ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-rf3w-29h3-r636
Arbitrary Code Execution in feehi/cms
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
{'CVE-2020-21322'}
2021-09-29T18:02:51Z
2021-09-20T20:45:35Z
HIGH
0
{'CWE-434'}
{'https://github.com/advisories/GHSA-rf3w-29h3-r636', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322', 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms/issues/44'}
null
{'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}
{'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}
GHSA
GHSA-8v5f-hp78-jgxq
Signature Verification Bypass in jwt-simple
Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and t...
null
2021-08-04T20:57:39Z
2019-06-06T15:30:33Z
HIGH
0
{'CWE-347'}
{'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106', 'https://www.npmjs.com/advisories/831', 'https://github.com/advisories/GHSA-8v5f-hp78-jgxq'}
null
{'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}
{'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}
GHSA
GHSA-hhx9-p69v-cx2j
Authentication bypass in Apache Airflow
"The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/sec...
{'CVE-2020-13927'}
2021-06-03T15:21:59Z
2021-04-30T17:34:13Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-hhx9-p69v-cx2j', 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication', 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html', 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd44...
null
{'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'}
{'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'}
GHSA
GHSA-58v3-j75h-xr49
Improper Input Validation in libseccomp-golang
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
{'CVE-2017-18367'}
2021-05-18T15:44:30Z
2021-05-18T15:44:30Z
HIGH
4.8
{'CWE-284'}
{'https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html', 'http://www.openwall.com/lists/oss-security/2019/04/25/6', 'https://access.redhat.com/errata/RHSA-2019:4090', 'https://usn.ubuntu.com/4574-1/', 'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e', 'https://...
null
{'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}
{'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}
GHSA
GHSA-w6cx-qg2q-rvq8
Path Traversal in @finastra/ssr-pages
A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/1 - https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
{'CVE-2022-24718'}
2022-04-19T19:03:25Z
2022-03-01T22:09:18Z
HIGH
7.6
{'CWE-22'}
{'https://github.com/Finastra/ssr-pages/pull/1', 'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780', 'https://github.com/advisories/GHSA-w6cx-qg2q-rvq8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718', 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-q...
null
{'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780'}
{'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780'}
GHSA
GHSA-5r2v-6gm6-vpvh
Insecure Permissions in Gogs
routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.
{'CVE-2019-14544'}
2021-05-18T17:33:58Z
2021-05-18T17:33:58Z
CRITICAL
9.8
{'CWE-200'}
{'https://github.com/advisories/GHSA-5r2v-6gm6-vpvh', 'https://github.com/gogs/gogs/issues/5764', 'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14544'}
null
{'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'}
{'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945'}
GHSA
GHSA-mg98-x2cm-4cpf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.
{'CVE-2019-1106'}
2021-03-29T20:59:15Z
2021-03-29T20:59:15Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/advisories/GHSA-mg98-x2cm-4cpf', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://portal.msrc.microsoft...
null
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'}
{'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
GHSA
GHSA-pccm-j6vj-jwwf
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload.
{'CVE-2022-0962'}
2022-03-29T21:17:44Z
2022-03-15T00:00:54Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://github.com/advisories/GHSA-pccm-j6vj-jwwf', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
GHSA
GHSA-pq2f-3fg3-rw99
SQL Injection in WordPress Zero Spam WordPress plugin
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
{'CVE-2022-0254'}
2022-03-29T21:17:17Z
2022-03-15T00:00:57Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906', 'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3', 'https://github.com/advisories/GHSA-pq2f-3fg3-rw99',...
null
{'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'}
{'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'}
GHSA
GHSA-4p4p-www8-8fv9
Reference binding to null in `ParameterizedTruncatedNormal`
### Impact An attacker can trigger undefined behavior by binding to null pointer in `tf.raw_ops.ParameterizedTruncatedNormal`: ```python import tensorflow as tf shape = tf.constant([], shape=[0], dtype=tf.int32) means = tf.constant((1), dtype=tf.float32) stdevs = tf.constant((1), dtype=tf.float32) minvals = tf.co...
{'CVE-2021-29568'}
2021-05-21T14:25:19Z
2021-05-21T14:25:19Z
LOW
2.5
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29568', 'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4p4p-www8-8fv9', 'https://github.com/advisories/GHSA-4p4p-www8-8fv9'}
null
{'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'}
{'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'}
GHSA
GHSA-86mr-6m89-vgj3
Buffer Overflow in node-weakauras-parser
Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems. ## Recommendation Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.
null
2021-10-04T21:10:10Z
2020-09-03T15:51:38Z
MODERATE
0
{'CWE-120'}
{'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43', 'https://www.npmjs.com/advisories/1504', 'https://github.com/advisories/GHSA-86mr-6m89-vgj3'}
null
{'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'}
{'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'}
GHSA
GHSA-v4cr-m5f8-gxw8
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4092'}
2021-12-16T14:14:56Z
2021-12-16T14:14:56Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-v4cr-m5f8-gxw8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23', 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}
GHSA
GHSA-2jhm-qp48-hv5j
Missing authorization in xwiki-platform
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString: ``` $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg") ``` ### Patches It has been patched in XWiki versi...
{'CVE-2022-23621'}
2022-02-11T15:00:23Z
2022-02-09T21:56:05Z
MODERATE
5.5
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23621', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://jira.xwiki.org/browse/XWIKI-18870', 'https://github.com/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117...
null
{'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}
{'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}
GHSA
GHSA-2ww3-fxvq-293j
Inefficient Regular Expression in nltk
nltk is contains an Inefficient Regular Expression and is vulnerable to regular expression denial of service attacks.
{'CVE-2021-3828'}
2022-04-26T18:03:42Z
2021-09-29T17:14:53Z
HIGH
7.5
{'CWE-697', 'CWE-1333'}
{'https://github.com/nltk/nltk/pull/2816', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3828', 'https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32', 'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6', 'https://github.com/advisories/GHSA-2ww3-fxvq-293j'}
null
{'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6'}
{'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6'}
GHSA
GHSA-m8rp-q82r-c5mf
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0278'}
2022-01-27T18:31:49Z
2022-01-21T18:06:49Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-m8rp-q82r-c5mf', 'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278'}
null
{'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}
{'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}
GHSA
GHSA-282f-qqgm-c34q
Prototype Pollution in node-jsonpointer
This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.
{'CVE-2021-23807'}
2021-11-08T17:44:45Z
2021-11-08T17:44:45Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/advisories/GHSA-282f-qqgm-c34q', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288', 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23807', 'https://github.com/janl/node-jsonpointer/pull/51'}
null
{'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4'}
{'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4'}
GHSA
GHSA-m34j-p8rj-wjxq
Division by 0 in `QuantizedBiasAdd`
### Impact An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8) bias = tf.constant([], shape=[0], dtype=tf.quint8) min_input = tf.constant(-10.0, dtype=tf.float32) ...
{'CVE-2021-29546'}
2021-05-21T14:23:28Z
2021-05-21T14:23:28Z
LOW
2.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29546', 'https://github.com/advisories/GHSA-m34j-p8rj-wjxq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq', 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'}
null
{'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'}
{'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb'}
GHSA
GHSA-x3g3-jh26-76cf
Cross-site Scripting in livehelperchat
LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration.
{'CVE-2022-0375'}
2022-02-02T16:05:34Z
2022-01-28T23:06:00Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/advisories/GHSA-x3g3-jh26-76cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
GHSA
GHSA-p3rp-vmj9-gv6v
Incorrect sanitisation function leads to `XSS` in mermaid
### Impact Malicious diagrams can contain javascript code that can be run at diagram readers machines. ### Patches The users should upgrade to version 8.13.8 ### Workarounds You need to upgrade in order to avoid this issue.
{'CVE-2021-43861'}
2022-01-06T19:45:59Z
2022-01-06T19:45:59Z
HIGH
7.2
{'CWE-20', 'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43861', 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v', 'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83', 'https://github.com/advisories/GHSA-p3rp-vmj9-gv6v', 'https://github.com/mermaid-js/mermaid/releas...
null
{'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83'}
{'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83'}
GHSA
GHSA-2j9c-9vmv-7m39
Missing anchor in Rack-Cors allows malicious third party site to perform CORS request
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net)...
{'CVE-2017-11173'}
2022-04-26T18:19:30Z
2018-07-31T18:18:39Z
HIGH
8.8
null
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'http://www.debian.org/security/2017/dsa-3931', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html', 'https...
null
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6'}
GHSA
GHSA-fh37-cx83-q542
Improper Authentication in Apache Airflow
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata abo...
{'CVE-2021-26697'}
2021-06-18T18:30:11Z
2021-06-18T18:30:11Z
MODERATE
5.3
{'CWE-287', 'CWE-269'}
{'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/02/17/2', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E', 'htt...
null
{'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}
{'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}
GHSA
GHSA-m5pj-vjjf-4m3h
Arbitrary Code Execution in grunt
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
{'CVE-2020-7729'}
2021-05-06T18:27:18Z
2021-05-06T18:27:18Z
HIGH
7.1
{'CWE-1188'}
{'https://snyk.io/vuln/SNYK-JS-GRUNT-597546', 'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922', 'https://github.com/advisories/GHSA-m5pj-vjjf-4m3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729', 'https://github.com/gruntjs/grunt/commit/e3...
null
{'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7'}
{'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7'}
GHSA
GHSA-686f-ch3r-xwmh
Data races in unicycle
Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads. This can result in a data race & memory corruption when types that provide interna...
{'CVE-2020-36436'}
2021-08-25T20:58:17Z
2021-08-25T20:58:17Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html', 'https://github.com/udoprog/unicycle/issues/8', 'https://nvd.nist.gov/vuln/detail/CVE-20...
null
{'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'}
{'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'}
GHSA
GHSA-x64g-4xx9-fh6x
Denial of Service in Cryptacular
CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with &quot;new byte&quot; may depend on untrusted input within the header of encoded data.
{'CVE-2020-7226'}
2022-04-22T18:19:17Z
2020-06-10T20:02:58Z
HIGH
7.5
{'CWE-770'}
{'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff90...
null
{'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6...
{'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f...
GHSA
GHSA-xqfj-35wv-m3cr
Null pointer dereference in `StringNGrams`
### Impact An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`: ```python import tensorflow as tf data=tf.constant([''] * 11, shape=[11], dtype=tf.string) splits = [0]*115 splits.append(3) data_splits=tf.constant(splits, shape=[116], dtype=tf.int64) tf.raw_ops.StringNGrams(data=data...
{'CVE-2021-29541'}
2021-05-21T17:07:00Z
2021-05-21T14:23:12Z
LOW
2.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/advisories/GHSA-xqfj-35wv-m3cr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29541'}
null
{'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'}
{'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b'}
GHSA
GHSA-6vx5-cg2p-7g5v
Unrestricted Upload of File with Dangerous Type in microweber
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0912'}
2022-03-22T21:37:49Z
2022-03-12T00:00:35Z
MODERATE
4.8
{'CWE-434'}
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://github.com/advisories/GHSA-6vx5-cg2p-7g5v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'}
null
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'}
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'}
GHSA
GHSA-fjqr-fx3f-g4rv
Electron protocol handler browser vulnerable to Command Injection
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electro...
{'CVE-2018-1000118'}
2022-04-26T14:35:23Z
2018-03-26T16:41:20Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7', 'https://electronjs.org/releases#1.8.2-beta.5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118', 'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv'}
null
{'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7'}
{'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7'}
GHSA
GHSA-rg32-m3hf-772v
Deserialization of Untrusted Data in Slanger
Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0...
{'CVE-2019-1010306'}
2021-05-11T15:51:16Z
2019-07-16T00:41:40Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306', 'https://github.com/advisories/GHSA-rg32-m3hf-772v'}
null
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'}
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'}
GHSA
GHSA-fr6q-jv7j-35g3
Path Traversal in w-zip
Path Traversal in NPM w-zip prior to 1.0.12.
{'CVE-2022-0401'}
2022-02-10T23:41:29Z
2022-02-02T00:01:46Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/advisories/GHSA-fr6q-jv7j-35g3', 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0401', 'https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d'}
null
{'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'}
{'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'}
GHSA
GHSA-374m-jm66-3vj8
Heap OOB in `SparseBinCount`
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB: ```python import tensorflow as tf tf.raw_ops.SparseBincount( indices=[[0],[1],[2]] values=[...
{'CVE-2021-41226'}
2021-11-10T18:41:47Z
2021-11-10T18:41:47Z
HIGH
7.1
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41226', 'https://github.com/advisories/GHSA-374m-jm66-3vj8', 'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'}
null
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}
GHSA
GHSA-gfp2-w5jm-955q
OMERO.web exposes some unnecessary session information in the page
### Background OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release. ### Impact OMERO.web before 5.9.0...
{'CVE-2021-21376'}
2021-03-29T17:30:03Z
2021-03-23T15:26:34Z
MODERATE
0
{'CWE-200'}
{'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://www.openmicroscopy.org/security/advisories/2021-SV1/', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q', 'https://github.com/ome/omero-web/blob/master/CHANGELOG....
null
{'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}
{'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}
GHSA
GHSA-8h2f-7jc4-7m3m
Open Redirect in urijs
urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613.
{'CVE-2022-0868'}
2022-03-14T21:10:49Z
2022-03-07T00:00:40Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/medialize/URI.js/releases/tag/v1.19.10', 'https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02', 'https://github.com/advisories/GHSA-8h2f-7jc4-7m3m', 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868'}
null
{'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509'}
{'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509'}
GHSA
GHSA-qjhr-c23f-w76q
Inline JS XSS vulnerability in Mautic
### Impact Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form. ### Patches Upgrade to 2.12.0 or later. ### Workarounds None ### References https://github.com/mautic/mautic/releases/tag/2.12.0 ### For ...
{'CVE-2017-1000488'}
2022-04-19T19:02:44Z
2021-01-19T21:16:24Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488...
null
{'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}
{'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}
GHSA
GHSA-9crf-c6qr-r273
Integer division by 0 in `tf.raw_ops.AllToAll`
### Impact The [shape inference code for `AllToAll`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/tpu_cross_replica_ops.cc#L25-L74) can be made to execute a division by 0: ```python import tensorflow as tf @tf.function def func(): return tf.raw_ops.All...
{'CVE-2021-41218'}
2021-11-10T18:52:24Z
2021-11-10T18:52:24Z
MODERATE
5.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41218', 'https://github.com/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
null
{'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
{'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
GHSA
GHSA-v542-8q9x-cffc
Exposure of Sensitive Information to an Unauthorized Actor
Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases t...
{'CVE-2020-35681'}
2021-03-19T21:29:02Z
2021-03-19T21:29:02Z
HIGH
7.4
{'CWE-200'}
{'https://github.com/django/channels/releases', 'https://channels.readthedocs.io/en/stable/releases/index.html', 'https://github.com/advisories/GHSA-v542-8q9x-cffc', 'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35681', 'https://channels...
null
{'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022'}
{'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022'}
GHSA
GHSA-pf8f-w267-mq2h
The rack-cors rubygem may allow directory traveral
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
{'CVE-2019-18978'}
2021-08-18T22:30:22Z
2019-11-15T20:26:59Z
MODERATE
5.3
{'CWE-22'}
{'https://github.com/advisories/GHSA-pf8f-w267-mq2h', 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://www.debian.org/security/2021/dsa-4918', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978', 'https://lis...
null
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}
GHSA
GHSA-9px9-73fg-3fqp
Null pointer dereference in Grappler's `IsConstant`
### Impact Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place): First, during [constant folding](...
{'CVE-2022-23589'}
2022-02-11T20:00:55Z
2022-02-09T23:29:14Z
MODERATE
6.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497', 'https://github....
null
{'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1'}
{'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1'}
GHSA
GHSA-4p8f-mmfj-r45g
Cross-site scripting in fat_free_crm
Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb.
{'CVE-2018-20975'}
2021-08-17T21:11:19Z
2019-08-21T16:15:04Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1', 'https://github.com/advisories/GHSA-4p8f-mmfj-r45g', 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://nvd.nist.gov/vuln/detail...
null
{'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}
{'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}
GHSA
GHSA-qw5h-7f53-xrp6
Stack overflow in `ParseAttrValue` with nested tensors
### Impact The implementation of [`ParseAttrValue`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input. ### Patches We have patched the ...
{'CVE-2021-29615'}
2021-05-21T14:28:45Z
2021-05-21T14:28:45Z
LOW
2.5
{'CWE-674'}
{'https://github.com/advisories/GHSA-qw5h-7f53-xrp6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29615', 'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'}
null
{'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'}
{'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1'}
GHSA
GHSA-86ch-6w7v-v6xf
Denial of Service in soketi
### Impact _What kind of vulnerability is it? Who is impacted?_ There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simp...
{'CVE-2022-21667'}
2022-01-18T22:37:18Z
2022-01-08T00:24:44Z
HIGH
7.5
{'CWE-755'}
{'https://github.com/advisories/GHSA-86ch-6w7v-v6xf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667', 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b', 'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/releases/tag/0.24.1'}
null
{'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'}
{'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'}
GHSA
GHSA-48w2-rm65-62xx
Inconsistent Interpretation of HTTP Requests in puma
### Impact Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. This behavior (forwarding LF characters as line en...
{'CVE-2021-41136'}
2022-04-19T19:03:12Z
2021-10-12T17:53:00Z
LOW
3.7
{'CWE-444'}
{'https://github.com/puma/puma/releases/tag/v5.5.1', 'https://github.com/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma/commit/ac...
null
{'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}
{'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}
GHSA
GHSA-8rc5-hx3v-2jg7
Sanitizer bypass in svg-sanitizer
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
{'CVE-2019-10772'}
2021-08-19T19:25:07Z
2020-02-27T20:36:29Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969', 'https://github.com/advisories/GHSA-8rc5-hx3v-2jg7', 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}
null
{'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}
{'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}
GHSA
GHSA-9qrh-qjmc-5w2p
Denial-of-Service when binding invalid parameters in sqlite3
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade t...
{'CVE-2022-21227'}
2022-05-03T02:24:26Z
2022-04-28T20:25:23Z
HIGH
7.5
{'CWE-248'}
{'https://github.com/TryGhost/node-sqlite3/issues/1440', 'https://github.com/TryGhost/node-sqlite3/issues/1449', 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227', 'https:/...
null
{'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'}
{'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'}
GHSA
GHSA-7fm6-gxqg-2pwr
Code Injection in total.js
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
{'CVE-2021-23389'}
2021-12-10T17:26:06Z
2021-12-10T17:26:06Z
CRITICAL
9.8
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607', 'https://github.com/advisories/GHSA-7fm6-gxqg-2pwr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}
null
{'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}
{'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}
GHSA
GHSA-j7m2-58wv-9v79
Vulnerability in Torpedo Query
Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java.
{'CVE-2019-11343'}
2022-02-10T20:47:29Z
2022-02-10T20:47:29Z
CRITICAL
9.8
null
{'https://github.com/xjodoin/torpedoquery/compare/v2.5.2...v2.5.3', 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343', 'https://github.com/advisories/GHSA-j7m2-58wv-9v79'}
null
{'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'}
{'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'}
GHSA
GHSA-2hxv-mx8x-mcj9
Spina vulnerable to a cross-site request forgery (CSRF) vulnerability
Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75.
{'CVE-2015-4619'}
2022-04-26T18:26:09Z
2018-08-28T22:34:22Z
HIGH
8.8
{'CWE-352'}
{'http://www.securityfocus.com/bid/75216', 'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}
null
{'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}
{'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75'}
GHSA
GHSA-c3m8-x3cg-qm2c
Configuration Override in helmet-csp
Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, po...
null
2021-09-29T18:45:07Z
2020-09-03T20:39:53Z
MODERATE
6.5
null
{'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436', 'https://github.com/advisories/GHSA-c3m8-x3cg-qm2c', 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a', 'https://www.npmjs.com/advisories/1176'}
null
{'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'}
{'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a'}
GHSA
GHSA-m94c-37g6-cjhc
Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.
### Affected packages The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected: * [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) * [Link](https://...
{'CVE-2021-37695'}
2022-02-08T21:01:40Z
2021-08-23T19:42:15Z
HIGH
7.3
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc', 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://github.com/a...
null
{'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58'}
{'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58'}
GHSA
GHSA-7q8g-gpfp-v8gx
Insertion of Sensitive Information into Log File in Apache NiFi
In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially contain...
{'CVE-2020-1942'}
2022-01-06T20:40:58Z
2022-01-06T20:40:58Z
HIGH
7.5
{'CWE-200', 'CWE-532'}
{'https://github.com/advisories/GHSA-7q8g-gpfp-v8gx', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942', 'https://nifi.apache.org/security.html#CVE-2020-1942', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97...
null
{'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b'}
{'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'}
GHSA
GHSA-46j2-xjgp-jrfm
Information disclosure issue in Active Resource
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
{'CVE-2020-8151'}
2021-10-08T19:59:27Z
2020-05-21T21:09:38Z
HIGH
7.5
{'CWE-200', 'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8151', 'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4...
null
{'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'}
{'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e'}
GHSA
GHSA-7f63-h6g3-7cwm
Cross Site Scripting (XSS) in @finastra/ssr-pages
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/2 - https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da...
{'CVE-2022-24717'}
2022-04-19T19:03:25Z
2022-03-01T22:09:25Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/pull/2', 'https://github.com/advisories/GHSA-7f63-h6g3-7cwm...
null
{'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5'}
{'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073'}
GHSA
GHSA-gf2j-f278-xh4v
Division by zero in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero in [`BiasAndClamp` implementation](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75): ```cc inline void BiasAndClamp(float clamp_min, float clamp_ma...
{'CVE-2022-23557'}
2022-02-11T16:11:40Z
2022-02-09T23:47:57Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23557', 'https://github.com/advisories/GHSA-gf2j...
null
{'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209'}
{'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209'}
GHSA
GHSA-m4fw-77v7-924m
Moderate severity vulnerability that affects qutebrowser
qutebrowser version introduced in v0.11.0 (1179ee7a937fb31414d77d9970bac21095358449) contains a Cross Site Scripting (XSS) vulnerability in history command, qute://history page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the ...
{'CVE-2018-1000559'}
2021-09-14T22:12:29Z
2018-09-13T15:47:57Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-m4fw-77v7-924m', 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f', 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000559', 'https://github.com/quteb...
null
{'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7', 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f'}
{'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f', 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7'}
GHSA
GHSA-w8rc-pgxq-x2cj
Negative charge in shopping cart in Shopizer
### Impact Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total. ### Patches Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0 ### Workarounds Without uprading...
{'CVE-2020-11007'}
2022-04-19T19:02:25Z
2020-04-22T20:59:26Z
CRITICAL
6.5
{'CWE-20'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a', 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj', 'https://github.com/advisories/GHSA-w8rc-pgxq-x2cj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'}
GHSA
GHSA-f256-j965-7f32
Possible request smuggling in HTTP/2 due missing validation of content-length
### Impact The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 This is a followup of https://github.com/netty/netty/security/a...
{'CVE-2021-21409'}
2022-04-22T15:50:24Z
2021-03-30T15:10:38Z
MODERATE
5.9
{'CWE-444'}
{'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r101f82d8...
null
{'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'}
{'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'}
GHSA
GHSA-w4fj-ccr6-7pcp
Insertion of Sensitive Information into Log File in Apache NiFi
An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
{'CVE-2020-1928'}
2022-01-06T20:40:56Z
2022-01-06T20:40:56Z
MODERATE
5.3
{'CWE-200', 'CWE-532'}
{'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928', 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567', 'https://nifi.apache.org/security.html#CVE-2020-1928', 'htt...
null
{'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'}
{'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'}
GHSA
GHSA-wjx2-7hqq-8h7m
rails_admin ruby gem XSS vulnerability
RailsAdmin (aka rails_admin) before 1.4.3 and 2.x before 2.0.2 allows XSS via nested forms.
{'CVE-2020-36190'}
2021-01-19T18:16:40Z
2021-01-14T19:17:16Z
MODERATE
0
{'CWE-79'}
{'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_admin/CVE-2020-36190.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36190', 'https://github.com/sferik/rails_admin/blob/master/README.md', 'https://github.com/a...
null
{'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'}
{'https://github.com/sferik/rails_admin/commit/d72090ec6a07c3b9b7b48ab50f3d405f91ff4375'}
GHSA
GHSA-44r7-7p62-q3fr
Insecure generation of random numbers
The miekg Go DNS package before 1.1.25, as used in CoreDNS before 1.6.6 and other products, improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
{'CVE-2019-19794'}
2021-05-18T21:09:13Z
2021-05-18T21:09:13Z
MODERATE
5.9
{'CWE-338', 'CWE-330'}
{'https://github.com/miekg/dns/compare/v1.1.24...v1.1.25', 'https://github.com/advisories/GHSA-44r7-7p62-q3fr', 'https://github.com/miekg/dns/issues/1043', 'https://github.com/miekg/dns/pull/1044', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19794', 'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8...
null
{'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}
{'https://github.com/miekg/dns/commit/8ebf2e419df7857ac8919baa05248789a8ffbf33'}
GHSA
GHSA-57j2-w4cx-62h2
Deeply nested json in jackson-databind
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
{'CVE-2020-36518'}
2022-03-28T19:57:53Z
2022-03-12T00:00:36Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518', 'https://github.com/advisories/GHSA-57j2-w4cx-62h2', 'https://github.com/FasterXML/jackson-databind/issues/2816', 'https://github.com/Fa...
null
{'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}
{'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}
GHSA
GHSA-jc8m-cxhj-668x
Improper Restriction of Excessive Authentication Attempts in Sorcery
### Impact Brute force vulnerability when using password authentication via Sorcery. The brute force protection submodule will prevent a brute force attack for the defined lockout period, but once expired protection will not be re-enabled until a user or malicious actor logs in successfully. This does not affect users ...
{'CVE-2020-11052'}
2022-04-19T19:02:25Z
2020-05-07T21:16:46Z
HIGH
8.3
{'CWE-307'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11052', 'https://github.com/Sorcery/sorcery/issues/231', 'https://github.com/Sorcery/sorcery/pull/235', 'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7', 'https://github.com/advisories/GHSA-jc8m-cxhj-668x', 'https://github.com/Sorcery/sorce...
null
{'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'}
{'https://github.com/Sorcery/sorcery/commit/0f116d223826895a73b12492f17486e5d54ab7a7'}
GHSA
GHSA-m648-33qf-v3gp
CHECK-fail in LSTM with zero-length input in TensorFlow
### Impact Running an LSTM/GRU model where the LSTM/GRU layer receives an input with zero-length results in a `CHECK` failure when using the CUDA backend. This can result in a query-of-death vulnerability, via denial of service, if users can control the input to the layer. ### Patches We have patched the issue in Git...
{'CVE-2020-26270'}
2021-01-07T22:35:25Z
2020-12-10T19:07:31Z
LOW
4.4
{'CWE-20'}
{'https://github.com/advisories/GHSA-m648-33qf-v3gp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m648-33qf-v3gp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26270', 'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3'}
null
{'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3'}
{'https://github.com/tensorflow/tensorflow/commit/14755416e364f17fb1870882fa778c7fec7f16e3'}
GHSA
GHSA-gh6x-4whr-2qv4
Null pointer dereference and heap OOB read in operations restoring tensors
### Impact When restoring tensors via raw APIs, if the tensor name is not provided, TensorFlow can be tricked into dereferencing a null pointer: ```python import tensorflow as tf tf.raw_ops.Restore( file_pattern=['/tmp'], tensor_name=[], default_value=21, dt=tf.int, preferred_shard=1) ``` The same undef...
{'CVE-2021-37639'}
2022-04-26T18:06:27Z
2021-08-25T14:44:05Z
HIGH
8.4
{'CWE-476', 'CWE-125'}
{'https://github.com/advisories/GHSA-gh6x-4whr-2qv4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37639', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh6x-4whr-2qv4', 'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'}
null
{'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'}
{'https://github.com/tensorflow/tensorflow/commit/9e82dce6e6bd1f36a57e08fa85af213e2b2f2622'}
GHSA
GHSA-vhfp-9wvj-gwvg
XML External Entity vulnerability in MODX CMS
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
{'CVE-2020-25911'}
2021-11-03T14:52:00Z
2021-11-01T19:19:43Z
CRITICAL
9.1
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/advisories/GHSA-vhfp-9wvj-gwvg', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md', 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution/issues...
null
{'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'}
{'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'}
GHSA
GHSA-r2j6-p67h-q639
Secret disclosure when containing characters that become URI encoded
### Impact Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. ### Patches Fixed in v17.2.3 ### Workarounds Secrets that do not contain characters that become encoded when included in a URL are already mask...
{'CVE-2020-26226'}
2022-04-19T19:02:39Z
2020-11-18T21:19:14Z
HIGH
8.1
{'CWE-116'}
{'https://github.com/advisories/GHSA-r2j6-p67h-q639', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226', 'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a', 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639'}
null
{'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a'}
{'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a'}
GHSA
GHSA-4vf2-4xcg-65cx
Division by 0 in `Conv2D`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.Conv2D`: ```python import tensorflow as tf input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) filter = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) strides = [1, 1, 1, 1] padding = "SAME" tf.raw_ops....
{'CVE-2021-29526'}
2021-05-21T14:21:55Z
2021-05-21T14:21:55Z
LOW
2.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29526', 'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vf2-4xcg-65cx', 'https://github.com/advisories/GHSA-4vf2-4xcg-65cx'}
null
{'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b'}
{'https://github.com/tensorflow/tensorflow/commit/b12aa1d44352de21d1a6faaf04172d8c2508b42b'}
GHSA
GHSA-cxg7-84wp-8pcq
yetiforcecrm is vulnerable to Business Logic Errors
yetiforcecrm is vulnerable to Business Logic Errors.
{'CVE-2021-4117'}
2022-01-03T15:47:43Z
2021-12-16T21:01:07Z
HIGH
7.7
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117', 'https://github.com/advisories/GHSA-cxg7-84wp-8pcq'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}
GHSA
GHSA-5rg2-6qr5-2xp8
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3863'}
2021-10-25T20:08:18Z
2021-10-21T17:49:18Z
MODERATE
5.5
{'CWE-79'}
{'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://github.com/advisories/GHSA-5rg2-6qr5-2xp8', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'}
null
{'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}
{'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}
GHSA
GHSA-8jpx-m2wh-2v34
Remote Code Execution (RCE) vulnerability in dropwizard-validation
### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expr...
{'CVE-2020-11002'}
2022-04-19T19:02:55Z
2020-04-10T18:42:20Z
HIGH
8
{'CWE-74'}
{'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext', 'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability', 'https://github.com/dropwizard/dropwizard/pull/3209', 'https://github.com/dropwizard/dropwizard/pull/3208', 'h...
null
{'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'}
{'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'}
GHSA
GHSA-6973-94v8-5mgw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-20...
{'CVE-2019-0991'}
2021-03-29T20:57:42Z
2021-03-29T20:57:42Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991', 'https://github.com/advisories/GHSA-6973-94v8-5mgw', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76e...
null
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'}
{'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'}
GHSA
GHSA-q7q9-w24q-cpgh
Cross-site Scripting (XSS) in Apache Ambari Views
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
{'CVE-2020-1936'}
2022-01-06T20:35:22Z
2022-01-06T20:35:22Z
MODERATE
6.1
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2021/03/02/1', 'https://github.com/advisories/GHSA-q7q9-w24q-cpgh', 'https://issues.apache.org/jira/browse/AMBARI-25329', 'https://github.com/apache/ambari/pull/3040', 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210', 'https://nvd...
null
{'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'}
{'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'}
GHSA
GHSA-4rq4-32rv-6wp6
Improper Privilege Management in shelljs
shelljs is vulnerable to Improper Privilege Management
{'CVE-2022-0144'}
2022-01-21T23:37:28Z
2022-01-21T23:37:28Z
HIGH
7.1
{'CWE-269'}
{'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c', 'https://github.com/advisories/GHSA-4rq4-32rv-6wp6'}
null
{'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'}
{'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'}
GHSA
GHSA-wf43-55jj-vwq8
DNS Rebinding in etcd
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
{'CVE-2018-1099'}
2022-04-12T22:12:47Z
2022-02-15T01:57:18Z
MODERATE
5.5
{'CWE-350', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1552717', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraprojec...
null
{'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}
{'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}
GHSA
GHSA-3p3g-vpw6-4w66
Authentication Bypass in hydra
### Impact "When using client authentication method "private_key_jwt" [1], OpenId specification says the following about assertion `jti`:" > A unique identifier for the token, which can be used to prevent reuse of the token. These tokens MUST only be used once, unless conditions for reuse were negotiated between the ...
{'CVE-2020-5300'}
2021-05-27T18:43:22Z
2021-05-27T18:43:22Z
MODERATE
5.8
{'CWE-294'}
{'https://openid.net/specs/openid-connect-core-1_0.html#ClientAuthentication', 'https://github.com/ory/hydra/releases/tag/v1.4.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5300', 'https://github.com/advisories/GHSA-3p3g-vpw6-4w66', 'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3', 'https...
null
{'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}
{'https://github.com/ory/hydra/commit/700d17d3b7d507de1b1d459a7261d6fb2571ebe3'}
GHSA
GHSA-gcv9-6737-pjqw
SSRF vulnerability in jupyter-server-proxy
### Impact **What kind of vulnerability is it?** Server-Side Request Forgery ( SSRF ) **Who is impacted?** Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled. A lack of input validation allowed authenticated clients to proxy requests to other hosts, bypassing the `allowed_hos...
{'CVE-2022-21697'}
2022-04-19T19:03:20Z
2022-01-27T16:24:26Z
MODERATE
6.3
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21697', 'https://github.com/jupyterhub/jupyter-server-proxy/compare/v3.2.0...v3.2.1.patch', 'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/advisories/GHSA-gcv9-6737-pjqw', 'https://github.com/jupyterhub/jupyte...
null
{'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'}
{'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99eb'}
GHSA
GHSA-9vh6-qfv6-vcqp
snipe-IT vulnerable to host header injection
Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker cont...
{'CVE-2022-23064'}
2022-05-03T06:29:50Z
2022-05-03T00:00:43Z
HIGH
8.8
{'CWE-74'}
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://github.com/advisories/GHSA-9vh6-qfv6-vcqp', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064'}
null
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'}
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'}
GHSA
GHSA-gh8j-2pgf-x458
Infinite Loop in rencode
The rencode package through 1.0.6 for Python allows an infinite loop in typecode decoding (such as via ;\x2f\x7f), enabling a remote attack that consumes CPU and memory.
{'CVE-2021-40839'}
2022-02-16T22:03:02Z
2021-09-13T20:05:51Z
HIGH
7.5
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40839', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MCLETLGVM5DBX6QNHQFW6TWGO5T3DENY/', 'https://github.com/advisories/GHSA-gh8j-2pgf-x458', 'https://seclists.org/fulldisclosure/2021/Sep/16', 'https://pypi.org/project/rencod...
null
{'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75'}
{'https://github.com/aresch/rencode/commit/572ff74586d9b1daab904c6f7f7009ce0143bb75'}
GHSA
GHSA-c3xm-pvg7-gh7r
mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs
### Summary runc 1.0.0-rc94 and earlier are vulnerable to a symlink exchange attack whereby an attacker can request a seemingly-innocuous container configuration that actually results in the host filesystem being bind-mounted into the container (allowing for a container escape). CVE-2021-30465 has been assigned for th...
{'CVE-2021-30465'}
2022-04-19T19:02:53Z
2021-05-25T18:44:42Z
HIGH
7.6
{'CWE-367', 'CWE-22'}
{'https://github.com/advisories/GHSA-c3xm-pvg7-gh7r', 'https://github.com/opencontainers/runc/security/advisories/GHSA-c3xm-pvg7-gh7r', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HOARVIT47RULTTFWAU7XBG4WY6TDDHV/', 'https://github.com/opencontainers/runc/commit/0ca91...
null
{'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'}
{'https://github.com/opencontainers/runc/commit/0ca91f44f1664da834bc61115a849b56d22f595f'}
GHSA
GHSA-78cj-fxph-m83p
Regular Expression Denial of Service (ReDoS) in ua-parser-js
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
{'CVE-2021-27292'}
2021-05-06T16:11:13Z
2021-05-06T16:11:13Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27292', 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76', 'https://github.com/advisories/GHSA-78cj-fxph-m83p', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e...
null
{'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566'}
{'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566', 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14'}
GHSA
GHSA-hxxp-6546-wv6r
Improper Restriction of XML External Entity Reference
Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2021-21672'}
2022-04-19T18:25:32Z
2021-07-02T18:36:13Z
MODERATE
4.3
{'CWE-611'}
{'https://github.com/advisories/GHSA-hxxp-6546-wv6r', 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329', 'http://www.openwall.com/lists/oss-security/2021/06/30/1', 'http://www.openwall.com/lists/oss-security/2022/04/14/2', 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4...
null
{'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'}
{'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'}
GHSA
GHSA-p3w3-4ppm-c3f6
Cross site scripting in FacturaScripts
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
{'CVE-2022-1514'}
2022-04-29T21:02:50Z
2022-04-29T00:00:23Z
CRITICAL
9
{'CWE-79'}
{'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://github.com/advisories/GHSA-p3w3-4ppm-c3f6'}
null
{'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}
{'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}
GHSA
GHSA-h56g-v4vp-q9q6
Cross-site Scripting in calibreweb
calibreweb prior to version 0.6.16 contains a cross-site scripting vulnerability.
{'CVE-2022-0352'}
2022-02-10T22:40:43Z
2022-01-29T00:00:41Z
MODERATE
6.1
{'CWE-79'}
{'https://huntr.dev/bounties/a577ff17-2ded-4c41-84ae-6ac02440f717', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0352', 'https://github.com/advisories/GHSA-h56g-v4vp-q9q6', 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'}
null
{'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'}
{'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'}
GHSA
GHSA-qrpm-p2h7-hrv2
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
{'CVE-2021-23566'}
2022-03-18T13:15:56Z
2022-01-21T23:57:06Z
MODERATE
5.5
{'CWE-200'}
{'https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566', 'https://github.com/advisories/GHSA-qrpm-p2h7-hrv2', 'https://github.com/ai/nanoid/pull/328', 'https://snyk.io/vuln/SNYK-JS-NANOID-2332193', 'ht...
null
{'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'}
{'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'}
GHSA
GHSA-44c6-4v22-4mhx
Regular Expression Denial of Service (ReDOS)
npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3795'}
2021-09-20T20:42:25Z
2021-09-20T20:42:25Z
MODERATE
7.5
{'CWE-400'}
{'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7', 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28', 'https://github.com/advisories/GHSA-44c6-4v22-4mhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795'}
null
{'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'}
{'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7'}
GHSA
GHSA-2v7p-f4qm-r5pc
SQL Injection found in Pimcore
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
{'CVE-2022-1429'}
2022-05-03T21:01:42Z
2022-04-23T00:03:03Z
HIGH
7.5
{'CWE-89'}
{'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429', 'https://github.com/advisories/GHSA-2v7p-f4qm-r5pc'}
null
{'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}
{'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}
GHSA
GHSA-4c7m-vv47-7c69
Insecure Permissions in Gogs
In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check.
{'CVE-2020-14958'}
2021-05-18T20:33:05Z
2021-05-18T20:33:05Z
MODERATE
5.3
{'CWE-281'}
{'https://github.com/advisories/GHSA-4c7m-vv47-7c69', 'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c', 'https://github.com/gogs/gogs/pull/5988', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14958'}
null
{'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'}
{'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c'}
GHSA
GHSA-gp4j-w3vj-7299
Information Exposure in RunC
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC sta...
{'CVE-2016-9962'}
2021-12-20T18:21:43Z
2021-12-20T18:21:43Z
MODERATE
6.4
{'CWE-200'}
{'http://seclists.org/fulldisclosure/2017/Jan/29', 'http://seclists.org/fulldisclosure/2017/Jan/21', 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962', 'https://security.gentoo.org/glsa/201701-34', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'https://lists....
null
{'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378'}
{'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5'}
GHSA
GHSA-jc87-6vpp-7ff3
Heap buffer overflow in Tensorflow
### Impact The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel: https://github.com/tensorflo...
{'CVE-2020-15198'}
2021-08-26T15:11:47Z
2020-09-25T18:28:22Z
MODERATE
5.4
{'CWE-119', 'CWE-122'}
{'https://github.com/advisories/GHSA-jc87-6vpp-7ff3', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15198', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
{'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02'}
GHSA
GHSA-vjv6-gq77-3mjw
XXE attack in Mapfish Print
### Impact A user can do to an XML External Entity (XXE) attack with the provided SDL style. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://cwe.mitre.org/data/definitions/611.html * https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e ### F...
{'CVE-2020-15232'}
2021-01-07T23:47:51Z
2020-07-07T16:32:45Z
LOW
9.3
{'CWE-611'}
{'https://github.com/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232', 'https://github.com/mapfish/...
null
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'}
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'}
GHSA
GHSA-x2p8-rgfm-qw3v
Access Control vulnerability within CoreNLP
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
{'CVE-2021-44550'}
2022-03-03T22:07:42Z
2022-02-25T00:01:07Z
CRITICAL
9.8
{'CWE-863'}
{'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87', 'https://github.com/stanfordnlp/CoreNLP/issues/1222', 'https://github.com/advisories/GHSA-x2p8-rgfm-qw3v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550'}
null
{'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}
{'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}
GHSA
GHSA-f3pp-32qc-36w4
Prototype Pollution in jointjs
This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
{'CVE-2021-23444'}
2021-10-04T14:21:41Z
2021-09-22T20:36:34Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/clientIO/joint/pull/1514', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578', 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8', 'https://github.com/advis...
null
{'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8'}
{'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8'}
GHSA
GHSA-cq76-mxrc-vchh
Crash in `tf.math.segment_*` operations
### Impact The implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. ```python import tensorflow as tf tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_min(data=np.ones((...
{'CVE-2021-41195'}
2021-11-10T19:36:50Z
2021-11-10T19:36:50Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/issues/46888', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429', 'https://github.com/tensorflow/te...
null
{'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}
{'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}
GHSA
GHSA-j9cf-pr2x-5273
Prototype Pollution in dot-object
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10793'}
2022-04-19T19:03:24Z
2022-02-09T22:33:31Z
MODERATE
6.3
{'CWE-74'}
{'https://github.com/advisories/GHSA-j9cf-pr2x-5273', 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10793', 'https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905'}
null
{'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'}
{'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'}
GHSA
GHSA-hf79-8hjp-rrvq
Use After Free in lucet
### Impact There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, an...
{'CVE-2021-43790'}
2022-04-19T19:03:16Z
2021-11-30T22:20:36Z
HIGH
8.5
{'CWE-416'}
{'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8', 'https://crates.io/crates/lucet-runtime', 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq', 'https://github.com/advisories/GHSA-hf79-8hjp-rrvq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-437...
null
{'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'}
{'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'}
GHSA
GHSA-6gm7-j668-w6h9
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
{'CVE-2022-1219'}
2022-04-22T20:42:11Z
2022-04-09T00:00:30Z
HIGH
7.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://github.com/advisories/GHSA-6gm7-j668-w6h9', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
null
{'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
{'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
GHSA
GHSA-r8hp-5m7c-jhv4
Cross-site Scripting OrchardCore.Application.Cms.Targets
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
{'CVE-2022-0274'}
2022-01-21T23:08:50Z
2022-01-21T23:08:50Z
MODERATE
6.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0274', 'https://github.com/advisories/GHSA-r8hp-5m7c-jhv4', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
null
{'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
{'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
GHSA
GHSA-v24h-pjjv-mcp6
Denial of service in Tendermint
### Description **Denial of Service 1** Tendermint 0.33.2 and earlier does not limit the number of P2P connection requests. For each p2p connection, Tendermint allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbou...
{'CVE-2020-5303'}
2021-05-27T18:44:09Z
2021-05-27T18:44:09Z
LOW
3.1
{'CWE-789', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5303', 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#denial-of-service-1', 'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd', 'https://github.com/advisories/GHSA-v24h-pjjv-mcp6', 'https://github.com/tendermint/tend...
null
{'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'}
{'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd'}
GHSA
GHSA-vc6r-4x6g-mmqc
Path Traversal in m-server
Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server. ## Recommendation Update to version 1.4.2 or later.
null
2021-08-04T21:07:26Z
2019-06-11T16:16:23Z
MODERATE
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-vc6r-4x6g-mmqc', 'https://hackerone.com/reports/319795', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json', 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a', 'https://www.npmjs.com/advisories/731'}
null
{'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a'}
{'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a'}
GHSA
GHSA-m4hj-wg2r-qpcr
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3776'}
2021-11-17T21:10:57Z
2021-11-15T23:13:34Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-m4hj-wg2r-qpcr', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'}
null
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
GHSA
GHSA-vfp9-gwrh-wq9g
Path Traversal in crud-file-server
Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 0.9.0 or later.
{'CVE-2018-3733'}
2021-01-08T01:57:29Z
2018-07-18T21:20:19Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/1003', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733', 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82', 'https://hackerone.com/reports/310690', 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g'}
null
{'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'}
{'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82'}
GHSA
GHSA-w4xf-2pqw-5mq7
Reference binding to nullptr in `RaggedTensorToVariant`
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`: ```python import tensorflow as tf tf.raw_ops.RaggedTensorToVariant( rt_nested_splits=[], rt_dense_values=[1,2,3], batched_input=True) ``` The [implementation](https://github.com/...
{'CVE-2021-37666'}
2021-08-25T14:42:13Z
2021-08-25T14:42:13Z
HIGH
7.8
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37666', 'https://github.com/advisories/GHSA-w4xf-2pqw-5mq7', 'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7'}
null
{'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'}
{'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'}