ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-5vr6-hm68-5j9p | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php. | {'CVE-2021-44279'} | 2021-12-06T21:36:37Z | 2021-12-03T20:49:16Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/advisories/GHSA-5vr6-hm68-5j9p', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} | null | {'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} | {'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} |
GHSA | GHSA-v936-j8gp-9q3p | Open redirects on some federation and push requests | ### Impact
Requests to user provided domains were not restricted to external IP addresses when calculating the key validity for third-party invite events and sending push notifications. This could cause Synapse to make requests to internal infrastructure. The type of request was not controlled by the user, although lim... | {'CVE-2021-21273'} | 2022-04-19T19:02:47Z | 2021-02-26T17:28:34Z | LOW | 3.1 | {'CWE-601'} | {'https://github.com/matrix-org/synapse/releases/tag/v1.25.0', 'https://github.com/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/security/advisories/GHSA-v936-j8gp-9q3p', 'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746', 'https://github.com/matrix-org/syn... | null | {'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746'} | {'https://github.com/matrix-org/synapse/commit/30fba6210834a4ecd91badf0c8f3eb278b72e746'} |
GHSA | GHSA-jv6v-fvvx-4932 | Arbitrary File Deletion vulnerability in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://gith... | {'CVE-2020-5296'} | 2022-04-19T19:02:26Z | 2020-06-03T21:58:21Z | MODERATE | 6.2 | {'CWE-73'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5296', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com... | null | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} |
GHSA | GHSA-9jhm-8m8c-c3f4 | SSRF in Sydent due to missing validation of hostnames | ### Impact
Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.
It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.
### Patches
Fixed in 9... | {'CVE-2021-29431'} | 2021-04-19T14:54:15Z | 2021-04-19T14:54:15Z | HIGH | 7.7 | {'CWE-20', 'CWE-918'} | {'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://github.com/advisories/GHSA-9jhm-8m8c-c3f4', 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'h... | null | {'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://github.com/matrix-org/sydent/commit/9e573348d8... | {'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a', 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f', 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3', 'https://github.com/matrix-org/sydent/commit/8936925f56... |
GHSA | GHSA-662x-fhqg-9p8v | Regular Expression Denial of Service in ua-parser-js | The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA. | {'CVE-2020-7733'} | 2021-07-29T22:28:04Z | 2021-05-07T16:18:19Z | HIGH | 7.5 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666', 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d', 'https://github.com/advisories/GHSA-662x-fhqg-9p8v', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665', 'https://nvd.nist.gov/vuln/detail/CVE-2020-773... | null | {'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d'} | {'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d'} |
GHSA | GHSA-v3mr-gp7j-pw5w | Possible SQL injection in tablelookupwizard Contao Extension | ### Impact
The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility.
### Patches
The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0.
### For more information
If you have any questions or comments about t... | null | 2022-02-10T22:33:46Z | 2022-02-10T22:33:46Z | HIGH | 0 | {'CWE-89'} | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/advisories/GHSA-v3mr-gp7j-pw5w', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'} | null | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'} | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'} |
GHSA | GHSA-h77r-rp97-7rv4 | Privilage Escalation in moodle | In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, a... | {'CVE-2020-25699'} | 2021-10-20T17:37:40Z | 2021-03-29T20:43:01Z | HIGH | 7.5 | {'CWE-863', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/... | null | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} |
GHSA | GHSA-5jqp-qgf6-3pvh | Use of "infinity" as an input to datetime and date fields causes infinite loop in pydantic |
Impact
Passing either 'infinity', 'inf' or float('inf') (or their negatives) to datetime or date fields causes validation to run forever with 100% CPU usage (on one CPU).
Patches
Pydantic is be patched with fixes available in the following versions:
v1.8.2
v1.7.4
v1.6.2
All these versions are available... | {'CVE-2021-29510'} | 2022-04-19T19:02:57Z | 2021-05-13T20:23:17Z | LOW | 3.3 | {'CWE-835'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2HT266L6Q7H6ICP7DFGXOGBJHNNKMKB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMKAJX4O6IGBBCE32CO2G7PZQCCQSBLV/', 'https://lists.fedoraproject.org/archives/list/package-... | null | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} | {'https://github.com/samuelcolvin/pydantic/commit/7e83fdd2563ffac081db7ecdf1affa65ef38c468'} |
GHSA | GHSA-vvff-6wrr-4g7q | Missing Authentication for Critical Function in Foreman Ansible | An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-3589'} | 2022-04-05T19:28:40Z | 2022-03-24T00:00:17Z | CRITICAL | 9.9 | {'CWE-306'} | {'https://github.com/advisories/GHSA-vvff-6wrr-4g7q', 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5', 'https://bugzilla.redhat.com/show_bug.cgi?id=1969265', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589', 'https://access.redhat.com/security/cve/CVE-2021-3589'} | null | {'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'} | {'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'} |
GHSA | GHSA-vvf2-ppj9-pp49 | Inefficient Regular Expression Complexity in vuelidate | vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CP... | {'CVE-2021-3794'} | 2022-05-04T03:24:56Z | 2021-09-20T20:42:06Z | HIGH | 7.5 | {'CWE-400', 'CWE-697'} | {'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d', 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794', 'https://github.com/advisories/GHSA-vvf2-ppj9-pp49'} | null | {'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d'} | {'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d'} |
GHSA | GHSA-rcrv-228c-gprj | Invalid URL generation in bitlyshortener | ### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately.
### Patches
Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs.
### Workarounds
A workaround ... | null | 2022-01-21T18:39:40Z | 2022-01-21T18:39:40Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj', 'https://github.com/impredicative/bitlyshortener/releases/tag/0.6.0', 'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} | null | {'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} | {'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'} |
GHSA | GHSA-49x3-8228-3w3m | Inefficient Regular Expression Complexity in code-server | code-server is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3810'} | 2021-09-20T20:18:39Z | 2021-09-20T20:18:39Z | HIGH | 7.5 | {'CWE-1333'} | {'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223', 'https://github.com/advisories/GHSA-49x3-8228-3w3m', 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3810'} | null | {'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'} | {'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5'} |
GHSA | GHSA-7r8m-45gc-m2c8 | Downloads Resources over HTTP in mongodb-instance | Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `... | {'CVE-2016-10572'} | 2021-01-08T19:14:35Z | 2019-02-18T23:52:14Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'} | null | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} |
GHSA | GHSA-85rf-xh54-whp3 | Malicious URL drafting attack against iodines static file server may allow path traversal | ### Impact
A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version.
Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't ... | null | 2021-08-25T21:02:39Z | 2019-10-07T16:52:13Z | LOW | 0 | {'CWE-22'} | {'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889', 'https://github.com/advisories/GHSA-85rf-xh54-whp3', 'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3'} | null | {'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'} | {'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'} |
GHSA | GHSA-x83m-p7pv-ch8v | Division by 0 in `QuantizedAdd` | ### Impact
An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedAdd`:
```python
import tensorflow as tf
x = tf.constant([68, 228], shape=[2, 1], dtype=tf.quint8)
y = tf.constant([], shape=[2, 0], dtype=tf.quint8)
min_x = tf.constant(10.723421015884028)
max_x = tf.const... | {'CVE-2021-29549'} | 2021-05-21T14:23:38Z | 2021-05-21T14:23:38Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29549', 'https://github.com/advisories/GHSA-x83m-p7pv-ch8v', 'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x83m-p7pv-ch8v'} | null | {'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} | {'https://github.com/tensorflow/tensorflow/commit/744009c9e5cc5d0447f0dc39d055f917e1fd9e16'} |
GHSA | GHSA-vpf5-82c8-9v36 | Prototype Pollution in algoliasearch-helper | The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to ... | {'CVE-2021-23433'} | 2021-11-24T19:00:33Z | 2021-11-23T21:15:35Z | MODERATE | 0 | {'CWE-1321', 'CWE-915'} | {'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://github.com/advisories/GHSA-vpf5-82c8-9v36', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://sn... | null | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} |
GHSA | GHSA-vm5j-vqr6-v7v8 | OS Command Injection in pixl-class | pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization. | {'CVE-2020-7640'} | 2021-12-10T20:04:56Z | 2021-12-10T20:04:56Z | HIGH | 9.8 | {'CWE-78'} | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://github.com/advisories/GHSA-vm5j-vqr6-v7v8', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b... | null | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} |
GHSA | GHSA-pcgf-qjx2-qv4q | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1217'} | 2021-03-29T20:56:08Z | 2021-03-29T20:56:08Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-pcgf-qjx2-qv4q', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217', 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://portal.msrc.microsoft... | null | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} | {'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'} |
GHSA | GHSA-vmfg-rjjm-rjrj | Deserialization of Untrusted Data | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStrea... | {'CVE-2017-5929'} | 2022-04-19T15:46:12Z | 2021-06-07T16:07:36Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'h... | null | {'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'} | {'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'} |
GHSA | GHSA-hhr9-7xvh-8xgc | Server side request forgery in LiveHelperChat | SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191 | {'CVE-2022-1213'} | 2022-04-19T17:55:45Z | 2022-04-06T00:01:32Z | HIGH | 7.7 | {'CWE-918'} | {'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/advisories/GHSA-hhr9-7xvh-8xgc', 'https://github.com/LiveHelperChat/livehelperchat/issues/1752', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dca... | null | {'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} | {'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} |
GHSA | GHSA-8rm6-75mf-7r7r | Division by zero in TFLite's implementation of hashtable lookup | ### Impact
The TFLite implementation of hashtable lookup is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115):
```cc
const int num_rows = SizeOfDimension(value, 0);
const int row_bytes ... | {'CVE-2021-29604'} | 2021-05-21T14:28:19Z | 2021-05-21T14:28:19Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29604', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rm6-75mf-7r7r', 'https://github.com/advisories/GHSA-8rm6-75mf-7r7r'} | null | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} | {'https://github.com/tensorflow/tensorflow/commit/5117e0851348065ed59c991562c0ec80d9193db2'} |
GHSA | GHSA-gvm4-h8j3-rjrq | CHECK-fail in `LoadAndRemapMatrix` | ### Impact
An attacker can cause a denial of service by exploiting a `CHECK`-failure coming from `tf.raw_ops.LoadAndRemapMatrix`:
```python
import tensorflow as tf
ckpt_path = tf.constant([], shape=[0], dtype=tf.string)
old_tensor_name = tf.constant("")
row_remapping = tf.constant([], shape=[0], dtype=tf.int64)
c... | {'CVE-2021-29561'} | 2021-05-21T14:24:59Z | 2021-05-21T14:24:59Z | LOW | 2.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-gvm4-h8j3-rjrq', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gvm4-h8j3-rjrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29561', 'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | null | {'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} | {'https://github.com/tensorflow/tensorflow/commit/77dd114513d7796e1e2b8aece214a380af26fbf4'} |
GHSA | GHSA-773q-5334-5gf9 | Memory over-allocation in evm-core | Prior to the patch, when executing specific EVM opcodes related
to memory operations that use `evm_core::Memory::copy_large`, the
crate can over-allocate memory when it is not needed, making it
possible for an attacker to perform denial-of-service attack.
The flaw was corrected in commit `19ade85`.
| null | 2021-08-25T20:55:36Z | 2021-08-25T20:55:36Z | MODERATE | 0 | {'CWE-789'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0066.html', 'https://github.com/rust-blockchain/evm/commit/19ade85', 'https://github.com/advisories/GHSA-773q-5334-5gf9'} | null | {'https://github.com/rust-blockchain/evm/commit/19ade85'} | {'https://github.com/rust-blockchain/evm/commit/19ade85'} |
GHSA | GHSA-wh37-37xw-54hr | Improper Authentication in requests-kerberos | python-requests-Kerberos through 0.5 does not handle mutual authentication | {'CVE-2014-8650'} | 2022-03-23T20:33:23Z | 2020-03-10T18:02:31Z | CRITICAL | 9.8 | {'CWE-287'} | {'http://www.securityfocus.com/bid/70909', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8650', 'http://www.openwall.com/lists/oss-security/2014/11/07/1', 'https://github.com/requests/requests-kerberos/issues/35', 'https://github.com/requests/requests-kerberos/blob/0.6/HISTORY.rst', 'https://github.com/advisories/GHSA-wh3... | null | {'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6'} | {'https://github.com/mkomitee/requests-kerberos/commit/9c1e08cc17bb6950455a85d33d391ecd2bce6eb6'} |
GHSA | GHSA-q42p-pg8m-cqh6 | Prototype Pollution in handlebars | Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
## Recommendation
For handlebars 4.1.x upgrade to 4.1.2 or later.
For handlebars 4.0.x upgrade to 4.0.14 or later. | null | 2021-08-04T20:54:06Z | 2019-06-05T14:07:48Z | HIGH | 7.3 | {'CWE-471'} | {'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://www.npmjs.com/advisories/755', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://github.com/advisories/GHSA-q42p-pg8m-cqh6'} | null | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} |
GHSA | GHSA-26cm-qrc6-mfgj | Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker | ### Impact
LDAP injection vulnerability, only affects instances with LDAP authentication enabled.
### Patches
Patch for vulnerability released with v1.16.3.
### Workarounds
Disable LDAP feature if in use
### References
[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_... | {'CVE-2021-41232'} | 2022-04-19T19:03:13Z | 2021-11-08T18:16:21Z | HIGH | 8.1 | {'CWE-74', 'CWE-90'} | {'https://github.com/advisories/GHSA-26cm-qrc6-mfgj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41232', 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1', 'https://github.com/github/securitylab/issues/464#issuecomment-957094994', 'https://github.com/StevenWe... | null | {'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'} | {'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'} |
GHSA | GHSA-9652-78hp-w58c | Stored cross-site scripting in PressBooks | PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS. | {'CVE-2021-3271'} | 2021-03-29T20:07:39Z | 2021-03-29T20:07:39Z | MODERATE | 4.8 | {'CWE-79'} | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://githu... | null | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'} | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'} |
GHSA | GHSA-65cv-r6x7-79hv | Possible XSS vulnerability in ActionView | There is a possible XSS vulnerability in ActionView's JavaScript literal escape helpers. Views that use the `j` or `escape_javascript` methods may be susceptible to XSS attacks.
### Impact
There is a possible XSS vulnerability in the `j` and `escape_javascript` methods in ActionView. These methods are used for esca... | {'CVE-2020-5267'} | 2022-04-19T19:02:25Z | 2020-03-19T17:30:29Z | MODERATE | 4 | {'CWE-80'} | {'https://github.com/rails/rails/security/advisories/GHSA-65cv-r6x7-79hv', 'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a', 'https://github.com/advisories/GHSA-65cv-r6x7-79hv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5267', 'http://lists.opensuse.org/opensuse-security-announce/2020-0... | null | {'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'} | {'https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a'} |
GHSA | GHSA-v2r9-c84j-v7xm | Moderate severity vulnerability that affects rdoc | darkfish.js in RDoc 2.3.0 through 3.12 and 4.x before 4.0.0.preview2.1, as used in Ruby, does not properly generate documents, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL. | {'CVE-2013-0256'} | 2021-09-01T19:36:59Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-79'} | {'http://blog.segment7.net/2013/02/06/rdoc-xss-vulnerability-cve-2013-0256-releases-3-9-5-3-12-1-4-0-0-rc-2', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0256', 'http://secunia.com/advisories/52774', 'http://lists.ope... | null | {'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'} | {'https://github.com/rdoc/rdoc/commit/ffa87887ee0517793df7541629a470e331f9fe60'} |
GHSA | GHSA-6qcc-whgp-pjj2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0832'} | 2022-03-11T23:22:51Z | 2022-03-05T00:00:45Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a', 'https://github.com/advisories/GHSA-6qcc-whgp-pjj2'} | null | {'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'} | {'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'} |
GHSA | GHSA-8wp2-vxpg-xcvp | Cross site scripting in facturascripts | facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or ins... | {'CVE-2022-1457'} | 2022-05-05T13:47:30Z | 2022-04-26T00:00:43Z | CRITICAL | 9 | {'CWE-79'} | {'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457', 'https://github.com/advisories/GHSA-8wp2-vxpg-xcvp'} | null | {'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'} | {'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'} |
GHSA | GHSA-2rq5-68hm-h4j8 | Cross-Site Request Forgery in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupV... | {'CVE-2021-25931'} | 2021-05-28T22:26:41Z | 2021-05-25T18:46:55Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/advisories/GHSA-2rq5-68hm-h4j8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulner... | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} |
GHSA | GHSA-8qvx-f5gf-g43v | Logic error in dolibarr | The application does not check the input of price number lead to Business Logic error through negative price amount. | {'CVE-2022-0174'} | 2022-01-20T15:34:34Z | 2022-01-12T22:54:50Z | MODERATE | 4.3 | {'CWE-20'} | {'https://github.com/advisories/GHSA-8qvx-f5gf-g43v', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32', 'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174'} | null | {'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'} | {'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'} |
GHSA | GHSA-jmqm-f2gx-4fjv | Sensitive information exposure through logs in npm-registry-fetch | Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | null | 2021-09-22T19:00:08Z | 2020-07-07T18:59:10Z | MODERATE | 5.3 | {'CWE-352'} | {'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432', 'https://github.com/advisories/G... | null | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} |
GHSA | GHSA-w3w8-37jv-2c58 | Cross-Site Scripting in mustache | Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommenda... | {'CVE-2015-8862'} | 2021-09-20T22:34:09Z | 2017-10-24T18:33:36Z | HIGH | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://www.tenable.com/security/tns-2016-18', 'https://nodesecurity.io/advisories/62', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', 'http://www.openwall.com/lists/oss-secur... | null | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} |
GHSA | GHSA-8p9r-f949-699g | Path Traversal in browserless-chrome | This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server. | {'CVE-2020-7758'} | 2021-05-10T18:46:48Z | 2021-05-10T18:46:48Z | HIGH | 7.5 | {'CWE-22'} | {'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://github.com/advisories/GHSA-8p9r-f949-699g', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6eb... | null | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} |
GHSA | GHSA-4h9c-v5vg-5m6m | Access to restricted PHP code by dynamic static class access in smarty | ### Impact
Template authors could run restricted static php methods.
### Patches
Please upgrade to 3.1.40 or higher.
### References
See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.
### For more in... | {'CVE-2021-21408'} | 2022-01-20T15:33:56Z | 2022-01-12T22:43:42Z | HIGH | 8.8 | {'CWE-20'} | {'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef2444... | null | {'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'} | {'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'} |
GHSA | GHSA-p737-p57g-4cpr | Insertion of Sensitive Information into Log File in Jupyter notebook | ### Impact
_What kind of vulnerability is it?_
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the... | {'CVE-2022-24757'} | 2022-03-29T21:55:39Z | 2022-03-25T19:20:39Z | HIGH | 7.5 | {'CWE-532'} | {'https://github.com/advisories/GHSA-p737-p57g-4cpr', 'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757', 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr'} | null | {'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'} | {'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'} |
GHSA | GHSA-4gq5-ch57-c2mg | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. | {'CVE-2018-14719'} | 2021-06-11T15:38:44Z | 2019-01-04T19:09:49Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/se... | null | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} |
GHSA | GHSA-j4mm-7pj3-jf7v | HTTP Method Spoofing | Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site... | {'CVE-2021-43807'} | 2022-04-19T19:03:13Z | 2021-12-14T21:43:00Z | HIGH | 7.5 | {'CWE-290'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d... | null | {'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'} | {'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'} |
GHSA | GHSA-6c8f-qphg-qjgp | Validation Bypass in kind-of | Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
## Recommendation
Upgrade to versions 6.0.3 or later. | {'CVE-2019-20149'} | 2021-08-23T15:03:56Z | 2020-03-31T15:59:54Z | HIGH | 7.5 | {'CWE-668'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://github.com/advi... | null | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} |
GHSA | GHSA-q2qr-3c2p-9235 | Denial of Service (DoS) in HashiCorp Consul | HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4. | {'CVE-2020-12758'} | 2022-04-12T22:55:15Z | 2022-02-15T01:57:18Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/hashicorp/consul/blob/v1.7.4/CHANGELOG.md', 'https://github.com/hashicorp/consul/pull/7783', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758', 'https://github.com/advisories/GHSA-q2qr-3c2p-9235', 'https://github.com/hashicorp/consul/blob/v1.6.6/CHANGELOG.md', 'https://github.com/hashicorp/consul/c... | null | {'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'} | {'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'} |
GHSA | GHSA-4m8h-h59m-m34j | Prototype Pollution in bmoor | The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664) | {'CVE-2021-23558'} | 2022-02-07T21:21:00Z | 2022-02-01T00:50:09Z | HIGH | 7.3 | {'CWE-1321'} | {'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2021-235... | null | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} |
GHSA | GHSA-wmx6-vxcf-c3gr | Validation Bypass in slp-validate | Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade... | {'CVE-2019-16761'} | 2021-01-08T20:11:32Z | 2019-11-15T23:10:19Z | CRITICAL | 5.7 | {'CWE-20'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr',... | null | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} |
GHSA | GHSA-ghww-cv4v-hmxx | Cross-Site Request Forgery microweber | microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2022-0638'} | 2022-02-26T01:13:33Z | 2022-02-18T00:00:34Z | MODERATE | 4.3 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3', 'https://github.com/advisories/GHSA-ghww-cv4v-hmxx'} | null | {'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'} | {'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'} |
GHSA | GHSA-77jf-fjjf-xcww | Invalid Curve Attack in openpgp | Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may ex... | {'CVE-2019-9155'} | 2021-07-27T21:15:19Z | 2019-08-23T21:42:22Z | MODERATE | 5.9 | {'CWE-327'} | {'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/S... | null | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} |
GHSA | GHSA-f3rf-v9qm-9c89 | Cross-site Scripting in the femanager TYPO3 extension | The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website.
Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 ... | {'CVE-2021-36787'} | 2022-01-26T22:27:17Z | 2021-09-01T18:36:51Z | MODERATE | 0 | {'CWE-79'} | {'http://seclists.org/fulldisclosure/2022/Jan/53', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010', 'https://typo3.org/help/security-advisories/security', 'https://extensions.typo3.org/extension/femanager/', 'https://github.com/in2code-de/femanag... | null | {'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'} | {'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'} |
GHSA | GHSA-v8v8-6859-qxm4 | Arbitrary shell command execution in logkitty | Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1. | {'CVE-2020-8149'} | 2021-01-08T20:12:59Z | 2020-06-05T14:47:02Z | HIGH | 0 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://hackerone.com/reports/825729', 'https://github.com/advisories/GHSA-v8v8-6859-qxm4', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf', 'https://github.com/zamotany/logkitty/pull/18'} | null | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} |
GHSA | GHSA-26hm-r6mg-963c | SQL Injection in JeecgBoot | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch. | {'CVE-2021-46089'} | 2022-02-10T22:58:39Z | 2022-01-26T00:01:25Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/issues/3331', 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/advisories/GHSA-26hm-r6mg-963c'} | null | {'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'} | {'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'} |
GHSA | GHSA-74cr-77xc-8g6r | Prototype Pollution in @apollo/gateway | Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This ... | null | 2021-08-16T15:28:22Z | 2019-06-13T20:37:39Z | HIGH | 7.3 | {'CWE-400', 'CWE-1321'} | {'https://github.com/advisories/GHSA-74cr-77xc-8g6r', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://github.com/apollographql/apollo-server/pull/2779', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://www.npmjs.com/advisories/917'} | null | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} |
GHSA | GHSA-h2fj-77wh-fh5w | Cross-site Scripting in livehelperchat | Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. | {'CVE-2022-0612'} | 2022-02-24T13:52:13Z | 2022-02-17T00:00:36Z | MODERATE | 6.7 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://github.com/advisories/GHSA-h2fj-77wh-fh5w', 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b', 'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'} | {'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'} |
GHSA | GHSA-h4m4-pgp4-whgm | The reset password form reveal users email address | ### Impact
The reset password form reveals the email address of users just by giving their username.
### Patches
The problem has been patched on XWiki 13.2RC1.
### Workarounds
It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0c... | {'CVE-2021-32731'} | 2021-07-13T14:00:59Z | 2021-07-02T19:19:04Z | MODERATE | 5.3 | {'CWE-200', 'CWE-668'} | {'https://github.com/advisories/GHSA-h4m4-pgp4-whgm', 'https://jira.xwiki.org/browse/XWIKI-18400', 'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://... | null | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'} | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'} |
GHSA | GHSA-4rcq-jv2f-898j | Incorrect Provision of Specified Functionality in qutebrowser | # Description
After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (`colors.statusbar.url.warn.fg`). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (`colors.statusbar.url.success_https`). While the user already has see... | {'CVE-2020-11054'} | 2022-04-19T19:02:25Z | 2020-05-08T19:05:05Z | LOW | 3.5 | {'CWE-684'} | {'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j', 'https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7YWJ5QNHXKTGG5NLV7EGEOKPBVZBA5GS/', 'https:... | null | {'https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8', 'https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864', 'https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975', 'https://github.com/qutebrowser/quteb... | {'https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467', 'https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478', 'https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23', 'https://github.com/qutebrowser/quteb... |
GHSA | GHSA-vf23-f26f-mjj9 | Moderate severity vulnerability that affects yourls/yourls | ## Type juggling vulnerability in the API
### Impact
YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass.
### Patches
https://github.com/YOURLS/YOURLS/releases/tag/1.7.4
https://github.com/YOURLS/YOURLS/pull/2542
### References
* https://cve.mitre.or... | {'CVE-2019-14537'} | 2021-09-20T21:42:52Z | 2019-09-23T18:32:02Z | CRITICAL | 9.8 | {'CWE-843'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/commits/master', 'https://github.com/advisories/GHSA-vf23-f26f-mjj9', 'https://github.com/YOURLS/YOURLS/pull/2542', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj... | null | {'https://github.com/YOURLS/YOURLS/commits/master'} | {'https://github.com/YOURLS/YOURLS/commits/master'} |
GHSA | GHSA-c5gj-w4hx-gvmx | Business Logic Errors in microweber | Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart. | {'CVE-2022-0688'} | 2022-02-26T01:15:47Z | 2022-02-21T00:00:21Z | LOW | 2.7 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://github.com/advisories/GHSA-c5gj-w4hx-gvmx', 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} | null | {'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} | {'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} |
GHSA | GHSA-3qr6-qrqm-8v86 | Integer Overflow or Wraparound in Microweber | In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters. | {'CVE-2022-1036'} | 2022-03-30T20:49:26Z | 2022-03-23T00:00:23Z | HIGH | 7.5 | {'CWE-190'} | {'https://github.com/advisories/GHSA-3qr6-qrqm-8v86', 'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036'} | null | {'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'} | {'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'} |
GHSA | GHSA-wqq8-mqj9-697f | PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841 | ### Impact
We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](ht... | null | 2020-01-08T03:10:30Z | 2020-01-08T03:10:30Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-wqq8-mqj9-697f', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f', 'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} | null | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} |
GHSA | GHSA-qhh5-9738-g9mx | Incorrect Default Permissions in Apache DolphinScheduler | Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface. | {'CVE-2020-13922'} | 2022-02-09T22:26:32Z | 2022-02-09T22:26:32Z | MODERATE | 6.5 | {'CWE-276'} | {'https://www.mail-archive.com/announce@apache.org/msg06076.html', 'https://github.com/advisories/GHSA-qhh5-9738-g9mx', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'} | null | {'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'} | {'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'} |
GHSA | GHSA-x2mc-8fgj-3wmr | Improper Input Validation in tar-fs | A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. | {'CVE-2018-20835'} | 2021-08-03T21:27:51Z | 2019-05-01T18:37:18Z | HIGH | 7.5 | {'CWE-20'} | {'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835', 'https://github.com/advisories/GHSA-x2mc-8fgj-3wmr', 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} | null | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} |
GHSA | GHSA-w46j-8hm6-h8mm | XSS in apexcharts | The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields. | {'CVE-2021-23327'} | 2021-02-11T20:47:34Z | 2021-02-11T20:47:34Z | MODERATE | 0 | {'CWE-79'} | {'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/advisories/GHSA-w46j-8hm6-h8mm', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f3... | null | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} |
GHSA | GHSA-mp9m-g7qj-6vqr | Unauthorized privilege escalation in Mod module | ### Impact
An unauthorized privilege escalation exploit has been discovered in the Mod module: this exploit allows Discord users with a high privilege level within the guild to bypass hierarchy checks when the application is in a specific condition that is beyond that user's control. By abusing this exploit, it's possi... | null | 2022-04-19T19:02:39Z | 2020-10-27T20:30:48Z | MODERATE | 0 | {'CWE-285'} | {'https://github.com/Cog-Creators/Red-DiscordBot/releases/tag/3.4.1', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-mp9m-g7qj-6vqr', 'https://github.com/advisories/GHSA-mp9m-g7qj-6vqr', 'https://pypi.org/project/Red-DiscordBot/', 'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38... | null | {'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} | {'https://github.com/Cog-Creators/Red-DiscordBot/commit/726bfd38adfdfaef760412a68e01447b470f438b'} |
GHSA | GHSA-4q96-6xhq-ff43 | malicious SVG attachment causing stored XSS vulnerability | ### Impact
An attacker with `write` permissions can upload an SVG file that contains malicious javascript. This javascript will be executed in a user's browser when the user is viewing that SVG file on the wiki.
### Patches
Users are strongly advised to upgrade to a patched version.
MoinMoin Wiki 1.9.11 has the neces... | {'CVE-2020-15275'} | 2021-04-05T20:33:18Z | 2020-11-11T15:54:41Z | LOW | 8.7 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15275', 'https://github.com/moinwiki/moin-1.9/releases/tag/1.9.11', 'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2', 'https://advisory.checkmarx.net/advisory/CX-2020-4285', 'https://github.com/advisories/GHSA-4q96-6xhq-ff43', 'https://gi... | null | {'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2'} | {'https://github.com/moinwiki/moin-1.9/commit/31de9139d0aabc171e94032168399b4a0b2a88a2'} |
GHSA | GHSA-28w5-j8xj-2xwc | Cross-site Scripting in the yoast_seo TYPO3 extension | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | {'CVE-2021-36788'} | 2021-09-01T18:36:44Z | 2021-09-01T18:36:44Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-28w5-j8xj-2xwc', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'} | null | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'} | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'} |
GHSA | GHSA-rwr3-c2q8-gm56 | Moderate severity vulnerability that affects Pillow | Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component. | {'CVE-2016-9189'} | 2021-09-20T14:45:13Z | 2018-07-24T20:08:27Z | MODERATE | 5.5 | {'CWE-190'} | {'http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9189', 'http://www.securityfocus.com/bid/94234', 'https://github.com/python-pillow/Pillow/issues/2105', 'http://www.debian.org/security/2016/dsa-3710', 'https://security.gentoo.org/glsa/201612-52', 'https://gith... | null | {'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'} | {'https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f'} |
GHSA | GHSA-wrvc-72w7-xpmj | Incorrect Comparison in sodiumoxide | An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties. | {'CVE-2019-25002'} | 2021-08-25T20:45:54Z | 2021-08-25T20:45:54Z | CRITICAL | 9.8 | {'CWE-697'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-25002', 'https://github.com/advisories/GHSA-wrvc-72w7-xpmj', 'https://github.com/sodiumoxide/sodiumoxide/pull/381', 'https://rustsec.org/advisories/RUSTSEC-2019-0026.html', 'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'} | null | {'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'} | {'https://github.com/sodiumoxide/sodiumoxide/pull/381/commits/fae052b834b097ced9a89a8fff8466e18f383070'} |
GHSA | GHSA-jr37-66pj-36v7 | Cross-site Scripting in DayByDay CRM | In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks. | {'CVE-2022-22109'} | 2022-01-10T21:46:19Z | 2022-01-08T00:32:00Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22109', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://github.com/advisories/GHSA-jr37-66pj-36v7', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'} | {'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'} |
GHSA | GHSA-gqgv-6jq5-jjj9 | Prototype Pollution Protection Bypass in qs | Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Obje... | {'CVE-2017-1000048'} | 2021-08-25T21:03:57Z | 2020-04-30T17:16:47Z | HIGH | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://github.com/ljharb/qs/issues/200', 'https://snyk.io/vuln/npm:qs:20170213', 'https://github.com/advisories/GHSA-gqgv-6jq5-jjj9', 'https://www.npmjs.com/advisories/1469', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs/commit/b... | null | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} |
GHSA | GHSA-fc38-mxwr-pfhx | Cross-Site Scripting via SVG media files | ### Impact
Cross-Site Scripting via SVG media files
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2... | {'CVE-2021-37710'} | 2021-08-23T19:43:00Z | 2021-08-23T19:43:00Z | HIGH | 8 | {'CWE-79'} | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423', 'https://github.com/advisories/GHSA-fc38-mxwr-pfhx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710', 'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx'} | null | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'} | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'} |
GHSA | GHSA-v39p-96qg-c8rf | Prototype Pollution in object-path | This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operat... | {'CVE-2021-23434'} | 2021-10-05T16:03:38Z | 2021-09-01T18:37:11Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/advisories/GHSA-v39p-96qg-c8rf', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', ... | null | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} |
GHSA | GHSA-r89v-cgv7-3jhx | Bypass of fix for CVE-2020-15247, Twig sandbox escape | ### Impact
A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247:
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed ... | {'CVE-2020-26231'} | 2022-04-19T19:02:40Z | 2020-11-23T20:54:18Z | LOW | 5.2 | {'CWE-862'} | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/advisories/GHSA-r89v-cgv7-3jhx', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7... | null | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'} | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'} |
GHSA | GHSA-jm5c-rv3w-w83m | Denial of service in geth | ### Impact
Denial-of-service (crash) during block processing
### Details
Affected versions suffer from a vulnerability which can be exploited through the `MULMOD` operation, by specifying a modulo of `0`: `mulmod(a,b,0)`, causing a `panic` in the underlying library.
The crash was in the `uint256` library, where a bu... | {'CVE-2020-26242'} | 2021-06-29T21:13:20Z | 2021-06-29T21:13:20Z | MODERATE | 6.5 | {'CWE-400', 'CWE-191', 'CWE-125'} | {'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-jm5c-rv3w-w83m', 'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196', 'https://github.com/advisories/GHSA-jm5c-rv3w-w83m', 'https://nvd.nist.gov/vuln/de... | null | {'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'} | {'https://github.com/ethereum/go-ethereum/commit/7163a6664ee664df81b9028ab3ba13b9d65a7196'} |
GHSA | GHSA-qv2v-m59f-v5fw | Insecure randomness in socket.io | Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
## Recommendation
Update to v0.9.7 or later. | {'CVE-2017-16031'} | 2021-09-16T21:04:34Z | 2018-11-07T00:29:37Z | HIGH | 7.5 | {'CWE-330'} | {'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://github.com/socketio/socket.io/pull/857', 'https://nodesecurity.io/advisories/321', 'https://www.npmjs.com/advisories/321', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/socketio/socket.io/issues/856', 'https://github.com/socketio/so... | null | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} |
GHSA | GHSA-34jx-wx69-9x8v | Symlink Attack in kubectl cp | The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output ... | {'CVE-2019-1002101'} | 2022-04-12T22:40:43Z | 2022-02-15T01:57:18Z | MODERATE | 5.5 | {'CWE-59'} | {'http://www.securityfocus.com/bid/107652', 'https://access.redhat.com/errata/RHBA-2019:0636', 'https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/', 'https://github.com/advisories/GHSA-34jx-wx69-9x8v', 'https://github.com/kubernetes/kubernetes/pull/75037',... | null | {'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'} | {'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'} |
GHSA | GHSA-gjqc-q9g6-q2j3 | `CHECK`-failures in binary ops in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part co... | {'CVE-2022-23583'} | 2022-02-11T20:37:11Z | 2022-02-10T00:34:13Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/advisories/GHSA-gjqc-q9g6-q2j3', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9', 'https://nvd.nist.gov/vuln/detai... | null | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} | {'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'} |
GHSA | GHSA-mq5p-2mcr-m52j | Code injection in nbgitpuller | ### Impact
Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment.
### Patches
0.10.2
### Workarounds
None, other than upgrade to 0.10.2 or downgrade to 0.8.x.
### For more information
If you have any questions or comments about this advi... | {'CVE-2021-39160'} | 2022-03-22T21:07:19Z | 2021-08-30T16:17:06Z | CRITICAL | 0 | {'CWE-94'} | {'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25', 'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481', 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39160', 'htt... | null | {'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481'} | {'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481'} |
GHSA | GHSA-rg3m-hqc5-344v | `SparseFillEmptyRows` heap OOB | ### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access:
```python
import tensorflow as tf
data=tf.raw_ops.SparseFillEmptyR... | {'CVE-2021-41224'} | 2021-11-10T18:45:55Z | 2021-11-10T18:45:55Z | HIGH | 7.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224', 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b', 'https://github.com/advisories/GHSA-rg3m-hqc5-344v'} | null | {'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} | {'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'} |
GHSA | GHSA-2xmm-g482-4439 | DQL injection through sorting parameters blocked | ### Impact
Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway.
### Patches
The issue is fixed in version 1.10.1 and in 1.11-rc.1
### Workarounds
You have to overwrite... | {'CVE-2022-24752'} | 2022-04-19T19:03:27Z | 2022-03-15T19:09:16Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439', 'https://github.com/advisories/GHSA-2xmm-g482-4439', 'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784', 'https://github.com/Sylius/SyliusGridBundle/pull/222', 'https://github.com/Sylius/Syli... | null | {'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'} | {'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'} |
GHSA | GHSA-rxch-gp62-574w | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-4108'} | 2022-01-04T19:01:10Z | 2021-12-16T14:13:27Z | MODERATE | 6.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4108', 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4', 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2', 'https://github.com/advisories/GHSA-rxch-gp62-574w'} | null | {'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'} | {'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'} |
GHSA | GHSA-44cw-p2hm-gpf6 | Disabled Hostname Verification in Opencast | Opencast before version 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests.
Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle atta... | {'CVE-2020-26234'} | 2022-04-19T19:02:40Z | 2020-12-08T22:37:59Z | HIGH | 4.8 | {'CWE-297'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26234', 'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc', 'https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6', 'https://github.com/advisories/GHSA-44cw-p2hm-gpf6'} | null | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'} | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'} |
GHSA | GHSA-vc9j-fhvv-8vrf | Remote Code Execution in scratch-vm | MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdFor... | {'CVE-2020-14000'} | 2021-09-22T21:24:08Z | 2020-07-27T19:55:52Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://github.com/advisories/GHSA-vc9j-fhvv-8vrf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://github.com/LLK/scratch-vm/pull/2476'} | null | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} |
GHSA | GHSA-gq9m-qvpx-68hc | Insufficient Entropy in werkzeug | Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id. | {'CVE-2019-14806'} | 2021-08-17T21:13:25Z | 2019-08-21T16:15:24Z | HIGH | 7.5 | {'CWE-331'} | {'https://github.com/advisories/GHSA-gq9m-qvpx-68hc', 'https://palletsprojects.com/blog/werkzeug-0-15-3-released/', 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246', 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L16... | null | {'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'} | {'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'} |
GHSA | GHSA-fj59-f6c3-3vw4 | Command Injection in systeminformation | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `... | {'CVE-2020-26300'} | 2022-04-27T18:18:55Z | 2020-10-27T20:40:00Z | MODERATE | 5.9 | {'CWE-78'} | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607', 'https://www.npmjs.com/package/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4', 'https://github.com... | null | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} |
GHSA | GHSA-m8fw-534v-xm85 | Cross-Site Scripting (XSS) in cloudcmd | Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable.
## Recommendation
Update to version 9.1.6 or later. | null | 2021-08-04T20:42:50Z | 2019-06-04T15:43:29Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-m8fw-534v-xm85', 'https://www.npmjs.com/advisories/642', 'https://hackerone.com/reports/341044)', 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38', 'https://hackerone.com/reports/341044'} | null | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} |
GHSA | GHSA-7v3x-h7r2-34jv | Insufficient Session Expiration in Pterodactyl API | ### Impact
A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to.
It is impo... | null | 2022-04-19T19:03:20Z | 2022-01-21T18:43:05Z | MODERATE | 6 | {'CWE-613'} | {'https://github.com/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/releases/tag/v1.7.0', 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} | null | {'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} | {'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} |
GHSA | GHSA-vmm6-w4cf-7f3x | Authentication Bypass For Endpoints With Anonymous Access in Opencast | ### Impact
Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access.
This way, an attacker can, for example, fake a remember-me token, assume the ide... | {'CVE-2020-5206'} | 2021-10-20T18:03:08Z | 2020-01-30T21:21:30Z | CRITICAL | 8.7 | {'CWE-285'} | {'https://github.com/advisories/GHSA-vmm6-w4cf-7f3x', 'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5206', 'https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x'} | null | {'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'} | {'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'} |
GHSA | GHSA-6pj2-5fqq-xvjc | Incorrect Authorization in latte/latte | This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions. | {'CVE-2021-23803'} | 2022-01-06T20:56:27Z | 2022-01-06T20:56:27Z | CRITICAL | 9.8 | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23803', 'https://github.com/nette/latte/issues/279', 'https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226', 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210', 'https://github.com/advisories/GHSA-6pj2-5fqq-xvjc'} | null | {'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'} | {'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'} |
GHSA | GHSA-9w4w-cpc8-h2fq | Exposure of Sensitive Information to an Unauthorized Actor in httpie | ### Impact
HTTPie have the practical concept of [sessions](https://httpie.io/docs/cli/sessions), which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. As an example, we can make an authenticated request and save it to a [nam... | {'CVE-2022-24737'} | 2022-03-29T22:16:58Z | 2022-03-07T23:44:28Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-9w4w-cpc8-h2fq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/', 'h... | null | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} | {'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'} |
GHSA | GHSA-pw54-mh39-w3hc | Regular expression denial of service in npm-user-validate | This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters. | {'CVE-2020-7754'} | 2021-05-10T19:08:15Z | 2021-05-10T19:08:15Z | HIGH | 7.5 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://github.com/advisories/GHSA-pw54-mh39-w3hc', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/... | null | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} |
GHSA | GHSA-h97g-4mx7-5p2p | Open Redirect in apostrophe | Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end.
## Recommendation
Update to version 2.92.0 or later. | null | 2021-09-28T21:18:58Z | 2020-09-03T17:11:36Z | MODERATE | 0 | {'CWE-601'} | {'https://github.com/advisories/GHSA-h97g-4mx7-5p2p', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089', 'https://www.npmjs.com/advisories/1029', 'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} | null | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} |
GHSA | GHSA-mm8j-9x84-m9cv | Arbitrary code injection in json-sanitizer | OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents. | {'CVE-2021-23899'} | 2021-06-16T17:34:18Z | 2021-06-16T17:34:18Z | CRITICAL | 9.8 | {'CWE-611'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899', 'https://github.com/advisories/GHSA-mm8j-9... | null | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} |
GHSA | GHSA-8p8g-f9vg-r7xr | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path param... | {'CVE-2018-1000850'} | 2021-09-07T20:25:07Z | 2018-12-21T17:48:19Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798... | null | {'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'} | {'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'} |
GHSA | GHSA-pjjf-hc4q-g298 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3775'} | 2021-11-17T21:11:30Z | 2021-11-15T23:16:17Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-pjjf-hc4q-g298', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775', 'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3'} | null | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} |
GHSA | GHSA-rwv8-jvff-jq28 | Path Traversal in public | Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.
## Recommendation
Update to version 0.1.3 or later. | {'CVE-2018-3731'} | 2021-01-08T01:57:45Z | 2018-07-18T21:20:30Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918', 'https://www.npmjs.com/advisories/571', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731'} | null | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} |
GHSA | GHSA-8m28-w6xg-35hw | Cross-Site Request Forgery (CSRF) in livehelperchat | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2022-0231'} | 2022-01-26T20:22:08Z | 2022-01-26T20:22:08Z | MODERATE | 6.5 | {'CWE-352'} | {'https://github.com/advisories/GHSA-8m28-w6xg-35hw', 'https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf', 'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'} | {'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'} |
GHSA | GHSA-vpc2-7xmf-ppmf | Out-of-bounds Write in ChakraCore | Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. | {'CVE-2020-17048'} | 2021-08-02T17:26:11Z | 2021-08-02T17:26:11Z | HIGH | 8.1 | {'CWE-787'} | {'https://github.com/advisories/GHSA-vpc2-7xmf-ppmf', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://github.com/chakra... | null | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'} |
GHSA | GHSA-5hj3-vjjf-f5m7 | Heap OOB in `SdcaOptimizerV2` | ### Impact
An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`:
```python
import tensorflow as tf
tf.raw_ops.SdcaOptimizerV2(
sparse_example_indices=[[1]],
sparse_feature_indices=[[1]],
sparse_feature_values=[[1.0,2.... | {'CVE-2021-37672'} | 2021-08-25T14:41:39Z | 2021-08-25T14:41:39Z | MODERATE | 5.5 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37672', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7', 'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6', 'https://github.com/advisories/GHSA-5hj3-vjjf-f5m7'} | null | {'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6'} | {'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6'} |
GHSA | GHSA-hfg5-xpvw-c9x4 | Improper Input Validation in Apache Camel | Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0. | {'CVE-2020-11971'} | 2022-04-22T18:21:41Z | 2021-05-21T19:20:30Z | HIGH | 7.5 | {'CWE-20'} | {'https://issues.apache.org/jira/browse/CAMEL-14811', 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c', 'http://www.openwall.com/lists/oss-security/2020/05/14/7', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https:/... | null | {'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'} | {'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'} |
GHSA | GHSA-gp2m-7cfp-h6gf | Incorrect persistent NameID generation in SimpleSAMLphp | ### Background
When a SimpleSAMLphp Identity Provider is misconfigured, a bug in the software when trying to build a persistent `NameID` to univocally identify the authenticating subject could cause different users to get the same identifier generated, depending on the attributes available for them right after authenti... | {'CVE-2017-12873'} | 2021-08-19T16:44:18Z | 2020-01-24T21:28:06Z | CRITICAL | 9.8 | {'CWE-384'} | {'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html', 'https://github.com/advisories/GHSA-gp2m-7cfp-h6gf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12873', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-gp2m-7cfp-h6gf', 'https://www.debian.org/security/2018/dsa-4127', 'https... | null | {'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'} | {'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'} |
GHSA | GHSA-p493-635q-r6gr | Remote code execution via the `pretty` option. | ### Impact
If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.
### Patches
Upgrade to `pug@... | {'CVE-2021-21353'} | 2021-03-04T17:42:33Z | 2021-03-03T02:03:52Z | HIGH | 6.8 | {'CWE-74'} | {'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://github.com/pugjs/pug/issues/3312', 'https://github.com/pugjs/pug/pull/3314', 'https://www.npmjs.com/package/pug-code-gen', 'https://www.npmjs.com/package/pug'... | null | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} |
GHSA | GHSA-7jh9-6cpf-h4m7 | XSS in hello.js | This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1). | {'CVE-2020-7741'} | 2021-09-27T20:56:45Z | 2021-01-13T19:07:01Z | CRITICAL | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7741', 'https://github.com/advisories/GHSA-7jh9-6cpf-h4m7', 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://snyk.io... | null | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.