ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-5xvc-vgmp-jgc3
Improper Access Control in jupyterhub-firstuseauthenticator
### Impact When JupyterHub is used with FirstUseAuthenticator, the vulnerability allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed. ### Patches Upgrade to jupyterhub-firstuseauthenticator to 1.0, or apply patch https://github.com/jupyterhub/firstuseauthentic...
{'CVE-2021-41194'}
2022-03-22T18:08:53Z
2021-10-28T23:13:57Z
CRITICAL
9.1
{'CWE-284'}
{'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38', 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GH...
null
{'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'}
{'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28', 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'}
GHSA
GHSA-q54r-r9pr-w7qv
XSS in Hexo
Hexo versions 0.0.1 to 5.4.0 are vulnerable against stored XSS. The post “body” and “tags” don’t sanitize malicious javascript during web page generation. Local unprivileged attacker can inject arbitrary code.
{'CVE-2021-25987'}
2021-12-01T18:27:44Z
2021-12-01T18:27:44Z
MODERATE
4.6
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25987', 'https://github.com/advisories/GHSA-q54r-r9pr-w7qv', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25987', 'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}
null
{'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}
{'https://github.com/hexojs/hexo/commit/5170df2d3fa9c69e855c4b7c2b084ebfd92d5200'}
GHSA
GHSA-qwpp-fgrj-h78q
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
{'CVE-2021-32712'}
2021-09-08T17:59:46Z
2021-09-08T17:59:46Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-qwpp-fgrj-h78q', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p', 'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d', 'https://nv...
null
{'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}
{'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}
GHSA
GHSA-g4m9-5hpf-hx72
Firewall configured with unanimous strategy was not actually unanimous in Symfony
Description ----------- On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access. As of Symfony 4.4.0, a bug was introduced that prevents the ...
{'CVE-2020-5275'}
2022-04-19T19:02:24Z
2020-03-30T20:09:44Z
HIGH
7.6
{'CWE-285'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf', 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72', 'https://github.com/adv...
null
{'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'}
{'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'}
GHSA
GHSA-rqwh-c535-j9hw
Downloads Resources over HTTP in js-given
Affected versions of `js-given` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `js-given...
{'CVE-2016-10638'}
2021-01-08T01:57:56Z
2019-02-18T23:47:09Z
HIGH
0
{'CWE-311'}
{'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10638', 'https://github.com/advisories/GHSA-rqwh-c535-j9hw', 'https://www.npmjs.com/advisories/241', 'https://nodesecurity.io/advisories/241'}
null
{'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)'}
{'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)'}
GHSA
GHSA-3p4q-x8f3-p7vq
Moderate severity vulnerability that affects notebook
Jupyter Notebook before 5.7.2 allows XSS via a crafted directory name because notebook/static/tree/js/notebooklist.js handles certain URLs unsafely.
{'CVE-2018-19352'}
2021-08-31T21:18:00Z
2018-11-21T22:19:22Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-19352', 'https://pypi.org/project/notebook/#history', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648', 'https://github.com/advisories/GHSA-3p4q-x8f3-p7vq'}
null
{'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'}
{'https://github.com/jupyter/notebook/commit/288b73e1edbf527740e273fcc69b889460871648'}
GHSA
GHSA-vh6r-g38f-q3w8
Validation bypass in jpv
jpv (aka Json Pattern Validator) before 2.2.2 does not properly validate input, as demonstrated by a corrupted array.
{'CVE-2020-17479'}
2021-05-06T17:27:58Z
2021-05-06T17:27:58Z
CRITICAL
9.8
{'CWE-20'}
{'https://blog.sonatype.com/cve-2020-17479', 'https://www.npmjs.com/package/jpv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17479', 'https://github.com/advisories/GHSA-vh6r-g38f-q3w8', 'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6', 'https://github.com/manvel-khnkoyan/jpv/issu...
null
{'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6'}
{'https://github.com/manvel-khnkoyan/jpv/commit/e3eec1215caa8d5c560f5e88d0943422831927d6'}
GHSA
GHSA-mwm4-5qwr-g9pf
Keycloak is vulnerable to IDN homograph attack
A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity.
null
2022-05-02T22:35:44Z
2022-04-28T21:00:31Z
LOW
0
{'CWE-284'}
{'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf', 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e', 'https://github.com/advisories/GHSA-mwm4-5qwr-g9pf'}
null
{'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}
{'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}
GHSA
GHSA-pw4v-gr34-2553
Denial of service (via resource exhaustion) due to improper input validation
### Impact Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion. ### Patches Fixed by 3175fd3. ### For more information If you have any questions or comments about this advisory, email ...
{'CVE-2021-29433'}
2021-06-09T22:13:24Z
2021-04-16T19:53:37Z
MODERATE
4.3
{'CWE-20', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29433', 'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da', 'https://pypi.org/project/matrix-sydent/', 'https://github.com/advisories/GHSA-pw4v-gr34-2553', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553'}
null
{'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'}
{'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'}
GHSA
GHSA-59qh-g7m4-j9m9
Cross-site Scripting in livehelperchat
Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript.
{'CVE-2022-0374'}
2022-02-02T16:05:02Z
2022-01-28T23:06:12Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/advisories/GHSA-59qh-g7m4-j9m9', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374', 'https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
GHSA
GHSA-m5vr-3m74-jwxp
Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2) > * CWE-325, CWE-20, CWE-200, CWE-502 ### Problem It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message...
{'CVE-2020-15098'}
2022-04-19T19:02:36Z
2020-07-29T16:15:19Z
HIGH
8.8
{'CWE-325', 'CWE-200', 'CWE-20', 'CWE-327', 'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-5091', 'https://github.com/advisories/GHSA-m5vr-3m74-jwxp', 'https://typo3.org/security/advisory/typo3-core-sa-2020-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098', 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1', 'https://typo3.or...
null
{'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'}
{'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'}
GHSA
GHSA-j3mj-fhpq-qqjj
Reachable Assertion in Tensorflow
### Impact When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. ##...
{'CVE-2022-23571'}
2022-02-11T20:48:17Z
2022-02-09T23:28:57Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-j3mj-fhpq-qqjj', 'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23571', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj'}
null
{'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'}
{'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'}
GHSA
GHSA-p3w6-jcg4-52xh
High severity vulnerability that affects django-rest-registration
## Misusing the Django Signer API leads to predictable signatures used in verification emails ### Impact The vulnerability is a high severity one. Anyone using Django REST Registration library versions `0.2.*` - `0.4.*` with e-mail verification option (which is recommended, but needs [additional configuration](https:/...
{'CVE-2019-13177'}
2022-03-21T21:29:00Z
2019-07-02T15:43:41Z
CRITICAL
9.8
{'CWE-347'}
{'https://github.com/apragacz/django-rest-registration/security/advisories/GHSA-p3w6-jcg4-52xh', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13177', 'https://github.com/advisories/GHSA-p3w6-jcg4-52xh', 'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5', 'https://github...
null
{'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5'}
{'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5'}
GHSA
GHSA-q44r-f2hm-v76v
Moderate severity vulnerability that affects puppet
lib/puppet/ssl/certificate_authority.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, does not properly restrict the characters in the Common Name field of a Certificate Signing Request (CSR), which makes it easier for user-assisted remote attackers to trick administrators into si...
{'CVE-2012-3867'}
2021-09-16T19:28:09Z
2017-10-24T18:33:37Z
MODERATE
0
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=839158', 'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/advisories/GHSA-q44r-f2hm-v76v', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3867', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://puppetlabs.com/security/cve/cve-2012-3867/', 'http://lists.opensus...
null
{'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}
{'https://github.com/puppetlabs/puppet/commit/f3419620b42080dad3b0be14470b20a972f13c50', 'https://github.com/puppetlabs/puppet/commit/dfedaa5fa841ccf335245a748b347b7c7c236640'}
GHSA
GHSA-pp57-mqmh-44h7
Command Injection in macaddress
All versions of `macaddress` are vulnerable to command injection. For this vulnerability to be exploited an attacker needs to control the `iface` argument to the `one` method. ## Recommendation Update to version 0.2.9 or later.
{'CVE-2018-13797'}
2021-09-16T18:18:03Z
2018-09-06T23:24:21Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-13797', 'https://www.npmjs.com/advisories/654', 'https://github.com/advisories/GHSA-pp57-mqmh-44h7', 'https://github.com/scravy/node-macaddress/pull/20', 'https://news.ycombinator.com/item?id=17283394', 'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9...
null
{'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332'}
{'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332'}
GHSA
GHSA-92vm-wfm5-mxvv
Timing Attack in cookie-signature
Affected versions of `cookie-signature` are vulnerable to timing attacks as a result of using a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess ...
{'CVE-2016-1000236'}
2021-08-19T16:17:01Z
2020-01-06T18:44:10Z
MODERATE
4.4
{'CWE-362'}
{'https://travis-ci.com/nodejs/security-wg/builds/76423102', 'https://www.npmjs.com/advisories/134', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000236', 'https://security-tracker.debian.org/tracker/CVE-2016-1000236', 'https://www.mail-archive.com/secure-testing-team@lists.alioth.debian.org/msg06583.html', 'https://bug...
null
{'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590', 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e', 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07'}
{'https://github.com/tj/node-cookie-signature/commit/4cc5e21e7f59a4ea0b51cd5e9634772d48fab590', 'https://github.com/tj/node-cookie-signature/commit/39791081692e9e14aa62855369e1c7f80fbfd50e', 'https://github.com/tj/node-cookie-signature/commit/2c4df6b6cee540f30876198cd0b5bebf28528c07'}
GHSA
GHSA-85g2-29m8-qf2p
Prototype Pollution Vulnerability in object-collider
Prototype pollution vulnerability in 'object-collider' versions 1.0.0 through 1.0.3 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25914'}
2021-03-19T21:18:33Z
2021-03-19T21:18:33Z
CRITICAL
9.8
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25914', 'https://github.com/advisories/GHSA-85g2-29m8-qf2p', 'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25914'}
null
{'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5'}
{'https://github.com/FireBlinkLTD/object-collider/commit/321f75a7f8e7b3393e5b7dd6dd9ab26ede5906e5'}
GHSA
GHSA-vrmr-f2qh-3hhf
Improper use of cryptographic key in wal-g
WAL-G before 1.1, when a non-libsodium build (e.g., one of the official binary releases published as GitHub Releases) is used, silently ignores the libsodium encryption key and uploads cleartext backups. This is arguably a Principle of Least Surprise violation because "the user likely wanted to encrypt all file activit...
{'CVE-2021-38599'}
2021-09-02T17:17:16Z
2021-09-02T17:17:16Z
HIGH
7.5
{'CWE-922'}
{'https://github.com/wal-g/wal-g/pull/1062', 'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3', 'https://github.com/advisories/GHSA-vrmr-f2qh-3hhf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38599', 'https://github.com/wal-g/wal-g/releases/tag/v1.1'}
null
{'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'}
{'https://github.com/wal-g/wal-g/commit/cadf598e1c2a345915a21a44518c5a4d5401e2e3'}
GHSA
GHSA-g6j2-ch25-5mmv
Missing Token Replay Detection in Saml2 Authentication services for ASP.NET
### Impact Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use. ### Patches The 2.5....
{'CVE-2020-5261'}
2021-01-08T20:24:59Z
2020-03-25T16:52:49Z
HIGH
8.2
{'CWE-294'}
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5261', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv', 'https://github.com/advisories/GHSA-g6j2-ch25-5mmv', 'https://github.com/Sustainsys/Saml2/issues/711'}
null
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
{'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
GHSA
GHSA-8q59-q68h-6hv4
Improper Input Validation in PyYAML
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw....
{'CVE-2020-14343'}
2022-04-22T18:26:17Z
2021-03-25T21:26:26Z
CRITICAL
9.8
{'CWE-20'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14343', 'https://github.com/advisories/GHSA-8q59-q68h-6hv4', 'https://pypi.org/project/PyYAML/', 'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc', 'https://github.com/yaml/pyyaml/issues/...
null
{'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'}
{'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'}
GHSA
GHSA-8ch4-58qp-g3mp
Observable Timing Discrepancy in aaugustin websockets library
The aaugustin websockets library before 9.1 for Python has an Observable Timing Discrepancy on servers when HTTP Basic Authentication is enabled with basic_auth_protocol_factory(credentials=...). An attacker may be able to guess a password via a timing attack.
{'CVE-2021-33880'}
2022-04-22T15:47:44Z
2021-06-11T17:43:14Z
MODERATE
5.9
{'CWE-208', 'CWE-203'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0', 'https://github.com/advisories/GHSA-8ch4-58qp-g3mp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33880'}
null
{'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0'}
{'https://github.com/aaugustin/websockets/commit/547a26b685d08cac0aa64e5e65f7867ac0ea9bc0'}
GHSA
GHSA-668q-qrv7-99fm
Deserialization of Untrusted Data in logback
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{'CVE-2021-42550'}
2022-03-28T19:32:57Z
2021-12-17T20:00:50Z
MODERATE
6.6
{'CWE-502'}
{'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html', 'https://jira.qos.ch/browse/LOGBACK-1591', 'https://github.com/cn-panda/logbackRceDemo', 'https://github.com/qos-...
null
{'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c', 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'}
{'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'}
GHSA
GHSA-2v82-5746-vwqc
XSS in doc_link
### Impact Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer ...
{'CVE-2021-29625'}
2022-03-21T20:33:37Z
2022-03-18T17:49:28Z
HIGH
7.5
{'CWE-79'}
{'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc', 'https://packagist.org/packages/vrana/adminer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29625', 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7', 'https://github.com/advisories/GHSA-2v82-5746-vwqc', 'https:...
null
{'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}
{'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}
GHSA
GHSA-r8j5-h5cx-65gg
ReDOS in IS-SVG
A vulnerability was discovered in IS-SVG version 4.3.1 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
{'CVE-2021-29059'}
2021-12-10T19:02:37Z
2021-12-10T19:02:37Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/advisories/GHSA-r8j5-h5cx-65gg', 'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29059/IS-SVG.md', 'https://github.com/yetingli/SaveResults/blob/main/js/is-svg.js', 'https://nvd.nist.gov/vuln/detail/CVE-2...
null
{'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'}
{'https://github.com/sindresorhus/is-svg/commit/732fc72779840c45a30817d3fe28e12058592b02'}
GHSA
GHSA-3pc2-fm7p-q2vg
Cross-site Scripting in October
### Impact Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack. ### Patches Issue has been patched in Build 467 (v1.0.467). ### Workarounds Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installatio...
{'CVE-2020-4061'}
2022-04-19T19:02:29Z
2020-07-02T16:55:11Z
LOW
3.7
{'CWE-79'}
{'https://research.securitum.com/the-curious-case-of-copy-paste/', 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg', 'https://github.com/advisories/GHSA-3pc2-fm7p-q2vg', 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5', 'https://nvd.nist.gov/vuln/det...
null
{'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}
{'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}
GHSA
GHSA-74r6-grj9-8rq6
Remote Code Execution in AjaxNetProfessional
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
{'CVE-2021-23758'}
2021-12-16T15:27:55Z
2021-12-16T15:27:55Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/advisories/GHSA-74r6-grj9-8rq6', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professiona...
null
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
GHSA
GHSA-h77x-m5q8-c29h
Moderate severity vulnerability that affects rack
lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which allows remote attackers to cause a denial of service (infinite loop) via a crafted Content-Disposion header.
{'CVE-2012-6109'}
2021-09-14T15:39:43Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-835'}
{'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'http://rhn.redhat.com/errata/RHSA-2013-0548.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=895277', 'http://rack.github.com/', 'https://github.com/rack/rack/blob/master/README.rdoc'...
null
{'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}
{'https://github.com/rack/rack/commit/c9f65df37a151821eb88ddd1dc404b83e52c52d5'}
GHSA
GHSA-59cj-99cw-rq64
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-20...
{'CVE-2019-0913'}
2021-03-29T21:00:05Z
2021-03-29T21:00:05Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913', 'https://github.com/advisories/GHSA-59cj-99cw-rq64', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}
GHSA
GHSA-vcg8-98q8-g7mj
Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible
A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes "ansible-vault edit", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is...
{'CVE-2020-1740'}
2021-08-31T21:11:03Z
2021-04-07T21:47:31Z
LOW
4.7
{'CWE-200', 'CWE-377'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/', 'https://security.gentoo.org/glsa/202006-11', 'https://github.com/ansible/ansible/issues/67798', 'https://github.com/advisorie...
null
{'https://github.com/ansible/ansible/commit/28f9fbdb5e281976e33f443193047068afb97a9b'}
{'https://github.com/ansible/ansible/commit/28f9fbdb5e281976e33f443193047068afb97a9b'}
GHSA
GHSA-6pcc-3rfx-4gpm
Dom4j contains a XML Injection vulnerability
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML do...
{'CVE-2018-1000632'}
2022-04-26T18:43:59Z
2018-10-16T17:01:25Z
HIGH
7.5
{'CWE-91'}
{'https://lists.apache.org/thread.html/7e9e78f0e4288fac6591992836d2a80d4df19161e54bd71ab4b8e458@%3Cdev.maven.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f64...
null
{'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387'}
{'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f'}
GHSA
GHSA-h385-52j6-9984
Withdrawn: HTTP Request Smuggling in Agoo
# Withdrawn reason Withdrawn on 1/13/2021 due to [this comment from the maintainer](https://github.com/ohler55/agoo/issues/88#issuecomment-723580783). This is no longer considered a vulnerability. # Original description agoo through 2.12.3 allows request smuggling attacks where agoo is used as a backend and a fronten...
{'CVE-2020-7670'}
2021-01-13T19:26:13Z
2020-10-20T19:15:38Z
MODERATE
0
{'CWE-444'}
{'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130', 'https://github.com/ohler55/agoo/issues/88', 'https://github.com/advisories/GHSA-h385-52j6-9984', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7670', 'https://snyk.io/vuln/SNYK-RUBY-AGOO-569137'}
null
{'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130'}
{'https://github.com/ohler55/agoo/commit/23d03535cf7b50d679a60a953a0cae9519a4a130'}
GHSA
GHSA-p94w-42g3-f7h4
Holder can (re)create authentic credentials after receiving a credential in vp-toolkit
### Impact The [`verifyVerifiableCredential()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-credential-signer.ts#L57) method check the cryptographic integrity of the Verifiable Credential, but it does not check if the [`credential.issuer`](https://github.com/rabobank-blo...
null
2020-03-06T01:16:00Z
2020-03-06T01:16:00Z
HIGH
0
null
{'https://github.com/advisories/GHSA-p94w-42g3-f7h4', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17', 'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-p94w-42g3-f7h4', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/13'}
null
{'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'}
{'https://github.com/rabobank-blockchain/vp-toolkit/commit/6315936d1d7913fd116fa51a0dbbd29d82c0ce17'}
GHSA
GHSA-m8qc-mf6p-pfq9
Link Following in rply
python-rply before 0.7.4 insecurely creates temporary files.
{'CVE-2014-1938'}
2021-08-19T21:52:46Z
2020-03-11T20:56:34Z
MODERATE
5.5
{'CWE-59'}
{'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737627', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1938', 'https://github.com/advisories/GHSA-m8qc-mf6p-pfq9', 'http://www.openwall.com/lists/oss-security/2014/02/11/1', 'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20', 'https://security...
null
{'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20'}
{'https://github.com/alex/rply/commit/76d268a38c627bf4aebebcd064f5b6d380eb8b20'}
GHSA
GHSA-f7xw-46vh-5jw2
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4132'}
2022-01-05T20:33:47Z
2022-01-05T20:33:47Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2', 'https://github.com/advisories/GHSA-f7xw-46vh-5jw2', 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'}
{'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'}
GHSA
GHSA-gx6h-936c-vrrr
Cross site scripting in registration template in xwiki-platform
### Impact We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: - the wiki must be open to registration for anyone - the wiki must be closed to view for Guest users (more specifically the XWiki.Registrat...
{'CVE-2022-23622'}
2022-02-11T15:00:09Z
2022-02-09T23:25:44Z
HIGH
7.4
{'CWE-79'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622', 'https://github.com/advisories/GHSA-gx6h-936c-vrrr', 'https://jira.xwiki.org/browse/XWIKI-1929...
null
{'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'}
{'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'}
GHSA
GHSA-8c5p-4362-9333
Path traversal in grav
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
{'CVE-2021-3924'}
2021-11-10T16:48:15Z
2021-11-10T16:48:15Z
HIGH
8.8
{'CWE-22'}
{'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/advisories/GHSA-8c5p-4362-9333', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3924', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
null
{'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
{'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
GHSA
GHSA-4wv4-mgfq-598v
Code injection in nobelprizeparser
Code injection through use of eval.
null
2021-03-12T23:00:19Z
2021-03-12T23:00:19Z
CRITICAL
0
{'CWE-94'}
{'https://www.npmjs.com/package/nobelprizeparser', 'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/advisories/GHSA-4wv4-mgfq-598v', 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}
null
{'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}
{'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}
GHSA
GHSA-r82c-j4mq-5xfw
Update bitlyshortener to >=0.5.0 to prevent generating some invalid short URLs
### Impact Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.5.0 can generate an invalid short URL when a vanity domain exists. ### Patches Upgrading `bitlyshortener` to 0.5.0 or newer will prevent the generation of any such invalid short URLs. ### References * [Release notes](https:/...
null
2021-09-21T16:40:42Z
2020-10-27T19:19:56Z
HIGH
0
{'CWE-601'}
{'https://pypi.org/project/bitlyshortener/', 'https://github.com/advisories/GHSA-r82c-j4mq-5xfw', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.5.0', 'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d', 'https://github.com/impredicative/bitlyshortener/secu...
null
{'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d'}
{'https://github.com/impredicative/bitlyshortener/commit/3d412feb77f3daf6f71536463734c2119a55968d'}
GHSA
GHSA-2w7w-2j92-44hx
HTTP Request Smuggling in akka-http-core
A vulnerable Akka HTTP server will accept a malformed message and hand it over to the user. If the user application proxies this message to another server unchanged and that server also accepts that message but interprets it as two HTTP messages, the second message has reached the second server without having been insp...
{'CVE-2021-23339'}
2021-05-10T15:17:09Z
2021-05-10T15:17:09Z
MODERATE
6.5
{'CWE-444'}
{'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34', 'https://github.com/advisories/GHSA-2w7w-2j92-44hx', 'https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201', 'https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.h...
null
{'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34'}
{'https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34'}
GHSA
GHSA-m4vv-p6fq-jhqp
Directory Traversal in @vivaxy/here
The @vivaxy/here module is a small web server that serves files with the process' working directory acting as the web root. It is vulnerable to a directory traversal attack. This means that files on the local file system which exist outside of the web root may be disclosed to an attacker. This might include confiden...
null
2021-09-23T21:48:56Z
2020-09-01T19:04:07Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/557', 'https://github.com/advisories/GHSA-m4vv-p6fq-jhqp', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://hackerone.com/reports/296254'}
null
{'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}
{'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}
GHSA
GHSA-5rcv-m4m3-hfh7
Infinite Loop in Go
Go version v0.3.3 of the x/text package fixes a vulnerability in encoding/unicode that could lead to the UTF-16 decoder entering an infinite loop, causing the program to crash or run out of memory. An attacker could provide a single byte to a UTF16 decoder instantiated with UseBOM or ExpectBOM to trigger an infinite lo...
{'CVE-2020-14040'}
2021-05-18T18:34:35Z
2021-05-18T18:34:35Z
HIGH
6.7
{'CWE-835', 'CWE-400'}
{'https://go-review.googlesource.com/c/text/+/238238', 'https://github.com/advisories/GHSA-5rcv-m4m3-hfh7', 'https://groups.google.com/g/golang-announce/c/bXVeAmGOqz0', 'https://groups.google.com/forum/#!topic/golang-announce/bXVeAmGOqz0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14040', 'https://lists.fedoraproject....
null
{'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'}
{'https://github.com/golang/text/commit/23ae387dee1f90d29a23c0e87ee0b46038fbed0e'}
GHSA
GHSA-p5f8-gfw5-33w4
Heap buffer overflow in Tensorflow
### Impact The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Hence, this code is prone to heap buffer overflow: https://git...
{'CVE-2020-15201'}
2021-11-19T15:19:01Z
2020-09-25T18:28:34Z
MODERATE
4.8
{'CWE-20', 'CWE-787', 'CWE-122'}
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15201', 'https://github.com/advisories/GHSA-p5f8-gfw5-33w4', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
GHSA
GHSA-39q4-p535-c852
Uncontrolled Resource Consumption in locutus
The package locutus before 2.0.15 are vulnerable to Regular Expression Denial of Service (ReDoS) via the gopher_parsedir function.
{'CVE-2021-23392'}
2021-06-16T20:02:15Z
2021-06-10T17:25:05Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23392', 'https://github.com/advisories/GHSA-39q4-p535-c852', 'https://github.com/locutusjs/locutus/pull/446', 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-1090597'}
null
{'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}
{'https://github.com/locutusjs/locutus/commit/eb863321990e7e5514aa14f68b8d9978ece9e65e'}
GHSA
GHSA-6gw4-x63h-5499
Ability to switch customer email address on account detail page and stay verified
### Impact The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (gues...
{'CVE-2020-15245'}
2022-04-19T19:02:37Z
2020-10-19T20:40:59Z
MODERATE
4.3
{'CWE-862', 'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15245', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf', 'https://github.com/advisories/GHSA-6gw4-x63h-5499'}
null
{'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}
{'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}
GHSA
GHSA-856q-xv3c-7f2f
Unauthenticated control plane denial of service attack in Istio
### Impact The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple...
{'CVE-2022-23635'}
2022-04-20T21:05:17Z
2022-02-23T14:59:08Z
HIGH
7.5
{'CWE-287'}
{'https://istio.io/latest/news/security/istio-security-2022-003', 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f', 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23635', 'https://github.com/advisories/GHSA-856q-xv3c-7...
null
{'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'}
{'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'}
GHSA
GHSA-26j7-6w8w-7922
Division by zero in optimized pooling implementations in TFLite
### Impact Optimized pooling implementations in TFLite fail to check that the stride arguments are not 0 before calling [`ComputePaddingHeightWidth`](https://github.com/tensorflow/tensorflow/blob/3f24ccd932546416ec906a02ddd183b48a1d2c83/tensorflow/lite/kernels/pooling.cc#L90). Since users can craft special models whic...
{'CVE-2021-29586'}
2021-05-21T14:26:43Z
2021-05-21T14:26:43Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-26j7-6w8w-7922', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29586', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-26j7-6w8w-7922', 'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'}
null
{'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'}
{'https://github.com/tensorflow/tensorflow/commit/5f7975d09eac0f10ed8a17dbb6f5964977725adc'}
GHSA
GHSA-crfx-5phg-hmw9
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2021-08-04T21:15:58Z
2019-06-13T18:59:12Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/955', 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1', 'https://github.com/infor-design/enterprise-ng/issues/502', 'https://github.com/advisories/GHSA-crfx-5phg-hmw9'}
null
{'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1'}
{'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1'}
GHSA
GHSA-278g-rq84-9hmg
`CHECK`-fail in `MapStage`
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.MapStage`: ```python import tensorflow as tf tf.raw_ops.MapStage( key=tf.constant([], shape=[0, 0, 0, 0], dtype=tf.int64), indices=tf.constant((0), dtype=tf.int32), values=[tf.constant((0), dtype=tf.int32)], dtypes=[tf....
{'CVE-2021-37673'}
2021-08-25T14:41:36Z
2021-08-25T14:41:36Z
MODERATE
5.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37673', 'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d', 'https://github.com/advisories/GHSA-278g-rq84-9hmg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-278g-rq84-9hmg'}
null
{'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'}
{'https://github.com/tensorflow/tensorflow/commit/d7de67733925de196ec8863a33445b73f9562d1d'}
GHSA
GHSA-q674-xm3x-2926
Uncontrolled Resource Consumption in parse-link-header
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
{'CVE-2021-23490'}
2022-01-07T16:08:29Z
2022-01-06T21:37:02Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-q674-xm3x-2926', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490', 'https://snyk.io/vuln/SNYK-JS-PARSELINKHEADER-1582783', 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2321973'}
null
{'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1'}
{'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1'}
GHSA
GHSA-fmm9-3gv8-58f4
Improper Handling of Missing Values in kaml
### Impact Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service. This only affects applications that use polymorphic serialization with the default tagged...
{'CVE-2021-39194'}
2021-09-08T14:47:33Z
2021-09-07T23:08:40Z
MODERATE
4.3
{'CWE-835', 'CWE-230'}
{'https://github.com/advisories/GHSA-fmm9-3gv8-58f4', 'https://github.com/charleskorn/kaml/issues/179', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194', 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'}
null
{'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'}
{'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'}
GHSA
GHSA-5x3v-2gxr-59m2
Directory traversal in Apache RocketMQ
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users ...
{'CVE-2019-17572'}
2021-04-07T19:55:55Z
2020-07-01T17:26:15Z
MODERATE
0
{'CWE-22'}
{'https://github.com/apache/rocketmq/issues/1637', 'https://github.com/advisories/GHSA-5x3v-2gxr-59m2', 'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/apache/rocke...
null
{'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}
{'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}
GHSA
GHSA-9g8h-pjm4-q92p
Out-of-bounds Write in OpenCV.
In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.
{'CVE-2018-5268'}
2021-11-18T15:31:48Z
2021-10-12T22:23:41Z
MODERATE
5.5
{'CWE-787'}
{'http://www.securityfocus.com/bid/106945', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/10541', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268', 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa', 'https://gi...
null
{'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'}
{'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'}
GHSA
GHSA-4fjv-pmhg-3rfg
Multiple cryptographic issues in Python oic
### Impact * Client implementations using this library ### Issues 1) The IdToken signature algorithm was not checked automatically, but only if the expected algorithm was passed in as a kwarg. 2) JWA `none` algorithm was allowed in all flows. 3) `oic.consumer.Consumer.parse_authz` returns an unverified IdToken. The ve...
{'CVE-2020-26244'}
2022-04-19T19:02:41Z
2020-12-04T16:47:12Z
MODERATE
6.8
{'CWE-325', 'CWE-347'}
{'https://github.com/OpenIDC/pyoidc/security/advisories/GHSA-4fjv-pmhg-3rfg', 'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498', 'https://github.com/OpenIDC/pyoidc/releases/tag/1.2.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26244', 'https://github.com/advisories/GHSA-4fjv-pmhg-3rfg...
null
{'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498'}
{'https://github.com/OpenIDC/pyoidc/commit/62f8d753fa17c8b1f29f8be639cf0b33afb02498'}
GHSA
GHSA-xhr8-mpwq-2rr2
Automatic named constructor discovery in Valinor
## Design issue - automatic constructor discovery The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked. Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228...
null
2022-04-05T21:39:22Z
2022-04-01T13:39:45Z
HIGH
0
null
{'https://github.com/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0'}
null
{'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}
{'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}
GHSA
GHSA-f6g6-54hm-fhxv
Data races in libsbc
Affected versions of this crate implements `Send` for `Decoder<R>` for any `R: Read`. This allows `Decoder<R>` to contain `R: !Send` and carry (move) it to another thread. This can result in undefined behavior such as memory corruption from data race on `R`, or dropping `R = MutexGuard<_>` from a thread that didn't lo...
{'CVE-2020-36440'}
2021-08-25T20:59:02Z
2021-08-25T20:59:02Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36440', 'https://rustsec.org/advisories/RUSTSEC-2020-0120.html', 'https://github.com/advisories/GHSA-f6g6-54hm-fhxv'}
null
{'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'}
{'https://github.com/mvertescher/libsbc-rs/commit/a34d6e1'}
GHSA
GHSA-x8rq-rc7x-5fg5
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF)
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses.
{'CVE-2022-0086'}
2022-04-19T19:03:24Z
2022-01-06T22:24:35Z
HIGH
8.2
{'CWE-918'}
{'https://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122', 'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f', 'https://github.com/transloadit/uppy/releases/tag/uppy%402.3.3', 'https://github.com/transloadit/uppy/pull/3403', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0086', '...
null
{'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f'}
{'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f'}
GHSA
GHSA-89px-ww3j-g2mm
2FA bypass in Wagtail through new device path
## 2FA bypass through new device path ### Impact If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. ### Patches This problem has been patched in version 1.3.0. ### Work...
{'CVE-2019-16766'}
2021-01-08T21:28:09Z
2019-11-29T17:05:59Z
HIGH
8.7
{'CWE-304', 'CWE-290'}
{'https://github.com/advisories/GHSA-89px-ww3j-g2mm', 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766', 'https://github.com/labd/wagtail-2fa/commit/13b12...
null
{'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'}
{'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81', 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'}
GHSA
GHSA-hj69-c76v-86wr
Out-of-bounds Read in Pillow
libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overflow.
{'CVE-2020-5313'}
2021-08-23T15:05:21Z
2020-04-01T16:36:00Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-hj69-c76v-86wr', 'https://www.debian.org/security/2020/dsa-4631', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5313', 'https://github.com/python-pillow/P...
null
{'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b'}
{'https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b'}
GHSA
GHSA-5jfw-35xp-5m42
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
### Impact `LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negati...
null
2022-04-06T18:43:19Z
2022-04-05T17:53:22Z
HIGH
7.5
{'CWE-124'}
{'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}
null
{'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}
{'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}
GHSA
GHSA-vcjj-xf2r-mwvc
XSS in knockout
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
{'CVE-2019-14862'}
2022-04-25T23:07:31Z
2020-04-01T15:47:45Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/npm:knockout:20180213', 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2019-0015', 'https://github.com/knockout/knockout/issues/1244', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-vcjj-xf2r-mwvc', 'https://github.com/knockout/knocko...
null
{'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb'}
{'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5171263a5c68bda98efb'}
GHSA
GHSA-653m-r33x-39ff
Moderate severity vulnerability that affects geminabox
Stored cross-site scripting (XSS) vulnerability in "geminabox" (Gem in a Box) before 0.13.10 allows attackers to inject arbitrary web script via the "homepage" value of a ".gemspec" file, related to views/gem.erb and views/index.erb.
{'CVE-2017-16792'}
2021-09-01T22:38:12Z
2017-11-29T23:20:14Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-653m-r33x-39ff', 'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7', 'https://github.com/geminabox/geminabox/blob/master/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16792', 'https://rubygems.org/gems/geminabox/versions/0.13.10'}
null
{'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}
{'https://github.com/geminabox/geminabox/commit/f8429a9e364658459add170e4ebc7a5d3b4759e7'}
GHSA
GHSA-57qf-82hh-2hmc
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting.
{'CVE-2022-0502'}
2022-02-14T22:30:21Z
2022-02-07T00:00:30Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706', 'https://github.com/advisories/GHSA-57qf-82hh-2hmc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}
{'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}
GHSA
GHSA-8c9x-wfgj-v78w
Open Redirect in showdoc
showdoc is vulnerable to URL Redirection to Untrusted Site
{'CVE-2021-4000'}
2021-12-16T15:31:58Z
2021-12-16T15:31:58Z
MODERATE
6.5
{'CWE-601'}
{'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000', 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://github.com/advisories/GHSA-8c9x-wfgj-v78w'}
null
{'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}
{'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}
GHSA
GHSA-4ppp-gpcr-7qf6
HTTP Request Smuggling: Content-Length Sent Twice in Waitress
### Impact Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally. So a request with: ``` Content-Length: 10 Content-Length: 10 ``` would get transformed to: ``` Content-Length: 10, 10 ``...
null
2022-03-24T17:52:21Z
2019-12-20T23:04:35Z
CRITICAL
0
{'CWE-444'}
{'https://github.com/advisories/GHSA-4ppp-gpcr-7qf6', 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}
null
{'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}
{'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}
GHSA
GHSA-px4h-xg32-q955
ReDoS in normalize-url
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
{'CVE-2021-33502'}
2021-10-27T17:04:16Z
2021-06-08T23:11:43Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/sindresorhus/normalize-url/releases/tag/v6.0.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33502', 'https://github.com/advisories/GHSA-px4h-xg32-q955', 'https://security.netapp.com/advisory/ntap-20210706-0001/', 'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a...
null
{'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'}
{'https://github.com/sindresorhus/normalize-url/commit/b1fdb5120b6d27a88400d8800e67ff5a22bd2103'}
GHSA
GHSA-h4pc-gx2w-f2xv
Heap OOB read in TFLite
### Impact A specially crafted TFLite model could trigger an OOB read on heap in the TFLite implementation of [`Split_V`](https://github.com/tensorflow/tensorflow/blob/c59c37e7b2d563967da813fa50fe20b21f4da683/tensorflow/lite/kernels/split_v.cc#L99): ```cc const int input_size = SizeOfDimension(input, axis_value); ``` ...
{'CVE-2021-29606'}
2021-05-21T14:28:24Z
2021-05-21T14:28:24Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h4pc-gx2w-f2xv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29606', 'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412', 'https://github.com/advisories/GHSA-h4pc-gx2w-f2xv'}
null
{'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412'}
{'https://github.com/tensorflow/tensorflow/commit/ae2daeb45abfe2c6dda539cf8d0d6f653d3ef412'}
GHSA
GHSA-vpx7-vm66-qx8r
Path Traversal in github.com/unknwon/cae/zip
The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.
{'CVE-2020-7664'}
2022-01-04T19:33:01Z
2021-05-18T20:31:06Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11', 'https://github.com/advisories/GHSA-vpx7-vm66-qx8r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7664'}
null
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
{'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11'}
GHSA
GHSA-h9vc-2p9g-63gp
Exposure of Sensitive Information to an Unauthorized Actor in pimcore
Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.
{'CVE-2022-0565'}
2022-02-24T13:10:52Z
2022-02-15T00:02:47Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-h9vc-2p9g-63gp', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565', 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
null
{'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
{'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
GHSA
GHSA-4cfr-gjfx-fj3x
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
{'CVE-2021-40324'}
2021-10-13T17:27:07Z
2021-10-05T17:53:11Z
HIGH
0
{'CWE-434'}
{'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40324', 'https://github.com/advisories/GHSA-4cfr-gjfx-fj3x'}
null
{'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}
{'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}
GHSA
GHSA-qxmr-qxh6-2cc9
ReDos vulnerability on guest checkout email validation
### Impact Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`. Before the patch, it can be reproduced in the console like this: ```ruby irb(main)> Spree::E...
{'CVE-2021-43805'}
2022-04-19T19:03:16Z
2021-12-07T22:01:47Z
HIGH
7.5
{'CWE-1333'}
{'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/advisories/GHSA-qxmr-qxh6-2cc9', 'https://github.com/solidusio/solidus/s...
null
{'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}
{'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71'}
GHSA
GHSA-hcw3-j74m-qc58
Incorrect Calculation in github.com/open-policy-agent/opa
### Impact Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below. **All of these** three conditions have to be met to create a...
{'CVE-2022-23628'}
2022-04-19T19:03:21Z
2022-02-09T22:17:37Z
MODERATE
6.3
{'CWE-682'}
{'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/pull/3851', 'https://github.com/advisories/GHSA-hcw3-j74m-qc58', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e...
null
{'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239'}
{'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239'}
GHSA
GHSA-7vxc-chqj-h83g
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4168'}
2022-01-07T16:11:22Z
2022-01-06T22:02:18Z
MODERATE
6.3
{'CWE-352'}
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168', 'https://github.com/advisories/GHSA-7vxc-chqj-h83g', 'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c'}
null
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'}
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'}
GHSA
GHSA-qjmq-8hjr-qcv6
SQL Injection when creating an application with Reactive SQL backend
### Impact SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected. If you have generated a microservice...
{'CVE-2022-24815'}
2022-04-18T22:20:12Z
2022-04-07T15:18:05Z
HIGH
8.1
{'CWE-89'}
{'https://github.com/jhipster/generator-jhipster/issues/18269', 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815', 'https://github.c...
null
{'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98'}
{'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98'}
GHSA
GHSA-7xwj-5r4v-429p
NPE in TFLite
### Impact The implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313): ```cc TfLiteTensor* state = GetVariableInput(context, node, kStateTensor); // ... GetTensorDat...
{'CVE-2021-37681'}
2021-08-25T14:40:35Z
2021-08-25T14:40:35Z
HIGH
7.8
{'CWE-476'}
{'https://github.com/advisories/GHSA-7xwj-5r4v-429p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37681', 'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p'}
null
{'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76'}
{'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76'}
GHSA
GHSA-xhfx-hgmf-v6vp
Potential Host Header Poisoning on misconfigured servers
### Impact When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Pois...
{'CVE-2021-21265'}
2021-03-11T02:18:01Z
2021-03-10T21:07:25Z
LOW
0
{'CWE-644'}
{'https://packagist.org/packages/october/backend', 'https://github.com/advisories/GHSA-xhfx-hgmf-v6vp', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6...
null
{'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'}
{'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'}
GHSA
GHSA-8gwj-8hxc-285w
Prototype Pollution in json-ptr
This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
{'CVE-2021-23509'}
2021-11-08T17:43:27Z
2021-11-08T17:43:27Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509', 'https://github.com/flitbit/json-ptr/pull/42', 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291', 'https://gi...
null
{'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca'}
{'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca'}
GHSA
GHSA-hpqh-2wqx-7qp5
Memory access due to code generation flaw in Cranelift module
There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0...
{'CVE-2021-32629'}
2022-04-26T18:11:38Z
2021-08-25T21:01:55Z
HIGH
7.2
{'CWE-125'}
{'https://github.com/RustSec/advisory-db/blob/main/crates/cranelift-codegen/RUSTSEC-2021-0067.md', 'https://www.fastly.com/security-advisories/memory-access-due-to-code-generation-flaw-in-cranelift-module', 'https://github.com/advisories/GHSA-hpqh-2wqx-7qp5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32629', 'https://...
null
{'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'}
{'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0'}
GHSA
GHSA-7f53-fmmv-mfjv
Regular expression denial of service in react-native
A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.
{'CVE-2020-1920'}
2021-07-20T17:35:28Z
2021-07-20T17:33:28Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-7f53-fmmv-mfjv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920', 'https://www.npmjs.com/package/react-native', 'https://github.com/facebook/react-native/releases/tag/v0.64.1', 'https://github.com/facebook/react-native/releases/tag/v0.62.3', 'https://github.com/facebook/react-nativ...
null
{'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7'}
{'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7'}
GHSA
GHSA-2r2c-g63r-vccr
Improper Verification of Cryptographic Signature in `node-forge`
### Impact RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### For more infor...
{'CVE-2022-24773'}
2022-03-22T19:33:03Z
2022-03-18T23:10:48Z
MODERATE
5.3
{'CWE-347'}
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https...
null
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}
{'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}
GHSA
GHSA-9chx-2vqw-8vq5
Path Traversal in the Logs plugin for Craft CMS
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
{'CVE-2022-23409'}
2022-02-10T22:32:15Z
2022-02-01T00:01:00Z
MODERATE
4.9
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://sec-consult.com/vulnerability-lab/', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html', 'https://github.com/advisories/GHSA-9chx-...
null
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
GHSA
GHSA-4446-656p-f54g
Deserialization of Untrusted Data in Bouncy castle
Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT p...
{'CVE-2018-1000613'}
2022-04-27T17:25:45Z
2018-10-17T16:23:12Z
CRITICAL
9.8
{'CWE-470', 'CWE-502'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9...
null
{'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'}
{'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'}
GHSA
GHSA-wg6g-ppvx-927h
Prototype Pollution in cached-path-relative
The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the...
{'CVE-2021-23518'}
2022-01-27T14:27:53Z
2022-01-27T14:27:53Z
HIGH
7.3
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23518', 'https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653', 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760', 'https://github.com/advisories/GHSA-wg6g-ppvx-927h'}
null
{'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'}
{'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'}
GHSA
GHSA-4gr7-qw2q-jxh6
Cross-site Scripting in Nacos
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
{'CVE-2021-44667'}
2022-03-22T21:37:09Z
2022-03-12T00:00:27Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-4gr7-qw2q-jxh6', 'https://github.com/alibaba/nacos/issues/7359', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}
null
{'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}
{'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}
GHSA
GHSA-wrp6-9w7f-3wxg
calibre-web is vulnerable to Cross-site Scripting
calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4170'}
2022-01-21T23:55:34Z
2022-01-21T23:55:34Z
HIGH
7.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-wrp6-9w7f-3wxg', 'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4170', 'https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0'}
null
{'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5'}
{'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5'}
GHSA
GHSA-cw7p-q79f-m2v7
incomplete JupyterHub logout with simultaneous JupyterLab sessions
### Impact Users of JupyterLab with JupyterHub who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the l...
{'CVE-2021-41247'}
2022-04-19T19:03:13Z
2021-11-08T18:02:37Z
LOW
3.5
{'CWE-613'}
{'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27', 'https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41247', 'https://github.com/advisories/GHSA-cw7p-q79f-m2v7'}
null
{'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'}
{'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'}
GHSA
GHSA-hvf8-h2qh-37m9
IPC messages delivered to the wrong frame in Electron
### Impact IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame. If your app does ANY of the following, then it is impacted by this issue: - Uses `remote` - Ca...
{'CVE-2020-26272'}
2022-04-19T19:02:42Z
2021-01-28T19:11:34Z
MODERATE
5.4
{'CWE-668'}
{'https://github.com/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/pull/26875', 'https://www.electronjs.org/releases/stable?version=9#9.4.0', 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda95066...
null
{'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'}
{'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'}
GHSA
GHSA-42fp-4hm3-j8r7
Moderate severity vulnerability that affects moin
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{'CVE-2017-5934'}
2021-08-31T21:37:19Z
2019-01-04T17:46:08Z
MODERATE
6.1
{'CWE-79'}
{'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934', 'https://www.debian.org/security/2018/dsa-4318', 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7', 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024', '...
null
{'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}
{'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}
GHSA
GHSA-x27v-x225-gq8g
Server-Side Request Forgery in Recurly
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
{'CVE-2017-0905'}
2021-12-01T21:50:52Z
2017-12-06T16:43:00Z
CRITICAL
9.8
{'CWE-918'}
{'https://dev.recurly.com/page/ruby-updates', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://hackerone.com/reports/288635', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://github.com/advisories/GHSA-x27v-x225-gq8g'}
null
{'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}
{'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be'}
GHSA
GHSA-hh27-ffr2-f2jc
Open redirect in url-parse
# Overview Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site. # Impact Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
{'CVE-2021-3664'}
2021-08-10T16:07:08Z
2021-08-10T16:07:08Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3664', 'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0', 'https://github.com/unshiftio/url-parse/issues/205', 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse', 'https://github.com/advisories/GHSA-hh27-ffr2-f2jc', 'https://...
null
{'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0'}
{'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0'}
GHSA
GHSA-7chv-rrw6-w6fc
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches ...
{'CVE-2021-29505'}
2022-04-22T15:48:50Z
2021-05-18T18:36:27Z
HIGH
7.5
{'CWE-94', 'CWE-74', 'CWE-502'}
{'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2...
null
{'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'}
{'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'}
GHSA
GHSA-r24h-634p-m72x
Validation Bypass in schema-inspector
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
{'CVE-2019-10781'}
2021-08-30T13:35:23Z
2020-06-10T20:02:47Z
CRITICAL
9.8
{'CWE-668'}
{'https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970', 'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10781', 'https://github.com/advisories/GHSA-r24h-634p-m72x'}
null
{'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d'}
{'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d'}
GHSA
GHSA-cmx4-p4v5-hmr5
Server-side request forgery (SSRF) in Apache Batik
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2019-17566'}
2022-02-09T00:46:46Z
2022-02-09T00:46:46Z
HIGH
7.5
{'CWE-20', 'CWE-918'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https:/...
null
{'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'}
{'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'}
GHSA
GHSA-2wmv-37vq-52g5
FPE in `tf.raw_ops.UnravelIndex`
### Impact An attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0: ```python import tensorflow as tf tf.raw_ops.UnravelIndex(indices=-1, dims=[1,0,2]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a8327...
{'CVE-2021-37668'}
2021-08-25T14:42:06Z
2021-08-25T14:42:06Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5', 'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37668', 'https://github.com/advisories/GHSA-2wmv-37vq-52g5'}
null
{'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'}
{'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'}
GHSA
GHSA-8hfj-j24r-96c4
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarou...
{'CVE-2022-24785'}
2022-04-26T20:56:20Z
2022-04-04T21:25:48Z
HIGH
7.5
{'CWE-27', 'CWE-22'}
{'https://github.com/advisories/GHSA-8hfj-j24r-96c4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'}
null
{'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}
{'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}
GHSA
GHSA-49pj-69vf-c689
Incorrect Default Permissions in netaddr
The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
{'CVE-2019-17383'}
2021-08-18T21:45:01Z
2019-10-14T21:43:19Z
CRITICAL
9.8
{'CWE-276'}
{'https://rubygems.org/gems/netaddr/versions', 'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://github.com/advisories/GHSA-49pj-69vf-c689', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17383'}
null
{'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'}
{'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'}
GHSA
GHSA-2jx8-v4hv-gx3h
XXE vulnerability in Launch import
| Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk | |--------------|-------------------|-------------------|---------------|---------------| | Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium | ###...
{'CVE-2020-12642'}
2021-10-05T17:29:41Z
2021-06-28T16:45:47Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/advisories/GHSA-2jx8-v4hv-gx3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f...
null
{'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'}
{'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'}
GHSA
GHSA-gh4g-3gm9-5wrq
Cross-Site Scripting in shave
Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting. ## Recommendation Upgrade to ver...
{'CVE-2019-12313'}
2021-08-04T16:06:35Z
2019-05-29T18:38:08Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/822', 'https://github.com/advisories/GHSA-gh4g-3gm9-5wrq', 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313', 'https://github.com/dollarshaveclub/shave/...
null
{'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'}
{'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'}
GHSA
GHSA-rr8m-29g8-8cgc
SQL Injection in Fork CMS
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
{'CVE-2022-1064'}
2022-04-05T20:55:35Z
2022-03-26T00:00:32Z
HIGH
8.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/advisories/GHSA-rr8m-29g8-8cgc', 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'}
null
{'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}
{'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}
GHSA
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
Description ----------- CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker. In Symfony 4.1, we've added the opt-in...
{'CVE-2021-41270'}
2022-04-19T19:03:15Z
2021-11-24T21:01:23Z
MODERATE
6.5
{'CWE-1236'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x',...
null
{'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'}
{'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'}
GHSA
GHSA-273r-rm8g-7f3x
Uncaught Exception in mercurius
### Impact Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. ### Patches The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. ### Work...
{'CVE-2021-43801'}
2021-12-14T15:26:38Z
2021-12-13T21:33:04Z
HIGH
7.5
{'CWE-754'}
{'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801', 'https://github.com/mercuri...
null
{'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}
{'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}