ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-m8rp-q82r-c5mf
|
Cross-site Scripting in microweber
|
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0278'}
|
2022-01-27T18:31:49Z
|
2022-01-21T18:06:49Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0278', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7', 'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://github.com/advisories/GHSA-m8rp-q82r-c5mf'}
| null |
GHSA
|
GHSA-qj3v-q2vj-4c8h
|
Calculation error in ark-r1cs-std
|
An issue was discovered in the ark-r1cs-std crate before 0.3.1 for Rust. It does not enforce any constraints in the FieldVar::mul_by_inverse method. Thus, a prover can produce a proof that is unsound but is nonetheless verified.
|
{'CVE-2021-38194'}
|
2021-08-25T20:55:58Z
|
2021-08-25T20:55:58Z
|
CRITICAL
| 9.8
|
{'CWE-682'}
|
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ark-r1cs-std/RUSTSEC-2021-0075.md', 'https://github.com/arkworks-rs/r1cs-std/pull/70', 'https://rustsec.org/advisories/RUSTSEC-2021-0075.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38194', 'https://github.com/advisories/GHSA-qj3v-q2vj-4c8h'}
| null |
GHSA
|
GHSA-93jq-624g-4p9p
|
Moderate severity vulnerability that affects org.asynchttpclient:async-http-client
|
Async Http Client (aka async-http-client) before 2.0.35 can be tricked into connecting to a host different from the one extracted by java.net.URI if a '?' character occurs in a fragment identifier. Similar bugs were previously identified in cURL (CVE-2016-8624) and Oracle Java 8 java.net.URL.
|
{'CVE-2017-14063'}
|
2021-09-07T20:39:25Z
|
2018-10-19T16:50:50Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/rbbad61e1ba5b21e234a6664963618acfee237af754eb20300d938e1e@%3Cissues.tez.apache.org%3E', 'http://openwall.com/lists/oss-security/2017/08/31/4', 'https://lists.apache.org/thread.html/r41a0e2c36f7d1854a4d56cb1e4aa720ef501782d887ece1c9b1e2d60@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rc550b8955b37b40fee18db99f167337c41c930d8c3763b9631e01dda@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfd823a733b02cffbef5a69953fdcbed2d1d0afad5e1ea4e96ff6bf0a@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r7046a51116207588e36ca8c2e291327e391dae40712d267117475a98@%3Cdev.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r0a6b6429a7558051dbb70bd06584b4b1c334a80ec9203d3d39b7045a@%3Ccommits.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r4ebb9596d890f3528630492bd78237b3eef06f093bac238a0da9b630@%3Cissues.tez.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/AsyncHttpClient/async-http-client/issues/1455', 'https://github.com/advisories/GHSA-93jq-624g-4p9p', 'https://lists.apache.org/thread.html/r79d9bab405414af45568c4683386f5e9fd02c10ca87ffa2ee33512dc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r3df4b7ccc363b4850a24842138117aa4451b875bc4773a845b828fc6@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5f794dc07913c5f2ec08f540813b40e61b562d36f8b1f916e8705c56@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r04b15fd898a6b1612153543375daaa8145a0fd1804ec9fa2e0d95c97@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/re7367895ccbf64523efcd39a9181baf2eaa30b069d8d6496852fba56@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r9ea5d489e004b40baf73880c4e11dd4de24b799d15e091e1f4017108@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rbc4fbb06ccb10e26e6064f57f6bd4935eabe2d18a0cb9a7183699396@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5b8666c4414500ff6e993bfa69cb6afa19b1b67c4585a045c0c21662@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r868875e67494a18d31e88cba2672f45c3fc6708ffdde445723004da4@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r14a74d204f285dd3a4fa203de6dbb4e741ddb7fdfff7915590e5b3db@%3Cdev.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfe55d83e4070bcc9285bbbf6bc39635dbcbba6d14d89aab0f339c83a@%3Ccommits.tez.apache.org%3E', 'https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rcb46acc25917e01ebecca132e870da9ab935d5796686ed8a2785b026@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r7879a48644f708be0529bd39f0679ad3ad951f3dc24442878a008fd8@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r5f07c30721503d4c02d5451f77a611a1a0bb2a94ddcdf071c9485ea3@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/r683d78c6d7a15659f2bb82dd4120dab8c45a870eaa7f1a15cce4ed3b@%3Cissues.tez.apache.org%3E', 'https://lists.apache.org/thread.html/re2510852c4a1f635b14b35e5dfd7597076928e723ab08559ede575e0@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14063'}
| null |
GHSA
|
GHSA-46q2-93hm-52p5
|
Directory Traversal in serverlyr
|
Affected versions of `serverlyr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16089'}
|
2021-01-14T15:54:18Z
|
2020-09-01T16:53:37Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/365', 'https://github.com/advisories/GHSA-46q2-93hm-52p5', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr', 'https://www.npmjs.com/advisories/365', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16089'}
| null |
GHSA
|
GHSA-282f-qqgm-c34q
|
Prototype Pollution in node-jsonpointer
|
This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.
|
{'CVE-2021-23807'}
|
2021-11-08T17:44:45Z
|
2021-11-08T17:44:45Z
|
MODERATE
| 5.6
|
{'CWE-843', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23807', 'https://github.com/advisories/GHSA-282f-qqgm-c34q', 'https://github.com/janl/node-jsonpointer/pull/51', 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288'}
| null |
GHSA
|
GHSA-m34j-p8rj-wjxq
|
Division by 0 in `QuantizedBiasAdd`
|
### Impact
An attacker can trigger an integer division by zero undefined behavior in `tf.raw_ops.QuantizedBiasAdd`:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8)
bias = tf.constant([], shape=[0], dtype=tf.quint8)
min_input = tf.constant(-10.0, dtype=tf.float32)
max_input = tf.constant(-10.0, dtype=tf.float32)
min_bias = tf.constant(-10.0, dtype=tf.float32)
max_bias = tf.constant(-10.0, dtype=tf.float32)
tf.raw_ops.QuantizedBiasAdd(input=input_tensor, bias=bias, min_input=min_input,
max_input=max_input, min_bias=min_bias,
max_bias=max_bias, out_type=tf.qint32)
```
This is because the [implementation of the Eigen kernel](https://github.com/tensorflow/tensorflow/blob/61bca8bd5ba8a68b2d97435ddfafcdf2b85672cd/tensorflow/core/kernels/quantization_utils.h#L812-L849) does a division by the number of elements of the smaller input (based on shape) without checking that this is not zero:
```cc
template <typename T1, typename T2, typename T3>
void QuantizedAddUsingEigen(const Eigen::ThreadPoolDevice& device,
const Tensor& input, float input_min,
float input_max, const Tensor& smaller_input,
float smaller_input_min, float smaller_input_max,
Tensor* output, float* output_min,
float* output_max) {
...
const int64 input_element_count = input.NumElements();
const int64 smaller_input_element_count = smaller_input.NumElements();
...
bcast[0] = input_element_count / smaller_input_element_count;
...
}
```
This integral division by 0 is undefined behavior.
### Patches
We have patched the issue in GitHub commit [67784700869470d65d5f2ef20aeb5e97c31673cb](https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29546'}
|
2021-05-21T14:23:28Z
|
2021-05-21T14:23:28Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-m34j-p8rj-wjxq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29546', 'https://github.com/tensorflow/tensorflow/commit/67784700869470d65d5f2ef20aeb5e97c31673cb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m34j-p8rj-wjxq'}
| null |
GHSA
|
GHSA-x3g3-jh26-76cf
|
Cross-site Scripting in livehelperchat
|
LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration.
|
{'CVE-2022-0375'}
|
2022-02-02T16:05:34Z
|
2022-01-28T23:06:00Z
|
MODERATE
| 6.5
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://github.com/advisories/GHSA-x3g3-jh26-76cf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375'}
| null |
GHSA
|
GHSA-j336-34q7-cgj3
|
Downloads Resources over HTTP in healthcenter
|
Affected versions of `healthcenter` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `healthcenter`.
## Recommendation
This package has been deprecated, and moved to a new package on npm: [`appmetrics`](https://npmjs.com/package/appmetrics).
In order to mitigate this vulnerability, please install the `appmetrics` package in place of `healthcenter` via the following commands:
```
npm uninstall healthcenter -s
npm install appmetrics -s
```
|
{'CVE-2016-10684'}
|
2021-01-08T18:38:25Z
|
2019-02-18T23:42:06Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/288', 'https://nodesecurity.io/advisories/288', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10684', 'https://github.com/advisories/GHSA-j336-34q7-cgj3'}
| null |
GHSA
|
GHSA-p3rp-vmj9-gv6v
|
Incorrect sanitisation function leads to `XSS` in mermaid
|
### Impact
Malicious diagrams can contain javascript code that can be run at diagram readers machines.
### Patches
The users should upgrade to version 8.13.8
### Workarounds
You need to upgrade in order to avoid this issue.
|
{'CVE-2021-43861'}
|
2022-01-06T19:45:59Z
|
2022-01-06T19:45:59Z
|
HIGH
| 7.2
|
{'CWE-20', 'CWE-79'}
|
{'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83', 'https://github.com/mermaid-js/mermaid/releases/tag/8.13.8', 'https://github.com/advisories/GHSA-p3rp-vmj9-gv6v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43861', 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v'}
| null |
GHSA
|
GHSA-2j9c-9vmv-7m39
|
Missing anchor in Rack-Cors allows malicious third party site to perform CORS request
|
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.
|
{'CVE-2017-11173'}
|
2022-04-26T18:19:30Z
|
2018-07-31T18:18:39Z
|
HIGH
| 8.8
| null |
{'https://github.com/cyu/rack-cors/commit/42ebe6caa8e85ffa9c8a171bda668ba1acc7a5e6', 'https://github.com/advisories/GHSA-2j9c-9vmv-7m39', 'https://packetstormsecurity.com/files/143345/rack-cors-Missing-Anchor.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11173', 'http://seclists.org/fulldisclosure/2017/Jul/22', 'http://www.debian.org/security/2017/dsa-3931'}
| null |
GHSA
|
GHSA-6hgr-2g6q-3rmc
|
Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19
|
`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- https://vaadin.com/security/cve-2021-31408
| null |
2021-10-08T21:24:02Z
|
2021-04-22T16:11:26Z
|
MODERATE
| 6.3
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-6hgr-2g6q-3rmc', 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}
| null |
GHSA
|
GHSA-fh37-cx83-q542
|
Improper Authentication in Apache Airflow
|
The lineage endpoint of the deprecated Experimental API was not protected by authentication in Airflow 2.0.0. This allowed unauthenticated users to hit that endpoint. This is low-severity issue as the attacker needs to be aware of certain parameters to pass to that endpoint and even after can just get some metadata about a DAG and a Task. This issue only affects Apache Airflow 2.0.0.
|
{'CVE-2021-26697'}
|
2021-06-18T18:30:11Z
|
2021-06-18T18:30:11Z
|
MODERATE
| 5.3
|
{'CWE-287', 'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26697', 'http://www.openwall.com/lists/oss-security/2021/02/17/2', 'https://lists.apache.org/thread.html/r36111262a59219a3e2704c71e97cf84937dae5ba7a1da99499e5d8f9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519%40%3Cusers.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cdev.airflow.apache.org%3E', 'https://lists.apache.org/thread.html/re21fec81baea7a6d73b0b5d31efd07cc02c61f832e297f65bb19b519@%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-fh37-cx83-q542', 'https://github.com/apache/airflow/commit/21cedff205e7d62675949fda2aa4616d77232b76'}
| null |
GHSA
|
GHSA-j66f-h9hm-975m
|
Unrestricted Upload of File with Dangerous Type in Umbraco CMS
|
Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.
|
{'CVE-2020-9472'}
|
2021-08-02T17:38:56Z
|
2021-08-02T17:38:56Z
|
MODERATE
| 6.5
|
{'CWE-434'}
|
{'https://github.com/advisories/GHSA-j66f-h9hm-975m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9472', 'https://gitlab.com/eLeN3Re/cve-2020-9472'}
| null |
GHSA
|
GHSA-gw97-f6h8-gm94
|
Email relay in Apache Traffic Control
|
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
|
{'CVE-2021-42009'}
|
2021-10-20T17:07:21Z
|
2021-10-13T18:55:04Z
|
MODERATE
| 4.3
|
{'CWE-20'}
|
{'https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42009', 'http://www.openwall.com/lists/oss-security/2021/10/12/1', 'https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E', 'https://github.com/advisories/GHSA-gw97-f6h8-gm94', 'https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E', 'https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E'}
| null |
GHSA
|
GHSA-m5pj-vjjf-4m3h
|
Arbitrary Code Execution in grunt
|
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
|
{'CVE-2020-7729'}
|
2021-05-06T18:27:18Z
|
2021-05-06T18:27:18Z
|
HIGH
| 7.1
|
{'CWE-1188'}
|
{'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249', 'https://usn.ubuntu.com/4595-1/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html', 'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729', 'https://snyk.io/vuln/SNYK-JS-GRUNT-597546', 'https://github.com/advisories/GHSA-m5pj-vjjf-4m3h'}
| null |
GHSA
|
GHSA-686f-ch3r-xwmh
|
Data races in unicycle
|
Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads.
This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab<T>` or `Unordered<T, S>` and accessed concurrently from multiple threads.
The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab<T>` & `Unordered<T, S>` and adding `T: Sync` to `Sync` impls for `PinSlab<T>` & `Unordered<T, S>`.
|
{'CVE-2020-36436'}
|
2021-08-25T20:58:17Z
|
2021-08-25T20:58:17Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://github.com/udoprog/unicycle/issues/8', 'https://github.com/advisories/GHSA-686f-ch3r-xwmh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36436', 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}
| null |
GHSA
|
GHSA-x64g-4xx9-fh6x
|
Denial of Service in Cryptacular
|
CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data.
|
{'CVE-2020-7226'}
|
2022-04-22T18:19:17Z
|
2020-06-10T20:02:58Z
|
HIGH
| 7.5
|
{'CWE-770'}
|
{'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/vt-middleware/cryptacular/blob/fafccd07ab1214e3588a35afe3c361519129605f/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/issues/52', 'https://lists.apache.org/thread.html/r2237a27040b57adc2fcc5570bd530ad2038e67fcb2a3ce65283d3143@%3Ccommits.tomee.apache.org%3E', 'https://github.com/apereo/cas/pull/4685', 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff9016a0af8c93f42e1de93b09298bfa547@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r209de85beae4d257d27fc577e3a3e97039bdb4c2dc6f4a8e5a5a5811@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r77c48cd851f60833df9a9c9c31f12243508e15d1b2a0961066d44fc6@%3Ccommits.tomee.apache.org%3E', 'https://github.com/vt-middleware/cryptacular/pull/56', 'https://github.com/advisories/GHSA-x64g-4xx9-fh6x', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/vt-middleware/cryptacular/blob/master/src/main/java/org/cryptacular/CiphertextHeader.java#L153', 'https://github.com/vt-middleware/cryptacular/commit/ec2fb65f2455c479376695e3d75d30c7f6884b3f', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://lists.apache.org/thread.html/r4a62133ad01d5f963755021027a4cce23f76b8674a13860d2978c7c8@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re7f46c4cc29a4616e0aa669c84a0eb34832e83a8eef05189e2e59b44@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/rc36b75cabb4d700b48035d15ad8b8c2712bb32123572a1bdaec2510a@%3Cdev.ws.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7226', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rfa4647c58e375996e62a9094bffff6dc350ec311ba955b430e738945@%3Cdev.ws.apache.org%3E'}
| null |
GHSA
|
GHSA-9mxw-4856-9cm5
|
Data races in rusb
|
An issue was discovered in the rusb crate before 0.7.0 for Rust. Because of a lack of Send and Sync bounds, a data race and memory corruption can occur.
|
{'CVE-2020-36206'}
|
2021-08-25T20:50:51Z
|
2021-08-25T20:50:51Z
|
HIGH
| 7
|
{'CWE-662', 'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36206', 'https://rustsec.org/advisories/RUSTSEC-2020-0098.html', 'https://github.com/a1ien/rusb/issues/44', 'https://github.com/advisories/GHSA-9mxw-4856-9cm5'}
| null |
GHSA
|
GHSA-6xc2-mj39-q599
|
Privilege Escalation in strapi
|
Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token.
## Recommendation
Upgrade to version 3.0.0-beta.17.5 or later.
|
{'CVE-2019-18818'}
|
2022-02-09T18:27:25Z
|
2019-12-02T18:20:41Z
|
HIGH
| 9.8
|
{'CWE-640'}
|
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818', 'https://www.npmjs.com/advisories/1311', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818', 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5', 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html', 'https://github.com/advisories/GHSA-6xc2-mj39-q599', 'https://github.com/strapi/strapi/pull/4443', 'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html'}
| null |
GHSA
|
GHSA-vc89-hccf-rq55
|
Hash collision in typelevel jawn
|
### Impact
Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack. Most applications do not implement these traits directly, but inherit from a library:
Affected implementations include:
* `org.http4s` :: `http4s-play-json`
* `org.typelevel :: jawn-ast` (< 0.8.0)
* `org.typelevel :: jawn-play` (discontinued)
* `org.typelevel :: jawn-rojoma` (discontinued)
* `org.typelevel :: jawn-spray` (discontinued)
Unaffected implementations include:
* `io.argonaut :: argonaut-jawn`
* `io.circe :: circe-parser`
* `org.typelevel :: jawn-ast` (>= 0.8.0)
* `org.typelevel :: jawn-json4s` (discontinued)
* `org.typelevel :: jawn-argonaut` (discontinued)
### Patches
`jawn-parser-1.3.2` fixes the issue.
### Workarounds
Override `objectContext()` to use a collision-safe collection. See [the patch](https://github.com/typelevel/jawn/pull/390/files) for an example in both `SimpleFacade` and `MutableFacade`.
### References
* https://github.com/typelevel/jawn/pull/390
### Credits
* @kag0, for the report and the patch
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [typelevel/jawn](https://github.com/typelevel/jawn)
* E-mail a maintainer:
* [@rossabaker](mailto:ross@rossabaker.com)
|
{'CVE-2022-21653'}
|
2022-04-19T19:03:19Z
|
2022-01-06T23:48:35Z
|
MODERATE
| 5.9
|
{'CWE-326', 'CWE-400'}
|
{'https://github.com/advisories/GHSA-vc89-hccf-rq55', 'https://github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55', 'https://github.com/typelevel/jawn/pull/390', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21653'}
| null |
GHSA
|
GHSA-r6fw-8m27-43c9
|
Command injection in portkiller
|
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23379'}
|
2021-05-06T15:53:20Z
|
2021-05-06T15:53:20Z
|
HIGH
| 7.3
|
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23379', 'https://github.com/indatawetrust/portkiller/blob/f1f1c5076d9c5d60e8dd3930e98d665d8191aa7a/index.js%23L10', 'https://www.npmjs.com/package/portkiller', 'https://github.com/advisories/GHSA-r6fw-8m27-43c9', 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537'}
| null |
GHSA
|
GHSA-pvmx-g8h5-cprj
|
Advanced Content Filter (ACF) vulnerability allowing to execute JavaScript code using malformed HTML
|
### Affected packages
The vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 Advanced Content Filter (ACF) core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.17.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Maurice Dauer ([laytonctf](https://twitter.com/laytonctf)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-41164'}
|
2022-04-22T15:40:26Z
|
2021-11-17T21:55:10Z
|
HIGH
| 8.2
|
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-pvmx-g8h5-cprj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41164', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-xqfj-35wv-m3cr
|
Null pointer dereference in `StringNGrams`
|
### Impact
An attacker can trigger a dereference of a null pointer in `tf.raw_ops.StringNGrams`:
```python
import tensorflow as tf
data=tf.constant([''] * 11, shape=[11], dtype=tf.string)
splits = [0]*115
splits.append(3)
data_splits=tf.constant(splits, shape=[116], dtype=tf.int64)
tf.raw_ops.StringNGrams(data=data, data_splits=data_splits, separator=b'Ss',
ngram_widths=[7,6,11],
left_pad='ABCDE', right_pad=b'ZYXWVU',
pad_width=50, preserve_short_sequences=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L67-L74) does not fully validate the `data_splits` argument. This would result in [`ngrams_data`](https://github.com/tensorflow/tensorflow/blob/1cdd4da14282210cc759e468d9781741ac7d01bf/tensorflow/core/kernels/string_ngrams_op.cc#L106-L110) to be a null pointer when the output would be computed to have 0 or negative size.
Later writes to the output tensor would then cause a null pointer dereference.
### Patches
We have patched the issue in GitHub commit [ba424dd8f16f7110eea526a8086f1a155f14f22b](https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29541'}
|
2021-05-21T17:07:00Z
|
2021-05-21T14:23:12Z
|
LOW
| 2.5
|
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-xqfj-35wv-m3cr', 'https://github.com/tensorflow/tensorflow/commit/ba424dd8f16f7110eea526a8086f1a155f14f22b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-35wv-m3cr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29541'}
| null |
GHSA
|
GHSA-pcwq-7wrw-r8jv
|
Cross-site Scripting in intelliants/subrion
|
Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.
|
{'CVE-2020-18325'}
|
2022-03-17T21:38:56Z
|
2022-03-05T00:00:45Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18325', 'https://github.com/hamm0nz/CVE-2020-18325', 'https://github.com/advisories/GHSA-pcwq-7wrw-r8jv'}
| null |
GHSA
|
GHSA-5h5r-23r4-m87h
|
Cross-Site Scripting in gitbook
|
Affected versions of `gitbook` do not properly sanitize user input outside of backticks, which may result in cross-site scripting in the online reader.
## Recommendation
Update to version 3.2.2 or later.
|
{'CVE-2017-16019'}
|
2021-01-07T23:32:51Z
|
2020-09-01T16:04:39Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://github.com/GitbookIO/gitbook/issues/1609', 'https://nodesecurity.io/advisories/159', 'https://github.com/advisories/GHSA-5h5r-23r4-m87h', 'https://www.npmjs.com/advisories/159', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16019'}
| null |
GHSA
|
GHSA-39vw-qp34-rmwf
|
Uncontrolled recursion leads to abort in deserialization
|
Affected versions of this crate did not properly check for recursion
while deserializing aliases.
This allows an attacker to make a YAML file with an alias referring
to itself causing an abort.
The flaw was corrected by checking the recursion depth.
| null |
2021-08-25T21:00:18Z
|
2021-08-25T21:00:18Z
|
MODERATE
| 0
|
{'CWE-674'}
|
{'https://github.com/dtolnay/serde-yaml/pull/105', 'https://github.com/advisories/GHSA-39vw-qp34-rmwf', 'https://rustsec.org/advisories/RUSTSEC-2018-0005.html'}
| null |
GHSA
|
GHSA-63rq-p8fp-524q
|
Potential API key leak
|
If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel.
This is patched in v1.2.4
| null |
2021-04-13T15:12:06Z
|
2021-04-13T15:12:06Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-63rq-p8fp-524q', 'https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q'}
| null |
GHSA
|
GHSA-jf2m-435m-mxw8
|
High severity vulnerability that affects org.apache.hive:hive-jdbc
|
This vulnerability in Apache Hive JDBC driver 0.7.1 to 2.3.2 allows carefully crafted arguments to be used to bypass the argument escaping/cleanup that JDBC driver does in PreparedStatement implementation.
|
{'CVE-2018-1282'}
|
2021-09-14T19:39:53Z
|
2018-11-21T22:24:34Z
|
CRITICAL
| 9.1
|
{'CWE-89'}
|
{'https://lists.apache.org/thread.html/74bd2bff1827febb348dfb323986fa340d3bb97a315ab93c3ccc8299@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1282', 'https://github.com/advisories/GHSA-jf2m-435m-mxw8', 'http://www.securityfocus.com/bid/103751'}
| null |
GHSA
|
GHSA-6vx5-cg2p-7g5v
|
Unrestricted Upload of File with Dangerous Type in microweber
|
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12.
|
{'CVE-2022-0912'}
|
2022-03-22T21:37:49Z
|
2022-03-12T00:00:35Z
|
MODERATE
| 4.8
|
{'CWE-434'}
|
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://github.com/advisories/GHSA-6vx5-cg2p-7g5v'}
| null |
GHSA
|
GHSA-hpf7-4c2g-9chf
|
Remote Code Execution in Halibut
|
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
|
{'CVE-2021-31819'}
|
2021-09-30T18:36:14Z
|
2021-09-23T23:17:07Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31819', 'https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html', 'https://github.com/advisories/GHSA-hpf7-4c2g-9chf'}
| null |
GHSA
|
GHSA-ccw5-7vfh-p5hm
|
Directory Traversal in dmmcquay.lab6
|
Affected versions of `dmmcquay.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16208'}
|
2021-01-14T17:26:11Z
|
2020-09-01T18:14:15Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/426', 'https://nodesecurity.io/advisories/426', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6', 'https://github.com/advisories/GHSA-ccw5-7vfh-p5hm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16208'}
| null |
GHSA
|
GHSA-fjqr-fx3f-g4rv
|
Electron protocol handler browser vulnerable to Command Injection
|
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
|
{'CVE-2018-1000118'}
|
2022-04-26T14:35:23Z
|
2018-03-26T16:41:20Z
|
HIGH
| 8.8
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118', 'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7', 'https://electronjs.org/releases#1.8.2-beta.5'}
| null |
GHSA
|
GHSA-3p8f-j2vw-7hw9
|
Hijacked Environment Variables in mssql-node
|
The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this module is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16059'}
|
2021-01-08T20:00:33Z
|
2018-11-09T17:43:44Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/480', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059', 'https://www.npmjs.com/advisories/480', 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9'}
| null |
GHSA
|
GHSA-v7q4-97x4-4qw2
|
Use of Uninitialized Resource in truetype
|
An issue was discovered in the truetype crate before 0.30.1 for Rust. Attackers can read the contents of uninitialized memory locations via a user-provided Read operation within Tape::take_bytes.
|
{'CVE-2021-28030'}
|
2021-08-25T20:51:58Z
|
2021-08-25T20:51:58Z
|
HIGH
| 7.5
|
{'CWE-908'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28030', 'https://rustsec.org/advisories/RUSTSEC-2021-0029.html', 'https://github.com/advisories/GHSA-v7q4-97x4-4qw2', 'https://github.com/bodoni/truetype/issues/11'}
| null |
GHSA
|
GHSA-x5x2-mfc7-r22f
|
Directory Traversal in picard
|
Affected versions of `picard` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16194'}
|
2021-01-08T00:44:25Z
|
2018-07-23T20:40:20Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16194', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard', 'https://www.npmjs.com/advisories/436', 'https://nodesecurity.io/advisories/436', 'https://github.com/advisories/GHSA-x5x2-mfc7-r22f'}
| null |
GHSA
|
GHSA-rg32-m3hf-772v
|
Deserialization of Untrusted Data in Slanger
|
Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3.
|
{'CVE-2019-1010306'}
|
2021-05-11T15:51:16Z
|
2019-07-16T00:41:40Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3', 'https://github.com/advisories/GHSA-rg32-m3hf-772v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'}
| null |
GHSA
|
GHSA-fr6q-jv7j-35g3
|
Path Traversal in w-zip
|
Path Traversal in NPM w-zip prior to 1.0.12.
|
{'CVE-2022-0401'}
|
2022-02-10T23:41:29Z
|
2022-02-02T00:01:46Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0401', 'https://github.com/advisories/GHSA-fr6q-jv7j-35g3', 'https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d', 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'}
| null |
GHSA
|
GHSA-jc43-qrrp-98f5
|
Insert tag injection in the Contao login module
|
Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. It is possible to inject insert tags into the login module which will be replaced when the page is rendered. It is recommended to update to Contao 4.8.6. There are currently no known workarounds at this time.
|
{'CVE-2019-19714'}
|
2022-05-05T16:47:16Z
|
2019-12-17T22:53:40Z
|
MODERATE
| 5.3
|
{'CWE-116'}
|
{'https://github.com/advisories/GHSA-jc43-qrrp-98f5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714', 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html', 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5', 'https://contao.org/en/news.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19714.yaml'}
| null |
GHSA
|
GHSA-3wh2-2pp3-2823
|
Malicious Package in simple-alipay
|
Version 1.0.1 of `simple-alipay` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.1 of this module is found installed you will want to replace it with a version before or after 1.0.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-01T20:35:18Z
|
2020-09-01T20:35:18Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-3wh2-2pp3-2823', 'https://www.npmjs.com/advisories/637'}
| null |
GHSA
|
GHSA-j77q-2qqg-6989
|
High severity vulnerability that affects org.apache.struts:struts2-core
|
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
|
{'CVE-2017-5638'}
|
2021-06-10T23:23:12Z
|
2018-10-18T19:24:26Z
|
CRITICAL
| 10
|
{'CWE-20'}
|
{'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_us', 'http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/', 'https://cwiki.apache.org/confluence/display/WW/S2-045', 'https://support.lenovo.com/us/en/product_security/len-14200', 'https://github.com/advisories/GHSA-j77q-2qqg-6989', 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=6b8272ce47160036ed120a48345d9aa884477228', 'https://exploit-db.com/exploits/41570', 'https://www.symantec.com/security-center/network-protection-security-advisories/SA145', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.exploit-db.com/exploits/41614/', 'https://twitter.com/theog150/status/841146956135124993', 'https://git1-us-west.apache.org/repos/asf?p=struts.git;a=commit;h=352306493971e7d5a756d61780d57a76eb1f519a', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_us', 'https://github.com/rapid7/metasploit-framework/issues/8064', 'https://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/', 'https://struts.apache.org/docs/s2-046.html', 'http://www.securityfocus.com/bid/96729', 'https://cwiki.apache.org/confluence/display/WW/S2-046', 'http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txt', 'https://security.netapp.com/advisory/ntap-20170310-0001/', 'http://www.securitytracker.com/id/1037973', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5638', 'https://packetstormsecurity.com/files/141494/S2-45-poc.py.txt', 'https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_us', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'https://www.kb.cert.org/vuls/id/834067', 'http://www.eweek.com/security/apache-struts-vulnerability-under-attack.html', 'https://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.html', 'http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html', 'https://github.com/mazen160/struts-pwn', 'https://struts.apache.org/docs/s2-045.html', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://isc.sans.edu/diary/22169'}
| null |
GHSA
|
GHSA-pf38-cw3p-22q9
|
Keycloak is vulnerable to IDN homograph attack
|
A flaw was found in keycloak as shipped in Red Hat Single Sign-On 7.4 where IDN homograph attacks are possible. A malicious user can register himself with a name already registered and trick admin to grant him extra privileges.
|
{'CVE-2021-3424'}
|
2022-04-28T21:00:22Z
|
2022-04-28T21:00:21Z
|
MODERATE
| 5.3
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3424', 'https://bugzilla.redhat.com/show_bug.cgi?id=1933320', 'https://github.com/advisories/GHSA-pf38-cw3p-22q9'}
| null |
GHSA
|
GHSA-374m-jm66-3vj8
|
Heap OOB in `SparseBinCount`
|
### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB:
```python
import tensorflow as tf
tf.raw_ops.SparseBincount(
indices=[[0],[1],[2]]
values=[0,-10000000]
dense_shape=[1,1]
size=[1]
weights=[3,2,1]
binary_output=False)
```
This is because of missing validation between the elements of the `values` argument and the shape of the sparse output:
```cc
for (int64_t i = 0; i < indices_mat.dimension(0); ++i) {
const int64_t batch = indices_mat(i, 0);
const Tidx bin = values(i);
...
out(batch, bin) = ...;
}
```
### Patches
We have patched the issue in GitHub commit [f410212e373eb2aec4c9e60bf3702eba99a38aba](https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41226'}
|
2021-11-10T18:41:47Z
|
2021-11-10T18:41:47Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba', 'https://github.com/advisories/GHSA-374m-jm66-3vj8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41226', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'}
| null |
GHSA
|
GHSA-gfp2-w5jm-955q
|
OMERO.web exposes some unnecessary session information in the page
|
### Background
OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release.
### Impact
OMERO.web before 5.9.0
### Patches
5.9.0
### Workarounds
No workaround
### References
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [omero-web](https://github.com/ome/omero-web)
* Email us at [security](mailto:security@openmicroscopy.org.uk)
|
{'CVE-2021-21376'}
|
2021-03-29T17:30:03Z
|
2021-03-23T15:26:34Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://www.openmicroscopy.org/security/advisories/2021-SV1/', 'https://github.com/advisories/GHSA-gfp2-w5jm-955q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21376', 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c', 'https://pypi.org/project/omero-web/', 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q', 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}
| null |
GHSA
|
GHSA-8h2f-7jc4-7m3m
|
Open Redirect in urijs
|
urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613.
|
{'CVE-2022-0868'}
|
2022-03-14T21:10:49Z
|
2022-03-07T00:00:40Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/advisories/GHSA-8h2f-7jc4-7m3m', 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509', 'https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02', 'https://github.com/medialize/URI.js/releases/tag/v1.19.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868'}
| null |
GHSA
|
GHSA-qjhr-c23f-w76q
|
Inline JS XSS vulnerability in Mautic
|
### Impact
Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form.
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None
### References
https://github.com/mautic/mautic/releases/tag/2.12.0
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2017-1000488'}
|
2022-04-19T19:02:44Z
|
2021-01-19T21:16:24Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-qjhr-c23f-w76q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}
| null |
GHSA
|
GHSA-5557-j87h-cvf4
|
Missing Authorization in jenkins xray-connector
|
Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint, allowing with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
|
{'CVE-2021-21653'}
|
2021-06-16T17:29:26Z
|
2021-06-16T17:29:26Z
|
MODERATE
| 4.3
|
{'CWE-862'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21653', 'https://github.com/advisories/GHSA-5557-j87h-cvf4', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2251%20(2)'}
| null |
GHSA
|
GHSA-9crf-c6qr-r273
|
Integer division by 0 in `tf.raw_ops.AllToAll`
|
### Impact
The [shape inference code for `AllToAll`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/tpu_cross_replica_ops.cc#L25-L74) can be made to execute a division by 0:
```python
import tensorflow as tf
@tf.function
def func():
return tf.raw_ops.AllToAll(
input=[0.0, 0.1652, 0.6543],
group_assignment=[1, -1],
concat_dimension=0,
split_dimension=0,
split_count=0)
func()
```
This occurs whenever the `split_count` argument is 0:
```cc
TF_RETURN_IF_ERROR(c->GetAttr("split_count", &split_count));
...
for (int32_t i = 0; i < rank; ++i) {
...
dims[i] = c->MakeDim(c->Value(dims[i]) / split_count);
...
}
```
### Patches
We have patched the issue in GitHub commit [a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc](https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41218'}
|
2021-11-10T18:52:24Z
|
2021-11-10T18:52:24Z
|
MODERATE
| 5.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-9crf-c6qr-r273', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41218', 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}
| null |
GHSA
|
GHSA-p93v-m2r2-4387
|
Denial of service via insufficient metadata validation
|
The PAM module for `fscrypt` through v0.3.2 doesn't adequately validate `fscrypt` metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a `fscrypt` metadata file that prevents other users from logging into the system. We recommend upgrading to v0.3.3 or above.
For more details, see [CVE-2022-25327](https://www.cve.org/CVERecord?id=CVE-2022-25327).
| null |
2022-04-19T19:03:25Z
|
2022-03-01T21:05:01Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-p93v-m2r2-4387', 'https://github.com/google/fscrypt/security/advisories/GHSA-p93v-m2r2-4387'}
| null |
GHSA
|
GHSA-jfgq-g48x-jq83
|
Downloads Resources over HTTP in iedriver
|
Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`.
## Recommendation
Update to iedriver version 3.0.0 or greater.
|
{'CVE-2016-10562'}
|
2021-01-08T18:35:19Z
|
2019-02-18T23:54:20Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-jfgq-g48x-jq83', 'https://nodesecurity.io/advisories/174', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562', 'https://www.npmjs.com/advisories/174'}
| null |
GHSA
|
GHSA-4cx9-7xqc-2jxm
|
Reflected cross-site scripting in francoisjacquet/rosariosis
|
Reflected Cross-Site Scripting vulnerability in Modules.php in RosarioSIS Student Information System < 6.5.1 allows remote attackers to execute arbitrary web script via embedding javascript or HTML tags in a GET request.
|
{'CVE-2020-13278'}
|
2021-05-06T18:54:48Z
|
2021-05-06T18:54:48Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://gitlab.com/francoisjacquet/rosariosis/-/issues/282', 'https://gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13278.json', 'https://github.com/advisories/GHSA-4cx9-7xqc-2jxm', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/9cb4fec5fe177f1d3716708b46d1958eac477ebe', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13278'}
| null |
GHSA
|
GHSA-hpw7-3vq3-mmv6
|
Insecure deserialization in Wire
|
Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end.
**This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019**
This also applies to the fork of Wire, AkkaDotNet/Hyperion.
|
{'CVE-2021-29508'}
|
2021-05-19T23:02:38Z
|
2021-05-19T23:02:38Z
|
CRITICAL
| 9.1
|
{'CWE-502'}
|
{'https://www.nuget.org/packages/Wire/', 'https://github.com/advisories/GHSA-hpw7-3vq3-mmv6', 'https://github.com/AsynkronIT/Wire/security/advisories/GHSA-hpw7-3vq3-mmv6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29508'}
| null |
GHSA
|
GHSA-jpxj-vgq5-prjc
|
OS command execution vulnerability in Docker Commons Plugin
|
Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
|
{'CVE-2022-20617'}
|
2022-04-29T04:27:22Z
|
2022-01-13T00:01:03Z
|
HIGH
| 0
|
{'CWE-78'}
|
{'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1878', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20617', 'https://github.com/advisories/GHSA-jpxj-vgq5-prjc', 'https://plugins.jenkins.io/docker-commons', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'}
| null |
GHSA
|
GHSA-8p52-7cxv-6c95
|
Downloads Resources over HTTP in curses
|
Affected versions of `curses` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `curses`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10615'}
|
2021-01-08T19:08:25Z
|
2019-02-18T23:56:47Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/215', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10615', 'https://github.com/advisories/GHSA-8p52-7cxv-6c95', 'https://www.npmjs.com/advisories/215'}
| null |
GHSA
|
GHSA-v542-8q9x-cffc
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0.
|
{'CVE-2020-35681'}
|
2021-03-19T21:29:02Z
|
2021-03-19T21:29:02Z
|
HIGH
| 7.4
|
{'CWE-200'}
|
{'https://channels.readthedocs.io/en/stable/releases/index.html', 'https://github.com/advisories/GHSA-v542-8q9x-cffc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35681', 'https://github.com/django/channels/releases', 'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022', 'https://channels.readthedocs.io/en/stable/releases/3.0.3.html'}
| null |
GHSA
|
GHSA-xv69-f7x5-r4qw
|
Cross-Site Scripting via Attribute Set Name
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into the attribute set name when listing the products.
|
{'CVE-2019-8145'}
|
2021-08-18T22:18:30Z
|
2019-11-12T22:59:43Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/advisories/GHSA-xv69-f7x5-r4qw', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8145.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8145'}
| null |
GHSA
|
GHSA-pf8f-w267-mq2h
|
The rack-cors rubygem may allow directory traveral
|
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
|
{'CVE-2019-18978'}
|
2021-08-18T22:30:22Z
|
2019-11-15T20:26:59Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d', 'https://usn.ubuntu.com/4571-1/', 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html', 'https://github.com/advisories/GHSA-pf8f-w267-mq2h', 'https://www.debian.org/security/2021/dsa-4918', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978'}
| null |
GHSA
|
GHSA-9px9-73fg-3fqp
|
Null pointer dereference in Grappler's `IsConstant`
|
### Impact
Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place):
First, during [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497), the `GraphDef` might not have the required nodes for the binary operation:
```cc
NodeDef* mul_left_child = node_map_->GetNode(node->input(0));
NodeDef* mul_right_child = node_map_->GetNode(node->input(1));
// One child must be constant, and the second must be Conv op.
const bool left_child_is_constant = IsReallyConstant(*mul_left_child);
const bool right_child_is_constant = IsReallyConstant(*mul_right_child);
```
If a node is missing, the correposning `mul_*child` would be null, and the dereference in the subsequent line would be incorrect.
We have a similar issue during [`IsIdentityConsumingSwitch`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74):
```cc
NodeDef* input_node = graph.GetNode(tensor_id.node());
return IsSwitch(*input_node);
```
### Patches
We have patched the issue in GitHub commits [0a365c029e437be0349c31f8d4c9926b69fa3fa1](https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1) and [045deec1cbdebb27d817008ad5df94d96a08b1bf](https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23589'}
|
2022-02-11T20:00:55Z
|
2022-02-09T23:29:14Z
|
MODERATE
| 6.5
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L3466-L3497', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23589', 'https://github.com/tensorflow/tensorflow/commit/0a365c029e437be0349c31f8d4c9926b69fa3fa1', 'https://github.com/advisories/GHSA-9px9-73fg-3fqp', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/mutable_graph_view.cc#L59-L74', 'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf'}
| null |
GHSA
|
GHSA-76qf-6mvw-c5hm
|
Malicious Package in js-base64-int
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:16:46Z
|
2020-09-03T19:45:42Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-76qf-6mvw-c5hm', 'https://www.npmjs.com/advisories/1128'}
| null |
GHSA
|
GHSA-4p8f-mmfj-r45g
|
Cross-site scripting in fat_free_crm
|
Fat Free CRM before 0.18.1 has XSS in the tags_helper in app/helpers/tags_helper.rb.
|
{'CVE-2018-20975'}
|
2021-08-17T21:11:19Z
|
2019-08-21T16:15:04Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1', 'https://github.com/advisories/GHSA-4p8f-mmfj-r45g', 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65', 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'}
| null |
GHSA
|
GHSA-856x-cp3q-47vg
|
Insecure Default Configuration in airbrake
|
Affected versions of `airbrake` default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information.
## Recommendation
Update to version 0.4.0 or later, or upgrade from the now-deprecated `airbrake` module to its replacement, [`airbrake-js`](https://www.npmjs.com/package/airbrake-js).
|
{'CVE-2016-10530'}
|
2021-01-08T19:11:59Z
|
2019-02-18T23:58:13Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://github.com/airbrake/node-airbrake/issues/70', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10530', 'https://www.npmjs.com/advisories/96', 'https://github.com/advisories/GHSA-856x-cp3q-47vg', 'https://nodesecurity.io/advisories/96'}
| null |
GHSA
|
GHSA-qw5h-7f53-xrp6
|
Stack overflow in `ParseAttrValue` with nested tensors
|
### Impact
The implementation of [`ParseAttrValue`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/framework/attr_value_util.cc#L397-L453) can be tricked into stack overflow due to recursion by giving in a specially crafted input.
### Patches
We have patched the issue in GitHub commit [e07e1c3d26492c06f078c7e5bf2d138043e199c1](https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2021-29615'}
|
2021-05-21T14:28:45Z
|
2021-05-21T14:28:45Z
|
LOW
| 2.5
|
{'CWE-674'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29615', 'https://github.com/tensorflow/tensorflow/commit/e07e1c3d26492c06f078c7e5bf2d138043e199c1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qw5h-7f53-xrp6', 'https://github.com/advisories/GHSA-qw5h-7f53-xrp6'}
| null |
GHSA
|
GHSA-86ch-6w7v-v6xf
|
Denial of Service in soketi
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simply just crash the server for trying to send a response after the request closed.
All users that run the server are affected by it and it's highly recommended to upgrade to the latest patch.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Updating to at least 0.24.1 or the latest version.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No. Upgrading is the only solution.
### References
_Are there any links users can visit to find out more?_
https://github.com/soketi/soketi/releases/tag/0.24.1
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issues board](https://github.com/soketi/soketi/issues)
* Email us at [alex@renoki.org](mailto:alex@renoki.org)
|
{'CVE-2022-21667'}
|
2022-01-18T22:37:18Z
|
2022-01-08T00:24:44Z
|
HIGH
| 7.5
|
{'CWE-755'}
|
{'https://github.com/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/releases/tag/0.24.1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667', 'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'}
| null |
GHSA
|
GHSA-48w2-rm65-62xx
|
Inconsistent Interpretation of HTTP Requests in puma
|
### Impact
Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as "low". Puma is only aware of a single proxy server which has this behavior.
If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
### Patches
This vulnerability was patched in Puma 5.5.1 and 4.3.9.
### Workarounds
This vulnerability only affects Puma installations without any proxy in front.
Use a proxy which does not forward LF characters as line endings.
Proxies which do not forward LF characters as line endings:
* Nginx
* Apache (>2.4.25)
* Haproxy
* Caddy
* Traefik
### Possible Breakage
If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error.
### References
* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Puma](https://github.com/puma/puma)
* See our [security policy](https://github.com/puma/puma/security/policy)
|
{'CVE-2021-41136'}
|
2022-04-19T19:03:12Z
|
2021-10-12T17:53:00Z
|
LOW
| 3.7
|
{'CWE-444'}
|
{'https://github.com/puma/puma/releases/tag/v5.5.1', 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/advisories/GHSA-48w2-rm65-62xx', 'https://github.com/puma/puma/releases/tag/v4.3.9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136', 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}
| null |
GHSA
|
GHSA-6g87-ff9q-v847
|
High severity vulnerability that affects websockets
|
The Python websockets library version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appears to be exploitable via sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in version 5.0
|
{'CVE-2018-1000518'}
|
2022-04-19T19:03:25Z
|
2018-09-17T20:46:52Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/aaugustin/websockets/pull/407', 'https://github.com/advisories/GHSA-6g87-ff9q-v847', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000518'}
| null |
GHSA
|
GHSA-8rc5-hx3v-2jg7
|
Sanitizer bypass in svg-sanitizer
|
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
|
{'CVE-2019-10772'}
|
2021-08-19T19:25:07Z
|
2020-02-27T20:36:29Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9', 'https://github.com/advisories/GHSA-8rc5-hx3v-2jg7'}
| null |
GHSA
|
GHSA-2x83-r56g-cv47
|
High severity vulnerability that affects org.apache.httpcomponents:httpclient
|
http/conn/ssl/AbstractVerifier.java in Apache Commons HttpClient before 4.2.3 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5783.
|
{'CVE-2012-6153'}
|
2021-08-31T20:19:25Z
|
2018-10-17T00:05:15Z
|
HIGH
| 0
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-2x83-r56g-cv47', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6153', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://rhn.redhat.com/errata/RHSA-2015-0125.html', 'http://rhn.redhat.com/errata/RHSA-2014-1892.html', 'http://rhn.redhat.com/errata/RHSA-2014-1834.html', 'http://rhn.redhat.com/errata/RHSA-2014-1098.html', 'http://rhn.redhat.com/errata/RHSA-2015-0720.html', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'http://svn.apache.org/viewvc?view=revision&revision=1411705', 'http://www.securityfocus.com/bid/69257', 'http://www.ubuntu.com/usn/USN-2769-1', 'http://rhn.redhat.com/errata/RHSA-2014-1891.html', 'http://rhn.redhat.com/errata/RHSA-2014-1835.html', 'http://rhn.redhat.com/errata/RHSA-2014-1833.html', 'http://rhn.redhat.com/errata/RHSA-2014-1836.html', 'http://rhn.redhat.com/errata/RHSA-2015-1888.html', 'http://rhn.redhat.com/errata/RHSA-2015-0765.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05103564', 'http://rhn.redhat.com/errata/RHSA-2015-0158.html', 'https://access.redhat.com/solutions/1165533', 'https://bugzilla.redhat.com/show_bug.cgi?id=1129916'}
| null |
GHSA
|
GHSA-wfhx-6pcm-7m55
|
Path Traversal in ponse
|
Versions of `ponse` prior to 2.0.2 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 2.0.2 or later.
| null |
2021-09-28T17:04:50Z
|
2020-09-03T16:46:22Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/383112', 'https://www.npmjs.com/advisories/1002', 'https://github.com/advisories/GHSA-wfhx-6pcm-7m55'}
| null |
GHSA
|
GHSA-6g88-99wj-8mgg
|
Command injection in Apache Flink
|
A vulnerability in Apache Flink where, when running a process with an enabled JMXReporter, with a port configured via metrics.reporter.reporter_name>.port, an attacker with local access to the machine and JMX port can execute a man-in-the-middle attack using a specially crafted request to rebind the JMXRMI registry to one under the attacker's control. This compromises any connection established to the process via JMX, allowing extraction of credentials and any other transferred data.
|
{'CVE-2020-1960'}
|
2021-05-21T19:20:35Z
|
2021-05-21T19:20:35Z
|
MODERATE
| 4.7
|
{'CWE-74'}
|
{'https://lists.apache.org/thread.html/r26fcdd4fe288323006253437ebc4dd6fdfadfb5e93465a0e4f68420d@%3Cuser-zh.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r28f17e564950d663e68cc6fe75756012dda62ac623766bb9bc5e7034@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r23e559dee1e69741557b5fe431846de1f1a5981356d0ddb9482df88a%40%3Cdev.flink.apache.org%3E', 'https://github.com/advisories/GHSA-6g88-99wj-8mgg', 'https://lists.apache.org/thread.html/r663cf0d5c386bba2f562d45ad484d786151a84f0b95e45e2b0fb8e50@%3Cissues.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1960'}
| null |
GHSA
|
GHSA-ff29-f57w-2mm3
|
Downloads Resources over HTTP in geoip-lite-country
|
Affected versions of `geoip-lite-country` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 1.1.4 or later.
|
{'CVE-2016-10568'}
|
2021-01-08T18:53:26Z
|
2019-02-18T23:54:03Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10568', 'https://nodesecurity.io/advisories/183', 'https://www.npmjs.com/advisories/183', 'https://github.com/advisories/GHSA-ff29-f57w-2mm3'}
| null |
GHSA
|
GHSA-c538-924g-99q4
|
Session Fixation in Apache Zeppelin
|
Apache Zeppelin prior to 0.7.3 was vulnerable to session fixation which allowed an attacker to hijack a valid user session. Issue was reported by "stone lone".
|
{'CVE-2017-12619'}
|
2021-08-03T18:51:25Z
|
2019-04-24T16:06:59Z
|
HIGH
| 8.1
|
{'CWE-384'}
|
{'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://zeppelin.apache.org/releases/zeppelin-release-0.7.3.html', 'https://github.com/advisories/GHSA-c538-924g-99q4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12619'}
| null |
GHSA
|
GHSA-6mcm-j9cj-3vc3
|
Infinite loop in Apache MINA
|
In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.
|
{'CVE-2021-41973'}
|
2022-05-02T22:29:14Z
|
2021-11-03T17:30:35Z
|
MODERATE
| 6.5
|
{'CWE-835'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2021/11/01/2', 'https://github.com/advisories/GHSA-6mcm-j9cj-3vc3', 'https://lists.apache.org/thread.html/r0b907da9340d5ff4e6c1a4798ef4e79700a668657f27cca8a39e9250%40%3Cdev.mina.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41973', 'http://www.openwall.com/lists/oss-security/2021/11/01/8'}
| null |
GHSA
|
GHSA-h2x7-2ff6-v32p
|
Incorrect routing of some HTTP requests when using httpauth
|
### Impact
Incorrect routing of some HTTP requests when using httpauth
### Patches
Upgrade to version 0.7.2 for fix
### Workarounds
None
### References
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [nbosscher@blue-giraffe.ca](mailto:nbosscher@blue-giraffe.ca)
| null |
2022-02-11T23:39:57Z
|
2022-02-11T23:39:57Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-h2x7-2ff6-v32p', 'https://github.com/ntbosscher/gobase/security/advisories/GHSA-h2x7-2ff6-v32p'}
| null |
GHSA
|
GHSA-9qrh-qjmc-5w2p
|
Denial-of-Service when binding invalid parameters in sqlite3
|
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
|
{'CVE-2022-21227'}
|
2022-05-03T02:24:26Z
|
2022-04-28T20:25:23Z
|
HIGH
| 7.5
|
{'CWE-248'}
|
{'https://github.com/TryGhost/node-sqlite3/issues/1449', 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p', 'https://github.com/TryGhost/node-sqlite3/issues/1440', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470', 'https://github.com/advisories/GHSA-9qrh-qjmc-5w2p', 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a'}
| null |
GHSA
|
GHSA-cjjc-xp8v-855w
|
Panic in malformed cerftificate
|
The Helm core maintainers have identified a high severity security vulnerability in Go's `crypto` package affecting all versions prior to Helm 2.16.8 and Helm 3.1.0.
Thanks to @ravin9249 for identifying the vulnerability.
### Impact
Go before 1.12.16 and 1.13.x before 1.13.7 (and the `crypto/cryptobyte` package before 0.0.0-20200124225646-8b5121be2f68 for Go) allows attacks on clients resulting in a panic via a malformed X.509 certificate. This may allow a remote attacker to cause a denial of service.
### Patches
A patch to compile Helm against Go 1.14.4 has been provided for Helm 2 and is available in Helm 2.16.8. Helm 3.1.0 and newer are compiled against Go 1.13.7+.
### Workarounds
No workaround is available. Users are urged to upgrade.
### References
- https://nvd.nist.gov/vuln/detail/CVE-2020-7919
- https://github.com/helm/helm/pull/8288
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Helm repository](https://github.com/helm/helm/issues)
* For security-specific issues, email us at <cncf-helm-security@lists.cncf.io>
|
{'CVE-2020-7919'}
|
2021-10-06T21:23:32Z
|
2021-06-23T18:02:39Z
|
HIGH
| 7.5
|
{'CWE-295'}
|
{'https://groups.google.com/forum/#!topic/golang-announce/Hsw4mHYc470', 'https://github.com/helm/helm/security/advisories/GHSA-cjjc-xp8v-855w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7919', 'https://groups.google.com/forum/#!forum/golang-announce', 'https://www.debian.org/security/2021/dsa-4848', 'https://github.com/advisories/GHSA-cjjc-xp8v-855w', 'https://security.netapp.com/advisory/ntap-20200327-0001/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S43VLYRURELDWX4D5RFOYBNFGO6CGBBC/', 'https://groups.google.com/forum/#!topic/golang-announce/-sdUB4VEQkA'}
| null |
GHSA
|
GHSA-3448-vfvv-xp9g
|
Moderate severity vulnerability that affects org.apache.tika:tika-core
|
A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.
|
{'CVE-2018-17197'}
|
2021-08-31T20:38:49Z
|
2018-12-26T17:45:07Z
|
MODERATE
| 6.5
|
{'CWE-835'}
|
{'http://www.securityfocus.com/bid/106293', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-3448-vfvv-xp9g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17197', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3@%3Cdev.tika.apache.org%3E'}
| null |
GHSA
|
GHSA-wqh4-27cc-j8f2
|
Hijacked Environment Variables in nodeffmpeg
|
The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16069'}
|
2021-01-08T01:31:53Z
|
2018-08-29T23:36:48Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/508', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069', 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2', 'https://www.npmjs.com/advisories/508'}
| null |
GHSA
|
GHSA-7fm6-gxqg-2pwr
|
Code Injection in total.js
|
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
|
{'CVE-2021-23389'}
|
2021-12-10T17:26:06Z
|
2021-12-10T17:26:06Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-7fm6-gxqg-2pwr', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389', 'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3'}
| null |
GHSA
|
GHSA-qpqh-46qj-vwcw
|
Cross-site Scripting in docsify
|
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
|
{'CVE-2020-7680'}
|
2021-05-18T01:53:18Z
|
2021-05-18T01:53:18Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7680', 'https://github.com/advisories/GHSA-qpqh-46qj-vwcw', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099', 'https://github.com/docsifyjs/docsify/pull/1128', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'https://github.com/docsifyjs/docsify/issues/1126', 'http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html'}
| null |
GHSA
|
GHSA-5hr6-vc97-qxxh
|
XML Injection in Crafter CMS Crafter Studio 3.0.1
|
Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.
|
{'CVE-2017-15685'}
|
2022-02-09T23:08:01Z
|
2022-02-09T23:08:01Z
|
HIGH
| 8.6
|
{'CWE-91'}
|
{'https://github.com/advisories/GHSA-5hr6-vc97-qxxh', 'https://docs.craftercms.org/en/3.0/security/advisory.html', 'http://crafter.com', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15685'}
| null |
GHSA
|
GHSA-v7x3-7hw7-pcjg
|
Moderate severity vulnerability that affects renovate
|
## Go Modules Vulnerability Disclosure
### Impact
Temporary repository tokens were leaked into Pull Requests comments in during certain Go Modules update failure scenarios.
### Patches
The problem has been patched. Self-hosted users should upgrade to v19.38.7 or later.
### Workarounds
Disable Go Modules support.
### References
Blog post: https://renovatebot.com/blog/go-modules-vulnerability-disclosure
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Renovate](http://github.com/renovatebot/renovate)
* Email us at [support@renovatebot.com](mailto:support@renovatebot.com)
| null |
2021-09-20T21:11:51Z
|
2019-10-21T16:02:33Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://github.com/renovatebot/renovate/security/advisories/GHSA-v7x3-7hw7-pcjg', 'https://github.com/advisories/GHSA-v7x3-7hw7-pcjg', 'https://snyk.io/vuln/SNYK-JS-RENOVATE-536203'}
| null |
GHSA
|
GHSA-9c2p-jw8p-f84v
|
SQL Injection in sequelize
|
Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability.
## Proof of Concept
In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped.
Example Query:
```
database.query('SELECT * FROM TestTable WHERE Name IN (:names)', {
replacements: {
names: directCopyOfUserInput
}
});
```
If the user inputs the value of `:names` as:
```
["test", "'); DELETE TestTable WHERE Id = 1 --')"]
```
The resulting SQL statement will be:
```
SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --')
```
As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1.
## Recommendation
Update to version 3.20.0 or later.
|
{'CVE-2016-10556'}
|
2021-01-08T20:57:38Z
|
2019-02-18T23:54:24Z
|
CRITICAL
| 0
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-9c2p-jw8p-f84v', 'https://www.npmjs.com/advisories/102', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556', 'https://nodesecurity.io/advisories/102', 'https://github.com/sequelize/sequelize/issues/5671'}
| null |
GHSA
|
GHSA-q44v-xc3g-v7jq
|
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
|
OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of : to construct a javascript: URL.
|
{'CVE-2017-14735'}
|
2021-06-15T16:36:26Z
|
2018-10-18T17:22:11Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/105656', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://github.com/advisories/GHSA-q44v-xc3g-v7jq', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://github.com/nahsra/antisamy/issues/10', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14735', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
GHSA
|
GHSA-h5mp-5q4p-ggf5
|
Prototype Pollution in lodash.defaultsdeep
|
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later.
| null |
2021-09-28T22:42:31Z
|
2020-09-03T18:07:05Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1068', 'https://github.com/advisories/GHSA-h5mp-5q4p-ggf5'}
| null |
GHSA
|
GHSA-f5cf-f7px-xpmh
|
Moderate severity vulnerability that affects org.apache.qpid:proton-j
|
The (1) proton.reactor.Connector, (2) proton.reactor.Container, and (3) proton.utils.BlockingConnection classes in Apache Qpid Proton before 0.12.1 improperly use an unencrypted connection for an amqps URI scheme when SSL support is unavailable, which might allow man-in-the-middle attackers to obtain sensitive information or modify data via unspecified vectors.
|
{'CVE-2016-2166'}
|
2021-09-09T21:40:13Z
|
2018-10-16T19:50:27Z
|
MODERATE
| 6.5
|
{'CWE-200'}
|
{'http://packetstormsecurity.com/files/136403/Apache-Qpid-Proton-0.12.0-SSL-Failure.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2166', 'http://qpid.apache.org/releases/qpid-proton-0.12.1/release-notes.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182414.html', 'https://lists.apache.org/thread.html/914424e4d798a340f523b6169aaf39b626971d9bb00fcdeb1d5d6c0d@%3Ccommits.qpid.apache.org%3E', 'https://github.com/advisories/GHSA-f5cf-f7px-xpmh', 'https://git-wip-us.apache.org/repos/asf?p=qpid-proton.git;h=a058585', 'https://issues.apache.org/jira/browse/PROTON-1157', 'http://www.securityfocus.com/archive/1/537864/100/0/threaded'}
| null |
GHSA
|
GHSA-776r-w3v9-96mv
|
Directory Traversal in censorify.tanisjr
|
Affected versions of `censorify.tanisjr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16157'}
|
2021-01-08T21:05:51Z
|
2018-07-23T20:46:16Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-776r-w3v9-96mv', 'https://nodesecurity.io/advisories/392', 'https://www.npmjs.com/advisories/392', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16157', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr'}
| null |
GHSA
|
GHSA-35mm-cc6r-8fjp
|
Cross-site scripting in actionpack
|
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
|
{'CVE-2020-8264'}
|
2021-04-07T20:58:47Z
|
2021-04-07T20:58:47Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8264', 'https://github.com/advisories/GHSA-35mm-cc6r-8fjp', 'https://hackerone.com/reports/904059', 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ'}
| null |
GHSA
|
GHSA-j7m2-58wv-9v79
|
Vulnerability in Torpedo Query
|
Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java.
|
{'CVE-2019-11343'}
|
2022-02-10T20:47:29Z
|
2022-02-10T20:47:29Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/xjodoin/torpedoquery/compare/v2.5.2...v2.5.3', 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f', 'https://github.com/advisories/GHSA-j7m2-58wv-9v79', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343'}
| null |
GHSA
|
GHSA-2hxv-mx8x-mcj9
|
Spina vulnerable to a cross-site request forgery (CSRF) vulnerability
|
Cross-site request forgery (CSRF) vulnerability in Spina before commit bfe44f289e336f80b6593032679300c493735e75.
|
{'CVE-2015-4619'}
|
2022-04-26T18:26:09Z
|
2018-08-28T22:34:22Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-2hxv-mx8x-mcj9', 'https://nvd.nist.gov/vuln/detail/CVE-2015-4619', 'https://github.com/denkGroot/Spina/commit/bfe44f289e336f80b6593032679300c493735e75', 'http://www.openwall.com/lists/oss-security/2015/06/16/20', 'http://www.securityfocus.com/bid/75216'}
| null |
GHSA
|
GHSA-w5m2-299g-rff5
|
Page Compare Reflected Cross-site Scripting (XSS) vulnerability
|
### Impact
ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in `/apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized.
An attacker must provide a link to someone with access to AEM Author, and could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. The exploitation of this issue requires user interaction in order to be successful.
### Patches
This issue has been resolved in 5.2.0.
### Workarounds
None
### References
N/A
### For more information
If you have any questions or comments about this advisory open an issue in acs-aem-commons.
### Credit
This issue was discovered and reported by Black Lantern Security.
https://hackerone.com/reports/1466020
|
{'CVE-2022-28820'}
|
2022-04-26T12:59:01Z
|
2022-04-26T12:59:00Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28820', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5', 'https://github.com/advisories/GHSA-w5m2-299g-rff5'}
| null |
GHSA
|
GHSA-29fh-xcjr-p7rx
|
Malicious Package in web3-eht
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T19:10:03Z
|
2020-09-03T17:02:22Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-29fh-xcjr-p7rx', 'https://www.npmjs.com/advisories/1416'}
| null |
GHSA
|
GHSA-c3m8-x3cg-qm2c
|
Configuration Override in helmet-csp
|
Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting.
## Recommendation
Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue.
| null |
2021-09-29T18:45:07Z
|
2020-09-03T20:39:53Z
|
MODERATE
| 6.5
| null |
{'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436', 'https://www.npmjs.com/advisories/1176', 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a', 'https://github.com/advisories/GHSA-c3m8-x3cg-qm2c'}
| null |
GHSA
|
GHSA-m94c-37g6-cjhc
|
Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.
|
### Affected packages
The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected:
* [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects)
* [Link](https://ckeditor.com/cke4/addon/link)
* [Flash](https://ckeditor.com/cke4/addon/flash)
* [Iframe](https://ckeditor.com/cke4/addon/iframe)
* [Forms](https://ckeditor.com/cke4/addon/forms)
* [Page Break](https://ckeditor.com/cke4/addon/pagebreak)
### Impact
A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.16.2.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-37695'}
|
2022-02-08T21:01:40Z
|
2021-08-23T19:42:15Z
|
HIGH
| 7.3
|
{'CWE-79'}
|
{'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37695', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://github.com/advisories/GHSA-m94c-37g6-cjhc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}
| null |
GHSA
|
GHSA-xjrr-xv9m-4pw5
|
High severity vulnerability that affects com.alibaba:fastjson
|
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
|
{'CVE-2017-18349'}
|
2021-09-21T22:35:50Z
|
2018-10-24T19:42:03Z
|
CRITICAL
| 9.8
|
{'CWE-20'}
|
{'https://fortiguard.com/encyclopedia/ips/44059', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18349', 'https://github.com/pippo-java/pippo/issues/466', 'https://github.com/alibaba/fastjson/wiki/security_update_20170315', 'https://github.com/advisories/GHSA-xjrr-xv9m-4pw5'}
| null |
GHSA
|
GHSA-7q8g-gpfp-v8gx
|
Insertion of Sensitive Information into Log File in Apache NiFi
|
In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially containing sensitive values in plaintext.
|
{'CVE-2020-1942'}
|
2022-01-06T20:40:58Z
|
2022-01-06T20:40:58Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-532'}
|
{'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://nifi.apache.org/security.html#CVE-2020-1942', 'https://github.com/advisories/GHSA-7q8g-gpfp-v8gx'}
| null |
GHSA
|
GHSA-46j2-xjgp-jrfm
|
Information disclosure issue in Active Resource
|
There is a possible information disclosure issue in Active Resource <v5.1.1 that could allow an attacker to create specially crafted requests to access data in an unexpected way and possibly leak information.
|
{'CVE-2020-8151'}
|
2021-10-08T19:59:27Z
|
2020-05-21T21:09:38Z
|
HIGH
| 7.5
|
{'CWE-200', 'CWE-863'}
|
{'https://groups.google.com/forum/#!topic/rubyonrails-security/pktoF4VmiM8', 'https://github.com/advisories/GHSA-46j2-xjgp-jrfm', 'https://github.com/rails/activeresource/commit/0de18f7e96fa90bbf23b16ac11980bc2cb6a716e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8151', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P7B7A4H22DZ522HLDS3JX3NX2CXIOZSR/'}
| null |
GHSA
|
GHSA-x95h-979x-cf3j
|
Policies not properly enforced in bluemonday
|
The bluemonday sanitizer before 1.0.16 for Go, and before 0.0.8 for Python (in pybluemonday), does not properly enforce policies associated with the SELECT, STYLE, and OPTION elements.
|
{'CVE-2021-42576'}
|
2021-10-25T20:07:10Z
|
2021-10-19T20:15:30Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-x95h-979x-cf3j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42576', 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}
| null |
GHSA
|
GHSA-7f63-h6g3-7cwm
|
Cross Site Scripting (XSS) in @finastra/ssr-pages
|
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/2
- https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5
- https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
|
{'CVE-2022-24717'}
|
2022-04-19T19:03:25Z
|
2022-03-01T22:09:25Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5', 'https://github.com/Finastra/ssr-pages/pull/2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717', 'https://github.com/advisories/GHSA-7f63-h6g3-7cwm', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm'}
| null |
GHSA
|
GHSA-hrfh-fp4x-crrq
|
Persistent XSS in newsletter module in Shopware
|
### Impact
Persistent XSS in newsletter module
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
### References
https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020
| null |
2020-11-13T18:26:06Z
|
2020-11-13T18:26:06Z
|
LOW
| 0
|
{'CWE-79'}
|
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020', 'https://github.com/shopware/shopware/security/advisories/GHSA-hrfh-fp4x-crrq', 'https://github.com/advisories/GHSA-hrfh-fp4x-crrq'}
| null |
GHSA
|
GHSA-v8wr-r69p-mmwx
|
Unrestricted Upload of File with Dangerous Type in Drupal core
|
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
|
{'CVE-2020-13675'}
|
2022-02-26T00:24:03Z
|
2022-02-12T00:00:47Z
|
CRITICAL
| 9.8
|
{'CWE-434', 'CWE-284'}
|
{'https://www.drupal.org/sa-core-2021-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13675', 'https://github.com/advisories/GHSA-v8wr-r69p-mmwx'}
| null |
GHSA
|
GHSA-v588-qcp3-jv46
|
Path Traversal in serve
|
Versions of `serve` prior to 7.0.1 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through if the path contains a `/./`, which allows attackers to access hidden folders and files.
## Recommendation
Upgrade to version 7.0.1 or later.
|
{'CVE-2019-5415'}
|
2021-01-08T01:57:36Z
|
2019-03-25T18:03:58Z
|
HIGH
| 0
|
{'CWE-548'}
|
{'https://www.npmjs.com/advisories/1010', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5415', 'https://github.com/advisories/GHSA-v588-qcp3-jv46', 'https://hackerone.com/reports/330724'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.