ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-657v-jjf8-83gh
Malicious Package in jsmsha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:37:41Z
2020-09-03T23:14:55Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1295', 'https://github.com/advisories/GHSA-657v-jjf8-83gh'}
null
GHSA
GHSA-h8jc-jmrf-9h8f
Improper Authentication and Insecure Default Initialization of Resource in Argo API
As of v1.5.0, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
{'CVE-2020-8828'}
2021-07-26T21:19:27Z
2021-07-26T21:19:27Z
HIGH
8.8
{'CWE-287', 'CWE-1188'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8828', 'https://github.com/advisories/GHSA-h8jc-jmrf-9h8f', 'https://www.soluble.ai/blog/argo-cves-2020', 'https://github.com/argoproj/argo/releases', 'https://argoproj.github.io/argo-cd/security_considerations/'}
null
GHSA
GHSA-vpx7-vm66-qx8r
Path Traversal in github.com/unknwon/cae/zip
The ExtractTo function doesn't securely escape file paths in zip archives which include leading or non-leading "..". This allows an attacker to add or replace files system-wide.
{'CVE-2020-7664'}
2022-01-04T19:33:01Z
2021-05-18T20:31:06Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-vpx7-vm66-qx8r', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUNKNWONCAEZIP-570383', 'https://github.com/unknwon/cae/commit/07971c00a1bfd9dc171c3ad0bfab5b67c2287e11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7664'}
null
GHSA
GHSA-h9vc-2p9g-63gp
Exposure of Sensitive Information to an Unauthorized Actor in pimcore
Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.
{'CVE-2022-0565'}
2022-02-24T13:10:52Z
2022-02-15T00:02:47Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-h9vc-2p9g-63gp', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565', 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
null
GHSA
GHSA-4cfr-gjfx-fj3x
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.
{'CVE-2021-40324'}
2021-10-13T17:27:07Z
2021-10-05T17:53:11Z
HIGH
0
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40324', 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://github.com/advisories/GHSA-4cfr-gjfx-fj3x'}
null
GHSA
GHSA-vm64-cfqx-3698
Code Injection in jsen
This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so I assume that this is applicable. In particular the required field of the schema is not properly sanitized. The resulting string that is build based on the schema definition is then passed to a Function.apply();, leading to an Arbitrary Code Execution.
{'CVE-2020-7777'}
2022-02-10T20:18:51Z
2022-02-10T20:18:37Z
HIGH
7.2
{'CWE-94'}
{'https://github.com/advisories/GHSA-vm64-cfqx-3698', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7777'}
null
GHSA
GHSA-g7p8-r2ch-4rmf
Malicious Atomix node queries expose sensitive information
An issue in Atomix v3.1.5 allows attackers to access sensitive information when a malicious Atomix node queries distributed variable primitives which contain the entire primitive lists that ONOS nodes use to share important states.
{'CVE-2020-35215'}
2022-01-04T18:56:54Z
2021-12-17T20:41:45Z
MODERATE
6.5
{'CWE-668'}
{'https://docs.google.com/presentation/d/1pRRLfdSUqUZ688CZ9e9AyceuXPGp9oyGj7j4bdSsBcw/edit?usp=sharing', 'https://github.com/advisories/GHSA-g7p8-r2ch-4rmf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35215'}
null
GHSA
GHSA-qxmr-qxh6-2cc9
ReDos vulnerability on guest checkout email validation
### Impact Denial of service vulnerability that could be exploited during a guest checkout. The regular expression used to validate a guest order's email was subject to exponential backtracking through a fragment like `a.a.`. Before the patch, it can be reproduced in the console like this: ```ruby irb(main)> Spree::EmailValidator::EMAIL_REGEXP.match "a@a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.a.@" processing time: 54.293660s => nil ``` To reproduce in the browser, fill in the "Customer Email" field with that fake email address during a guest checkout. Before that, you should open the browser dev tools and change the `type` attribute for that field from `email` to `text`. After entering a fake address and pressing the "Save & Continue" button, the browser will take a long term to perform the request before showing an error message for the invalid address. Eventually, making the email string even longer could lead to the exhaustion of server resources. ### Patches Versions 3.1.4, 3.0.4, and 2.11.13 have been patched to use a different regular expression. There's an improbable chance that some orders in your system end up having associated an email address that is no longer valid. We've added a task to check precisely that: ```bash bin/rails solidus:check_orders_with_invalid_email ``` The above will print information for every affected order if any. ### Workarounds If a prompt upgrade is not an option, please, add the following to `config/application.rb`: ```ruby config.after_initialize do Spree::EmailValidator.send(:remove_const, :EMAIL_REGEXP) Spree::EmailValidator::EMAIL_REGEXP = URI::MailTo::EMAIL_REGEXP end ``` ### References - https://en.wikipedia.org/wiki/ReDoS - https://snyk.io/blog/redos-and-catastrophic-backtracking/ ### For more information If you have any questions or comments about this advisory: * Open an [issue](https://github.com/solidusio/solidus/issues) or a [discussion](https://github.com/solidusio/solidus/discussions) in Solidus. * Email us at [security@solidus.io](mailto:security@soliidus.io) * Contact the core team on [Slack](http://slack.solidus.io/)
{'CVE-2021-43805'}
2022-04-19T19:03:16Z
2021-12-07T22:01:47Z
HIGH
7.5
{'CWE-1333'}
{'https://github.com/advisories/GHSA-qxmr-qxh6-2cc9', 'https://github.com/solidusio/solidus/commit/6be174c955fad84017ca67589c676526bc5ade71', 'https://github.com/solidusio/solidus/commit/9867153e01e3c3b898cdbcedd7b43375ea922401', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43805', 'https://github.com/solidusio/solidus/security/advisories/GHSA-qxmr-qxh6-2cc9'}
null
GHSA
GHSA-j7xg-5549-jr3j
Improper Certificate Validation in OWASP ZAP
OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server.
{'CVE-2022-27820'}
2022-04-05T20:53:46Z
2022-03-25T00:00:34Z
MODERATE
4
{'CWE-295'}
{'http://www.openwall.com/lists/oss-security/2022/03/24/3', 'https://github.com/zaproxy/zaproxy/issues/7165', 'https://github.com/zaproxy/zaproxy/releases', 'https://www.openwall.com/lists/oss-security/2022/03/23/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27820', 'https://github.com/advisories/GHSA-j7xg-5549-jr3j'}
null
GHSA
GHSA-hcw3-j74m-qc58
Incorrect Calculation in github.com/open-policy-agent/opa
### Impact Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below. **All of these** three conditions have to be met to create an adverse effect: 1. An AST of Rego had to be **created programmatically** such that it ends up containing terms without a location (such as wildcard variables). 2. The AST had to be **pretty-printed** using the `github.com/open-policy-agent/opa/format` package. 3. The result of the pretty-printing had to be **parsed and evaluated again** via an OPA instance using the bundles, or the Golang packages. If any of these three conditions are not met, you are not affected. Notably, all three would be true if using **optimized bundles**, i.e. bundles created with `opa build -O=1` or higher. In that case, the optimizer would fulfil condition (1.), the result of that would be pretty-printed when writing the bundle to disk, fulfilling (2.). When the bundle was then used, we'd satisfy (3.). #### Example For example, the process outlined above could turn this rule ```rego hello { ["foo", _] = split(input.resource, "/") } ``` into ```rego hello { [_, "foo"] = split(input.resource, "/") } ``` with an input of ```rego { "resource": "foo/bar" } ``` the result would change from ```rego { "hello": true } ``` to (no default value of hello) ```rego {} ``` The severity was determined to be *moderate* because the conditions are quite particular. Please note that its only the OPA bundle build process thats affected. An OPA sidecar of version 0.36.0 with an optimized bundle built by OPA 0.32.1 would not face this bug. ### Patches Fixed in version 0.37.2. ### Workarounds - Disabling optimization when creating bundles. ### References - Introduced in https://github.com/open-policy-agent/opa/pull/3851 - Backported for the 0.33.1 patch release: https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717 - Fixed by https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239 and https://github.com/open-policy-agent/opa/commit/2bd8edab9e10e2dc9cf76ae8335ced0c224f3055 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Community Discussions](https://github.com/open-policy-agent/community/discussions/categories/opa-and-rego) * Ask in Slack: https://slack.openpolicyagent.org/
{'CVE-2022-23628'}
2022-04-19T19:03:21Z
2022-02-09T22:17:37Z
MODERATE
6.3
{'CWE-682'}
{'https://github.com/advisories/GHSA-hcw3-j74m-qc58', 'https://github.com/open-policy-agent/opa/pull/3851', 'https://github.com/open-policy-agent/opa/commit/932e4ffc37a590ace79e9b75ca4340288c220239', 'https://github.com/open-policy-agent/opa/commit/bfd984ddf93ef2c4963a08d4fdadae0bcf1a3717', 'https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628'}
null
GHSA
GHSA-4hjg-cx88-g9f9
Data races in futures-intrusive
An issue was discovered in the futures-intrusive crate before 0.4.0 for Rust. GenericMutexGuard allows cross-thread data races of non-Sync types.
{'CVE-2020-35915'}
2021-08-25T20:49:58Z
2021-08-25T20:49:58Z
MODERATE
5.5
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35915', 'https://github.com/Matthias247/futures-intrusive/issues/53', 'https://rustsec.org/advisories/RUSTSEC-2020-0072.html', 'https://github.com/advisories/GHSA-4hjg-cx88-g9f9'}
null
GHSA
GHSA-7vxc-chqj-h83g
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4168'}
2022-01-07T16:11:22Z
2022-01-06T22:02:18Z
MODERATE
6.3
{'CWE-352'}
{'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168', 'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://github.com/advisories/GHSA-7vxc-chqj-h83g'}
null
GHSA
GHSA-xp9c-82x8-7f67
Prototype Pollution in Node-Red
### Impact Node-RED 1.2.7 and earlier contains a Prototype Pollution vulnerability in the admin API. A badly formed request can modify the prototype of the default JavaScript Object with the potential to affect the default behaviour of the Node-RED runtime. ### Patches The vulnerability is patched in the 1.2.8 release. ### Workarounds A workaround is to ensure only authorised users are able to access the editor url. ### For more information If you have any questions or comments about this advisory: * Email us at [team@nodered.org](mailto:team@nodered.org) ### Acknowledgements Thanks to the Tencent Woodpecker Security Team for disclosing this vulnerability.
{'CVE-2021-21297'}
2021-09-22T13:55:00Z
2021-02-26T16:31:05Z
HIGH
7.7
{'CWE-1321', 'CWE-915'}
{'https://github.com/advisories/GHSA-xp9c-82x8-7f67', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21297', 'https://github.com/node-red/node-red/security/advisories/GHSA-xp9c-82x8-7f67', 'https://www.npmjs.com/package/@node-red/runtime', 'https://www.npmjs.com/package/@node-red/editor-api'}
null
GHSA
GHSA-qjmq-8hjr-qcv6
SQL Injection when creating an application with Reactive SQL backend
### Impact SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected. If you have generated a microservice Gateway using the affected version, you might be impacted as Gateways are reactive by default. Currently, SQL injection is possible in the `findAllBy(Pageable pageable, Criteria criteria)` method of an entity repository class generated in these applications as the where clause using Criteria for queries are not sanitized and user input is passed on as it is by the criteria. ## Impacted applications - Monolith and microservice applications with SQL database and reactive with Spring WebFlux combination (other combinations are not affected and the issue is only present when you generate entities) - Gateway applications with SQL database (issue will appear only when generating entities) ### Patches Patched in v7.8.1 The `findAllBy(Pageable pageable, Criteria criteria)` method has been removed from the entity repositories and `org.springframework.data.relational.core.query.Criteria` support in the underlying methods has been replaced with `org.springframework.data.relational.core.sql.Condition`. This means you won't be able to do custom filtering in the generated applications. If you have existing reactive applications generated by the impacted version, we advise you to audit for use of `Criteria` and take appropriate actions. ### Workarounds The problem lies in the `EntityManager.java` class when creating the where clause via `Conditions.just(criteria.toString())`. `just` accepts the literal string provided. Criteria's `toString` method returns a plain string and this combination is vulnerable to sql injection as the string is not sanitized and will contain whatever used passed as input using any plain SQL So be careful when combining criterias and conditions. As a workaround we have removed the possibility to pass any user-provided criteria to the `createSelect` method of `EntityManager`. ### Example ```java Criteria criteria = Criteria.where("name").is("foobar';DROP TABLE example;--"); // parameter is user provided input criteria.toString(); // --> "'foobar';DROP TABLE example;--'" ``` ### References [More details in this Issue report](https://github.com/jhipster/generator-jhipster/issues/18269) ### For more information If you have any questions or comments about this advisory: * Open an issue in [JHipster issue tracker](https://github.com/jhipster/generator-jhipster/issues)
{'CVE-2022-24815'}
2022-04-18T22:20:12Z
2022-04-07T15:18:05Z
HIGH
8.1
{'CWE-89'}
{'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6', 'https://github.com/jhipster/generator-jhipster/issues/18269', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815', 'https://github.com/jhipster/generator-jhipster/commit/c220a210fd7742c53eea72bd5fadbb96220faa98', 'https://github.com/advisories/GHSA-qjmq-8hjr-qcv6'}
null
GHSA
GHSA-7xwj-5r4v-429p
NPE in TFLite
### Impact The implementation of SVDF in TFLite is [vulnerable to a null pointer error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/svdf.cc#L300-L313): ```cc TfLiteTensor* state = GetVariableInput(context, node, kStateTensor); // ... GetTensorData<float>(state) ``` The [`GetVariableInput` function](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L115-L119) can return a null pointer but `GetTensorData` assumes that the argument is always a valid tensor. ```cc TfLiteTensor* GetVariableInput(TfLiteContext* context, const TfLiteNode* node, int index) { TfLiteTensor* tensor = GetMutableInput(context, node, index); return tensor->is_variable ? tensor : nullptr; } ``` Furthermore, because `GetVariableInput` calls [`GetMutableInput`](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/kernel_util.cc#L82-L90) which might return `nullptr`, the `tensor->is_variable` expression can also trigger a null pointer exception. ### Patches We have patched the issue in GitHub commit [5b048e87e4e55990dae6b547add4dae59f4e1c76](https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37681'}
2021-08-25T14:40:35Z
2021-08-25T14:40:35Z
HIGH
7.8
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/5b048e87e4e55990dae6b547add4dae59f4e1c76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37681', 'https://github.com/advisories/GHSA-7xwj-5r4v-429p', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7xwj-5r4v-429p'}
null
GHSA
GHSA-xhfx-hgmf-v6vp
Potential Host Header Poisoning on misconfigured servers
### Impact When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Poisoning: - https://portswigger.net/web-security/host-header - https://dzone.com/articles/what-is-a-host-header-attack ### Patches A feature has been added in v1.1.2 to allow a set of trusted hosts to be specified in the application. ### Workarounds - Apply https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6 & https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0 to your installation manually if unable to upgrade to v1.1.2. - Check that the configuration setting `cms.linkPolicy` is set to `force`. ### Alternative Workaround Check to make sure that your web server does not accept any hostname when serving your web application. 1. Add an entry called `testing.tld` to your computer's host file and direct it to your server's IP address 2. Open the address `testing.tld` in your web browser 3. Make sure an October CMS website is not available at this address If an October CMS website is returned, configure your webserver to only allow known hostnames. If you require assistance with this, please contact your server administrator. ### References Reported by [Abdullah Hussam](https://github.com/ahussam) ### For More Information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat Assessment <img width="1108" alt="Screen Shot 2021-01-15 at 4 12 57 PM" src="https://user-images.githubusercontent.com/7253840/104783859-92fb3600-574c-11eb-9e21-c0dc05d230a9.png">
{'CVE-2021-21265'}
2021-03-11T02:18:01Z
2021-03-10T21:07:25Z
LOW
0
{'CWE-644'}
{'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/advisories/GHSA-xhfx-hgmf-v6vp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp', 'https://packagist.org/packages/october/backend'}
null
GHSA
GHSA-8gwj-8hxc-285w
Prototype Pollution in json-ptr
This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.
{'CVE-2021-23509'}
2021-11-08T17:43:27Z
2021-11-08T17:43:27Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/advisories/GHSA-8gwj-8hxc-285w', 'https://github.com/flitbit/json-ptr/pull/42', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509', 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca', 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291', 'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved'}
null
GHSA
GHSA-g2q5-5433-rhrf
Embedded malware in rc
The npm package `rc` had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-11-04T18:47:01Z
2021-11-04T16:24:44Z
CRITICAL
0
{'CWE-506'}
{'https://www.npmjs.com/package/rc', 'https://github.com/dominictarr/rc', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/advisories/GHSA-g2q5-5433-rhrf'}
null
GHSA
GHSA-58f5-hfqc-jgch
Padding Oracle Attack due to Observable Timing Discrepancy in jose
jose is an npm library providing a number of cryptographic operations. ### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`. Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4) ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29443'}
2021-04-19T18:27:27Z
2021-04-19T14:57:22Z
MODERATE
5.9
{'CWE-696', 'CWE-203'}
{'https://www.npmjs.com/package/jose', 'https://github.com/advisories/GHSA-58f5-hfqc-jgch', 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}
null
GHSA
GHSA-hpqh-2wqx-7qp5
Memory access due to code generation flaw in Cranelift module
There is a bug in 0.73.0 of the Cranelift x64 backend that can create a scenario that could result in a potential sandbox escape in a WebAssembly module. Users of versions 0.73.0 of Cranelift should upgrade to either 0.73.1 or 0.74 to remediate this vulnerability. Users of Cranelift prior to 0.73.0 should update to 0.73.1 or 0.74 if they were not using the old default backend. ### Description This bug was introduced in the new backend on 2020-09-08 and first included in a release on 2020-09-30, but the new backend was not the default prior to 0.73.0. The recently-released version 0.73.0 with default settings, and prior versions with an explicit build flag to select the new backend, are vulnerable. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack, under a specific set of circumstances. If those circumstances occur, the bug could allow access to memory addresses up to 2GiB before the start of the heap allocated for the WebAssembly module. If the heap bound is larger than 2GiB, then it would be possible to read memory from a computable range dependent on the size of the heap's bound. The impact of this bug is highly dependent on heap implementation; specifically: * if the heap has bounds checks, and * does not rely exclusively on guard pages, and * the heap bound is 2GiB or smaller then this bug cannot be used to reach memory from another WebAssembly module heap. The impact of the vulnerability is mitigated if there is no memory mapped in the range accessible using this bug, for example, if there is a 2 GiB guard region before the WebAssembly module heap. The bug in question performs a sign-extend instead of a zero-extend on a value loaded from the stack when the register allocator reloads a spilled integer value narrower than 64 bits. This interacts poorly with another optimization: the instruction selector elides a 32-to-64-bit zero-extend operator when we know that an instruction producing a 32-bit value actually zeros the upper 32 bits of its destination register. Hence, we rely on these zeroed bits, but the type of the value is still i32, and the spill/reload reconstitutes those bits as the sign extension of the i32’s MSB. The issue would thus occur when: * An i32 value is greater than or equal to 0x8000_0000; * The value is spilled and reloaded by the register allocator due to high register pressure in the program between the value’s definition and its use; * The value is produced by an instruction that we know to be "special" in that it zeroes the upper 32 bits of its destination: add, sub, mul, and, or; * The value is then zero-extended to 64 bits; * The resulting 64-bit value is used. Under these circumstances there is a potential sandbox escape when the i32 value is a pointer. The usual code emitted for heap accesses zero-extends the WebAssembly heap address, adds it to a 64-bit heap base, and accesses the resulting address. If the zero-extend becomes a sign-extend, the module could reach backward and access memory up to 2GiB before the start of its heap. This bug was identified by developers at Fastly following a report from Javier Cabrera Arteaga, KTH Royal Institute of Technology, with support from project Trustful of Stiftelsen för Strategisk Forskning. In addition to supporting the analysis and remediation of this vulnerability, Fastly will publish a related Fastly Security Advisory at [https://www.fastly.com/security-advisories](https://www.fastly.com/security-advisories). In addition to assessing the nature of the code generation bug in Cranelift, we have also determined that under specific circumstances, both Lucet and Wasmtime using this version of Cranelift may be exploitable. ### General Impact to Lucet Lucet inherits the heap address computation and bounds-checks of Cranelift, which it uses as its backend code generator. Of particular importance specifically is the address-space layout used by Lucet. In the default configuration for Lucet, only a single module is running, and therefore it is not possible to access memory from another module. By default, the open source implementation of Lucet uses a maximum heap size of 4 GiB, and an instance slot size of 8 GiB, when invoking an instance from the lucet-wasi command-line tool. These settings are within the range of vulnerability described above, but only a single instance is running, so there is no other instance to read. When embedding the runtime (for example, in a long-running daemon), the default for the heap size as described in the source is 1MB; with this setting, the runtime is not vulnerable. Lucet allocates its WebAssembly module instances into "instance slots", which are contiguous zones of virtual address space that contain the VM context at the bottom, the WebAssembly heap in the next page after that, a guard region in the middle, and other data at the top: the stack and the globals. If the instance slot size is less than (max heap) + 2GiB, then the lowest accessible address using the bug will overlap with the prior instance’s heap. If the size of VM context + stack + globals is greater than (4GiB - heap limit), then the highest accessible address using the bug will overlap with this critical data. If neither of these conditions are true, the bug should only result in an access to the prior instance’s guard region. Generally, if the limit is between 2GiB and 4GiB - ~1MB (depending on stack/global size) and the instance slot size is less than 6GiB, the configuration is vulnerable. If the limit is greater than 4GiB - ~1MB, the configuration is vulnerable regardless of instance slot size. Otherwise, the configuration is not vulnerable. ### General Impact on Wasmtime In Wasmtime, the same Cranelift heap address computations and heap types are used as above. The memory layout, however, is slightly different, with different outcomes: * With the mmap implementation impact is mitigated probabilistically if ASLR is enabled. * With the pooling allocator, the vulnerability only exists if a memory reservation size lower than the default of 6GB is used. With the default mmap-based instance memory implementation, Wasmtime uses mmap() to allocate a block of memory large enough for the heap and guard region, as specified in its configuration. If the underlying OS implements ASLR (modern Linux, macOS and Windows do) then this address will be randomized, and the region below it will (probabilistically) be free. Hence, the bug is mitigated probabilistically in the default configuration if ASLR is enabled. If using the pooling allocator, the vulnerability exists if instance memory size (`memory_reservation_size` in InstanceLimit) is strictly less than 6GiB (4 GiB + 2 GiB of guard pages). The default is 6GiB, so the vulnerability is masked in the default pooling allocator configuration.
{'CVE-2021-32629'}
2022-04-26T18:11:38Z
2021-08-25T21:01:55Z
HIGH
7.2
{'CWE-125'}
{'https://github.com/RustSec/advisory-db/blob/main/crates/cranelift-codegen/RUSTSEC-2021-0067.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32629', 'https://github.com/advisories/GHSA-hpqh-2wqx-7qp5', 'https://www.fastly.com/security-advisories/memory-access-due-to-code-generation-flaw-in-cranelift-module', 'https://github.com/bytecodealliance/wasmtime/commit/95559c01aaa7c061088a433040f31e8291fb09d0', 'https://crates.io/crates/cranelift-codegen', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-hpqh-2wqx-7qp5'}
null
GHSA
GHSA-7f53-fmmv-mfjv
Regular expression denial of service in react-native
A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.
{'CVE-2020-1920'}
2021-07-20T17:35:28Z
2021-07-20T17:33:28Z
HIGH
7.5
{'CWE-400'}
{'https://securitylab.github.com/advisories/GHSL-2020-293-redos-react-native/', 'https://github.com/advisories/GHSA-7f53-fmmv-mfjv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920', 'https://github.com/facebook/react-native/releases/tag/v0.64.1', 'https://github.com/facebook/react-native/releases/tag/v0.62.3', 'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7', 'https://www.npmjs.com/package/react-native'}
null
GHSA
GHSA-2r2c-g63r-vccr
Improper Verification of Cryptographic Signature in `node-forge`
### Impact RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge) * Email us at [example email address](mailto:security@digitalbazaar.com)
{'CVE-2022-24773'}
2022-03-22T19:33:03Z
2022-03-18T23:10:48Z
MODERATE
5.3
{'CWE-347'}
{'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr', 'https://github.com/advisories/GHSA-2r2c-g63r-vccr'}
null
GHSA
GHSA-7534-mm45-c74v
Buffer Overflow in Pillow
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
{'CVE-2021-34552'}
2022-03-22T22:28:38Z
2021-10-05T20:24:41Z
CRITICAL
9.8
{'CWE-120'}
{'https://github.com/advisories/GHSA-7534-mm45-c74v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34552', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://github.com/python-pillow/Pillow/pull/5567', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/'}
null
GHSA
GHSA-f6hm-88x3-mfjv
A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host
### Impact The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21349](https://x-stream.github.io/CVE-2021-21349.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21349'}
2022-02-08T21:32:21Z
2021-03-22T23:29:19Z
MODERATE
6.1
{'CWE-502', 'CWE-918'}
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21349', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://github.com/advisories/GHSA-f6hm-88x3-mfjv', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-21349.html'}
null
GHSA
GHSA-9chx-2vqw-8vq5
Path Traversal in the Logs plugin for Craft CMS
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
{'CVE-2022-23409'}
2022-02-10T22:32:15Z
2022-02-01T00:01:00Z
MODERATE
4.9
{'CWE-22'}
{'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html', 'https://plugins.craftcms.com/logs', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/advisories/GHSA-9chx-2vqw-8vq5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://sec-consult.com/vulnerability-lab/'}
null
GHSA
GHSA-4446-656p-f54g
Deserialization of Untrusted Data in Bouncy castle
Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT private key can result in the execution of unexpected code. This attack appear to be exploitable via A handcrafted private key can include references to unexpected classes which will be picked up from the class path for the executing application. This vulnerability appears to have been fixed in 1.60 and later.
{'CVE-2018-1000613'}
2022-04-27T17:25:45Z
2018-10-17T16:23:12Z
CRITICAL
9.8
{'CWE-470', 'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-4446-656p-f54g', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190204-0003/', 'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html'}
null
GHSA
GHSA-wg6g-ppvx-927h
Prototype Pollution in cached-path-relative
The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the origin path as __proto__, the attribute of the object is accessed instead of a path. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-72573
{'CVE-2021-23518'}
2022-01-27T14:27:53Z
2022-01-27T14:27:53Z
HIGH
7.3
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-CACHEDPATHRELATIVE-2342653', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23518', 'https://github.com/advisories/GHSA-wg6g-ppvx-927h', 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'}
null
GHSA
GHSA-3gh2-xw74-jmcw
SQL injection in Django
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
{'CVE-2020-9402'}
2021-08-25T21:54:33Z
2020-06-05T14:52:07Z
HIGH
8.8
{'CWE-89'}
{'https://security.gentoo.org/glsa/202004-17', 'https://usn.ubuntu.com/4296-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://www.djangoproject.com/weblog/2020/mar/04/security-releases/', 'https://www.debian.org/security/2020/dsa-4705', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9402', 'https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY', 'https://github.com/advisories/GHSA-3gh2-xw74-jmcw', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://security.netapp.com/advisory/ntap-20200327-0004/'}
null
GHSA
GHSA-4gr7-qw2q-jxh6
Cross-site Scripting in Nacos
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
{'CVE-2021-44667'}
2022-03-22T21:37:09Z
2022-03-12T00:00:27Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-4gr7-qw2q-jxh6', 'https://github.com/alibaba/nacos/issues/7359', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667'}
null
GHSA
GHSA-mpjf-8cmf-p789
Cross-Site Scripting in jingo
Versions of `jingo` prior to 1.9.2 are vulnerable to Cross-Site Scripting (XSS). If malicious input such as `<script>alert(1)</script>` is placed in the content of a wiki page, Jingo does not properly encode the input and it is executed instead of rendered as text. ## Recommendation Upgrade to version 1.9.2
null
2021-09-27T13:33:39Z
2020-09-01T21:25:46Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-mpjf-8cmf-p789', 'https://www.npmjs.com/advisories/750'}
null
GHSA
GHSA-wrp6-9w7f-3wxg
calibre-web is vulnerable to Cross-site Scripting
calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4170'}
2022-01-21T23:55:34Z
2022-01-21T23:55:34Z
HIGH
7.3
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4170', 'https://github.com/advisories/GHSA-wrp6-9w7f-3wxg', 'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5', 'https://huntr.dev/bounties/ff395101-e392-401d-ab4f-579c63fbf6a0'}
null
GHSA
GHSA-j79j-cx3h-g27h
Out of bounds write in traitobject
An issue was discovered in the traitobject crate through 2020-06-01 for Rust. It has false expectations about fat pointers, possibly causing memory corruption in, for example, Rust 2.x.
{'CVE-2020-35881'}
2021-08-25T20:48:02Z
2021-08-25T20:48:02Z
CRITICAL
9.8
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35881', 'https://github.com/advisories/GHSA-j79j-cx3h-g27h', 'https://github.com/reem/rust-traitobject/issues/7', 'https://rustsec.org/advisories/RUSTSEC-2020-0027.html'}
null
GHSA
GHSA-mcrf-7hf9-f6q5
Unchecked vector pre-allocation
Affected versions of this crate pre-allocate memory on deserializing raw buffers without checking whether there is sufficient data available. This allows an attacker to do denial-of-service attacks by sending small msgpack messages that allocate gigabytes of memory.
null
2021-08-25T21:00:09Z
2021-08-25T21:00:09Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-mcrf-7hf9-f6q5', 'https://rustsec.org/advisories/RUSTSEC-2017-0006.html', 'https://github.com/3Hren/msgpack-rust/issues/151'}
null
GHSA
GHSA-cw7p-q79f-m2v7
incomplete JupyterHub logout with simultaneous JupyterLab sessions
### Impact Users of JupyterLab with JupyterHub who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place. ### Patches Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment. ### Workarounds The only workaround is to make sure that only one JupyterLab tab is open when you log out.
{'CVE-2021-41247'}
2022-04-19T19:03:13Z
2021-11-08T18:02:37Z
LOW
3.5
{'CWE-613'}
{'https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41247', 'https://github.com/advisories/GHSA-cw7p-q79f-m2v7', 'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'}
null
GHSA
GHSA-h87q-g2wp-47pj
Signatures are mistakenly recognized to be valid in jsrsasign
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
null
2022-02-09T22:41:37Z
2022-02-09T22:41:19Z
MODERATE
0
{'CWE-347'}
{'https://github.com/kjur/jsrsasign/releases/tag/10.2.0', 'https://kjur.github.io/jsrsasign/', 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13', 'https://github.com/advisories/GHSA-h87q-g2wp-47pj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246', 'https://github.com/kjur/jsrsasign/issues/478'}
null
GHSA
GHSA-77pw-c3j2-5fc8
Plaintext password leak in Apache Superset
In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ password, and access to connection information including the plaintext password for the current connection. It would also be possible to run arbitrary methods on the database connection object for the Presto or Hive connection, allowing the user to bypass security controls internal to Superset. This vulnerability is present in every Apache Superset version < 0.37.2.
{'CVE-2020-13952'}
2021-04-30T17:34:03Z
2021-04-30T17:34:03Z
HIGH
8.1
{'CWE-200'}
{'https://github.com/advisories/GHSA-77pw-c3j2-5fc8', 'https://lists.apache.org/thread.html/rf1faa368f580d2cb691576bee1277855f769667f3114d5df1dacbea6%40%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13952'}
null
GHSA
GHSA-hvf8-h2qh-37m9
IPC messages delivered to the wrong frame in Electron
### Impact IPC messages sent from the main process to a subframe in the renderer process, through `webContents.sendToFrame`, `event.reply` or when using the `remote` module, can in some cases be delivered to the wrong frame. If your app does ANY of the following, then it is impacted by this issue: - Uses `remote` - Calls `webContents.sendToFrame` - Calls `event.reply` in an IPC message handler ### Patches This has been fixed in the following versions: - 9.4.0 - 10.2.0 - 11.1.0 - 12.0.0-beta.9 ### Workarounds There are no workarounds for this issue. ### For more information If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
{'CVE-2020-26272'}
2022-04-19T19:02:42Z
2021-01-28T19:11:34Z
MODERATE
5.4
{'CWE-668'}
{'https://github.com/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/pull/26875', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26272', 'https://www.electronjs.org/releases/stable?version=9#9.4.0', 'https://github.com/electron/electron/releases/tag/v9.4.0', 'https://github.com/electron/electron/security/advisories/GHSA-hvf8-h2qh-37m9', 'https://github.com/electron/electron/commit/07a1c2a3e5845901f7e2eda9506695be58edc73c'}
null
GHSA
GHSA-224h-p7p5-rh85
Directory Traversal in wenluhong1
Affected versions of `wenluhong1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2021-09-23T21:43:30Z
2020-09-01T17:32:26Z
HIGH
7.5
{'CWE-22'}
{'https://www.npmjs.com/advisories/409', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/wenluhong1', 'https://github.com/advisories/GHSA-224h-p7p5-rh85', 'https://snyk.io/vuln/npm:wenluhong1:20170509'}
null
GHSA
GHSA-42fp-4hm3-j8r7
Moderate severity vulnerability that affects moin
Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{'CVE-2017-5934'}
2021-08-31T21:37:19Z
2019-01-04T17:46:08Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html', 'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html', 'http://moinmo.in/SecurityFixes', 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024', 'https://www.debian.org/security/2018/dsa-4318', 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934', 'https://usn.ubuntu.com/3794-1/'}
null
GHSA
GHSA-g556-x5vx-qh59
Moderate severity vulnerability that affects com.caverock:androidsvg
AndroidSVG version 1.2.2 is vulnerable to XXE attacks in the SVG parsing component resulting in denial of service and possibly remote code execution
{'CVE-2017-1000498'}
2021-09-10T20:26:22Z
2018-10-19T16:50:33Z
HIGH
7.8
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000498', 'https://github.com/BigBadaboom/androidsvg/issues/122', 'https://github.com/advisories/GHSA-g556-x5vx-qh59'}
null
GHSA
GHSA-fvfc-8pqr-wjpv
Missing Authorization in Jenkins S3 publisher Plugin
Jenkins S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models, allowing attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.
{'CVE-2021-21650'}
2021-06-16T17:29:08Z
2021-06-16T17:29:08Z
MODERATE
4.3
{'CWE-862'}
{'https://github.com/advisories/GHSA-fvfc-8pqr-wjpv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21650', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2200'}
null
GHSA
GHSA-x27v-x225-gq8g
Server-Side Request Forgery in Recurly
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
{'CVE-2017-0905'}
2021-12-01T21:50:52Z
2017-12-06T16:43:00Z
CRITICAL
9.8
{'CWE-918'}
{'https://github.com/advisories/GHSA-x27v-x225-gq8g', 'https://hackerone.com/reports/288635', 'https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0905', 'https://dev.recurly.com/page/ruby-updates'}
null
GHSA
GHSA-rv95-4wxj-6fqq
Low severity vulnerability that affects colander
In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis.
{'CVE-2017-18361'}
2021-09-17T20:46:05Z
2019-02-07T18:18:22Z
HIGH
7.5
{'CWE-835'}
{'https://github.com/Pylons/colander/issues/290', 'https://github.com/Pylons/colander/pull/323', 'https://github.com/advisories/GHSA-rv95-4wxj-6fqq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18361'}
null
GHSA
GHSA-hh27-ffr2-f2jc
Open redirect in url-parse
# Overview Affected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site. # Impact Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
{'CVE-2021-3664'}
2021-08-10T16:07:08Z
2021-08-10T16:07:08Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/unshiftio/url-parse/commit/81ab967889b08112d3356e451bf03e6aa0cbb7e0', 'https://github.com/unshiftio/url-parse/issues/205', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3664', 'https://github.com/unshiftio/url-parse/issues/206', 'https://github.com/advisories/GHSA-hh27-ffr2-f2jc', 'https://huntr.dev/bounties/1625557993985-unshiftio/url-parse'}
null
GHSA
GHSA-r28v-mw67-m5p9
Moderate severity vulnerability that affects django
An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
{'CVE-2018-7536'}
2021-08-31T21:17:02Z
2019-01-04T17:50:07Z
MODERATE
5.3
{'CWE-185'}
{'https://www.debian.org/security/2018/dsa-4161', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html', 'http://www.securityfocus.com/bid/103361', 'https://access.redhat.com/errata/RHSA-2019:0051', 'https://access.redhat.com/errata/RHSA-2019:0082', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536', 'https://github.com/advisories/GHSA-r28v-mw67-m5p9', 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://usn.ubuntu.com/3591-1/', 'https://access.redhat.com/errata/RHSA-2019:0265'}
null
GHSA
GHSA-7chv-rrw6-w6fc
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.17. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-29505](https://x-stream.github.io/CVE-2021-29505.html). ### Credits V3geB1rd, white hat hacker from Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-29505'}
2022-04-22T15:48:50Z
2021-05-18T18:36:27Z
HIGH
7.5
{'CWE-94', 'CWE-74', 'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2021-29505.html', 'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://github.com/advisories/GHSA-7chv-rrw6-w6fc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://security.netapp.com/advisory/ntap-20210708-0007/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-7chv-rrw6-w6fc', 'https://lists.apache.org/thread.html/r8ee51debf7fd184b6a6b020dc31df25118b0aa612885f12fbe77f04f@%3Cdev.jmeter.apache.org%3E'}
null
GHSA
GHSA-frxg-hf44-q765
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp
### Impact Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server is owned and operated by DisCatSharp's development team. The tokens were not logged, yet it is still advisable to reset the tokens of potentially affected bots. ### Patches 9.9.1 has been released to patch the issue for the current stable release and the current 10.0.0 prereleases are also no longer affected. ### Workarounds Remove all uses of the two `RequireDisCatSharpDeveloperAttribute`s and all direct calls to `BaseDiscordClient.LibraryDeveloperTeam`. ### Details The `HttpClient` responsible for sending requests to the Discord API was erroneously reused to send requests to our website when DisCatSharp's team members were to be fetched. ### For more information If you have any questions or comments about this advisory: * Join our [Discord server](https://discord.gg/GGYSywkxwN) * Email us at [ottero@aitsys.dev](mailto:ottero@aitsys.dev)
{'CVE-2022-24849'}
2022-04-22T20:39:48Z
2022-04-22T20:39:47Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849', 'https://github.com/advisories/GHSA-frxg-hf44-q765'}
null
GHSA
GHSA-mx7p-6679-8g3q
Polymorphic Typing in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.
{'CVE-2019-16942'}
2021-06-15T17:11:27Z
2019-10-28T20:51:15Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/7782a937c9259a58337ee36b2961f00e2d744feafc13084e176d0df5@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/b2e23c94f9dfef53e04c492e5d02e5c75201734be7adc73a49ef2370@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2019:3901', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://security.netapp.com/advisory/ntap-20191017-0006/', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/a430dbc9be874c41314cc69e697384567a9a24025e819d9485547954@%3Cissues.geode.apache.org%3E', 'https://issues.apache.org/jira/browse/GEODE-7255', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-mx7p-6679-8g3q', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2478', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16942', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2020:0164'}
null
GHSA
GHSA-6fjr-m7v6-fpg9
Exfiltrates data on installation in jquey
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `jquey` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16204'}
2021-01-08T19:45:25Z
2018-08-06T21:41:38Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-6fjr-m7v6-fpg9', 'https://www.npmjs.com/advisories/544', 'https://nodesecurity.io/advisories/544', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16204'}
null
GHSA
GHSA-r24h-634p-m72x
Validation Bypass in schema-inspector
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
{'CVE-2019-10781'}
2021-08-30T13:35:23Z
2020-06-10T20:02:47Z
CRITICAL
9.8
{'CWE-668'}
{'https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10781', 'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d', 'https://github.com/advisories/GHSA-r24h-634p-m72x'}
null
GHSA
GHSA-gqcf-83rq-gpfr
Any storage file can be downloaded from p.sh if full server path is known
The default configuration for platform.sh (.platform.app.yaml) allows access to uploaded files if you know or can guess their location, regardless of whether roles grant content read access to the content containing those files. If you're using Legacy Bridge, the default configuration also allows access to certain legacy files that should not be readable, including the legacy var directory and extension directories.
null
2021-09-14T20:24:44Z
2021-09-14T20:24:44Z
HIGH
0
{'CWE-200'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-006-storage-and-legacy-files-accessible-if-path-is-known', 'https://github.com/ibexa/post-install/security/advisories/GHSA-gqcf-83rq-gpfr', 'https://github.com/advisories/GHSA-gqcf-83rq-gpfr'}
null
GHSA
GHSA-cmx4-p4v5-hmr5
Server-side request forgery (SSRF) in Apache Batik
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2019-17566'}
2022-02-09T00:46:46Z
2022-02-09T00:46:46Z
HIGH
7.5
{'CWE-20', 'CWE-918'}
{'https://lists.apache.org/thread.html/rab94fe68b180d2e2fba97abf6fe1ec83cff826be25f86cd90f047171@%3Ccommits.myfaces.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-cmx4-p4v5-hmr5', 'https://lists.apache.org/thread.html/rcab14a9ec91aa4c151e0729966282920423eff50a22759fd21db6509@%3Ccommits.myfaces.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17566', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-rj5f-7c8x-gjg4
Prototype Pollution in promisehelpers
All versions of package promisehelpers up to and including version 0.0.5 are vulnerable to Prototype Pollution via the insert function.
{'CVE-2020-7723'}
2021-07-29T22:08:52Z
2021-05-06T18:26:07Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7723', 'https://github.com/advisories/GHSA-rj5f-7c8x-gjg4', 'https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686'}
null
GHSA
GHSA-p69g-f978-xxv9
Moderate severity vulnerability that affects luigi
Luigi version prior to version 2.8.0; after commit 53b52e12745075a8acc016d33945d9d6a7a6aaeb; after GitHub PR spotify/luigi/pull/1870 contains a Cross ite Request Forgery (CSRF) vulnerability in API endpoint: /api/<method> that can result in Task metadata such as task name, id, parameter, etc. will be leaked to unauthorized users. This attack appear to be exploitable via The victim must visit a specially crafted webpage from the network where their Luigi server is accessible.. This vulnerability appears to have been fixed in 2.8.0 and later.
{'CVE-2018-1000843'}
2021-09-15T21:55:41Z
2018-12-20T22:01:39Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-p69g-f978-xxv9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000843', 'https://groups.google.com/forum/#!topic/luigi-user/ZgfRTpBsVUY', 'https://github.com/spotify/luigi/pull/1870', 'https://github.com/spotify/luigi/blob/2.7.9/luigi/server.py#L67'}
null
GHSA
GHSA-2wmv-37vq-52g5
FPE in `tf.raw_ops.UnravelIndex`
### Impact An attacker can cause denial of service in applications serving models using `tf.raw_ops.UnravelIndex` by triggering a division by 0: ```python import tensorflow as tf tf.raw_ops.UnravelIndex(indices=-1, dims=[1,0,2]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/unravel_index_op.cc#L36) does not check that the tensor subsumed by `dims` is not empty. Hence, if one element of `dims` is 0, the implementation does a division by 0. ### Patches We have patched the issue in GitHub commit [a776040a5e7ebf76eeb7eb923bf1ae417dd4d233](https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37668'}
2021-08-25T14:42:06Z
2021-08-25T14:42:06Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2wmv-37vq-52g5', 'https://github.com/advisories/GHSA-2wmv-37vq-52g5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37668', 'https://github.com/tensorflow/tensorflow/commit/a776040a5e7ebf76eeb7eb923bf1ae417dd4d233'}
null
GHSA
GHSA-8hfj-j24r-96c4
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarounds Sanitize user-provided locale name before passing it to moment.js. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [moment repo](https://github.com/moment/moment)
{'CVE-2022-24785'}
2022-04-26T20:56:20Z
2022-04-04T21:25:48Z
HIGH
7.5
{'CWE-27', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-8hfj-j24r-96c4'}
null
GHSA
GHSA-49pj-69vf-c689
Incorrect Default Permissions in netaddr
The netaddr gem before 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.
{'CVE-2019-17383'}
2021-08-18T21:45:01Z
2019-10-14T21:43:19Z
CRITICAL
9.8
{'CWE-276'}
{'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51', 'https://github.com/advisories/GHSA-49pj-69vf-c689', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17383', 'https://rubygems.org/gems/netaddr/versions'}
null
GHSA
GHSA-4jhc-wjr3-pwh2
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node.
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to become the lead node in a target cluster via manipulation of the variable terms in RaftContext.
{'CVE-2020-35211'}
2022-01-04T18:59:32Z
2021-12-17T20:40:38Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35211', 'https://github.com/advisories/GHSA-4jhc-wjr3-pwh2', 'https://docs.google.com/presentation/d/1C_IpRfSU-9FMezcHCFZ-qg-15JO-W36yvqcnzI8sQs8/edit?usp=sharing'}
null
GHSA
GHSA-rrvg-2c69-p9rf
Cross-Site Request Forgery in Jenkins Xray
A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
{'CVE-2021-21652'}
2021-06-16T17:28:58Z
2021-06-16T17:28:58Z
HIGH
7.1
{'CWE-352'}
{'https://github.com/advisories/GHSA-rrvg-2c69-p9rf', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(1)', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21652'}
null
GHSA
GHSA-2jx8-v4hv-gx3h
XXE vulnerability in Launch import
| Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk | |--------------|-------------------|-------------------|---------------|---------------| | Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium | ### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file that uses external entities for extraction of secrets from Report Portal service-api module or server-side request forgery. Report Portal versions 4.3.12+ and 5.1.1+ disables external entity resolution for theirs XML parser. We advise our users install the latest releases we built specifically to address this issue. ### Patches Fixed with https://github.com/reportportal/service-api/pull/1201 ### Binary Download https://bintray.com/epam/reportportal/service-api/5.1.1 https://bintray.com/epam/reportportal/service-api/4.3.12 ### Docker Container Download * RP v4: `docker pull reportportal/service-api:4.3.12` * RP v5: `docker pull reportportal/service-api:5.1.1` ### Acknowledgement The issue was reported to Report Portal Team by an external security researcher. Our Team thanks Julien M. for reporting the issue. ### For more information If you have any questions or comments about this advisory email us: [support@reportportal.io](mailto:support@reportportal.io)
{'CVE-2020-12642'}
2021-10-05T17:29:41Z
2021-06-28T16:45:47Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642'}
null
GHSA
GHSA-gh4g-3gm9-5wrq
Cross-Site Scripting in shave
Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting. ## Recommendation Upgrade to version 2.5.3 or later.
{'CVE-2019-12313'}
2021-08-04T16:06:35Z
2019-05-29T18:38:08Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313', 'https://www.npmjs.com/advisories/822', 'https://github.com/dollarshaveclub/shave/compare/852b537...da7371b', 'https://github.com/advisories/GHSA-gh4g-3gm9-5wrq'}
null
GHSA
GHSA-rr8m-29g8-8cgc
SQL Injection in Fork CMS
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
{'CVE-2022-1064'}
2022-04-05T20:55:35Z
2022-03-26T00:00:32Z
HIGH
8.8
{'CWE-89'}
{'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/advisories/GHSA-rr8m-29g8-8cgc'}
null
GHSA
GHSA-38w8-h222-wrpp
Improper Restriction of XML External Entity Reference in Jenkins Chef Sinatra
Jenkins Chef Sinatra Plugin 1.20 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2022-25209'}
2022-02-24T13:54:41Z
2022-02-16T00:01:14Z
HIGH
8.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-38w8-h222-wrpp', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25209'}
null
GHSA
GHSA-f9cm-qmx5-m98h
Prototype Pollution in merge
Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype. ## Recommendation Update to version 1.2.1 or later.
{'CVE-2018-16469'}
2021-01-08T18:53:33Z
2018-11-01T14:45:42Z
LOW
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/722', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469', 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h', 'https://hackerone.com/reports/381194'}
null
GHSA
GHSA-jqj4-r483-4gvr
Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13
Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. - https://vaadin.com/security/cve-2019-25027
null
2021-10-08T21:24:02Z
2021-04-19T14:48:51Z
MODERATE
6.1
{'CWE-81'}
{'https://github.com/advisories/GHSA-jqj4-r483-4gvr', 'https://vaadin.com/security/cve-2019-25027', 'https://github.com/vaadin/platform/security/advisories/GHSA-jqj4-r483-4gvr'}
null
GHSA
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
Description ----------- CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker. In Symfony 4.1, we've added the opt-in `csv_escape_formulas` option in `CsvEncoder`, to prefix all cells starting by `=`, `+`, `-` or `@` by a tab `\t`. Since then, OWASP added 2 chars in that list: - Tab (0x09) - Carriage return (0x0D) This makes our previous prefix char (Tab `\t`) part of the vulnerable characters, and [OWASP suggests](https://owasp.org/www-community/attacks/CSV_Injection) using the single quote `'` for prefixing the value. Resolution ---------- Symfony now follows the OWASP recommendations and use the single quote `'` to prefix formulas and adds the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8) for branch 4.4. Credits ------- We would like to thank Jake Barwell for reporting the issue and Jérémy Derussé for fixing the issue.
{'CVE-2021-41270'}
2022-04-19T19:03:15Z
2021-11-24T21:01:23Z
MODERATE
6.5
{'CWE-1236'}
{'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/pull/44243', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/'}
null
GHSA
GHSA-273r-rm8g-7f3x
Uncaught Exception in mercurius
### Impact Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. ### Patches The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. ### Workarounds Use a custom error handler. ### References See https://github.com/mercurius-js/mercurius/issues/677 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/mercurius-js/mercurius * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-43801'}
2021-12-14T15:26:38Z
2021-12-13T21:33:04Z
HIGH
7.5
{'CWE-754'}
{'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801', 'https://github.com/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/mercurius-js/mercurius/issues/677', 'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223'}
null
GHSA
GHSA-x7g2-wrrp-r6h3
Use of a Broken or Risky Cryptographic Algorithm
## ✍️ Description The function mt_rand is used to generate session tokens, this function is cryptographically flawed due to its nature being one pseudorandomness, an attacker can take advantage of the cryptographically insecure nature of this function to enumerate session tokens for accounts that are not under his/her control ## 🕵️‍♂️ Proof of Concept Numerous examples and attack implementations can be found in this paper . If you're looking for a practical tool that can crack your mt_rand implementation's seed value, see this project and run the following commands in a console with php5 and OpenWall's tool installed: `root$ php -r 'mt_srand(13333337); echo mt_rand( ), "\n";'` After that, copy the output (1863134308) and execute the following commands: `root$ gcc php_mt_seed.c -o php_mt_seedroot$ ./php_mt_seed 1863134308` After waiting ~1 minute you should have a few possible seeds corresponding to their PHP versions, next to your installed PHP version you should see something akin to: seed = 0x00cb7359 = 13333337 (PHP 7.1.0+) Hey, that's your seed! ## 💥 Impact An attacker could takeover accounts at random by enumerating and using access tokens. ## 📝 References - https://openwall.com/php_mt_seedhttps://crypto.di.uoa.gr/CRYPTO.SEC/Randomness_Attacks_files/paper.pdf - https://github.com/mautic/mautic/blob/5213e320b4ef4d0c51bb84c1d46a1071e8e4f7fc/app/bundles/PointBundle/Controller/TriggerController.php#L187 - https://github.com/mautic/mautic/releases/tag/3.3.4 - https://github.com/mautic/mautic/releases/tag/4.0.0
{'CVE-2021-27913'}
2022-04-19T19:03:06Z
2021-09-01T18:41:06Z
LOW
3.5
{'CWE-327'}
{'https://github.com/advisories/GHSA-x7g2-wrrp-r6h3', 'https://github.com/mautic/mautic/security/advisories/GHSA-x7g2-wrrp-r6h3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27913'}
null
GHSA
GHSA-rf3w-29h3-r636
Arbitrary Code Execution in feehi/cms
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
{'CVE-2020-21322'}
2021-09-29T18:02:51Z
2021-09-20T20:45:35Z
HIGH
0
{'CWE-434'}
{'https://github.com/advisories/GHSA-rf3w-29h3-r636', 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms/issues/44', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322'}
null
GHSA
GHSA-vxr4-rxw7-g7v6
Prototype Pollution in comb.
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.
{'CVE-2021-23561'}
2021-12-16T14:30:56Z
2021-12-16T14:30:56Z
MODERATE
6.5
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-COMB-1730083', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23561', 'https://github.com/advisories/GHSA-vxr4-rxw7-g7v6'}
null
GHSA
GHSA-vf4q-8mr7-5c5c
Camel-castor component in Apache Camel is vulnerable to Java object de-serialisation
The camel-castor component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
{'CVE-2017-12634'}
2022-04-26T19:18:09Z
2018-10-16T23:05:58Z
CRITICAL
9.8
{'CWE-502'}
{'http://camel.apache.org/security-advisories.data/CVE-2017-12634.txt.asc', 'https://issues.apache.org/jira/browse/CAMEL-11929', 'http://www.securityfocus.com/bid/101876', 'https://github.com/advisories/GHSA-vf4q-8mr7-5c5c', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0319', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12634', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-7j93-2h6r-hm49
Cross-Site Scripting in http-file-server
All versions of `http-file-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5458'}
2021-01-08T20:42:41Z
2019-07-31T04:22:36Z
HIGH
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5458', 'https://www.npmjs.com/advisories/1110', 'https://github.com/advisories/GHSA-7j93-2h6r-hm49', 'https://hackerone.com/reports/570563'}
null
GHSA
GHSA-8v5f-hp78-jgxq
Signature Verification Bypass in jwt-simple
Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm). ## Recommendation Upgrade to version 0.5.3 or later.
null
2021-08-04T20:57:39Z
2019-06-06T15:30:33Z
HIGH
0
{'CWE-347'}
{'https://www.npmjs.com/advisories/831', 'https://github.com/advisories/GHSA-8v5f-hp78-jgxq', 'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}
null
GHSA
GHSA-hhx9-p69v-cx2j
Authentication bypass in Apache Airflow
"The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default"
{'CVE-2020-13927'}
2021-06-03T15:21:59Z
2021-04-30T17:34:13Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-hhx9-p69v-cx2j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13927', 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e', 'https://lists.apache.org/thread.html/r23a81b247aa346ff193670be565b2b8ea4b17ddbc7a35fc099c1aadd%40%3Cdev.airflow.apache.org%3E', 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication', 'https://github.com/apache/airflow/releases/tag/1.10.11', 'http://packetstormsecurity.com/files/162908/Apache-Airflow-1.10.10-Remote-Code-Execution.html'}
null
GHSA
GHSA-58v3-j75h-xr49
Improper Input Validation in libseccomp-golang
libseccomp-golang 0.9.0 and earlier incorrectly generates BPFs that OR multiple arguments rather than ANDing them. A process running under a restrictive seccomp filter that specified multiple syscall arguments could bypass intended access restrictions by specifying a single matching argument.
{'CVE-2017-18367'}
2021-05-18T15:44:30Z
2021-05-18T15:44:30Z
HIGH
4.8
{'CWE-284'}
{'http://www.openwall.com/lists/oss-security/2019/04/25/6', 'https://github.com/seccomp/libseccomp-golang/issues/22', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18367', 'https://github.com/advisories/GHSA-58v3-j75h-xr49', 'https://access.redhat.com/errata/RHSA-2019:4087', 'https://usn.ubuntu.com/4574-1/', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00016.html', 'https://access.redhat.com/errata/RHSA-2019:4090', 'https://github.com/seccomp/libseccomp-golang/commit/06e7a29f36a34b8cf419aeb87b979ee508e58f9e'}
null
GHSA
GHSA-6fmm-47qc-p4m4
Unauthorized File Access in harp
All versions of `harp` are vulnerable to Unauthorized File Access. If a symlink in the project's base directory points to a file outside of the directory, the file is served. This could allow an attacker to access sensitive files on the server. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-5438'}
2021-06-07T16:43:15Z
2019-06-13T16:12:26Z
MODERATE
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/816', 'https://github.com/advisories/GHSA-6fmm-47qc-p4m4', 'https://hackerone.com/reports/530289', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5438'}
null
GHSA
GHSA-w6cx-qg2q-rvq8
Path Traversal in @finastra/ssr-pages
A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/1 - https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
{'CVE-2022-24718'}
2022-04-19T19:03:25Z
2022-03-01T22:09:18Z
HIGH
7.6
{'CWE-22'}
{'https://github.com/Finastra/ssr-pages/pull/1', 'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718', 'https://github.com/advisories/GHSA-w6cx-qg2q-rvq8', 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8'}
null
GHSA
GHSA-5r2v-6gm6-vpvh
Insecure Permissions in Gogs
routes/api/v1/api.go in Gogs 0.11.86 lacks permission checks for routes: deploy keys, collaborators, and hooks.
{'CVE-2019-14544'}
2021-05-18T17:33:58Z
2021-05-18T17:33:58Z
CRITICAL
9.8
{'CWE-200'}
{'https://github.com/advisories/GHSA-5r2v-6gm6-vpvh', 'https://github.com/gogs/gogs/commit/c3af3ff1d0484de3bd789ee6c6e47f35d590e945', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14544', 'https://github.com/gogs/gogs/issues/5764'}
null
GHSA
GHSA-9vrw-m88g-w75q
Denial of Service in @hapi/accept
Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 3.2.4 or 5.0.1.
null
2020-09-03T15:45:53Z
2020-09-03T15:45:53Z
HIGH
0
null
{'https://github.com/advisories/GHSA-9vrw-m88g-w75q', 'https://www.npmjs.com/advisories/1475'}
null
GHSA
GHSA-6gjf-7w99-j7x7
Deleted Admin Can Sign In to Admin Interface
### Impact Assuming an administrator once had previous access to the admin interface, they may still be able to sign in to the backend using October CMS v2.0. ### Patches The issue has been patched in v2.1.12 ### Workarounds - Reset the password of the deleted accounts to prevent them from signing in. - Please contact hello@octobercms.com for code change instructions if you are unable to upgrade. ### References Credits to: • Daniel Bidala ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2021-41126'}
2021-11-09T20:32:25Z
2021-10-06T17:46:40Z
HIGH
7.2
{'CWE-287'}
{'https://octobercms.com/changelog', 'https://github.com/advisories/GHSA-6gjf-7w99-j7x7', 'https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41126'}
null
GHSA
GHSA-pphf-f93w-gc84
Data race in may_queue
An issue was discovered in the may_queue crate through 2020-11-10 for Rust. Because Queue does not have bounds on its Send trait or Sync trait, memory corruption can occur.
{'CVE-2020-36217'}
2021-08-25T20:51:47Z
2021-08-25T20:51:47Z
MODERATE
5.9
{'CWE-662', 'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0111.html', 'https://github.com/Xudong-Huang/may/issues/88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36217', 'https://github.com/advisories/GHSA-pphf-f93w-gc84'}
null
GHSA
GHSA-mg98-x2cm-4cpf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.
{'CVE-2019-1106'}
2021-03-29T20:59:15Z
2021-03-29T20:59:15Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106', 'https://github.com/advisories/GHSA-mg98-x2cm-4cpf'}
null
GHSA
GHSA-rfx6-vp9g-rh7v
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the Spring libraries are available in the classpath.
{'CVE-2017-17485'}
2021-09-17T17:46:35Z
2018-10-18T17:42:48Z
CRITICAL
9.8
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2018:0481', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://access.redhat.com/errata/RHSA-2018:0478', 'https://github.com/advisories/GHSA-rfx6-vp9g-rh7v', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://github.com/FasterXML/jackson-databind/issues/1855', 'https://access.redhat.com/errata/RHSA-2018:0116', 'http://www.securityfocus.com/archive/1/541652/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17485', 'https://security.netapp.com/advisory/ntap-20180201-0003/', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://github.com/irsl/jackson-rce-via-spel/', 'https://www.debian.org/security/2018/dsa-4114', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://access.redhat.com/errata/RHSA-2018:0480', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2018:2930'}
null
GHSA
GHSA-pgq6-ccqj-hpqr
Elasticsearch privilege escalation issue
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously been upgraded from 6.x, should upgrade to 7.17.1. Users that are planning to upgrade from 6.x should not perform an upgrade from 6.x to versions 7.16 through 7.17.0 and should use 7.17.1+ for upgrades from 6.x.
{'CVE-2022-23708'}
2022-03-18T21:04:31Z
2022-03-04T00:00:15Z
MODERATE
4.3
{'CWE-269'}
{'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23708', 'https://github.com/advisories/GHSA-pgq6-ccqj-hpqr'}
null
GHSA
GHSA-vhfr-v4w9-45v8
Improper Input Validation in renderdoc
An issue was discovered in the renderdoc crate before 0.5.0 for Rust. Multiple exposed methods take self by immutable reference, which is incompatible with a multi-threaded application.
{'CVE-2019-16142'}
2021-08-25T20:44:51Z
2021-08-25T20:44:51Z
HIGH
9.8
{'CWE-20'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0018.html', 'https://github.com/advisories/GHSA-vhfr-v4w9-45v8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16142', 'https://github.com/ebkalderon/renderdoc-rs/pull/32'}
null
GHSA
GHSA-h24p-2c3m-5qf4
Malicious Package in owl-orchard-apple-sunshine
All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:14:54Z
2020-09-03T23:23:23Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1307', 'https://github.com/advisories/GHSA-h24p-2c3m-5qf4'}
null
GHSA
GHSA-8w54-22w9-3g8f
Cross-site Scripting and Open Redirect in Products.CMFPlone
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on your cache settings. ### Patches No patch is available for the Products.CMFPlone 4 series. Versions 5.0 and higher are not affected, but two other packages used by these versions are affected. `plone.app.contenttypes` has the same problem in all versions, see [advisory](https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x). In Plone 5.0-5.2, the default Products.ATContentTypes version has the same problem. See [advisory](https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh). Plone 5.2.7 and 6.0.0a3 will be released today and will include these fixes. For all unpatched versions of the three packages, you can use the following workaround. ### Workaround Make sure the image_view_fullscreen page is not stored in the cache. In Plone: * Login as Manager and go to Site Setup. * Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable. * Click on the tab 'Caching operations'. * Under 'Legacy template mappings' locate the ruleset 'Content item view'. * From the last column ('Templates') remove 'image_view_fullscreen'. * Click on Save. ### Reporter This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you! ### For more information If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org) This is also the correct address to use when you want to report a possible vulnerability. See [our security report policy](https://plone.org/security/report).
null
2022-01-31T20:25:55Z
2022-01-28T23:10:40Z
MODERATE
4.3
{'CWE-79'}
{'https://github.com/plone/Products.CMFPlone/security/advisories/GHSA-8w54-22w9-3g8f', 'https://github.com/advisories/GHSA-8w54-22w9-3g8f'}
null
GHSA
GHSA-mpvw-25mg-59vx
Server-side Request Forgery (SSRF) via img tags in reportlab
All versions of package reportlab at time of writing are vulnerable to Server-side Request Forgery (SSRF) via img tags. In order to reduce risk, use trustedSchemes & trustedHosts (see in Reportlab's documentation) Steps to reproduce by Karan Bamal: 1. Download and install the latest package of reportlab 2. Go to demos -> odyssey -> dodyssey 3. In the text file odyssey.txt that needs to be converted to pdf inject <img src="http://127.0.0.1:5000" valign="top"/> 4. Create a nc listener nc -lp 5000 5. Run python3 dodyssey.py 6. You will get a hit on your nc showing we have successfully proceded to send a server side request 7. dodyssey.py will show error since there is no img file on the url, but we are able to do SSRF
{'CVE-2020-28463'}
2021-11-18T15:26:06Z
2021-03-29T16:32:27Z
MODERATE
6.5
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28463', 'https://github.com/advisories/GHSA-mpvw-25mg-59vx', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HMUJA5GZTPQ5WRYUCCK2GEZM4W43N7HH/', 'https://hg.reportlab.com/hg-public/reportlab/file/f094d273903a/CHANGES.md#l71', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YZQSFCID67K6BTC655EQY6MNOF35QI44/', 'https://www.reportlab.com/docs/reportlab-userguide.pdf', 'https://hg.reportlab.com/hg-public/reportlab/rev/7f2231703dc7', 'https://snyk.io/vuln/SNYK-PYTHON-REPORTLAB-1022145', 'https://bugzilla.redhat.com/show_bug.cgi?id=1930417'}
null
GHSA
GHSA-pf2j-9qmp-jqr2
SQL Injection and MAID in TypeORM
Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.
{'CVE-2020-8158'}
2021-05-07T16:46:42Z
2021-05-07T16:46:42Z
CRITICAL
9.8
{'CWE-89', 'CWE-471'}
{'https://github.com/advisories/GHSA-pf2j-9qmp-jqr2', 'https://hackerone.com/reports/869574', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8158'}
null
GHSA
GHSA-pccm-j6vj-jwwf
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload.
{'CVE-2022-0962'}
2022-03-29T21:17:44Z
2022-03-15T00:00:54Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://github.com/advisories/GHSA-pccm-j6vj-jwwf', 'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
GHSA
GHSA-pq2f-3fg3-rw99
SQL Injection in WordPress Zero Spam WordPress plugin
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
{'CVE-2022-0254'}
2022-03-29T21:17:17Z
2022-03-15T00:00:57Z
CRITICAL
9.8
{'CWE-89'}
{'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/advisories/GHSA-pq2f-3fg3-rw99', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3', 'https://wpscan.com/vulnerability/ae54681f-7b89-408c-b0ee-ba4a520db997', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906'}
null
GHSA
GHSA-4p4p-www8-8fv9
Reference binding to null in `ParameterizedTruncatedNormal`
### Impact An attacker can trigger undefined behavior by binding to null pointer in `tf.raw_ops.ParameterizedTruncatedNormal`: ```python import tensorflow as tf shape = tf.constant([], shape=[0], dtype=tf.int32) means = tf.constant((1), dtype=tf.float32) stdevs = tf.constant((1), dtype=tf.float32) minvals = tf.constant((1), dtype=tf.float32) maxvals = tf.constant((1), dtype=tf.float32) tf.raw_ops.ParameterizedTruncatedNormal( shape=shape, means=means, stdevs=stdevs, minvals=minvals, maxvals=maxvals) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3f6fe4dfef6f57e768260b48166c27d148f3015f/tensorflow/core/kernels/parameterized_truncated_normal_op.cc#L630) does not validate input arguments before accessing the first element of `shape`: ```cc int32 num_batches = shape_tensor.flat<int32>()(0); ``` If `shape` argument is empty, then `shape_tensor.flat<T>()` is an empty array. ### Patches We have patched the issue in GitHub commit [5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8](https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29568'}
2021-05-21T14:25:19Z
2021-05-21T14:25:19Z
LOW
2.5
{'CWE-824'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4p4p-www8-8fv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29568', 'https://github.com/advisories/GHSA-4p4p-www8-8fv9', 'https://github.com/tensorflow/tensorflow/commit/5e52ef5a461570cfb68f3bdbbebfe972cb4e0fd8'}
null
GHSA
GHSA-wq8f-46ww-6c2h
Integer underflow in untrusted
An issue was discovered in the untrusted crate before 0.6.2 for Rust. Error handling can trigger an integer underflow and panic.
{'CVE-2018-20989'}
2021-08-25T20:43:49Z
2021-08-25T20:43:49Z
HIGH
7.5
{'CWE-191'}
{'https://github.com/briansmith/untrusted/pull/20', 'https://rustsec.org/advisories/RUSTSEC-2018-0001.html', 'https://github.com/advisories/GHSA-wq8f-46ww-6c2h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20989'}
null
GHSA
GHSA-8qfc-cvjp-mgpq
Moderate severity vulnerability that affects org.apache.ignite:ignite-core
Apache Ignite before 1.9 allows man-in-the-middle attackers to read arbitrary files via XXE in modified update-notifier documents.
{'CVE-2016-6805'}
2021-09-07T20:29:23Z
2018-10-16T20:53:31Z
MODERATE
5.9
{'CWE-611'}
{'http://www.securityfocus.com/bid/97509', 'https://github.com/advisories/GHSA-8qfc-cvjp-mgpq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6805', 'http://seclists.org/oss-sec/2017/q2/31'}
null
GHSA
GHSA-86mr-6m89-vgj3
Buffer Overflow in node-weakauras-parser
Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems. ## Recommendation Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.
null
2021-10-04T21:10:10Z
2020-09-03T15:51:38Z
MODERATE
0
{'CWE-120'}
{'https://www.npmjs.com/advisories/1504', 'https://github.com/advisories/GHSA-86mr-6m89-vgj3', 'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43'}
null
GHSA
GHSA-v4cr-m5f8-gxw8
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4092'}
2021-12-16T14:14:56Z
2021-12-16T14:14:56Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23', 'https://github.com/advisories/GHSA-v4cr-m5f8-gxw8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}
null
GHSA
GHSA-m86m-5m44-pc93
Denial of Service in grpc-ts-health-check
Versions of `grpc-ts-health-check` prior to 2.0.0 are vulnerable to Denial of Service. The package exposes an API endpoint that may allow attackers to set the service's health status to failing. This can lead to Denial of Service as Kubernetes blocks traffic to services with a failing status. ## Recommendation Upgrade to version 2.0.0 or later.
null
2020-09-03T19:05:46Z
2020-09-03T19:05:46Z
LOW
0
null
{'https://www.npmjs.com/advisories/1097', 'https://github.com/advisories/GHSA-m86m-5m44-pc93'}
null
GHSA
GHSA-2jhm-qp48-hv5j
Missing authorization in xwiki-platform
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString: ``` $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg") ``` ### Patches It has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-18870 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2022-23621'}
2022-02-11T15:00:23Z
2022-02-09T21:56:05Z
MODERATE
5.5
{'CWE-862'}
{'https://jira.xwiki.org/browse/XWIKI-18870', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/advisories/GHSA-2jhm-qp48-hv5j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23621'}
null
GHSA
GHSA-7w8j-85wm-6xfq
Prototype Pollution in jquery-bbq
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
{'CVE-2021-20086'}
2021-05-24T19:51:58Z
2021-05-24T19:51:58Z
HIGH
8.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20086', 'https://github.com/advisories/GHSA-7w8j-85wm-6xfq', 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md'}
null
GHSA
GHSA-2ww3-fxvq-293j
Inefficient Regular Expression in nltk
nltk is contains an Inefficient Regular Expression and is vulnerable to regular expression denial of service attacks.
{'CVE-2021-3828'}
2022-04-26T18:03:42Z
2021-09-29T17:14:53Z
HIGH
7.5
{'CWE-697', 'CWE-1333'}
{'https://github.com/nltk/nltk/commit/277711ab1dec729e626b27aab6fa35ea5efbd7e6', 'https://github.com/nltk/nltk/pull/2816', 'https://github.com/advisories/GHSA-2ww3-fxvq-293j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3828', 'https://huntr.dev/bounties/d19aed43-75bc-4a03-91a0-4d0bb516bc32'}
null