ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-m8rp-q82r-c5mf
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0278'}
2022-01-27T18:31:49Z
2022-01-21T18:06:49Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0278', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7', 'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://github.com/advisories/GHSA-m8rp-q82r-c5mf'}
null
GHSA
GHSA-qj3v-q2vj-4c8h
Calculation error in ark-r1cs-std
An issue was discovered in the ark-r1cs-std crate before 0.3.1 for Rust. It does not enforce any constraints in the FieldVar::mul_by_inverse method. Thus, a prover can produce a proof that is unsound but is nonetheless verified.
{'CVE-2021-38194'}
2021-08-25T20:55:58Z
2021-08-25T20:55:58Z
CRITICAL
9.8
{'CWE-682'}
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ark-r1cs-std/RUSTSEC-2021-0075.md', 'https://github.com/arkworks-rs/r1cs-std/pull/70', 'https://rustsec.org/advisories/RUSTSEC-2021-0075.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38194', 'https://github.com/advisories/GHSA-qj3v-q2vj-4c8h'}
null
GHSA
GHSA-93jq-624g-4p9p
Moderate severity vulnerability that affects org.asynchttpclient:async-http-client
Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL.
{'CVE-2017-14063'}
2021-09-07T20:39:25Z
2018-10-19T16:50:50Z
HIGH
7.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/rbbad61e1ba5b21e234a6664963618acfee237af754eb20300d938e1e@%3Cissues.tez.apache.org%3E', 'http://openwall.com/lists/oss-security/2017/08/31/4', 'https://lists.apache.org/thread.html/r41a0e2c36f7d1854a4d56cb1e4aa720ef501782d887ece1c9b1e2d60@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rc550b8955b37b40fee18db99f167337c41c930d8c3763b9631e01dda@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfd823a733b02cffbef5a69953fdcbed2d1d0afad5e1ea4e96ff6bf0a@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r7046a51116207588e36ca8c2e291327e391dae40712d267117475a98@%3Cdev.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r0a6b6429a7558051dbb70bd06584b4b1c334a80ec9203d3d39b7045a@%3Ccommits.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r4ebb9596d890f3528630492bd78237b3eef06f093bac238a0da9b630@%3Cissues.tez.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/AsyncHttpClient/async-http-client/issues/1455', 'https://github.com/advisories/GHSA-93jq-624g-4p9p', 'https://lists.apache.org/thread.html/r79d9bab405414af45568c4683386f5e9fd02c10ca87ffa2ee33512dc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3df4b7ccc363b4850a24842138117aa4451b875bc4773a845b828fc6@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5f794dc07913c5f2ec08f540813b40e61b562d36f8b1f916e8705c56@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r04b15fd898a6b1612153543375daaa8145a0fd1804ec9fa2e0d95c97@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/re7367895ccbf64523efcd39a9181baf2eaa30b069d8d6496852fba56@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r9ea5d489e004b40baf73880c4e11dd4de24b799d15e091e1f4017108@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rbc4fbb06ccb10e26e6064f57f6bd4935eabe2d18a0cb9a7183699396@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5b8666c4414500ff6e993bfa69cb6afa19b1b67c4585a045c0c21662@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r868875e67494a18d31e88cba2672f45c3fc6708ffdde445723004da4@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r14a74d204f285dd3a4fa203de6dbb4e741ddb7fdfff7915590e5b3db@%3Cdev.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfe55d83e4070bcc9285bbbf6bc39635dbcbba6d14d89aab0f339c83a@%3Ccommits.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcb46acc25917e01ebecca132e870da9ab935d5796686ed8a2785b026@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r7879a48644f708be0529bd39f0679ad3ad951f3dc24442878a008fd8@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5f07c30721503d4c02d5451f77a611a1a0bb2a94ddcdf071c9485ea3@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r683d78c6d7a15659f2bb82dd4120dab8c45a870eaa7f1a15cce4ed3b@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/re2510852c4a1f635b14b35e5dfd7597076928e723ab08559ede575e0@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14063'}
null
GHSA
GHSA-46q2-93hm-52p5
Directory Traversal in serverlyr
Affected versions of `serverlyr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16089'}
2021-01-14T15:54:18Z
2020-09-01T16:53:37Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/365', 'https://github.com/advisories/GHSA-46q2-93hm-52p5', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr', 'https://www.npmjs.com/advisories/365', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16089'}
null
GHSA
GHSA-282f-qqgm-c34q
Prototype Pollution in node-jsonpointer
This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.
{'CVE-2021-23807'}
2021-11-08T17:44:45Z
2021-11-08T17:44:45Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23807', 'https://github.com/advisories/GHSA-282f-qqgm-c34q', 'https://github.com/janl/node-jsonpointer/pull/51', 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288'}
null
GHSA
GHSA-m34j-p8rj-wjxq
Division by 0 in `QuantizedBiasAdd`
### Impact An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8) bias = tf.constant([], shape=[0], dtype=tf.quint8) min_input = tf.constant(-10.0, dtype=tf.float32) max_input = tf.constant(-10.0, dtype=tf.float32) min_bias = tf.constant(-10.0, dtype=tf.float32) max_bias = tf.constant(-10.0, dtype=tf.float32) tf.raw_ops.QuantizedBiasAdd(input=input_tensor, bias=bias, min_input=min_input, max_input=max_input, min_bias=min_bias, max_bias=max_bias, out_type=tf.qint32) ``` This is because the [implementation of the Eigen kernel](https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero: ```cc template <typename T1, typename T2, typename T3> void QuantizedAddUsingEigen(const Eigen::ThreadPoolDevice& device, const Tensor& input, float input_min, float input_max, const Tensor& smaller_input, float smaller_input_min, float smaller_input_max, Tensor* output, float* output_min, float* output_max) { ... const int64 input_element_count = input.NumElements(); const int64 smaller_input_element_count = smaller_input.NumElements(); ... bcast[0] = input_element_count / smaller_input_element_count; ... } ``` This integral division by 0 is undefined behavior. ### Patches We have patched the issue in GitHub commit [67784700869470d65d5f2ef20aeb5e97c31673cb](https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29546'}
2021-05-21T14:23:28Z
2021-05-21T14:23:28Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-m34j-p8rj-wjxq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29546', 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq'}
null
GHSA
GHSA-x3g3-jh26-76cf
Cross-site Scripting in livehelperchat
LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration.
{'CVE-2022-0375'}
2022-02-02T16:05:34Z
2022-01-28T23:06:00Z
MODERATE
6.5
{'CWE-79'}
{'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://github.com/advisories/GHSA-x3g3-jh26-76cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375'}
null
GHSA
GHSA-j336-34q7-cgj3
Downloads Resources over HTTP in healthcenter
Affected versions of `healthcenter` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `healthcenter`. ## Recommendation This package has been deprecated, and moved to a new package on npm: [`appmetrics`](https://npmjs.com/package/appmetrics). In order to mitigate this vulnerability, please install the `appmetrics` package in place of `healthcenter` via the following commands: ``` npm uninstall healthcenter -s npm install appmetrics -s ```
{'CVE-2016-10684'}
2021-01-08T18:38:25Z
2019-02-18T23:42:06Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/288', 'https://nodesecurity.io/advisories/288', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10684', 'https://github.com/advisories/GHSA-j336-34q7-cgj3'}
null
GHSA
GHSA-p3rp-vmj9-gv6v
Incorrect sanitisation function leads to `XSS` in mermaid
### Impact Malicious diagrams can contain javascript code that can be run at diagram readers machines. ### Patches The users should upgrade to version 8.13.8 ### Workarounds You need to upgrade in order to avoid this issue.
{'CVE-2021-43861'}
2022-01-06T19:45:59Z
2022-01-06T19:45:59Z
HIGH
7.2
{'CWE-20', 'CWE-79'}
{'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83', 'https://github.com/mermaid-js/mermaid/releases/tag/8.13.8', 'https://github.com/advisories/GHSA-p3rp-vmj9-gv6v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43861', 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v'}
null
GHSA
GHSA-2j9c-9vmv-7m39
Missing anchor in Rack-Cors allows malicious third party site to perform CORS request
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.
{'CVE-2017-11173'}
2022-04-26T18:19:30Z
2018-07-31T18:18:39Z
HIGH
8.8
null
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11173', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'http://www.debian.org/security/2017/dsa-3931'}
null
GHSA
GHSA-6hgr-2g6q-3rmc
Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19
`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out. - https://vaadin.com/security/cve-2021-31408
null
2021-10-08T21:24:02Z
2021-04-22T16:11:26Z
MODERATE
6.3
{'CWE-287'}
{'https://github.com/advisories/GHSA-6hgr-2g6q-3rmc', 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}
null
GHSA
GHSA-fh37-cx83-q542
Improper Authentication in Apache Airflow
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0.
{'CVE-2021-26697'}
2021-06-18T18:30:11Z
2021-06-18T18:30:11Z
MODERATE
5.3
{'CWE-287', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26697', 'http://www.openwall.com/lists/oss-security/2021/02/17/2', 'https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-fh37-cx83-q542', 'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}
null
GHSA
GHSA-j66f-h9hm-975m
Unrestricted Upload of File with Dangerous Type in Umbraco CMS
Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.
{'CVE-2020-9472'}
2021-08-02T17:38:56Z
2021-08-02T17:38:56Z
MODERATE
6.5
{'CWE-434'}
{'https://github.com/advisories/GHSA-j66f-h9hm-975m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9472', 'https://gitlab.com/eLeN3Re/cve-2020-9472'}
null
GHSA
GHSA-gw97-f6h8-gm94
Email relay in Apache Traffic Control
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
{'CVE-2021-42009'}
2021-10-20T17:07:21Z
2021-10-13T18:55:04Z
MODERATE
4.3
{'CWE-20'}
{'https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42009', 'http://www.openwall.com/lists/oss-security/2021/10/12/1', 'https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E', 'https://github.com/advisories/GHSA-gw97-f6h8-gm94', 'https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E', 'https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E'}
null
GHSA
GHSA-m5pj-vjjf-4m3h
Arbitrary Code Execution in grunt
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
{'CVE-2020-7729'}
2021-05-06T18:27:18Z
2021-05-06T18:27:18Z
HIGH
7.1
{'CWE-1188'}
{'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249', 'https://usn.ubuntu.com/4595-1/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html', 'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729', 'https://snyk.io/vuln/SNYK-JS-GRUNT-597546', 'https://github.com/advisories/GHSA-m5pj-vjjf-4m3h'}
null
GHSA
GHSA-686f-ch3r-xwmh
Data races in unicycle
Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads. This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab<T>` or `Unordered<T, S>` and accessed concurrently from multiple threads. The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab<T>` & `Unordered<T, S>` and adding `T: Sync` to `Sync` impls for `PinSlab<T>` & `Unordered<T, S>`.
{'CVE-2020-36436'}
2021-08-25T20:58:17Z
2021-08-25T20:58:17Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://github.com/udoprog/unicycle/issues/8', 'https://github.com/advisories/GHSA-686f-ch3r-xwmh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36436', 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}
null
GHSA
GHSA-x64g-4xx9-fh6x
Denial of Service in Cryptacular
CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with &quot;new byte&quot; may depend on untrusted input within the header of encoded data.
{'CVE-2020-7226'}
2022-04-22T18:19:17Z
2020-06-10T20:02:58Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/issues/52', 'https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143@%3Ccommits.tomee.apache.org%3E', 'https://github.com/apereo/cas/pull/4685', 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6@%3Ccommits.tomee.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/pull/56', 'https://github.com/advisories/GHSA-x64g-4xx9-fh6x', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a@%3Cdev.ws.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7226', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945@%3Cdev.ws.apache.org%3E'}
null
GHSA
GHSA-9mxw-4856-9cm5
Data races in rusb
An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and Sync bounds, a data race and memory corruption can occur.
{'CVE-2020-36206'}
2021-08-25T20:50:51Z
2021-08-25T20:50:51Z
HIGH
7
{'CWE-662', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36206', 'https://rustsec.org/advisories/RUSTSEC-2020-0098.html', 'https://github.com/a1ien/rusb/issues/44', 'https://github.com/advisories/GHSA-9mxw-4856-9cm5'}
null
GHSA
GHSA-6xc2-mj39-q599
Privilege Escalation in strapi
Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token. ## Recommendation Upgrade to version 3.0.0-beta.17.5 or later.
{'CVE-2019-18818'}
2022-02-09T18:27:25Z
2019-12-02T18:20:41Z
HIGH
9.8
{'CWE-640'}
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818', 'https://www.npmjs.com/advisories/1311', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818', 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5', 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html', 'https://github.com/advisories/GHSA-6xc2-mj39-q599', 'https://github.com/strapi/strapi/pull/4443', 'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html'}
null
GHSA
GHSA-vc89-hccf-rq55
Hash collision in typelevel jawn
### Impact Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack. Most applications do not implement these traits directly, but inherit from a library: Affected implementations include: * `org.http4s` :: `http4s-play-json` * `org.typelevel :: jawn-ast` (< 0.8.0) * `org.typelevel :: jawn-play` (discontinued) * `org.typelevel :: jawn-rojoma` (discontinued) * `org.typelevel :: jawn-spray` (discontinued) Unaffected implementations include: * `io.argonaut :: argonaut-jawn` * `io.circe :: circe-parser` * `org.typelevel :: jawn-ast` (>= 0.8.0) * `org.typelevel :: jawn-json4s` (discontinued) * `org.typelevel :: jawn-argonaut` (discontinued) ### Patches `jawn-parser-1.3.2` fixes the issue. ### Workarounds Override `objectContext()` to use a collision-safe collection. See [the patch](https://github.com/typelevel/jawn/pull/390/files) for an example in both `SimpleFacade` and `MutableFacade`. ### References * https://github.com/typelevel/jawn/pull/390 ### Credits * @kag0, for the report and the patch ### For more information If you have any questions or comments about this advisory: * Open an issue in [typelevel/jawn](https://github.com/typelevel/jawn) * E-mail a maintainer: * [@rossabaker](mailto:ross@rossabaker.com)
{'CVE-2022-21653'}
2022-04-19T19:03:19Z
2022-01-06T23:48:35Z
MODERATE
5.9
{'CWE-326', 'CWE-400'}
{'https://github.com/advisories/GHSA-vc89-hccf-rq55', 'https://github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55', 'https://github.com/typelevel/jawn/pull/390', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21653'}
null
GHSA
GHSA-r6fw-8m27-43c9
Command injection in portkiller
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23379'}
2021-05-06T15:53:20Z
2021-05-06T15:53:20Z
HIGH
7.3
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23379', 'https://github.com/indatawetrust/portkiller/blob/f1f1c5076d9c5d60e8dd3930e98d665d8191aa7a/index.js%23L10', 'https://www.npmjs.com/package/portkiller', 'https://github.com/advisories/GHSA-r6fw-8m27-43c9', 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537'}
null
GHSA
GHSA-pvmx-g8h5-cprj
Advanced Content Filter (ACF) vulnerability allowing to execute JavaScript code using malformed HTML
### Affected packages The vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 Advanced Content Filter (ACF) core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.17.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Maurice Dauer ([laytonctf](https://twitter.com/laytonctf)) for recognizing and reporting this vulnerability.
{'CVE-2021-41164'}
2022-04-22T15:40:26Z
2021-11-17T21:55:10Z
HIGH
8.2
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-pvmx-g8h5-cprj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41164', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-xqfj-35wv-m3cr
Null pointer dereference in `StringNGrams`
### Impact An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`: ```python import tensorflow as tf data=tf.constant([''] * 11, shape=[11], dtype=tf.string) splits = [0]*115 splits.append(3) data_splits=tf.constant(splits, shape=[116], dtype=tf.int64) tf.raw_ops.StringNGrams(data=data, data_splits=data_splits, separator=b'Ss', ngram_widths=[7,6,11], left_pad='ABCDE', right_pad=b'ZYXWVU', pad_width=50, preserve_short_sequences=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L67-L74) does not fully validate the `data_splits` argument. This would result in [`ngrams_data`](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L106-L110) to be a null pointer when the output would be computed to have 0 or negative size. Later writes to the output tensor would then cause a null pointer dereference. ### Patches We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29541'}
2021-05-21T17:07:00Z
2021-05-21T14:23:12Z
LOW
2.5
{'CWE-476'}
{'https://github.com/advisories/GHSA-xqfj-35wv-m3cr', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29541'}
null
GHSA
GHSA-pcwq-7wrw-r8jv
Cross-site Scripting in intelliants/subrion
Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.
{'CVE-2020-18325'}
2022-03-17T21:38:56Z
2022-03-05T00:00:45Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18325', 'https://github.com/hamm0nz/CVE-2020-18325', 'https://github.com/advisories/GHSA-pcwq-7wrw-r8jv'}
null
GHSA
GHSA-5h5r-23r4-m87h
Cross-Site Scripting in gitbook
Affected versions of `gitbook` do not properly sanitize user input outside of backticks, which may result in cross-site scripting in the online reader. ## Recommendation Update to version 3.2.2 or later.
{'CVE-2017-16019'}
2021-01-07T23:32:51Z
2020-09-01T16:04:39Z
LOW
0
{'CWE-79'}
{'https://github.com/GitbookIO/gitbook/issues/1609', 'https://nodesecurity.io/advisories/159', 'https://github.com/advisories/GHSA-5h5r-23r4-m87h', 'https://www.npmjs.com/advisories/159', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16019'}
null
GHSA
GHSA-39vw-qp34-rmwf
Uncontrolled recursion leads to abort in deserialization
Affected versions of this crate did not properly check for recursion while deserializing aliases. This allows an attacker to make a YAML file with an alias referring to itself causing an abort. The flaw was corrected by checking the recursion depth.
null
2021-08-25T21:00:18Z
2021-08-25T21:00:18Z
MODERATE
0
{'CWE-674'}
{'https://github.com/dtolnay/serde-yaml/pull/105', 'https://github.com/advisories/GHSA-39vw-qp34-rmwf', 'https://rustsec.org/advisories/RUSTSEC-2018-0005.html'}
null
GHSA
GHSA-63rq-p8fp-524q
Potential API key leak
If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel. This is patched in v1.2.4
null
2021-04-13T15:12:06Z
2021-04-13T15:12:06Z
MODERATE
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-63rq-p8fp-524q', 'https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q'}
null
GHSA
GHSA-jf2m-435m-mxw8
High severity vulnerability that affects org.apache.hive:hive-jdbc
This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.
{'CVE-2018-1282'}
2021-09-14T19:39:53Z
2018-11-21T22:24:34Z
CRITICAL
9.1
{'CWE-89'}
{'https://lists.apache.org/thread.html/74bd2bff1827febb348dfb323986fa340d3bb97a315ab93c3ccc8299@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1282', 'https://github.com/advisories/GHSA-jf2m-435m-mxw8', 'http://www.securityfocus.com/bid/103751'}
null
GHSA
GHSA-6vx5-cg2p-7g5v
Unrestricted Upload of File with Dangerous Type in microweber
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0912'}
2022-03-22T21:37:49Z
2022-03-12T00:00:35Z
MODERATE
4.8
{'CWE-434'}
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://github.com/advisories/GHSA-6vx5-cg2p-7g5v'}
null
GHSA
GHSA-hpf7-4c2g-9chf
Remote Code Execution in Halibut
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
{'CVE-2021-31819'}
2021-09-30T18:36:14Z
2021-09-23T23:17:07Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31819', 'https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html', 'https://github.com/advisories/GHSA-hpf7-4c2g-9chf'}
null
GHSA
GHSA-ccw5-7vfh-p5hm
Directory Traversal in dmmcquay.lab6
Affected versions of `dmmcquay.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16208'}
2021-01-14T17:26:11Z
2020-09-01T18:14:15Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/426', 'https://nodesecurity.io/advisories/426', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6', 'https://github.com/advisories/GHSA-ccw5-7vfh-p5hm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16208'}
null
GHSA
GHSA-fjqr-fx3f-g4rv
Electron protocol handler browser vulnerable to Command Injection
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
{'CVE-2018-1000118'}
2022-04-26T14:35:23Z
2018-03-26T16:41:20Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118', 'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7', 'https://electronjs.org/releases#1.8.2-beta.5'}
null
GHSA
GHSA-3p8f-j2vw-7hw9
Hijacked Environment Variables in mssql-node
The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this module is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16059'}
2021-01-08T20:00:33Z
2018-11-09T17:43:44Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/480', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059', 'https://www.npmjs.com/advisories/480', 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9'}
null
GHSA
GHSA-v7q4-97x4-4qw2
Use of Uninitialized Resource in truetype
An issue was discovered in the truetype crate before 0.30.1 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation within Tape::take_bytes.
{'CVE-2021-28030'}
2021-08-25T20:51:58Z
2021-08-25T20:51:58Z
HIGH
7.5
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28030', 'https://rustsec.org/advisories/RUSTSEC-2021-0029.html', 'https://github.com/advisories/GHSA-v7q4-97x4-4qw2', 'https://github.com/bodoni/truetype/issues/11'}
null
GHSA
GHSA-x5x2-mfc7-r22f
Directory Traversal in picard
Affected versions of `picard` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16194'}
2021-01-08T00:44:25Z
2018-07-23T20:40:20Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16194', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard', 'https://www.npmjs.com/advisories/436', 'https://nodesecurity.io/advisories/436', 'https://github.com/advisories/GHSA-x5x2-mfc7-r22f'}
null
GHSA
GHSA-rg32-m3hf-772v
Deserialization of Untrusted Data in Slanger
Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3.
{'CVE-2019-1010306'}
2021-05-11T15:51:16Z
2019-07-16T00:41:40Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://github.com/advisories/GHSA-rg32-m3hf-772v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'}
null
GHSA
GHSA-fr6q-jv7j-35g3
Path Traversal in w-zip
Path Traversal in NPM w-zip prior to 1.0.12.
{'CVE-2022-0401'}
2022-02-10T23:41:29Z
2022-02-02T00:01:46Z
CRITICAL
9.8
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0401', 'https://github.com/advisories/GHSA-fr6q-jv7j-35g3', 'https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d', 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'}
null
GHSA
GHSA-jc43-qrrp-98f5
Insert tag injection in the Contao login module
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. It is possible to inject insert tags into the login module which will be replaced when the page is rendered. It is recommended to update to Contao 4.8.6. There are currently no known workarounds at this time.
{'CVE-2019-19714'}
2022-05-05T16:47:16Z
2019-12-17T22:53:40Z
MODERATE
5.3
{'CWE-116'}
{'https://github.com/advisories/GHSA-jc43-qrrp-98f5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714', 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html', 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5', 'https://contao.org/en/news.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19714.yaml'}
null
GHSA
GHSA-3wh2-2pp3-2823
Malicious Package in simple-alipay
Version 1.0.1 of `simple-alipay` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.1 of this module is found installed you will want to replace it with a version before or after 1.0.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T20:35:18Z
2020-09-01T20:35:18Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-3wh2-2pp3-2823', 'https://www.npmjs.com/advisories/637'}
null
GHSA
GHSA-j77q-2qqg-6989
High severity vulnerability that affects org.apache.struts:struts2-core
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
{'CVE-2017-5638'}
2021-06-10T23:23:12Z
2018-10-18T19:24:26Z
CRITICAL
10
{'CWE-20'}
{'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us', 'http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/', 'https://cwiki.apache.org/confluence/display/WW/S2-045', 'https://support.lenovo.com/us/en/product_security/len-14200', 'https://github.com/advisories/GHSA-j77q-2qqg-6989', 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228', 'https://exploit-db.com/exploits/41570', 'https://www.symantec.com/security-center/network-protection-security-advisories/SA145', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.exploit-db.com/exploits/41614/', 'https://twitter.com/theog150/status/841146956135124993', 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_us', 'https://github.com/rapid7/metasploit-framework/issues/8064', 'https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/', 'https://struts.apache.org/docs/s2-046.html', 'http://www.securityfocus.com/bid/96729', 'https://cwiki.apache.org/confluence/display/WW/S2-046', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt', 'https://security.netapp.com/advisory/ntap-20170310-0001/', 'http://www.securitytracker.com/id/1037973', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5638', 'https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_us', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://www.kb.cert.org/vuls/id/834067', 'http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html', 'https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html', 'http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html', 'https://github.com/mazen160/struts-pwn', 'https://struts.apache.org/docs/s2-045.html', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://isc.sans.edu/diary/22169'}
null
GHSA
GHSA-pf38-cw3p-22q9
Keycloak is vulnerable to IDN homograph attack
A flaw was found in keycloak as shipped in Red Hat Single Sign-On 7.4 where IDN homograph attacks are possible. A malicious user can register himself with a name already registered and trick admin to grant him extra privileges.
{'CVE-2021-3424'}
2022-04-28T21:00:22Z
2022-04-28T21:00:21Z
MODERATE
5.3
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3424', 'https://bugzilla.redhat.com/show_bug.cgi?id=1933320', 'https://github.com/advisories/GHSA-pf38-cw3p-22q9'}
null
GHSA
GHSA-374m-jm66-3vj8
Heap OOB in `SparseBinCount`
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB: ```python import tensorflow as tf tf.raw_ops.SparseBincount( indices=[[0],[1],[2]] values=[0,-10000000] dense_shape=[1,1] size=[1] weights=[3,2,1] binary_output=False) ``` This is because of missing validation between the elements of the `values` argument and the shape of the sparse output: ```cc for (int64_t i = 0; i < indices_mat.dimension(0); ++i) { const int64_t batch = indices_mat(i, 0); const Tidx bin = values(i); ... out(batch, bin) = ...; } ``` ### Patches We have patched the issue in GitHub commit [f410212e373eb2aec4c9e60bf3702eba99a38aba](https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41226'}
2021-11-10T18:41:47Z
2021-11-10T18:41:47Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba', 'https://github.com/advisories/GHSA-374m-jm66-3vj8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41226', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'}
null
GHSA
GHSA-gfp2-w5jm-955q
OMERO.web exposes some unnecessary session information in the page
### Background OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release. ### Impact OMERO.web before 5.9.0 ### Patches 5.9.0 ### Workarounds No workaround ### References ### For more information If you have any questions or comments about this advisory: * Open an issue in [omero-web](https://github.com/ome/omero-web) * Email us at [security](mailto:security@openmicroscopy.org.uk)
{'CVE-2021-21376'}
2021-03-29T17:30:03Z
2021-03-23T15:26:34Z
MODERATE
0
{'CWE-200'}
{'https://www.openmicroscopy.org/security/advisories/2021-SV1/', 'https://github.com/advisories/GHSA-gfp2-w5jm-955q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21376', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}
null
GHSA
GHSA-8h2f-7jc4-7m3m
Open Redirect in urijs
urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613.
{'CVE-2022-0868'}
2022-03-14T21:10:49Z
2022-03-07T00:00:40Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-8h2f-7jc4-7m3m', 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509', 'https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02', 'https://github.com/medialize/URI.js/releases/tag/v1.19.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868'}
null
GHSA
GHSA-qjhr-c23f-w76q
Inline JS XSS vulnerability in Mautic
### Impact Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form. ### Patches Upgrade to 2.12.0 or later. ### Workarounds None ### References https://github.com/mautic/mautic/releases/tag/2.12.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2017-1000488'}
2022-04-19T19:02:44Z
2021-01-19T21:16:24Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-qjhr-c23f-w76q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}
null
GHSA
GHSA-5557-j87h-cvf4
Missing Authorization in jenkins xray-connector
Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
{'CVE-2021-21653'}
2021-06-16T17:29:26Z
2021-06-16T17:29:26Z
MODERATE
4.3
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21653', 'https://github.com/advisories/GHSA-5557-j87h-cvf4', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(2)'}
null
GHSA
GHSA-9crf-c6qr-r273
Integer division by 0 in `tf.raw_ops.AllToAll`
### Impact The [shape inference code for `AllToAll`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/tpu_cross_replica_ops.cc#L25-L74) can be made to execute a division by 0: ```python import tensorflow as tf @tf.function def func(): return tf.raw_ops.AllToAll( input=[0.0, 0.1652, 0.6543], group_assignment=[1, -1], concat_dimension=0, split_dimension=0, split_count=0) func() ``` This occurs whenever the `split_count` argument is 0: ```cc TF_RETURN_IF_ERROR(c->GetAttr("split_count", &split_count)); ... for (int32_t i = 0; i < rank; ++i) { ... dims[i] = c->MakeDim(c->Value(dims[i]) / split_count); ... } ``` ### Patches We have patched the issue in GitHub commit [a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc](https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41218'}
2021-11-10T18:52:24Z
2021-11-10T18:52:24Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41218', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
null
GHSA
GHSA-p93v-m2r2-4387
Denial of service via insufficient metadata validation
The PAM module for `fscrypt` through v0.3.2 doesn't adequately validate `fscrypt` metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a `fscrypt` metadata file that prevents other users from logging into the system. We recommend upgrading to v0.3.3 or above. For more details, see [CVE-2022-25327](https://www.cve.org/CVERecord?id=CVE-2022-25327).
null
2022-04-19T19:03:25Z
2022-03-01T21:05:01Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-p93v-m2r2-4387', 'https://github.com/google/fscrypt/security/advisories/GHSA-p93v-m2r2-4387'}
null
GHSA
GHSA-jfgq-g48x-jq83
Downloads Resources over HTTP in iedriver
Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`. ## Recommendation Update to iedriver version 3.0.0 or greater.
{'CVE-2016-10562'}
2021-01-08T18:35:19Z
2019-02-18T23:54:20Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-jfgq-g48x-jq83', 'https://nodesecurity.io/advisories/174', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562', 'https://www.npmjs.com/advisories/174'}
null
GHSA
GHSA-4cx9-7xqc-2jxm
Reflected cross-site scripting in francoisjacquet/rosariosis
Reflected Cross-Site Scripting vulnerability in Modules.php in RosarioSIS Student Information System < 6.5.1 allows remote attackers to execute arbitrary web script via embedding javascript or HTML tags in a GET request.
{'CVE-2020-13278'}
2021-05-06T18:54:48Z
2021-05-06T18:54:48Z
MODERATE
6.1
{'CWE-79'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/issues/282', 'https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13278.json', 'https://github.com/advisories/GHSA-4cx9-7xqc-2jxm', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/9cb4fec5fe177f1d3716708b46d1958eac477ebe', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13278'}
null
GHSA
GHSA-hpw7-3vq3-mmv6
Insecure deserialization in Wire
Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end. **This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019** This also applies to the fork of Wire, AkkaDotNet/Hyperion.
{'CVE-2021-29508'}
2021-05-19T23:02:38Z
2021-05-19T23:02:38Z
CRITICAL
9.1
{'CWE-502'}
{'https://www.nuget.org/packages/Wire/', 'https://github.com/advisories/GHSA-hpw7-3vq3-mmv6', 'https://github.com/AsynkronIT/Wire/security/advisories/GHSA-hpw7-3vq3-mmv6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29508'}
null
GHSA
GHSA-jpxj-vgq5-prjc
OS command execution vulnerability in Docker Commons Plugin
Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
{'CVE-2022-20617'}
2022-04-29T04:27:22Z
2022-01-13T00:01:03Z
HIGH
0
{'CWE-78'}
{'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20617', 'https://github.com/advisories/GHSA-jpxj-vgq5-prjc', 'https://plugins.jenkins.io/docker-commons', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'}
null
GHSA
GHSA-8p52-7cxv-6c95
Downloads Resources over HTTP in curses
Affected versions of `curses` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `curses`. ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10615'}
2021-01-08T19:08:25Z
2019-02-18T23:56:47Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/215', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10615', 'https://github.com/advisories/GHSA-8p52-7cxv-6c95', 'https://www.npmjs.com/advisories/215'}
null
GHSA
GHSA-v542-8q9x-cffc
Exposure of Sensitive Information to an Unauthorized Actor
Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0.
{'CVE-2020-35681'}
2021-03-19T21:29:02Z
2021-03-19T21:29:02Z
HIGH
7.4
{'CWE-200'}
{'https://channels.readthedocs.io/en/stable/releases/index.html', 'https://github.com/advisories/GHSA-v542-8q9x-cffc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35681', 'https://github.com/django/channels/releases', 'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022', 'https://channels.readthedocs.io/en/stable/releases/3.0.3.html'}
null
GHSA
GHSA-xv69-f7x5-r4qw
Cross-Site Scripting via Attribute Set Name
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into the attribute set name when listing the products.
{'CVE-2019-8145'}
2021-08-18T22:18:30Z
2019-11-12T22:59:43Z
MODERATE
5.4
{'CWE-79'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/advisories/GHSA-xv69-f7x5-r4qw', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8145.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8145'}
null
GHSA
GHSA-pf8f-w267-mq2h
The rack-cors rubygem may allow directory traveral
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
{'CVE-2019-18978'}
2021-08-18T22:30:22Z
2019-11-15T20:26:59Z
MODERATE
5.3
{'CWE-22'}
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://usn.ubuntu.com/4571-1/', 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html', 'https://github.com/advisories/GHSA-pf8f-w267-mq2h', 'https://www.debian.org/security/2021/dsa-4918', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978'}
null
GHSA
GHSA-9px9-73fg-3fqp
Null pointer dereference in Grappler's `IsConstant`
### Impact Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place): First, during [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497), the `GraphDef` might not have the required nodes for the binary operation: ```cc NodeDef* mul_left_child = node_map_->GetNode(node->input(0)); NodeDef* mul_right_child = node_map_->GetNode(node->input(1)); // One child must be constant, and the second must be Conv op. const bool left_child_is_constant = IsReallyConstant(*mul_left_child); const bool right_child_is_constant = IsReallyConstant(*mul_right_child); ``` If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect. We have a similar issue during [`IsIdentityConsumingSwitch`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74): ```cc NodeDef* input_node = graph.GetNode(tensor_id.node()); return IsSwitch(*input_node); ``` ### Patches We have patched the issue in GitHub commits [0a365c029e437be0349c31f8d4c9926b69fa3fa1](https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1) and [045deec1cbdebb27d817008ad5df94d96a08b1bf](https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23589'}
2022-02-11T20:00:55Z
2022-02-09T23:29:14Z
MODERATE
6.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23589', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1', 'https://github.com/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74', 'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf'}
null
GHSA
GHSA-76qf-6mvw-c5hm
Malicious Package in js-base64-int
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:16:46Z
2020-09-03T19:45:42Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-76qf-6mvw-c5hm', 'https://www.npmjs.com/advisories/1128'}
null
GHSA
GHSA-4p8f-mmfj-r45g
Cross-site scripting in fat_free_crm
Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb.
{'CVE-2018-20975'}
2021-08-17T21:11:19Z
2019-08-21T16:15:04Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1', 'https://github.com/advisories/GHSA-4p8f-mmfj-r45g', 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'}
null
GHSA
GHSA-856x-cp3q-47vg
Insecure Default Configuration in airbrake
Affected versions of `airbrake` default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information. ## Recommendation Update to version 0.4.0 or later, or upgrade from the now-deprecated `airbrake` module to its replacement, [`airbrake-js`](https://www.npmjs.com/package/airbrake-js).
{'CVE-2016-10530'}
2021-01-08T19:11:59Z
2019-02-18T23:58:13Z
MODERATE
0
{'CWE-200'}
{'https://github.com/airbrake/node-airbrake/issues/70', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10530', 'https://www.npmjs.com/advisories/96', 'https://github.com/advisories/GHSA-856x-cp3q-47vg', 'https://nodesecurity.io/advisories/96'}
null
GHSA
GHSA-qw5h-7f53-xrp6
Stack overflow in `ParseAttrValue` with nested tensors
### Impact The implementation of [`ParseAttrValue`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input. ### Patches We have patched the issue in GitHub commit [e07e1c3d26492c06f078c7e5bf2d138043e199c1](https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-29615'}
2021-05-21T14:28:45Z
2021-05-21T14:28:45Z
LOW
2.5
{'CWE-674'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29615', 'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6', 'https://github.com/advisories/GHSA-qw5h-7f53-xrp6'}
null
GHSA
GHSA-86ch-6w7v-v6xf
Denial of Service in soketi
### Impact _What kind of vulnerability is it? Who is impacted?_ There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simply just crash the server for trying to send a response after the request closed. All users that run the server are affected by it and it's highly recommended to upgrade to the latest patch. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Updating to at least 0.24.1 or the latest version. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No. Upgrading is the only solution. ### References _Are there any links users can visit to find out more?_ https://github.com/soketi/soketi/releases/tag/0.24.1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issues board](https://github.com/soketi/soketi/issues) * Email us at [alex@renoki.org](mailto:alex@renoki.org)
{'CVE-2022-21667'}
2022-01-18T22:37:18Z
2022-01-08T00:24:44Z
HIGH
7.5
{'CWE-755'}
{'https://github.com/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/releases/tag/0.24.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667', 'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'}
null
GHSA
GHSA-48w2-rm65-62xx
Inconsistent Interpretation of HTTP Requests in puma
### Impact Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. ### Patches This vulnerability was patched in Puma 5.5.1 and 4.3.9. ### Workarounds This vulnerability only affects Puma installations without any proxy in front. Use a proxy which does not forward LF characters as line endings. Proxies which do not forward LF characters as line endings: * Nginx * Apache (>2.4.25) * Haproxy * Caddy * Traefik ### Possible Breakage If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error. ### References * [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling) ### For more information If you have any questions or comments about this advisory: * Open an issue in [Puma](https://github.com/puma/puma) * See our [security policy](https://github.com/puma/puma/security/policy)
{'CVE-2021-41136'}
2022-04-19T19:03:12Z
2021-10-12T17:53:00Z
LOW
3.7
{'CWE-444'}
{'https://github.com/puma/puma/releases/tag/v5.5.1', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}
null
GHSA
GHSA-6g87-ff9q-v847
High severity vulnerability that affects websockets
The Python websockets library version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appears to be exploitable via sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in version 5.0
{'CVE-2018-1000518'}
2022-04-19T19:03:25Z
2018-09-17T20:46:52Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/aaugustin/websockets/pull/407', 'https://github.com/advisories/GHSA-6g87-ff9q-v847', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000518'}
null
GHSA
GHSA-8rc5-hx3v-2jg7
Sanitizer bypass in svg-sanitizer
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
{'CVE-2019-10772'}
2021-08-19T19:25:07Z
2020-02-27T20:36:29Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9', 'https://github.com/advisories/GHSA-8rc5-hx3v-2jg7'}
null
GHSA
GHSA-2x83-r56g-cv47
High severity vulnerability that affects org.apache.httpcomponents:httpclient
http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.
{'CVE-2012-6153'}
2021-08-31T20:19:25Z
2018-10-17T00:05:15Z
HIGH
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-2x83-r56g-cv47', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6153', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://rhn.redhat.com/errata/RHSA-2015-0125.html', 'http://rhn.redhat.com/errata/RHSA-2014-1892.html', 'http://rhn.redhat.com/errata/RHSA-2014-1834.html', 'http://rhn.redhat.com/errata/RHSA-2014-1098.html', 'http://rhn.redhat.com/errata/RHSA-2015-0720.html', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'http://svn.apache.org/viewvc?view=revision&revision=1411705', 'http://www.securityfocus.com/bid/69257', 'http://www.ubuntu.com/usn/USN-2769-1', 'http://rhn.redhat.com/errata/RHSA-2014-1891.html', 'http://rhn.redhat.com/errata/RHSA-2014-1835.html', 'http://rhn.redhat.com/errata/RHSA-2014-1833.html', 'http://rhn.redhat.com/errata/RHSA-2014-1836.html', 'http://rhn.redhat.com/errata/RHSA-2015-1888.html', 'http://rhn.redhat.com/errata/RHSA-2015-0765.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564', 'http://rhn.redhat.com/errata/RHSA-2015-0158.html', 'https://access.redhat.com/solutions/1165533', 'https://bugzilla.redhat.com/show_bug.cgi?id=1129916'}
null
GHSA
GHSA-wfhx-6pcm-7m55
Path Traversal in ponse
Versions of `ponse` prior to 2.0.2 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 2.0.2 or later.
null
2021-09-28T17:04:50Z
2020-09-03T16:46:22Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/383112', 'https://www.npmjs.com/advisories/1002', 'https://github.com/advisories/GHSA-wfhx-6pcm-7m55'}
null
GHSA
GHSA-6g88-99wj-8mgg
Command injection in Apache Flink
A vulnerability in Apache Flink where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.
{'CVE-2020-1960'}
2021-05-21T19:20:35Z
2021-05-21T19:20:35Z
MODERATE
4.7
{'CWE-74'}
{'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r23e559dee1e69741557b5fe431846de1f1a5981356d0ddb9482df88a%40%3Cdev.flink.apache.org%3E', 'https://github.com/advisories/GHSA-6g88-99wj-8mgg', 'https://lists.apache.org/thread.html/r663cf0d5c386bba2f562d45ad484d786151a84f0b95e45e2b0fb8e50@%3Cissues.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1960'}
null
GHSA
GHSA-ff29-f57w-2mm3
Downloads Resources over HTTP in geoip-lite-country
Affected versions of `geoip-lite-country` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 1.1.4 or later.
{'CVE-2016-10568'}
2021-01-08T18:53:26Z
2019-02-18T23:54:03Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10568', 'https://nodesecurity.io/advisories/183', 'https://www.npmjs.com/advisories/183', 'https://github.com/advisories/GHSA-ff29-f57w-2mm3'}
null
GHSA
GHSA-c538-924g-99q4
Session Fixation in Apache Zeppelin
Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session. Issue was reported by "stone lone".
{'CVE-2017-12619'}
2021-08-03T18:51:25Z
2019-04-24T16:06:59Z
HIGH
8.1
{'CWE-384'}
{'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://zeppelin.apache.org/releases/zeppelin-release-0.7.3.html', 'https://github.com/advisories/GHSA-c538-924g-99q4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12619'}
null
GHSA
GHSA-6mcm-j9cj-3vc3
Infinite loop in Apache MINA
In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.
{'CVE-2021-41973'}
2022-05-02T22:29:14Z
2021-11-03T17:30:35Z
MODERATE
6.5
{'CWE-835'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2021/11/01/2', 'https://github.com/advisories/GHSA-6mcm-j9cj-3vc3', 'https://lists.apache.org/thread.html/r0b907da9340d5ff4e6c1a4798ef4e79700a668657f27cca8a39e9250%40%3Cdev.mina.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41973', 'http://www.openwall.com/lists/oss-security/2021/11/01/8'}
null
GHSA
GHSA-h2x7-2ff6-v32p
Incorrect routing of some HTTP requests when using httpauth
### Impact Incorrect routing of some HTTP requests when using httpauth ### Patches Upgrade to version 0.7.2 for fix ### Workarounds None ### References None ### For more information If you have any questions or comments about this advisory: * Email us at [nbosscher@blue-giraffe.ca](mailto:nbosscher@blue-giraffe.ca)
null
2022-02-11T23:39:57Z
2022-02-11T23:39:57Z
HIGH
0
null
{'https://github.com/advisories/GHSA-h2x7-2ff6-v32p', 'https://github.com/ntbosscher/gobase/security/advisories/GHSA-h2x7-2ff6-v32p'}
null
GHSA
GHSA-9qrh-qjmc-5w2p
Denial-of-Service when binding invalid parameters in sqlite3
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
{'CVE-2022-21227'}
2022-05-03T02:24:26Z
2022-04-28T20:25:23Z
HIGH
7.5
{'CWE-248'}
{'https://github.com/TryGhost/node-sqlite3/issues/1449', 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p', 'https://github.com/TryGhost/node-sqlite3/issues/1440', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470', 'https://github.com/advisories/GHSA-9qrh-qjmc-5w2p', 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'}
null
GHSA
GHSA-cjjc-xp8v-855w
Panic in malformed cerftificate
The Helm core maintainers have identified a high severity security vulnerability in Go's `crypto` package affecting all versions prior to Helm 2.16.8 and Helm 3.1.0. Thanks to @ravin9249 for identifying the vulnerability. ### Impact Go before 1.12.16 and 1.13.x before 1.13.7 (and the `crypto/cryptobyte` package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients resulting in a panic via a malformed X.509 certificate. This may allow a remote attacker to cause a denial of service. ### Patches A patch to compile Helm against Go 1.14.4 has been provided for Helm 2 and is available in Helm 2.16.8. Helm 3.1.0 and newer are compiled against Go 1.13.7+. ### Workarounds No workaround is available. Users are urged to upgrade. ### References - https://nvd.nist.gov/vuln/detail/CVE-2020-7919 - https://github.com/helm/helm/pull/8288 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Helm repository](https://github.com/helm/helm/issues) * For security-specific issues, email us at <cncf-helm-security@lists.cncf.io>
{'CVE-2020-7919'}
2021-10-06T21:23:32Z
2021-06-23T18:02:39Z
HIGH
7.5
{'CWE-295'}
{'https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470', 'https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7919', 'https://groups.google.com/forum/#!forum/golang-announce', 'https://www.debian.org/security/2021/dsa-4848', 'https://github.com/advisories/GHSA-cjjc-xp8v-855w', 'https://security.netapp.com/advisory/ntap-20200327-0001/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/', 'https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA'}
null
GHSA
GHSA-3448-vfvv-xp9g
Moderate severity vulnerability that affects org.apache.tika:tika-core
A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.
{'CVE-2018-17197'}
2021-08-31T20:38:49Z
2018-12-26T17:45:07Z
MODERATE
6.5
{'CWE-835'}
{'http://www.securityfocus.com/bid/106293', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-3448-vfvv-xp9g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17197', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3@%3Cdev.tika.apache.org%3E'}
null
GHSA
GHSA-wqh4-27cc-j8f2
Hijacked Environment Variables in nodeffmpeg
The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16069'}
2021-01-08T01:31:53Z
2018-08-29T23:36:48Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/508', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069', 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2', 'https://www.npmjs.com/advisories/508'}
null
GHSA
GHSA-7fm6-gxqg-2pwr
Code Injection in total.js
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
{'CVE-2021-23389'}
2021-12-10T17:26:06Z
2021-12-10T17:26:06Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/advisories/GHSA-7fm6-gxqg-2pwr', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}
null
GHSA
GHSA-qpqh-46qj-vwcw
Cross-site Scripting in docsify
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
{'CVE-2020-7680'}
2021-05-18T01:53:18Z
2021-05-18T01:53:18Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7680', 'https://github.com/advisories/GHSA-qpqh-46qj-vwcw', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099', 'https://github.com/docsifyjs/docsify/pull/1128', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'https://github.com/docsifyjs/docsify/issues/1126', 'http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html'}
null
GHSA
GHSA-5hr6-vc97-qxxh
XML Injection in Crafter CMS Crafter Studio 3.0.1
Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.
{'CVE-2017-15685'}
2022-02-09T23:08:01Z
2022-02-09T23:08:01Z
HIGH
8.6
{'CWE-91'}
{'https://github.com/advisories/GHSA-5hr6-vc97-qxxh', 'https://docs.craftercms.org/en/3.0/security/advisory.html', 'http://crafter.com', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15685'}
null
GHSA
GHSA-v7x3-7hw7-pcjg
Moderate severity vulnerability that affects renovate
## Go Modules Vulnerability Disclosure ### Impact Temporary repository tokens were leaked into Pull Requests comments in during certain Go Modules update failure scenarios. ### Patches The problem has been patched. Self-hosted users should upgrade to v19.38.7 or later. ### Workarounds Disable Go Modules support. ### References Blog post: https://renovatebot.com/blog/go-modules-vulnerability-disclosure ### For more information If you have any questions or comments about this advisory: * Open an issue in [Renovate](http://github.com/renovatebot/renovate) * Email us at [support@renovatebot.com](mailto:support@renovatebot.com)
null
2021-09-20T21:11:51Z
2019-10-21T16:02:33Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/renovatebot/renovate/security/advisories/GHSA-v7x3-7hw7-pcjg', 'https://github.com/advisories/GHSA-v7x3-7hw7-pcjg', 'https://snyk.io/vuln/SNYK-JS-RENOVATE-536203'}
null
GHSA
GHSA-9c2p-jw8p-f84v
SQL Injection in sequelize
Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability. ## Proof of Concept In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. Example Query: ``` database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { replacements: { names: directCopyOfUserInput } }); ``` If the user inputs the value of `:names` as: ``` ["test", "'); DELETE TestTable WHERE Id = 1 --')"] ``` The resulting SQL statement will be: ``` SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --') ``` As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1. ## Recommendation Update to version 3.20.0 or later.
{'CVE-2016-10556'}
2021-01-08T20:57:38Z
2019-02-18T23:54:24Z
CRITICAL
0
{'CWE-89'}
{'https://github.com/advisories/GHSA-9c2p-jw8p-f84v', 'https://www.npmjs.com/advisories/102', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556', 'https://nodesecurity.io/advisories/102', 'https://github.com/sequelize/sequelize/issues/5671'}
null
GHSA
GHSA-q44v-xc3g-v7jq
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of &colon; to construct a javascript: URL.
{'CVE-2017-14735'}
2021-06-15T16:36:26Z
2018-10-18T17:22:11Z
MODERATE
6.1
{'CWE-79'}
{'http://www.securityfocus.com/bid/105656', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://github.com/advisories/GHSA-q44v-xc3g-v7jq', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://github.com/nahsra/antisamy/issues/10', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14735', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-h5mp-5q4p-ggf5
Prototype Pollution in lodash.defaultsdeep
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2021-09-28T22:42:31Z
2020-09-03T18:07:05Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1068', 'https://github.com/advisories/GHSA-h5mp-5q4p-ggf5'}
null
GHSA
GHSA-f5cf-f7px-xpmh
Moderate severity vulnerability that affects org.apache.qpid:proton-j
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors.
{'CVE-2016-2166'}
2021-09-09T21:40:13Z
2018-10-16T19:50:27Z
MODERATE
6.5
{'CWE-200'}
{'http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2166', 'http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html', 'https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-f5cf-f7px-xpmh', 'https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585', 'https://issues.apache.org/jira/browse/PROTON-1157', 'http://www.securityfocus.com/archive/1/537864/100/0/threaded'}
null
GHSA
GHSA-776r-w3v9-96mv
Directory Traversal in censorify.tanisjr
Affected versions of `censorify.tanisjr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16157'}
2021-01-08T21:05:51Z
2018-07-23T20:46:16Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-776r-w3v9-96mv', 'https://nodesecurity.io/advisories/392', 'https://www.npmjs.com/advisories/392', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16157', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr'}
null
GHSA
GHSA-35mm-cc6r-8fjp
Cross-site scripting in actionpack
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
{'CVE-2020-8264'}
2021-04-07T20:58:47Z
2021-04-07T20:58:47Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8264', 'https://github.com/advisories/GHSA-35mm-cc6r-8fjp', 'https://hackerone.com/reports/904059', 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ'}
null
GHSA
GHSA-j7m2-58wv-9v79
Vulnerability in Torpedo Query
Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java.
{'CVE-2019-11343'}
2022-02-10T20:47:29Z
2022-02-10T20:47:29Z
CRITICAL
9.8
null
{'https://github.com/xjodoin/torpedoquery/compare/v2.5.2...v2.5.3', 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f', 'https://github.com/advisories/GHSA-j7m2-58wv-9v79', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343'}
null
GHSA
GHSA-2hxv-mx8x-mcj9
Spina vulnerable to a cross-site request forgery (CSRF) vulnerability
Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75.
{'CVE-2015-4619'}
2022-04-26T18:26:09Z
2018-08-28T22:34:22Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75', 'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'http://www.securityfocus.com/bid/75216'}
null
GHSA
GHSA-w5m2-299g-rff5
Page Compare Reflected Cross-site Scripting (XSS) vulnerability
### Impact ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in `/apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful. ### Patches This issue has been resolved in 5.2.0. ### Workarounds None ### References N/A ### For more information If you have any questions or comments about this advisory open an issue in acs-aem-commons. ### Credit This issue was discovered and reported by Black Lantern Security. https://hackerone.com/reports/1466020
{'CVE-2022-28820'}
2022-04-26T12:59:01Z
2022-04-26T12:59:00Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28820', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5', 'https://github.com/advisories/GHSA-w5m2-299g-rff5'}
null
GHSA
GHSA-29fh-xcjr-p7rx
Malicious Package in web3-eht
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T19:10:03Z
2020-09-03T17:02:22Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-29fh-xcjr-p7rx', 'https://www.npmjs.com/advisories/1416'}
null
GHSA
GHSA-c3m8-x3cg-qm2c
Configuration Override in helmet-csp
Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting. ## Recommendation Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue.
null
2021-09-29T18:45:07Z
2020-09-03T20:39:53Z
MODERATE
6.5
null
{'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436', 'https://www.npmjs.com/advisories/1176', 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a', 'https://github.com/advisories/GHSA-c3m8-x3cg-qm2c'}
null
GHSA
GHSA-m94c-37g6-cjhc
Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.
### Affected packages The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected: * [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) * [Link](https://ckeditor.com/cke4/addon/link) * [Flash](https://ckeditor.com/cke4/addon/flash) * [Iframe](https://ckeditor.com/cke4/addon/iframe) * [Forms](https://ckeditor.com/cke4/addon/forms) * [Page Break](https://ckeditor.com/cke4/addon/pagebreak) ### Impact A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2. ### Patches The problem has been recognized and patched. The fix will be available in version 4.16.2. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability.
{'CVE-2021-37695'}
2022-02-08T21:01:40Z
2021-08-23T19:42:15Z
HIGH
7.3
{'CWE-79'}
{'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37695', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://github.com/advisories/GHSA-m94c-37g6-cjhc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}
null
GHSA
GHSA-xjrr-xv9m-4pw5
High severity vulnerability that affects com.alibaba:fastjson
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
{'CVE-2017-18349'}
2021-09-21T22:35:50Z
2018-10-24T19:42:03Z
CRITICAL
9.8
{'CWE-20'}
{'https://fortiguard.com/encyclopedia/ips/44059', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18349', 'https://github.com/pippo-java/pippo/issues/466', 'https://github.com/alibaba/fastjson/wiki/security_update_20170315', 'https://github.com/advisories/GHSA-xjrr-xv9m-4pw5'}
null
GHSA
GHSA-7q8g-gpfp-v8gx
Insertion of Sensitive Information into Log File in Apache NiFi
In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially containing sensitive values in plaintext.
{'CVE-2020-1942'}
2022-01-06T20:40:58Z
2022-01-06T20:40:58Z
HIGH
7.5
{'CWE-200', 'CWE-532'}
{'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://nifi.apache.org/security.html#CVE-2020-1942', 'https://github.com/advisories/GHSA-7q8g-gpfp-v8gx'}
null
GHSA
GHSA-46j2-xjgp-jrfm
Information disclosure issue in Active Resource
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
{'CVE-2020-8151'}
2021-10-08T19:59:27Z
2020-05-21T21:09:38Z
HIGH
7.5
{'CWE-200', 'CWE-863'}
{'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://github.com/advisories/GHSA-46j2-xjgp-jrfm', 'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8151', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4H22DZ522HLDS3JX3NX2CXIOZSR/'}
null
GHSA
GHSA-x95h-979x-cf3j
Policies not properly enforced in bluemonday
The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements.
{'CVE-2021-42576'}
2021-10-25T20:07:10Z
2021-10-19T20:15:30Z
MODERATE
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-x95h-979x-cf3j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42576', 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}
null
GHSA
GHSA-7f63-h6g3-7cwm
Cross Site Scripting (XSS) in @finastra/ssr-pages
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/2 - https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5 - https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
{'CVE-2022-24717'}
2022-04-19T19:03:25Z
2022-03-01T22:09:25Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5', 'https://github.com/Finastra/ssr-pages/pull/2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717', 'https://github.com/advisories/GHSA-7f63-h6g3-7cwm', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm'}
null
GHSA
GHSA-hrfh-fp4x-crrq
Persistent XSS in newsletter module in Shopware
### Impact Persistent XSS in newsletter module ### Patches We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020
null
2020-11-13T18:26:06Z
2020-11-13T18:26:06Z
LOW
0
{'CWE-79'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020', 'https://github.com/shopware/shopware/security/advisories/GHSA-hrfh-fp4x-crrq', 'https://github.com/advisories/GHSA-hrfh-fp4x-crrq'}
null
GHSA
GHSA-v8wr-r69p-mmwx
Unrestricted Upload of File with Dangerous Type in Drupal core
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
{'CVE-2020-13675'}
2022-02-26T00:24:03Z
2022-02-12T00:00:47Z
CRITICAL
9.8
{'CWE-434', 'CWE-284'}
{'https://www.drupal.org/sa-core-2021-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13675', 'https://github.com/advisories/GHSA-v8wr-r69p-mmwx'}
null
GHSA
GHSA-v588-qcp3-jv46
Path Traversal in serve
Versions of `serve` prior to 7.0.1 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through if the path contains a `/./`, which allows attackers to access hidden folders and files. ## Recommendation Upgrade to version 7.0.1 or later.
{'CVE-2019-5415'}
2021-01-08T01:57:36Z
2019-03-25T18:03:58Z
HIGH
0
{'CWE-548'}
{'https://www.npmjs.com/advisories/1010', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5415', 'https://github.com/advisories/GHSA-v588-qcp3-jv46', 'https://hackerone.com/reports/330724'}
null