ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-4rvg-955w-h68q
Path Traversal in angular-http-server
Affected versions of `angular-http-server` are vulnerable to path traversal allowing a remote attacker to read files from the server that uses `angular-http-server`. ## Recommendation Update to version 1.6.0 or later. :exclamation: Note: This was originally thought to be fixed in version 1.4.3, though according to [...
{'CVE-2018-3713'}
2021-03-23T21:44:03Z
2018-07-26T14:47:40Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/309120', 'https://github.com/simonh1000/angular-http-server/pull/21', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3713', 'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8', 'https://www.npmjs.com/advisories/589', 'https://github.com/advisor...
null
{'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8'}
{'https://github.com/simonh1000/angular-http-server/commit/34d4bd0cd0f00c46db30855a8c4aabae27eb0ac8'}
GHSA
GHSA-qfc5-mcwq-26q8
Double Free in psutil
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
{'CVE-2019-18874'}
2021-08-19T22:13:44Z
2020-03-12T17:02:50Z
HIGH
7.5
{'CWE-415'}
{'https://github.com/giampaolo/psutil/pull/1616', 'https://github.com/advisories/GHSA-qfc5-mcwq-26q8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P7QI7MOTZTFXQYU23CP3RAWXCERMOAS/', 'https://usn.ubuntu.com/4204-1/', 'https://github.com/giampaolo/psutil/commit/7d512c8...
null
{'https://github.com/giampaolo/psutil/commit/7d512c8e4442a896d56505be3e78f1156f443465'}
{'https://github.com/giampaolo/psutil/commit/7d512c8e4442a896d56505be3e78f1156f443465'}
GHSA
GHSA-hggm-jpg3-v476
RSA decryption vulnerable to Bleichenbacher timing vulnerability
### Impact RSA decryption was vulnerable to Bleichenbacher timing vulnerabilities, which would impact people using RSA decryption in online scenarios. ### Patches This is fixed in cryptography 3.2. https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494 is the resolving commit.
{'CVE-2020-25659'}
2022-04-25T21:36:49Z
2020-10-27T20:33:13Z
MODERATE
5.9
{'CWE-385'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494', 'https://github.com/advisories/GHSA-hggm-jpg3-v476', 'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b', 'https://nvd.nist.gov...
null
{'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b', 'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494'}
{'https://github.com/pyca/cryptography/commit/58494b41d6ecb0f56b7c5f05d5f5e3ca0320d494', 'https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b'}
GHSA
GHSA-hwj3-m3p6-hj38
dom4j allows External Entities by default which might enable XXE attacks
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy ...
{'CVE-2020-10683'}
2022-02-08T22:06:13Z
2020-06-05T16:13:36Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/issues/87', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'http...
null
{'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'}
{'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'}
GHSA
GHSA-325j-24f4-qv5x
Regular Expression Denial of Service in ssri
Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode. ## Recommendation Update to version 5.2.2 or later.
{'CVE-2018-7651'}
2021-08-31T20:21:07Z
2018-03-07T22:22:20Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/zkat/ssri/issues/10', 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7651', 'https://nodesecurity.io/advisories/565', 'https://github.com/advisories/GHSA-325j-24f4-qv5x', 'https://www.npmjs.com/advisories/565'}
null
{'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d'}
{'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d'}
GHSA
GHSA-fpqv-x9hm-35j9
Potential XSS vulnerability in Kitodo.Presentation
### Impact Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected. It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, alt...
{'CVE-2020-16095'}
2022-04-19T19:02:32Z
2020-07-31T17:39:22Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-fpqv-x9hm-35j9', 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9', 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095', 'https://typo3.org/help/secur...
null
{'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}
{'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}
GHSA
GHSA-f93j-hmcr-jcwh
Data Injection Vulnerability in moped Rubygem
The Moped::BSON::ObjecId.legal? method in rubygem-moped before commit dd5a7c14b5d2e466f7875d079af71ad19774609b allows remote attackers to cause a denial of service (worker resource consumption) or perform a cross-site scripting (XSS) attack via a crafted string.
{'CVE-2015-4410'}
2021-09-23T18:56:26Z
2020-08-19T16:45:49Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/moped/CVE-2015-4410.yml', 'https://rubygems.org/gems/moped/versions', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4410', 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161987...
null
{'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}
{'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24'}
GHSA
GHSA-jwf9-w5xm-f437
Heap OOB in TFLite's `Gather*` implementations
### Impact TFLite's [`GatherNd` implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/gather_nd.cc#L124) does not support negative indices but there are no checks for this situation. Hence, an attacker can read arbitrary data from the heap by car...
{'CVE-2021-37687'}
2021-08-25T14:40:02Z
2021-08-25T14:40:02Z
MODERATE
5.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37687', 'https://github.com/advisories/GHSA-jwf9-w5xm-f437', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jwf9-w5xm-f437', 'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorfl...
null
{'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d'}
{'https://github.com/tensorflow/tensorflow/commit/bb6a0383ed553c286f87ca88c207f6774d5c4a8f', 'https://github.com/tensorflow/tensorflow/commit/eb921122119a6b6e470ee98b89e65d721663179d'}
GHSA
GHSA-9rpc-5v9q-5r7f
Incomplete validation in `SparseReshape`
### Impact Incomplete validation in `SparseReshape` results in a denial of service based on a `CHECK`-failure. ```python import tensorflow as tf input_indices = tf.constant(41, shape=[1, 1], dtype=tf.int64) input_shape = tf.zeros([11], dtype=tf.int64) new_shape = tf.zeros([1], dtype=tf.int64) tf.raw_ops.SparseReshap...
{'CVE-2021-29611'}
2021-05-21T14:28:35Z
2021-05-21T14:28:35Z
LOW
3.6
{'CWE-665', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29611', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9rpc-5v9q-5r7f', 'https://github.com/advisories/GHSA-9rpc-5v9q-5r7f', 'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6'}
null
{'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6'}
{'https://github.com/tensorflow/tensorflow/commit/1d04d7d93f4ed3854abf75d6b712d72c3f70d6b6'}
GHSA
GHSA-v659-54cx-g4qr
Prototype Pollution in deep-override
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25941'}
2021-05-25T20:44:53Z
2021-05-17T20:57:25Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941', 'https://github.com/advisories/GHSA-v659-54cx-g4qr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25941'}
null
{'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268'}
{'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268'}
GHSA
GHSA-9xh4-23q4-v6wr
Heap buffer overflow and undefined behavior in `FusedBatchNorm`
### Impact The implementation of `tf.raw_ops.FusedBatchNorm` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf x = tf.zeros([10, 10, 10, 6], dtype=tf.float32) scale = tf.constant([0.0], shape=[1], dtype=tf.float32) offset = tf.constant([0.0], shape=[1], dtype=tf.float32) mean = tf.const...
{'CVE-2021-29583'}
2022-04-26T18:09:37Z
2021-05-21T14:26:35Z
LOW
2.5
{'CWE-476', 'CWE-787', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9xh4-23q4-v6wr', 'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29583', 'https://github.com/advisories/GHSA-9xh4-23q4-v6wr'}
null
{'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'}
{'https://github.com/tensorflow/tensorflow/commit/6972f9dfe325636b3db4e0bc517ee22a159365c0'}
GHSA
GHSA-v528-7hrm-frqp
Improper Check for Unusual or Exceptional Conditions in json-smart
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
{'CVE-2021-27568'}
2022-04-26T20:59:54Z
2021-06-16T18:03:47Z
CRITICAL
9.1
{'CWE-754'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v1/issues/7', 'https://github.com/netplex/json-smart-v2/issues/60', 'https://lists.apache.org...
null
{'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}
{'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}
GHSA
GHSA-g5v4-5x39-vwhx
Zip slip directory exploit in github.com/deislabs/oras
### Impact The directory support (#55) allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on ...
{'CVE-2021-21272'}
2022-04-19T19:02:44Z
2022-02-15T00:32:04Z
HIGH
6.5
{'CWE-29', 'CWE-22'}
{'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e', 'https://pkg.go.dev/github.com/deislabs/oras/pkg/oras', 'https://github.com/advisories/GHSA-g5v4-5x39-vwhx', 'https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21272',...
null
{'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}
{'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}
GHSA
GHSA-46c5-pfj8-fv65
Improperly checked metadata on tools/armour itemstacks received from the client
### Impact Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked. When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadat...
null
2022-03-22T18:46:09Z
2022-03-18T22:36:03Z
HIGH
7.5
{'CWE-704'}
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65', 'https://github.com/advisories/GHSA-46c5-pfj8-fv65'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'}
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'}
GHSA
GHSA-7fcj-pq9j-wh2r
Local Privilege Escalation in PyInstaller
### Impact Local Privilege Escalation in all Windows software frozen by PyInstaller in "onefile" mode. The vulnerability is present only on Windows and in this particular case: If a **software frozen by PyInstaller in "onefile" mode** is launched by a (privileged) user who has **his/her "TempPath" resolving to a worl...
{'CVE-2019-16784'}
2022-04-19T19:02:24Z
2020-01-16T22:18:27Z
HIGH
7
{'CWE-250'}
{'https://github.com/pyinstaller/pyinstaller/security/advisories/GHSA-7fcj-pq9j-wh2r', 'https://github.com/pyinstaller/pyinstaller/commit/42a67148b3bdf9211fda8499fdc5b63acdd7e6cc', 'https://github.com/pyinstaller/pyinstaller/commit/be948cf0954707671aa499da17b10c86b6fa5e5c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16...
null
{'https://github.com/pyinstaller/pyinstaller/commit/42a67148b3bdf9211fda8499fdc5b63acdd7e6cc', 'https://github.com/pyinstaller/pyinstaller/commit/be948cf0954707671aa499da17b10c86b6fa5e5c'}
{'https://github.com/pyinstaller/pyinstaller/commit/be948cf0954707671aa499da17b10c86b6fa5e5c', 'https://github.com/pyinstaller/pyinstaller/commit/42a67148b3bdf9211fda8499fdc5b63acdd7e6cc'}
GHSA
GHSA-86qr-9vqc-pgc6
Code execution in Spring Integration
Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution durin...
{'CVE-2020-5413'}
2022-04-25T23:06:11Z
2020-08-05T14:53:06Z
CRITICAL
9.8
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://tanzu.vmware.com/security/cve-2020-5413...
null
{'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}
{'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}
GHSA
GHSA-hf5h-hh56-3vrg
Denial of Service in uws
Affected versions of `uws` do not properly handle large websocket messages when `permessage-deflate` is enabled, which may result in a denial of service condition. If `uws` recieves a 256Mb websocket message when `permessage-deflate` is enabled, the server will compress the message prior to executing the length check,...
{'CVE-2016-10544'}
2021-01-08T21:17:01Z
2020-09-01T16:02:29Z
HIGH
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-hf5h-hh56-3vrg', 'https://nodesecurity.io/advisories/149', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10544', 'https://www.npmjs.com/advisories/149', 'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9'}
null
{'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9'}
{'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9'}
GHSA
GHSA-r9c2-cr39-c8g6
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
{'CVE-2015-7579'}
2021-09-17T14:45:38Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'http://www.securitytracker.com/id/1034816', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'http://www.openwall.com/lists/oss-security/2016/01/25/12', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579',...
null
{'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}
{'https://github.com/rails/rails-html-sanitizer/commit/49dfc1584c5b8e35a4ffabf8356ba3df025e8d3f'}
GHSA
GHSA-mmhj-4w6j-76h7
Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate
Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. `Reference` objects allow access to the underlying reference's full prototype chain. In an environment where...
{'CVE-2021-21413'}
2022-04-19T19:02:46Z
2021-04-06T17:22:55Z
HIGH
8
{'CWE-913'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21413', 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400', 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704', 'https://github.com/advisories/GHSA-mmhj-4w6j-76h7', 'https://github.com/laverdet/isolated-vm/security/adv...
null
{'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704', 'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15'}
{'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15', 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704'}
GHSA
GHSA-p92x-r36w-9395
Type confusion in mpath
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype....
{'CVE-2021-23438'}
2021-09-13T20:27:08Z
2021-09-02T22:02:25Z
CRITICAL
5.6
{'CWE-843'}
{'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23438', 'https://snyk.io/vuln/SNYK-JS-MPATH-1577289', 'https://github.com/advisories/GHSA-p92x-r36w-9395'}
null
{'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc'}
{'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc'}
GHSA
GHSA-q863-cchm-c6c6
SQL Injection in Fork CMS
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
{'CVE-2022-0153'}
2022-03-30T20:34:44Z
2022-03-25T00:00:33Z
HIGH
7.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0153', 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608', 'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb', 'https://github.com/advisories/GHSA-q863-cchm-c6c6'}
null
{'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}
{'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}
GHSA
GHSA-jg4m-q6w8-vrjp
High severity vulnerability that affects rgpg
The self.run_gpg function in lib/rgpg/gpg_helper.rb in the rgpg gem before 0.2.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors.
{'CVE-2013-4203'}
2021-09-14T19:42:52Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'http://www.openwall.com/lists/oss-security/2013/08/03/2', 'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505', 'https://github.com/advisories/GHSA-jg4m-q6w8-vrjp', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4203'}
null
{'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}
{'https://github.com/rcook/rgpg/commit/b819b13d198495f3ecd2762a0dbe27bb6fae3505'}
GHSA
GHSA-qpgw-2c72-4c89
Mautic users able to download any files from server using filemanager
### Impact Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. ### Patches Update to 2.12.0 or later. ### Workarounds None ### For more information If you...
{'CVE-2017-1000490'}
2022-04-19T19:02:45Z
2021-01-19T20:50:38Z
HIGH
6.5
{'CWE-22'}
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/advisories/GHSA-qpgw-2c72-4c89', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490', 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89...
null
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'}
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'}
GHSA
GHSA-8v3j-jfg3-v3fv
Prototype Pollution in Sails.js
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
{'CVE-2021-44908'}
2022-03-29T21:42:44Z
2022-03-18T00:01:11Z
MODERATE
9.8
{'CWE-1321'}
{'https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32', 'https://github.com/advisories/GHSA-8v3j-jfg3-v3fv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908', 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358', 'https://github.com/M...
null
{'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358'}
{'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358'}
GHSA
GHSA-px8v-hxxx-2rgh
Potential Code Injection in Sprout Forms
### Impact A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code. ### Patches The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7` ### Workarounds Users unable to upgrade shou...
{'CVE-2020-11056'}
2022-04-19T19:02:25Z
2020-05-08T21:00:02Z
CRITICAL
7.4
{'CWE-94', 'CWE-74'}
{'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh', 'https://github.com/barrelstrength/craft-sprout-forms/blob/v3/CHANGELOG.md#390---2020-04-09-critical', 'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49', 'https://gi...
null
{'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'}
{'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'}
GHSA
GHSA-mw6v-crh8-8533
Integer Overflow or Wraparound in Google TensorFlow
Google TensorFlow 1.7.x and earlier is affected by a Buffer Overflow vulnerability. The type of exploitation is context-dependent.
{'CVE-2018-7575'}
2022-03-23T22:28:48Z
2019-04-30T15:36:41Z
CRITICAL
9.8
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/d107fee1e4a9a4462f01564798d345802acc2aef', 'https://github.com/advisories/GHSA-mw6v-crh8-8533', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7575', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-004.md'}
null
{'https://github.com/tensorflow/tensorflow/commit/d107fee1e4a9a4462f01564798d345802acc2aef'}
{'https://github.com/tensorflow/tensorflow/commit/d107fee1e4a9a4462f01564798d345802acc2aef'}
GHSA
GHSA-g4gq-j4p2-j8fr
Remote Code Execution via Script (Python) objects under Python 3
### Impact Background: The optional add-on package `Products.PythonScripts` adds `Script (Python)` to the list of content items a user can add to the Zope object database. Inside these scripts users can write Python code that is executed when rendered through the web. The code environment in these script objects is lim...
{'CVE-2021-32811'}
2021-08-30T23:21:30Z
2021-08-05T17:00:37Z
HIGH
7.5
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32811', 'https://github.com/zopefoundation/Zope/security/advisories/GHSA-g4gq-j4p2-j8fr', 'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988', 'https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf', 'http...
null
{'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988'}
{'https://github.com/zopefoundation/Zope/commit/f72a18dda8e9bf2aedb46168761668464a4be988'}
GHSA
GHSA-9gp4-qrff-c648
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
{'CVE-2016-1000345'}
2021-09-07T21:35:31Z
2018-10-18T18:04:13Z
MODERATE
5.9
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345', 'https://github.com/advisories/GHSA-9gp4-qrff-c648', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/21d...
null
{'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'}
{'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'}
GHSA
GHSA-94jq-q5v2-76wj
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust sto...
{'CVE-2021-40828'}
2021-12-03T15:21:37Z
2021-11-24T21:02:24Z
MODERATE
6.3
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/...
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'}
GHSA
GHSA-7p99-3798-f85c
URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
### Impact Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route. If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//go...
{'CVE-2022-24794'}
2022-04-09T15:03:35Z
2022-03-31T22:44:47Z
HIGH
7.5
{'CWE-601'}
{'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24794', 'https://github.com/advisories/GHSA-7p99-3798-f85c'}
null
{'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad'}
{'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad'}
GHSA
GHSA-j8c8-67vp-6mx7
Arbitrary memory read in `ImmutableConst`
### Impact The `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents: ```python import tensorflow as tf with open('/tmp/test','wb') as f: f.write(b'\xe2'*128) data = tf.raw_ops.ImmutableConst(dtype=tf.string,shape=3,memory_region_name='/tmp/test') print(data) ``` ...
{'CVE-2021-41227'}
2021-11-10T18:34:49Z
2021-11-10T18:34:49Z
MODERATE
6.6
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41227', 'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585', 'https://github.com/advisories/GHSA-j8c8-67vp-6mx7', 'https://github.com/tensorflow/...
null
{'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b', 'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585'}
{'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585', 'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b'}
GHSA
GHSA-cmch-296j-wfvw
Arbitrary File Write in iobroker.js-controller
Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the atta...
{'CVE-2019-10767'}
2021-08-19T15:11:16Z
2019-12-02T18:06:14Z
HIGH
7.5
{'CWE-22'}
{'https://www.npmjs.com/advisories/1419', 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767', 'https://github.com/advisories/GHSA-cmch-296j-wfvw', 'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}
null
{'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}
{'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}
GHSA
GHSA-v4rr-65x6-g69f
XXE vulnerability in Jenkins Flaky Test Handler Plugin
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2022-28140'}
2022-05-03T20:56:23Z
2022-03-30T00:00:25Z
HIGH
8.1
{'CWE-611'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896', 'https://github.com/advisories/GHSA-v4rr-65x6-g69f', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28140', 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a002...
null
{'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}
{'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}
GHSA
GHSA-6gmv-pjp9-p8w8
Out of bounds read in Tensorflow
### Impact The [implementation of shape inference for `ReverseSequence`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671) does not fully validate the value of `batch_dim` and can result in a heap OOB read: ```python import tensorflow ...
{'CVE-2022-21728'}
2022-02-10T00:17:52Z
2022-02-09T18:29:24Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21728', 'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995', 'https://github.com/tensorflow/tensorflow...
null
{'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'}
{'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'}
GHSA
GHSA-j878-43hm-8gr5
Unrestricted Upload of File with Dangerous Type in Microweber
In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution.
{'CVE-2022-0921'}
2022-03-23T15:35:21Z
2022-03-12T00:00:30Z
MODERATE
6.7
{'CWE-434'}
{'https://github.com/advisories/GHSA-j878-43hm-8gr5', 'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318', 'https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'}
null
{'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'}
{'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'}
GHSA
GHSA-p6mr-pxg4-68hx
Symlink Arbitrary File Overwrite in bower
Versions of `bower` prior to 1.8.8 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `bower` does not verify that extracted symbolic links do not resolve to targets outside of the extraction root directory. ## Recommendation Update to version 1.8.8 or later
{'CVE-2019-5484'}
2021-01-08T20:41:10Z
2019-09-17T23:21:34Z
HIGH
0
{'CWE-22'}
{'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3', 'https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction', 'https://www.npmjs.com/advisories/776', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/487.json', 'https://github.com/advisories/GHSA-p6m...
null
{'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3'}
{'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3'}
GHSA
GHSA-4mqv-gcr3-pff9
"Cross-site scripting in phpoffice/phpspreadsheet"
"This affects the package phpoffice/phpspreadsheet. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML."
{'CVE-2020-7776'}
2021-05-06T18:53:37Z
2021-05-06T18:53:37Z
MODERATE
6.4
{'CWE-79'}
{'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/src/PhpSpreadsheet/Writer/Html.php%23L1792', 'https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856', 'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7776', 'https:...
null
{'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'}
{'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'}
GHSA
GHSA-7fvx-3jfc-2cpc
Heap OOB in `ResourceScatterUpdate`
### Impact An attacker can trigger a read from outside of bounds of heap allocated data by sending invalid arguments to `tf.raw_ops.ResourceScatterUpdate`: ```python import tensorflow as tf v = tf.Variable([b'vvv']) tf.raw_ops.ResourceScatterUpdate( resource=v.handle, indices=[0], updates=['1', '2', '3', '4', '...
{'CVE-2021-37655'}
2021-08-25T14:42:58Z
2021-08-25T14:42:58Z
HIGH
7.3
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f', 'https://github.com/advisories/GHSA-7fvx-3jfc-2cpc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7fvx-3jfc-2cpc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37655'}
null
{'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f'}
{'https://github.com/tensorflow/tensorflow/commit/01cff3f986259d661103412a20745928c727326f'}
GHSA
GHSA-8j9v-h2vp-2hhv
XSS in HtmlSanitizer
### Impact If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. ### Patches The problem has been fixed in versi...
{'CVE-2020-26293'}
2021-01-08T18:14:26Z
2021-01-04T18:22:11Z
LOW
6.1
{'CWE-74', 'CWE-79'}
{'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293', 'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372', 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv', 'https://www.nuget.org/packag...
null
{'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'}
{'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8'}
GHSA
GHSA-jjvm-3mfq-7gc7
Cross-site Scripting in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0506'}
2022-02-15T00:17:21Z
2022-02-09T00:00:31Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70', 'https://github.com/advisories/GHSA-jjvm-3mfq-7gc7', 'https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506'}
null
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'}
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'}
GHSA
GHSA-xp7p-3gx7-j6wx
calibre-web is vulnerable to Business Logic Errors
calibre-web is vulnerable to Business Logic Errors
{'CVE-2021-4171'}
2022-03-21T19:12:08Z
2022-01-21T23:44:15Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4171', 'https://huntr.dev/bounties/1117f439-133c-4563-afb2-6cd80607bd5c', 'https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce', 'https://github.com/advisories/GHSA-xp7p-3gx7-j6wx'}
null
{'https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce'}
{'https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce'}
GHSA
GHSA-4r4m-hjwj-43p8
Insecure Defaults Allow MITM Over TLS in engine.io-client
Affected versions of `engine.io-client` do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks. The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, such as undefined or null, certifi...
{'CVE-2016-10536'}
2021-01-08T19:53:57Z
2019-02-18T23:39:50Z
MODERATE
0
{'CWE-300'}
{'https://www.npmjs.com/advisories/99', 'https://www.cigital.com/blog/node-js-socket-io/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10536', 'https://nodesecurity.io/advisories/99', 'https://github.com/advisories/GHSA-4r4m-hjwj-43p8', 'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800...
null
{'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800e2f7ff5c1'}
{'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800e2f7ff5c1'}
GHSA
GHSA-vpwq-6cp4-ffqc
Stored Cross-site Scripting in ShowDoc
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
{'CVE-2022-0945'}
2022-03-29T21:28:25Z
2022-03-16T00:00:49Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-vpwq-6cp4-ffqc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0945', 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891', 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e'}
null
{'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}
{'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}
GHSA
GHSA-w3v3-cxq5-9vr4
Incorrect Default Permissions and Improper Access Control in snipe-it
snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions.
{'CVE-2022-0179'}
2022-01-21T23:58:07Z
2022-01-21T23:58:07Z
MODERATE
6.3
{'CWE-284', 'CWE-276'}
{'https://github.com/advisories/GHSA-w3v3-cxq5-9vr4', 'https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7', 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e', 'https://github.com/snipe/snipe-it/pull/10498', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179'}
null
{'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'}
{'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'}
GHSA
GHSA-hmv2-79q8-fv6g
Uncontrolled Resource Consumption in urllib3
The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of pe...
{'CVE-2020-7212'}
2021-04-30T17:31:43Z
2021-04-30T17:31:43Z
HIGH
7.5
{'CWE-400'}
{'https://pypi.org/project/urllib3/1.25.8/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7212', 'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a', 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst', 'https://github.com/advisories/GHSA-hmv2-79q8-fv6g'}
null
{'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a'}
{'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a'}
GHSA
GHSA-gg9m-x3cg-69vh
Access key stored in plain text by Jenkins Metrics Plugin
Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
{'CVE-2022-20621'}
2022-05-04T21:00:00Z
2022-01-13T00:00:57Z
MODERATE
0
{'CWE-522'}
{'https://github.com/advisories/GHSA-gg9m-x3cg-69vh', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20621', 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURIT...
null
{'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}
{'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}
GHSA
GHSA-fg47-3c2x-m2wr
TimelockController vulnerability in OpenZeppelin Contracts
### Impact A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to us...
{'CVE-2021-39167'}
2021-09-13T20:30:11Z
2021-08-30T16:12:38Z
CRITICAL
10
{'CWE-269'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr', 'https://nvd.nist.gov/vuln/d...
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'}
GHSA
GHSA-gg6x-xx78-448c
Reflected XSS when importing CSV in OctoberCMS
### Impact A user with the ability to use the import functionality of the `ImportExportController` behavior could be socially engineered by an attacker to upload a maliciously crafted CSV file which could result in a reflected XSS attack on the user in question ### Patches Issue has been patched in Build 466 (v1.0.466...
{'CVE-2020-5298'}
2022-04-19T19:02:26Z
2020-06-03T21:58:32Z
MODERATE
4
{'CWE-87'}
{'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5298', 'https://github.com/advisories/GHSA-gg6x-xx78-448c', 'https://github.com/octobercms/october/security/advisories/GHSA-gg6x-xx78-448c', 'http://packetstormsecurity.com/files/158730/O...
null
{'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'}
{'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'}
GHSA
GHSA-8gv3-57p6-g35r
Heap buffer overflow in `RaggedTensorToTensor`
### Impact An attacker can cause a heap buffer overflow in `tf.raw_ops.RaggedTensorToTensor`: ```python import tensorflow as tf shape = tf.constant([10, 10], shape=[2], dtype=tf.int64) values = tf.constant(0, shape=[1], dtype=tf.int64) default_value = tf.constant(0, dtype=tf.int64) l = [849, 0, 0, 0, 0, 0, 0, 0, 0, 0...
{'CVE-2021-29560'}
2022-04-26T18:10:15Z
2021-05-21T14:24:57Z
LOW
2.5
{'CWE-787', 'CWE-125'}
{'https://github.com/advisories/GHSA-8gv3-57p6-g35r', 'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8gv3-57p6-g35r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29560'}
null
{'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121'}
{'https://github.com/tensorflow/tensorflow/commit/a84358aa12f0b1518e606095ab9cfddbf597c121'}
GHSA
GHSA-j2x6-9323-fp7h
Integer bounds error in Vyper
### Impact in the following code, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. as of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions. ```vyper interface iface: def returns_int128() -> int128: view def returns_...
{'CVE-2022-24845'}
2022-04-22T20:24:15Z
2022-04-22T20:24:13Z
HIGH
8.8
{'CWE-190'}
{'https://github.com/vyperlang/vyper/security/advisories/GHSA-j2x6-9323-fp7h', 'https://github.com/advisories/GHSA-j2x6-9323-fp7h', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24845', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
null
{'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
{'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
GHSA
GHSA-q5pq-pgrv-fh89
Critical severity vulnerability that affects dns-sync
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
{'CVE-2014-9682'}
2021-09-16T19:33:41Z
2017-10-24T18:33:36Z
CRITICAL
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-9682', 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89', 'http://www.openwall.com/lists/oss-security/2014/11/11/6', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://github.com/skoranga/node-dns-sync/issues/1'}
null
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}
GHSA
GHSA-v4cp-h94r-m7xf
Use after free passing `externref`s to Wasm in Wasmtime
### Impact There was a use-after-free bug when passing `externref`s from the host to guest Wasm content. To trigger the bug, you have to explicitly pass multiple `externref`s from the host to a Wasm instance at the same time, either by * passing multiple `externref`s as arguments from host code to a Wasm function, *...
{'CVE-2021-39216'}
2022-04-19T19:03:08Z
2021-09-20T19:54:05Z
MODERATE
6.3
{'CWE-416'}
{'https://github.com/advisories/GHSA-v4cp-h94r-m7xf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2Z33FTXFQ6EOINVEQIP4DFBG53G5XIY/', 'h...
null
{'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3'}
{'https://github.com/bytecodealliance/wasmtime/commit/101998733b74624cbd348a2366d05760b40181f3'}
GHSA
GHSA-c3g4-w6cv-6v7h
Non-empty default inheritable capabilities for linux container in Buildah
A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container secu...
{'CVE-2022-27651'}
2022-04-19T18:02:47Z
2022-04-01T13:56:42Z
MODERATE
6.8
{'CWE-276'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2066840', 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h', 'https://github.com/containers/buildah/pull/3855', 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b', 'https://lists.fedoraproject.org/archives/l...
null
{'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e', 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b'}
{'https://github.com/containers/buildah/commit/90b3254c7404039c1c786999ac189654228f6e0e', 'https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b'}
GHSA
GHSA-hj2j-77xm-mc5v
High severity vulnerability that affects Jinja2
In Pallets Jinja before 2.8.1, str.format allows a sandbox escape.
{'CVE-2016-10745'}
2021-09-14T17:21:43Z
2019-04-10T14:30:13Z
HIGH
8.6
{'CWE-134'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10745', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00064.html', 'https://access.redhat.com/errata/RHSA-2019:4062', 'https://access.redhat.com/errata/RHSA-2019:3964', 'https://a...
null
{'https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16'}
{'https://github.com/pallets/jinja/commit/9b53045c34e61013dc8f09b7e52a555fa16bed16'}
GHSA
GHSA-hf6p-4rv2-9qrp
Path Traversal in bikshed
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing include, include-code or include-raw block is processed. The contents of arbitrary files could be disclosed in the HTML output.
{'CVE-2021-23423'}
2021-08-30T16:25:42Z
2021-08-30T16:25:42Z
MODERATE
5.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-hf6p-4rv2-9qrp', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537647', 'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23423'}
null
{'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'}
{'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd'}
GHSA
GHSA-7cqg-8449-rmfv
Observable Discrepancy in libsecp256k1-rs
A timing vulnerability in the Scalar::check_overflow function in Parity libsecp256k1-rs before 0.3.1 potentially allows an attacker to leak information via a side-channel attack.
{'CVE-2019-20399'}
2021-08-25T21:01:27Z
2021-08-25T21:01:27Z
MODERATE
5.9
{'CWE-362', 'CWE-203'}
{'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20399', 'https://github.com/advisories/GHSA-7cqg-8449-rmfv'}
null
{'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50'}
{'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50'}
GHSA
GHSA-cvgx-3v3q-m36c
Heap OOB in shape inference for `QuantizeV2`
### Impact The [shape inference code for `QuantizeV2`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/framework/common_shape_fns.cc#L2509-L2530) can trigger a read outside of bounds of heap allocated array: ```python import tensorflow as tf @tf.function def test...
{'CVE-2021-41211'}
2021-11-10T19:01:03Z
2021-11-10T19:01:03Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244', 'https://github.com/advisories/GHSA-cvgx-3v3q-m36c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41211'}
null
{'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'}
{'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'}
GHSA
GHSA-9689-rx4v-cqgc
Open Redirect
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
{'CVE-2018-15798'}
2022-04-12T22:10:05Z
2022-02-15T01:57:18Z
MODERATE
5.4
{'CWE-601'}
{'https://github.com/concourse/concourse/blob/release/5.2.x/release-notes/v5.2.8.md', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15798', 'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb', 'https://github.com/advisories/GHSA-9689-rx4v-cqgc', 'https://pivotal.io/security/...
null
{'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
{'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}
GHSA
GHSA-62g9-6hw5-rwfp
Path Traversal in resolve-path
Versions of `resolve-path` before 1.4.0 are vulnerable to path traversal. `resolve-path` relative path resolving suffers from a lack of file path sanitization for windows based paths. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2018-3732'}
2021-01-08T21:07:10Z
2018-07-18T21:20:25Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-62g9-6hw5-rwfp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3732', 'https://hackerone.com/reports/315760', 'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0', 'https://www.npmjs.com/advisories/573'}
null
{'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0'}
{'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0'}
GHSA
GHSA-cq27-v7xp-c356
Moderate severity vulnerability that affects pycrypto
Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
{'CVE-2013-7459'}
2021-09-09T20:09:53Z
2018-12-14T18:51:38Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4', 'https://security.gentoo.org/glsa/201702-14', 'https://github.com/advisories/GHSA-cq27-v7xp-c356', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/', 'ht...
null
{'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4'}
{'https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4'}
GHSA
GHSA-wvhm-4hhf-97x9
Cross-Site Scripting in Prism
### Impact The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 t...
{'CVE-2020-15138'}
2022-04-19T19:02:32Z
2020-08-07T22:28:30Z
HIGH
7.1
{'CWE-79'}
{'https://prismjs.com/plugins/previewers/#disabling-a-previewer', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138', 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c', 'https://github.com/advisories/GHSA-wvhm-4hhf-97x9', 'https://github.com/PrismJS/prism/security/advisories/G...
null
{'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c'}
{'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c'}
GHSA
GHSA-88cw-3m6x-49f7
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.
{'CVE-2020-17054'}
2021-08-02T17:25:58Z
2021-08-02T17:25:58Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://github.com/advi...
null
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'}
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'}
GHSA
GHSA-57f3-gghm-9mhc
Regular Expression Denial of Service (ReDoS)
This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.
{'CVE-2021-23353'}
2021-03-25T00:18:31Z
2021-03-12T21:28:46Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-57f3-gghm-9mhc', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287', 'https://github.com/MrRio/jsPDF/pull/3091', 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286', 'https://snyk.io/vuln/SNYK...
null
{'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e'}
{'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e'}
GHSA
GHSA-5fxf-x22x-5q38
Cross-site Scripting in microweber
XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0929'}
2022-03-22T20:02:31Z
2022-03-13T00:00:54Z
MODERATE
6.8
{'CWE-79'}
{'https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0929', 'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256', 'https://github.com/advisories/GHSA-5fxf-x22x-5q38'}
null
{'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'}
{'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'}
GHSA
GHSA-8wr4-2wm6-w3pr
B2 Command Line Tool TOCTOU application key disclosure
### Impact Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping...
{'CVE-2022-23653'}
2022-04-19T19:03:23Z
2022-02-24T13:11:51Z
MODERATE
4.7
{'CWE-367'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23653', 'https://github.com/Backblaze/B2_Command_Line_Tool/security/advisories/GHSA-8wr4-2wm6-w3pr', 'https://github.com/advisories/GHSA-8wr4-2wm6-w3pr', 'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb'}
null
{'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb'}
{'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb'}
GHSA
GHSA-m3rf-7m4w-r66q
Improper Authentication in Flask-AppBuilder
### Impact Improper authentication on the REST API. Allows for a malicious actor with a carefully crafted request to successfully authenticate and gain access to existing protected REST API endpoints. Only affects non database authentication types, and new REST API endpoints. ### Patches Upgrade to Flask-AppBuilder 3....
{'CVE-2021-41265'}
2021-12-10T18:29:56Z
2021-12-09T19:09:07Z
HIGH
8.1
{'CWE-287'}
{'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.3.4', 'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41265', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-m3rf-7m4w-r66q', 'https://github....
null
{'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc'}
{'https://github.com/dpgaspar/Flask-AppBuilder/commit/eba517aab121afa3f3f2edb011ec6bc4efd61fbc'}
GHSA
GHSA-v7m9-9497-p9gr
Possible pod name collisions in jupyterhub-kubespawner
### Impact _What kind of vulnerability is it? Who is impacted?_ JupyterHub deployments using: - KubeSpawner <= 0.11.1 (e.g. zero-to-jupyterhub 0.9.0) and - enabled named_servers (not default), and - an Authenticator that allows: - usernames with hyphens or other characters that require escape (e.g. `user-hyphen` or...
{'CVE-2020-15110'}
2021-11-19T15:44:02Z
2020-07-22T23:07:16Z
MODERATE
6.8
{'CWE-863'}
{'https://github.com/advisories/GHSA-v7m9-9497-p9gr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15110', 'https://github.com/jupyterhub/kubespawner/security/advisories/GHSA-v7m9-9497-p9gr', 'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0'}
null
{'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0'}
{'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0'}
GHSA
GHSA-vxrc-68xx-x48g
Sandbox Information Disclosure
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
{'CVE-2019-9942'}
2022-04-06T20:28:17Z
2022-03-26T00:25:25Z
LOW
3.7
null
{'https://seclists.org/bugtraq/2019/Mar/60', 'https://www.debian.org/security/2019/dsa-4419', 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077', 'https://symfony.com/blog/twig-sandbox-information-disclosure', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-...
null
{'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}
{'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}
GHSA
GHSA-v73w-r9xg-7cr9
Use of insecure jQuery version in OctoberCMS
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. ### Patches Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery. ### Workarounds Apply htt...
null
2022-04-19T19:02:27Z
2020-06-05T19:37:49Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-v73w-r9xg-7cr9', 'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892', 'https://github.com/octobercms/october/issues/5097', 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9'}
null
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'}
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'}
GHSA
GHSA-8843-m7mw-mxqm
Buffer overflow in Pillow
In Pillow before 6.2.3 and 7.x before 7.0.1, there are two Buffer Overflows in libImaging/TiffDecode.c.
{'CVE-2020-10379'}
2021-09-22T21:45:09Z
2020-07-27T21:52:41Z
HIGH
7.8
{'CWE-120'}
{'https://github.com/python-pillow/Pillow/commits/master/src/libImaging', 'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10379',...
null
{'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac'}
{'https://github.com/python-pillow/Pillow/commit/46f4a349b88915787fea3fb91348bb1665831bbb#diff-9478f2787e3ae9668a15123b165c23ac'}
GHSA
GHSA-m2wv-m5pf-284r
Cross-site Scripting in teampass
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload.
{'CVE-2022-26980'}
2022-04-05T21:07:47Z
2022-03-29T00:01:09Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26980', 'https://github.com/advisories/GHSA-m2wv-m5pf-284r', 'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2', 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca'}
null
{'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'}
{'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'}
GHSA
GHSA-gx7g-wjxg-jwwj
Cross-Site Request Forgery in YOURLS
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
{'CVE-2022-0088'}
2022-04-18T22:17:43Z
2022-04-04T00:00:55Z
LOW
3.5
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0088', 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59', 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29', 'https://github.com/YOURLS/YOURLS/pull/3264', 'https://github.com/YOURLS/YOURLS/issues/3170', 'https://github.com/advi...
null
{'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'}
{'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'}
GHSA
GHSA-9hgc-wpc5-v8p9
An attacker can execute malicious javascript in Live Helper Chat
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
{'CVE-2022-1530'}
2022-05-03T20:49:16Z
2022-04-30T00:00:37Z
LOW
0
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc', 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530', 'https://github.com/advisories/GHSA-9hgc-wpc5-v8p9'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}
GHSA
GHSA-h5g2-38x9-4gv3
High severity vulnerability that affects archive-tar-minitar and minitar
Directory traversal vulnerability in the minitar before 0.6 and archive-tar-minitar 0.5.2 gems for Ruby allows remote attackers to write to arbitrary files via a .. (dot dot) in a TAR archive entry.
{'CVE-2016-10173'}
2021-09-13T16:33:15Z
2017-10-24T18:33:35Z
HIGH
7.5
{'CWE-22'}
{'https://security.gentoo.org/glsa/201702-32', 'https://github.com/advisories/GHSA-h5g2-38x9-4gv3', 'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4', 'https://puppet.com/security/cve/cve-2016-10173', 'http://www.securityfocus.com/bid/95874', 'https://github.com/halostatue/minitar/...
null
{'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}
{'https://github.com/halostatue/minitar/commit/e25205ecbb6277ae8a3df1e6a306d7ed4458b6e4'}
GHSA
GHSA-v222-6mr4-qj29
Command Injection vulnerability in asciidoctor-include-ext
### Impact Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on ...
{'CVE-2022-24803'}
2022-04-06T21:24:00Z
2022-03-31T23:27:15Z
CRITICAL
10
{'CWE-78'}
{'https://github.com/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29', 'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803', 'https://github.com...
null
{'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee', 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155'}
{'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae155', 'https://github.com/jirutka/asciidoctor-include-ext/commit/cbaccf3de533cbca224bf61d0b74e4b84d41d8ee'}
GHSA
GHSA-5gjh-5j4f-cpwv
Unrestricted Upload of File with Dangerous Type in Gogs
### Impact The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected....
{'CVE-2022-0415'}
2022-03-29T22:02:35Z
2022-03-28T16:46:41Z
HIGH
8.8
{'CWE-434', 'CWE-20'}
{'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284', 'https://huntr.dev/bounties/b4928cfe-4110-462f-a180-6d5673797902', 'https://github.com/gogs/gogs/security/advisories/GHSA-5gjh-5j4f-cpwv', 'https://github.com/gogs/gogs/pull/6838', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0415', 'https:/...
null
{'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284'}
{'https://github.com/gogs/gogs/commit/0fef3c9082269e9a4e817274942a5d7c50617284'}
GHSA
GHSA-6898-wx94-8jq8
Potential Command Injection in libnotify
Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify. Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be un...
{'CVE-2013-7381'}
2021-09-23T20:55:30Z
2020-08-31T22:50:48Z
CRITICAL
9.8
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-7381', 'https://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify', 'https://www.npmjs.com/advisories/20', 'https://github.com/advisories/GHSA-6898-wx94-8jq8', 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b...
null
{'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}
{'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}
GHSA
GHSA-fjqm-246c-mwqg
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement c...
{'CVE-2016-1000346'}
2022-04-27T13:35:25Z
2018-10-17T16:27:28Z
LOW
3.7
null
{'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https://access.redhat.com/errata/RHSA-2018:...
null
{'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'}
{'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'}
GHSA
GHSA-2p89-5f22-8qvf
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to ...
{'CVE-2021-32711'}
2021-09-08T18:00:32Z
2021-09-08T18:00:32Z
CRITICAL
9.1
{'CWE-200'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711', 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://gith...
null
{'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
{'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
GHSA
GHSA-ph98-v78f-jqrm
SQL injection in jackalope/jackalope-doctrine-dbal
### Impact Users can provoke SQL injections if they can specify a node name or query. ### Patches Upgrade to version 1.7.4 If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. ##...
{'CVE-2021-43822'}
2022-04-19T19:03:17Z
2021-12-14T21:08:13Z
HIGH
8.5
{'CWE-89'}
{'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43822', 'https://github.com/advisories/GHSA-ph98-v78f-jqrm', 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}
null
{'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}
{'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}
GHSA
GHSA-fgv8-vj5c-2ppq
Incorrect Authorization in runc
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
{'CVE-2019-16884'}
2022-02-26T01:52:03Z
2022-02-22T15:38:08Z
HIGH
5.4
{'CWE-863'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00009.html', 'https://github.com/opencontainers/runc/pull/2129', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62OQ2P7K5YDZ5BRCH2Q6DHUJIHQD3QCD/', 'https://lists.fedoraproject.org/archives/list/package-an...
null
{'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70'}
{'https://github.com/crosbymichael/runc/commit/78dce1cf1ec36bbe7fe6767bdb81f7cbf6d34d70'}
GHSA
GHSA-5w8q-x7hc-jhp6
Directory Traversal in node-simple-router
Affected versions of `node-simple-router` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``...
{'CVE-2017-16083'}
2021-01-08T19:48:06Z
2018-07-24T19:42:39Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router', 'https://github.com/advisories/GHSA-5w8q-x7hc-jhp6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16083', 'https://nodesecurity.io/advisories/352', 'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d...
null
{'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488'}
{'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488'}
GHSA
GHSA-f93p-f762-vr53
Reflected Cross-Site Scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is ...
{'CVE-2019-17573'}
2021-06-17T19:57:01Z
2020-06-10T20:02:33Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-17573.txt.asc?version=1&modificationDate=1579178542000&api=v2', 'https://lists.apach...
null
{'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'}
{'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'}
GHSA
GHSA-qvf8-p83w-v58j
Podman's default inheritable capabilities for linux container not empty
A bug was found in Podman where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container secur...
{'CVE-2022-27649'}
2022-05-02T17:42:54Z
2022-04-01T20:52:29Z
HIGH
7.5
{'CWE-276'}
{'https://github.com/containers/podman/releases/tag/v4.0.3', 'https://bugzilla.redhat.com/show_bug.cgi?id=2066568', 'https://github.com/containers/podman/security/advisories/GHSA-qvf8-p83w-v58j', 'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0', 'https://github.com/advisories/GHSA-...
null
{'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0'}
{'https://github.com/containers/podman/commit/aafa80918a245edcbdaceb1191d749570f1872d0'}
GHSA
GHSA-89mq-4x47-5v83
Prototype Pollution in angular
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to vers...
{'CVE-2019-10768'}
2022-01-04T19:51:21Z
2019-11-20T15:29:43Z
HIGH
7.5
{'CWE-20', 'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768', 'https://github.com/angular/angular.js/pull/16913', 'https://www.npmjs.com/advisories/1343', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', ...
null
{'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}
{'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}
GHSA
GHSA-wf5p-f5xr-c4jj
SQL Injection in rosariosis
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
{'CVE-2021-44427'}
2021-12-02T17:48:53Z
2021-12-02T17:48:53Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-wf5p-f5xr-c4jj', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com...
null
{'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}
{'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}
GHSA
GHSA-fjqg-w8g6-hhq8
Improper Authentication and Improper Access Control in Dolibarr
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overw...
{'CVE-2021-25956'}
2021-10-21T14:19:44Z
2021-09-02T17:16:28Z
HIGH
7.2
{'CWE-287', 'CWE-284'}
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956', 'https://github.com/advisories/GHSA-fjqg-w8g6-hhq8'}
null
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}
GHSA
GHSA-pgww-xf46-h92r
XSS in lxml
A XSS vulnerability was discovered in python-lxml's clean module. The module's parser didn't properly imitate browsers, which caused different behaviors between the sanitizer and the user's page. A remote attacker could exploit this flaw to run arbitrary HTML/JS code.
{'CVE-2020-27783'}
2021-05-25T21:45:11Z
2021-01-07T21:54:01Z
MODERATE
6.1
{'CWE-79'}
{'https://www.debian.org/security/2020/dsa-4810', 'https://github.com/advisories/GHSA-pgww-xf46-h92r', 'https://advisory.checkmarx.net/advisory/CX-2020-4286', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMHVKRUT22LVWNL3TB7HPSDHJT74Q3JK/', 'https://lists.debian.org/deb...
null
{'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7'}
{'https://github.com/lxml/lxml/commit/a105ab8dc262ec6735977c25c13f0bdfcdec72a7'}
GHSA
GHSA-w4hp-pcp8-qhf3
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
{'CVE-2022-0387'}
2022-02-03T20:16:40Z
2022-01-28T23:06:32Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98', 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387', 'https://github.com/advisories/GHSA-w4hp-pcp8-qhf3'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'}
{'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'}
GHSA
GHSA-rgg3-3wh7-w935
Unrestricted Upload of File with Dangerous Type in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
{'CVE-2021-42171'}
2022-04-01T20:11:34Z
2022-03-15T00:00:58Z
CRITICAL
9.8
{'CWE-434'}
{'https://github.com/advisories/GHSA-rgg3-3wh7-w935', 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42171', 'https://github.com/TribalSystems/Zenario/releases/t...
null
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
GHSA
GHSA-4r9c-jghc-cx5m
Cross-site Scripting in apostrophe
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.
{'CVE-2021-25978'}
2021-11-10T16:45:34Z
2021-11-10T16:45:34Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-4r9c-jghc-cx5m', 'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}
null
{'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59'}
{'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59'}
GHSA
GHSA-m9cj-v55f-8x26
Authentication Bypass in keycloak
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
{'CVE-2020-27826'}
2022-03-21T20:47:56Z
2022-03-18T17:55:26Z
HIGH
8.8
{'CWE-250'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://github.com/advisories/GHSA-m9cj-v55f-8x26', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://access.redhat.com/security/cve/cve-2020-27826'}
null
{'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}
{'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}
GHSA
GHSA-xrr4-74mc-rpjc
Pyro mishandles pid files in temporary directory locations and opening the pid file as root
pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks.
{'CVE-2011-2765'}
2022-04-26T18:22:27Z
2018-08-21T17:01:29Z
HIGH
7.5
{'CWE-59'}
{'https://bugs.debian.org/631912', 'https://github.com/advisories/GHSA-xrr4-74mc-rpjc', 'https://pythonhosted.org/Pyro/12-changes.html', 'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2765'}
null
{'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'}
{'https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e'}
GHSA
GHSA-8j72-p2wm-6738
Persistent XSS vulnerability in filename of attached file in PrivateBin
On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that ...
{'CVE-2020-5223'}
2021-01-14T17:43:41Z
2020-01-14T20:19:33Z
MODERATE
6.1
{'CWE-79'}
{'https://privatebin.info/news/v1.3.2-v1.2.2-release.html', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738', 'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5223', 'https://github.com/advisories/GHS...
null
{'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6'}
{'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6'}
GHSA
GHSA-xm9f-vxmx-4m58
Data Flow Sanitation Issue Fix
### Impact Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server.
{'CVE-2021-32759'}
2021-08-30T17:20:41Z
2021-08-30T17:20:41Z
HIGH
0
{'CWE-20'}
{'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32759', 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://github.com/advisories/GHSA-xm9f-vxmx-4m58', 'h...
null
{'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'}
{'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'}
GHSA
GHSA-cvp7-c586-cmf4
Withdrawn: Code Injection in loguru
# Withdrawn This advisory has been withdrawn after the maintainers of loguru noted this issue is not a security vulnerability and the CVE has been revoked. We have [stopped](https://github.com/Delgan/loguru/issues/563#issuecomment-1025223732) Dependabot alerts regarding this issue. ## Original Description In version...
{'CVE-2022-0329'}
2022-02-01T16:00:39Z
2022-01-28T22:01:45Z
LOW
0
{'CWE-94'}
{'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b', 'https://huntr.dev/bounties/1-pypi-loguru', 'https://tomforb.es/cve-2022-0329-and-the-problems-with-automated-vulnerability-management/', 'https://github.com/Delgan/loguru/issues/563', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0329', ...
null
{'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b'}
{'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b'}
GHSA
GHSA-vwfx-hh3w-fj99
Potential XSS injection in the newsletter conditions field
### Impact An employee can inject javascript in the newsletter condition field that will then be executed on the front office ### Patches The issue has been fixed in 2.6.1
{'CVE-2021-21418'}
2021-04-06T17:24:14Z
2021-04-06T17:24:14Z
MODERATE
4.6
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21418', 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99', 'https://github.com/advisories/GHSA-vwfx-hh3w-fj99', 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1', 'https://github.com/PrestaShop/ps_emailsubscrip...
null
{'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}
{'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}
GHSA
GHSA-r9ch-m4fh-fc7q
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the...
{'CVE-2016-1000341'}
2021-09-17T14:46:46Z
2018-10-17T16:24:00Z
MODERATE
5.9
null
{'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca...
null
{'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce'}
{'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce'}
GHSA
GHSA-3v6h-hqm4-2rg6
Arbitrary File Write in adm-zip
Versions of `adm-zip` before 0.4.9 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example). ## Recommendation Update to version 0.4.9 or later.
{'CVE-2018-1002204'}
2021-01-08T19:58:40Z
2018-07-27T17:07:14Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002204', 'https://www.npmjs.com/advisories/681', 'https://github.com/advisories/GHSA-3v6h-hqm4-2rg6', 'https://www.npmjs.com/advisories/994', 'https://github.com/cthackers/adm-zip/pull/212', 'https://github.com/snyk/zip-slip-vulnerability', 'http://www.securityfocus.com/bid/...
null
{'https://github.com/cthackers/adm-zip/commit/62f64004fefb894c523a7143e8a88ebe6c84df25'}
{'https://github.com/cthackers/adm-zip/commit/62f64004fefb894c523a7143e8a88ebe6c84df25'}
GHSA
GHSA-f62v-xpxf-3v68
Code injection in Apache Ant
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still a...
{'CVE-2020-11979'}
2022-04-22T17:18:45Z
2021-02-03T19:16:35Z
HIGH
7.5
{'CWE-94', 'CWE-74'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-annou...
null
{'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'}
{'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'}