ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-f8m6-h2c7-8h9x
Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize)
### Impact The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.ht...
{'CVE-2021-43854'}
2022-04-19T19:03:16Z
2022-01-06T17:38:45Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341', 'https://github.com/nltk/nltk/issues/2866', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43854', 'https://github.com/advisories/GHSA-f8m6-h2c7-8h9x', 'https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x', 'https://github.com...
null
{'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341'}
{'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341'}
GHSA
GHSA-jf7h-7m85-w2v2
Integer overflow in TFLite memory allocation
### Impact The TFLite code for allocating `TFLiteIntArray`s is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27): ```cc int TfLiteIntArrayGetSizeInBytes(int size) { static TfLiteIntArray dummy; return...
{'CVE-2021-29605'}
2021-05-21T14:28:22Z
2021-05-21T14:28:22Z
HIGH
7.1
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5', 'https://github.com/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29605'}
null
{'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'}
{'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5'}
GHSA
GHSA-gf8j-v8x5-h9qp
XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes
enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring.
{'CVE-2019-18857'}
2022-04-19T19:03:23Z
2020-01-08T17:15:37Z
HIGH
7.5
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-18857', 'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://github.com/advisories/GHSA-gf8j-v8x5-h9qp'}
null
{'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'}
{'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'}
GHSA
GHSA-mf79-f657-47ww
Insufficient Session Expiration in Admidio
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
{'CVE-2022-0991'}
2022-03-29T21:39:04Z
2022-03-20T00:00:29Z
HIGH
8.2
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/issues/1238', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://github.com/Admidio/admidio/releases/tag/v4.1.9', 'https:/...
null
{'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'}
{'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'}
GHSA
GHSA-vrgh-5w3c-ggf8
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).
{'CVE-2021-3990'}
2021-12-03T20:38:50Z
2021-12-03T20:38:50Z
MODERATE
6.5
{'CWE-338'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3990', 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0', 'https://github.com/advisories/GHSA-vrgh-5w3c-ggf8', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'}
null
{'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}
{'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}
GHSA
GHSA-vhm6-gw82-6f8j
Cross site scripting in LibreNMS
LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting.
{'CVE-2022-0772'}
2022-03-08T18:06:06Z
2022-02-28T00:00:34Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://github.com/advisories/GHSA-vhm6-gw82-6f8j', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09'}
null
{'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'}
{'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'}
GHSA
GHSA-89gv-h8wf-cg8r
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect. Depending on...
{'CVE-2021-3647'}
2022-04-19T19:03:03Z
2021-07-19T21:22:36Z
MODERATE
5.3
{'CWE-601'}
{'https://github.com/medialize/URI.js/pull/233', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481', 'https://github.com/medialize/URI.js/releases/tag/v1.19.7', 'https://github.com/medialize/URI.js/releases/tag/v1.19.3', 'htt...
null
{'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'}
{'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'}
GHSA
GHSA-qq3j-xp49-j73f
Plugin archive directory traversal in Helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.2.3. ### Impact A traversal attack is possible when installing Helm plugins from a tar archive over HTTP. It is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file ou...
{'CVE-2020-4053'}
2022-04-19T19:02:28Z
2021-06-23T18:14:36Z
LOW
3.7
{'CWE-22'}
{'https://github.com/helm/helm/releases/tag/v3.2.4', 'https://github.com/helm/helm/pull/8317', 'https://github.com/advisories/GHSA-qq3j-xp49-j73f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053', 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/security/adv...
null
{'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}
{'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688'}
GHSA
GHSA-r578-pj6f-r4ff
Auto-merging Person Records Compromised
### Impact New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). ### Patches We have released ...
{'CVE-2021-32691'}
2021-06-25T13:13:03Z
2021-06-21T17:07:47Z
HIGH
8.8
{'CWE-287', 'CWE-303'}
{'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32691', 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0', 'https://github.com/advisories/GHSA-r578-pj6f-r4ff', 'https://github.com/ApollosProject/apollos-apps/commit...
null
{'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'}
{'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2'}
GHSA
GHSA-xh55-2fqp-p775
Command injection in mail agent settings
### Impact Command injection in mail agent settings ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2...
{'CVE-2021-37708'}
2021-08-30T16:14:09Z
2021-08-30T16:14:09Z
HIGH
8.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775'}
null
{'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}
{'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}
GHSA
GHSA-w2pm-r78h-4m7v
OS Command Injection in Laravel Framework
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
{'CVE-2020-19316'}
2022-01-06T23:13:42Z
2022-01-06T23:13:42Z
HIGH
8.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/', 'https://github.com/advisories/GHSA-w2pm-r78h-4m7v', 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
null
{'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
{'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
GHSA
GHSA-9gwq-6cwj-47h3
Integer overflow in TFLite array creation
### Impact An attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60): ```cc TfLiteIntArray* TfLiteIntArrayCreate(int size) { int alloc_size = TfLiteI...
{'CVE-2022-23558'}
2022-02-11T15:08:44Z
2022-02-09T23:52:24Z
HIGH
7.6
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23558', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3', 'https://github.com/tensorflow/tensorflow/commit/a1e1511dde...
null
{'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091'}
{'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091'}
GHSA
GHSA-pq7m-3gw7-gq5x
Execution with Unnecessary Privileges in ipython
We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another. Proof of concept User1: ``` mkdir -m 777 /tmp/profile_default mkdir -m 777 /tmp/profile_default/startup echo 'print("stealing...
{'CVE-2022-21699'}
2022-02-16T22:13:05Z
2022-01-21T18:55:30Z
HIGH
8.2
{'CWE-279', 'CWE-269', 'CWE-250'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21699', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/', 'https://github.com/advisories/GHSA-pq7m-3gw7-gq5x', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html', 'https://list...
null
{'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'}
{'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'}
GHSA
GHSA-mqm2-cgpr-p4m6
Unintended read access in kramdown gem
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLa...
{'CVE-2020-14001'}
2022-04-29T20:26:20Z
2020-08-07T22:27:41Z
CRITICAL
9.8
{'CWE-862'}
{'https://kramdown.gettalong.org/news.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001', 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://security.netapp.com/advisory/n...
null
{'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}
{'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde'}
GHSA
GHSA-6g3c-2mh5-7q6x
Missing validation of JWT signature in `ManyDesigns/Portofino`
### Impact https://github.com/ManyDesigns/Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. ### Patches The issue will be patched in the upcoming 5.2.1 release. ### For more information If you have any questions or comments about this advisory: *...
{'CVE-2021-29451'}
2022-04-19T19:02:53Z
2021-04-19T14:56:33Z
CRITICAL
9.1
{'CWE-347'}
{'https://github.com/advisories/GHSA-6g3c-2mh5-7q6x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451', 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb', 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x', 'https://mvnrepository.com/artifact/com...
null
{'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}
{'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}
GHSA
GHSA-v3f7-j968-4h5f
Division by zero in Tensorflow
### Impact The [estimator for the cost of some convolution operations](https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198) can be made to execute a division by 0: ```python import tensorflow as tf @tf.function def...
{'CVE-2022-21725'}
2022-02-11T17:05:09Z
2022-02-10T00:15:07Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198', 'https://github.com/advisories/GHSA-v3f7-j968-4h5f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f', 'https://nvd.nist.gov/vu...
null
{'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a'}
{'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a'}
GHSA
GHSA-w534-q4xf-h5v2
XSS in Mapfish Print relating to JSONP support
### Impact A user can use the JSONP support to do a Cross-site scripting. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e * https://cwe.mitre.org/data/definitions/79.html ### For more information ...
{'CVE-2020-15231'}
2021-01-07T23:47:27Z
2020-07-07T16:32:49Z
LOW
9.3
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15231', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2', 'https://github.com/advisories/GHSA-w534-q4xf-h5v2'}
null
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}
GHSA
GHSA-wgmx-52ph-qqcw
High severity vulnerability that affects qutebrowser
qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access 'qute://*' URLs. A malicious website could exploit this to load a 'qute://settings/set' URL, which then sets 'editor.command' to a bash script, resulting in arbitrary code execution.
{'CVE-2018-10895'}
2021-09-21T20:42:18Z
2018-10-10T16:05:23Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660', 'https://github.com/advisories/GHSA-wgmx-52ph-qqcw', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10895'}
null
{'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660'}
{'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660'}
GHSA
GHSA-87cj-px37-rc3x
OS Command Injection in bikeshed
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing Inline Tag Command metadata is processed. When an arbitrary OS command is executed, the command output would be included in the HTML output.
{'CVE-2021-23422'}
2021-08-30T16:25:35Z
2021-08-30T16:25:35Z
HIGH
7.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23422', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537646', 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://github.com/advisories/GHSA-87cj-px37-rc3x'}
null
{'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'}
{'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'}
GHSA
GHSA-f9wg-5f46-cjmw
NextAuth.js default redirect callback vulnerable to open redirects
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to...
{'CVE-2022-24858'}
2022-05-03T02:26:17Z
2022-04-22T20:49:09Z
MODERATE
6.1
{'CWE-290', 'CWE-601'}
{'https://next-auth.js.org/getting-started/upgrade-v4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858', 'https://github.com/advisories/GHSA-f9wg-5f46-cjmw', 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50', 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9w...
null
{'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}
{'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}
GHSA
GHSA-8m5h-hrqm-pxm2
Path traversal in the OWASP Enterprise Security API
### Impact The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen...
{'CVE-2022-23457'}
2022-04-27T21:09:46Z
2022-04-27T21:09:43Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md', 'https://github.com/advisories/GHSA-8m5h-hrqm-pxm2', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://github.com/ESAPI/e...
null
{'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}
{'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}
GHSA
GHSA-8x44-pwr2-rgc6
Cross-site Scripting in pimcore
Pimcore settings module is vulnerable to stored cross site scripting
{'CVE-2022-0348'}
2022-02-03T19:56:46Z
2022-01-28T23:05:03Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/advisories/GHSA-8x44-pwr2-rgc6', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4'}
null
{'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'}
{'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'}
GHSA
GHSA-f54p-f6jp-4rhr
Heap OOB in `FusedBatchNorm` kernels
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/fused_batch_norm_op.cc#L1292) of `FusedBatchNorm` kernels is vulnerable to a heap OOB: ```python import tensorflow as tf tf.raw_ops.FusedBatchNormGrad( y_backprop=tf.con...
{'CVE-2021-41223'}
2021-11-10T18:46:52Z
2021-11-10T18:46:52Z
HIGH
7.1
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41223', 'https://github.com/advisories/GHSA-f54p-f6jp-4rhr', 'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr'}
null
{'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda'}
{'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda'}
GHSA
GHSA-23hm-7w47-xw72
Out of bounds read in Tensorflow
### Impact The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses: ```python import tensorflow as tf @tf.function def...
{'CVE-2022-21726'}
2022-02-10T00:15:47Z
2022-02-09T18:28:54Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-23hm-7w47-xw72', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21726', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w4...
null
{'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'}
{'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'}
GHSA
GHSA-fpm5-vv97-jfwg
Uncontrolled Resource Consumption in firebase
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
{'CVE-2020-7765'}
2021-05-18T01:57:24Z
2021-05-18T01:57:24Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324', 'https://github.com/advisories/GHSA-fpm5-vv97-jfwg', 'https://github.com/firebase/firebase-js-sdk/pull/4001', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7765', 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'}
null
{'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'}
{'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada'}
GHSA
GHSA-3xh2-74w9-5vxm
Integer overflow in github.com/gorilla/websocket
An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.
{'CVE-2020-27813'}
2021-05-18T21:08:02Z
2021-05-18T21:08:02Z
HIGH
7.5
{'CWE-400', 'CWE-190'}
{'https://github.com/gorilla/websocket/pull/537', 'https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh', 'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html', 'https://github.com/advisories/G...
null
{'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'}
{'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37'}
GHSA
GHSA-73rg-x683-m3qw
Buffer overflow in canvas
A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image.
{'CVE-2020-8215'}
2021-05-07T16:05:16Z
2021-05-07T16:05:16Z
HIGH
8.8
{'CWE-120'}
{'https://hackerone.com/reports/315037', 'https://www.npmjs.com/package/canvas', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215', 'https://github.com/advisories/GHSA-73rg-x683-m3qw'}
null
{'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
{'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
GHSA
GHSA-p23j-g745-8449
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.
{'CVE-2019-1335'}
2021-03-29T20:55:40Z
2021-03-29T20:55:40Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/advisories/GHSA-p23j-g745-8449', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-133...
null
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'}
{'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
GHSA
GHSA-q85f-69q7-55h2
Uninitialized variable access in Tensorflow
### Impact The [implementation of `AssignOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143) can result in copying unitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the le...
{'CVE-2022-23573'}
2022-02-11T20:47:00Z
2022-02-09T23:26:50Z
HIGH
7.6
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143', 'https://github.com/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/commi...
null
{'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'}
{'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'}
GHSA
GHSA-7h8v-2v8x-h264
SQL Injection in moodle
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25700'}
2021-03-29T20:42:19Z
2021-03-29T20:42:19Z
MODERATE
6.5
{'CWE-89'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1895427', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=4139...
null
{'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'}
{'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'}
GHSA
GHSA-6xxj-gcjq-wgf4
SQL injection in prestashop/prestashop
### Impact Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters ### Patches The problem is fixed in 1.7.8.2
{'CVE-2021-43789'}
2022-04-19T19:03:16Z
2021-12-07T21:23:17Z
HIGH
7.5
{'CWE-89'}
{'https://github.com/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.com/PrestaShop/PrestaShop/issues/26623', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://...
null
{'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}
{'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}
GHSA
GHSA-w8cj-mvf9-mpc9
OS Command injection in Bolt
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
{'CVE-2020-28925'}
2021-05-06T18:53:29Z
2021-05-06T18:53:29Z
MODERATE
5.3
{'CWE-78'}
{'https://github.com/bolt/bolt/compare/3.7.1...3.7.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a', 'https://github.com/advisories/GHSA-w8cj-mvf9-mpc9'}
null
{'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
{'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
GHSA
GHSA-3q6g-vf58-7m4g
Regular Expression Denial of Service in flask-restx
Flask RESTX contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service) in `email_regex`.
{'CVE-2021-32838'}
2022-04-19T19:03:07Z
2021-09-08T15:41:15Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-3q6g-vf58-7m4g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32838', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/', 'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed7...
null
{'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da'}
{'https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da'}
GHSA
GHSA-32wx-4gxx-h48f
Users can edit the tags of any discussion
This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020. ### Impact This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API. Users were able to remove any existing tag, and add any tag in which they ...
null
2022-04-19T19:02:36Z
2021-01-29T18:13:32Z
MODERATE
0
{'CWE-639'}
{'https://github.com/flarum/core/issues/2355', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://github.com/advisories/GHSA-32wx-4gxx-h48f', 'https://packagist.org/packages/flarum/tags', 'https://github.com...
null
{'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'}
{'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'}
GHSA
GHSA-f545-vpwp-r9j7
showdoc is vulnerable to URL Redirection to Untrusted Site
showdoc is vulnerable to URL Redirection to Untrusted Site.
{'CVE-2021-3989'}
2021-12-03T20:41:35Z
2021-12-03T20:41:35Z
MODERATE
6.1
{'CWE-601'}
{'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989', 'https://github.com/advisories/GHSA-f545-vpwp-r9j7', 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}
null
{'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}
{'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}
GHSA
GHSA-gcj7-j438-hjj2
Smokescreen SSRF via deny list bypass
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. Ther...
{'CVE-2022-24825'}
2022-04-28T19:13:16Z
2022-04-07T22:10:22Z
MODERATE
5.8
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24825', 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2', 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b', 'https://github.com/advisories/GHSA-gcj7-j438-hjj2'}
null
{'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}
{'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}
GHSA
GHSA-8c89-2vwr-chcq
Heap buffer overflow in `QuantizedResizeBilinear`
### Impact An attacker can cause a heap buffer overflow in `QuantizedResizeBilinear` by passing in invalid thresholds for the quantization: ```python import tensorflow as tf images = tf.constant([], shape=[0], dtype=tf.qint32) size = tf.constant([], shape=[0], dtype=tf.int32) min = tf.constant([], dtype=tf.float32) ...
{'CVE-2021-29537'}
2021-05-21T14:22:35Z
2021-05-21T14:22:35Z
LOW
2.5
{'CWE-131', 'CWE-787'}
{'https://github.com/advisories/GHSA-8c89-2vwr-chcq', 'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8c89-2vwr-chcq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29537'}
null
{'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'}
{'https://github.com/tensorflow/tensorflow/commit/f6c40f0c6cbf00d46c7717a26419f2062f2f8694'}
GHSA
GHSA-7638-r9r3-rmjj
chroot isolation: environment value leakage to intermediate processes
### Impact When running processes using "chroot" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environm...
{'CVE-2021-3602'}
2022-03-18T21:03:35Z
2021-07-19T15:19:09Z
MODERATE
5.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-7638-r9r3-rmjj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602', 'https://ubuntu.com/security/CVE-2021-3602', 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj', 'https://github.com/containers/buil...
null
{'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}
{'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}
GHSA
GHSA-4pwq-fj89-6rjc
Cross-site Scripting in Apache Airflow
In Apache Airflow < 1.10.12, the "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit.
{'CVE-2020-13944'}
2021-06-18T18:29:54Z
2021-06-18T18:29:54Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/r97e1b60ca508a86be58c43f405c0c8ff00ba467ba0bee68704ae7e3e%40%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/r2892ef594dbbf54d0939b808626f52f7c2d1584f8aa1d81570847d2a@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13944', 'http://www.ope...
null
{'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'}
{'https://github.com/apache/airflow/commit/5c2bb7b0b0e717b11f093910b443243330ad93ca'}
GHSA
GHSA-f8h4-7rgh-q2gm
Segfault and heap buffer overflow in `{Experimental,}DatasetToTFRecord`
### Impact The implementation for `tf.raw_ops.ExperimentalDatasetToTFRecord` and `tf.raw_ops.DatasetToTFRecord` can trigger heap buffer overflow and segmentation fault: ```python import tensorflow as tf dataset = tf.data.Dataset.range(3) dataset = tf.data.experimental.to_variant(dataset) tf.raw_ops.ExperimentalDatase...
{'CVE-2021-37650'}
2021-08-25T14:43:24Z
2021-08-25T14:43:24Z
HIGH
7.8
{'CWE-787', 'CWE-120'}
{'https://github.com/advisories/GHSA-f8h4-7rgh-q2gm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f8h4-7rgh-q2gm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37650', 'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}
null
{'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}
{'https://github.com/tensorflow/tensorflow/commit/e0b6e58c328059829c3eb968136f17aa72b6c876'}
GHSA
GHSA-pmcr-2rhp-36hr
SQL injection in github.com/navidrome/navidrome
model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords)...
{'CVE-2022-23857'}
2022-01-27T16:23:02Z
2022-01-27T16:23:02Z
MODERATE
0
{'CWE-89'}
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857', 'https://github.com/advisories/GHSA-pmcr-2rhp-36hr', 'https://github.com/navidrome/navidrome/releases/tag/v0.47.5'}
null
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'}
{'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'}
GHSA
GHSA-8fvr-5rqf-3wwh
Information Exposure in Docker Engine
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
{'CVE-2015-3630'}
2022-04-12T22:39:05Z
2022-02-15T01:57:18Z
HIGH
8.4
{'CWE-285'}
{'https://github.com/advisories/GHSA-8fvr-5rqf-3wwh', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630', 'https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'https://groups.google.com/f...
null
{'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'}
{'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'}
GHSA
GHSA-jqfh-8hw5-fqjr
Improper Handling of Exceptional Conditions in detect-character-encoding
### Impact In detect-character-encoding v0.6.0 and earlier, data matching no charset causes the Node.js process to crash. ### Patches The problem has been patched in [detect-character-encoding v0.7.0](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:...
{'CVE-2021-39157'}
2022-04-19T19:03:06Z
2021-08-25T14:44:48Z
HIGH
7.5
{'CWE-755'}
{'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a', 'https://github.com/advisories/GHSA-jqfh-8hw5-fqjr', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.7.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39157', 'https://github.com/sonicdoe/dete...
null
{'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a'}
{'https://github.com/sonicdoe/detect-character-encoding/commit/992a11007fff6cfd40b952150ab8d30410c4a20a'}
GHSA
GHSA-5fvx-5p2r-4mvp
Open Redirect in firefly-iii
firefly-iii is vulnerable to URL Redirection to Untrusted Site
{'CVE-2021-3851'}
2021-10-25T20:08:27Z
2021-10-21T17:48:41Z
MODERATE
5
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3851', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://github.com/advisories/GHSA-5fvx-5p2r-4mvp', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
{'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
GHSA
GHSA-qgmg-gppg-76g5
Inefficient Regular Expression Complexity in validator.js
validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3765'}
2021-11-03T17:34:45Z
2021-11-03T17:34:45Z
MODERATE
5.3
{'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3765', 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1', 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9', 'https://github.com/advisories/GHSA-qgmg-gppg-76g5'}
null
{'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}
{'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}
GHSA
GHSA-5f2r-qp73-37mr
`CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow
### Impact The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger...
{'CVE-2022-23579'}
2022-02-11T20:39:08Z
2022-02-10T00:33:29Z
MODERATE
6.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23579', 'https://github.com/advisories/GHSA-5f2r-qp73-37mr', 'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers...
null
{'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662'}
{'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662'}
GHSA
GHSA-mvg9-xffr-p774
Out of bounds read in Pillow
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is an out-of-bounds read in TiffreadRGBATile via invalid tile boundaries.
{'CVE-2021-25291'}
2021-12-02T15:31:14Z
2021-03-29T16:35:57Z
HIGH
7.5
{'CWE-125'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/advisories/GHSA-mvg9-xffr-p774', 'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a', 'https://security.gentoo.org/glsa/202107-33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25291'}
null
{'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a'}
{'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a'}
GHSA
GHSA-5gqf-456p-4836
Reference binding to nullptr in `SdcaOptimizer`
### Impact The implementation of `tf.raw_ops.SdcaOptimizer` triggers undefined behavior due to dereferencing a null pointer: ```python import tensorflow as tf sparse_example_indices = [tf.constant((0), dtype=tf.int64), tf.constant((0), dtype=tf.int64)] sparse_feature_indices = [tf.constant([], shape=[0, 0, 0, 0], dty...
{'CVE-2021-29572'}
2021-05-21T14:25:31Z
2021-05-21T14:25:31Z
LOW
2.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5gqf-456p-4836', 'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb', 'https://github.com/advisories/GHSA-5gqf-456p-4836', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29572'}
null
{'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'}
{'https://github.com/tensorflow/tensorflow/commit/f7cc8755ac6683131fdfa7a8a121f9d7a9dec6fb'}
GHSA
GHSA-34hv-f45p-4qfq
Open redirect in wwbn/avideo
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
{'CVE-2022-27463'}
2022-04-19T14:13:44Z
2022-04-06T00:01:29Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27463', 'https://avideo.tube/', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c', 'https://github.com/advisories/GHSA-34hv-f45p-4qfq'}
null
{'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}
{'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}
GHSA
GHSA-7p8f-8hjm-wm92
Lookup operations do not take into account wildcards in SpiceDB
### Impact Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side o...
{'CVE-2022-21646'}
2022-04-19T19:03:19Z
2022-01-13T15:05:41Z
HIGH
8.1
{'CWE-155', 'CWE-20'}
{'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970', 'https://github.com/advisories/GHSA-7p8f-8hjm-wm92', 'https://github.com/authzed/spicedb/issues/358', 'https://github.com/authzed/spicedb/releases/tag/v1.4.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21646', 'https://github.com/au...
null
{'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970'}
{'https://github.com/authzed/spicedb/commit/15bba2e2d2a4bda336a37a7fe8ef8a35028cd970'}
GHSA
GHSA-gx5w-rrhp-f436
XSS in mdBook
> This is a cross-post of [the official security advisory][ml]. The official post contains a signed version with our PGP key, as well. [ml]: https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0 The Rust Security Response Working Group was recently notified of a security issue affecting the search...
{'CVE-2020-26297'}
2022-04-19T19:02:44Z
2021-08-25T20:56:20Z
HIGH
8.2
{'CWE-79'}
{'https://github.com/rust-lang/mdBook/blob/master/CHANGELOG.md#mdbook-045', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26297', 'https://groups.google.com/g/rustlang-security-announcements/c/3-sO6of29O0', 'https://rustsec.org/advisories/RUSTSEC-2021-0001.html', 'https://github.com/advisories/GHSA-gx5w-rrhp-f436', 'https...
null
{'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'}
{'https://github.com/rust-lang/mdBook/commit/32abeef088e98327ca0dfccdad92e84afa9d2e9b'}
GHSA
GHSA-pqm6-cgwr-x6pf
Signature validation bypass in XmlSecLibs
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
{'CVE-2019-3465'}
2021-08-18T22:14:39Z
2019-11-08T20:06:46Z
HIGH
8.8
{'CWE-347'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html', 'https://lists.fedorapro...
null
{'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}
{'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}
GHSA
GHSA-4hq8-gmxx-h6w9
XML Processing error in github.com/crewjam/saml
### Impact There are three vulnerabilities in the go `encoding/xml` package that can allow an attacker to forge part of a signed XML document. For details on this vulnerability see [xml-roundtrip-validator](https://github.com/mattermost/xml-roundtrip-validator) ### Patches In version 0.4.3, all XML input is validate...
{'CVE-2020-27846'}
2021-06-23T17:29:42Z
2021-06-23T17:29:42Z
HIGH
9.8
{'CWE-287', 'CWE-115'}
{'https://github.com/advisories/GHSA-4hq8-gmxx-h6w9', 'https://security.netapp.com/advisory/ntap-20210205-0002/', 'https://github.com/crewjam/saml/security/advisories/GHSA-4hq8-gmxx-h6w9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27846', 'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053...
null
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
{'https://github.com/crewjam/saml/commit/da4f1a0612c0a8dd0452cf8b3c7a6518f6b4d053'}
GHSA
GHSA-6h88-qjpv-p32m
OpenSSL gem for Ruby using inadequate encryption strength
The OpenSSL gem for Ruby uses the same initialization vector (IV) in GCM Mode (aes-*-gcm) when the IV is set before the key, which makes it easier for context-dependent attackers to bypass the encryption protection mechanism.
{'CVE-2016-7798'}
2022-04-25T16:33:58Z
2017-10-24T18:33:35Z
HIGH
7.5
{'CWE-326'}
{'https://github.com/advisories/GHSA-6h88-qjpv-p32m', 'https://www.debian.org/security/2017/dsa-3966', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html', 'https://github.com/ruby/openssl/issues/49', 'http://www.openwall.com/lists/oss-security/2016/09/30/6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-...
null
{'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}
{'https://github.com/ruby/openssl/commit/8108e0a6db133f3375608303fdd2083eb5115062'}
GHSA
GHSA-4gw3-8f77-f72c
Regular expression denial of service in codemirror
This affects the package codemirror before 5.58.2; the package org.apache.marmotta.webjars:codemirror before 5.58.2. The vulnerable regular expression is located in https://github.com/codemirror/CodeMirror/blob/cdb228ac736369c685865b122b736cd0d397836c/mode/javascript/javascript.jsL129. The ReDOS vulnerability of the r...
{'CVE-2020-7760'}
2022-04-22T17:20:51Z
2021-05-10T18:46:27Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1024445', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBCOMPONENTS-1024446', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1024449', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7760', 'https://www.npmjs.com/package/codemirror', 'https://www.oracle.com/security-alerts/...
null
{'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb'}
{'https://github.com/codemirror/CodeMirror/commit/55d0333907117c9231ffdf555ae8824705993bbb'}
GHSA
GHSA-vmjw-c2vp-p33c
Crash in NMS ops caused by integer conversion to unsigned
### Impact An attacker can cause denial of service in applications serving models using `tf.raw_ops.NonMaxSuppressionV5` by triggering a division by 0: ```python import tensorflow as tf tf.raw_ops.NonMaxSuppressionV5( boxes=[[0.1,0.1,0.1,0.1],[0.2,0.2,0.2,0.2],[0.3,0.3,0.3,0.3]], scores=[1.0,2.0,3.0], max_outpu...
{'CVE-2021-37669'}
2021-08-25T14:42:03Z
2021-08-25T14:42:03Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vmjw-c2vp-p33c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37669', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d', 'https://github.com/advisories/GHSA-vmjw-c2vp-p33c', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d', 'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58'}
{'https://github.com/tensorflow/tensorflow/commit/b5cdbf12ffcaaffecf98f22a6be5a64bb96e4f58', 'https://github.com/tensorflow/tensorflow/commit/3a7362750d5c372420aa8f0caf7bf5b5c3d0f52d'}
GHSA
GHSA-hg2p-2cvq-4ppv
Cross-site scripting in lazysizes
lazysizes through 5.2.0 allows execution of malicious JavaScript. The following attributes are not sanitized by the video-embed plugin: data-vimeo, data-vimeoparams, data-youtube and data-ytparams which can be abused to inject malicious JavaScript.
{'CVE-2020-7642'}
2021-12-10T20:06:23Z
2021-12-10T20:06:23Z
LOW
5.4
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-LAZYSIZES-567144', 'https://github.com/advisories/GHSA-hg2p-2cvq-4ppv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7642', 'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
null
{'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
{'https://github.com/aFarkas/lazysizes/commit/3720ab8262552d4e063a38d8492f9490a231fd48'}
GHSA
GHSA-w749-p3v6-hccq
Possible code injection vulnerability in Rails / Active Storage
The Active Storage module of Rails starting with version 5.2.0 are possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally...
{'CVE-2022-21831'}
2022-04-19T19:03:27Z
2022-03-08T21:25:54Z
HIGH
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-w749-p3v6-hccq', 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e', 'https://rubysec.com/advisories/CVE-2022-21831/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831', 'https://groups.google.com/g/rubyonrails-security/c/n-p-W1yxatI'}
null
{'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}
{'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}
GHSA
GHSA-3fw8-66wf-pr7m
methodOverride Middleware Reflected Cross-Site Scripting in connect
Connect is a stack of middleware that is executed in order in each request. The "methodOverride" middleware allows the http post to override the method of the request with the value of the "_method" post key or with the header "x-http-method-override". Because the user post input was not checked, req.method could con...
{'CVE-2013-7370'}
2021-04-07T19:56:51Z
2020-08-31T22:41:27Z
LOW
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7370', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135', 'https://nodesecurity.io/advisories/methodOverride_Middleware_Reflected_Cross-Site_Scripting', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://github.com/sencha...
null
{'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'}
{'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a', 'https://github.com/senchalabs/connect/commit/277e5aad6a95d00f55571a9a0e11f2fa190d8135'}
GHSA
GHSA-7c82-mp33-r854
Cross-site scripting in bootstrap-select
bootstrap-select before 1.13.6 allows Cross-Site Scripting (XSS). It does not escape title values in OPTION elements. This may allow attackers to execute arbitrary JavaScript in a victim's browser.
{'CVE-2019-20921'}
2021-05-07T16:47:54Z
2021-05-07T16:47:54Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/1522', 'https://github.com/advisories/GHSA-7c82-mp33-r854', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20921', 'https://github.com/advisories/GHSA-9r7h-6639-v5mw', 'https://github.com/snapappointments/bootstrap-select/issues/2199', 'https://github.com/snapappointments/bootstrap-select...
null
{'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767'}
{'https://github.com/snapappointments/bootstrap-select/commit/ab6e068748040cf3cda5859f6349b382402b8767'}
GHSA
GHSA-4mv4-gmmf-q382
Cross-Site Scripting in datatables
Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php. ## Recommendation Update to a version greater than 1.10.8.
{'CVE-2015-6584'}
2021-09-23T19:26:59Z
2020-08-31T22:42:29Z
HIGH
0
{'CWE-79'}
{'https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/', 'http://www.securityfocus.com/archive/1/536437/100/0/threaded', 'https://www.npmjs.com/advisories/5', 'http://seclists.org/fulldisclosure/2015/Sep/37', 'https://github.com/advisories/GHSA-4mv4-gmmf-q382', 'https://github.com/DataTa...
null
{'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d'}
{'https://github.com/DataTables/DataTablesSrc/commit/ccf86dc5982bd8e16d'}
GHSA
GHSA-68v9-3jjq-rvp4
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly v...
{'CVE-2021-32716'}
2021-09-08T18:00:40Z
2021-09-08T18:00:40Z
MODERATE
4.4
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb', 'https://github.com/advisories/GHSA-68v9-3jjq-rvp4', 'https://docs.shopware.com/en/shopware-6-en/sec...
null
{'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}
{'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}
GHSA
GHSA-3f99-hvg4-qjwj
Insecure random number generation in keypair
## Description and Impact A bug in the pseudo-random number generator used by [keypair](https://github.com/juliangruber/keypair) versions up to and including 1.0.3 could allow for weak RSA key generation. This could enable an attacker to decrypt confidential messages or gain authorized access to an account belonging t...
{'CVE-2021-41117'}
2022-04-19T19:03:11Z
2021-10-11T17:09:05Z
HIGH
8.7
{'CWE-335'}
{'https://github.com/juliangruber/keypair/releases/tag/v1.0.4', 'https://github.com/juliangruber/keypair/security/advisories/GHSA-3f99-hvg4-qjwj', 'https://securitylab.github.com/advisories/GHSL-2021-1012-keypair/', 'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18', 'https://nvd....
null
{'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18'}
{'https://github.com/juliangruber/keypair/commit/9596418d3363d3e757676c0b6a8f2d35a9d1cb18'}
GHSA
GHSA-ch4f-829c-v5pw
Division by 0 in `ResourceScatterDiv`
### Impact The implementation of `tf.raw_ops.ResourceScatterDiv` is vulnerable to a division by 0 error: ```python import tensorflow as tf v= tf.Variable([1,2,3]) tf.raw_ops.ResourceScatterDiv( resource=v.handle, indices=[1], updates=[0]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8...
{'CVE-2021-37642'}
2021-08-25T14:43:56Z
2021-08-25T14:43:56Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37642', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ch4f-829c-v5pw', 'https://github.com/advisories/GHSA-ch4f-829c-v5pw'}
null
{'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'}
{'https://github.com/tensorflow/tensorflow/commit/4aacb30888638da75023e6601149415b39763d76'}
GHSA
GHSA-hxcc-f52p-wc94
Insecure serialization leading to RCE in serialize-javascript
serialize-javascript prior to 3.1.0 allows remote attackers to inject arbitrary code via the function "deleteFunctions" within "index.js". An object such as `{"foo": /1"/, "bar": "a\"@__R-<UID>-0__@"}` was serialized as `{"foo": /1"/, "bar": "a\/1"/}`, which allows an attacker to escape the `bar` key. This requires t...
{'CVE-2020-7660'}
2021-09-23T18:51:00Z
2020-08-11T17:21:13Z
HIGH
8.1
{'CWE-502'}
{'https://github.com/advisories/GHSA-hxcc-f52p-wc94', 'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7660'}
null
{'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'}
{'https://github.com/yahoo/serialize-javascript/commit/f21a6fb3ace2353413761e79717b2d210ba6ccbd'}
GHSA
GHSA-6wrh-279j-6hvw
HTTP caching is marking private HTTP headers as public in Shopware
### Impact HTTP caching is marking private HTTP headers as public ## Patches Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older v...
{'CVE-2022-24747'}
2022-03-18T20:15:07Z
2022-03-10T17:55:21Z
MODERATE
6.3
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw', 'https://gith...
null
{'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'}
{'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'}
GHSA
GHSA-9hx8-2mrv-r674
Deserialization of Untrusted Data in Apache jUDDI
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized obje...
{'CVE-2021-37578'}
2021-08-31T21:02:02Z
2021-08-09T20:41:37Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-9hx8-2mrv-r674', 'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E', 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f', 'http://www.openwall.com/lists/oss-security/2021/07/...
null
{'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'}
{'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'}
GHSA
GHSA-hgpf-97c5-74fc
Regular expression denial of service in @absolunet/kafe
This affects the package @absolunet/kafe before 3.2.10. It allows cause a denial of service when validating crafted invalid emails.
{'CVE-2020-7761'}
2021-05-10T19:08:29Z
2021-05-10T19:08:29Z
MODERATE
5.3
{'CWE-400'}
{'https://www.npmjs.com/package/@absolunet/kafe', 'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0%23diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857', 'https://snyk.io/vuln/SNYK-JS-ABSOLUNETKAFE-1017403', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7761', 'https://...
null
{'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0#diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857'}
{'https://github.com/absolunet/kafe/commit/c644c798bfcdc1b0bbb1f0ca59e2e2664ff3fdd0#diff-f0f4b5b19ad46588ae9d7dc1889f681252b0698a4ead3a77b7c7d127ee657857'}
GHSA
GHSA-fqq2-xp7m-xvm8
Data race in ruspiro-singleton
`Singleton<T>` is meant to be a static object that can be initialized lazily. In order to satisfy the requirement that `static` items must implement `Sync`, `Singleton` implemented both `Sync` and `Send` unconditionally. This allows for a bug where non-`Sync` types such as `Cell` can be used in singletons and cause da...
{'CVE-2020-36435'}
2021-08-25T20:58:19Z
2021-08-25T20:58:19Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0115.html', 'https://github.com/RusPiRo/ruspiro-singleton/pull/11', 'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36435', 'https://github.com/RusPiRo/ruspiro-singleton/issues/10', '...
null
{'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'}
{'https://github.com/RusPiRo/ruspiro-singleton/commit/b0d2bd20eb40b9cbc2958b981ba2dcd9e6f9396e'}
GHSA
GHSA-q6w2-89hq-hq27
Cross-site scripting in keycloak
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidential...
{'CVE-2021-20195'}
2021-06-08T23:02:43Z
2021-06-08T23:02:43Z
CRITICAL
9.6
{'CWE-20', 'CWE-79'}
{'https://github.com/advisories/GHSA-q6w2-89hq-hq27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20195', 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}
null
{'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}
{'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}
GHSA
GHSA-9pq7-rcxv-47vq
Incorrect Regular Expression in RestSharp
RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server ...
{'CVE-2021-27293'}
2021-07-15T20:24:44Z
2021-07-14T19:10:01Z
HIGH
7.5
{'CWE-697', 'CWE-185'}
{'https://restsharp.dev/', 'https://github.com/advisories/GHSA-9pq7-rcxv-47vq', 'https://github.com/restsharp/RestSharp/issues/1556', 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293'}
null
{'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}
{'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}
GHSA
GHSA-h6rj-8r3c-9gpj
bson is vulnerable to denial of service due to incorrect regex validation
BSON injection vulnerability in the legal? function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
{'CVE-2015-4412'}
2022-04-25T22:35:30Z
2018-03-05T19:43:21Z
CRITICAL
9.8
{'CWE-400'}
{'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412', 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://www.securityfocus.com/bid/75045', 'https://github.com/mongodb/bson...
null
{'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}
{'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}
GHSA
GHSA-3fc5-9x9m-vqc4
Privilege Escalation in express-cart
Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users. ## Recommendation Update to version 1.1.6 or later.
null
2021-08-04T21:25:59Z
2019-06-03T17:31:32Z
CRITICAL
9.8
null
{'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b', 'https://hackerone.com/reports/343626', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json', 'https://snyk.io/vuln/npm:express-cart:20180712', 'https://github.com/advisories/GHSA-3fc5-9x9m-vqc4', 'https://www.n...
null
{'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'}
{'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'}
GHSA
GHSA-h8hx-2c5r-32cf
Cross-Site Request Forgery (CSRF) in trestle-auth
### Impact A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. ### Pa...
{'CVE-2021-29435'}
2022-04-19T19:02:54Z
2021-04-13T17:01:50Z
HIGH
8.1
{'CWE-352'}
{'https://rubygems.org/gems/trestle-auth', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435', 'https://github.com/advisories/GHSA-h8hx-2c5r-32cf', 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf', 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3...
null
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}
{'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}
GHSA
GHSA-6g6m-m6h5-w9gf
Authorization bypass in express-jwt
### Overview Versions before and including 5.3.3, we are not enforcing the **algorithms** entry to be specified in the configuration. When **algorithms** is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. ### Am I affected? You are affected by this vulnerabil...
{'CVE-2020-15084'}
2021-01-07T23:49:23Z
2020-06-30T16:05:24Z
HIGH
7.7
{'CWE-285'}
{'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef', 'https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15084', 'https://github.com/advisories/GHSA-6g6m-m6h5-w9gf'}
null
{'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef'}
{'https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef'}
GHSA
GHSA-742w-89gc-8m9c
containerd v1.2.x can be coerced into leaking credentials during image pull
## Impact If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the defa...
{'CVE-2020-15157'}
2022-04-19T19:02:37Z
2022-02-11T23:27:39Z
MODERATE
6.1
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15157', 'https://github.com/advisories/GHSA-742w-89gc-8m9c', 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726', 'https://www.debian.org/security/2021/dsa-4865', 'https://usn.ubuntu.com/4589-1/', 'https://github.com/containerd/container...
null
{'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'}
{'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'}
GHSA
GHSA-gm9x-q798-hmr4
Command Injection in git-tags-remote
All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled. T...
null
2021-09-23T17:26:33Z
2020-07-29T14:53:40Z
HIGH
7.2
{'CWE-78'}
{'https://github.com/advisories/GHSA-gm9x-q798-hmr4', 'https://github.com/sh0ji/git-tags-remote/issues/58', 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c', 'https://www.npmjs.com/advisories/1517'}
null
{'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'}
{'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'}
GHSA
GHSA-pmw4-jgxx-pcq9
File System Bounds Escape
### Impact Clients of FTP servers utilizing `ftp-srv` hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, `CWD` and `UPDR`. ### Background When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allow...
{'CVE-2020-26299'}
2022-04-19T19:02:43Z
2021-02-10T18:11:34Z
MODERATE
0
{'CWE-22'}
{'https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/issues/225', 'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3', 'https://github.com/advisories/GHSA-pmw4-jgxx-pcq9', 'https://github.com/autovance/ftp-srv/pull/224'...
null
{'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3'}
{'https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3'}
GHSA
GHSA-rfcf-m67m-jcrq
Authentication granted to all firewalls instead of just one
Description ----------- When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on ...
{'CVE-2021-32693'}
2022-04-19T19:03:00Z
2021-06-21T17:03:44Z
HIGH
6.8
{'CWE-287'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://github.com/advisories/GHSA-rfcf-m67m-jcrq', 'https://github.com/symfony/symfon...
null
{'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}
{'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}
GHSA
GHSA-qv8q-v995-72gr
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerabili...
null
2020-09-09T17:29:38Z
2020-09-09T17:29:38Z
LOW
0
null
{'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/advisories/GHSA-qv8q-v995-72gr', 'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr'}
null
{'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}
{'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}
GHSA
GHSA-hcxx-mp6g-6gr9
Opencast publishes global system account credentials
The issue was mostly mitigated before, drastically reducing the risk. See references below for more information. ### Impact Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials,...
{'CVE-2018-16153'}
2022-04-19T19:03:17Z
2021-12-14T21:43:48Z
LOW
0
{'CWE-200', 'CWE-522'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9', 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106', 'https://github.com/advisories/GHSA-hcxx-mp6g-6gr9'}
null
{'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}
{'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}
GHSA
GHSA-gg2g-m5wc-vccq
Rebuild-bot workflow may allow unauthorised repository modifications
### Impact `projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type...
{'CVE-2021-21423'}
2021-04-16T22:53:31Z
2021-04-06T18:36:40Z
HIGH
9.4
{'CWE-527'}
{'https://github.com/advisories/GHSA-gg2g-m5wc-vccq', 'https://www.npmjs.com/package/projen', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423', 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643', 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}
null
{'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'}
{'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'}
GHSA
GHSA-j77r-2fxf-5jrw
Improper path handling in kustomization files allows path traversal
The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use built-in features and a specially crafted `kustomization.yaml` to expose sensitive data from the controller’s pod filesystem. In multi-tenancy deployments this can le...
{'CVE-2022-24877'}
2022-05-05T21:49:52Z
2022-05-04T18:04:07Z
CRITICAL
9.9
{'CWE-22'}
{'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a', 'https://github.com/fluxcd/flux2/security/advisories/GHSA-j77r-2fxf-5jrw', 'https://github.com/advisories/GHSA-j77r-2fxf-5jrw'}
null
{'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a'}
{'https://github.com/fluxcd/kustomize-controller/commit/f4528fb25d611da94e491346bea056d5c5c3611f', 'https://github.com/fluxcd/pkg/commit/0ec014baf417fd3879d366a45503a548b9267d2a'}
GHSA
GHSA-c4w7-xm78-47vh
Prototype Pollution in y18n
### Overview The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution. ### POC ``` const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true ``` ### Recommendation Upgrade to version 3.2.2, 4.0.1, 5...
{'CVE-2020-7774'}
2022-04-20T19:14:19Z
2021-03-29T16:05:12Z
HIGH
7.3
{'CWE-20', 'CWE-915'}
{'https://github.com/advisories/GHSA-c4w7-xm78-47vh', 'https://github.com/yargs/y18n/pull/108', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306', 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25', 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887', 'https://cert-portal.siemens.com/productce...
null
{'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25'}
{'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25'}
GHSA
GHSA-jff3-mwp3-f8cw
Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup
### Impact _What kind of vulnerability is it? Who is impacted?_ Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem has been fixed in version 2.1.1...
{'CVE-2021-21360'}
2022-04-19T19:02:49Z
2021-03-09T00:38:31Z
LOW
0
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://pypi.org/project/Products.GenericSetup/', 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360', 'https://github.com/zopefoundation/Products.GenericSetup/co...
null
{'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'}
{'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'}
GHSA
GHSA-79qm-h35f-hr77
OS Command Injection in compile-sass
compile-sass prior to 1.0.5 allows execution of arbritary commands. The function &quot;setupCleanupOnExit(cssPath)&quot; within &quot;dist/index.js&quot; is executed as part of the &quot;rm&quot; command without any sanitization.
{'CVE-2019-10799'}
2022-01-04T19:50:38Z
2021-04-13T15:23:13Z
HIGH
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-79qm-h35f-hr77', 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2', 'https://snyk.io/vuln/SNYK-JS-COMPILESASS-551804', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799', 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}
null
{'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'}
{'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'}
GHSA
GHSA-r64m-qchj-hrjp
Webcache Poisoning in shopware/platform and shopware/core
### Impact Webcache Poisoning via X-Forwarded-Prefix and sub-request ### Patches We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 Workarounds For older version...
null
2021-11-24T20:05:19Z
2021-11-24T20:05:19Z
CRITICAL
0
{'CWE-444'}
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp', 'https://github.com/advisories/GHSA-r64m-qchj-hrjp'}
null
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'}
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'}
GHSA
GHSA-fxp8-7h5w-h235
XSS in search engine
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
{'CVE-2019-13234'}
2021-08-18T22:27:15Z
2019-11-12T22:58:11Z
MODERATE
6.1
{'CWE-79'}
{'https://aetsu.github.io/OpenCms', 'https://github.com/advisories/GHSA-fxp8-7h5w-h235', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}
null
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
GHSA
GHSA-crp2-qrr5-8pq7
containerd CRI plugin: Insecure handling of image volumes
### Impact A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kub...
{'CVE-2022-23648'}
2022-03-29T19:11:09Z
2022-03-02T21:33:17Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/containerd/containerd/releases/tag/v1.4.13', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AUDQUQBZJGBWJPMRVB6QCCCRF7O3O4PA/', 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70', 'https://github.com/advisories...
null
{'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'}
{'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'}
GHSA
GHSA-m57p-p67h-mq74
Command Injection Vulnerability in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency() ### For more information If you have any q...
{'CVE-2020-26274'}
2020-12-17T01:41:17Z
2020-12-16T19:25:00Z
MODERATE
6.4
{'CWE-78'}
{'https://www.npmjs.com/advisories/1590', 'https://www.npmjs.com/package/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26274', 'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99', 'https://github.com/advisories/GHSA-m57p-p67h-mq74', 'https://github.com/...
null
{'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99'}
{'https://github.com/sebhildebrandt/systeminformation/commit/1faadcbf68f1b1fdd5eb2054f68fc932be32ac99'}
GHSA
GHSA-rp65-9cf3-cjxr
Inefficient Regular Expression Complexity in nth-check
nth-check is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3803'}
2021-09-20T20:47:31Z
2021-09-20T20:47:31Z
MODERATE
7.5
{'CWE-1333'}
{'https://github.com/advisories/GHSA-rp65-9cf3-cjxr', 'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726', 'https://huntr.dev/bounties/8cf8cc06-d2cf-4b4e-b42c-99fafb0b04d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3803'}
null
{'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726'}
{'https://github.com/fb55/nth-check/commit/9894c1d2010870c351f66c6f6efcf656e26bb726'}
GHSA
GHSA-c4rh-4376-gff4
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with acces...
{'CVE-2021-40830'}
2021-12-03T15:22:05Z
2021-11-24T21:12:04Z
MODERATE
6.3
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/advisories/GHSA-c4rh-4376-gff4', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://gi...
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac'}
GHSA
GHSA-w542-cpp9-r3g7
CSRF in Field Test
The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2. ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication me...
{'CVE-2020-16252'}
2022-04-19T19:03:24Z
2020-08-05T14:53:34Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-w542-cpp9-r3g7', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2020-16252.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16252', 'https://github.com/ankane/field_test/issues/28', 'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be704...
null
{'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}
{'https://github.com/ankane/field_test/commit/defd3fdf457c22d7dc5b3be7048481947bd5f0d0'}
GHSA
GHSA-5mcr-gq6c-3hq2
Local Information Disclosure Vulnerability in Netty on Unix-Like systems
### Impact When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=A...
{'CVE-2021-21290'}
2022-04-22T18:18:15Z
2021-02-08T21:17:48Z
MODERATE
6.2
{'CWE-379', 'CWE-668', 'CWE-378'}
{'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache...
null
{'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'}
{'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'}
GHSA
GHSA-ccgm-3xw4-h5p8
Improper Restriction of XML External Entity Reference in pikepdf
models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries.
{'CVE-2021-29421'}
2021-09-29T18:44:06Z
2021-04-20T16:30:03Z
HIGH
7.5
{'CWE-611'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3QFLBBYGEDNXJ7FS6PIWTVI4T4BUPGEQ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421', 'https://github.com/advisories/GHSA-ccgm-3xw4-h5p8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject...
null
{'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'}
{'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'}
GHSA
GHSA-95hx-62rh-gg96
Potential XSS injection In PrestaShop contactform
### Impact An attacker is able to inject javascript while using the contact form. ### Patches The problem is fixed in v4.3.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-15178'}
2021-01-07T22:56:43Z
2020-09-15T17:34:17Z
HIGH
8
{'CWE-79'}
{'https://github.com/PrestaShop/contactform/security/advisories/GHSA-95hx-62rh-gg96', 'https://packagist.org/packages/prestashop/contactform', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15178', 'https://github.com/advisories/GHSA-95hx-62rh-gg96', 'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a...
null
{'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'}
{'https://github.com/PrestaShop/contactform/commit/ecd9f5d14920ec00885766a7cb41bcc5ed8bfa09'}
GHSA
GHSA-4rhm-m2fp-hx7q
Potential CSV Injection vector in OctoberCMS
### Impact Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successfu...
{'CVE-2020-5299'}
2022-04-19T19:02:26Z
2020-06-03T21:58:35Z
MODERATE
4
{'CWE-77'}
{'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'https://github.com/advisories/GHSA-4rhm-m2fp-hx7q', 'http://packetstormsecurity.com/files/...
null
{'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a'}
{'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484'}
GHSA
GHSA-2j6v-xpf3-xvrv
Use of Externally-Controlled Format String in wire-avs
### Impact A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code. ### Patches * The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x) ### Workarounds * No workaround known ### Refer...
{'CVE-2021-41193'}
2022-03-10T15:59:42Z
2022-03-01T18:58:23Z
HIGH
9.8
{'CWE-134'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41193', 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe', 'https://github.com/advisories/GHSA-2j6v-xpf3-xvrv', 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'}
null
{'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}
{'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}
GHSA
GHSA-q3gh-5r98-j4h3
RSA-PSS signature validation vulnerability by prepending zeros in jsrsasign
### Impact Jsrsasign can verify RSA-PSS signature which value can expressed as BigInteger. When there is a valid RSA-PSS signature value, this vulnerability is also accept value with prepending zeros as a valid signature. - If you are not use RSA-PSS signature validation, this vulnerability is not affected. - Risk to...
{'CVE-2020-14968'}
2021-10-06T21:44:42Z
2020-06-26T16:26:50Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14968', 'https://github.com/advisories/GHSA-q3gh-5r98-j4h3', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14968', 'https://security.netapp.com/advisory/ntap-20200724-0001/', 'https://www.npmjs.com/package/js...
null
{'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99'}
{'https://github.com/kjur/jsrsasign/commit/3bcc088c727658d7235854cd2a409a904cc2ce99'}
GHSA
GHSA-42qm-c3cf-9wv2
Code injection in dolibarr/dolibarr
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s paramete...
{'CVE-2022-0819'}
2022-03-10T15:55:04Z
2022-03-03T00:00:49Z
HIGH
8.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://github.com/advisories/GHSA-42qm-c3cf-9wv2', 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}
null
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}