ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-j9h8-phrw-h4fh
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39144](https://x-stream.github.io/CVE-2021-39144.html). ### Credits Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39144'}
2022-04-22T15:47:37.295193Z
2021-08-25T14:48:19Z
HIGH
null
{'CWE-502', 'CWE-94'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39144', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39144.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'}
null
Maven
GHSA-xm6r-4466-mr74
High severity vulnerability that affects com.orientechnologies:orientdb-core
OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request.
{'CVE-2017-11467'}
2022-03-03T05:12:58.716525Z
2018-10-18T17:40:56Z
CRITICAL
null
{'CWE-269'}
{'http://www.heavensec.org/?p=1703', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11467', 'https://github.com/advisories/GHSA-xm6r-4466-mr74', 'https://github.com/orientechnologies/orientdb', 'https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017'}
null
Maven
GHSA-334p-wv2m-w3vp
Denial of service in Apache Xerces2
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
{'CVE-2009-2625'}
2022-03-03T05:13:12.578512Z
2020-06-15T18:51:30Z
MODERATE
null
null
{'https://rhn.redhat.com/errata/RHSA-2009-1201.html', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'http://secunia.com/advisories/37754', 'http://www.codenomicon.com/labs/xml/', 'http://www.redhat.com/support/errata/RHSA-2011-0858.html', 'http://marc.info/?l=bugtraq&m=125787273209737&w=2', 'http://www.mandriva.com/security/advisories?name=MDVSA-2009:209', 'https://snyk.io/vuln/SNYK-JAVA-XERCES-32014', 'http://www.cert.fi/en/reports/2009/vulnerability2009085.html', 'http://www.openwall.com/lists/oss-security/2009/10/23/6', 'http://www.openwall.com/lists/oss-security/2009/10/26/3', 'http://secunia.com/advisories/50549', 'https://rhn.redhat.com/errata/RHSA-2009-1199.html', 'http://secunia.com/advisories/43300', 'http://www.us-cert.gov/cas/techalerts/TA09-294A.html', 'https://rhn.redhat.com/errata/RHSA-2009-1637.html', 'http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=512921', 'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b', 'http://secunia.com/advisories/37300', 'http://www.us-cert.gov/cas/techalerts/TA10-012A.html', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html', 'http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'http://rhn.redhat.com/errata/RHSA-2012-1537.html', 'https://rhn.redhat.com/errata/RHSA-2009-1200.html', 'http://secunia.com/advisories/36180', 'http://www.securitytracker.com/id?1022680', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html', 'http://secunia.com/advisories/36176', 'http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1', 'http://www.vupen.com/english/advisories/2009/2543', 'http://www.securityfocus.com/bid/35958', 'https://rhn.redhat.com/errata/RHSA-2009-1636.html', 'http://www.networkworld.com/columnists/2009/080509-xml-flaw.html', 'https://rhn.redhat.com/errata/RHSA-2009-1650.html', 'http://www.securityfocus.com/archive/1/507985/100/0/threaded', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'https://rhn.redhat.com/errata/RHSA-2009-1649.html', 'http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2625', 'http://secunia.com/advisories/38231', 'http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026', 'http://www.openwall.com/lists/oss-security/2009/09/06/1', 'http://www.ubuntu.com/usn/USN-890-1', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html', 'http://secunia.com/advisories/37460', 'http://secunia.com/advisories/37671', 'http://secunia.com/advisories/36199', 'http://www.openwall.com/lists/oss-security/2009/10/22/9', 'http://www.debian.org/security/2010/dsa-1984', 'http://rhn.redhat.com/errata/RHSA-2012-1232.html', 'http://secunia.com/advisories/38342', 'http://www.vupen.com/english/advisories/2011/0359', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1', 'http://secunia.com/advisories/36162', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356', 'http://www.redhat.com/support/errata/RHSA-2009-1615.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1', 'http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html', 'http://www.vupen.com/english/advisories/2009/3316'}
null
NuGet
GHSA-h6wf-hvwc-fm77
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0914'}
2022-03-03T05:13:51.386230Z
2021-03-29T21:00:02Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0914', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0914', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-wvhv-rr3v-vhpj
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0823'}
2022-03-03T05:13:23.259926Z
2021-07-28T18:57:11Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0823', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0823'}
null
NuGet
GHSA-8336-mxp6-v5h9
Moderate severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords.
{'CVE-2018-12087'}
2022-03-03T05:13:14.168325Z
2018-10-16T19:51:18Z
MODERATE
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-12087', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12087.pdf', 'https://github.com/advisories/GHSA-8336-mxp6-v5h9'}
null
NuGet
GHSA-4jqc-8m5r-9rpr
Prototype Pollution in set-value
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23440'}
2022-03-30T21:18:05Z
2021-09-13T20:09:36Z
HIGH
null
{'CWE-843', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jonschlinkert/set-value/pull/33', 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452', 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/', 'https://github.com/jonschlinkert/set-value'}
null
NuGet
GHSA-pfrg-w49c-8432
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0768'}
2022-03-03T05:12:40.877885Z
2021-08-02T17:26:23Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0768', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0768'}
null
NuGet
GHSA-w32p-76xr-88pc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-1003'}
2022-03-03T05:13:43.169665Z
2021-03-29T20:59:06Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003'}
null
NuGet
GHSA-g644-6fg4-hrh9
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0830'}
2022-03-03T05:12:58.830075Z
2021-07-28T18:57:47Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0830', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830'}
null
NuGet
GHSA-hfm2-fffh-v47v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197.
{'CVE-2019-1196'}
2022-03-03T05:14:19.261008Z
2021-03-29T20:58:01Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
NuGet
GHSA-hh56-x62g-gvhc
Cross-site scripting in CLEditor
Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element.
{'CVE-2019-1010113'}
2022-03-03T05:13:29.389630Z
2019-07-26T16:10:06Z
MODERATE
null
{'CWE-79'}
{'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113'}
null
NuGet
GHSA-gr4c-5rq6-cgh3
OPC UA applications can allow a remote attacker to determine a Server's private key
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.
{'CVE-2018-7559'}
2022-04-26T19:15:37.218627Z
2018-10-16T19:58:42Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-gr4c-5rq6-cgh3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7559', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'http://www.securityfocus.com/bid/108688'}
null
NuGet
GHSA-8xc6-g8xw-h2c4
YARP Denial of Service Vulnerability
### Impact A denial of service vulnerability exists in how YARP processes input. ### Patches If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1). If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.0-rc.1.22211.2`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.0-rc.1.22211.2). You can do so by updating the `PackageReference` in your `.csproj` file ```diff <ItemGroup> - <PackageReference Include="Yarp.ReverseProxy" Version="1.0.0" /> - <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.0" /> + <PackageReference Include="Yarp.ReverseProxy" Version="1.0.1" /> + <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.1" /> </ItemGroup> ``` or by selecting `1.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`) ![image](https://user-images.githubusercontent.com/25307628/162951795-a30f8ed7-77ef-4c4f-920e-58d9e1587ad1.png) ### References [CVE-2022-26924](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924)
{'CVE-2022-26924'}
2022-05-03T17:46:54.173769Z
2022-04-22T20:23:44Z
HIGH
null
null
{'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-8xc6-g8xw-h2c4', 'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy'}
null
NuGet
GHSA-v726-3vg9-cp34
Missing Authorization in FastReport
An issue was discovered in FastReport before 2020.4.0. It lacks a ScriptSecurity feature and therefore may mishandle (for example) GetType, typeof, TypeOf, DllImport, LoadLibrary, and GetProcAddress.
{'CVE-2020-27998'}
2022-03-03T05:12:53.792598Z
2021-08-02T17:28:16Z
CRITICAL
null
{'CWE-862'}
{'https://github.com/FastReports/FastReport/pull/206', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27998', 'https://securitylab.github.com/advisories/GHSL-2020-143-FastReportsInc-FastReports', 'https://opensource.fast-report.com/2020/09/report-script-security.html', 'https://github.com/FastReports/FastReport/compare/v2020.3.0...v2020.4.0'}
null
NuGet
GHSA-9f8c-f7h4-xghf
Remote code execution in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180.
{'CVE-2020-1057'}
2022-03-03T05:13:38.838364Z
2021-08-02T17:28:53Z
HIGH
null
{'CWE-787', 'CWE-119'}
{'https://github.com/chakra-core/ChakraCore/pull/6500', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1057'}
null
NuGet
GHSA-ppq7-88c7-q879
Cross-Site Request Forgery in PiranhaCMS
In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.
{'CVE-2021-25976'}
2022-03-03T05:13:18.933077Z
2021-11-17T23:42:40Z
HIGH
null
{'CWE-352'}
{'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976', 'https://github.com/PiranhaCMS/piranha.core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25976'}
null
NuGet
GHSA-xx3h-j3cx-8qfj
Insufficient Entropy in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.2 incorrectly converts encryption key source values, resulting in lower than expected entropy. NOTE: this issue exists because of an incomplete fix for CVE-2018-15812.
{'CVE-2018-18326'}
2022-03-03T05:10:44.829651Z
2019-07-05T21:08:20Z
HIGH
null
{'CWE-331'}
{'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://www.dnnsoftware.com/community/security/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18326', 'https://github.com/dnnsoftware/Dnn.Platform/releases'}
null
NuGet
GHSA-rr3c-f55v-qhv5
Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
{'CVE-2018-0764'}
2022-04-27T19:31:57.650394Z
2018-10-16T17:34:00Z
HIGH
null
null
{'https://access.redhat.com/errata/RHSA-2018:0379', 'http://www.securityfocus.com/bid/102387', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0764', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764', 'http://www.securitytracker.com/id/1040152', 'https://github.com/advisories/GHSA-rr3c-f55v-qhv5'}
null
NuGet
GHSA-9q94-v7ch-mxqw
Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
{'CVE-2020-8867'}
2022-03-03T05:13:02.830392Z
2021-08-02T17:35:42Z
MODERATE
null
{'CWE-613', 'CWE-367'}
{'https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8867', 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf', 'https://www.zerodayinitiative.com/advisories/ZDI-20-536/'}
null
NuGet
GHSA-cwp9-956f-vcwh
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1141'}
2022-03-03T05:14:03.020055Z
2021-03-29T20:57:56Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141', 'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
NuGet
GHSA-37pf-w9ff-gqvm
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0927'}
2022-03-03T05:12:47.095852Z
2021-03-29T20:58:59Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-fv38-4c3m-25v8
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0611.
{'CVE-2019-0592'}
2022-03-03T05:14:14.135903Z
2019-04-09T19:43:56Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0592', 'https://github.com/advisories/GHSA-fv38-4c3m-25v8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0592'}
null
NuGet
GHSA-vmf5-924f-25f2
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1103'}
2022-03-03T05:13:55.062872Z
2021-03-29T20:59:12Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'}
null
NuGet
GHSA-5rq8-3wvf-wrfg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0937.
{'CVE-2019-0933'}
2022-03-03T05:13:40.307258Z
2021-03-29T20:59:01Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0933', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-9wx7-jrvc-28mm
Signature verification vulnerability in Stark Bank ecdsa libraries
An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways.
null
2022-03-03T05:13:29.259203Z
2021-11-08T21:51:18Z
HIGH
null
{'CWE-347'}
{'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-dotnet', 'https://github.com/starkbank/ecdsa-python', 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1', 'https://github.com/starkbank/ecdsa-node', 'https://github.com/starkbank/ecdsa-java'}
null
NuGet
GHSA-77rm-9x9h-xj3g
NULL Pointer Dereference in Protocol Buffers
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
{'CVE-2021-22570'}
2022-05-03T04:47:56.706467Z
2022-01-27T00:01:15Z
HIGH
null
{'CWE-476'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/', 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://github.com/protocolbuffers/protobuf', 'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/'}
null
NuGet
GHSA-9735-p6r2-2hgh
Out-of-bounds write
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918.
{'CVE-2019-0911'}
2022-03-03T05:14:13.817901Z
2021-03-29T21:00:00Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-jc8g-xhw5-6x46
Moderate severity vulnerability that affects Microsoft.NETCore.UniversalWindowsPlatform and Microsoft.NETCore.UniversalWindowsPlatform
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
{'CVE-2018-0786'}
2022-03-03T05:14:20.876173Z
2018-10-16T19:59:05Z
HIGH
null
{'CWE-295'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786', 'http://www.securitytracker.com/id/1040152', 'http://www.securityfocus.com/bid/102380', 'https://github.com/advisories/GHSA-jc8g-xhw5-6x46', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0786'}
null
NuGet
GHSA-7mfr-774f-w5r9
Improper Certificate Validation
.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vulnerability".
{'CVE-2017-11770'}
2022-04-12T00:15:31.182843Z
2022-04-12T00:07:34Z
HIGH
null
{'CWE-295'}
{'http://www.securitytracker.com/id/1039787', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11770', 'https://access.redhat.com/errata/RHSA-2017:3248', 'http://www.securityfocus.com/bid/101710', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770'}
null
NuGet
GHSA-x8f7-h444-97w4
The installation wizard in DotNetNuke (DNN) allows privilege escalation
The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.
{'CVE-2015-2794'}
2022-04-26T19:00:16.677963Z
2018-10-16T19:33:42Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-2794', 'http://www.dnnsoftware.com/community/security/security-center', 'https://github.com/advisories/GHSA-x8f7-h444-97w4', 'http://www.securityfocus.com/bid/96373', 'https://www.exploit-db.com/exploits/39777/', 'https://dotnetnuke.codeplex.com/releases/view/615317', 'http://www.dnnsoftware.com/community-blog/cid/155198/workaround-for-potential-security-issue'}
null
NuGet
GHSA-r8hm-w5f7-wj39
Cross-site scripting vulnerability in TinyMCE plugins
### Impact A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.10.0 or higher - Disable the `image` and `link` plugins ### Acknowledgements Tiny Technologies would like to thank Yakir6 for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
null
2022-03-03T05:13:05.261265Z
2021-11-02T15:42:52Z
MODERATE
null
{'CWE-79', 'CWE-64'}
{'https://github.com/tinymce/tinymce', 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0', 'https://pypi.org/project/django-tinymce/3.4.0/', 'https://github.com/jazzband/django-tinymce/issues/366', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39'}
null
NuGet
GHSA-rpch-cqj9-h65r
High severity vulnerability that affects YamlDotNet and YamlDotNet.Signed
YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0.
{'CVE-2018-1000210'}
2022-03-03T05:14:11.211455Z
2018-10-16T17:01:10Z
HIGH
null
{'CWE-502', 'CWE-639'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000210', 'ps://github.com/aaubry/YamlDotNet', 'https://github.com/aaubry/YamlDotNet/blob/f96b7cc40a0498f8bafdeb49df3aa23aa2c60993/YamlDotNet/Serialization/NodeTypeResolvers/TypeNameInTagNodeTypeResolver.cs#L35', 'https://github.com/advisories/GHSA-rpch-cqj9-h65r', 'https://github.com/aaubry/YamlDotNet#version-500'}
null
NuGet
GHSA-g6j2-ch25-5mmv
Missing Token Replay Detection in Saml2 Authentication services for ASP.NET
### Impact Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented. Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use. ### Patches The 2.5.0 version is patched. ### Workarounds There are no workarounds with existing versions. Fixing the issue requires code updates. ### References https://en.wikipedia.org/wiki/Replay_attack ### For more information If you have any questions or comments about this advisory: * Comment on #711. * Email us at [security@sustainsys.com](mailto:security@susatinsys.com) if you think that there are further security issues.
{'CVE-2020-5261'}
2022-03-03T05:12:39.287527Z
2020-03-25T16:52:49Z
HIGH
null
{'CWE-294'}
{'https://github.com/Sustainsys/Saml2/issues/711', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5261', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'}
null
NuGet
GHSA-74r6-grj9-8rq6
Remote Code Execution in AjaxNetProfessional
All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
{'CVE-2021-23758'}
2022-03-03T05:14:12.800341Z
2021-12-16T15:27:55Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
null
NuGet
GHSA-59cj-99cw-rq64
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0913'}
2022-03-03T05:13:23.375718Z
2021-03-29T21:00:05Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-5p67-cp9c-hqw4
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833.
{'CVE-2020-0848'}
2022-03-03T05:12:36.897149Z
2021-07-28T18:57:19Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0848', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0848'}
null
NuGet
GHSA-wvpv-ffcv-r6cw
Internal NCryptDecrypt method could be used externally from WindowsHello library.
### Impact Every user of the library before version 1.0.4. ### Patches Patched in 1.0.4+. ### Workarounds None. ### References https://github.com/SeppPenner/WindowsHello/issues/3 ### For more information It this library is used to encrypt text and write the output to a txt file, another executable could be able to decrypt the text using the static method NCryptDecrypt from this same library without the need to use Windows Hello Authentication again.
{'CVE-2020-11005'}
2022-03-03T05:13:49.297252Z
2020-04-14T23:09:13Z
MODERATE
null
{'CWE-288'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11005', 'https://github.com/SeppPenner/WindowsHello/security/advisories/GHSA-wvpv-ffcv-r6cw', 'https://github.com/SeppPenner/WindowsHello/issues/3'}
null
NuGet
GHSA-mm6g-mmq6-53ff
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability.
{'CVE-2021-32842'}
2022-03-03T05:13:53.676790Z
2022-02-01T16:23:00Z
MODERATE
null
{'CWE-22'}
{'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32842', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'}
null
NuGet
GHSA-7j34-xq9v-9mqg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0827'}
2022-03-03T05:13:49.361577Z
2021-07-28T18:56:52Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0827'}
null
NuGet
GHSA-frxg-hf44-q765
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp
### Impact Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server is owned and operated by DisCatSharp's development team. The tokens were not logged, yet it is still advisable to reset the tokens of potentially affected bots. ### Patches 9.9.1 has been released to patch the issue for the current stable release and the current 10.0.0 prereleases are also no longer affected. ### Workarounds Remove all uses of the two `RequireDisCatSharpDeveloperAttribute`s and all direct calls to `BaseDiscordClient.LibraryDeveloperTeam`. ### Details The `HttpClient` responsible for sending requests to the Discord API was erroneously reused to send requests to our website when DisCatSharp's team members were to be fetched. ### For more information If you have any questions or comments about this advisory: * Join our [Discord server](https://discord.gg/GGYSywkxwN) * Email us at [ottero@aitsys.dev](mailto:ottero@aitsys.dev)
{'CVE-2022-24849'}
2022-04-22T20:45:21.650681Z
2022-04-22T20:39:47Z
MODERATE
null
{'CWE-200'}
{'https://github.com/Aiko-IT-Systems/DisCatSharp', 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849'}
null
NuGet
GHSA-8hfj-j24r-96c4
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarounds Sanitize user-provided locale name before passing it to moment.js. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [moment repo](https://github.com/moment/moment)
{'CVE-2022-24785'}
2022-04-26T21:00:11.102341Z
2022-04-04T21:25:48Z
HIGH
null
{'CWE-27', 'CWE-22'}
{'https://github.com/moment/moment', 'https://www.tenable.com/security/tns-2022-09', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}
null
NuGet
GHSA-mg98-x2cm-4cpf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.
{'CVE-2019-1106'}
2022-03-03T05:13:07.842305Z
2021-03-29T20:59:15Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}
null
NuGet
GHSA-j66f-h9hm-975m
Unrestricted Upload of File with Dangerous Type in Umbraco CMS
Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.
{'CVE-2020-9472'}
2022-03-03T05:12:56.279188Z
2021-08-02T17:38:56Z
MODERATE
null
{'CWE-434'}
{'https://gitlab.com/eLeN3Re/cve-2020-9472', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9472'}
null
NuGet
GHSA-hpf7-4c2g-9chf
Remote Code Execution in Halibut
In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification.
{'CVE-2021-31819'}
2022-03-03T05:13:48.353348Z
2021-09-23T23:17:07Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/OctopusDeploy/Halibut', 'https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31819'}
null
NuGet
GHSA-hpw7-3vq3-mmv6
Insecure deserialization in Wire
Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end. **This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019** This also applies to the fork of Wire, AkkaDotNet/Hyperion.
{'CVE-2021-29508'}
2022-03-03T05:14:05.027870Z
2021-05-19T23:02:38Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/AsynkronIT/Wire/security/advisories/GHSA-hpw7-3vq3-mmv6', 'https://www.nuget.org/packages/Wire/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29508'}
null
NuGet
GHSA-6973-94v8-5mgw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0991'}
2022-03-03T05:11:51.614144Z
2021-03-29T20:57:42Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}
null
NuGet
GHSA-r8hp-5m7c-jhv4
Cross-site Scripting OrchardCore.Application.Cms.Targets
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
{'CVE-2022-0274'}
2022-03-03T05:10:01.498753Z
2022-01-21T23:08:50Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0274', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}
null
NuGet
GHSA-p23j-g745-8449
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.
{'CVE-2019-1335'}
2022-03-03T05:13:53.507688Z
2021-03-29T20:55:40Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
null
NuGet
GHSA-4vr3-9v7h-5f8v
Low severity vulnerability that affects Gw2Sharp
## Leaking cached authenticated requests ### Impact If you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug. When using an instance of `MemoryCacheMethod` and using it with multiple instances of `Gw2WebApiClient`, there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint. The occurence of this is limited however. The Guild Wars 2 API doesn't use the `Expires` header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen. ### Patches This bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id. ### Workarounds For version 0.3.0 and lower, you can use one separate instance of `MemoryCacheMethod` per `Gw2WebApiClient` if you need to use it. ### For more information If you have any questions or comments about this advisory, you can open an issue in [the Gw2Sharp repository](https://github.com/Archomeda/Gw2Sharp) or contact me on [Discord](https://discord.gg/hNcpDT3).
null
2022-03-03T05:13:29.903003Z
2019-06-18T15:38:41Z
LOW
null
null
{'https://github.com/advisories/GHSA-4vr3-9v7h-5f8v', 'https://github.com/Archomeda/Gw2Sharp/security/advisories/GHSA-4vr3-9v7h-5f8v', 'https://github.com/Archomeda/Gw2Sharp'}
null
NuGet
GHSA-j89m-gcjf-6ghp
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0825'}
2022-03-03T05:13:03.264453Z
2021-07-28T18:57:02Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825'}
null
NuGet
GHSA-7ph8-f946-q5r7
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0592.
{'CVE-2019-0611'}
2022-03-03T05:12:48.782454Z
2019-04-09T19:43:54Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0611', 'https://github.com/advisories/GHSA-7ph8-f946-q5r7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611'}
null
NuGet
GHSA-9pq7-rcxv-47vq
Incorrect Regular Expression in RestSharp
RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.
{'CVE-2021-27293'}
2022-03-03T05:13:17.456498Z
2021-07-14T19:10:01Z
HIGH
null
{'CWE-697', 'CWE-185'}
{'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293', 'https://restsharp.dev/', 'https://github.com/restsharp/RestSharp/issues/1556'}
null
NuGet
GHSA-936x-wgqv-hhgq
Authenticated path traversal in Umbraco CMS
An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.
{'CVE-2020-5811'}
2022-03-03T05:14:06.221233Z
2021-04-13T15:51:33Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5811', 'http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html', 'https://www.tenable.com/security/research/tra-2020-59'}
null
NuGet
GHSA-qv8q-v995-72gr
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2022-03-03T05:12:56.256760Z
2020-09-09T17:29:38Z
LOW
null
null
{'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'}
null
NuGet
GHSA-vv6j-ww6x-54gx
Use after free in Animation
CVE-2022-0609: Use after free in Animation - https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0609 Google is aware of reports that exploits for CVE-2022-0609 exist in the wild. The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are unknown but an exploit is available. There is currently little other public information on the issue other than it has been flagged as `High` severity.
{'CVE-2022-0609'}
2022-04-12T15:17:10.107557Z
2022-02-22T21:51:19Z
HIGH
null
{'CWE-416'}
{'https://crbug.com/1296150', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0609', 'https://github.com/cefsharp/CefSharp', 'https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx'}
null
NuGet
GHSA-xc6x-cq47-9chw
Vulnerability in Azure Active Directory Authentication Library
An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'.
{'CVE-2019-1258'}
2022-03-03T05:12:47.576526Z
2019-08-16T14:03:35Z
HIGH
null
null
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258', 'https://github.com/AzureAD/azure-activedirectory-library-for-dotnet'}
null
NuGet
GHSA-qhqf-ghgh-x2m4
High severity vulnerability that affects Microsoft.AspNetCore.Mvc
See https://nvd.nist.gov/vuln/detail/CVE-2017-0249 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0249
{'CVE-2017-0249'}
2022-03-03T05:13:21.724556Z
2018-10-16T19:57:38Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-qhqf-ghgh-x2m4', 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7', 'https://github.com/aspnet/Announcements/issues/239', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0249'}
null
NuGet
GHSA-758c-g2ff-9444
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1140'}
2022-03-03T05:12:54.256618Z
2021-03-29T20:57:49Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1140', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1140'}
null
NuGet
GHSA-2ghc-6v89-pw9j
Prototype Pollution in body-parser-xml
body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3666'}
2021-09-14T18:39:31Z
2021-09-14T20:25:35Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://github.com/fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63', 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml'}
null
NuGet
GHSA-35hc-x2cw-2j4v
Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents
A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.
{'CVE-2018-0765'}
2022-04-26T19:15:39.357896Z
2018-10-16T19:54:06Z
HIGH
null
{'CWE-611'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765', 'http://www.securitytracker.com/id/1040851', 'http://www.securityfocus.com/bid/104060', 'https://github.com/advisories/GHSA-35hc-x2cw-2j4v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0765'}
null
NuGet
GHSA-8j9v-h2vp-2hhv
XSS in HtmlSanitizer
### Impact If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag. ### Patches The problem has been fixed in version 5.0.372. ### Workarounds Remove the `<style>` tag from the set of allowed tags. ### For more information If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer ### Credits This issue was discovered by Michal Bentkowski of Securitum.
{'CVE-2020-26293'}
2022-03-03T05:12:47.065847Z
2021-01-04T18:22:11Z
LOW
null
{'CWE-79', 'CWE-74'}
{'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372', 'https://www.nuget.org/packages/HtmlSanitizer/', 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv', 'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293'}
null
NuGet
GHSA-5whq-j5qg-wjvp
Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke
Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function.
{'CVE-2019-12562'}
2022-03-03T05:13:27.973694Z
2019-11-18T17:16:06Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12562', 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html', 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/'}
null
NuGet
GHSA-cxw4-9qv9-vx5h
High severity vulnerability that affects PeterO.Cbor
### Impact The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved. The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication. ### Patches This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library. ### Workarounds Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution. In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows: CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false")); In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows: if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) { cbor.EncodeToBytes(); } Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory. using(var stream = new LimitedMemoryStream(100000)) { // Limit to 100000 bytes cbor.WriteTo(stream); return stream.ToBytes(); } To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings). ### References See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253). ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
null
2022-03-03T05:13:40.103880Z
2019-09-30T19:42:28Z
HIGH
null
null
{'https://github.com/peteroupc/CBOR/security/advisories/GHSA-cxw4-9qv9-vx5h', 'https://github.com/peteroupc/CBOR'}
null
NuGet
GHSA-88cw-3m6x-49f7
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048.
{'CVE-2020-17054'}
2022-03-03T05:13:17.628779Z
2021-08-02T17:25:58Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'}
null
NuGet
GHSA-wc43-7wj6-4ggr
Remote code execution in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1172.
{'CVE-2020-1180'}
2022-03-03T05:13:07.501354Z
2021-08-02T17:29:09Z
HIGH
null
{'CWE-787'}
{'https://github.com/microsoft/ChakraCore/pull/6500', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1180', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180'}
null
NuGet
GHSA-pcgf-qjx2-qv4q
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1217'}
2022-03-03T05:14:05.834729Z
2021-03-29T20:56:08Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1217', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217', 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e'}
null
NuGet
GHSA-5h9g-x5rv-25wg
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.9.0 or higher - Manually sanitize the content using the `BeforeSetContent` event (see below) #### Example: Manually sanitize content ```js editor.on('BeforeSetContent', function(e) { var sanitizedContent = ...; // Manually sanitize content here e.content = sanitizedContent; }); ``` ### Acknowledgements Tiny Technologies would like to thank William Bowling for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
null
2022-03-03T05:13:16.708960Z
2021-10-22T16:24:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes'}
null
NuGet
GHSA-pf46-gqg9-j3v3
Insufficient Entropy in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.
{'CVE-2018-15812'}
2022-03-03T05:13:10.919609Z
2019-07-05T21:08:24Z
HIGH
null
{'CWE-331'}
{'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://www.dnnsoftware.com/community/security/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15812', 'https://github.com/dnnsoftware/Dnn.Platform/releases'}
null
NuGet
GHSA-vpc2-7xmf-ppmf
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.
{'CVE-2020-17048'}
2022-03-03T05:14:01.644069Z
2021-08-02T17:26:11Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://github.com/chakra-core/ChakraCore/pull/6528'}
null
NuGet
GHSA-3m2r-q8x3-xmf7
Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.Server.Kestrel.Core, Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions, and Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv
Microsoft made an internal discovery of a security vulnerability in version 2.x of ASP.NET Core where a specially crafted request can cause excess resource consumption in Kestrel.
null
2022-03-03T05:13:45.943675Z
2018-10-16T19:59:48Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-3m2r-q8x3-xmf7', 'https://github.com/aspnet/Announcements/issues/300'}
null
NuGet
GHSA-j3g9-6fx5-gjv7
Inadequate Encryption Strength in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811.
{'CVE-2018-18325'}
2022-03-03T05:13:46.422387Z
2019-07-05T21:08:16Z
HIGH
null
{'CWE-326'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18325', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://www.dnnsoftware.com/community/security/security-center', 'https://github.com/dnnsoftware/Dnn.Platform/releases'}
null
NuGet
GHSA-v648-p92f-9996
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0925'}
2022-03-03T05:14:19.461609Z
2021-03-29T20:57:39Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-fm9p-5m9f-rq85
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0915'}
2022-03-03T05:13:09.041076Z
2021-03-29T21:00:03Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-j378-6mmw-hqfr
Denial of service vulnerability exists when System.IO.Pipelines improperly handles requests
A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1.
{'CVE-2018-8409'}
2022-04-26T19:15:14.276742Z
2018-10-16T19:56:38Z
HIGH
null
null
{'http://www.securityfocus.com/bid/105223', 'https://github.com/advisories/GHSA-j378-6mmw-hqfr', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8409', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8409'}
null
NuGet
GHSA-jp7f-grcv-6mjf
Partial path traversal in sharpcompress
SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However it is not enforced that fullDestinationDirectoryPath ends with slash: ```csharp public static void WriteEntryToDirectory(IEntry entry, string destinationDirectory, ExtractionOptions? options, Action<string, ExtractionOptions?> write) { string destinationFileName; string file = Path.GetFileName(entry.Key); string fullDestinationDirectoryPath = Path.GetFullPath(destinationDirectory); ... throw new ExtractionException("Entry is trying to write a file outside of the destination directory."); } ``` If the destinationDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh. #### Impact Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case.
{'CVE-2021-39208'}
2022-03-03T05:12:28.667741Z
2021-09-20T19:53:42Z
MODERATE
null
{'CWE-22'}
{'https://github.com/adamhathcock/sharpcompress', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39208', 'https://github.com/adamhathcock/sharpcompress/pull/614', 'https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf', 'https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0'}
null
NuGet
GHSA-h23m-w6x5-jwr4
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0923'}
2022-03-03T05:14:08.577126Z
2021-03-29T21:00:08Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-prxj-c66c-4gcf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0924'}
2022-03-03T05:12:53.230422Z
2021-03-29T21:00:12Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-6r92-cgxc-r5fg
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was privately reported to me. ### Patches This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.) ### Workarounds Again, users should use the latest version of this library. In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if&mdash; - it begins with a byte other than 0x80 through 0xDF, or - it does not contain a byte in the range 0xa0 through 0xBF. Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
null
2022-03-03T05:12:53.419938Z
2022-01-21T23:35:35Z
HIGH
null
{'CWE-407'}
{'https://github.com/peteroupc/CBOR', 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}
null
NuGet
GHSA-j8f4-2w4p-mhjc
Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc
A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.
{'CVE-2017-0256'}
2022-03-03T05:13:20.152974Z
2018-10-16T19:57:48Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0256', 'https://github.com/advisories/GHSA-j8f4-2w4p-mhjc', 'https://github.com/aspnet/Announcements/issues/239'}
null
NuGet
GHSA-v89p-5hr2-4rh4
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196.
{'CVE-2019-1197'}
2022-03-03T05:12:53.493944Z
2021-03-29T20:56:15Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
NuGet
GHSA-gcx5-3p5f-f8vp
Prototype Pollution in jquery.cookie
jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS).
{'CVE-2022-23395'}
2022-03-29T22:17:02.151963Z
2022-03-03T00:00:51Z
MODERATE
null
{'CWE-1321'}
{'https://security.netapp.com/advisory/ntap-20220325-0008/', 'https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23395'}
null
NuGet
GHSA-5q7q-qqw2-hjq7
Cross-Site Scripting in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects. ### Description Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network. ### Releases Releases before version 21.12.22.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds A workaround exists that replaces one of the core JavaScript files embedded in the library. Using a XML configuration allows to replace the default JavaScript code to be replaced with the version on GitHub. ```xml <configuration> <configSections> <sectionGroup name="ajaxNet"> <section name="ajaxSettings" type="AjaxPro.AjaxSettingsSectionHandler,AjaxPro.2" requirePermission="false" restartOnExternalChanges="true"/> </sectionGroup> </configSections> <ajaxNet> <ajaxSettings> <coreScript>~/ajaxpro-core-fixed.js</coreScript> </ajaxSettings> </ajaxNet> </configuration> ``` Copy the file core.js from the main project folder to your web server root folder and rename that ajaxpro-core-fixed.js. Clients need to refresh the web page to download the changed JavaScript code. ### References Commit fixing the issue: c89e39b9679fcb8ab6644fe21cc7e652cb615e2b Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
{'CVE-2021-43853'}
2022-03-03T05:13:21.805430Z
2022-01-06T18:32:24Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43853', 'https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b', 'https://github.com/michaelschwarz/Ajax.NET-Professional', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7'}
null
NuGet
GHSA-8gvg-8vhf-h26g
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.
{'CVE-2019-0937'}
2022-03-03T05:12:59.188688Z
2021-03-29T20:59:03Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-5c66-x4wm-rjfx
Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN)
Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN) before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted onclick attribute in an IMG element.
{'CVE-2016-7119'}
2022-04-26T19:00:22.687679Z
2018-10-16T19:34:10Z
MODERATE
null
{'CWE-79'}
{'http://www.dnnsoftware.com/community/security/security-center', 'https://github.com/advisories/GHSA-5c66-x4wm-rjfx', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7119', 'http://www.securityfocus.com/bid/92719'}
null
NuGet
GHSA-8qh8-cv77-h83g
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0769'}
2022-03-03T05:13:37.186860Z
2019-04-09T19:43:46Z
HIGH
null
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0769', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769', 'https://github.com/advisories/GHSA-8qh8-cv77-h83g'}
null
NuGet
GHSA-rx34-jff5-ph35
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0917'}
2022-03-03T05:13:15.368520Z
2021-03-29T21:00:06Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
null
NuGet
GHSA-c8qc-62qv-5p2x
Out-of-bounds Write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0828'}
2022-03-03T05:13:32.403759Z
2021-07-28T18:58:22Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0828', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0828'}
null
NuGet
GHSA-6r7c-6w96-8pvw
Remote Code Execution in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. ### Description Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc. Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products. An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands). ### Releases Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds There is no workaround available that addresses all issues except updating to latest version from GitHub. ### References Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
null
2022-03-03T05:11:30.895768Z
2021-12-07T21:21:49Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://github.com/michaelschwarz/Ajax.NET-Professional', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
null
NuGet
GHSA-h595-8pw6-5q6v
Inadequate Encryption Strength in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.
{'CVE-2018-15811'}
2022-03-03T05:12:54.928562Z
2019-07-05T21:08:36Z
HIGH
null
{'CWE-326'}
{'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15811', 'https://www.dnnsoftware.com/community/security/security-center', 'https://github.com/dnnsoftware/Dnn.Platform/releases'}
null
NuGet
GHSA-782p-53wq-cxmj
High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
{'CVE-2018-12086'}
2022-03-03T05:12:04.070778Z
2018-10-16T19:51:31Z
HIGH
null
{'CWE-787'}
{'http://www.securitytracker.com/id/1041909', 'http://www.securityfocus.com/bid/105538', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12086', 'https://www.debian.org/security/2018/dsa-4359', 'https://github.com/advisories/GHSA-782p-53wq-cxmj', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf'}
null
NuGet
GHSA-jvjp-vh27-r9h5
Cross-site Scripting in PiranhaCMS
In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution.
{'CVE-2021-25977'}
2022-03-03T05:14:07.242632Z
2021-10-27T18:53:03Z
MODERATE
null
{'CWE-79'}
{'https://github.com/PiranhaCMS/piranha.core', 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'}
null
NuGet
GHSA-c9cg-q8r2-xvjq
Improper Authentication in Auth0.AuthenticationApi
Auth0 auth0.net before 6.5.4 has Incorrect Access Control because IdentityTokenValidator can be accidentally used to validate untrusted ID tokens.
{'CVE-2019-16929'}
2022-03-03T05:14:20.663129Z
2019-10-24T20:56:12Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16929', 'https://auth0.com/docs/security/bulletins/cve-2019-16929'}
null
NuGet
GHSA-mw7r-3g6w-85qg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1131'}
2022-03-03T05:12:46.071533Z
2021-03-29T20:57:46Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
NuGet
GHSA-2rfj-2mwp-787v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-0993'}
2022-03-03T05:11:34.130533Z
2021-03-29T20:57:51Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}
null
NuGet
GHSA-q7cg-43mg-qp69
ASP.NET Core Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. An information disclosure vulnerability exists in .NET 5.0, .NET Core 3.1 and .NET Core 2.1 where a JWT token is logged if it cannot be parsed. ### Patches * If you're using .NET 5.0, you should download and install Runtime 5.0.9 or SDK 5.0.206 (for Visual Studio 2019 v16.8) or SDK 5.0.303 (for Visual Studio 2019 V16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0. * If you're using .NET Core 3.1, you should download and install Runtime 3.1.18 or SDK 3.1.118 (for Visual Studio 2019 v16.4) or 3.1.412 (for Visual Studio 2019 v16.7 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1. * If you're using .NET Core 2.1, you should download and install Runtime 2.1.29 or SDK 2.1.525 (for Visual Studio 2019 v15.9) or 2.1.817 from https://dotnet.microsoft.com/download/dotnet-core/2.1. * If your application is using .NET Core 2.1 running on .NET Framework see the [Updating .NET Core 2.1 on .NET Framework](#updating-2.1) section below. ### <a name="updating-2.1"></a> Updating .NET Core 2.1 on .NET Framework If you are running .NET Core 2.1 on .NET Framework you need to check your projects for dependencies and update them accordingly. #### Direct dependencies Direct dependencies are discoverable by examining your `csproj` file. They can be fixed by [editing the project file](#fixing-direct-dependencies) or using NuGet to update the dependency. #### Transitive dependencies Transitive dependencies occur when you add a package to your project that in turn relies on another package. For example, if Contoso publishes a package `Contoso.Utility` which, in turn, depends on `Contoso.Internals` and you add the `Contoso.Utility` package to your project now your project has a direct dependency on `Contoso.Utility` and, because `Contoso.Utility` depends 'Contoso.Internals', your application gains a transitive dependency on the `Contoso.Internals` package. Transitive dependencies are reviewable in two ways: * In the Visual Studio Solution Explorer window, which supports searching. * By examining the `project.assets.json` file contained in the obj directory of your project for `csproj` based projects The `project.assets.json` files are the authoritative list of all packages used by your project, containing both direct and transitive dependencies. There are two ways to view transitive dependencies. You can either [use Visual Studio’s Solution Explorer](#vs-solution-explorer), or you can review [the `project.assets.json` file](#project-assets-json)). ##### <a name="vs-solution-explorer"></a>Using Visual Studio Solution Explorer To use Solution Explorer, open the project in Visual Studio, and then press Ctrl+; to activate the search in Solution Explorer. Search for the [vulnerable package](#affected-software) and make a note of the version numbers of any results you find. For example, search for `Microsoft.AspNetCore.Authentication.JwtBearer` and update the package to the latest version ##### <a name="project-assets-json"></a> Manually reviewing project.assets.json Open the *project.assets.json* file from your project’s obj directory in your editor. We suggest you use an editor that understands JSON and allows you to collapse and expand nodes to review this file. Visual Studio and Visual Studio Code provide JSON friendly editing. Search the *project.assets.json* file for the [vulnerable package](#affected-software), using the format `packagename/` for each of the package names from the preceding table. If you find the assembly name in your search: * Examine the line on which they are found, the version number is after the `/`. * Compare to the [vulnerable versions table](#affected-software). For example, a search result that shows `Microsoft.AspNetCore.Authentication.JwtBearer/2.1.0` is a reference to version 2.1.1 of `Microsoft.AspNetCore.Authentication.JwtBearer`. If your *project.assets.json* file includes references to the [vulnerable package](#affected-software), then you need to fix the transitive dependencies. If you have not found any reference to any vulnerable packages, this means either * None of your direct dependencies depend on any vulnerable packages, or * You have already fixed the problem by updating the direct dependencies. #### Other Details - Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/195 - An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/35246 - MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34532
{'CVE-2021-34532'}
2022-03-03T05:13:20.585140Z
2021-08-25T14:45:28Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34532', 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-q7cg-43mg-qp69', 'https://github.com/dotnet/aspnetcore', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34532'}
null
NuGet
GHSA-vhvh-528q-ff3p
Security feature bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated
A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2.
{'CVE-2018-8171'}
2022-04-26T19:15:58.108161Z
2018-10-16T19:56:50Z
HIGH
null
{'CWE-287'}
{'http://www.securityfocus.com/bid/104659', 'http://www.securitytracker.com/id/1041267', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8171', 'https://github.com/advisories/GHSA-vhvh-528q-ff3p', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8171'}
null
NuGet
GHSA-pjpj-f6r8-56rm
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0609'}
2022-03-03T05:12:48.624001Z
2019-04-09T19:43:59Z
HIGH
null
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0609', 'https://github.com/advisories/GHSA-pjpj-f6r8-56rm'}
null
NuGet
GHSA-pwpr-vp2v-99xw
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1138'}
2022-03-03T05:13:05.852214Z
2021-03-29T20:56:11Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1138'}
null
NuGet
GHSA-q99r-j969-6jwr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1237'}
2022-03-03T05:13:44.392146Z
2021-03-29T20:56:04Z
HIGH
null
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237'}
null