ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-v768-w7m9-2vmm | Reference binding to nullptr in shape inference | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`:
```python
import tensorflow as tf
tf.compat.v1.disable_v2_behavior()
tf.raw_ops.SparseFillEmptyRows(
indices = tf.constant([], shape=[0, 0], dtype=tf.int64),
values = tf.constant([], ... | {'CVE-2021-37676'} | 2021-08-25T14:41:26Z | 2021-08-25T14:41:26Z | HIGH | 7.8 | {'CWE-824'} | {'https://github.com/advisories/GHSA-v768-w7m9-2vmm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm', 'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37676'} | null | {'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed'} | {'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed'} |
GHSA | GHSA-5qgp-p5jc-w2rm | Arbitrary Code Execution in Docker | Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. | {'CVE-2014-6407'} | 2022-02-15T00:41:12Z | 2022-02-15T00:41:12Z | HIGH | 7.3 | {'CWE-59'} | {'https://secunia.com/advisories/60241', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407', 'https://secunia.com/advisories/60171', 'https://github.com/advisories/GHSA-5qgp-p5jc-w2rm', 'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://docs.docker.com/v1.3/release-not... | null | {'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'} | {'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'} |
GHSA | GHSA-5mh9-r3rr-9597 | Code execution vulnerability in HtmlUnit | HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way,... | {'CVE-2020-5529'} | 2021-08-25T21:12:10Z | 2020-05-21T21:08:33Z | HIGH | 8.1 | {'CWE-665'} | {'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367', 'https://github.com/advisories/GHSA-5mh9-r3rr-9597', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529', 'https://jvn.jp/en/jp/JVN34535327/', 'https://usn.ubuntu.com/4584-1/', 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d... | null | {'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'} | {'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'} |
GHSA | GHSA-gq77-3r6x-383w | Cross-site Scripting in ShowDoc | ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0880'} | 2022-03-23T15:37:14Z | 2022-03-13T00:00:54Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-gq77-3r6x-383w', 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf'} | null | {'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'} | {'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'} |
GHSA | GHSA-f7f4-hqp2-7prc | Improper Input Validation in sails-hook-sockets | Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request. | {'CVE-2018-21036'} | 2021-09-22T21:11:20Z | 2020-07-24T20:10:21Z | HIGH | 7.5 | {'CWE-20'} | {'http://www.openwall.com/lists/oss-security/2020/07/19/1', 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e', 'https://github.com/advisories/GHSA-f7f4-hqp2-7prc', 'https:... | null | {'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e'} | {'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e'} |
GHSA | GHSA-m9mq-p2f9-cfqv | Critical severity vulnerability that affects bleach | An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized. | {'CVE-2018-7753'} | 2022-03-04T19:40:00Z | 2019-01-04T17:46:30Z | CRITICAL | 9.8 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-7753', 'https://bugs.debian.org/892252', 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv', 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef', 'https://github.com/mozilla/bleach/releases/tag/v2.1.3'} | null | {'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'} | {'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'} |
GHSA | GHSA-2q66-6cc3-6xm8 | CSRF issue on preview pages in Bolt CMS | ### Impact
Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview.
#... | {'CVE-2020-4040'} | 2022-04-19T19:02:27Z | 2020-06-09T00:25:41Z | HIGH | 8.6 | {'CWE-352'} | {'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'https://github.com/advisories/GHSA-2q66-6cc3-6xm8', 'http://packetstormsec... | null | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} |
GHSA | GHSA-5q5w-mqp6-g2gh | Unrestricted Upload of File with Dangerous Type in jsdecena/laracom | jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type. | {'CVE-2022-0472'} | 2022-02-11T20:51:15Z | 2022-02-06T00:01:07Z | MODERATE | 5.4 | {'CWE-434', 'CWE-79'} | {'https://github.com/advisories/GHSA-5q5w-mqp6-g2gh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8', 'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713'} | null | {'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'} | {'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'} |
GHSA | GHSA-fj7f-vq84-fh43 | Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile. | In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with inva... | {'CVE-2021-43809'} | 2022-04-19T19:03:17Z | 2021-12-08T19:51:36Z | MODERATE | 6.7 | {'CWE-88'} | {'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/pull/5142', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809', 'https://github.com/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f1438... | null | {'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'} | {'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f'} |
GHSA | GHSA-hhrj-wp42-32v3 | Generation of Error Message Containing Sensitive Information in microweber | Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0660'} | 2022-02-28T22:18:01Z | 2022-02-19T00:01:36Z | HIGH | 7.5 | {'CWE-209'} | {'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/advisories/GHSA-hhrj-wp42-32v3', 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'} | null | {'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'} | {'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'} |
GHSA | GHSA-jp4x-w63m-7wgm | Prototype Pollution in hoek | Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution.
The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JS... | {'CVE-2018-3728'} | 2021-01-08T18:33:00Z | 2018-04-26T15:25:17Z | MODERATE | 0 | {'CWE-471'} | {'https://nodesecurity.io/advisories/566', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://access.redhat.com/errata/RHSA-2018:1264', 'https://hackerone.com/reports/310439', 'https://www.npmjs.com/advisories/566', 'https://snyk.io/vuln/npm:hoek:20180212', 'https://github.com/hapijs/hoek/commit/32ed5c9413321f... | null | {'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'} | {'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'} |
GHSA | GHSA-883x-6fch-6wjx | Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares | ### Impact
This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn all... | null | 2022-04-19T19:03:18Z | 2022-01-21T23:39:19Z | HIGH | 8.2 | null | {'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392', 'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/releases/tag/1.7.6', 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371', 'https://github.com/advisories/GHSA... | null | {'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'} | {'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'} |
GHSA | GHSA-6x3j-x9rp-whxp | Unrestricted Upload of File with Dangerous Type in showdoc | showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type. | {'CVE-2022-0409'} | 2022-03-02T20:59:35Z | 2022-02-20T00:00:32Z | HIGH | 7.8 | {'CWE-434'} | {'https://github.com/advisories/GHSA-6x3j-x9rp-whxp', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'} | null | {'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'} | {'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'} |
GHSA | GHSA-72wf-hwcq-65h9 | Cross-Site Request Forgery in Filebrowser | A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. | {'CVE-2021-46398'} | 2022-02-16T22:05:45Z | 2022-02-05T00:00:31Z | HIGH | 8.8 | {'CWE-352'} | {'https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/', 'https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html', 'https://github.com/advisories/GHSA-72wf-hwcq-65h9', 'http://packetstormsecurity.com... | null | {'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'} | {'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'} |
GHSA | GHSA-6p5r-g9mq-ggh2 | Reference binding to nullptr in `MatrixSetDiagV*` ops | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`:
```python
import tensorflow as tf
tf.raw_ops.MatrixSetDiagV3(
input=[1,2,3],
diagonal=[1,1],
k=[],
align='RIGHT_LEFT')
```
The [implementation](https://github... | {'CVE-2021-37658'} | 2021-08-25T14:42:49Z | 2021-08-25T14:42:49Z | HIGH | 7.1 | {'CWE-824'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37658', 'https://github.com/advisories/GHSA-6p5r-g9mq-ggh2', 'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2'} | null | {'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b'} | {'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b'} |
GHSA | GHSA-6cf8-qhqj-vjqm | Prototype pollution in total.js | There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the appli... | {'CVE-2020-28495'} | 2021-02-05T20:43:19Z | 2021-02-05T20:43:19Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/totaljs/framework/blob/master/utils.js%23L6606', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6617', 'https://www.npmjs.com/package/total.js', 'https://github.com/advisories/GHSA-6cf8-qhqj-vjqm', 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'... | null | {'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'} | {'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'} |
GHSA | GHSA-c9f3-9wfr-wgh7 | Lack of validation in data format attributes in TensorFlow | ### Impact
The `tf.raw_ops.DataFormatVecPermute` API does not validate the `src_format` and `dst_format` attributes. [The code](https://github.com/tensorflow/tensorflow/blob/304b96815324e6a73d046df10df6626d63ac12ad/tensorflow/core/kernels/data_format_ops.cc) assumes that these two arguments define a permutation of `NHW... | {'CVE-2020-26267'} | 2021-08-26T15:20:59Z | 2020-12-10T19:07:26Z | LOW | 4.4 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26267'} | null | {'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae'} | {'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae'} |
GHSA | GHSA-hjxc-462x-x77j | TOCTOU Race Condition in Yarn | The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0. | {'CVE-2019-15608'} | 2022-02-09T22:49:38Z | 2022-02-09T22:49:38Z | MODERATE | 5.9 | {'CWE-367'} | {'https://hackerone.com/reports/703138', 'https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190', 'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608', 'https://github.com/advisories/GHSA-hjxc-462x-x77j'} | null | {'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c'} | {'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c'} |
GHSA | GHSA-4fg4-p75j-w5xj | Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization` | ### Impact
An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`:
```python
import tensorflow as tf
t = tf.constant([1], shape=[1, 1, 1, 1], dtype=tf.quint8)
t_min = tf.constant([], shape=[0], dtype=tf.float32)
t_max = tf.... | {'CVE-2021-29547'} | 2021-05-21T14:23:31Z | 2021-05-21T14:23:31Z | LOW | 2.5 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29547', 'https://github.com/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} | null | {'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} | {'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'} |
GHSA | GHSA-j86v-p27c-73fm | Unitialized access in `EinsumHelper::ParseEquation` | ### Impact
During execution, [`EinsumHelper::ParseEquation()`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/linalg/einsum_op_impl.h#L126-L181) is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whet... | {'CVE-2021-41201'} | 2021-11-10T19:17:43Z | 2021-11-10T19:17:43Z | HIGH | 7.8 | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41201', 'https://github.com/advisories/GHSA-j86v-p27c-73fm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm'} | null | {'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'} | {'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'} |
GHSA | GHSA-22hc-47cc-7x6f | Cross-site Scripting in Pimcore | Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting. | {'CVE-2022-0894'} | 2022-03-29T21:21:30Z | 2022-03-16T00:00:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/pull/11447', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894', 'https://github.com/advisories/GHSA-22hc-47cc-7x6f'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
GHSA | GHSA-v6w3-2prq-h95f | Improper Input Validation in Jakarta Expression Language | In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid. | {'CVE-2021-28170'} | 2022-04-26T18:07:57Z | 2021-10-06T17:48:38Z | MODERATE | 5.3 | {'CWE-917', 'CWE-20'} | {'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-v6w3-2prq-h95f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170', 'https://securitylab.github.com/advisories/GHSL-2020-021-j... | null | {'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'} | {'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'} |
GHSA | GHSA-cfpj-3q4c-jhvr | Division by zero in TFLite | ### Impact
The implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226):
```cc
const int batch_size = input_size / filter->dims->data[1];
```
An... | {'CVE-2021-37680'} | 2021-08-25T14:40:38Z | 2021-08-25T14:40:38Z | MODERATE | 5.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37680', 'https://github.com/advisories/GHSA-cfpj-3q4c-jhvr'} | null | {'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'} | {'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'} |
GHSA | GHSA-3pxh-h8hw-mj8w | Moderate severity vulnerability that affects rack | multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet. | {'CVE-2013-0183'} | 2021-08-31T21:21:31Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-119'} | {'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d... | null | {'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'} | {'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'} |
GHSA | GHSA-wcm2-9c89-wmfm | Cross-site Scripting in jquery-ui | Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option. | {'CVE-2010-5312'} | 2022-01-20T15:38:29Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'https://security.netapp.com/advisory/ntap-20190416-0007/', 'http://bugs.jqueryui.com/ticket/6016', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312', 'http://seclists.org/oss-sec/2014/q4/616', 'h... | null | {'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'} | {'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'} |
GHSA | GHSA-jvf5-q4h5-2jmj | Prototype Pollution in madlib-object-utils | madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue. | {'CVE-2020-7701'} | 2021-07-29T21:55:23Z | 2021-05-06T17:28:57Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://github.com/advisories/GHSA-jvf5-q4h5-2jmj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7701', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676', 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'} | null | {'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'} | {'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'} |
GHSA | GHSA-54hw-mhgh-x4vc | Business Logic Errors in pimcore | In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior. | {'CVE-2021-4146'} | 2022-01-26T22:09:49Z | 2022-01-26T22:09:49Z | MODERATE | 4.3 | null | {'https://github.com/advisories/GHSA-54hw-mhgh-x4vc', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/pimcore/pimcore/pull/11206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760', 'https://github.com/pimcore/pimcore/commit/701192... | null | {'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'} | {'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'} |
GHSA | GHSA-5v72-xg48-5rpm | Denial of Service in ws | Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent.
## Proof of concept
```
const WebSocket = require('ws');
const net = require('net');
const wss = new WebSocket.Server({ port: 3000 }, fu... | null | 2021-08-04T21:29:06Z | 2019-06-04T19:37:52Z | HIGH | 7.5 | {'CWE-400'} | {'https://www.npmjs.com/advisories/550/versions', 'https://github.com/advisories/GHSA-5v72-xg48-5rpm', 'https://www.npmjs.com/advisories/550', 'https://nodesecurity.io/advisories/550', 'https://snyk.io/vuln/npm:ws:20171108', 'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'} | null | {'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'} | {'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'} |
GHSA | GHSA-7mpx-vg3c-cmr4 | Improper Authentication in react-adal | This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session... | {'CVE-2020-7787'} | 2021-04-13T15:22:37Z | 2021-04-13T15:22:37Z | HIGH | 8.2 | {'CWE-287'} | {'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9', 'https://github.com/salvoravida/react-adal/pull/115', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787', 'https://github.com/advisories/GHSA-7mpx-vg3c-cmr4', 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907'} | null | {'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'} | {'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'} |
GHSA | GHSA-25xm-hr59-7c27 | Release v0.5.8 of github.com/ulikunitz/xz fixes readUvarint denial of service | ### Impact
The function readUvarint used to read the xz container format may not terminate a loop provide malicous input.
### Patches
The problem has been fixed in release v0.5.8.
### Workarounds
Limit the size of the compressed file input to a reasonable size for your use case.
### References
The standard libra... | {'CVE-2021-29482'} | 2022-04-19T19:02:33Z | 2021-05-25T18:39:37Z | HIGH | 7.5 | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29482', 'https://github.com/advisories/GHSA-25xm-hr59-7c27', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27'} | null | {'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'} | {'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'} |
GHSA | GHSA-vx8v-g3p3-88vg | Weak password hash in LiveHelperChat | The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU. | {'CVE-2022-1235'} | 2022-04-19T18:01:54Z | 2022-04-06T00:01:31Z | HIGH | 7.5 | {'CWE-916'} | {'https://github.com/advisories/GHSA-vx8v-g3p3-88vg', 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'} | {'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'} |
GHSA | GHSA-25xj-89g5-fm6h | Information Disclosure in HashiCorp Vault | HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File. | {'CVE-2020-13223'} | 2022-02-24T13:07:51Z | 2021-05-18T18:21:09Z | HIGH | 7.5 | {'CWE-200', 'CWE-532'} | {'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92', 'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13223', 'https://github.com/advisories/GHSA-25xj-89g5-... | null | {'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'} | {'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'} |
GHSA | GHSA-mg5h-9rhq-4cqx | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0937'} | 2022-03-23T15:40:21Z | 2022-03-15T00:01:02Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937', 'https://github.com/advisories/GHSA-mg5h-9rhq-4cqx'} | null | {'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'} | {'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'} |
GHSA | GHSA-7vrm-3jc8-5wwm | Incorrect Comparison in Vyper | ### Impact
bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g.
```vyper
b1: Bytes[32] = b"abcdef"
b1 = slice(b1, 0, 1)
b2: Bytes[32] = b"abcdef"
t: bool = b1 == b2 # incorrectly evaluates to True
```
even without dirty nonzero bytes, because there is no c... | null | 2022-04-06T17:39:51Z | 2022-04-04T21:40:45Z | HIGH | 7.5 | {'CWE-697'} | {'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508', 'https://github.com/advisories/GHSA-7vrm-3jc8-5wwm', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'} | null | {'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'} | {'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'} |
GHSA | GHSA-j8qh-3xrq-c825 | Division by zero in TFLite's implementation of `OneHot` | ### Impact
The implementation of the `OneHot` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72):
```cc
int prefix_dim_size = 1;
for (int i = 0; i < op_context.axis; ++i) {
pref... | {'CVE-2021-29600'} | 2021-05-21T14:28:04Z | 2021-05-21T14:28:04Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-j8qh-3xrq-c825', 'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29600'} | null | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'} | {'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'} |
GHSA | GHSA-3mqv-8gxg-pfm4 | Cross-site scripting in twitter-server | server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint. | {'CVE-2020-35774'} | 2022-02-09T22:37:28Z | 2022-02-09T22:37:28Z | MODERATE | 6.1 | {'CWE-79'} | {'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0', 'https://github.com/advisories/GHSA-3mqv-8gxg-pfm4', 'https://nvd.nis... | null | {'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'} | {'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'} |
GHSA | GHSA-7rpc-9m88-cf9w | OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS | There is an OS Command Injection Vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
Target
baserCMS 4.5.3 and earlier ver... | {'CVE-2021-41243'} | 2021-12-01T18:29:42Z | 2021-12-01T18:29:42Z | CRITICAL | 9.1 | {'CWE-78'} | {'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/advisories/GHSA-7rpc-9m88-cf9w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243', 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'} | null | {'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'} | {'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'} |
GHSA | GHSA-6pw2-5hjv-9pf7 | Sandbox bypass in vm2 | The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine. | {'CVE-2021-23555'} | 2022-02-24T13:46:57Z | 2022-02-12T00:00:38Z | CRITICAL | 9.8 | {'CWE-1321', 'CWE-1265'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23555', 'https://snyk.io/vuln/SNYK-JS-VM2-2309905', 'https://github.com/advisories/GHSA-6pw2-5hjv-9pf7', 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'} | null | {'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'} | {'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'} |
GHSA | GHSA-24wf-7vf2-pv59 | XXE vulnerability on Launch import with externally-defined DTD file | ### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with e... | {'CVE-2021-29620'} | 2021-06-28T16:38:29Z | 2021-06-28T16:38:29Z | HIGH | 7.5 | {'CWE-611'} | {'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://github.com/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/comm... | null | {'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'} | {'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'} |
GHSA | GHSA-8w3j-g983-8jh5 | Sensitive Data Exposure in parse-server | Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking.
`ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information ab... | {'CVE-2019-1020013'} | 2022-04-19T19:02:41Z | 2019-07-11T14:23:09Z | MODERATE | 5.3 | {'CWE-209'} | {'https://github.com/advisories/GHSA-8w3j-g983-8jh5', 'https://www.npmjs.com/advisories/1114', 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013', 'https://www.owasp.org... | null | {'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec'} | {'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec'} |
GHSA | GHSA-9mrv-456v-pf22 | Cross-site Scripting in vis-timeline | This affects the package vis-timeline before 7.4.4.
An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application. | {'CVE-2020-28487'} | 2021-04-13T15:19:50Z | 2021-04-13T15:19:50Z | MODERATE | 6.8 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28487', 'https://github.com/visjs/vis-timeline/pull/840', 'https://github.com/advisories/GHSA-9mrv-456v-pf22', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502', 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500', 'https://github.com/visjs/vis-timeline/commi... | null | {'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'} | {'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'} |
GHSA | GHSA-29q4-gxjq-rx5c | Remote Code Execution in SCIMono | ### Impact
It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system.
### Patches
The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19) | {'CVE-2021-21479'} | 2021-11-02T16:11:14Z | 2021-02-10T02:31:53Z | HIGH | 0 | {'CWE-690', 'CWE-59', 'CWE-74', 'CWE-917', 'CWE-62', 'CWE-77'} | {'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c', 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19', 'https://github.com/advisories/GHSA-29q4-gxjq-rx5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be... | null | {'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'} | {'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'} |
GHSA | GHSA-3gm7-v7vw-866c | XML External Entity (XXE) Injection in Apache Solr | In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a D... | {'CVE-2019-0193'} | 2021-08-31T21:17:20Z | 2019-08-01T19:17:35Z | HIGH | 7.2 | {'CWE-94'} | {'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a7... | null | {'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'} | {'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'} |
GHSA | GHSA-9w8f-7wgr-2h7g | kimai2 is vulnerable to Improper Access Control | kimai2 is vulnerable to Improper Access Control | {'CVE-2021-3992'} | 2021-12-03T20:42:59Z | 2021-12-03T20:42:59Z | MODERATE | 6.5 | {'CWE-863', 'CWE-284'} | {'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://github.com/advisories/GHSA-9w8f-7wgr-2h7g', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93'} | null | {'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'} | {'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'} |
GHSA | GHSA-g95f-p29q-9xw4 | Regular Expression Denial of Service in braces | Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 2.3.1 or hig... | null | 2021-08-04T21:35:07Z | 2019-06-06T15:30:30Z | LOW | 3.7 | {'CWE-400', 'CWE-185'} | {'https://github.com/advisories/GHSA-g95f-p29q-9xw4', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://www.npmjs.com/advisories/786', 'https://snyk.io/vuln/npm:braces:20180219'} | null | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'} | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'} |
GHSA | GHSA-59hh-656j-3p7v | DoS via maliciously crafted p2p message | ### Impact
A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package.
### Details
On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to c... | {'CVE-2021-41173'} | 2022-04-19T19:03:12Z | 2021-10-25T19:42:57Z | MODERATE | 5.7 | {'CWE-20'} | {'https://github.com/ethereum/go-ethereum/pull/23801', 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173', 'https://github.com/advisories/GHSA-59hh-656j-3p7v', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh... | null | {'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'} | {'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'} |
GHSA | GHSA-rcwj-2hj2-vmjj | Insufficient Session Expiration in Apache NiFi Registry | If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests ... | {'CVE-2020-9482'} | 2022-02-09T00:23:21Z | 2022-02-09T00:23:06Z | MODERATE | 6.5 | {'CWE-613'} | {'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482', 'https://github.com/advisories/GHSA-rcwj-2hj2-vmjj', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c', 'https://nvd... | null | {'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'} | {'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'} |
GHSA | GHSA-4xfp-4pfp-89wg | Reference binding to nullptr in `RaggedTensorToSparse` | ### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`:
```python
import tensorflow as tf
tf.raw_ops.RaggedTensorToSparse(
rt_nested_splits=[[0, 38, 0]],
rt_dense_values=[])
```
The [implementation](https://github.com/tensorflow/tensorfl... | {'CVE-2021-37656'} | 2021-08-25T14:42:55Z | 2021-08-25T14:42:55Z | HIGH | 7.1 | {'CWE-824'} | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/advisories/GHSA-4xfp-4pfp-89wg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37656'} | null | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'} | {'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'} |
GHSA | GHSA-mm4f-47ch-f7hx | Arbitrary code execution in kill-by-port | This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | {'CVE-2021-23363'} | 2021-04-13T15:32:43Z | 2021-04-13T15:32:43Z | MODERATE | 6.3 | {'CWE-77'} | {'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4', 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363', 'https://github.com/advisories/GHSA-mm4f-47ch-f7hx', 'https://snyk.i... | null | {'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'} | {'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'} |
GHSA | GHSA-6h7f-qwqm-35pp | Arbitrary File Read in phantom-html-to-pdf | This affects the package phantom-html-to-pdf before 0.6.1. | {'CVE-2020-7763'} | 2021-07-29T20:38:33Z | 2020-11-06T18:06:16Z | HIGH | 7.5 | {'CWE-200', 'CWE-22'} | {'https://github.com/advisories/GHSA-6h7f-qwqm-35pp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7763', 'https://www.npmjs.com/package/phantom-html-to-pdf', 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598', 'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'} | null | {'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'} | {'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'} |
GHSA | GHSA-m9hp-7r99-94h5 | Critical security issues in XML encoding in github.com/dexidp/dex | ### Impact
The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector:
Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7
`encoding/xml` instabilities:
- [Element namespace prefix instability (CVE... | {'CVE-2020-26290'} | 2022-04-19T19:02:43Z | 2021-12-20T17:53:53Z | CRITICAL | 9.3 | {'CWE-347'} | {'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290', 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'http... | null | {'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'} | {'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'} |
GHSA | GHSA-4xc7-x2jr-cr74 | Improper Authorization in dolibarr/dolibarr | Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more. | {'CVE-2022-0731'} | 2022-03-04T14:46:06Z | 2022-02-24T00:00:52Z | MODERATE | 6.5 | {'CWE-863'} | {'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8', 'https://github.com/advisories/GHSA-4xc7-x2jr-cr74', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'} | null | {'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'} | {'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'} |
GHSA | GHSA-hrgx-7j6v-xj82 | Reflected cross-site scripting (XSS) vulnerability | This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package.
#### Impact
The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page.
This i... | {'CVE-2022-0087'} | 2022-04-19T19:03:19Z | 2022-01-12T21:55:40Z | HIGH | 7.1 | {'CWE-79'} | {'https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e', 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0087', 'https://github.com/advisories/GHSA-hrgx-7j6v-xj82', 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365... | null | {'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38'} | {'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38'} |
GHSA | GHSA-qcx9-j53g-ccgf | Remote Code Execution via unsafe classes in otherwise permitted modules | ### Impact
The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects.
The policies defined in `AccessControl` severely restrict access to P... | {'CVE-2021-32807'} | 2021-08-30T23:27:56Z | 2021-08-05T17:01:30Z | MODERATE | 4.4 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32807', 'https://github.com/advisories/GHSA-qcx9-j53g-ccgf', 'https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30', 'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c', 'https://github.com/zopefou... | null | {'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'} | {'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'} |
GHSA | GHSA-mj9r-wwm8-7q52 | Open Redirect in github.com/AndrewBurian/powermux | ### Impact
Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.
### Patches
The issue is resolved in v1.1.1
### Workarounds
There are no existing... | {'CVE-2021-32721'} | 2021-07-01T17:00:32Z | 2021-07-01T17:00:32Z | MODERATE | 4.7 | {'CWE-601'} | {'https://github.com/advisories/GHSA-mj9r-wwm8-7q52', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32721', 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9', 'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52'} | null | {'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'} | {'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'} |
GHSA | GHSA-f3pg-qwvg-p99c | Lenient Parsing of Content-Length Header When Prefixed with Plus Sign | ### Summary
hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can resul... | {'CVE-2021-32715'} | 2022-04-19T19:03:01Z | 2021-07-12T16:54:20Z | LOW | 3.1 | {'CWE-444'} | {'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715', 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html', 'https://github.com/advisories/GHSA-f3pg-qwvg-p99c', 'https://github.com/hyperium/hyper/security/advisories/GHSA-f... | null | {'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'} | {'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'} |
GHSA | GHSA-gmv4-r438-p67f | Leading white space bypasses protocol validation | ### Impact
Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail.
### Patches
Patched in 1.19.9
### Workarounds
Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(va... | {'CVE-2022-24723'} | 2022-04-19T19:03:25Z | 2022-03-03T19:23:36Z | MODERATE | 5.3 | {'CWE-20'} | {'https://github.com/medialize/URI.js/releases/tag/v1.19.9', 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723', 'https://github.com/advisories/GHSA-gmv4-r438-p67f', 'https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/', ... | null | {'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'} | {'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'} |
GHSA | GHSA-f263-c949-w85g | Improper Authorization in Google OAuth Client | PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able t... | {'CVE-2020-7692'} | 2022-05-04T02:18:41Z | 2021-09-28T16:16:52Z | HIGH | 7.4 | {'CWE-862', 'CWE-863'} | {'https://tools.ietf.org/html/rfc8252%23section-8.1', 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-f263-c949-w85g', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f... | null | {'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'} | {'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'} |
GHSA | GHSA-fpjm-rp2g-3r4c | Django Rest Framework jwt allows obtaining new token from notionally invalidated token | An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-f... | {'CVE-2020-10594'} | 2022-03-21T22:21:38Z | 2020-06-05T16:09:34Z | CRITICAL | 9.1 | {'CWE-287'} | {'https://github.com/advisories/GHSA-fpjm-rp2g-3r4c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10594', 'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0', 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36', 'https://pypi.org/project/drf-j... | null | {'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0'} | {'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0'} |
GHSA | GHSA-38f9-m297-6q9g | DoS via malicious record IDs in WatermelonDB | ## Impact
Medium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
A maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app ... | {'CVE-2020-4035'} | 2021-01-08T20:15:01Z | 2020-06-03T21:57:53Z | MODERATE | 5.9 | {'CWE-89'} | {'https://github.com/Nozbe/WatermelonDB/security/advisories/GHSA-38f9-m297-6q9g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4035', 'https://github.com/advisories/GHSA-38f9-m297-6q9g', 'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025'} | null | {'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025'} | {'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025'} |
GHSA | GHSA-cm9w-c4rj-r2cf | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component | This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display.
Versions 2.29.1 and 2.49.1 have been released and fully mitigate ... | {'CVE-2022-24722'} | 2022-03-11T20:08:42Z | 2022-03-02T22:24:05Z | HIGH | 8.1 | {'CWE-79'} | {'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_compone... | null | {'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'} | {'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'} |
GHSA | GHSA-v8mp-hhjq-h4cj | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload. | {'CVE-2022-0965'} | 2022-03-29T21:18:37Z | 2022-03-16T00:00:46Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/advisories/GHSA-v8mp-hhjq-h4cj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
GHSA | GHSA-rmff-f8w9-c9rm | Data races in max7301 | The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained
`Expander<EI>` types regardless of if the `Expander` itself is safe to use
across threads.
As the `IO` types allow retrieving the `Expander`, this can lead to non-thread
safe types being sent across threads as part of the `Expander` leadi... | {'CVE-2020-36472'} | 2021-08-25T20:59:22Z | 2021-08-25T20:59:22Z | MODERATE | 5.9 | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36472', 'https://github.com/edarc/max7301/issues/1', 'https://github.com/advisories/GHSA-rmff-f8w9-c9rm', 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html', 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'} | null | {'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'} | {'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'} |
GHSA | GHSA-q263-fvxm-m5mw | Heap out of bounds access in MakeEdge in TensorFlow | ### Impact
Under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The [`MakeEdge` function](https://github.com/tensorflow/tensorflow/blob/3616708cb866365301d8e67b43b32b46d94b08a0/tensorflow/core/common_runtime/graph_constructor.cc#L1426-L1438) creat... | {'CVE-2020-26271'} | 2021-01-07T22:36:55Z | 2020-12-10T19:07:34Z | LOW | 4.4 | {'CWE-908', 'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw', 'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/advisories/GHSA-q263-fvxm-m5mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26271'} | null | {'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'} | {'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'} |
GHSA | GHSA-x4rg-4545-4w7w | Improper Input Validation and Excessive Iteration in Go Facebook Thrift | Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.0... | {'CVE-2019-3564'} | 2022-04-12T22:50:27Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-834', 'CWE-20', 'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-3564', 'https://www.facebook.com/security/advisories/cve-2019-3564', 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156', 'https://github.com/advisories/GHSA-x4rg-4545-4w7w', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41... | null | {'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'} | {'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'} |
GHSA | GHSA-pgjj-866w-fc5c | Risk of code injection | ### Impact
Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues
### Patches
Temporarily removed the problematic route and added a `no-new-func` rule to eslint
Self-built users should upgrade to 7f1c430 and later as soon as poss... | {'CVE-2021-21278'} | 2021-10-12T16:03:43Z | 2021-10-12T16:03:43Z | HIGH | 8.6 | {'CWE-74'} | {'https://github.com/advisories/GHSA-pgjj-866w-fc5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278', 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d', 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c', 'https://www.npmjs.com/package/rsshub'} | null | {'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'} | {'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'} |
GHSA | GHSA-48mj-p7x2-5jfm | Basic auth bypass in esphome | ### Impact
Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older
`web_server` allows OTA update without checking user defined basic auth username & password
### Patches
Patch released in 2021.9.2
### Workarounds
Disable/remove `web_server`
| {'CVE-2021-41104'} | 2022-04-19T19:03:10Z | 2021-09-29T17:09:14Z | HIGH | 7.5 | {'CWE-306'} | {'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e', 'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41104', 'https://github.com/esphome/esphome/releases/tag/2021.9.2', 'https://github.com/espho... | null | {'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e'} | {'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e'} |
GHSA | GHSA-gjcw-v447-2w7q | Forgeable Public/Private Tokens in jws | Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a compl... | {'CVE-2016-1000223'} | 2021-09-23T21:25:35Z | 2020-09-01T15:23:18Z | HIGH | 8.7 | null | {'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e', 'https://github.com/advisories/GHSA-gjcw-v447-2w7q', 'https://nvd.nist.gov/vuln/detail/CVE-2016... | null | {'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'} | {'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'} |
GHSA | GHSA-pv8x-p9hq-j328 | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object.
## Recommendation
Upgrade to version 3.17.0 or later. | {'CVE-2017-1001003'} | 2021-01-08T18:19:21Z | 2017-12-18T22:27:53Z | CRITICAL | 0 | {'CWE-88'} | {'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/551', 'https://github.com/advisories/GHSA-pv8x-p9hq-j328', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'} | null | {'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'} | {'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'} |
GHSA | GHSA-qrmm-w75w-3wpx | Server side request forgery in SwaggerUI | SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered.
However, this functio... | null | 2022-04-19T19:03:17Z | 2021-12-09T19:08:38Z | MODERATE | 0 | {'CWE-918'} | {'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76', 'https://github.com/swagger-api/swagger-ui/issues/4872', 'https://github.com/advisories/GHSA-qrmm-w75w-3wpx'} | null | {'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'} | {'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'} |
GHSA | GHSA-35q2-47q7-3pc3 | Potential exponential regex in monitor mode | ### Impact
When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.
### Patches
The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a... | {'CVE-2021-29469'} | 2022-04-19T19:02:53Z | 2021-04-27T15:56:03Z | LOW | 0 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29469', 'https://security.netapp.com/advisory/ntap-20210611-0010/', 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3', 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e', 'https://github.com/advisories/GHS... | null | {'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'} | {'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'} |
GHSA | GHSA-3pwh-5mmc-mwrx | Denial of Service in nes | Affected versions of `nes` are vulnerable to denial of service when given an invalid `cookie` header, and websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to throw and exit.
## Recommendation
Update to version 6.4.1 or later. | {'CVE-2017-16025'} | 2021-01-08T20:00:19Z | 2018-07-24T20:06:33Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/hapijs/nes/issues/171', 'https://nodesecurity.io/advisories/331', 'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655', 'https://www.npmjs.com/advisories/331', 'https://github.com/advisories/GHSA-3pwh-5mmc-mwrx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16025'} | null | {'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655'} | {'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655'} |
GHSA | GHSA-w3jx-wv97-67ph | Cross-site scripting in Dutchcoders transfer.sh | Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view. | {'CVE-2021-33496'} | 2021-06-29T21:25:27Z | 2021-06-29T21:25:27Z | MODERATE | 6.1 | {'CWE-79'} | {'https://vuln.ryotak.me/advisories/43', 'https://github.com/dutchcoders/transfer.sh/pull/373', 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496', 'https://github.com/advisories/GHSA-w3jx-wv97-67ph', 'https://github.com/dutchcoders/transfer.sh/commit/9df... | null | {'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'} | {'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'} |
GHSA | GHSA-wpww-4jf4-4hx8 | Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration
Tested baserCMS Version : 4.4.0 (Latest)
Affect... | {'CVE-2020-15273'} | 2022-04-19T19:02:38Z | 2020-11-04T21:08:38Z | LOW | 7.3 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15273', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://github.com/advisories/GHSA-wpww-4jf4-4hx8', 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserpr... | null | {'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'} | {'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'} |
GHSA | GHSA-7gm7-8q8v-9gf2 | Server-Side Request Forgery (SSRF) in Shopware | ### Impact
The attacker can abuse the Admin SDK functionality on the server to read or update internal resources.
### Patches
We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/d... | {'CVE-2022-24871'} | 2022-04-22T21:04:08Z | 2022-04-22T21:04:07Z | HIGH | 7.2 | {'CWE-918'} | {'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-7gm7-8q8v-9gf2', 'https://docs.shopware.com/en/shopware-6-en/sec... | null | {'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'} | {'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'} |
GHSA | GHSA-rrfp-j2mp-hq9c | Segfault in `tf.quantization.quantize_and_dequantize` | ### Impact
An attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`:
```python
tf.quantization.quantize_and_dequantize(
input=[2.5, 2.5], input_min=[0,0], input_max=[1,1], axis=10)
```
This results in accessing [a dimension outside the rank of the input tensor](https://github.com/... | {'CVE-2020-15265'} | 2021-08-26T15:20:29Z | 2020-11-13T17:13:04Z | LOW | 5.9 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15265', 'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808', 'https://github.com/advisories/GHSA-rrfp-j2mp-hq9c', 'https://github.com/tensorflow/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA... | null | {'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'} | {'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'} |
GHSA | GHSA-3wcq-x3mq-6r9p | Potential memory exposure in dns-packet | This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names. | {'CVE-2021-23386'} | 2021-05-27T23:00:16Z | 2021-05-24T19:51:04Z | HIGH | 7.7 | {'CWE-200', 'CWE-908'} | {'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563', 'https://github.com/advisories/GHSA-3wcq-x3mq-6r9p', 'https://hackerone.com/bugs?subject=user&%3Breport_id=968858', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23386', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719', 'https://github.com/mafintosh/dns-packet/co... | null | {'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56', 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d'} | {'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d', 'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56'} |
GHSA | GHSA-8xqr-4cpm-wx7g | Cross-Site Scripting in react-svg | Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default.
## Recommendation
Update to version 2.2.18 or later. | null | 2021-08-04T20:24:38Z | 2019-05-31T23:47:27Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/648', 'https://github.com/tanem/react-svg/pull/57', 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb', 'https://github.com/advisories/GHSA-8xqr-4cpm-wx7g', 'https://nodesecurity.io/advisories/648'} | null | {'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'} | {'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'} |
GHSA | GHSA-c545-c4f9-rf6v | Heap OOB in TFLite | ### Impact
TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data:
```cc
if (axis < 0) {
axis = input_dim... | {'CVE-2021-37685'} | 2021-08-25T14:40:09Z | 2021-08-25T14:40:09Z | MODERATE | 5.5 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v', 'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37685', 'https://github.com/advisories/GHSA-c545-c4f9-rf6v'} | null | {'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'} | {'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'} |
GHSA | GHSA-jpj5-hg26-6jgc | Cross-site Scripting in Alist | Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1. | {'CVE-2022-26533'} | 2022-03-23T15:50:07Z | 2022-03-13T00:00:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-jpj5-hg26-6jgc', 'https://github.com/Xhofe/alist/issues/645', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26533', 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'} | null | {'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'} | {'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'} |
GHSA | GHSA-h362-m8f2-5x7c | Password Hashing: Do not use MD5 | ### Impact
User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for p... | {'CVE-2020-5229'} | 2021-01-08T20:31:51Z | 2020-01-30T21:21:58Z | LOW | 7.7 | {'CWE-327'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e', 'https://github.com/advisories/GHSA-h362-m8f2-5x7c', 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'} | null | {'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'} | {'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'} |
GHSA | GHSA-9c84-4hx6-xmm4 | Integer overflow in TFLite concatentation | ### Impact
The TFLite implementation of concatenation is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/7b7352a724b690b11bfaae2cd54bc3907daf6285/tensorflow/lite/kernels/concatenation.cc#L70-L76):
```cc
for (int d = 0; d < t0->dims->size; ++d) {
if (d == axis) {
sum_axis ... | {'CVE-2021-29601'} | 2021-05-21T14:28:08Z | 2021-05-21T14:28:08Z | MODERATE | 6.3 | {'CWE-190'} | {'https://github.com/advisories/GHSA-9c84-4hx6-xmm4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29601', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c84-4hx6-xmm4', 'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'} | null | {'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'} | {'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'} |
GHSA | GHSA-hpcx-3pw8-g3j2 | Free of uninitialized memory in telemetry | An issue was discovered in the telemetry crate through 0.1.2 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size(). | {'CVE-2021-29937'} | 2021-08-25T20:54:22Z | 2021-08-25T20:54:22Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29937', 'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81', 'https://rustsec.org/advisories/RUSTSEC-2021-0046.html', 'https://github.com/advisories/GHSA-hpcx-3pw8-g3j2', 'https://github.com/Yoric/telemetry.rs/issues/45'} | null | {'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'} | {'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'} |
GHSA | GHSA-53xj-v576-3ch2 | OS Command Injection in giting | giting version prior to 0.0.8 allows execution of arbritary commands. The first argument "repo" of function "pull()" is executed by the package without any validation. | {'CVE-2019-10802'} | 2021-04-13T15:22:09Z | 2021-04-13T15:22:09Z | HIGH | 9.8 | {'CWE-78'} | {'https://github.com/advisories/GHSA-53xj-v576-3ch2', 'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0', 'https://snyk.io/vuln/SNYK-JS-GITING-559008', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'} | null | {'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0'} | {'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0'} |
GHSA | GHSA-fcf9-3qw3-gxmj | High severity vulnerability that affects cryptography | A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they wou... | {'CVE-2018-10903'} | 2022-03-03T21:54:39Z | 2018-07-31T18:28:09Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10903', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10903', 'https://github.com/advisories/GHSA-fcf9-3qw3-gxmj'} | null | {'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef'} | {'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef'} |
GHSA | GHSA-mhhc-q96p-mfm9 | Infinite loop in TFLite | ### Impact
The strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/stride... | {'CVE-2021-37686'} | 2021-08-25T14:39:58Z | 2021-08-25T14:39:58Z | MODERATE | 5.5 | {'CWE-835'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9', 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695', 'https://github.com/advisories/GHSA-mhhc-q96p-mfm9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37686', 'https://github.com/tensorflow/tensorfl... | null | {'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'} | {'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'} |
GHSA | GHSA-g4w7-3qr8-5623 | Improper type usage in rusqlite | An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type. | {'CVE-2020-35872'} | 2021-08-25T20:47:01Z | 2021-08-25T20:47:01Z | CRITICAL | 9.8 | {'CWE-351'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35872', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/advisories/GHSA-g4w7-3qr8-5623'} | null | {'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'} | {'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'} |
GHSA | GHSA-cf6r-3wgc-h863 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. | {'CVE-2019-14892'} | 2021-04-27T19:44:30Z | 2020-05-15T18:58:58Z | HIGH | 7.5 | {'CWE-502'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://github.com/advisories/GHSA-cf6r-3wgc-h863', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://github.com/... | null | {'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'} | {'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'} |
GHSA | GHSA-rmxg-73gg-4p98 | Cross-Site Scripting (XSS) in jquery | Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option.
## Recommendation
Update to version 3.0.0 or later. | {'CVE-2015-9251'} | 2021-09-17T18:58:20Z | 2018-01-22T13:32:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.h... | null | {'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'} | {'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'} |
GHSA | GHSA-wxhq-pm8v-cw75 | Regular Expression Denial of Service in clean-css | Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 4.1.11 or... | null | 2022-04-19T19:03:26Z | 2019-06-05T20:50:16Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-wxhq-pm8v-cw75', 'https://www.npmjs.com/advisories/785', 'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'} | null | {'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'} | {'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'} |
GHSA | GHSA-5vp3-v4hc-gx76 | UUPSUpgradeable vulnerability in @openzeppelin/contracts | ### Impact
Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon.
### Patches
A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
##... | {'CVE-2021-41264'} | 2021-11-16T21:44:48Z | 2021-09-15T20:23:17Z | CRITICAL | 9.8 | {'CWE-665'} | {'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76', 'https://github.com/advisories/GHSA-5vp3-v4hc-gx76', 'https://github.... | null | {'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'} | {'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'} |
GHSA | GHSA-cf66-xwfp-gvc4 | Missing Origin Validation in webpack-dev-server | Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation... | {'CVE-2018-14732'} | 2022-04-06T20:40:37Z | 2019-01-04T17:40:59Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10', 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21', 'https://github.com/webpack/webpack-dev-server/issues/1620', 'https://www.npmjs.com/advisories/725', 'https://github.com/webpack/web... | null | {'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'} | {'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'} |
GHSA | GHSA-7359-3c6r-hfc2 | Improper Certificate Validation in oauth ruby gem | lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information. | {'CVE-2016-11086'} | 2021-10-05T16:25:55Z | 2021-04-22T16:22:15Z | HIGH | 7.4 | {'CWE-295'} | {'https://github.com/advisories/GHSA-7359-3c6r-hfc2', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ru... | null | {'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'} | {'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'} |
GHSA | GHSA-mh8g-hprg-8363 | Hard-Coded Key Used For Remember-me Token in Opencast | ### Impact
The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the ... | {'CVE-2020-5222'} | 2022-04-19T19:02:24Z | 2020-01-30T21:21:44Z | MODERATE | 6.8 | {'CWE-798'} | {'https://github.com/advisories/GHSA-mh8g-hprg-8363', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222', 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'} | null | {'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'} | {'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'} |
GHSA | GHSA-4f7p-27jc-3c36 | HTTP Request Smuggling in waitress | ### Impact
When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends.
This would allow requests to be smuggled via the front-end proxy to waitress and later behav... | {'CVE-2022-24761'} | 2022-03-21T22:15:26Z | 2022-03-18T19:00:59Z | HIGH | 7.5 | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24761', 'https://github.com/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/Pylons/waitress/releases/tag/v2... | null | {'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'} | {'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'} |
GHSA | GHSA-8p36-q63g-68qh | Autobinding vulnerability in MITREid Connect | org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request par... | {'CVE-2021-27582'} | 2021-05-13T22:31:22Z | 2021-05-13T22:31:22Z | CRITICAL | 9.1 | {'CWE-915'} | {'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c', 'https://github.com/advisories/GHSA-8p36-q63g-68qh', 'htt... | null | {'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'} | {'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'} |
GHSA | GHSA-x4w5-r546-x9qh | Arbitrary File Read in html-pdf | All versions of `html-pdf` are vulnerable to Arbitrary File Read. The package fails to sanitize the HTML input, allowing attackers to exfiltrate server files by supplying malicious HTML code. XHR requests in the HTML code are executed by the server. Input with an XHR request such as `request.open("GET","file:///etc/pas... | {'CVE-2019-15138'} | 2022-01-04T19:51:52Z | 2019-10-11T18:40:38Z | HIGH | 7.5 | {'CWE-200', 'CWE-668', 'CWE-73', 'CWE-79'} | {'https://security.netapp.com/advisory/ntap-20191017-0005/', 'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362', 'https://github.com/marcbachmann/node-html-pdf/releases/tag/v3.0.1', 'https://www.npmjs.com/advisories/1095', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15138', '... | null | {'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362'} | {'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362'} |
GHSA | GHSA-2p5p-m353-833w | Sort order SQL injection in Administrate | In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard,
the direction parameter was not validated before being interpolated into the SQL query.
This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections.
W... | {'CVE-2020-5257'} | 2022-04-19T19:02:24Z | 2020-03-13T21:05:44Z | HIGH | 7.7 | {'CWE-943'} | {'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/advisories/GHSA-2p5p-m353-833w', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'} | null | {'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'} | {'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'} |
GHSA | GHSA-r6hh-5g3q-wwgc | Stored Cross-site Scripting in grav | Grav prior to 1.7.31 is vulnerable to stored cross-site scripting. | {'CVE-2022-0970'} | 2022-03-28T22:27:37Z | 2022-03-16T00:00:45Z | HIGH | 7.1 | {'CWE-79'} | {'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://github.com/advisories/GHSA-r6hh-5g3q-wwgc', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'} | null | {'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'} | {'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'} |
GHSA | GHSA-2ghc-6v89-pw9j | Prototype Pollution in body-parser-xml | body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3666'} | 2021-10-06T22:03:36Z | 2021-09-14T20:25:35Z | HIGH | 7.6 | {'CWE-1321', 'CWE-915'} | {'https://github.com/advisories/GHSA-2ghc-6v89-pw9j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'} | null | {'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'} | {'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.