ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-f8m6-h2c7-8h9x | Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize) | ### Impact
The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.ht... | {'CVE-2021-43854'} | 2022-04-19T19:03:16Z | 2022-01-06T17:38:45Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341', 'https://github.com/nltk/nltk/issues/2866', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43854', 'https://github.com/advisories/GHSA-f8m6-h2c7-8h9x', 'https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x', 'https://github.com... | null | {'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341'} | {'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341'} |
GHSA | GHSA-jf7h-7m85-w2v2 | Integer overflow in TFLite memory allocation | ### Impact
The TFLite code for allocating `TFLiteIntArray`s is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27):
```cc
int TfLiteIntArrayGetSizeInBytes(int size) {
static TfLiteIntArray dummy;
return... | {'CVE-2021-29605'} | 2021-05-21T14:28:22Z | 2021-05-21T14:28:22Z | HIGH | 7.1 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5', 'https://github.com/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29605'} | null | {'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'} | {'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'} |
GHSA | GHSA-gf8j-v8x5-h9qp | XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes | enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring. | {'CVE-2019-18857'} | 2022-04-19T19:03:23Z | 2020-01-08T17:15:37Z | HIGH | 7.5 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-18857', 'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://github.com/advisories/GHSA-gf8j-v8x5-h9qp'} | null | {'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'} | {'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'} |
GHSA | GHSA-mf79-f657-47ww | Insufficient Session Expiration in Admidio | Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account. | {'CVE-2022-0991'} | 2022-03-29T21:39:04Z | 2022-03-20T00:00:29Z | HIGH | 8.2 | {'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/issues/1238', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://github.com/Admidio/admidio/releases/tag/v4.1.9', 'https:/... | null | {'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'} | {'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'} |
GHSA | GHSA-vrgh-5w3c-ggf8 | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG). | {'CVE-2021-3990'} | 2021-12-03T20:38:50Z | 2021-12-03T20:38:50Z | MODERATE | 6.5 | {'CWE-338'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3990', 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0', 'https://github.com/advisories/GHSA-vrgh-5w3c-ggf8', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'} | null | {'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'} | {'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'} |
GHSA | GHSA-vhm6-gw82-6f8j | Cross site scripting in LibreNMS | LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting. | {'CVE-2022-0772'} | 2022-03-08T18:06:06Z | 2022-02-28T00:00:34Z | MODERATE | 4.8 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://github.com/advisories/GHSA-vhm6-gw82-6f8j', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09'} | null | {'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'} | {'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'} |
GHSA | GHSA-89gv-h8wf-cg8r | Hostname spoofing via backslashes in URL | ### Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect.
Depending on... | {'CVE-2021-3647'} | 2022-04-19T19:03:03Z | 2021-07-19T21:22:36Z | MODERATE | 5.3 | {'CWE-601'} | {'https://github.com/medialize/URI.js/pull/233', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481', 'https://github.com/medialize/URI.js/releases/tag/v1.19.7', 'https://github.com/medialize/URI.js/releases/tag/v1.19.3', 'htt... | null | {'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'} | {'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'} |
GHSA | GHSA-qq3j-xp49-j73f | Plugin archive directory traversal in Helm | The Helm core maintainers have identified an information disclosure
vulnerability in Helm 3.0.0-3.2.3.
### Impact
A traversal attack is possible when installing Helm plugins from a tar
archive over HTTP. It is possible for a malicious plugin author to inject a relative
path into a plugin archive, and copy a file ou... | {'CVE-2020-4053'} | 2022-04-19T19:02:28Z | 2021-06-23T18:14:36Z | LOW | 3.7 | {'CWE-22'} | {'https://github.com/helm/helm/releases/tag/v3.2.4', 'https://github.com/helm/helm/pull/8317', 'https://github.com/advisories/GHSA-qq3j-xp49-j73f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053', 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/security/adv... | null | {'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'} | {'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'} |
GHSA | GHSA-r578-pj6f-r4ff | Auto-merging Person Records Compromised | ### Impact
New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events).
### Patches
We have released ... | {'CVE-2021-32691'} | 2021-06-25T13:13:03Z | 2021-06-21T17:07:47Z | HIGH | 8.8 | {'CWE-287', 'CWE-303'} | {'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32691', 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0', 'https://github.com/advisories/GHSA-r578-pj6f-r4ff', 'https://github.com/ApollosProject/apollos-apps/commit... | null | {'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'} | {'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'} |
GHSA | GHSA-xh55-2fqp-p775 | Command injection in mail agent settings | ### Impact
Command injection in mail agent settings
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2... | {'CVE-2021-37708'} | 2021-08-30T16:14:09Z | 2021-08-30T16:14:09Z | HIGH | 8.8 | {'CWE-77'} | {'https://github.com/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775'} | null | {'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'} | {'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'} |
GHSA | GHSA-w2pm-r78h-4m7v | OS Command Injection in Laravel Framework | OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17. | {'CVE-2020-19316'} | 2022-01-06T23:13:42Z | 2022-01-06T23:13:42Z | HIGH | 8.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/', 'https://github.com/advisories/GHSA-w2pm-r78h-4m7v', 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'} | null | {'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'} | {'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'} |
GHSA | GHSA-9gwq-6cwj-47h3 | Integer overflow in TFLite array creation | ### Impact
An attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60):
```cc
TfLiteIntArray* TfLiteIntArrayCreate(int size) {
int alloc_size = TfLiteI... | {'CVE-2022-23558'} | 2022-02-11T15:08:44Z | 2022-02-09T23:52:24Z | HIGH | 7.6 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23558', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3', 'https://github.com/tensorflow/tensorflow/commit/a1e1511dde... | null | {'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091'} | {'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091'} |
GHSA | GHSA-pq7m-3gw7-gq5x | Execution with Unnecessary Privileges in ipython | We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another.
Proof of concept
User1:
```
mkdir -m 777 /tmp/profile_default
mkdir -m 777 /tmp/profile_default/startup
echo 'print("stealing... | {'CVE-2022-21699'} | 2022-02-16T22:13:05Z | 2022-01-21T18:55:30Z | HIGH | 8.2 | {'CWE-279', 'CWE-269', 'CWE-250'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21699', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/', 'https://github.com/advisories/GHSA-pq7m-3gw7-gq5x', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html', 'https://list... | null | {'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'} | {'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'} |
GHSA | GHSA-mqm2-cgpr-p4m6 | Unintended read access in kramdown gem | The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLa... | {'CVE-2020-14001'} | 2022-04-29T20:26:20Z | 2020-08-07T22:27:41Z | CRITICAL | 9.8 | {'CWE-862'} | {'https://kramdown.gettalong.org/news.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001', 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://security.netapp.com/advisory/n... | null | {'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'} | {'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'} |
GHSA | GHSA-6g3c-2mh5-7q6x | Missing validation of JWT signature in `ManyDesigns/Portofino` | ### Impact
https://github.com/ManyDesigns/Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens.
This allows forging a valid JWT.
### Patches
The issue will be patched in the upcoming 5.2.1 release.
### For more information
If you have any questions or comments about this advisory:
*... | {'CVE-2021-29451'} | 2022-04-19T19:02:53Z | 2021-04-19T14:56:33Z | CRITICAL | 9.1 | {'CWE-347'} | {'https://github.com/advisories/GHSA-6g3c-2mh5-7q6x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451', 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb', 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x', 'https://mvnrepository.com/artifact/com... | null | {'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'} | {'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'} |
GHSA | GHSA-v3f7-j968-4h5f | Division by zero in Tensorflow | ### Impact
The [estimator for the cost of some convolution operations](https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198) can be made to execute a division by 0:
```python
import tensorflow as tf
@tf.function
def... | {'CVE-2022-21725'} | 2022-02-11T17:05:09Z | 2022-02-10T00:15:07Z | MODERATE | 6.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198', 'https://github.com/advisories/GHSA-v3f7-j968-4h5f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f', 'https://nvd.nist.gov/vu... | null | {'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a'} | {'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a'} |
GHSA | GHSA-w534-q4xf-h5v2 | XSS in Mapfish Print relating to JSONP support | ### Impact
A user can use the JSONP support to do a Cross-site scripting.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e
* https://cwe.mitre.org/data/definitions/79.html
### For more information
... | {'CVE-2020-15231'} | 2021-01-07T23:47:27Z | 2020-07-07T16:32:49Z | LOW | 9.3 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15231', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2', 'https://github.com/advisories/GHSA-w534-q4xf-h5v2'} | null | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'} | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'} |
GHSA | GHSA-wgmx-52ph-qqcw | High severity vulnerability that affects qutebrowser | qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access 'qute://*' URLs. A malicious website could exploit this to load a 'qute://settings/set' URL, which then sets 'editor.command' to a bash script, resulting in arbitrary code execution. | {'CVE-2018-10895'} | 2021-09-21T20:42:18Z | 2018-10-10T16:05:23Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660', 'https://github.com/advisories/GHSA-wgmx-52ph-qqcw', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10895'} | null | {'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660'} | {'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660'} |
GHSA | GHSA-87cj-px37-rc3x | OS Command Injection in bikeshed | This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing Inline Tag Command metadata is processed. When an arbitrary OS command is executed, the command output would be included in the HTML output. | {'CVE-2021-23422'} | 2021-08-30T16:25:35Z | 2021-08-30T16:25:35Z | HIGH | 7.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23422', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537646', 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://github.com/advisories/GHSA-87cj-px37-rc3x'} | null | {'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'} | {'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'} |
GHSA | GHSA-f9wg-5f46-cjmw | NextAuth.js default redirect callback vulnerable to open redirects | `next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to... | {'CVE-2022-24858'} | 2022-05-03T02:26:17Z | 2022-04-22T20:49:09Z | MODERATE | 6.1 | {'CWE-290', 'CWE-601'} | {'https://next-auth.js.org/getting-started/upgrade-v4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858', 'https://github.com/advisories/GHSA-f9wg-5f46-cjmw', 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9w... | null | {'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'} | {'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'} |
GHSA | GHSA-8m5h-hrqm-pxm2 | Path traversal in the OWASP Enterprise Security API | ### Impact
The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen... | {'CVE-2022-23457'} | 2022-04-27T21:09:46Z | 2022-04-27T21:09:43Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md', 'https://github.com/advisories/GHSA-8m5h-hrqm-pxm2', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://github.com/ESAPI/e... | null | {'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'} | {'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'} |
GHSA | GHSA-8x44-pwr2-rgc6 | Cross-site Scripting in pimcore | Pimcore settings module is vulnerable to stored cross site scripting | {'CVE-2022-0348'} | 2022-02-03T19:56:46Z | 2022-01-28T23:05:03Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/advisories/GHSA-8x44-pwr2-rgc6', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4'} | null | {'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'} | {'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'} |
GHSA | GHSA-f54p-f6jp-4rhr | Heap OOB in `FusedBatchNorm` kernels | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/fused_batch_norm_op.cc#L1292) of `FusedBatchNorm` kernels is vulnerable to a heap OOB:
```python
import tensorflow as tf
tf.raw_ops.FusedBatchNormGrad(
y_backprop=tf.con... | {'CVE-2021-41223'} | 2021-11-10T18:46:52Z | 2021-11-10T18:46:52Z | HIGH | 7.1 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41223', 'https://github.com/advisories/GHSA-f54p-f6jp-4rhr', 'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr'} | null | {'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda'} | {'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda'} |
GHSA | GHSA-23hm-7w47-xw72 | Out of bounds read in Tensorflow | ### Impact
The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses:
```python
import tensorflow as tf
@tf.function
def... | {'CVE-2022-21726'} | 2022-02-10T00:15:47Z | 2022-02-09T18:28:54Z | HIGH | 8.1 | {'CWE-125'} | {'https://github.com/advisories/GHSA-23hm-7w47-xw72', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21726', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w4... | null | {'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'} | {'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'} |
GHSA | GHSA-fpm5-vv97-jfwg | Uncontrolled Resource Consumption in firebase | This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. | {'CVE-2020-7765'} | 2021-05-18T01:57:24Z | 2021-05-18T01:57:24Z | MODERATE | 5.3 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324', 'https://github.com/advisories/GHSA-fpm5-vv97-jfwg', 'https://github.com/firebase/firebase-js-sdk/pull/4001', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7765', 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'} | null | {'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'} | {'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'} |
GHSA | GHSA-3xh2-74w9-5vxm | Integer overflow in github.com/gorilla/websocket | An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections. | {'CVE-2020-27813'} | 2021-05-18T21:08:02Z | 2021-05-18T21:08:02Z | HIGH | 7.5 | {'CWE-400', 'CWE-190'} | {'https://github.com/gorilla/websocket/pull/537', 'https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh', 'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html', 'https://github.com/advisories/G... | null | {'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'} | {'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'} |
GHSA | GHSA-73rg-x683-m3qw | Buffer overflow in canvas | A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image. | {'CVE-2020-8215'} | 2021-05-07T16:05:16Z | 2021-05-07T16:05:16Z | HIGH | 8.8 | {'CWE-120'} | {'https://hackerone.com/reports/315037', 'https://www.npmjs.com/package/canvas', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215', 'https://github.com/advisories/GHSA-73rg-x683-m3qw'} | null | {'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} | {'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} |
GHSA | GHSA-p23j-g745-8449 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366. | {'CVE-2019-1335'} | 2021-03-29T20:55:40Z | 2021-03-29T20:55:40Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/advisories/GHSA-p23j-g745-8449', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-133... | null | {'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'} | {'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} |
GHSA | GHSA-q85f-69q7-55h2 | Uninitialized variable access in Tensorflow | ### Impact
The [implementation of `AssignOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143) can result in copying unitialized data to a new tensor. This later results in undefined behavior.
The implementation has a check that the le... | {'CVE-2022-23573'} | 2022-02-11T20:47:00Z | 2022-02-09T23:26:50Z | HIGH | 7.6 | {'CWE-908'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143', 'https://github.com/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/commi... | null | {'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'} | {'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'} |
GHSA | GHSA-7h8v-2v8x-h264 | SQL Injection in moodle | In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10. | {'CVE-2020-25700'} | 2021-03-29T20:42:19Z | 2021-03-29T20:42:19Z | MODERATE | 6.5 | {'CWE-89'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1895427', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=4139... | null | {'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'} | {'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'} |
GHSA | GHSA-6xxj-gcjq-wgf4 | SQL injection in prestashop/prestashop | ### Impact
Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters
### Patches
The problem is fixed in 1.7.8.2 | {'CVE-2021-43789'} | 2022-04-19T19:03:16Z | 2021-12-07T21:23:17Z | HIGH | 7.5 | {'CWE-89'} | {'https://github.com/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.com/PrestaShop/PrestaShop/issues/26623', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://... | null | {'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'} | {'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'} |
GHSA | GHSA-w8cj-mvf9-mpc9 | OS Command injection in Bolt | Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance. | {'CVE-2020-28925'} | 2021-05-06T18:53:29Z | 2021-05-06T18:53:29Z | MODERATE | 5.3 | {'CWE-78'} | {'https://github.com/bolt/bolt/compare/3.7.1...3.7.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a', 'https://github.com/advisories/GHSA-w8cj-mvf9-mpc9'} | null | {'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'} | {'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'} |
GHSA | GHSA-3q6g-vf58-7m4g | Regular Expression Denial of Service in flask-restx | Flask RESTX contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service) in `email_regex`.
| {'CVE-2021-32838'} | 2022-04-19T19:03:07Z | 2021-09-08T15:41:15Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/advisories/GHSA-3q6g-vf58-7m4g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32838', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/', 'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed7... | null | {'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da'} | {'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da'} |
GHSA | GHSA-32wx-4gxx-h48f | Users can edit the tags of any discussion | This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020.
### Impact
This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API.
Users were able to remove any existing tag, and add any tag in which they ... | null | 2022-04-19T19:02:36Z | 2021-01-29T18:13:32Z | MODERATE | 0 | {'CWE-639'} | {'https://github.com/flarum/core/issues/2355', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://github.com/advisories/GHSA-32wx-4gxx-h48f', 'https://packagist.org/packages/flarum/tags', 'https://github.com... | null | {'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'} | {'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'} |
GHSA | GHSA-f545-vpwp-r9j7 | showdoc is vulnerable to URL Redirection to Untrusted Site | showdoc is vulnerable to URL Redirection to Untrusted Site. | {'CVE-2021-3989'} | 2021-12-03T20:41:35Z | 2021-12-03T20:41:35Z | MODERATE | 6.1 | {'CWE-601'} | {'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989', 'https://github.com/advisories/GHSA-f545-vpwp-r9j7', 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'} | null | {'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'} | {'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'} |
GHSA | GHSA-gcj7-j438-hjj2 | Smokescreen SSRF via deny list bypass | The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure.
Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. Ther... | {'CVE-2022-24825'} | 2022-04-28T19:13:16Z | 2022-04-07T22:10:22Z | MODERATE | 5.8 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24825', 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2', 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b', 'https://github.com/advisories/GHSA-gcj7-j438-hjj2'} | null | {'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'} | {'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'} |
GHSA | GHSA-8c89-2vwr-chcq | Heap buffer overflow in `QuantizedResizeBilinear` | ### Impact
An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization:
```python
import tensorflow as tf
images = tf.constant([], shape=[0], dtype=tf.qint32)
size = tf.constant([], shape=[0], dtype=tf.int32)
min = tf.constant([], dtype=tf.float32)
... | {'CVE-2021-29537'} | 2021-05-21T14:22:35Z | 2021-05-21T14:22:35Z | LOW | 2.5 | {'CWE-131', 'CWE-787'} | {'https://github.com/advisories/GHSA-8c89-2vwr-chcq', 'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29537'} | null | {'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'} | {'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'} |
GHSA | GHSA-7638-r9r3-rmjj | chroot isolation: environment value leakage to intermediate processes | ### Impact
When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environm... | {'CVE-2021-3602'} | 2022-03-18T21:03:35Z | 2021-07-19T15:19:09Z | MODERATE | 5.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-7638-r9r3-rmjj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602', 'https://ubuntu.com/security/CVE-2021-3602', 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj', 'https://github.com/containers/buil... | null | {'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'} | {'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'} |
GHSA | GHSA-4pwq-fj89-6rjc | Cross-site Scripting in Apache Airflow | In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. | {'CVE-2020-13944'} | 2021-06-18T18:29:54Z | 2021-06-18T18:29:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944', 'http://www.ope... | null | {'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'} | {'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'} |
GHSA | GHSA-f8h4-7rgh-q2gm | Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord` | ### Impact
The implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault:
```python
import tensorflow as tf
dataset = tf.data.Dataset.range(3)
dataset = tf.data.experimental.to_variant(dataset)
tf.raw_ops.ExperimentalDatase... | {'CVE-2021-37650'} | 2021-08-25T14:43:24Z | 2021-08-25T14:43:24Z | HIGH | 7.8 | {'CWE-787', 'CWE-120'} | {'https://github.com/advisories/GHSA-f8h4-7rgh-q2gm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37650', 'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'} | null | {'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'} | {'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'} |
GHSA | GHSA-pmcr-2rhp-36hr | SQL injection in github.com/navidrome/navidrome | model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords)... | {'CVE-2022-23857'} | 2022-01-27T16:23:02Z | 2022-01-27T16:23:02Z | MODERATE | 0 | {'CWE-89'} | {'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857', 'https://github.com/advisories/GHSA-pmcr-2rhp-36hr', 'https://github.com/navidrome/navidrome/releases/tag/v0.47.5'} | null | {'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'} | {'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'} |
GHSA | GHSA-8fvr-5rqf-3wwh | Information Exposure in Docker Engine | Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image. | {'CVE-2015-3630'} | 2022-04-12T22:39:05Z | 2022-02-15T01:57:18Z | HIGH | 8.4 | {'CWE-285'} | {'https://github.com/advisories/GHSA-8fvr-5rqf-3wwh', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://groups.google.com/f... | null | {'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'} | {'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'} |
GHSA | GHSA-jqfh-8hw5-fqjr | Improper Handling of Exceptional Conditions in detect-character-encoding | ### Impact
In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash.
### Patches
The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:... | {'CVE-2021-39157'} | 2022-04-19T19:03:06Z | 2021-08-25T14:44:48Z | HIGH | 7.5 | {'CWE-755'} | {'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a', 'https://github.com/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39157', 'https://github.com/sonicdoe/dete... | null | {'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a'} | {'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a'} |
GHSA | GHSA-5fvx-5p2r-4mvp | Open Redirect in firefly-iii | firefly-iii is vulnerable to URL Redirection to Untrusted Site | {'CVE-2021-3851'} | 2021-10-25T20:08:27Z | 2021-10-21T17:48:41Z | MODERATE | 5 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3851', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://github.com/advisories/GHSA-5fvx-5p2r-4mvp', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'} | {'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'} |
GHSA | GHSA-qgmg-gppg-76g5 | Inefficient Regular Expression Complexity in validator.js | validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3765'} | 2021-11-03T17:34:45Z | 2021-11-03T17:34:45Z | MODERATE | 5.3 | {'CWE-1333'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1', 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9', 'https://github.com/advisories/GHSA-qgmg-gppg-76g5'} | null | {'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'} | {'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'} |
GHSA | GHSA-5f2r-qp73-37mr | `CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow | ### Impact
The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger... | {'CVE-2022-23579'} | 2022-02-11T20:39:08Z | 2022-02-10T00:33:29Z | MODERATE | 6.5 | {'CWE-617'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23579', 'https://github.com/advisories/GHSA-5f2r-qp73-37mr', 'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers... | null | {'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662'} | {'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662'} |
GHSA | GHSA-mvg9-xffr-p774 | Out of bounds read in Pillow | An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries. | {'CVE-2021-25291'} | 2021-12-02T15:31:14Z | 2021-03-29T16:35:57Z | HIGH | 7.5 | {'CWE-125'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/advisories/GHSA-mvg9-xffr-p774', 'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a', 'https://security.gentoo.org/glsa/202107-33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25291'} | null | {'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a'} | {'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a'} |
GHSA | GHSA-5gqf-456p-4836 | Reference binding to nullptr in `SdcaOptimizer` | ### Impact
The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer:
```python
import tensorflow as tf
sparse_example_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)]
sparse_feature_indices = [tf.constant([], shape=[0, 0, 0, 0], dty... | {'CVE-2021-29572'} | 2021-05-21T14:25:31Z | 2021-05-21T14:25:31Z | LOW | 2.5 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb', 'https://github.com/advisories/GHSA-5gqf-456p-4836', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29572'} | null | {'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'} | {'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'} |
GHSA | GHSA-34hv-f45p-4qfq | Open redirect in wwbn/avideo | Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository. | {'CVE-2022-27463'} | 2022-04-19T14:13:44Z | 2022-04-06T00:01:29Z | MODERATE | 6.1 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-27463', 'https://avideo.tube/', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c', 'https://github.com/advisories/GHSA-34hv-f45p-4qfq'} | null | {'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'} | {'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'} |
GHSA | GHSA-7p8f-8hjm-wm92 | Lookup operations do not take into account wildcards in SpiceDB | ### Impact
Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side o... | {'CVE-2022-21646'} | 2022-04-19T19:03:19Z | 2022-01-13T15:05:41Z | HIGH | 8.1 | {'CWE-155', 'CWE-20'} | {'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970', 'https://github.com/advisories/GHSA-7p8f-8hjm-wm92', 'https://github.com/authzed/spicedb/issues/358', 'https://github.com/authzed/spicedb/releases/tag/v1.4.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21646', 'https://github.com/au... | null | {'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970'} | {'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970'} |
GHSA | GHSA-gx5w-rrhp-f436 | XSS in mdBook | > This is a cross-post of [the official security advisory][ml]. The official post contains a signed version with our PGP key, as well.
[ml]: https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0
The Rust Security Response Working Group was recently notified of a security issue affecting the search... | {'CVE-2020-26297'} | 2022-04-19T19:02:44Z | 2021-08-25T20:56:20Z | HIGH | 8.2 | {'CWE-79'} | {'https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26297', 'https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0', 'https://rustsec.org/advisories/RUSTSEC-2021-0001.html', 'https://github.com/advisories/GHSA-gx5w-rrhp-f436', 'https... | null | {'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'} | {'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'} |
GHSA | GHSA-pqm6-cgwr-x6pf | Signature validation bypass in XmlSecLibs | Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message. | {'CVE-2019-3465'} | 2021-08-18T22:14:39Z | 2019-11-08T20:06:46Z | HIGH | 8.8 | {'CWE-347'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html', 'https://lists.fedorapro... | null | {'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'} | {'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'} |
GHSA | GHSA-4hq8-gmxx-h6w9 | XML Processing error in github.com/crewjam/saml | ### Impact
There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator)
### Patches
In version 0.4.3, all XML input is validate... | {'CVE-2020-27846'} | 2021-06-23T17:29:42Z | 2021-06-23T17:29:42Z | HIGH | 9.8 | {'CWE-287', 'CWE-115'} | {'https://github.com/advisories/GHSA-4hq8-gmxx-h6w9', 'https://security.netapp.com/advisory/ntap-20210205-0002/', 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846', 'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053... | null | {'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'} | {'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'} |
GHSA | GHSA-6h88-qjpv-p32m | OpenSSL gem for Ruby using inadequate encryption strength | The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism. | {'CVE-2016-7798'} | 2022-04-25T16:33:58Z | 2017-10-24T18:33:35Z | HIGH | 7.5 | {'CWE-326'} | {'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'https://www.debian.org/security/2017/dsa-3966', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'https://github.com/ruby/openssl/issues/49', 'http://www.openwall.com/lists/oss-security/2016/09/30/6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-... | null | {'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'} | {'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'} |
GHSA | GHSA-4gw3-8f77-f72c | Regular expression denial of service in codemirror | This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2.
The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the r... | {'CVE-2020-7760'} | 2022-04-22T17:20:51Z | 2021-05-10T18:46:27Z | MODERATE | 5.3 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760', 'https://www.npmjs.com/package/codemirror', 'https://www.oracle.com/security-alerts/... | null | {'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb'} | {'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb'} |
GHSA | GHSA-vmjw-c2vp-p33c | Crash in NMS ops caused by integer conversion to unsigned | ### Impact
An attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0:
```python
import tensorflow as tf
tf.raw_ops.NonMaxSuppressionV5(
boxes=[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]],
scores=[1.0,2.0,3.0],
max_outpu... | {'CVE-2021-37669'} | 2021-08-25T14:42:03Z | 2021-08-25T14:42:03Z | MODERATE | 5.5 | {'CWE-681'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37669', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d', 'https://github.com/advisories/GHSA-vmjw-c2vp-p33c', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d', 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58'} | {'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'} |
GHSA | GHSA-hg2p-2cvq-4ppv | Cross-site scripting in lazysizes | lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: data-vimeo, data-vimeoparams, data-youtube and data-ytparams which can be abused to inject malicious JavaScript. | {'CVE-2020-7642'} | 2021-12-10T20:06:23Z | 2021-12-10T20:06:23Z | LOW | 5.4 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144', 'https://github.com/advisories/GHSA-hg2p-2cvq-4ppv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642', 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'} | null | {'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'} | {'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'} |
GHSA | GHSA-w749-p3v6-hccq | Possible code injection vulnerability in Rails / Active Storage | The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally... | {'CVE-2022-21831'} | 2022-04-19T19:03:27Z | 2022-03-08T21:25:54Z | HIGH | 0 | {'CWE-94'} | {'https://github.com/advisories/GHSA-w749-p3v6-hccq', 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://rubysec.com/advisories/CVE-2022-21831/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI'} | null | {'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'} | {'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'} |
GHSA | GHSA-3fw8-66wf-pr7m | methodOverride Middleware Reflected Cross-Site Scripting in connect | Connect is a stack of middleware that is executed in order in each request.
The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override".
Because the user post input was not checked, req.method could con... | {'CVE-2013-7370'} | 2021-04-07T19:56:51Z | 2020-08-31T22:41:27Z | LOW | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-7370', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135', 'https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://github.com/sencha... | null | {'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'} | {'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'} |
GHSA | GHSA-7c82-mp33-r854 | Cross-site scripting in bootstrap-select | bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser. | {'CVE-2019-20921'} | 2021-05-07T16:47:54Z | 2021-05-07T16:47:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1522', 'https://github.com/advisories/GHSA-7c82-mp33-r854', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921', 'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://github.com/snapappointments/bootstrap-select... | null | {'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767'} | {'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767'} |
GHSA | GHSA-4mv4-gmmf-q382 | Cross-Site Scripting in datatables | Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php.
## Recommendation
Update to a version greater than 1.10.8. | {'CVE-2015-6584'} | 2021-09-23T19:26:59Z | 2020-08-31T22:42:29Z | HIGH | 0 | {'CWE-79'} | {'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/', 'http://www.securityfocus.com/archive/1/536437/100/0/threaded', 'https://www.npmjs.com/advisories/5', 'http://seclists.org/fulldisclosure/2015/Sep/37', 'https://github.com/advisories/GHSA-4mv4-gmmf-q382', 'https://github.com/DataTa... | null | {'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d'} | {'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d'} |
GHSA | GHSA-68v9-3jjq-rvp4 | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly v... | {'CVE-2021-32716'} | 2021-09-08T18:00:40Z | 2021-09-08T18:00:40Z | MODERATE | 4.4 | {'CWE-200'} | {'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb', 'https://github.com/advisories/GHSA-68v9-3jjq-rvp4', 'https://docs.shopware.com/en/shopware-6-en/sec... | null | {'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'} | {'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'} |
GHSA | GHSA-3f99-hvg4-qjwj | Insecure random number generation in keypair | ## Description and Impact
A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging t... | {'CVE-2021-41117'} | 2022-04-19T19:03:11Z | 2021-10-11T17:09:05Z | HIGH | 8.7 | {'CWE-335'} | {'https://github.com/juliangruber/keypair/releases/tag/v1.0.4', 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj', 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/', 'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18', 'https://nvd.... | null | {'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18'} | {'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18'} |
GHSA | GHSA-ch4f-829c-v5pw | Division by 0 in `ResourceScatterDiv` | ### Impact
The implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error:
```python
import tensorflow as tf
v= tf.Variable([1,2,3])
tf.raw_ops.ResourceScatterDiv(
resource=v.handle,
indices=[1],
updates=[0])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8... | {'CVE-2021-37642'} | 2021-08-25T14:43:56Z | 2021-08-25T14:43:56Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37642', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw', 'https://github.com/advisories/GHSA-ch4f-829c-v5pw'} | null | {'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'} | {'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'} |
GHSA | GHSA-hxcc-f52p-wc94 | Insecure serialization leading to RCE in serialize-javascript | serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js".
An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires t... | {'CVE-2020-7660'} | 2021-09-23T18:51:00Z | 2020-08-11T17:21:13Z | HIGH | 8.1 | {'CWE-502'} | {'https://github.com/advisories/GHSA-hxcc-f52p-wc94', 'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'} | null | {'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'} | {'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'} |
GHSA | GHSA-6wrh-279j-6hvw | HTTP caching is marking private HTTP headers as public in Shopware | ### Impact
HTTP caching is marking private HTTP headers as public
## Patches
Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older v... | {'CVE-2022-24747'} | 2022-03-18T20:15:07Z | 2022-03-10T17:55:21Z | MODERATE | 6.3 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw', 'https://gith... | null | {'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'} | {'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'} |
GHSA | GHSA-9hx8-2mrv-r674 | Deserialization of Untrusted Data in Apache jUDDI | Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services.
RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized obje... | {'CVE-2021-37578'} | 2021-08-31T21:02:02Z | 2021-08-09T20:41:37Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/advisories/GHSA-9hx8-2mrv-r674', 'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E', 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f', 'http://www.openwall.com/lists/oss-security/2021/07/... | null | {'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'} | {'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'} |
GHSA | GHSA-hgpf-97c5-74fc | Regular expression denial of service in @absolunet/kafe | This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails. | {'CVE-2020-7761'} | 2021-05-10T19:08:29Z | 2021-05-10T19:08:29Z | MODERATE | 5.3 | {'CWE-400'} | {'https://www.npmjs.com/package/@absolunet/kafe', 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857', 'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761', 'https://... | null | {'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0#diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857'} | {'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0#diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857'} |
GHSA | GHSA-fqq2-xp7m-xvm8 | Data race in ruspiro-singleton | `Singleton<T>` is meant to be a static object that can be initialized lazily. In
order to satisfy the requirement that `static` items must implement `Sync`,
`Singleton` implemented both `Sync` and `Send` unconditionally.
This allows for a bug where non-`Sync` types such as `Cell` can be used in
singletons and cause da... | {'CVE-2020-36435'} | 2021-08-25T20:58:19Z | 2021-08-25T20:58:19Z | HIGH | 8.1 | {'CWE-119', 'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0115.html', 'https://github.com/RusPiRo/ruspiro-singleton/pull/11', 'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36435', 'https://github.com/RusPiRo/ruspiro-singleton/issues/10', '... | null | {'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'} | {'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'} |
GHSA | GHSA-q6w2-89hq-hq27 | Cross-site scripting in keycloak | A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidential... | {'CVE-2021-20195'} | 2021-06-08T23:02:43Z | 2021-06-08T23:02:43Z | CRITICAL | 9.6 | {'CWE-20', 'CWE-79'} | {'https://github.com/advisories/GHSA-q6w2-89hq-hq27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195', 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'} | null | {'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'} | {'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'} |
GHSA | GHSA-9pq7-rcxv-47vq | Incorrect Regular Expression in RestSharp | RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server ... | {'CVE-2021-27293'} | 2021-07-15T20:24:44Z | 2021-07-14T19:10:01Z | HIGH | 7.5 | {'CWE-697', 'CWE-185'} | {'https://restsharp.dev/', 'https://github.com/advisories/GHSA-9pq7-rcxv-47vq', 'https://github.com/restsharp/RestSharp/issues/1556', 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293'} | null | {'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'} | {'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'} |
GHSA | GHSA-h6rj-8r3c-9gpj | bson is vulnerable to denial of service due to incorrect regex validation | BSON injection vulnerability in the legal? function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string. | {'CVE-2015-4412'} | 2022-04-25T22:35:30Z | 2018-03-05T19:43:21Z | CRITICAL | 9.8 | {'CWE-400'} | {'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://www.securityfocus.com/bid/75045', 'https://github.com/mongodb/bson... | null | {'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'} | {'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'} |
GHSA | GHSA-3fc5-9x9m-vqc4 | Privilege Escalation in express-cart | Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users.
## Recommendation
Update to version 1.1.6 or later. | null | 2021-08-04T21:25:59Z | 2019-06-03T17:31:32Z | CRITICAL | 9.8 | null | {'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b', 'https://hackerone.com/reports/343626', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json', 'https://snyk.io/vuln/npm:express-cart:20180712', 'https://github.com/advisories/GHSA-3fc5-9x9m-vqc4', 'https://www.n... | null | {'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'} | {'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'} |
GHSA | GHSA-h8hx-2c5r-32cf | Cross-Site Request Forgery (CSRF) in trestle-auth | ### Impact
A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials.
### Pa... | {'CVE-2021-29435'} | 2022-04-19T19:02:54Z | 2021-04-13T17:01:50Z | HIGH | 8.1 | {'CWE-352'} | {'https://rubygems.org/gems/trestle-auth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://github.com/advisories/GHSA-h8hx-2c5r-32cf', 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf', 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3... | null | {'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'} | {'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'} |
GHSA | GHSA-6g6m-m6h5-w9gf | Authorization bypass in express-jwt | ### Overview
Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration.
When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass.
### Am I affected?
You are affected by this vulnerabil... | {'CVE-2020-15084'} | 2021-01-07T23:49:23Z | 2020-06-30T16:05:24Z | HIGH | 7.7 | {'CWE-285'} | {'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef', 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15084', 'https://github.com/advisories/GHSA-6g6m-m6h5-w9gf'} | null | {'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef'} | {'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef'} |
GHSA | GHSA-742w-89gc-8m9c | containerd v1.2.x can be coerced into leaking credentials during image pull | ## Impact
If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the defa... | {'CVE-2020-15157'} | 2022-04-19T19:02:37Z | 2022-02-11T23:27:39Z | MODERATE | 6.1 | {'CWE-522'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15157', 'https://github.com/advisories/GHSA-742w-89gc-8m9c', 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726', 'https://www.debian.org/security/2021/dsa-4865', 'https://usn.ubuntu.com/4589-1/', 'https://github.com/containerd/container... | null | {'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'} | {'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'} |
GHSA | GHSA-gm9x-q798-hmr4 | Command Injection in git-tags-remote | All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled.
T... | null | 2021-09-23T17:26:33Z | 2020-07-29T14:53:40Z | HIGH | 7.2 | {'CWE-78'} | {'https://github.com/advisories/GHSA-gm9x-q798-hmr4', 'https://github.com/sh0ji/git-tags-remote/issues/58', 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c', 'https://www.npmjs.com/advisories/1517'} | null | {'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'} | {'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'} |
GHSA | GHSA-pmw4-jgxx-pcq9 | File System Bounds Escape | ### Impact
Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`.
### Background
When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allow... | {'CVE-2020-26299'} | 2022-04-19T19:02:43Z | 2021-02-10T18:11:34Z | MODERATE | 0 | {'CWE-22'} | {'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/issues/225', 'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3', 'https://github.com/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/pull/224'... | null | {'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3'} | {'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3'} |
GHSA | GHSA-rfcf-m67m-jcrq | Authentication granted to all firewalls instead of just one | Description
-----------
When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on ... | {'CVE-2021-32693'} | 2022-04-19T19:03:00Z | 2021-06-21T17:03:44Z | HIGH | 6.8 | {'CWE-287'} | {'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://github.com/advisories/GHSA-rfcf-m67m-jcrq', 'https://github.com/symfony/symfon... | null | {'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'} | {'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'} |
GHSA | GHSA-qv8q-v995-72gr | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerabili... | null | 2020-09-09T17:29:38Z | 2020-09-09T17:29:38Z | LOW | 0 | null | {'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/advisories/GHSA-qv8q-v995-72gr', 'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr'} | null | {'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'} | {'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'} |
GHSA | GHSA-hcxx-mp6g-6gr9 | Opencast publishes global system account credentials | The issue was mostly mitigated before, drastically reducing the risk. See references below for more information.
### Impact
Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials,... | {'CVE-2018-16153'} | 2022-04-19T19:03:17Z | 2021-12-14T21:43:48Z | LOW | 0 | {'CWE-200', 'CWE-522'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9', 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106', 'https://github.com/advisories/GHSA-hcxx-mp6g-6gr9'} | null | {'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'} | {'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'} |
GHSA | GHSA-gg2g-m5wc-vccq | Rebuild-bot workflow may allow unauthorised repository modifications | ### Impact
`projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type... | {'CVE-2021-21423'} | 2021-04-16T22:53:31Z | 2021-04-06T18:36:40Z | HIGH | 9.4 | {'CWE-527'} | {'https://github.com/advisories/GHSA-gg2g-m5wc-vccq', 'https://www.npmjs.com/package/projen', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423', 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643', 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'} | null | {'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'} | {'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'} |
GHSA | GHSA-j77r-2fxf-5jrw | Improper path handling in kustomization files allows path traversal | The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can le... | {'CVE-2022-24877'} | 2022-05-05T21:49:52Z | 2022-05-04T18:04:07Z | CRITICAL | 9.9 | {'CWE-22'} | {'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a', 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw', 'https://github.com/advisories/GHSA-j77r-2fxf-5jrw'} | null | {'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a'} | {'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a'} |
GHSA | GHSA-c4w7-xm78-47vh | Prototype Pollution in y18n | ### Overview
The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution.
### POC
```
const y18n = require('y18n')();
y18n.setLocale('__proto__');
y18n.updateLocale({polluted: true});
console.log(polluted); // true
```
### Recommendation
Upgrade to version 3.2.2, 4.0.1, 5... | {'CVE-2020-7774'} | 2022-04-20T19:14:19Z | 2021-03-29T16:05:12Z | HIGH | 7.3 | {'CWE-20', 'CWE-915'} | {'https://github.com/advisories/GHSA-c4w7-xm78-47vh', 'https://github.com/yargs/y18n/pull/108', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306', 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25', 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887', 'https://cert-portal.siemens.com/productce... | null | {'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25'} | {'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25'} |
GHSA | GHSA-jff3-mwp3-f8cw | Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem has been fixed in version 2.1.1... | {'CVE-2021-21360'} | 2022-04-19T19:02:49Z | 2021-03-09T00:38:31Z | LOW | 0 | {'CWE-200'} | {'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://pypi.org/project/Products.GenericSetup/', 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360', 'https://github.com/zopefoundation/Products.GenericSetup/co... | null | {'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'} | {'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'} |
GHSA | GHSA-79qm-h35f-hr77 | OS Command Injection in compile-sass | compile-sass prior to 1.0.5 allows execution of arbritary commands. The function "setupCleanupOnExit(cssPath)" within "dist/index.js" is executed as part of the "rm" command without any sanitization. | {'CVE-2019-10799'} | 2022-01-04T19:50:38Z | 2021-04-13T15:23:13Z | HIGH | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-79qm-h35f-hr77', 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2', 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799', 'https://snyk.io/vuln/SNYK-JS-RPI-548942'} | null | {'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'} | {'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'} |
GHSA | GHSA-r64m-qchj-hrjp | Webcache Poisoning in shopware/platform and shopware/core | ### Impact
Webcache Poisoning via X-Forwarded-Prefix and sub-request
### Patches
We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
Workarounds
For older version... | null | 2021-11-24T20:05:19Z | 2021-11-24T20:05:19Z | CRITICAL | 0 | {'CWE-444'} | {'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp', 'https://github.com/advisories/GHSA-r64m-qchj-hrjp'} | null | {'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'} | {'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'} |
GHSA | GHSA-fxp8-7h5w-h235 | XSS in search engine | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine. | {'CVE-2019-13234'} | 2021-08-18T22:27:15Z | 2019-11-12T22:58:11Z | MODERATE | 6.1 | {'CWE-79'} | {'https://aetsu.github.io/OpenCms', 'https://github.com/advisories/GHSA-fxp8-7h5w-h235', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'} | null | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} |
GHSA | GHSA-crp2-qrr5-8pq7 | containerd CRI plugin: Insecure handling of image volumes | ### Impact
A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kub... | {'CVE-2022-23648'} | 2022-03-29T19:11:09Z | 2022-03-02T21:33:17Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/containerd/containerd/releases/tag/v1.4.13', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70', 'https://github.com/advisories... | null | {'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'} | {'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'} |
GHSA | GHSA-m57p-p67h-mq74 | Command Injection Vulnerability in systeminformation | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency()
### For more information
If you have any q... | {'CVE-2020-26274'} | 2020-12-17T01:41:17Z | 2020-12-16T19:25:00Z | MODERATE | 6.4 | {'CWE-78'} | {'https://www.npmjs.com/advisories/1590', 'https://www.npmjs.com/package/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26274', 'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99', 'https://github.com/advisories/GHSA-m57p-p67h-mq74', 'https://github.com/... | null | {'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99'} | {'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99'} |
GHSA | GHSA-rp65-9cf3-cjxr | Inefficient Regular Expression Complexity in nth-check | nth-check is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3803'} | 2021-09-20T20:47:31Z | 2021-09-20T20:47:31Z | MODERATE | 7.5 | {'CWE-1333'} | {'https://github.com/advisories/GHSA-rp65-9cf3-cjxr', 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726', 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3803'} | null | {'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726'} | {'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726'} |
GHSA | GHSA-c4rh-4376-gff4 | Improper certificate management in AWS IoT Device SDK v2 | The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with acces... | {'CVE-2021-40830'} | 2021-12-03T15:22:05Z | 2021-11-24T21:12:04Z | MODERATE | 6.3 | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/advisories/GHSA-c4rh-4376-gff4', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://gi... | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac'} |
GHSA | GHSA-w542-cpp9-r3g7 | CSRF in Field Test | The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2.
## Impact
The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication me... | {'CVE-2020-16252'} | 2022-04-19T19:03:24Z | 2020-08-05T14:53:34Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-w542-cpp9-r3g7', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252', 'https://github.com/ankane/field_test/issues/28', 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be704... | null | {'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'} | {'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'} |
GHSA | GHSA-5mcr-gq6c-3hq2 | Local Information Disclosure Vulnerability in Netty on Unix-Like systems | ### Impact
When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled.
The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=A... | {'CVE-2021-21290'} | 2022-04-22T18:18:15Z | 2021-02-08T21:17:48Z | MODERATE | 6.2 | {'CWE-379', 'CWE-668', 'CWE-378'} | {'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache... | null | {'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'} | {'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'} |
GHSA | GHSA-ccgm-3xw4-h5p8 | Improper Restriction of XML External Entity Reference in pikepdf | models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries. | {'CVE-2021-29421'} | 2021-09-29T18:44:06Z | 2021-04-20T16:30:03Z | HIGH | 7.5 | {'CWE-611'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QFLBBYGEDNXJ7FS6PIWTVI4T4BUPGEQ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421', 'https://github.com/advisories/GHSA-ccgm-3xw4-h5p8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject... | null | {'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'} | {'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'} |
GHSA | GHSA-95hx-62rh-gg96 | Potential XSS injection In PrestaShop contactform | ### Impact
An attacker is able to inject javascript while using the contact form.
### Patches
The problem is fixed in v4.3.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html) | {'CVE-2020-15178'} | 2021-01-07T22:56:43Z | 2020-09-15T17:34:17Z | HIGH | 8 | {'CWE-79'} | {'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96', 'https://packagist.org/packages/prestashop/contactform', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178', 'https://github.com/advisories/GHSA-95hx-62rh-gg96', 'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a... | null | {'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'} | {'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'} |
GHSA | GHSA-4rhm-m2fp-hx7q | Potential CSV Injection vector in OctoberCMS | ### Impact
Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successfu... | {'CVE-2020-5299'} | 2022-04-19T19:02:26Z | 2020-06-03T21:58:35Z | MODERATE | 4 | {'CWE-77'} | {'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'https://github.com/advisories/GHSA-4rhm-m2fp-hx7q', 'http://packetstormsecurity.com/files/... | null | {'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a'} | {'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484'} |
GHSA | GHSA-2j6v-xpf3-xvrv | Use of Externally-Controlled Format String in wire-avs | ### Impact
A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code.
### Patches
* The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x)
### Workarounds
* No workaround known
### Refer... | {'CVE-2021-41193'} | 2022-03-10T15:59:42Z | 2022-03-01T18:58:23Z | HIGH | 9.8 | {'CWE-134'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41193', 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe', 'https://github.com/advisories/GHSA-2j6v-xpf3-xvrv', 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'} | null | {'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'} | {'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'} |
GHSA | GHSA-q3gh-5r98-j4h3 | RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign | ### Impact
Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature.
- If you are not use RSA-PSS signature validation, this vulnerability is not affected.
- Risk to... | {'CVE-2020-14968'} | 2021-10-06T21:44:42Z | 2020-06-26T16:26:50Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14968', 'https://github.com/advisories/GHSA-q3gh-5r98-j4h3', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://www.npmjs.com/package/js... | null | {'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99'} | {'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99'} |
GHSA | GHSA-42qm-c3cf-9wv2 | Code injection in dolibarr/dolibarr | Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s paramete... | {'CVE-2022-0819'} | 2022-03-10T15:55:04Z | 2022-03-03T00:00:49Z | HIGH | 8.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://github.com/advisories/GHSA-42qm-c3cf-9wv2', 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'} | null | {'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'} | {'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.