ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-5xvc-vgmp-jgc3 | Improper Access Control in jupyterhub-firstuseauthenticator | ### Impact
When JupyterHub is used with FirstUseAuthenticator, the vulnerability allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed.
### Patches
Upgrade to jupyterhub-firstuseauthenticator to 1.0, or apply patch https://github.com/jupyterhub/firstuseauthentic... | {'CVE-2021-41194'} | 2022-03-22T18:08:53Z | 2021-10-28T23:13:57Z | CRITICAL | 9.1 | {'CWE-284'} | {'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38', 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GH... | null | {'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'} | {'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'} |
GHSA | GHSA-q54r-r9pr-w7qv | XSS in Hexo | Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code. | {'CVE-2021-25987'} | 2021-12-01T18:27:44Z | 2021-12-01T18:27:44Z | MODERATE | 4.6 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25987', 'https://github.com/advisories/GHSA-q54r-r9pr-w7qv', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987', 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'} | null | {'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'} | {'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'} |
GHSA | GHSA-qwpp-fgrj-h78q | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. | {'CVE-2021-32712'} | 2021-09-08T17:59:46Z | 2021-09-08T17:59:46Z | MODERATE | 5.3 | {'CWE-200'} | {'https://github.com/advisories/GHSA-qwpp-fgrj-h78q', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p', 'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d', 'https://nv... | null | {'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'} | {'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'} |
GHSA | GHSA-g4m9-5hpf-hx72 | Firewall configured with unanimous strategy was not actually unanimous in Symfony | Description
-----------
On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access.
As of Symfony 4.4.0, a bug was introduced that prevents the ... | {'CVE-2020-5275'} | 2022-04-19T19:02:24Z | 2020-03-30T20:09:44Z | HIGH | 7.6 | {'CWE-285'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf', 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72', 'https://github.com/adv... | null | {'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'} | {'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'} |
GHSA | GHSA-rqwh-c535-j9hw | Downloads Resources over HTTP in js-given | Affected versions of `js-given` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `js-given... | {'CVE-2016-10638'} | 2021-01-08T01:57:56Z | 2019-02-18T23:47:09Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10638', 'https://github.com/advisories/GHSA-rqwh-c535-j9hw', 'https://www.npmjs.com/advisories/241', 'https://nodesecurity.io/advisories/241'} | null | {'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)'} | {'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)'} |
GHSA | GHSA-3p4q-x8f3-p7vq | Moderate severity vulnerability that affects notebook | Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely. | {'CVE-2018-19352'} | 2021-08-31T21:18:00Z | 2018-11-21T22:19:22Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-19352', 'https://pypi.org/project/notebook/#history', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648', 'https://github.com/advisories/GHSA-3p4q-x8f3-p7vq'} | null | {'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'} | {'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'} |
GHSA | GHSA-vh6r-g38f-q3w8 | Validation bypass in jpv | jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array. | {'CVE-2020-17479'} | 2021-05-06T17:27:58Z | 2021-05-06T17:27:58Z | CRITICAL | 9.8 | {'CWE-20'} | {'https://blog.sonatype.com/cve-2020-17479', 'https://www.npmjs.com/package/jpv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17479', 'https://github.com/advisories/GHSA-vh6r-g38f-q3w8', 'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6', 'https://github.com/manvel-khnkoyan/jpv/issu... | null | {'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6'} | {'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6'} |
GHSA | GHSA-mwm4-5qwr-g9pf | Keycloak is vulnerable to IDN homograph attack | A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity. | null | 2022-05-02T22:35:44Z | 2022-04-28T21:00:31Z | LOW | 0 | {'CWE-284'} | {'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf', 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e', 'https://github.com/advisories/GHSA-mwm4-5qwr-g9pf'} | null | {'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'} | {'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'} |
GHSA | GHSA-pw4v-gr34-2553 | Denial of service (via resource exhaustion) due to improper input validation | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
Fixed by 3175fd3.
### For more information
If you have any questions or comments about this advisory, email ... | {'CVE-2021-29433'} | 2021-06-09T22:13:24Z | 2021-04-16T19:53:37Z | MODERATE | 4.3 | {'CWE-20', 'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29433', 'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/advisories/GHSA-pw4v-gr34-2553', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553'} | null | {'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'} | {'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'} |
GHSA | GHSA-59qh-g7m4-j9m9 | Cross-site Scripting in livehelperchat | Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript. | {'CVE-2022-0374'} | 2022-02-02T16:05:02Z | 2022-01-28T23:06:12Z | MODERATE | 6.5 | {'CWE-79'} | {'https://github.com/advisories/GHSA-59qh-g7m4-j9m9', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374', 'https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} | {'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'} |
GHSA | GHSA-m5vr-3m74-jwxp | Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message... | {'CVE-2020-15098'} | 2022-04-19T19:02:36Z | 2020-07-29T16:15:19Z | HIGH | 8.8 | {'CWE-325', 'CWE-200', 'CWE-20', 'CWE-327', 'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-5091', 'https://github.com/advisories/GHSA-m5vr-3m74-jwxp', 'https://typo3.org/security/advisory/typo3-core-sa-2020-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098', 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1', 'https://typo3.or... | null | {'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'} | {'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'} |
GHSA | GHSA-j3mj-fhpq-qqjj | Reachable Assertion in Tensorflow | ### Impact
When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes.
##... | {'CVE-2022-23571'} | 2022-02-11T20:48:17Z | 2022-02-09T23:28:57Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-j3mj-fhpq-qqjj', 'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23571', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj'} | null | {'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'} | {'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'} |
GHSA | GHSA-p3w6-jcg4-52xh | High severity vulnerability that affects django-rest-registration | ## Misusing the Django Signer API leads to predictable signatures used in verification emails
### Impact
The vulnerability is a high severity one. Anyone using Django REST Registration library versions `0.2.*` - `0.4.*` with e-mail verification option (which is recommended, but needs [additional configuration](https:/... | {'CVE-2019-13177'} | 2022-03-21T21:29:00Z | 2019-07-02T15:43:41Z | CRITICAL | 9.8 | {'CWE-347'} | {'https://github.com/apragacz/django-rest-registration/security/advisories/GHSA-p3w6-jcg4-52xh', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13177', 'https://github.com/advisories/GHSA-p3w6-jcg4-52xh', 'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5', 'https://github... | null | {'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5'} | {'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5'} |
GHSA | GHSA-q44r-f2hm-v76v | Moderate severity vulnerability that affects puppet | lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into si... | {'CVE-2012-3867'} | 2021-09-16T19:28:09Z | 2017-10-24T18:33:37Z | MODERATE | 0 | null | {'https://bugzilla.redhat.com/show_bug.cgi?id=839158', 'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/advisories/GHSA-q44r-f2hm-v76v', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://puppetlabs.com/security/cve/cve-2012-3867/', 'http://lists.opensus... | null | {'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'} | {'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'} |
GHSA | GHSA-pp57-mqmh-44h7 | Command Injection in macaddress | All versions of `macaddress` are vulnerable to command injection. For this vulnerability to be exploited an attacker needs to control the `iface` argument to the `one` method.
## Recommendation
Update to version 0.2.9 or later. | {'CVE-2018-13797'} | 2021-09-16T18:18:03Z | 2018-09-06T23:24:21Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-13797', 'https://www.npmjs.com/advisories/654', 'https://github.com/advisories/GHSA-pp57-mqmh-44h7', 'https://github.com/scravy/node-macaddress/pull/20', 'https://news.ycombinator.com/item?id=17283394', 'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9... | null | {'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332'} | {'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332'} |
GHSA | GHSA-92vm-wfm5-mxvv | Timing Attack in cookie-signature | Affected versions of `cookie-signature` are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison.
Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess ... | {'CVE-2016-1000236'} | 2021-08-19T16:17:01Z | 2020-01-06T18:44:10Z | MODERATE | 4.4 | {'CWE-362'} | {'https://travis-ci.com/nodejs/security-wg/builds/76423102', 'https://www.npmjs.com/advisories/134', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000236', 'https://security-tracker.debian.org/tracker/CVE-2016-1000236', 'https://www.mail-archive.com/secure-testing-team@lists.alioth.debian.org/msg06583.html', 'https://bug... | null | {'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590', 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e', 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07'} | {'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590', 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e', 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07'} |
GHSA | GHSA-85g2-29m8-qf2p | Prototype Pollution Vulnerability in object-collider | Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25914'} | 2021-03-19T21:18:33Z | 2021-03-19T21:18:33Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914', 'https://github.com/advisories/GHSA-85g2-29m8-qf2p', 'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25914'} | null | {'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5'} | {'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5'} |
GHSA | GHSA-vrmr-f2qh-3hhf | Improper use of cryptographic key in wal-g | WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activit... | {'CVE-2021-38599'} | 2021-09-02T17:17:16Z | 2021-09-02T17:17:16Z | HIGH | 7.5 | {'CWE-922'} | {'https://github.com/wal-g/wal-g/pull/1062', 'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3', 'https://github.com/advisories/GHSA-vrmr-f2qh-3hhf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38599', 'https://github.com/wal-g/wal-g/releases/tag/v1.1'} | null | {'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'} | {'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'} |
GHSA | GHSA-g6j2-ch25-5mmv | Missing Token Replay Detection in Saml2 Authentication services for ASP.NET | ### Impact
Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented.
Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use.
### Patches
The 2.5.... | {'CVE-2020-5261'} | 2021-01-08T20:24:59Z | 2020-03-25T16:52:49Z | HIGH | 8.2 | {'CWE-294'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5261', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv', 'https://github.com/advisories/GHSA-g6j2-ch25-5mmv', 'https://github.com/Sustainsys/Saml2/issues/711'} | null | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} | {'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} |
GHSA | GHSA-8q59-q68h-6hv4 | Improper Input Validation in PyYAML | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw.... | {'CVE-2020-14343'} | 2022-04-22T18:26:17Z | 2021-03-25T21:26:26Z | CRITICAL | 9.8 | {'CWE-20'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14343', 'https://github.com/advisories/GHSA-8q59-q68h-6hv4', 'https://pypi.org/project/PyYAML/', 'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc', 'https://github.com/yaml/pyyaml/issues/... | null | {'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'} | {'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'} |
GHSA | GHSA-8ch4-58qp-g3mp | Observable Timing Discrepancy in aaugustin websockets library | The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack. | {'CVE-2021-33880'} | 2022-04-22T15:47:44Z | 2021-06-11T17:43:14Z | MODERATE | 5.9 | {'CWE-208', 'CWE-203'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0', 'https://github.com/advisories/GHSA-8ch4-58qp-g3mp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33880'} | null | {'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0'} | {'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0'} |
GHSA | GHSA-668q-qrv7-99fm | Deserialization of Untrusted Data in logback | In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. | {'CVE-2021-42550'} | 2022-03-28T19:32:57Z | 2021-12-17T20:00:50Z | MODERATE | 6.6 | {'CWE-502'} | {'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html', 'https://jira.qos.ch/browse/LOGBACK-1591', 'https://github.com/cn-panda/logbackRceDemo', 'https://github.com/qos-... | null | {'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c', 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'} | {'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'} |
GHSA | GHSA-2v82-5746-vwqc | XSS in doc_link | ### Impact
Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer ... | {'CVE-2021-29625'} | 2022-03-21T20:33:37Z | 2022-03-18T17:49:28Z | HIGH | 7.5 | {'CWE-79'} | {'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc', 'https://packagist.org/packages/vrana/adminer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29625', 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7', 'https://github.com/advisories/GHSA-2v82-5746-vwqc', 'https:... | null | {'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'} | {'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'} |
GHSA | GHSA-r8j5-h5cx-65gg | ReDOS in IS-SVG | A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string. | {'CVE-2021-29059'} | 2021-12-10T19:02:37Z | 2021-12-10T19:02:37Z | HIGH | 7.5 | {'CWE-770'} | {'https://github.com/advisories/GHSA-r8j5-h5cx-65gg', 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md', 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js', 'https://nvd.nist.gov/vuln/detail/CVE-2... | null | {'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'} | {'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'} |
GHSA | GHSA-3pc2-fm7p-q2vg | Cross-site Scripting in October | ### Impact
Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack.
### Patches
Issue has been patched in Build 467 (v1.0.467).
### Workarounds
Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installatio... | {'CVE-2020-4061'} | 2022-04-19T19:02:29Z | 2020-07-02T16:55:11Z | LOW | 3.7 | {'CWE-79'} | {'https://research.securitum.com/the-curious-case-of-copy-paste/', 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg', 'https://github.com/advisories/GHSA-3pc2-fm7p-q2vg', 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5', 'https://nvd.nist.gov/vuln/det... | null | {'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'} | {'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'} |
GHSA | GHSA-74r6-grj9-8rq6 | Remote Code Execution in AjaxNetProfessional | All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. | {'CVE-2021-23758'} | 2021-12-16T15:27:55Z | 2021-12-16T15:27:55Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/advisories/GHSA-74r6-grj9-8rq6', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professiona... | null | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} |
GHSA | GHSA-h77x-m5q8-c29h | Moderate severity vulnerability that affects rack | lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header. | {'CVE-2012-6109'} | 2021-09-14T15:39:43Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-835'} | {'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=895277', 'http://rack.github.com/', 'https://github.com/rack/rack/blob/master/README.rdoc'... | null | {'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'} | {'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'} |
GHSA | GHSA-59cj-99cw-rq64 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20... | {'CVE-2019-0913'} | 2021-03-29T21:00:05Z | 2021-03-29T21:00:05Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913', 'https://github.com/advisories/GHSA-59cj-99cw-rq64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913', 'https://github.com/chakra-core/ChakraC... | null | {'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'} |
GHSA | GHSA-vcg8-98q8-g7mj | Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible | A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is... | {'CVE-2020-1740'} | 2021-08-31T21:11:03Z | 2021-04-07T21:47:31Z | LOW | 4.7 | {'CWE-200', 'CWE-377'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://security.gentoo.org/glsa/202006-11', 'https://github.com/ansible/ansible/issues/67798', 'https://github.com/advisorie... | null | {'https://github.com/ansible/ansible/commit/28f9fbdb5e281976e33f443193047068afb97a9b'} | {'https://github.com/ansible/ansible/commit/28f9fbdb5e281976e33f443193047068afb97a9b'} |
GHSA | GHSA-6pcc-3rfx-4gpm | Dom4j contains a XML Injection vulnerability | dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML do... | {'CVE-2018-1000632'} | 2022-04-26T18:43:59Z | 2018-10-16T17:01:25Z | HIGH | 7.5 | {'CWE-91'} | {'https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f64... | null | {'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387'} | {'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f'} |
GHSA | GHSA-h385-52j6-9984 | Withdrawn: HTTP Request Smuggling in Agoo | # Withdrawn reason
Withdrawn on 1/13/2021 due to [this comment from the maintainer](https://github.com/ohler55/agoo/issues/88#issuecomment-723580783). This is no longer considered a vulnerability.
# Original description
agoo through 2.12.3 allows request smuggling attacks where agoo is used as a backend and a fronten... | {'CVE-2020-7670'} | 2021-01-13T19:26:13Z | 2020-10-20T19:15:38Z | MODERATE | 0 | {'CWE-444'} | {'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130', 'https://github.com/ohler55/agoo/issues/88', 'https://github.com/advisories/GHSA-h385-52j6-9984', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7670', 'https://snyk.io/vuln/SNYK-RUBY-AGOO-569137'} | null | {'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130'} | {'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130'} |
GHSA | GHSA-p94w-42g3-f7h4 | Holder can (re)create authentic credentials after receiving a credential in vp-toolkit | ### Impact
The [`verifyVerifiableCredential()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-credential-signer.ts#L57) method check the cryptographic integrity of the Verifiable Credential, but it does not check if the [`credential.issuer`](https://github.com/rabobank-blo... | null | 2020-03-06T01:16:00Z | 2020-03-06T01:16:00Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-p94w-42g3-f7h4', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17', 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-p94w-42g3-f7h4', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/13'} | null | {'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'} | {'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'} |
GHSA | GHSA-m8qc-mf6p-pfq9 | Link Following in rply | python-rply before 0.7.4 insecurely creates temporary files. | {'CVE-2014-1938'} | 2021-08-19T21:52:46Z | 2020-03-11T20:56:34Z | MODERATE | 5.5 | {'CWE-59'} | {'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737627', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1938', 'https://github.com/advisories/GHSA-m8qc-mf6p-pfq9', 'http://www.openwall.com/lists/oss-security/2014/02/11/1', 'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20', 'https://security... | null | {'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20'} | {'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20'} |
GHSA | GHSA-f7xw-46vh-5jw2 | livehelperchat is vulnerable to Cross-site Scripting | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4132'} | 2022-01-05T20:33:47Z | 2022-01-05T20:33:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2', 'https://github.com/advisories/GHSA-f7xw-46vh-5jw2', 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'} | {'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'} |
GHSA | GHSA-gx6h-936c-vrrr | Cross site scripting in registration template in xwiki-platform | ### Impact
We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field.
This template is only used in the following conditions:
- the wiki must be open to registration for anyone
- the wiki must be closed to view for Guest users (more specifically the XWiki.Registrat... | {'CVE-2022-23622'} | 2022-02-11T15:00:09Z | 2022-02-09T23:25:44Z | HIGH | 7.4 | {'CWE-79'} | {'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622', 'https://github.com/advisories/GHSA-gx6h-936c-vrrr', 'https://jira.xwiki.org/browse/XWIKI-1929... | null | {'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'} | {'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'} |
GHSA | GHSA-8c5p-4362-9333 | Path traversal in grav | grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') | {'CVE-2021-3924'} | 2021-11-10T16:48:15Z | 2021-11-10T16:48:15Z | HIGH | 8.8 | {'CWE-22'} | {'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/advisories/GHSA-8c5p-4362-9333', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3924', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'} | null | {'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'} | {'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'} |
GHSA | GHSA-4wv4-mgfq-598v | Code injection in nobelprizeparser | Code injection through use of eval. | null | 2021-03-12T23:00:19Z | 2021-03-12T23:00:19Z | CRITICAL | 0 | {'CWE-94'} | {'https://www.npmjs.com/package/nobelprizeparser', 'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'} | null | {'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'} | {'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'} |
GHSA | GHSA-r82c-j4mq-5xfw | Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs | ### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.5.0 can generate an invalid short URL when a vanity domain exists.
### Patches
Upgrading `bitlyshortener` to 0.5.0 or newer will prevent the generation of any such invalid short URLs.
### References
* [Release notes](https:/... | null | 2021-09-21T16:40:42Z | 2020-10-27T19:19:56Z | HIGH | 0 | {'CWE-601'} | {'https://pypi.org/project/bitlyshortener/', 'https://github.com/advisories/GHSA-r82c-j4mq-5xfw', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.5.0', 'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d', 'https://github.com/impredicative/bitlyshortener/secu... | null | {'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d'} | {'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d'} |
GHSA | GHSA-2w7w-2j92-44hx | HTTP Request Smuggling in akka-http-core | A vulnerable Akka HTTP server will accept a malformed message and hand it over to the user. If the user application proxies this message to another server unchanged and that server also accepts that message but interprets it as two HTTP messages, the second message has reached the second server without having been insp... | {'CVE-2021-23339'} | 2021-05-10T15:17:09Z | 2021-05-10T15:17:09Z | MODERATE | 6.5 | {'CWE-444'} | {'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34', 'https://github.com/advisories/GHSA-2w7w-2j92-44hx', 'https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201', 'https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.h... | null | {'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34'} | {'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34'} |
GHSA | GHSA-m4vv-p6fq-jhqp | Directory Traversal in @vivaxy/here | The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root.
It is vulnerable to a directory traversal attack.
This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confiden... | null | 2021-09-23T21:48:56Z | 2020-09-01T19:04:07Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/557', 'https://github.com/advisories/GHSA-m4vv-p6fq-jhqp', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://hackerone.com/reports/296254'} | null | {'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'} | {'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'} |
GHSA | GHSA-5rcv-m4m3-hfh7 | Infinite Loop in Go | Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite lo... | {'CVE-2020-14040'} | 2021-05-18T18:34:35Z | 2021-05-18T18:34:35Z | HIGH | 6.7 | {'CWE-835', 'CWE-400'} | {'https://go-review.googlesource.com/c/text/+/238238', 'https://github.com/advisories/GHSA-5rcv-m4m3-hfh7', 'https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0', 'https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14040', 'https://lists.fedoraproject.... | null | {'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'} | {'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'} |
GHSA | GHSA-p5f8-gfw5-33w4 | Heap buffer overflow in Tensorflow | ### Impact
The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, this code is prone to heap buffer overflow:
https://git... | {'CVE-2020-15201'} | 2021-11-19T15:19:01Z | 2020-09-25T18:28:34Z | MODERATE | 4.8 | {'CWE-20', 'CWE-787', 'CWE-122'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15201', 'https://github.com/advisories/GHSA-p5f8-gfw5-33w4', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} | {'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'} |
GHSA | GHSA-39q4-p535-c852 | Uncontrolled Resource Consumption in locutus | The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function. | {'CVE-2021-23392'} | 2021-06-16T20:02:15Z | 2021-06-10T17:25:05Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392', 'https://github.com/advisories/GHSA-39q4-p535-c852', 'https://github.com/locutusjs/locutus/pull/446', 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597'} | null | {'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'} | {'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'} |
GHSA | GHSA-6gw4-x63h-5499 | Ability to switch customer email address on account detail page and stay verified | ### Impact
The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (gues... | {'CVE-2020-15245'} | 2022-04-19T19:02:37Z | 2020-10-19T20:40:59Z | MODERATE | 4.3 | {'CWE-862', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15245', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf', 'https://github.com/advisories/GHSA-6gw4-x63h-5499'} | null | {'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'} | {'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'} |
GHSA | GHSA-856q-xv3c-7f2f | Unauthenticated control plane denial of service attack in Istio | ### Impact
The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker.
For simple... | {'CVE-2022-23635'} | 2022-04-20T21:05:17Z | 2022-02-23T14:59:08Z | HIGH | 7.5 | {'CWE-287'} | {'https://istio.io/latest/news/security/istio-security-2022-003', 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f', 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23635', 'https://github.com/advisories/GHSA-856q-xv3c-7... | null | {'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'} | {'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'} |
GHSA | GHSA-26j7-6w8w-7922 | Division by zero in optimized pooling implementations in TFLite | ### Impact
Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling [`ComputePaddingHeightWidth`](https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90).
Since users can craft special models whic... | {'CVE-2021-29586'} | 2021-05-21T14:26:43Z | 2021-05-21T14:26:43Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-26j7-6w8w-7922', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29586', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922', 'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'} | null | {'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'} | {'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'} |
GHSA | GHSA-crfx-5phg-hmw9 | Cross-Site Scripting in ids-enterprise | Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later | null | 2021-08-04T21:15:58Z | 2019-06-13T18:59:12Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/955', 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1', 'https://github.com/infor-design/enterprise-ng/issues/502', 'https://github.com/advisories/GHSA-crfx-5phg-hmw9'} | null | {'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1'} | {'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1'} |
GHSA | GHSA-278g-rq84-9hmg | `CHECK`-fail in `MapStage` | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`:
```python
import tensorflow as tf
tf.raw_ops.MapStage(
key=tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64),
indices=tf.constant((0), dtype=tf.int32),
values=[tf.constant((0), dtype=tf.int32)],
dtypes=[tf.... | {'CVE-2021-37673'} | 2021-08-25T14:41:36Z | 2021-08-25T14:41:36Z | MODERATE | 5.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37673', 'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d', 'https://github.com/advisories/GHSA-278g-rq84-9hmg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'} | null | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'} | {'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'} |
GHSA | GHSA-q674-xm3x-2926 | Uncontrolled Resource Consumption in parse-link-header | The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function. | {'CVE-2021-23490'} | 2022-01-07T16:08:29Z | 2022-01-06T21:37:02Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-q674-xm3x-2926', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490', 'https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783', 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973'} | null | {'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1'} | {'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1'} |
GHSA | GHSA-fmm9-3gv8-58f4 | Improper Handling of Missing Values in kaml | ### Impact
Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service.
This only affects applications that use polymorphic serialization with the default tagged... | {'CVE-2021-39194'} | 2021-09-08T14:47:33Z | 2021-09-07T23:08:40Z | MODERATE | 4.3 | {'CWE-835', 'CWE-230'} | {'https://github.com/advisories/GHSA-fmm9-3gv8-58f4', 'https://github.com/charleskorn/kaml/issues/179', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194', 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'} | null | {'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'} | {'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'} |
GHSA | GHSA-5x3v-2gxr-59m2 | Directory traversal in Apache RocketMQ | In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users ... | {'CVE-2019-17572'} | 2021-04-07T19:55:55Z | 2020-07-01T17:26:15Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/apache/rocketmq/issues/1637', 'https://github.com/advisories/GHSA-5x3v-2gxr-59m2', 'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/apache/rocke... | null | {'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'} | {'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'} |
GHSA | GHSA-9g8h-pjm4-q92p | Out-of-bounds Write in OpenCV. | In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file. | {'CVE-2018-5268'} | 2021-11-18T15:31:48Z | 2021-10-12T22:23:41Z | MODERATE | 5.5 | {'CWE-787'} | {'http://www.securityfocus.com/bid/106945', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/10541', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268', 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa', 'https://gi... | null | {'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'} | {'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'} |
GHSA | GHSA-4fjv-pmhg-3rfg | Multiple cryptographic issues in Python oic | ### Impact
* Client implementations using this library
### Issues
1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg.
2) JWA `none` algorithm was allowed in all flows.
3) `oic.consumer.Consumer.parse_authz` returns an unverified IdToken. The ve... | {'CVE-2020-26244'} | 2022-04-19T19:02:41Z | 2020-12-04T16:47:12Z | MODERATE | 6.8 | {'CWE-325', 'CWE-347'} | {'https://github.com/OpenIDC/pyoidc/security/advisories/GHSA-4fjv-pmhg-3rfg', 'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498', 'https://github.com/OpenIDC/pyoidc/releases/tag/1.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26244', 'https://github.com/advisories/GHSA-4fjv-pmhg-3rfg... | null | {'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498'} | {'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498'} |
GHSA | GHSA-xhr8-mpwq-2rr2 | Automatic named constructor discovery in Valinor | ## Design issue - automatic constructor discovery
The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked.
Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228... | null | 2022-04-05T21:39:22Z | 2022-04-01T13:39:45Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0'} | null | {'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'} | {'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'} |
GHSA | GHSA-f6g6-54hm-fhxv | Data races in libsbc | Affected versions of this crate implements `Send` for `Decoder<R>` for any `R: Read`. This allows `Decoder<R>` to contain `R: !Send` and carry (move) it to another thread.
This can result in undefined behavior such as memory corruption from data race on `R`, or dropping `R = MutexGuard<_>` from a thread that didn't lo... | {'CVE-2020-36440'} | 2021-08-25T20:59:02Z | 2021-08-25T20:59:02Z | HIGH | 8.1 | {'CWE-119', 'CWE-362'} | {'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36440', 'https://rustsec.org/advisories/RUSTSEC-2020-0120.html', 'https://github.com/advisories/GHSA-f6g6-54hm-fhxv'} | null | {'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'} | {'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'} |
GHSA | GHSA-x8rq-rc7x-5fg5 | uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) | uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses. | {'CVE-2022-0086'} | 2022-04-19T19:03:24Z | 2022-01-06T22:24:35Z | HIGH | 8.2 | {'CWE-918'} | {'https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122', 'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f', 'https://github.com/transloadit/uppy/releases/tag/uppy%402.3.3', 'https://github.com/transloadit/uppy/pull/3403', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0086', '... | null | {'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f'} | {'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f'} |
GHSA | GHSA-89px-ww3j-g2mm | 2FA bypass in Wagtail through new device path | ## 2FA bypass through new device path
### Impact
If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS.
### Patches
This problem has been patched in version 1.3.0.
### Work... | {'CVE-2019-16766'} | 2021-01-08T21:28:09Z | 2019-11-29T17:05:59Z | HIGH | 8.7 | {'CWE-304', 'CWE-290'} | {'https://github.com/advisories/GHSA-89px-ww3j-g2mm', 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766', 'https://github.com/labd/wagtail-2fa/commit/13b12... | null | {'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'} | {'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'} |
GHSA | GHSA-hj69-c76v-86wr | Out-of-bounds Read in Pillow | libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow. | {'CVE-2020-5313'} | 2021-08-23T15:05:21Z | 2020-04-01T16:36:00Z | HIGH | 7.1 | {'CWE-125'} | {'https://github.com/advisories/GHSA-hj69-c76v-86wr', 'https://www.debian.org/security/2020/dsa-4631', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5313', 'https://github.com/python-pillow/P... | null | {'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b'} | {'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b'} |
GHSA | GHSA-5jfw-35xp-5m42 | Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown | ### Impact
`LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negati... | null | 2022-04-06T18:43:19Z | 2022-04-05T17:53:22Z | HIGH | 7.5 | {'CWE-124'} | {'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'} | null | {'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'} | {'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'} |
GHSA | GHSA-vcjj-xf2r-mwvc | XSS in knockout | There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it. | {'CVE-2019-14862'} | 2022-04-25T23:07:31Z | 2020-04-01T15:47:45Z | MODERATE | 6.1 | {'CWE-79'} | {'https://snyk.io/vuln/npm:knockout:20180213', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015', 'https://github.com/knockout/knockout/issues/1244', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-vcjj-xf2r-mwvc', 'https://github.com/knockout/knocko... | null | {'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb'} | {'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb'} |
GHSA | GHSA-653m-r33x-39ff | Moderate severity vulnerability that affects geminabox | Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb. | {'CVE-2017-16792'} | 2021-09-01T22:38:12Z | 2017-11-29T23:20:14Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://rubygems.org/gems/geminabox/versions/0.13.10'} | null | {'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'} | {'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'} |
GHSA | GHSA-57qf-82hh-2hmc | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting. | {'CVE-2022-0502'} | 2022-02-14T22:30:21Z | 2022-02-07T00:00:30Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706', 'https://github.com/advisories/GHSA-57qf-82hh-2hmc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'} | {'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'} |
GHSA | GHSA-8c9x-wfgj-v78w | Open Redirect in showdoc | showdoc is vulnerable to URL Redirection to Untrusted Site | {'CVE-2021-4000'} | 2021-12-16T15:31:58Z | 2021-12-16T15:31:58Z | MODERATE | 6.5 | {'CWE-601'} | {'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000', 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://github.com/advisories/GHSA-8c9x-wfgj-v78w'} | null | {'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'} | {'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'} |
GHSA | GHSA-4ppp-gpcr-7qf6 | HTTP Request Smuggling: Content-Length Sent Twice in Waitress | ### Impact
Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally.
So a request with:
```
Content-Length: 10
Content-Length: 10
```
would get transformed to:
```
Content-Length: 10, 10
``... | null | 2022-03-24T17:52:21Z | 2019-12-20T23:04:35Z | CRITICAL | 0 | {'CWE-444'} | {'https://github.com/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'} | null | {'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'} | {'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'} |
GHSA | GHSA-px4h-xg32-q955 | ReDoS in normalize-url | The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. | {'CVE-2021-33502'} | 2021-10-27T17:04:16Z | 2021-06-08T23:11:43Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502', 'https://github.com/advisories/GHSA-px4h-xg32-q955', 'https://security.netapp.com/advisory/ntap-20210706-0001/', 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a... | null | {'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'} | {'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'} |
GHSA | GHSA-h4pc-gx2w-f2xv | Heap OOB read in TFLite | ### Impact
A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of [`Split_V`](https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99):
```cc
const int input_size = SizeOfDimension(input, axis_value);
``` ... | {'CVE-2021-29606'} | 2021-05-21T14:28:24Z | 2021-05-21T14:28:24Z | HIGH | 7.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29606', 'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412', 'https://github.com/advisories/GHSA-h4pc-gx2w-f2xv'} | null | {'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412'} | {'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412'} |
GHSA | GHSA-vpx7-vm66-qx8r | Path Traversal in github.com/unknwon/cae/zip | The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide. | {'CVE-2020-7664'} | 2022-01-04T19:33:01Z | 2021-05-18T20:31:06Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11', 'https://github.com/advisories/GHSA-vpx7-vm66-qx8r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7664'} | null | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} | {'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'} |
GHSA | GHSA-h9vc-2p9g-63gp | Exposure of Sensitive Information to an Unauthorized Actor in pimcore | Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1. | {'CVE-2022-0565'} | 2022-02-24T13:10:52Z | 2022-02-15T00:02:47Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-h9vc-2p9g-63gp', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565', 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'} | null | {'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'} | {'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'} |
GHSA | GHSA-4cfr-gjfx-fj3x | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data. | {'CVE-2021-40324'} | 2021-10-13T17:27:07Z | 2021-10-05T17:53:11Z | HIGH | 0 | {'CWE-434'} | {'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40324', 'https://github.com/advisories/GHSA-4cfr-gjfx-fj3x'} | null | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'} | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'} |
GHSA | GHSA-qxmr-qxh6-2cc9 | ReDos vulnerability on guest checkout email validation | ### Impact
Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`.
Before the patch, it can be reproduced in the console like this:
```ruby
irb(main)> Spree::E... | {'CVE-2021-43805'} | 2022-04-19T19:03:16Z | 2021-12-07T22:01:47Z | HIGH | 7.5 | {'CWE-1333'} | {'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/advisories/GHSA-qxmr-qxh6-2cc9', 'https://github.com/solidusio/solidus/s... | null | {'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'} | {'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'} |
GHSA | GHSA-hcw3-j74m-qc58 | Incorrect Calculation in github.com/open-policy-agent/opa | ### Impact
Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below.
**All of these** three conditions have to be met to create a... | {'CVE-2022-23628'} | 2022-04-19T19:03:21Z | 2022-02-09T22:17:37Z | MODERATE | 6.3 | {'CWE-682'} | {'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/pull/3851', 'https://github.com/advisories/GHSA-hcw3-j74m-qc58', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e... | null | {'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239'} | {'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239'} |
GHSA | GHSA-7vxc-chqj-h83g | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4168'} | 2022-01-07T16:11:22Z | 2022-01-06T22:02:18Z | MODERATE | 6.3 | {'CWE-352'} | {'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168', 'https://github.com/advisories/GHSA-7vxc-chqj-h83g', 'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c'} | null | {'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'} | {'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'} |
GHSA | GHSA-qjmq-8hjr-qcv6 | SQL Injection when creating an application with Reactive SQL backend | ### Impact
SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected.
If you have generated a microservice... | {'CVE-2022-24815'} | 2022-04-18T22:20:12Z | 2022-04-07T15:18:05Z | HIGH | 8.1 | {'CWE-89'} | {'https://github.com/jhipster/generator-jhipster/issues/18269', 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815', 'https://github.c... | null | {'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98'} | {'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98'} |
GHSA | GHSA-7xwj-5r4v-429p | NPE in TFLite | ### Impact
The implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313):
```cc
TfLiteTensor* state = GetVariableInput(context, node, kStateTensor);
// ...
GetTensorDat... | {'CVE-2021-37681'} | 2021-08-25T14:40:35Z | 2021-08-25T14:40:35Z | HIGH | 7.8 | {'CWE-476'} | {'https://github.com/advisories/GHSA-7xwj-5r4v-429p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37681', 'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p'} | null | {'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76'} | {'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76'} |
GHSA | GHSA-xhfx-hgmf-v6vp | Potential Host Header Poisoning on misconfigured servers | ### Impact
When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Pois... | {'CVE-2021-21265'} | 2021-03-11T02:18:01Z | 2021-03-10T21:07:25Z | LOW | 0 | {'CWE-644'} | {'https://packagist.org/packages/october/backend', 'https://github.com/advisories/GHSA-xhfx-hgmf-v6vp', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6... | null | {'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'} | {'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'} |
GHSA | GHSA-8gwj-8hxc-285w | Prototype Pollution in json-ptr | This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays. | {'CVE-2021-23509'} | 2021-11-08T17:43:27Z | 2021-11-08T17:43:27Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509', 'https://github.com/flitbit/json-ptr/pull/42', 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291', 'https://gi... | null | {'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca'} | {'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca'} |
GHSA | GHSA-hpqh-2wqx-7qp5 | Memory access due to code generation flaw in Cranelift module | There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0... | {'CVE-2021-32629'} | 2022-04-26T18:11:38Z | 2021-08-25T21:01:55Z | HIGH | 7.2 | {'CWE-125'} | {'https://github.com/RustSec/advisory-db/blob/main/crates/cranelift-codegen/RUSTSEC-2021-0067.md', 'https://www.fastly.com/security-advisories/memory-access-due-to-code-generation-flaw-in-cranelift-module', 'https://github.com/advisories/GHSA-hpqh-2wqx-7qp5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32629', 'https://... | null | {'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'} | {'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'} |
GHSA | GHSA-7f53-fmmv-mfjv | Regular expression denial of service in react-native | A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1. | {'CVE-2020-1920'} | 2021-07-20T17:35:28Z | 2021-07-20T17:33:28Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-7f53-fmmv-mfjv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920', 'https://www.npmjs.com/package/react-native', 'https://github.com/facebook/react-native/releases/tag/v0.64.1', 'https://github.com/facebook/react-native/releases/tag/v0.62.3', 'https://github.com/facebook/react-nativ... | null | {'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7'} | {'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7'} |
GHSA | GHSA-2r2c-g63r-vccr | Improper Verification of Cryptographic Signature in `node-forge` | ### Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### For more infor... | {'CVE-2022-24773'} | 2022-03-22T19:33:03Z | 2022-03-18T23:10:48Z | MODERATE | 5.3 | {'CWE-347'} | {'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https... | null | {'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'} | {'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'} |
GHSA | GHSA-9chx-2vqw-8vq5 | Path Traversal in the Logs plugin for Craft CMS | The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php. | {'CVE-2022-23409'} | 2022-02-10T22:32:15Z | 2022-02-01T00:01:00Z | MODERATE | 4.9 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://sec-consult.com/vulnerability-lab/', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html', 'https://github.com/advisories/GHSA-9chx-... | null | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} | {'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'} |
GHSA | GHSA-4446-656p-f54g | Deserialization of Untrusted Data in Bouncy castle | Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT p... | {'CVE-2018-1000613'} | 2022-04-27T17:25:45Z | 2018-10-17T16:23:12Z | CRITICAL | 9.8 | {'CWE-470', 'CWE-502'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9... | null | {'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'} | {'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'} |
GHSA | GHSA-wg6g-ppvx-927h | Prototype Pollution in cached-path-relative | The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the... | {'CVE-2021-23518'} | 2022-01-27T14:27:53Z | 2022-01-27T14:27:53Z | HIGH | 7.3 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23518', 'https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653', 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760', 'https://github.com/advisories/GHSA-wg6g-ppvx-927h'} | null | {'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'} | {'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'} |
GHSA | GHSA-4gr7-qw2q-jxh6 | Cross-site Scripting in Nacos | A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters. | {'CVE-2021-44667'} | 2022-03-22T21:37:09Z | 2022-03-12T00:00:27Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-4gr7-qw2q-jxh6', 'https://github.com/alibaba/nacos/issues/7359', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'} | null | {'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'} | {'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'} |
GHSA | GHSA-wrp6-9w7f-3wxg | calibre-web is vulnerable to Cross-site Scripting | calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4170'} | 2022-01-21T23:55:34Z | 2022-01-21T23:55:34Z | HIGH | 7.3 | {'CWE-79'} | {'https://github.com/advisories/GHSA-wrp6-9w7f-3wxg', 'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4170', 'https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0'} | null | {'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5'} | {'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5'} |
GHSA | GHSA-cw7p-q79f-m2v7 | incomplete JupyterHub logout with simultaneous JupyterLab sessions | ### Impact
Users of JupyterLab with JupyterHub who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the l... | {'CVE-2021-41247'} | 2022-04-19T19:03:13Z | 2021-11-08T18:02:37Z | LOW | 3.5 | {'CWE-613'} | {'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27', 'https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41247', 'https://github.com/advisories/GHSA-cw7p-q79f-m2v7'} | null | {'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'} | {'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'} |
GHSA | GHSA-hvf8-h2qh-37m9 | IPC messages delivered to the wrong frame in Electron | ### Impact
IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame.
If your app does ANY of the following, then it is impacted by this issue:
- Uses `remote`
- Ca... | {'CVE-2020-26272'} | 2022-04-19T19:02:42Z | 2021-01-28T19:11:34Z | MODERATE | 5.4 | {'CWE-668'} | {'https://github.com/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/pull/26875', 'https://www.electronjs.org/releases/stable?version=9#9.4.0', 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda95066... | null | {'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'} | {'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'} |
GHSA | GHSA-42fp-4hm3-j8r7 | Moderate severity vulnerability that affects moin | Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | {'CVE-2017-5934'} | 2021-08-31T21:37:19Z | 2019-01-04T17:46:08Z | MODERATE | 6.1 | {'CWE-79'} | {'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934', 'https://www.debian.org/security/2018/dsa-4318', 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7', 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024', '... | null | {'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'} | {'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'} |
GHSA | GHSA-x27v-x225-gq8g | Server-Side Request Forgery in Recurly | The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources. | {'CVE-2017-0905'} | 2021-12-01T21:50:52Z | 2017-12-06T16:43:00Z | CRITICAL | 9.8 | {'CWE-918'} | {'https://dev.recurly.com/page/ruby-updates', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://hackerone.com/reports/288635', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://github.com/advisories/GHSA-x27v-x225-gq8g'} | null | {'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'} | {'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'} |
GHSA | GHSA-hh27-ffr2-f2jc | Open redirect in url-parse | # Overview
Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.
# Impact
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. | {'CVE-2021-3664'} | 2021-08-10T16:07:08Z | 2021-08-10T16:07:08Z | MODERATE | 6.1 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3664', 'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0', 'https://github.com/unshiftio/url-parse/issues/205', 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse', 'https://github.com/advisories/GHSA-hh27-ffr2-f2jc', 'https://... | null | {'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0'} | {'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0'} |
GHSA | GHSA-7chv-rrw6-w6fc | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
... | {'CVE-2021-29505'} | 2022-04-22T15:48:50Z | 2021-05-18T18:36:27Z | HIGH | 7.5 | {'CWE-94', 'CWE-74', 'CWE-502'} | {'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2... | null | {'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'} | {'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'} |
GHSA | GHSA-r24h-634p-m72x | Validation Bypass in schema-inspector | In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector. | {'CVE-2019-10781'} | 2021-08-30T13:35:23Z | 2020-06-10T20:02:47Z | CRITICAL | 9.8 | {'CWE-668'} | {'https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970', 'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10781', 'https://github.com/advisories/GHSA-r24h-634p-m72x'} | null | {'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d'} | {'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d'} |
GHSA | GHSA-cmx4-p4v5-hmr5 | Server-side request forgery (SSRF) in Apache Batik | Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | {'CVE-2019-17566'} | 2022-02-09T00:46:46Z | 2022-02-09T00:46:46Z | HIGH | 7.5 | {'CWE-20', 'CWE-918'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https:/... | null | {'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'} | {'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'} |
GHSA | GHSA-2wmv-37vq-52g5 | FPE in `tf.raw_ops.UnravelIndex` | ### Impact
An attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0:
```python
import tensorflow as tf
tf.raw_ops.UnravelIndex(indices=-1, dims=[1,0,2])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a8327... | {'CVE-2021-37668'} | 2021-08-25T14:42:06Z | 2021-08-25T14:42:06Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5', 'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37668', 'https://github.com/advisories/GHSA-2wmv-37vq-52g5'} | null | {'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'} | {'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'} |
GHSA | GHSA-8hfj-j24r-96c4 | Path Traversal: 'dir/../../filename' in moment.locale | ### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarou... | {'CVE-2022-24785'} | 2022-04-26T20:56:20Z | 2022-04-04T21:25:48Z | HIGH | 7.5 | {'CWE-27', 'CWE-22'} | {'https://github.com/advisories/GHSA-8hfj-j24r-96c4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'} | null | {'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'} | {'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'} |
GHSA | GHSA-49pj-69vf-c689 | Incorrect Default Permissions in netaddr | The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem. | {'CVE-2019-17383'} | 2021-08-18T21:45:01Z | 2019-10-14T21:43:19Z | CRITICAL | 9.8 | {'CWE-276'} | {'https://rubygems.org/gems/netaddr/versions', 'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://github.com/advisories/GHSA-49pj-69vf-c689', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17383'} | null | {'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'} | {'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'} |
GHSA | GHSA-2jx8-v4hv-gx3h | XXE vulnerability in Launch import | | Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk |
|--------------|-------------------|-------------------|---------------|---------------|
| Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium |
###... | {'CVE-2020-12642'} | 2021-10-05T17:29:41Z | 2021-06-28T16:45:47Z | HIGH | 7.5 | {'CWE-611'} | {'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/advisories/GHSA-2jx8-v4hv-gx3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f... | null | {'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'} | {'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'} |
GHSA | GHSA-gh4g-3gm9-5wrq | Cross-Site Scripting in shave | Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to ver... | {'CVE-2019-12313'} | 2021-08-04T16:06:35Z | 2019-05-29T18:38:08Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.npmjs.com/advisories/822', 'https://github.com/advisories/GHSA-gh4g-3gm9-5wrq', 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313', 'https://github.com/dollarshaveclub/shave/... | null | {'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'} | {'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'} |
GHSA | GHSA-rr8m-29g8-8cgc | SQL Injection in Fork CMS | Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1. | {'CVE-2022-1064'} | 2022-04-05T20:55:35Z | 2022-03-26T00:00:32Z | HIGH | 8.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/advisories/GHSA-rr8m-29g8-8cgc', 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'} | null | {'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'} | {'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'} |
GHSA | GHSA-2xhg-w2g5-w95x | CSV Injection in symfony/serializer | Description
-----------
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker.
In Symfony 4.1, we've added the opt-in... | {'CVE-2021-41270'} | 2022-04-19T19:03:15Z | 2021-11-24T21:01:23Z | MODERATE | 6.5 | {'CWE-1236'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x',... | null | {'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'} | {'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'} |
GHSA | GHSA-273r-rm8g-7f3x | Uncaught Exception in mercurius | ### Impact
Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler.
### Patches
The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2.
### Work... | {'CVE-2021-43801'} | 2021-12-14T15:26:38Z | 2021-12-13T21:33:04Z | HIGH | 7.5 | {'CWE-754'} | {'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801', 'https://github.com/mercuri... | null | {'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'} | {'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.