ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-v768-w7m9-2vmm
Reference binding to nullptr in shape inference
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`: ```python import tensorflow as tf tf.compat.v1.disable_v2_behavior() tf.raw_ops.SparseFillEmptyRows( indices = tf.constant([], shape=[0, 0], dtype=tf.int64), values = tf.constant([], ...
{'CVE-2021-37676'}
2021-08-25T14:41:26Z
2021-08-25T14:41:26Z
HIGH
7.8
{'CWE-824'}
{'https://github.com/advisories/GHSA-v768-w7m9-2vmm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm', 'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37676'}
null
{'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed'}
{'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed'}
GHSA
GHSA-5qgp-p5jc-w2rm
Arbitrary Code Execution in Docker
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
{'CVE-2014-6407'}
2022-02-15T00:41:12Z
2022-02-15T00:41:12Z
HIGH
7.3
{'CWE-59'}
{'https://secunia.com/advisories/60241', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6407', 'https://secunia.com/advisories/60171', 'https://github.com/advisories/GHSA-5qgp-p5jc-w2rm', 'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://docs.docker.com/v1.3/release-not...
null
{'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'}
{'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'}
GHSA
GHSA-5mh9-r3rr-9597
Code execution vulnerability in HtmlUnit
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way,...
{'CVE-2020-5529'}
2021-08-25T21:12:10Z
2020-05-21T21:08:33Z
HIGH
8.1
{'CWE-665'}
{'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367', 'https://github.com/advisories/GHSA-5mh9-r3rr-9597', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529', 'https://jvn.jp/en/jp/JVN34535327/', 'https://usn.ubuntu.com/4584-1/', 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d...
null
{'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'}
{'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'}
GHSA
GHSA-gq77-3r6x-383w
Cross-site Scripting in ShowDoc
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0880'}
2022-03-23T15:37:14Z
2022-03-13T00:00:54Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-gq77-3r6x-383w', 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf'}
null
{'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}
{'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}
GHSA
GHSA-f7f4-hqp2-7prc
Improper Input Validation in sails-hook-sockets
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
{'CVE-2018-21036'}
2021-09-22T21:11:20Z
2020-07-24T20:10:21Z
HIGH
7.5
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2020/07/19/1', 'https://github.com/balderdashy/sails/blob/56f8276f6501a144a03d1f0f28df4ccdb4ad82e2/CHANGELOG.md', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e', 'https://github.com/advisories/GHSA-f7f4-hqp2-7prc', 'https:...
null
{'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e'}
{'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44', 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451662606e'}
GHSA
GHSA-m9mq-p2f9-cfqv
Critical severity vulnerability that affects bleach
An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.
{'CVE-2018-7753'}
2022-03-04T19:40:00Z
2019-01-04T17:46:30Z
CRITICAL
9.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-7753', 'https://bugs.debian.org/892252', 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv', 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef', 'https://github.com/mozilla/bleach/releases/tag/v2.1.3'}
null
{'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}
{'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}
GHSA
GHSA-2q66-6cc3-6xm8
CSRF issue on preview pages in Bolt CMS
### Impact Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. #...
{'CVE-2020-4040'}
2022-04-19T19:02:27Z
2020-06-09T00:25:41Z
HIGH
8.6
{'CWE-352'}
{'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'https://github.com/advisories/GHSA-2q66-6cc3-6xm8', 'http://packetstormsec...
null
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
GHSA
GHSA-5q5w-mqp6-g2gh
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0472'}
2022-02-11T20:51:15Z
2022-02-06T00:01:07Z
MODERATE
5.4
{'CWE-434', 'CWE-79'}
{'https://github.com/advisories/GHSA-5q5w-mqp6-g2gh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8', 'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713'}
null
{'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
{'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
GHSA
GHSA-fj7f-vq84-fh43
Local Code Execution through Argument Injection via dash leading git url parameter in Gemfile.
In `bundler` versions before 2.2.33, when working with untrusted and apparently harmless `Gemfile`'s, it is not expected that they lead to execution of external code, unless that's explicit in the ruby code inside the `Gemfile` itself. However, if the `Gemfile` includes `gem` entries that use the `git` option with inva...
{'CVE-2021-43809'}
2022-04-19T19:03:17Z
2021-12-08T19:51:36Z
MODERATE
6.7
{'CWE-88'}
{'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/pull/5142', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43809', 'https://github.com/advisories/GHSA-fj7f-vq84-fh43', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f1438...
null
{'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f', 'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3'}
{'https://github.com/rubygems/rubygems/commit/0fad1ccfe9dd7a3c5b82c1496df3c2b4842870d3', 'https://github.com/rubygems/rubygems/commit/a4f2f8ac17e6ce81c689527a8b6f14381060d95f'}
GHSA
GHSA-hhrj-wp42-32v3
Generation of Error Message Containing Sensitive Information in microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0660'}
2022-02-28T22:18:01Z
2022-02-19T00:01:36Z
HIGH
7.5
{'CWE-209'}
{'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/advisories/GHSA-hhrj-wp42-32v3', 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}
null
{'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}
{'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}
GHSA
GHSA-jp4x-w63m-7wgm
Prototype Pollution in hoek
Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution. The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JS...
{'CVE-2018-3728'}
2021-01-08T18:33:00Z
2018-04-26T15:25:17Z
MODERATE
0
{'CWE-471'}
{'https://nodesecurity.io/advisories/566', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://access.redhat.com/errata/RHSA-2018:1264', 'https://hackerone.com/reports/310439', 'https://www.npmjs.com/advisories/566', 'https://snyk.io/vuln/npm:hoek:20180212', 'https://github.com/hapijs/hoek/commit/32ed5c9413321f...
null
{'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'}
{'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'}
GHSA
GHSA-883x-6fch-6wjx
Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares
### Impact This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn all...
null
2022-04-19T19:03:18Z
2022-01-21T23:39:19Z
HIGH
8.2
null
{'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392', 'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/releases/tag/1.7.6', 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371', 'https://github.com/advisories/GHSA...
null
{'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'}
{'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'}
GHSA
GHSA-6x3j-x9rp-whxp
Unrestricted Upload of File with Dangerous Type in showdoc
showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0409'}
2022-03-02T20:59:35Z
2022-02-20T00:00:32Z
HIGH
7.8
{'CWE-434'}
{'https://github.com/advisories/GHSA-6x3j-x9rp-whxp', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
null
{'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
{'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
GHSA
GHSA-72wf-hwcq-65h9
Cross-Site Request Forgery in Filebrowser
A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim.
{'CVE-2021-46398'}
2022-02-16T22:05:45Z
2022-02-05T00:00:31Z
HIGH
8.8
{'CWE-352'}
{'https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/', 'https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7', 'https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html', 'https://github.com/advisories/GHSA-72wf-hwcq-65h9', 'http://packetstormsecurity.com...
null
{'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'}
{'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'}
GHSA
GHSA-6p5r-g9mq-ggh2
Reference binding to nullptr in `MatrixSetDiagV*` ops
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixSetDiagV*`: ```python import tensorflow as tf tf.raw_ops.MatrixSetDiagV3( input=[1,2,3], diagonal=[1,1], k=[], align='RIGHT_LEFT') ``` The [implementation](https://github...
{'CVE-2021-37658'}
2021-08-25T14:42:49Z
2021-08-25T14:42:49Z
HIGH
7.1
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37658', 'https://github.com/advisories/GHSA-6p5r-g9mq-ggh2', 'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6p5r-g9mq-ggh2'}
null
{'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b'}
{'https://github.com/tensorflow/tensorflow/commit/ff8894044dfae5568ecbf2ed514c1a37dc394f1b'}
GHSA
GHSA-6cf8-qhqj-vjqm
Prototype pollution in total.js
There is a prototype pollution vulnerability in the package total.js before version 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the appli...
{'CVE-2020-28495'}
2021-02-05T20:43:19Z
2021-02-05T20:43:19Z
HIGH
0
{'CWE-400'}
{'https://github.com/totaljs/framework/blob/master/utils.js%23L6606', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6617', 'https://www.npmjs.com/package/total.js', 'https://github.com/advisories/GHSA-6cf8-qhqj-vjqm', 'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'...
null
{'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'}
{'https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff'}
GHSA
GHSA-c9f3-9wfr-wgh7
Lack of validation in data format attributes in TensorFlow
### Impact The `tf.raw_ops.DataFormatVecPermute` API does not validate the `src_format` and `dst_format` attributes. [The code](https://github.com/tensorflow/tensorflow/blob/304b96815324e6a73d046df10df6626d63ac12ad/tensorflow/core/kernels/data_format_ops.cc) assumes that these two arguments define a permutation of `NHW...
{'CVE-2020-26267'}
2021-08-26T15:20:59Z
2020-12-10T19:07:26Z
LOW
4.4
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/advisories/GHSA-c9f3-9wfr-wgh7', 'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26267'}
null
{'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae'}
{'https://github.com/tensorflow/tensorflow/commit/ebc70b7a592420d3d2f359e4b1694c236b82c7ae'}
GHSA
GHSA-hjxc-462x-x77j
TOCTOU Race Condition in Yarn
The package integrity validation in yarn &lt; 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It&#39;s not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0.
{'CVE-2019-15608'}
2022-02-09T22:49:38Z
2022-02-09T22:49:38Z
MODERATE
5.9
{'CWE-367'}
{'https://hackerone.com/reports/703138', 'https://github.com/yarnpkg/yarn/blob/master/CHANGELOG.md#1190', 'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608', 'https://github.com/advisories/GHSA-hjxc-462x-x77j'}
null
{'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c'}
{'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c'}
GHSA
GHSA-4fg4-p75j-w5xj
Heap out of bounds in `QuantizedBatchNormWithGlobalNormalization`
### Impact An attacker can cause a segfault and denial of service via accessing data outside of bounds in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`: ```python import tensorflow as tf t = tf.constant([1], shape=[1, 1, 1, 1], dtype=tf.quint8) t_min = tf.constant([], shape=[0], dtype=tf.float32) t_max = tf....
{'CVE-2021-29547'}
2021-05-21T14:23:31Z
2021-05-21T14:23:31Z
LOW
2.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4fg4-p75j-w5xj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29547', 'https://github.com/advisories/GHSA-4fg4-p75j-w5xj', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}
null
{'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}
{'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}
GHSA
GHSA-j86v-p27c-73fm
Unitialized access in `EinsumHelper::ParseEquation`
### Impact During execution, [`EinsumHelper::ParseEquation()`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/linalg/einsum_op_impl.h#L126-L181) is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whet...
{'CVE-2021-41201'}
2021-11-10T19:17:43Z
2021-11-10T19:17:43Z
HIGH
7.8
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41201', 'https://github.com/advisories/GHSA-j86v-p27c-73fm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm'}
null
{'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'}
{'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'}
GHSA
GHSA-22hc-47cc-7x6f
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
{'CVE-2022-0894'}
2022-03-29T21:21:30Z
2022-03-16T00:00:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/pimcore/pimcore/pull/11447', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894', 'https://github.com/advisories/GHSA-22hc-47cc-7x6f'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
GHSA
GHSA-v6w3-2prq-h95f
Improper Input Validation in Jakarta Expression Language
In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.
{'CVE-2021-28170'}
2022-04-26T18:07:57Z
2021-10-06T17:48:38Z
MODERATE
5.3
{'CWE-917', 'CWE-20'}
{'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-v6w3-2prq-h95f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170', 'https://securitylab.github.com/advisories/GHSL-2020-021-j...
null
{'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}
{'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}
GHSA
GHSA-cfpj-3q4c-jhvr
Division by zero in TFLite
### Impact The implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226): ```cc const int batch_size = input_size / filter->dims->data[1]; ``` An...
{'CVE-2021-37680'}
2021-08-25T14:40:38Z
2021-08-25T14:40:38Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37680', 'https://github.com/advisories/GHSA-cfpj-3q4c-jhvr'}
null
{'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'}
{'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'}
GHSA
GHSA-3pxh-h8hw-mj8w
Moderate severity vulnerability that affects rack
multipart/parser.rb in Rack 1.3.x before 1.3.8 and 1.4.x before 1.4.3 allows remote attackers to cause a denial of service (memory consumption and out-of-memory error) via a long string in a Multipart HTTP packet.
{'CVE-2013-0183'}
2021-08-31T21:21:31Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-119'}
{'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/advisories/GHSA-3pxh-h8hw-mj8w', 'http://rhn.redhat.com/errata/RHSA-2013-0544.html', 'https://groups.google.com/forum/#!topic/rack-devel/7ZKPNAjgRSs', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d...
null
{'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18', 'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff'}
{'https://github.com/rack/rack/commit/548b9af2dc0059f4c0c19728624448d84de450ff', 'https://github.com/rack/rack/commit/f95113402b7239f225282806673e1b6424522b18'}
GHSA
GHSA-wcm2-9c89-wmfm
Cross-site Scripting in jquery-ui
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.
{'CVE-2010-5312'}
2022-01-20T15:38:29Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20190416-0007/', 'http://bugs.jqueryui.com/ticket/6016', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2010-5312', 'http://seclists.org/oss-sec/2014/q4/616', 'h...
null
{'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'}
{'https://github.com/jquery/jquery-ui/commit/7e9060c109b928769a664dbcc2c17bd21231b6f3'}
GHSA
GHSA-jvf5-q4h5-2jmj
Prototype Pollution in madlib-object-utils
madlib-object-utils before 0.1.7 is vulnerable to Prototype Pollution via setValue.
{'CVE-2020-7701'}
2021-07-29T21:55:23Z
2021-05-06T17:28:57Z
CRITICAL
9.8
{'CWE-915'}
{'https://github.com/advisories/GHSA-jvf5-q4h5-2jmj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7701', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676', 'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'}
null
{'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'}
{'https://github.com/Qwerios/madlib-object-utils/commit/2a8d5be4fddfe46b69fbe25b9ebdff49a54481a8'}
GHSA
GHSA-54hw-mhgh-x4vc
Business Logic Errors in pimcore
In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior.
{'CVE-2021-4146'}
2022-01-26T22:09:49Z
2022-01-26T22:09:49Z
MODERATE
4.3
null
{'https://github.com/advisories/GHSA-54hw-mhgh-x4vc', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/pimcore/pimcore/pull/11206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760', 'https://github.com/pimcore/pimcore/commit/701192...
null
{'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'}
{'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'}
GHSA
GHSA-5v72-xg48-5rpm
Denial of Service in ws
Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent. ## Proof of concept ``` const WebSocket = require('ws'); const net = require('net'); const wss = new WebSocket.Server({ port: 3000 }, fu...
null
2021-08-04T21:29:06Z
2019-06-04T19:37:52Z
HIGH
7.5
{'CWE-400'}
{'https://www.npmjs.com/advisories/550/versions', 'https://github.com/advisories/GHSA-5v72-xg48-5rpm', 'https://www.npmjs.com/advisories/550', 'https://nodesecurity.io/advisories/550', 'https://snyk.io/vuln/npm:ws:20171108', 'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'}
null
{'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'}
{'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'}
GHSA
GHSA-7mpx-vg3c-cmr4
Improper Authentication in react-adal
This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session...
{'CVE-2020-7787'}
2021-04-13T15:22:37Z
2021-04-13T15:22:37Z
HIGH
8.2
{'CWE-287'}
{'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9', 'https://github.com/salvoravida/react-adal/pull/115', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787', 'https://github.com/advisories/GHSA-7mpx-vg3c-cmr4', 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907'}
null
{'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'}
{'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'}
GHSA
GHSA-25xm-hr59-7c27
Release v0.5.8 of github.com/ulikunitz/xz fixes readUvarint denial of service
### Impact The function readUvarint used to read the xz container format may not terminate a loop provide malicous input. ### Patches The problem has been fixed in release v0.5.8. ### Workarounds Limit the size of the compressed file input to a reasonable size for your use case. ### References The standard libra...
{'CVE-2021-29482'}
2022-04-19T19:02:33Z
2021-05-25T18:39:37Z
HIGH
7.5
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29482', 'https://github.com/advisories/GHSA-25xm-hr59-7c27', 'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b', 'https://github.com/ulikunitz/xz/security/advisories/GHSA-25xm-hr59-7c27'}
null
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
{'https://github.com/ulikunitz/xz/commit/69c6093c7b2397b923acf82cb378f55ab2652b9b'}
GHSA
GHSA-vx8v-g3p3-88vg
Weak password hash in LiveHelperChat
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
{'CVE-2022-1235'}
2022-04-19T18:01:54Z
2022-04-06T00:01:31Z
HIGH
7.5
{'CWE-916'}
{'https://github.com/advisories/GHSA-vx8v-g3p3-88vg', 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}
{'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}
GHSA
GHSA-25xj-89g5-fm6h
Information Disclosure in HashiCorp Vault
HashiCorp Vault and Vault Enterprise before 1.3.6, and 1.4.2 before 1.4.2, insert Sensitive Information into a Log File.
{'CVE-2020-13223'}
2022-02-24T13:07:51Z
2021-05-18T18:21:09Z
HIGH
7.5
{'CWE-200', 'CWE-532'}
{'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92', 'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13223', 'https://github.com/advisories/GHSA-25xj-89g5-...
null
{'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'}
{'https://github.com/hashicorp/vault/commit/87f47c216cf1a28f4054b80cff40de8c9e00e36c', 'https://github.com/hashicorp/vault/commit/e52f34772affb69f3239b2cdf6523cb7cfd67a92'}
GHSA
GHSA-mg5h-9rhq-4cqx
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0937'}
2022-03-23T15:40:21Z
2022-03-15T00:01:02Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937', 'https://github.com/advisories/GHSA-mg5h-9rhq-4cqx'}
null
{'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}
{'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}
GHSA
GHSA-7vrm-3jc8-5wwm
Incorrect Comparison in Vyper
### Impact bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g. ```vyper b1: Bytes[32] = b"abcdef" b1 = slice(b1, 0, 1) b2: Bytes[32] = b"abcdef" t: bool = b1 == b2 # incorrectly evaluates to True ``` even without dirty nonzero bytes, because there is no c...
null
2022-04-06T17:39:51Z
2022-04-04T21:40:45Z
HIGH
7.5
{'CWE-697'}
{'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508', 'https://github.com/advisories/GHSA-7vrm-3jc8-5wwm', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}
null
{'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'}
{'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'}
GHSA
GHSA-j8qh-3xrq-c825
Division by zero in TFLite's implementation of `OneHot`
### Impact The implementation of the `OneHot` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/f61c57bd425878be108ec787f4d96390579fb83e/tensorflow/lite/kernels/one_hot.cc#L68-L72): ```cc int prefix_dim_size = 1; for (int i = 0; i < op_context.axis; ++i) { pref...
{'CVE-2021-29600'}
2021-05-21T14:28:04Z
2021-05-21T14:28:04Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-j8qh-3xrq-c825', 'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qh-3xrq-c825', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29600'}
null
{'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'}
{'https://github.com/tensorflow/tensorflow/commit/3ebedd7e345453d68e279cfc3e4072648e5e12e5'}
GHSA
GHSA-3mqv-8gxg-pfm4
Cross-site scripting in twitter-server
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
{'CVE-2020-35774'}
2022-02-09T22:37:28Z
2022-02-09T22:37:28Z
MODERATE
6.1
{'CWE-79'}
{'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0', 'https://github.com/advisories/GHSA-3mqv-8gxg-pfm4', 'https://nvd.nis...
null
{'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'}
{'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'}
GHSA
GHSA-7rpc-9m88-cf9w
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
There is an OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier ver...
{'CVE-2021-41243'}
2021-12-01T18:29:42Z
2021-12-01T18:29:42Z
CRITICAL
9.1
{'CWE-78'}
{'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/advisories/GHSA-7rpc-9m88-cf9w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243', 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}
null
{'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}
{'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}
GHSA
GHSA-6pw2-5hjv-9pf7
Sandbox bypass in vm2
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
{'CVE-2021-23555'}
2022-02-24T13:46:57Z
2022-02-12T00:00:38Z
CRITICAL
9.8
{'CWE-1321', 'CWE-1265'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23555', 'https://snyk.io/vuln/SNYK-JS-VM2-2309905', 'https://github.com/advisories/GHSA-6pw2-5hjv-9pf7', 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}
null
{'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}
{'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}
GHSA
GHSA-24wf-7vf2-pv59
XXE vulnerability on Launch import with externally-defined DTD file
### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with e...
{'CVE-2021-29620'}
2021-06-28T16:38:29Z
2021-06-28T16:38:29Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://github.com/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/comm...
null
{'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}
{'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}
GHSA
GHSA-8w3j-g983-8jh5
Sensitive Data Exposure in parse-server
Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking. `ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information ab...
{'CVE-2019-1020013'}
2022-04-19T19:02:41Z
2019-07-11T14:23:09Z
MODERATE
5.3
{'CWE-209'}
{'https://github.com/advisories/GHSA-8w3j-g983-8jh5', 'https://www.npmjs.com/advisories/1114', 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec', 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013', 'https://www.owasp.org...
null
{'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec'}
{'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec'}
GHSA
GHSA-9mrv-456v-pf22
Cross-site Scripting in vis-timeline
This affects the package vis-timeline before 7.4.4. An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.
{'CVE-2020-28487'}
2021-04-13T15:19:50Z
2021-04-13T15:19:50Z
MODERATE
6.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28487', 'https://github.com/visjs/vis-timeline/pull/840', 'https://github.com/advisories/GHSA-9mrv-456v-pf22', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502', 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500', 'https://github.com/visjs/vis-timeline/commi...
null
{'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}
{'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}
GHSA
GHSA-29q4-gxjq-rx5c
Remote Code Execution in SCIMono
### Impact It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system. ### Patches The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19)
{'CVE-2021-21479'}
2021-11-02T16:11:14Z
2021-02-10T02:31:53Z
HIGH
0
{'CWE-690', 'CWE-59', 'CWE-74', 'CWE-917', 'CWE-62', 'CWE-77'}
{'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c', 'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19', 'https://github.com/advisories/GHSA-29q4-gxjq-rx5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be...
null
{'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'}
{'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'}
GHSA
GHSA-3gm7-v7vw-866c
XML External Entity (XXE) Injection in Apache Solr
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a D...
{'CVE-2019-0193'}
2021-08-31T21:17:20Z
2019-08-01T19:17:35Z
HIGH
7.2
{'CWE-94'}
{'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a7...
null
{'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}
{'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}
GHSA
GHSA-9w8f-7wgr-2h7g
kimai2 is vulnerable to Improper Access Control
kimai2 is vulnerable to Improper Access Control
{'CVE-2021-3992'}
2021-12-03T20:42:59Z
2021-12-03T20:42:59Z
MODERATE
6.5
{'CWE-863', 'CWE-284'}
{'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://github.com/advisories/GHSA-9w8f-7wgr-2h7g', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93'}
null
{'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}
{'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}
GHSA
GHSA-g95f-p29q-9xw4
Regular Expression Denial of Service in braces
Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 2.3.1 or hig...
null
2021-08-04T21:35:07Z
2019-06-06T15:30:30Z
LOW
3.7
{'CWE-400', 'CWE-185'}
{'https://github.com/advisories/GHSA-g95f-p29q-9xw4', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://www.npmjs.com/advisories/786', 'https://snyk.io/vuln/npm:braces:20180219'}
null
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}
GHSA
GHSA-59hh-656j-3p7v
DoS via maliciously crafted p2p message
### Impact A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package. ### Details On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to c...
{'CVE-2021-41173'}
2022-04-19T19:03:12Z
2021-10-25T19:42:57Z
MODERATE
5.7
{'CWE-20'}
{'https://github.com/ethereum/go-ethereum/pull/23801', 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173', 'https://github.com/advisories/GHSA-59hh-656j-3p7v', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh...
null
{'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}
{'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}
GHSA
GHSA-rcwj-2hj2-vmjj
Insufficient Session Expiration in Apache NiFi Registry
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests ...
{'CVE-2020-9482'}
2022-02-09T00:23:21Z
2022-02-09T00:23:06Z
MODERATE
6.5
{'CWE-613'}
{'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482', 'https://github.com/advisories/GHSA-rcwj-2hj2-vmjj', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c', 'https://nvd...
null
{'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}
{'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}
GHSA
GHSA-4xfp-4pfp-89wg
Reference binding to nullptr in `RaggedTensorToSparse`
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToSparse`: ```python import tensorflow as tf tf.raw_ops.RaggedTensorToSparse( rt_nested_splits=[[0, 38, 0]], rt_dense_values=[]) ``` The [implementation](https://github.com/tensorflow/tensorfl...
{'CVE-2021-37656'}
2021-08-25T14:42:55Z
2021-08-25T14:42:55Z
HIGH
7.1
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece', 'https://github.com/advisories/GHSA-4xfp-4pfp-89wg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4xfp-4pfp-89wg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37656'}
null
{'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'}
{'https://github.com/tensorflow/tensorflow/commit/1071f554dbd09f7e101324d366eec5f4fe5a3ece'}
GHSA
GHSA-mm4f-47ch-f7hx
Arbitrary code execution in kill-by-port
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23363'}
2021-04-13T15:32:43Z
2021-04-13T15:32:43Z
MODERATE
6.3
{'CWE-77'}
{'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4', 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js%23L8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363', 'https://github.com/advisories/GHSA-mm4f-47ch-f7hx', 'https://snyk.i...
null
{'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'}
{'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'}
GHSA
GHSA-6h7f-qwqm-35pp
Arbitrary File Read in phantom-html-to-pdf
This affects the package phantom-html-to-pdf before 0.6.1.
{'CVE-2020-7763'}
2021-07-29T20:38:33Z
2020-11-06T18:06:16Z
HIGH
7.5
{'CWE-200', 'CWE-22'}
{'https://github.com/advisories/GHSA-6h7f-qwqm-35pp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7763', 'https://www.npmjs.com/package/phantom-html-to-pdf', 'https://snyk.io/vuln/SNYK-JS-PHANTOMHTMLTOPDF-1023598', 'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'}
null
{'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'}
{'https://github.com/pofider/phantom-html-to-pdf/commit/b5d2da2639a49a95e0bdb3bc0c987cb6406b8259'}
GHSA
GHSA-m9hp-7r99-94h5
Critical security issues in XML encoding in github.com/dexidp/dex
### Impact The following vulnerabilities have been disclosed, which impact users leveraging the SAML connector: Signature Validation Bypass (CVE-2020-15216): https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7 `encoding/xml` instabilities: - [Element namespace prefix instability (CVE...
{'CVE-2020-26290'}
2022-04-19T19:02:43Z
2021-12-20T17:53:53Z
CRITICAL
9.3
{'CWE-347'}
{'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26290', 'https://github.com/dexidp/dex/security/advisories/GHSA-m9hp-7r99-94h5', 'https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7', 'http...
null
{'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}
{'https://github.com/dexidp/dex/commit/324b1c886b407594196113a3dbddebe38eecd4e8'}
GHSA
GHSA-4xc7-x2jr-cr74
Improper Authorization in dolibarr/dolibarr
Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more.
{'CVE-2022-0731'}
2022-03-04T14:46:06Z
2022-02-24T00:00:52Z
MODERATE
6.5
{'CWE-863'}
{'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8', 'https://github.com/advisories/GHSA-4xc7-x2jr-cr74', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}
null
{'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}
{'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}
GHSA
GHSA-hrgx-7j6v-xj82
Reflected cross-site scripting (XSS) vulnerability
This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package. #### Impact The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page. This i...
{'CVE-2022-0087'}
2022-04-19T19:03:19Z
2022-01-12T21:55:40Z
HIGH
7.1
{'CWE-79'}
{'https://huntr.dev/bounties/c9d7374f-2cb9-4bac-9c90-a965942f413e', 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0087', 'https://github.com/advisories/GHSA-hrgx-7j6v-xj82', 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365...
null
{'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38'}
{'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38'}
GHSA
GHSA-qcx9-j53g-ccgf
Remote Code Execution via unsafe classes in otherwise permitted modules
### Impact The module `AccessControl` defines security policies for Python code used in restricted code within Zope applications. Restricted code is any code that resides in Zope's object database, such as the contents of `Script (Python)` objects. The policies defined in `AccessControl` severely restrict access to P...
{'CVE-2021-32807'}
2021-08-30T23:27:56Z
2021-08-05T17:01:30Z
MODERATE
4.4
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32807', 'https://github.com/advisories/GHSA-qcx9-j53g-ccgf', 'https://github.com/zopefoundation/AccessControl/blob/master/CHANGES.rst#51-2021-07-30', 'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c', 'https://github.com/zopefou...
null
{'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'}
{'https://github.com/zopefoundation/AccessControl/commit/b42dd4badf803bb9fb71ac34cd9cb0c249262f2c'}
GHSA
GHSA-mj9r-wwm8-7q52
Open Redirect in github.com/AndrewBurian/powermux
### Impact Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link. ### Patches The issue is resolved in v1.1.1 ### Workarounds There are no existing...
{'CVE-2021-32721'}
2021-07-01T17:00:32Z
2021-07-01T17:00:32Z
MODERATE
4.7
{'CWE-601'}
{'https://github.com/advisories/GHSA-mj9r-wwm8-7q52', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32721', 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9', 'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52'}
null
{'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'}
{'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'}
GHSA
GHSA-f3pg-qwvg-p99c
Lenient Parsing of Content-Length Header When Prefixed with Plus Sign
### Summary hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can resul...
{'CVE-2021-32715'}
2022-04-19T19:03:01Z
2021-07-12T16:54:20Z
LOW
3.1
{'CWE-444'}
{'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715', 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html', 'https://github.com/advisories/GHSA-f3pg-qwvg-p99c', 'https://github.com/hyperium/hyper/security/advisories/GHSA-f...
null
{'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'}
{'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'}
GHSA
GHSA-gmv4-r438-p67f
Leading white space bypasses protocol validation
### Impact Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail. ### Patches Patched in 1.19.9 ### Workarounds Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(va...
{'CVE-2022-24723'}
2022-04-19T19:03:25Z
2022-03-03T19:23:36Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/medialize/URI.js/releases/tag/v1.19.9', 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723', 'https://github.com/advisories/GHSA-gmv4-r438-p67f', 'https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/', ...
null
{'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'}
{'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'}
GHSA
GHSA-f263-c949-w85g
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able t...
{'CVE-2020-7692'}
2022-05-04T02:18:41Z
2021-09-28T16:16:52Z
HIGH
7.4
{'CWE-862', 'CWE-863'}
{'https://tools.ietf.org/html/rfc8252%23section-8.1', 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-f263-c949-w85g', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f...
null
{'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'}
{'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'}
GHSA
GHSA-fpjm-rp2g-3r4c
Django Rest Framework jwt allows obtaining new token from notionally invalidated token
An issue was discovered in drf-jwt 1.15.x before 1.15.1. It allows attackers with access to a notionally invalidated token to obtain a new, working token via the refresh endpoint, because the blacklist protection mechanism is incompatible with the token-refresh feature. NOTE: drf-jwt is a fork of jpadilla/django-rest-f...
{'CVE-2020-10594'}
2022-03-21T22:21:38Z
2020-06-05T16:09:34Z
CRITICAL
9.1
{'CWE-287'}
{'https://github.com/advisories/GHSA-fpjm-rp2g-3r4c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10594', 'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0', 'https://github.com/Styria-Digital/django-rest-framework-jwt/issues/36', 'https://pypi.org/project/drf-j...
null
{'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0'}
{'https://github.com/Styria-Digital/django-rest-framework-jwt/commit/868b5c22ddad59772b447080183e7c7101bb18e0'}
GHSA
GHSA-38f9-m297-6q9g
DoS via malicious record IDs in WatermelonDB
## Impact Medium severity 5.9 https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H A maliciously crafted record ID can exploit a SQL Injection vulnerability in iOS adapter implementation and cause the app to delete all or selected records from the database, generally causing the app ...
{'CVE-2020-4035'}
2021-01-08T20:15:01Z
2020-06-03T21:57:53Z
MODERATE
5.9
{'CWE-89'}
{'https://github.com/Nozbe/WatermelonDB/security/advisories/GHSA-38f9-m297-6q9g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4035', 'https://github.com/advisories/GHSA-38f9-m297-6q9g', 'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025'}
null
{'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025'}
{'https://github.com/Nozbe/WatermelonDB/commit/924c7ae2a8d7d6459656751e5b9b1bf91a218025'}
GHSA
GHSA-cm9w-c4rj-r2cf
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component
This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.29.1 and 2.49.1 have been released and fully mitigate ...
{'CVE-2022-24722'}
2022-03-11T20:08:42Z
2022-03-02T22:24:05Z
HIGH
8.1
{'CWE-79'}
{'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/advisories/GHSA-cm9w-c4rj-r2cf', 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722', 'https://github.com/github/view_compone...
null
{'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'}
{'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'}
GHSA
GHSA-v8mp-hhjq-h4cj
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload.
{'CVE-2022-0965'}
2022-03-29T21:18:37Z
2022-03-16T00:00:46Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/advisories/GHSA-v8mp-hhjq-h4cj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
GHSA
GHSA-rmff-f8w9-c9rm
Data races in max7301
The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained `Expander<EI>` types regardless of if the `Expander` itself is safe to use across threads. As the `IO` types allow retrieving the `Expander`, this can lead to non-thread safe types being sent across threads as part of the `Expander` leadi...
{'CVE-2020-36472'}
2021-08-25T20:59:22Z
2021-08-25T20:59:22Z
MODERATE
5.9
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36472', 'https://github.com/edarc/max7301/issues/1', 'https://github.com/advisories/GHSA-rmff-f8w9-c9rm', 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html', 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'}
null
{'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'}
{'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'}
GHSA
GHSA-q263-fvxm-m5mw
Heap out of bounds access in MakeEdge in TensorFlow
### Impact Under certain cases, loading a saved model can result in accessing uninitialized memory while building the computation graph. The [`MakeEdge` function](https://github.com/tensorflow/tensorflow/blob/3616708cb866365301d8e67b43b32b46d94b08a0/tensorflow/core/common_runtime/graph_constructor.cc#L1426-L1438) creat...
{'CVE-2020-26271'}
2021-01-07T22:36:55Z
2020-12-10T19:07:34Z
LOW
4.4
{'CWE-908', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q263-fvxm-m5mw', 'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b', 'https://github.com/advisories/GHSA-q263-fvxm-m5mw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26271'}
null
{'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'}
{'https://github.com/tensorflow/tensorflow/commit/0cc38aaa4064fd9e79101994ce9872c6d91f816b'}
GHSA
GHSA-x4rg-4545-4w7w
Improper Input Validation and Excessive Iteration in Go Facebook Thrift
Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.0...
{'CVE-2019-3564'}
2022-04-12T22:50:27Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-834', 'CWE-20', 'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3564', 'https://www.facebook.com/security/advisories/cve-2019-3564', 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156', 'https://github.com/advisories/GHSA-x4rg-4545-4w7w', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41...
null
{'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}
{'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}
GHSA
GHSA-pgjj-866w-fc5c
Risk of code injection
### Impact Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues ### Patches Temporarily removed the problematic route and added a `no-new-func` rule to eslint Self-built users should upgrade to 7f1c430 and later as soon as poss...
{'CVE-2021-21278'}
2021-10-12T16:03:43Z
2021-10-12T16:03:43Z
HIGH
8.6
{'CWE-74'}
{'https://github.com/advisories/GHSA-pgjj-866w-fc5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278', 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d', 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c', 'https://www.npmjs.com/package/rsshub'}
null
{'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'}
{'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'}
GHSA
GHSA-48mj-p7x2-5jfm
Basic auth bypass in esphome
### Impact Anyone with web_server enabled and HTTP basic auth configured on 2021.9.1 or older `web_server` allows OTA update without checking user defined basic auth username & password ### Patches Patch released in 2021.9.2 ### Workarounds Disable/remove `web_server`
{'CVE-2021-41104'}
2022-04-19T19:03:10Z
2021-09-29T17:09:14Z
HIGH
7.5
{'CWE-306'}
{'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e', 'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41104', 'https://github.com/esphome/esphome/releases/tag/2021.9.2', 'https://github.com/espho...
null
{'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e'}
{'https://github.com/esphome/esphome/commit/be965a60eba6bb769e2a5afdbc8eed132f077a59', 'https://github.com/esphome/esphome/pull/2409/commits/207cde1667d8c799a197b78ca8a5a14de8d5ca1e'}
GHSA
GHSA-gjcw-v447-2w7q
Forgeable Public/Private Tokens in jws
Affected versions of the `jws` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT as a bearer token, the end result is a compl...
{'CVE-2016-1000223'}
2021-09-23T21:25:35Z
2020-09-01T15:23:18Z
HIGH
8.7
null
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e', 'https://github.com/advisories/GHSA-gjcw-v447-2w7q', 'https://nvd.nist.gov/vuln/detail/CVE-2016...
null
{'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'}
{'https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e'}
GHSA
GHSA-pv8x-p9hq-j328
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an issue where private properties such as a constructor could be replaced by using unicode characters when creating an object. ## Recommendation Upgrade to version 3.17.0 or later.
{'CVE-2017-1001003'}
2021-01-08T18:19:21Z
2017-12-18T22:27:53Z
CRITICAL
0
{'CWE-88'}
{'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/551', 'https://github.com/advisories/GHSA-pv8x-p9hq-j328', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001003'}
null
{'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}
{'https://github.com/josdejong/mathjs/commit/a60f3c8d9dd714244aed7a5569c3dccaa3a4e761'}
GHSA
GHSA-qrmm-w75w-3wpx
Server side request forgery in SwaggerUI
SwaggerUI supports displaying remote OpenAPI definitions through the `?url` parameter. This enables robust demonstration capabilities on sites like `petstore.swagger.io`, `editor.swagger.io`, and similar sites, where users often want to see what their OpenAPI definitions would look like rendered. However, this functio...
null
2022-04-19T19:03:17Z
2021-12-09T19:08:38Z
MODERATE
0
{'CWE-918'}
{'https://github.com/swagger-api/swagger-ui/security/advisories/GHSA-qrmm-w75w-3wpx', 'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76', 'https://github.com/swagger-api/swagger-ui/issues/4872', 'https://github.com/advisories/GHSA-qrmm-w75w-3wpx'}
null
{'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'}
{'https://github.com/swagger-api/swagger-ui/commit/01a3e55960f864a0acf6a8d06e5ddaf6776a7f76'}
GHSA
GHSA-35q2-47q7-3pc3
Potential exponential regex in monitor mode
### Impact When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service. ### Patches The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a...
{'CVE-2021-29469'}
2022-04-19T19:02:53Z
2021-04-27T15:56:03Z
LOW
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29469', 'https://security.netapp.com/advisory/ntap-20210611-0010/', 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3', 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e', 'https://github.com/advisories/GHS...
null
{'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}
{'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}
GHSA
GHSA-3pwh-5mmc-mwrx
Denial of Service in nes
Affected versions of `nes` are vulnerable to denial of service when given an invalid `cookie` header, and websocket authentication is set to `cookie`. Submitting an invalid cookie on the websocket upgrade request will cause the node process to throw and exit. ## Recommendation Update to version 6.4.1 or later.
{'CVE-2017-16025'}
2021-01-08T20:00:19Z
2018-07-24T20:06:33Z
HIGH
0
{'CWE-400'}
{'https://github.com/hapijs/nes/issues/171', 'https://nodesecurity.io/advisories/331', 'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655', 'https://www.npmjs.com/advisories/331', 'https://github.com/advisories/GHSA-3pwh-5mmc-mwrx', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16025'}
null
{'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655'}
{'https://github.com/hapijs/nes/commit/249ba1755ed6977fbc208463c87364bf884ad655'}
GHSA
GHSA-w3jx-wv97-67ph
Cross-site scripting in Dutchcoders transfer.sh
Dutchcoders transfer.sh before 1.2.4 allows XSS via an inline view.
{'CVE-2021-33496'}
2021-06-29T21:25:27Z
2021-06-29T21:25:27Z
MODERATE
6.1
{'CWE-79'}
{'https://vuln.ryotak.me/advisories/43', 'https://github.com/dutchcoders/transfer.sh/pull/373', 'https://github.com/dutchcoders/transfer.sh/releases/tag/v1.2.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33496', 'https://github.com/advisories/GHSA-w3jx-wv97-67ph', 'https://github.com/dutchcoders/transfer.sh/commit/9df...
null
{'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
{'https://github.com/dutchcoders/transfer.sh/commit/9df18fdc69de2e71f30d8c1e6bfab2fda2e52eb4'}
GHSA
GHSA-wpww-4jf4-4hx8
Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration Tested baserCMS Version : 4.4.0 (Latest) Affect...
{'CVE-2020-15273'}
2022-04-19T19:02:38Z
2020-11-04T21:08:38Z
LOW
7.3
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15273', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://github.com/advisories/GHSA-wpww-4jf4-4hx8', 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserpr...
null
{'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'}
{'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'}
GHSA
GHSA-7gm7-8q8v-9gf2
Server-Side Request Forgery (SSRF) in Shopware
### Impact The attacker can abuse the Admin SDK functionality on the server to read or update internal resources. ### Patches We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/d...
{'CVE-2022-24871'}
2022-04-22T21:04:08Z
2022-04-22T21:04:07Z
HIGH
7.2
{'CWE-918'}
{'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-7gm7-8q8v-9gf2', 'https://docs.shopware.com/en/shopware-6-en/sec...
null
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}
GHSA
GHSA-rrfp-j2mp-hq9c
Segfault in `tf.quantization.quantize_and_dequantize`
### Impact An attacker can pass an invalid `axis` value to `tf.quantization.quantize_and_dequantize`: ```python tf.quantization.quantize_and_dequantize( input=[2.5, 2.5], input_min=[0,0], input_max=[1,1], axis=10) ``` This results in accessing [a dimension outside the rank of the input tensor](https://github.com/...
{'CVE-2020-15265'}
2021-08-26T15:20:29Z
2020-11-13T17:13:04Z
LOW
5.9
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15265', 'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808', 'https://github.com/advisories/GHSA-rrfp-j2mp-hq9c', 'https://github.com/tensorflow/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA...
null
{'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'}
{'https://github.com/tensorflow/tensorflow/commit/eccb7ec454e6617738554a255d77f08e60ee0808'}
GHSA
GHSA-3wcq-x3mq-6r9p
Potential memory exposure in dns-packet
This affects the package dns-packet before versions 1.3.2 and 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.
{'CVE-2021-23386'}
2021-05-27T23:00:16Z
2021-05-24T19:51:04Z
HIGH
7.7
{'CWE-200', 'CWE-908'}
{'https://snyk.io/vuln/SNYK-JS-DNSPACKET-1293563', 'https://github.com/advisories/GHSA-3wcq-x3mq-6r9p', 'https://hackerone.com/bugs?subject=user&amp%3Breport_id=968858', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23386', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1295719', 'https://github.com/mafintosh/dns-packet/co...
null
{'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56', 'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d'}
{'https://github.com/mafintosh/dns-packet/commit/0d0d593f8df4e2712c43957a6c62e95047f12b2d', 'https://github.com/mafintosh/dns-packet/commit/25f15dd0fedc53688b25fd053ebbdffe3d5c1c56'}
GHSA
GHSA-8xqr-4cpm-wx7g
Cross-Site Scripting in react-svg
Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default. ## Recommendation Update to version 2.2.18 or later.
null
2021-08-04T20:24:38Z
2019-05-31T23:47:27Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/648', 'https://github.com/tanem/react-svg/pull/57', 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb', 'https://github.com/advisories/GHSA-8xqr-4cpm-wx7g', 'https://nodesecurity.io/advisories/648'}
null
{'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'}
{'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'}
GHSA
GHSA-c545-c4f9-rf6v
Heap OOB in TFLite
### Impact TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data: ```cc if (axis < 0) { axis = input_dim...
{'CVE-2021-37685'}
2021-08-25T14:40:09Z
2021-08-25T14:40:09Z
MODERATE
5.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v', 'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37685', 'https://github.com/advisories/GHSA-c545-c4f9-rf6v'}
null
{'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'}
{'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'}
GHSA
GHSA-jpj5-hg26-6jgc
Cross-site Scripting in Alist
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
{'CVE-2022-26533'}
2022-03-23T15:50:07Z
2022-03-13T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-jpj5-hg26-6jgc', 'https://github.com/Xhofe/alist/issues/645', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26533', 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
null
{'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
{'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}
GHSA
GHSA-h362-m8f2-5x7c
Password Hashing: Do not use MD5
### Impact User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for p...
{'CVE-2020-5229'}
2021-01-08T20:31:51Z
2020-01-30T21:21:58Z
LOW
7.7
{'CWE-327'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e', 'https://github.com/advisories/GHSA-h362-m8f2-5x7c', 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'}
null
{'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}
{'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}
GHSA
GHSA-9c84-4hx6-xmm4
Integer overflow in TFLite concatentation
### Impact The TFLite implementation of concatenation is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/7b7352a724b690b11bfaae2cd54bc3907daf6285/tensorflow/lite/kernels/concatenation.cc#L70-L76): ```cc for (int d = 0; d < t0->dims->size; ++d) { if (d == axis) { sum_axis ...
{'CVE-2021-29601'}
2021-05-21T14:28:08Z
2021-05-21T14:28:08Z
MODERATE
6.3
{'CWE-190'}
{'https://github.com/advisories/GHSA-9c84-4hx6-xmm4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29601', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c84-4hx6-xmm4', 'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'}
null
{'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'}
{'https://github.com/tensorflow/tensorflow/commit/4253f96a58486ffe84b61c0415bb234a4632ee73'}
GHSA
GHSA-hpcx-3pw8-g3j2
Free of uninitialized memory in telemetry
An issue was discovered in the telemetry crate through 0.1.2 for Rust. There is a drop of uninitialized memory if a value.clone() call panics within misc::vec_with_size().
{'CVE-2021-29937'}
2021-08-25T20:54:22Z
2021-08-25T20:54:22Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29937', 'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81', 'https://rustsec.org/advisories/RUSTSEC-2021-0046.html', 'https://github.com/advisories/GHSA-hpcx-3pw8-g3j2', 'https://github.com/Yoric/telemetry.rs/issues/45'}
null
{'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'}
{'https://github.com/Yoric/telemetry.rs/commit/2820cf12f2e08645fd6d1f15b4a90a54d6082a81'}
GHSA
GHSA-53xj-v576-3ch2
OS Command Injection in giting
giting version prior to 0.0.8 allows execution of arbritary commands. The first argument &quot;repo&quot; of function &quot;pull()&quot; is executed by the package without any validation.
{'CVE-2019-10802'}
2021-04-13T15:22:09Z
2021-04-13T15:22:09Z
HIGH
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-53xj-v576-3ch2', 'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0', 'https://snyk.io/vuln/SNYK-JS-GITING-559008', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'}
null
{'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0'}
{'https://github.com/MangoRaft/git/commit/9be41081f547d3dcef25e7d7c957bc2a3be2dfe0'}
GHSA
GHSA-fcf9-3qw3-gxmj
High severity vulnerability that affects cryptography
A flaw was found in python-cryptography versions between >=1.9.0 and <2.3. The finalize_with_tag API did not enforce a minimum tag length. If a user did not validate the input length prior to passing it to finalize_with_tag an attacker could craft an invalid payload with a shortened tag (e.g. 1 byte) such that they wou...
{'CVE-2018-10903'}
2022-03-03T21:54:39Z
2018-07-31T18:28:09Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10903', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10903', 'https://github.com/advisories/GHSA-fcf9-3qw3-gxmj'}
null
{'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef'}
{'https://github.com/pyca/cryptography/pull/4342/commits/688e0f673bfbf43fa898994326c6877f00ab19ef'}
GHSA
GHSA-mhhc-q96p-mfm9
Infinite loop in TFLite
### Impact The strided slice implementation in TFLite has a logic bug which can allow an attacker to trigger an infinite loop. This arises from newly introduced support for [ellipsis in axis definition](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/stride...
{'CVE-2021-37686'}
2021-08-25T14:39:58Z
2021-08-25T14:39:58Z
MODERATE
5.5
{'CWE-835'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mhhc-q96p-mfm9', 'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695', 'https://github.com/advisories/GHSA-mhhc-q96p-mfm9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37686', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'}
{'https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695'}
GHSA
GHSA-g4w7-3qr8-5623
Improper type usage in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type.
{'CVE-2020-35872'}
2021-08-25T20:47:01Z
2021-08-25T20:47:01Z
CRITICAL
9.8
{'CWE-351'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35872', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/advisories/GHSA-g4w7-3qr8-5623'}
null
{'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'}
{'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'}
GHSA
GHSA-cf6r-3wgc-h863
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14892'}
2021-04-27T19:44:30Z
2020-05-15T18:58:58Z
HIGH
7.5
{'CWE-502'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://github.com/advisories/GHSA-cf6r-3wgc-h863', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://github.com/...
null
{'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'}
{'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'}
GHSA
GHSA-rmxg-73gg-4p98
Cross-Site Scripting (XSS) in jquery
Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2015-9251'}
2021-09-17T18:58:20Z
2018-01-22T13:32:06Z
MODERATE
6.1
{'CWE-79'}
{'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.h...
null
{'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'}
{'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2', 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614', 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'}
GHSA
GHSA-wxhq-pm8v-cw75
Regular Expression Denial of Service in clean-css
Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. ## Recommendation Upgrade to version 4.1.11 or...
null
2022-04-19T19:03:26Z
2019-06-05T20:50:16Z
LOW
0
null
{'https://github.com/advisories/GHSA-wxhq-pm8v-cw75', 'https://www.npmjs.com/advisories/785', 'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'}
null
{'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'}
{'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'}
GHSA
GHSA-5vp3-v4hc-gx76
UUPSUpgradeable vulnerability in @openzeppelin/contracts
### Impact Upgradeable contracts using `UUPSUpgradeable` may be vulnerable to an attack affecting uninitialized implementation contracts. We will update this advisory with more information soon. ### Patches A fix is included in version 4.3.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`. ##...
{'CVE-2021-41264'}
2021-11-16T21:44:48Z
2021-09-15T20:23:17Z
CRITICAL
9.8
{'CWE-665'}
{'https://forum.openzeppelin.com/t/security-advisory-initialize-uups-implementation-contracts/15301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41264', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-5vp3-v4hc-gx76', 'https://github.com/advisories/GHSA-5vp3-v4hc-gx76', 'https://github....
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/024cc50df478d2e8f78539819749e94d6df60592'}
GHSA
GHSA-cf66-xwfp-gvc4
Missing Origin Validation in webpack-dev-server
Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation...
{'CVE-2018-14732'}
2022-04-06T20:40:37Z
2019-01-04T17:40:59Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10', 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21', 'https://github.com/webpack/webpack-dev-server/issues/1620', 'https://www.npmjs.com/advisories/725', 'https://github.com/webpack/web...
null
{'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'}
{'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'}
GHSA
GHSA-7359-3c6r-hfc2
Improper Certificate Validation in oauth ruby gem
lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.
{'CVE-2016-11086'}
2021-10-05T16:25:55Z
2021-04-22T16:22:15Z
HIGH
7.4
{'CWE-295'}
{'https://github.com/advisories/GHSA-7359-3c6r-hfc2', 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb', 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086', 'https://github.com/oauth-xx/oauth-ruby/issues/137', 'https://rubygems.org/gems/oauth', 'https://github.com/oauth-xx/oauth-ru...
null
{'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}
{'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}
GHSA
GHSA-mh8g-hprg-8363
Hard-Coded Key Used For Remember-me Token in Opencast
### Impact The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the ...
{'CVE-2020-5222'}
2022-04-19T19:02:24Z
2020-01-30T21:21:44Z
MODERATE
6.8
{'CWE-798'}
{'https://github.com/advisories/GHSA-mh8g-hprg-8363', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5222', 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'}
null
{'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'}
{'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'}
GHSA
GHSA-4f7p-27jc-3c36
HTTP Request Smuggling in waitress
### Impact When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behav...
{'CVE-2022-24761'}
2022-03-21T22:15:26Z
2022-03-18T19:00:59Z
HIGH
7.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24761', 'https://github.com/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0', 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36', 'https://github.com/Pylons/waitress/releases/tag/v2...
null
{'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}
{'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}
GHSA
GHSA-8p36-q63g-68qh
Autobinding vulnerability in MITREid Connect
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request par...
{'CVE-2021-27582'}
2021-05-13T22:31:22Z
2021-05-13T22:31:22Z
CRITICAL
9.1
{'CWE-915'}
{'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c', 'https://github.com/advisories/GHSA-8p36-q63g-68qh', 'htt...
null
{'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'}
{'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'}
GHSA
GHSA-x4w5-r546-x9qh
Arbitrary File Read in html-pdf
All versions of `html-pdf` are vulnerable to Arbitrary File Read. The package fails to sanitize the HTML input, allowing attackers to exfiltrate server files by supplying malicious HTML code. XHR requests in the HTML code are executed by the server. Input with an XHR request such as `request.open("GET","file:///etc/pas...
{'CVE-2019-15138'}
2022-01-04T19:51:52Z
2019-10-11T18:40:38Z
HIGH
7.5
{'CWE-200', 'CWE-668', 'CWE-73', 'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20191017-0005/', 'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362', 'https://github.com/marcbachmann/node-html-pdf/releases/tag/v3.0.1', 'https://www.npmjs.com/advisories/1095', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15138', '...
null
{'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362'}
{'https://github.com/marcbachmann/node-html-pdf/commit/c12d6977778014139183c9f8da7579fd7ac65362'}
GHSA
GHSA-2p5p-m353-833w
Sort order SQL injection in Administrate
In Administrate (rubygem) before version 0.13.0, when sorting by attributes on a dashboard, the direction parameter was not validated before being interpolated into the SQL query. This could present a SQL injection if the attacker were able to modify the `direction` parameter and bypass ActiveRecord SQL protections. W...
{'CVE-2020-5257'}
2022-04-19T19:02:24Z
2020-03-13T21:05:44Z
HIGH
7.7
{'CWE-943'}
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5257', 'https://github.com/advisories/GHSA-2p5p-m353-833w', 'https://github.com/thoughtbot/administrate/security/advisories/GHSA-2p5p-m353-833w'}
null
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'}
{'https://github.com/thoughtbot/administrate/commit/3ab838b83c5f565fba50e0c6f66fe4517f98eed3'}
GHSA
GHSA-r6hh-5g3q-wwgc
Stored Cross-site Scripting in grav
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
{'CVE-2022-0970'}
2022-03-28T22:27:37Z
2022-03-16T00:00:45Z
HIGH
7.1
{'CWE-79'}
{'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://github.com/advisories/GHSA-r6hh-5g3q-wwgc', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'}
null
{'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'}
{'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'}
GHSA
GHSA-2ghc-6v89-pw9j
Prototype Pollution in body-parser-xml
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3666'}
2021-10-06T22:03:36Z
2021-09-14T20:25:35Z
HIGH
7.6
{'CWE-1321', 'CWE-915'}
{'https://github.com/advisories/GHSA-2ghc-6v89-pw9j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
null
{'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}
{'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63'}