/releases/tag/v0.1.0', 'https://github.com/opencontainers/runc', 'https://lists.opensuse.org/opensuse-updates/2016-05/msg00111.html', 'https://rhn.redhat.com/errata/RHSA-2016-2634.html', 'https://security.gentoo.org/glsa/201612-28', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3697...
null
{'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}
{'https://github.com/opencontainers/runc/commit/69af385de62ea68e2e608335cffbb0f4aa3db091'}
Go
GHSA-h3p9-wrgx-82cm
Use of a Broken or Risky Cryptographic Algorithm in Terraform
When using the Azure backend with a shared access signature (SAS), Terraform versions prior to 0.12.17 may transmit the token and state snapshot using cleartext HTTP.
{'CVE-2019-19316'}
2021-05-13T15:15:38Z
2021-05-18T18:18:50Z
HIGH
null
{'CWE-327', 'CWE-20'}
{'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19316', 'https://github.com/hashicorp/terraform/issues/23493', 'https://github.com/hashicorp/terraform/security/advisories/GHSA-4rvg-555h-r626'}
null
{'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb'}
{'https://github.com/hashicorp/terraform/commit/6db3cf8e5b4cfb2a3cd1d99a813b50b2d5d363bb'}
Go
GO-2020-0008
null
DNS message transaction IDs are generated using [`math/rand`] which makes them relatively predictable. This reduces the complexity of response spoofing attacks against DNS clients.
{'CVE-2019-19794'}
2021-04-14T12:00:00Z
2021-04-14T12:00:00Z
null
null
null
{'https://github.com/miekg/dns/pull/1044', 'https://github.com/miekg/dns/issues/1037', 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33', 'https://github.com/miekg/dns/issues/1043'}
null
{'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}
{'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}
Go
GHSA-5jgq-x857-p8xw
Account compromise in Evmos
## Impact _What kind of vulnerability is it? Who is impacted?_ ### Classification The vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses. ### Disclosure The attack requires ...
{'CVE-2022-24738'}
2022-03-18T20:07:34Z
2022-03-07T21:45:59Z
HIGH
null
{'CWE-287'}
{'https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw', 'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71', 'https://github.com/tharsis/evmos', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24738', 'https://github.com/tharsis/evmos/releases/tag/v2.0.1'}
null
{'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71'}
{'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71'}
Go
GHSA-69j6-29vr-p3j9
Authentication bypass for viewing and deletions of snapshots
Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterpri...
{'CVE-2021-39226'}
2021-11-18T15:13:27Z
2021-10-05T20:24:02Z
HIGH
null
{'CWE-287'}
{'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/', 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269', 'http://www.openwall.com/lists/oss-security/2021/10/05/4', 'https://github.com/grafana/grafana', 'https://lists.fedoraproject.org/archives/list/package-ann...
null
{'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'}
{'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'}
Go
GO-2021-0106
null
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
null
2021-07-28T12:00:00Z
2021-07-28T12:00:00Z
null
null
null
{'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227', 'https://snyk.io/research/zip-slip-vulnerability'}
null
{'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}
{'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}
Maven
GHSA-cf2j-vf36-c6w8
Communities and collections administrators can escalate their privilege up to system administrator
### Impact Any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only existed in 7.0 and does not impact 6.x or below. ### Patches Fix is included in [7.1](https://github.com/DSpace/DSpace/releases/tag/dspace-7.1). Please upgrade to 7.1 at your e...
{'CVE-2021-41189'}
2022-03-03T05:13:25.172783Z
2021-11-01T19:18:16Z
HIGH
null
{'CWE-863'}
{'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041', 'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a', 'https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8', 'https://github.com/DSpace/DSpace', 'https://github.com/DSpace/DSpace/issue...
null
{'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a', 'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041'}
{'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a', 'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041'}
Maven
GHSA-gwp4-hfv6-p7hw
Deserialization of untrusted data in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
{'CVE-2019-14439'}
2022-03-03T05:13:30.808736Z
2019-08-01T19:18:06Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.debian...
null
{'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}
{'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}
Maven
GHSA-g5vf-v6wf-7w2r
Ciphertext Malleability Issue in Tink Java
### Impact Tink's Java version before 1.5 under some circumstances allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a...
{'CVE-2020-8929'}
2022-03-03T05:14:16.042047Z
2020-10-16T00:51:24Z
LOW
null
{'CWE-327', 'CWE-176'}
{'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899', 'https://github.com/google/tink/security/advisories/GHSA-g5vf-v6wf-7w2r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8929'}
null
{'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899'}
{'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899'}
Maven
GHSA-vmqm-g3vh-847m
Denial of service in Apache Xerces2
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
{'CVE-2012-0881'}
2022-03-03T05:13:08.829332Z
2020-06-15T18:51:38Z
HIGH
null
{'CWE-400'}
{'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=787104', 'http://www.openwall.com/lists/oss-security/201...
null
{'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449'}
{'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449'}
Maven
GHSA-w3f4-3q6j-rh82
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.
{'CVE-2018-5968'}
2022-03-03T05:13:07.865218Z
2020-06-30T20:40:50Z
HIGH
null
{'CWE-502', 'CWE-184'}
{'https://github.com/FasterXML/jackson-databind/issues/1899', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:0478', 'https:...
null
{'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05'}
{'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05'}
Maven
GHSA-73xv-w5gp-frxh
Logic error in Legion of the Bouncy Castle BC Java
An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
{'CVE-2020-28052'}
2022-04-22T17:31:09.893912Z
2021-04-30T16:14:15Z
HIGH
null
{'CWE-670'}
{'https://www.bouncycastle.org/releasenotes.html', 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E', 'https://lis...
null
{'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219'}
{'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219'}
Maven
GHSA-959q-32g8-vvp7
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
{'CVE-2017-12161'}
2022-03-03T05:13:30.784473Z
2018-10-18T16:50:05Z
MODERATE
null
{'CWE-602'}
{'https://github.com/advisories/GHSA-959q-32g8-vvp7', 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770', 'https://bugzilla.redhat.com/show_bug.cgi?id=1484564', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161'}
null
{'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770'}
{'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770'}
Maven
GHSA-7ph6-5cmq-xgjq
Path traversal in xwiki-platform-skin-skinx
### Impact AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any sec...
{'CVE-2022-23620'}
2022-02-09T21:53:29Z
2022-02-09T21:53:29Z
MODERATE
null
{'CWE-22'}
{'https://jira.xwiki.org/browse/XWIKI-18819', 'https://github.com/xwiki/xwiki-platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23620', 'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq'}
null
{'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5'}
{'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5'}
Maven
GHSA-4fcw-pq4r-f4q7
Server-Side Request Forgery in Spinnaker Orca
The Spinnaker template resolution functionality is vulnerable to Server-Side Request Forgery (SSRF), which allows an attacker to send requests on behalf of Spinnaker potentially leading to sensitive data disclosure.
{'CVE-2020-9298'}
2021-05-05T19:53:13Z
2021-05-07T15:54:31Z
HIGH
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9298', 'https://github.com/spinnaker/orca/releases/tag/v8.7.0', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-003.md', 'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c'}
null
{'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c'}
{'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c'}
Maven
GHSA-c7fh-chf7-jr5x
ReDOS in Vfsjfilechooser2
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs.
{'CVE-2021-29061'}
2022-03-03T05:13:58.202139Z
2022-01-06T18:44:27Z
HIGH
null
{'CWE-770'}
{'https://github.com/fracpete/vfsjfilechooser2/issues/7', 'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b', 'https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md', '...
null
{'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b'}
{'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b'}
Maven
GHSA-7cj4-gj8m-m2f7
Authentication bypass in Apache Shiro
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
{'CVE-2020-17510'}
2022-03-03T05:13:46.136754Z
2021-04-22T16:13:23Z
CRITICAL
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html',...
null
{'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d'}
{'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d'}
Maven
GHSA-54fx-gm74-q676
Permissions bypass in SmallRye
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixe...
{'CVE-2020-1729'}
2022-03-18T18:03:03.686621Z
2022-03-18T17:55:47Z
MODERATE
null
{'CWE-863'}
{'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729'}
null
{'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}
{'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}
Maven
GHSA-xxgp-pcfc-3vgc
Privilege Escalation in Hibernate Validator
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access thos...
{'CVE-2017-7536'}
2022-03-31T22:19:43.235684Z
2020-06-15T19:57:48Z
HIGH
null
{'CWE-470'}
{'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHSA-2017:2809', 'http://www.secu...
null
{'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b'}
{'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac'}
Maven
GHSA-7hwc-46rm-65jh
Denial of service in XStream
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
{'CVE-2017-7957'}
2022-03-03T05:13:52.552340Z
2020-06-30T22:48:24Z
HIGH
null
{'CWE-20'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'http://www.securitytracker.com/id/1039499', 'https://www-prd-trops.events.ibm.com/node/715749', 'https://github.com/x-...
null
{'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab'}
{'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d'}
Maven
GHSA-g644-pr5v-vppf
Insertion of Sensitive Information into Log File in Apache NiFi
In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.
{'CVE-2020-9486'}
2022-03-03T05:14:10.953929Z
2022-01-06T20:41:02Z
HIGH
null
{'CWE-532'}
{'https://nifi.apache.org/security#CVE-2020-9486', 'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9486'}
null
{'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0'}
{'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0'}
Maven
GHSA-cvx5-m8vg-vxgc
Arbitrary filesystem write access from velocity.
### Impact The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. ...
{'CVE-2022-24897'}
2022-05-03T18:01:48.701710Z
2022-04-28T21:16:40Z
HIGH
null
{'CWE-22'}
{'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8', 'https://jira.xwiki.org/browse/XWIKI-5168', 'https://github.com/xwiki/xwiki-commons', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'}
null
{'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8'}
{'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8'}
Maven
GHSA-w3gh-g32m-cvhr
High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3
Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters.
{'CVE-2018-8038'}
2022-03-03T05:13:46.576561Z
2018-10-18T16:56:47Z
HIGH
null
{'CWE-20'}
{'http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8038', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8...
null
{'https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d'}
{'https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d'}
Maven
GHSA-jgwr-3qm3-26f3
Potential remote code execution in Apache Tomcat
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequi...
{'CVE-2021-25329'}
2022-03-03T05:13:17.256982Z
2021-03-19T20:11:13Z
CRITICAL
null
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20210409-0002/', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://lists.apache.org/thread.html/rb51ccd58b2152fc7512...
null
{'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4'}
{'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4'}
Maven
GHSA-6w39-qhmq-g8cp
CSRF vulnerability in Jenkins Publish Over FTP Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.
{'CVE-2022-29050'}
2022-05-04T21:03:09.782938Z
2022-04-13T00:00:16Z
HIGH
null
{'CWE-352'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050'}
null
{'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}
Maven
GHSA-f9hv-mg5h-xcw9
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
{'CVE-2018-19360'}
2022-03-03T05:12:35.261196Z
2019-01-04T19:06:57Z
CRITICAL
null
{'CWE-502'}
{'http://www.securityfocus.com/bid/107985', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8...
null
{'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}
{'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}