ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-j9h8-phrw-h4fh | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39144](https://x-stream.github.io/CVE-2021-39144.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Email us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39144'} | 2022-04-22T15:47:37.295193Z | 2021-08-25T14:48:19Z | HIGH | null | {'CWE-502', 'CWE-94'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39144', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39144.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/x-stream/xstream'} | null |
Maven | GHSA-xm6r-4466-mr74 | High severity vulnerability that affects com.orientechnologies:orientdb-core | OrientDB through 2.2.22 does not enforce privilege requirements during "where" or "fetchplan" or "order by" use, which allows remote attackers to execute arbitrary OS commands via a crafted request. | {'CVE-2017-11467'} | 2022-03-03T05:12:58.716525Z | 2018-10-18T17:40:56Z | CRITICAL | null | {'CWE-269'} | {'http://www.heavensec.org/?p=1703', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11467', 'https://github.com/advisories/GHSA-xm6r-4466-mr74', 'https://github.com/orientechnologies/orientdb', 'https://github.com/orientechnologies/orientdb/wiki/OrientDB-2.2-Release-Notes#2223---july-11-2017'} | null |
Maven | GHSA-334p-wv2m-w3vp | Denial of service in Apache Xerces2 | XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework. | {'CVE-2009-2625'} | 2022-03-03T05:13:12.578512Z | 2020-06-15T18:51:30Z | MODERATE | null | null | {'https://rhn.redhat.com/errata/RHSA-2009-1201.html', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:108', 'http://secunia.com/advisories/37754', 'http://www.codenomicon.com/labs/xml/', 'http://www.redhat.com/support/errata/RHSA-2011-0858.html', 'http://marc.info/?l=bugtraq&m=125787273209737&w=2', 'http://www.mandriva.com/security/advisories?name=MDVSA-2009:209', 'https://snyk.io/vuln/SNYK-JAVA-XERCES-32014', 'http://www.cert.fi/en/reports/2009/vulnerability2009085.html', 'http://www.openwall.com/lists/oss-security/2009/10/23/6', 'http://www.openwall.com/lists/oss-security/2009/10/26/3', 'http://secunia.com/advisories/50549', 'https://rhn.redhat.com/errata/RHSA-2009-1199.html', 'http://secunia.com/advisories/43300', 'http://www.us-cert.gov/cas/techalerts/TA09-294A.html', 'https://rhn.redhat.com/errata/RHSA-2009-1637.html', 'http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=512921', 'https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b', 'http://secunia.com/advisories/37300', 'http://www.us-cert.gov/cas/techalerts/TA10-012A.html', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html', 'http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html', 'http://rhn.redhat.com/errata/RHSA-2012-1537.html', 'https://rhn.redhat.com/errata/RHSA-2009-1200.html', 'http://secunia.com/advisories/36180', 'http://www.securitytracker.com/id?1022680', 'http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html', 'http://secunia.com/advisories/36176', 'http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520', 'http://www.vmware.com/security/advisories/VMSA-2009-0016.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1', 'http://www.vupen.com/english/advisories/2009/2543', 'http://www.securityfocus.com/bid/35958', 'https://rhn.redhat.com/errata/RHSA-2009-1636.html', 'http://www.networkworld.com/columnists/2009/080509-xml-flaw.html', 'https://rhn.redhat.com/errata/RHSA-2009-1650.html', 'http://www.securityfocus.com/archive/1/507985/100/0/threaded', 'http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html', 'https://rhn.redhat.com/errata/RHSA-2009-1649.html', 'http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2009-2625', 'http://secunia.com/advisories/38231', 'http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026', 'http://www.openwall.com/lists/oss-security/2009/09/06/1', 'http://www.ubuntu.com/usn/USN-890-1', 'https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html', 'http://secunia.com/advisories/37460', 'http://secunia.com/advisories/37671', 'http://secunia.com/advisories/36199', 'http://www.openwall.com/lists/oss-security/2009/10/22/9', 'http://www.debian.org/security/2010/dsa-1984', 'http://rhn.redhat.com/errata/RHSA-2012-1232.html', 'http://secunia.com/advisories/38342', 'http://www.vupen.com/english/advisories/2011/0359', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1', 'http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1', 'http://secunia.com/advisories/36162', 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356', 'http://www.redhat.com/support/errata/RHSA-2009-1615.html', 'http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1', 'http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html', 'http://www.vupen.com/english/advisories/2009/3316'} | null |
NuGet | GHSA-h6wf-hvwc-fm77 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0914'} | 2022-03-03T05:13:51.386230Z | 2021-03-29T21:00:02Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0914', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0914', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-wvhv-rr3v-vhpj | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0823'} | 2022-03-03T05:13:23.259926Z | 2021-07-28T18:57:11Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0823', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0823'} | null |
NuGet | GHSA-8336-mxp6-v5h9 | Moderate severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua | Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords. | {'CVE-2018-12087'} | 2022-03-03T05:13:14.168325Z | 2018-10-16T19:51:18Z | MODERATE | null | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-12087', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12087.pdf', 'https://github.com/advisories/GHSA-8336-mxp6-v5h9'} | null |
NuGet | GHSA-4jqc-8m5r-9rpr | Prototype Pollution in set-value | This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays. | {'CVE-2021-23440'} | 2022-03-30T21:18:05Z | 2021-09-13T20:09:36Z | HIGH | null | {'CWE-843', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jonschlinkert/set-value/pull/33', 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452', 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/', 'https://github.com/jonschlinkert/set-value'} | null |
NuGet | GHSA-pfrg-w49c-8432 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0768'} | 2022-03-03T05:12:40.877885Z | 2021-08-02T17:26:23Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0768', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0768'} | null |
NuGet | GHSA-w32p-76xr-88pc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-1003'} | 2022-03-03T05:13:43.169665Z | 2021-03-29T20:59:06Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003'} | null |
NuGet | GHSA-g644-6fg4-hrh9 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0830'} | 2022-03-03T05:12:58.830075Z | 2021-07-28T18:57:47Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0830', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830'} | null |
NuGet | GHSA-hfm2-fffh-v47v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197. | {'CVE-2019-1196'} | 2022-03-03T05:14:19.261008Z | 2021-03-29T20:58:01Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
NuGet | GHSA-hh56-x62g-gvhc | Cross-site scripting in CLEditor | Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element. | {'CVE-2019-1010113'} | 2022-03-03T05:13:29.389630Z | 2019-07-26T16:10:06Z | MODERATE | null | {'CWE-79'} | {'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113'} | null |
NuGet | GHSA-gr4c-5rq6-cgh3 | OPC UA applications can allow a remote attacker to determine a Server's private key | An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack. | {'CVE-2018-7559'} | 2022-04-26T19:15:37.218627Z | 2018-10-16T19:58:42Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-gr4c-5rq6-cgh3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7559', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'http://www.securityfocus.com/bid/108688'} | null |
NuGet | GHSA-8xc6-g8xw-h2c4 | YARP Denial of Service Vulnerability | ### Impact
A denial of service vulnerability exists in how YARP processes input.
### Patches
If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1).
If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.0-rc.1.22211.2`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.0-rc.1.22211.2).
You can do so by updating the `PackageReference` in your `.csproj` file
```diff
<ItemGroup>
- <PackageReference Include="Yarp.ReverseProxy" Version="1.0.0" />
- <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.0" />
+ <PackageReference Include="Yarp.ReverseProxy" Version="1.0.1" />
+ <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.1" />
</ItemGroup>
```
or by selecting `1.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`)

### References
[CVE-2022-26924](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924) | {'CVE-2022-26924'} | 2022-05-03T17:46:54.173769Z | 2022-04-22T20:23:44Z | HIGH | null | null | {'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-8xc6-g8xw-h2c4', 'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy'} | null |
NuGet | GHSA-v726-3vg9-cp34 | Missing Authorization in FastReport | An issue was discovered in FastReport before 2020.4.0. It lacks a ScriptSecurity feature and therefore may mishandle (for example) GetType, typeof, TypeOf, DllImport, LoadLibrary, and GetProcAddress. | {'CVE-2020-27998'} | 2022-03-03T05:12:53.792598Z | 2021-08-02T17:28:16Z | CRITICAL | null | {'CWE-862'} | {'https://github.com/FastReports/FastReport/pull/206', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27998', 'https://securitylab.github.com/advisories/GHSL-2020-143-FastReportsInc-FastReports', 'https://opensource.fast-report.com/2020/09/report-script-security.html', 'https://github.com/FastReports/FastReport/compare/v2020.3.0...v2020.4.0'} | null |
NuGet | GHSA-9f8c-f7h4-xghf | Remote code execution in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180. | {'CVE-2020-1057'} | 2022-03-03T05:13:38.838364Z | 2021-08-02T17:28:53Z | HIGH | null | {'CWE-787', 'CWE-119'} | {'https://github.com/chakra-core/ChakraCore/pull/6500', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1057'} | null |
NuGet | GHSA-ppq7-88c7-q879 | Cross-Site Request Forgery in PiranhaCMS | In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known. | {'CVE-2021-25976'} | 2022-03-03T05:13:18.933077Z | 2021-11-17T23:42:40Z | HIGH | null | {'CWE-352'} | {'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976', 'https://github.com/PiranhaCMS/piranha.core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25976'} | null |
NuGet | GHSA-xx3h-j3cx-8qfj | Insufficient Entropy in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.2 incorrectly converts encryption key source values, resulting in lower than expected entropy. NOTE: this issue exists because of an incomplete fix for CVE-2018-15812. | {'CVE-2018-18326'} | 2022-03-03T05:10:44.829651Z | 2019-07-05T21:08:20Z | HIGH | null | {'CWE-331'} | {'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://www.dnnsoftware.com/community/security/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18326', 'https://github.com/dnnsoftware/Dnn.Platform/releases'} | null |
NuGet | GHSA-rr3c-f55v-qhv5 | Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents | Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765. | {'CVE-2018-0764'} | 2022-04-27T19:31:57.650394Z | 2018-10-16T17:34:00Z | HIGH | null | null | {'https://access.redhat.com/errata/RHSA-2018:0379', 'http://www.securityfocus.com/bid/102387', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0764', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0764', 'http://www.securitytracker.com/id/1040152', 'https://github.com/advisories/GHSA-rr3c-f55v-qhv5'} | null |
NuGet | GHSA-9q94-v7ch-mxqw | Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard | This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295. | {'CVE-2020-8867'} | 2022-03-03T05:13:02.830392Z | 2021-08-02T17:35:42Z | MODERATE | null | {'CWE-613', 'CWE-367'} | {'https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8867', 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf', 'https://www.zerodayinitiative.com/advisories/ZDI-20-536/'} | null |
NuGet | GHSA-cwp9-956f-vcwh | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1141'} | 2022-03-03T05:14:03.020055Z | 2021-03-29T20:57:56Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141', 'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
NuGet | GHSA-37pf-w9ff-gqvm | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0927'} | 2022-03-03T05:12:47.095852Z | 2021-03-29T20:58:59Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/87ac2b5a751710ee288fdda3fd4d9818e22387a1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0927', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0927', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-fv38-4c3m-25v8 | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0611. | {'CVE-2019-0592'} | 2022-03-03T05:14:14.135903Z | 2019-04-09T19:43:56Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0592', 'https://github.com/advisories/GHSA-fv38-4c3m-25v8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0592'} | null |
NuGet | GHSA-vmf5-924f-25f2 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107. | {'CVE-2019-1103'} | 2022-03-03T05:13:55.062872Z | 2021-03-29T20:59:12Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103', 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'} | null |
NuGet | GHSA-5rq8-3wvf-wrfg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0937. | {'CVE-2019-0933'} | 2022-03-03T05:13:40.307258Z | 2021-03-29T20:59:01Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0933', 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-9wx7-jrvc-28mm | Signature verification vulnerability in Stark Bank ecdsa libraries | An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways. | null | 2022-03-03T05:13:29.259203Z | 2021-11-08T21:51:18Z | HIGH | null | {'CWE-347'} | {'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/starkbank/ecdsa-dotnet', 'https://github.com/starkbank/ecdsa-python', 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1', 'https://github.com/starkbank/ecdsa-node', 'https://github.com/starkbank/ecdsa-java'} | null |
NuGet | GHSA-77rm-9x9h-xj3g | NULL Pointer Dereference in Protocol Buffers | Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. | {'CVE-2021-22570'} | 2022-05-03T04:47:56.706467Z | 2022-01-27T00:01:15Z | HIGH | null | {'CWE-476'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DVUZPALAQ34TQP6KFNLM4IZS6B32XSA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NVTWVQRB5OCCTMKEQFY5MYED3DXDVSLP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTRGBRC5KGCA4SK5MUNLPYJRAGXMBIYY/', 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0', 'https://github.com/protocolbuffers/protobuf', 'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFX6KPNOFHYD6L4XES5PCM3QNSKZBOTQ/'} | null |
NuGet | GHSA-9735-p6r2-2hgh | Out-of-bounds write | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918. | {'CVE-2019-0911'} | 2022-03-03T05:14:13.817901Z | 2021-03-29T21:00:00Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911', 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-jc8g-xhw5-6x46 | Moderate severity vulnerability that affects Microsoft.NETCore.UniversalWindowsPlatform and Microsoft.NETCore.UniversalWindowsPlatform | Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability." | {'CVE-2018-0786'} | 2022-03-03T05:14:20.876173Z | 2018-10-16T19:59:05Z | HIGH | null | {'CWE-295'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0786', 'http://www.securitytracker.com/id/1040152', 'http://www.securityfocus.com/bid/102380', 'https://github.com/advisories/GHSA-jc8g-xhw5-6x46', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0786'} | null |
NuGet | GHSA-7mfr-774f-w5r9 | Improper Certificate Validation | .NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vulnerability". | {'CVE-2017-11770'} | 2022-04-12T00:15:31.182843Z | 2022-04-12T00:07:34Z | HIGH | null | {'CWE-295'} | {'http://www.securitytracker.com/id/1039787', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11770', 'https://access.redhat.com/errata/RHSA-2017:3248', 'http://www.securityfocus.com/bid/101710', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770'} | null |
NuGet | GHSA-x8f7-h444-97w4 | The installation wizard in DotNetNuke (DNN) allows privilege escalation | The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx. | {'CVE-2015-2794'} | 2022-04-26T19:00:16.677963Z | 2018-10-16T19:33:42Z | CRITICAL | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2015-2794', 'http://www.dnnsoftware.com/community/security/security-center', 'https://github.com/advisories/GHSA-x8f7-h444-97w4', 'http://www.securityfocus.com/bid/96373', 'https://www.exploit-db.com/exploits/39777/', 'https://dotnetnuke.codeplex.com/releases/view/615317', 'http://www.dnnsoftware.com/community-blog/cid/155198/workaround-for-potential-security-issue'} | null |
NuGet | GHSA-r8hm-w5f7-wj39 | Cross-site scripting vulnerability in TinyMCE plugins | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.10.0 or higher
- Disable the `image` and `link` plugins
### Acknowledgements
Tiny Technologies would like to thank Yakir6 for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) | null | 2022-03-03T05:13:05.261265Z | 2021-11-02T15:42:52Z | MODERATE | null | {'CWE-79', 'CWE-64'} | {'https://github.com/tinymce/tinymce', 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0', 'https://pypi.org/project/django-tinymce/3.4.0/', 'https://github.com/jazzband/django-tinymce/issues/366', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39'} | null |
NuGet | GHSA-rpch-cqj9-h65r | High severity vulnerability that affects YamlDotNet and YamlDotNet.Signed | YamlDotNet version 4.3.2 and earlier contains a Insecure Direct Object Reference vulnerability in The default behavior of Deserializer.Deserialize() will deserialize user-controlled types in the line "currentType = Type.GetType(nodeEvent.Tag.Substring(1), throwOnError: false);" and blindly instantiates them. that can result in Code execution in the context of the running process. This attack appear to be exploitable via Victim must parse a specially-crafted YAML file. This vulnerability appears to have been fixed in 5.0.0. | {'CVE-2018-1000210'} | 2022-03-03T05:14:11.211455Z | 2018-10-16T17:01:10Z | HIGH | null | {'CWE-502', 'CWE-639'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000210', 'ps://github.com/aaubry/YamlDotNet', 'https://github.com/aaubry/YamlDotNet/blob/f96b7cc40a0498f8bafdeb49df3aa23aa2c60993/YamlDotNet/Serialization/NodeTypeResolvers/TypeNameInTagNodeTypeResolver.cs#L35', 'https://github.com/advisories/GHSA-rpch-cqj9-h65r', 'https://github.com/aaubry/YamlDotNet#version-500'} | null |
NuGet | GHSA-g6j2-ch25-5mmv | Missing Token Replay Detection in Saml2 Authentication services for ASP.NET | ### Impact
Token Replay Detection is an important defence in depth measure for Single Sign On solutions. In all previous 2.X versions, the Token Replay Detection is not properly implemented.
Note that version 1.0.1 is not affected. It has a correct Token Replay Implementation and is safe to use.
### Patches
The 2.5.0 version is patched.
### Workarounds
There are no workarounds with existing versions. Fixing the issue requires code updates.
### References
https://en.wikipedia.org/wiki/Replay_attack
### For more information
If you have any questions or comments about this advisory:
* Comment on #711.
* Email us at [security@sustainsys.com](mailto:security@susatinsys.com) if you think that there are further security issues. | {'CVE-2020-5261'} | 2022-03-03T05:12:39.287527Z | 2020-03-25T16:52:49Z | HIGH | null | {'CWE-294'} | {'https://github.com/Sustainsys/Saml2/issues/711', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5261', 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-g6j2-ch25-5mmv', 'https://github.com/Sustainsys/Saml2/commit/e58e0a1aff2b1ead6aca080b7cdced55ee6d5241'} | null |
NuGet | GHSA-74r6-grj9-8rq6 | Remote Code Execution in AjaxNetProfessional | All versions of package ajaxpro.2 are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. | {'CVE-2021-23758'} | 2022-03-03T05:14:12.800341Z | 2021-12-16T15:27:55Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} | null |
NuGet | GHSA-59cj-99cw-rq64 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0913'} | 2022-03-03T05:13:23.375718Z | 2021-03-29T21:00:05Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0913', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0913', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-5p67-cp9c-hqw4 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833. | {'CVE-2020-0848'} | 2022-03-03T05:12:36.897149Z | 2021-07-28T18:57:19Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-0848', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0848'} | null |
NuGet | GHSA-wvpv-ffcv-r6cw | Internal NCryptDecrypt method could be used externally from WindowsHello library. | ### Impact
Every user of the library before version 1.0.4.
### Patches
Patched in 1.0.4+.
### Workarounds
None.
### References
https://github.com/SeppPenner/WindowsHello/issues/3
### For more information
It this library is used to encrypt text and write the output to a txt file, another executable could be able to decrypt the text using the static method NCryptDecrypt from this same library without the need to use Windows Hello Authentication again. | {'CVE-2020-11005'} | 2022-03-03T05:13:49.297252Z | 2020-04-14T23:09:13Z | MODERATE | null | {'CWE-288'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11005', 'https://github.com/SeppPenner/WindowsHello/security/advisories/GHSA-wvpv-ffcv-r6cw', 'https://github.com/SeppPenner/WindowsHello/issues/3'} | null |
NuGet | GHSA-mm6g-mmq6-53ff | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user/dir` it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. `/home/user/dir.sh`. Because of the file name and destination directory constraints, the arbitrary file creation impact is limited and depends on the use case. Version 1.3.3 fixed this vulnerability. | {'CVE-2021-32842'} | 2022-03-03T05:13:53.676790Z | 2022-02-01T16:23:00Z | MODERATE | null | {'CWE-22'} | {'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32842', 'https://github.com/icsharpcode/SharpZipLib', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'} | null |
NuGet | GHSA-7j34-xq9v-9mqg | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0827'} | 2022-03-03T05:13:49.361577Z | 2021-07-28T18:56:52Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0827'} | null |
NuGet | GHSA-frxg-hf44-q765 | Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp | ### Impact
Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server is owned and operated by DisCatSharp's development team. The tokens were not logged, yet it is still advisable to reset the tokens of potentially affected bots.
### Patches
9.9.1 has been released to patch the issue for the current stable release and the current 10.0.0 prereleases are also no longer affected.
### Workarounds
Remove all uses of the two `RequireDisCatSharpDeveloperAttribute`s and all direct calls to `BaseDiscordClient.LibraryDeveloperTeam`.
### Details
The `HttpClient` responsible for sending requests to the Discord API was erroneously reused to send requests to our website when DisCatSharp's team members were to be fetched.
### For more information
If you have any questions or comments about this advisory:
* Join our [Discord server](https://discord.gg/GGYSywkxwN)
* Email us at [ottero@aitsys.dev](mailto:ottero@aitsys.dev)
| {'CVE-2022-24849'} | 2022-04-22T20:45:21.650681Z | 2022-04-22T20:39:47Z | MODERATE | null | {'CWE-200'} | {'https://github.com/Aiko-IT-Systems/DisCatSharp', 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849'} | null |
NuGet | GHSA-8hfj-j24r-96c4 | Path Traversal: 'dir/../../filename' in moment.locale | ### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarounds
Sanitize user-provided locale name before passing it to moment.js.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [moment repo](https://github.com/moment/moment)
| {'CVE-2022-24785'} | 2022-04-26T21:00:11.102341Z | 2022-04-04T21:25:48Z | HIGH | null | {'CWE-27', 'CWE-22'} | {'https://github.com/moment/moment', 'https://www.tenable.com/security/tns-2022-09', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'} | null |
NuGet | GHSA-mg98-x2cm-4cpf | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107. | {'CVE-2019-1106'} | 2022-03-03T05:13:07.842305Z | 2021-03-29T20:59:15Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'} | null |
NuGet | GHSA-j66f-h9hm-975m | Unrestricted Upload of File with Dangerous Type in Umbraco CMS | Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality. | {'CVE-2020-9472'} | 2022-03-03T05:12:56.279188Z | 2021-08-02T17:38:56Z | MODERATE | null | {'CWE-434'} | {'https://gitlab.com/eLeN3Re/cve-2020-9472', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9472'} | null |
NuGet | GHSA-hpf7-4c2g-9chf | Remote Code Execution in Halibut | In Halibut versions prior to 4.4.7 there is a deserialisation vulnerability that could allow remote code execution on systems that already trust each other based on certificate verification. | {'CVE-2021-31819'} | 2022-03-03T05:13:48.353348Z | 2021-09-23T23:17:07Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/OctopusDeploy/Halibut', 'https://advisories.octopus.com/adv/2021-08---Remote-Code-Execution-via-Deserialisation-in-the-Halibut-Protocol-(CVE-2021-31819).2250309681.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31819'} | null |
NuGet | GHSA-hpw7-3vq3-mmv6 | Insecure deserialization in Wire | Due to how Wire handles type information in its serialization format, malicious payloads can be passed to a deserializer. e.g. using a surrogate on the sender end, an attacker can pass information about a different type for the receiving end. And by doing so allowing the serializer to create any type on the deserializing end.
**This is the same issue that exists for .NET BinaryFormatter https://docs.microsoft.com/en-us/visualstudio/code-quality/ca2300?view=vs-2019**
This also applies to the fork of Wire, AkkaDotNet/Hyperion.
| {'CVE-2021-29508'} | 2022-03-03T05:14:05.027870Z | 2021-05-19T23:02:38Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/AsynkronIT/Wire/security/advisories/GHSA-hpw7-3vq3-mmv6', 'https://www.nuget.org/packages/Wire/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29508'} | null |
NuGet | GHSA-6973-94v8-5mgw | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0991'} | 2022-03-03T05:11:51.614144Z | 2021-03-29T20:57:42Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991', 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'} | null |
NuGet | GHSA-r8hp-5m7c-jhv4 | Cross-site Scripting OrchardCore.Application.Cms.Targets | Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2. | {'CVE-2022-0274'} | 2022-03-03T05:10:01.498753Z | 2022-01-21T23:08:50Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0274', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'} | null |
NuGet | GHSA-p23j-g745-8449 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366. | {'CVE-2019-1335'} | 2022-03-03T05:13:53.507688Z | 2021-03-29T20:55:40Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'} | null |
NuGet | GHSA-4vr3-9v7h-5f8v | Low severity vulnerability that affects Gw2Sharp | ## Leaking cached authenticated requests
### Impact
If you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug.
When using an instance of `MemoryCacheMethod` and using it with multiple instances of `Gw2WebApiClient`, there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint.
The occurence of this is limited however. The Guild Wars 2 API doesn't use the `Expires` header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen.
### Patches
This bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id.
### Workarounds
For version 0.3.0 and lower, you can use one separate instance of `MemoryCacheMethod` per `Gw2WebApiClient` if you need to use it.
### For more information
If you have any questions or comments about this advisory, you can open an issue in [the Gw2Sharp repository](https://github.com/Archomeda/Gw2Sharp) or contact me on [Discord](https://discord.gg/hNcpDT3).
| null | 2022-03-03T05:13:29.903003Z | 2019-06-18T15:38:41Z | LOW | null | null | {'https://github.com/advisories/GHSA-4vr3-9v7h-5f8v', 'https://github.com/Archomeda/Gw2Sharp/security/advisories/GHSA-4vr3-9v7h-5f8v', 'https://github.com/Archomeda/Gw2Sharp'} | null |
NuGet | GHSA-j89m-gcjf-6ghp | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0825'} | 2022-03-03T05:13:03.264453Z | 2021-07-28T18:57:02Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825'} | null |
NuGet | GHSA-7ph8-f946-q5r7 | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0592. | {'CVE-2019-0611'} | 2022-03-03T05:12:48.782454Z | 2019-04-09T19:43:54Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0611', 'https://github.com/advisories/GHSA-7ph8-f946-q5r7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0611'} | null |
NuGet | GHSA-9pq7-rcxv-47vq | Incorrect Regular Expression in RestSharp | RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service. | {'CVE-2021-27293'} | 2022-03-03T05:13:17.456498Z | 2021-07-14T19:10:01Z | HIGH | null | {'CWE-697', 'CWE-185'} | {'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293', 'https://restsharp.dev/', 'https://github.com/restsharp/RestSharp/issues/1556'} | null |
NuGet | GHSA-936x-wgqv-hhgq | Authenticated path traversal in Umbraco CMS | An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package. | {'CVE-2020-5811'} | 2022-03-03T05:14:06.221233Z | 2021-04-13T15:51:33Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5811', 'http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html', 'https://www.tenable.com/security/research/tra-2020-59'} | null |
NuGet | GHSA-qv8q-v995-72gr | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer.
### Patches
The issue have been patched in all repositories. The following versions should be updated to as soon as possible:
C# 3.0.2
D 3.0.1
Dart 3.0.3
Elixir 3.0.0
Go 3.0.1
Java 3.3.0
JavaScript 3.1.0
Kotlin 1.1.0
Lua 3.0.1
PHP 3.0.2
Perl 3.0.0
Python 3.0.2
Ruby 3.0.1
Rust 3.0.0
Scala 3.0.1
Swift 1.0.1
If you are using any of the earlier packages, please update to latest.
### Workarounds
The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be
000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not
000x.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues)
* Email us at [Personnummer Email](mailto:security@personnummer.dev)
### Credits
Niklas Sköldmark (Medborgarskolan) | null | 2022-03-03T05:12:56.256760Z | 2020-09-09T17:29:38Z | LOW | null | null | {'https://github.com/personnummer/csharp/security/advisories/GHSA-qv8q-v995-72gr', 'https://www.nuget.org/packages/Personnummer/', 'https://github.com/personnummer/csharp/commit/d7ac9b60a3677cd841a488b4f82ac6930f168699'} | null |
NuGet | GHSA-vv6j-ww6x-54gx | Use after free in Animation | CVE-2022-0609: Use after free in Animation
- https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0609
Google is aware of reports that exploits for CVE-2022-0609 exist in the wild.
The exploitation is known to be easy. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are unknown but an exploit is available.
There is currently little other public information on the issue other than it has been flagged as `High` severity. | {'CVE-2022-0609'} | 2022-04-12T15:17:10.107557Z | 2022-02-22T21:51:19Z | HIGH | null | {'CWE-416'} | {'https://crbug.com/1296150', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0609', 'https://github.com/cefsharp/CefSharp', 'https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx'} | null |
NuGet | GHSA-xc6x-cq47-9chw | Vulnerability in Azure Active Directory Authentication Library | An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'. | {'CVE-2019-1258'} | 2022-03-03T05:12:47.576526Z | 2019-08-16T14:03:35Z | HIGH | null | null | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258', 'https://github.com/AzureAD/azure-activedirectory-library-for-dotnet'} | null |
NuGet | GHSA-qhqf-ghgh-x2m4 | High severity vulnerability that affects Microsoft.AspNetCore.Mvc | See https://nvd.nist.gov/vuln/detail/CVE-2017-0249 & https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0249 | {'CVE-2017-0249'} | 2022-03-03T05:13:21.724556Z | 2018-10-16T19:57:38Z | HIGH | null | {'CWE-20'} | {'https://github.com/advisories/GHSA-qhqf-ghgh-x2m4', 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7', 'https://github.com/aspnet/Announcements/issues/239', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0249'} | null |
NuGet | GHSA-758c-g2ff-9444 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1140'} | 2022-03-03T05:12:54.256618Z | 2021-03-29T20:57:49Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1140', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1140'} | null |
NuGet | GHSA-2ghc-6v89-pw9j | Prototype Pollution in body-parser-xml | body-parser-xml is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3666'} | 2021-09-14T18:39:31Z | 2021-09-14T20:25:35Z | HIGH | null | {'CWE-915', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3666', 'https://github.com/fiznool/body-parser-xml', 'https://github.com/fiznool/body-parser-xml/commit/d46ca622560f7c9a033cd9321c61e92558150d63', 'https://huntr.dev/bounties/1-other-fiznool/body-parser-xml'} | null |
NuGet | GHSA-35hc-x2cw-2j4v | Denial of service vulnerability exists when .NET and .NET Core improperly process XML documents | A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2. | {'CVE-2018-0765'} | 2022-04-26T19:15:39.357896Z | 2018-10-16T19:54:06Z | HIGH | null | {'CWE-611'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765', 'http://www.securitytracker.com/id/1040851', 'http://www.securityfocus.com/bid/104060', 'https://github.com/advisories/GHSA-35hc-x2cw-2j4v', 'https://nvd.nist.gov/vuln/detail/CVE-2018-0765'} | null |
NuGet | GHSA-8j9v-h2vp-2hhv | XSS in HtmlSanitizer | ### Impact
If you have explicitly allowed the `<style>` tag, an attacker could craft HTML that includes script after passing through the sanitizer. The default settings disallow the `<style>` tag so there is no risk if you have not explicitly allowed the `<style>` tag.
### Patches
The problem has been fixed in version 5.0.372.
### Workarounds
Remove the `<style>` tag from the set of allowed tags.
### For more information
If you have any questions or comments about this advisory open an issue in https://github.com/mganss/HtmlSanitizer
### Credits
This issue was discovered by Michal Bentkowski of Securitum. | {'CVE-2020-26293'} | 2022-03-03T05:12:47.065847Z | 2021-01-04T18:22:11Z | LOW | null | {'CWE-79', 'CWE-74'} | {'https://github.com/mganss/HtmlSanitizer/releases/tag/v5.0.372', 'https://www.nuget.org/packages/HtmlSanitizer/', 'https://github.com/mganss/HtmlSanitizer/security/advisories/GHSA-8j9v-h2vp-2hhv', 'https://github.com/mganss/HtmlSanitizer/commit/a3a7602a44d4155d51ec0fbbedc2a49e9c7e2eb8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26293'} | null |
NuGet | GHSA-5whq-j5qg-wjvp | Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke | Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function. | {'CVE-2019-12562'} | 2022-03-03T05:13:27.973694Z | 2019-11-18T17:16:06Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-12562', 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html', 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/'} | null |
NuGet | GHSA-cxw4-9qv9-vx5h | High severity vulnerability that affects PeterO.Cbor | ### Impact
The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved.
The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication.
### Patches
This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library.
### Workarounds
Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution.
In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows:
CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false"));
In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows:
if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) {
cbor.EncodeToBytes();
}
Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called "limited memory stream", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory.
using(var stream = new LimitedMemoryStream(100000)) { // Limit to 100000 bytes
cbor.WriteTo(stream);
return stream.ToBytes();
}
To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings).
### References
See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
| null | 2022-03-03T05:13:40.103880Z | 2019-09-30T19:42:28Z | HIGH | null | null | {'https://github.com/peteroupc/CBOR/security/advisories/GHSA-cxw4-9qv9-vx5h', 'https://github.com/peteroupc/CBOR'} | null |
NuGet | GHSA-88cw-3m6x-49f7 | Out-of-bounds Write in ChakraCore | Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17048. | {'CVE-2020-17054'} | 2022-03-03T05:13:17.628779Z | 2021-08-02T17:25:58Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17054', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17054', 'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/e81e8a51ec7ba3d0dfb6089254f166c2733216e1'} | null |
NuGet | GHSA-wc43-7wj6-4ggr | Remote code execution in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1172. | {'CVE-2020-1180'} | 2022-03-03T05:13:07.501354Z | 2021-08-02T17:29:09Z | HIGH | null | {'CWE-787'} | {'https://github.com/microsoft/ChakraCore/pull/6500', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1180', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180'} | null |
NuGet | GHSA-pcgf-qjx2-qv4q | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1217'} | 2022-03-03T05:14:05.834729Z | 2021-03-29T20:56:08Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-1217', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217', 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e'} | null |
NuGet | GHSA-5h9g-x5rv-25wg | Cross-site scripting vulnerability in TinyMCE | ### Impact
A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.9.0 or higher
- Manually sanitize the content using the `BeforeSetContent` event (see below)
#### Example: Manually sanitize content
```js
editor.on('BeforeSetContent', function(e) {
var sanitizedContent = ...; // Manually sanitize content here
e.content = sanitizedContent;
});
```
### Acknowledgements
Tiny Technologies would like to thank William Bowling for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) | null | 2022-03-03T05:13:16.708960Z | 2021-10-22T16:24:02Z | MODERATE | null | {'CWE-79'} | {'https://github.com/tinymce/tinymce', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes'} | null |
NuGet | GHSA-pf46-gqg9-j3v3 | Insufficient Entropy in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy. | {'CVE-2018-15812'} | 2022-03-03T05:13:10.919609Z | 2019-07-05T21:08:24Z | HIGH | null | {'CWE-331'} | {'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://www.dnnsoftware.com/community/security/security-center', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15812', 'https://github.com/dnnsoftware/Dnn.Platform/releases'} | null |
NuGet | GHSA-vpc2-7xmf-ppmf | Out-of-bounds Write in ChakraCore | Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054. | {'CVE-2020-17048'} | 2022-03-03T05:14:01.644069Z | 2021-08-02T17:26:11Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://github.com/chakra-core/ChakraCore/pull/6528'} | null |
NuGet | GHSA-3m2r-q8x3-xmf7 | Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.Server.Kestrel.Core, Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions, and Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv | Microsoft made an internal discovery of a security vulnerability in version 2.x of ASP.NET Core where
a specially crafted request can cause excess resource consumption in Kestrel.
| null | 2022-03-03T05:13:45.943675Z | 2018-10-16T19:59:48Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-3m2r-q8x3-xmf7', 'https://github.com/aspnet/Announcements/issues/300'} | null |
NuGet | GHSA-j3g9-6fx5-gjv7 | Inadequate Encryption Strength in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811. | {'CVE-2018-18325'} | 2022-03-03T05:13:46.422387Z | 2019-07-05T21:08:16Z | HIGH | null | {'CWE-326'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-18325', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://www.dnnsoftware.com/community/security/security-center', 'https://github.com/dnnsoftware/Dnn.Platform/releases'} | null |
NuGet | GHSA-v648-p92f-9996 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0925'} | 2022-03-03T05:14:19.461609Z | 2021-03-29T20:57:39Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925', 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-fm9p-5m9f-rq85 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0915'} | 2022-03-03T05:13:09.041076Z | 2021-03-29T21:00:03Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915', 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-j378-6mmw-hqfr | Denial of service vulnerability exists when System.IO.Pipelines improperly handles requests | A denial of service vulnerability exists when System.IO.Pipelines improperly handles requests, aka "System.IO.Pipelines Denial of Service." This affects .NET Core 2.1, System.IO.Pipelines, ASP.NET Core 2.1. | {'CVE-2018-8409'} | 2022-04-26T19:15:14.276742Z | 2018-10-16T19:56:38Z | HIGH | null | null | {'http://www.securityfocus.com/bid/105223', 'https://github.com/advisories/GHSA-j378-6mmw-hqfr', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8409', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8409'} | null |
NuGet | GHSA-jp7f-grcv-6mjf | Partial path traversal in sharpcompress | SharpCompress recreates a hierarchy of directories under destinationDirectory if ExtractFullPath is set to true in options. In order to prevent extraction outside the destination directory the destinationFileName path is verified to begin with fullDestinationDirectoryPath. However it is not enforced that fullDestinationDirectoryPath ends with slash:
```csharp
public static void WriteEntryToDirectory(IEntry entry,
string destinationDirectory,
ExtractionOptions? options,
Action<string, ExtractionOptions?> write)
{
string destinationFileName;
string file = Path.GetFileName(entry.Key);
string fullDestinationDirectoryPath = Path.GetFullPath(destinationDirectory);
...
throw new ExtractionException("Entry is trying to write a file outside of the destination directory.");
}
```
If the destinationDirectory is not slash terminated like /home/user/dir it is possible to create a file with a name thats begins as the destination directory one level up from the directory, i.e. /home/user/dir.sh.
#### Impact
Because of the file name and destination directory constraints the arbitrary file creation impact is limited and depends on the use case. | {'CVE-2021-39208'} | 2022-03-03T05:12:28.667741Z | 2021-09-20T19:53:42Z | MODERATE | null | {'CWE-22'} | {'https://github.com/adamhathcock/sharpcompress', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39208', 'https://github.com/adamhathcock/sharpcompress/pull/614', 'https://github.com/adamhathcock/sharpcompress/security/advisories/GHSA-jp7f-grcv-6mjf', 'https://github.com/adamhathcock/sharpcompress/releases/tag/0.29.0'} | null |
NuGet | GHSA-h23m-w6x5-jwr4 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0923'} | 2022-03-03T05:14:08.577126Z | 2021-03-29T21:00:08Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923', 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-prxj-c66c-4gcf | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0924'} | 2022-03-03T05:12:53.230422Z | 2021-03-29T21:00:12Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-6r92-cgxc-r5fg | Denial of service in CBOR library | ### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was privately reported to me.
### Patches
This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.)
### Workarounds
Again, users should use the latest version of this library.
In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if—
- it begins with a byte other than 0x80 through 0xDF, or
- it does not contain a byte in the range 0xa0 through 0xBF.
Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
| null | 2022-03-03T05:12:53.419938Z | 2022-01-21T23:35:35Z | HIGH | null | {'CWE-407'} | {'https://github.com/peteroupc/CBOR', 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'} | null |
NuGet | GHSA-j8f4-2w4p-mhjc | Moderate severity vulnerability that affects Microsoft.AspNetCore.Mvc | A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. | {'CVE-2017-0256'} | 2022-03-03T05:13:20.152974Z | 2018-10-16T19:57:48Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-0256', 'https://github.com/advisories/GHSA-j8f4-2w4p-mhjc', 'https://github.com/aspnet/Announcements/issues/239'} | null |
NuGet | GHSA-v89p-5hr2-4rh4 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196. | {'CVE-2019-1197'} | 2022-03-03T05:12:53.493944Z | 2021-03-29T20:56:15Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
NuGet | GHSA-gcx5-3p5f-f8vp | Prototype Pollution in jquery.cookie | jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS). | {'CVE-2022-23395'} | 2022-03-29T22:17:02.151963Z | 2022-03-03T00:00:51Z | MODERATE | null | {'CWE-1321'} | {'https://security.netapp.com/advisory/ntap-20220325-0008/', 'https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23395'} | null |
NuGet | GHSA-5q7q-qqw2-hjq7 | Cross-Site Scripting in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects.
### Description
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network.
### Releases
Releases before version 21.12.22.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
A workaround exists that replaces one of the core JavaScript files embedded in the library. Using a XML configuration allows to replace the default JavaScript code to be replaced with the version on GitHub.
```xml
<configuration>
<configSections>
<sectionGroup name="ajaxNet">
<section name="ajaxSettings" type="AjaxPro.AjaxSettingsSectionHandler,AjaxPro.2" requirePermission="false" restartOnExternalChanges="true"/>
</sectionGroup>
</configSections>
<ajaxNet>
<ajaxSettings>
<coreScript>~/ajaxpro-core-fixed.js</coreScript>
</ajaxSettings>
</ajaxNet>
</configuration>
```
Copy the file core.js from the main project folder to your web server root folder and rename that ajaxpro-core-fixed.js.
Clients need to refresh the web page to download the changed JavaScript code.
### References
Commit fixing the issue: c89e39b9679fcb8ab6644fe21cc7e652cb615e2b
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| {'CVE-2021-43853'} | 2022-03-03T05:13:21.805430Z | 2022-01-06T18:32:24Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43853', 'https://github.com/michaelschwarz/Ajax.NET-Professional/releases/tag/v21.12.22.1', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e652cb615e2b', 'https://github.com/michaelschwarz/Ajax.NET-Professional', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7'} | null |
NuGet | GHSA-8gvg-8vhf-h26g | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933. | {'CVE-2019-0937'} | 2022-03-03T05:12:59.188688Z | 2021-03-29T20:59:03Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-5c66-x4wm-rjfx | Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN) | Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN) before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted onclick attribute in an IMG element. | {'CVE-2016-7119'} | 2022-04-26T19:00:22.687679Z | 2018-10-16T19:34:10Z | MODERATE | null | {'CWE-79'} | {'http://www.dnnsoftware.com/community/security/security-center', 'https://github.com/advisories/GHSA-5c66-x4wm-rjfx', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7119', 'http://www.securityfocus.com/bid/92719'} | null |
NuGet | GHSA-8qh8-cv77-h83g | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | {'CVE-2019-0769'} | 2022-03-03T05:13:37.186860Z | 2019-04-09T19:43:46Z | HIGH | null | {'CWE-787'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0769', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769', 'https://github.com/advisories/GHSA-8qh8-cv77-h83g'} | null |
NuGet | GHSA-rx34-jff5-ph35 | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0917'} | 2022-03-03T05:13:15.368520Z | 2021-03-29T21:00:06Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'} | null |
NuGet | GHSA-c8qc-62qv-5p2x | Out-of-bounds Write in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0828'} | 2022-03-03T05:13:32.403759Z | 2021-07-28T18:58:22Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0828', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0828'} | null |
NuGet | GHSA-6r7c-6w96-8pvw | Remote Code Execution in AjaxNetProfessional | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution.
### Description
Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc.
Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution.
Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products.
An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed.
Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands).
### Releases
Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions.
### Workarounds
There is no workaround available that addresses all issues except updating to latest version from GitHub.
### References
Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971
Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/
### For more information
If you have any questions or comments about this advisory:
* Open an issue on this GitHub repository
| null | 2022-03-03T05:11:30.895768Z | 2021-12-07T21:21:49Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://github.com/michaelschwarz/Ajax.NET-Professional', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'} | null |
NuGet | GHSA-h595-8pw6-5q6v | Inadequate Encryption Strength in DotNetNuke | DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters. | {'CVE-2018-15811'} | 2022-03-03T05:12:54.928562Z | 2019-07-05T21:08:36Z | HIGH | null | {'CWE-326'} | {'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15811', 'https://www.dnnsoftware.com/community/security/security-center', 'https://github.com/dnnsoftware/Dnn.Platform/releases'} | null |
NuGet | GHSA-782p-53wq-cxmj | High severity vulnerability that affects OPCFoundation.NetStandard.Opc.Ua | Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests. | {'CVE-2018-12086'} | 2022-03-03T05:12:04.070778Z | 2018-10-16T19:51:31Z | HIGH | null | {'CWE-787'} | {'http://www.securitytracker.com/id/1041909', 'http://www.securityfocus.com/bid/105538', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12086', 'https://www.debian.org/security/2018/dsa-4359', 'https://github.com/advisories/GHSA-782p-53wq-cxmj', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf'} | null |
NuGet | GHSA-jvjp-vh27-r9h5 | Cross-site Scripting in PiranhaCMS | In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution. | {'CVE-2021-25977'} | 2022-03-03T05:14:07.242632Z | 2021-10-27T18:53:03Z | MODERATE | null | {'CWE-79'} | {'https://github.com/PiranhaCMS/piranha.core', 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'} | null |
NuGet | GHSA-c9cg-q8r2-xvjq | Improper Authentication in Auth0.AuthenticationApi | Auth0 auth0.net before 6.5.4 has Incorrect Access Control because IdentityTokenValidator can be accidentally used to validate untrusted ID tokens. | {'CVE-2019-16929'} | 2022-03-03T05:14:20.663129Z | 2019-10-24T20:56:12Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16929', 'https://auth0.com/docs/security/bulletins/cve-2019-16929'} | null |
NuGet | GHSA-mw7r-3g6w-85qg | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197. | {'CVE-2019-1131'} | 2022-03-03T05:12:46.071533Z | 2021-03-29T20:57:46Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/242c59ea40c0428e1ced7366bf2c28bfbdda1999', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1131', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1131', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
NuGet | GHSA-2rfj-2mwp-787v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-0993'} | 2022-03-03T05:11:34.130533Z | 2021-03-29T20:57:51Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0993', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'} | null |
NuGet | GHSA-q7cg-43mg-qp69 | ASP.NET Core Information Disclosure Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
An information disclosure vulnerability exists in .NET 5.0, .NET Core 3.1 and .NET Core 2.1 where a JWT token is logged if it cannot be parsed.
### Patches
* If you're using .NET 5.0, you should download and install Runtime 5.0.9 or SDK 5.0.206 (for Visual Studio 2019 v16.8) or SDK 5.0.303 (for Visual Studio 2019 V16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
* If you're using .NET Core 3.1, you should download and install Runtime 3.1.18 or SDK 3.1.118 (for Visual Studio 2019 v16.4) or 3.1.412 (for Visual Studio 2019 v16.7 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
* If you're using .NET Core 2.1, you should download and install Runtime 2.1.29 or SDK 2.1.525 (for Visual Studio 2019 v15.9) or 2.1.817 from https://dotnet.microsoft.com/download/dotnet-core/2.1.
* If your application is using .NET Core 2.1 running on .NET Framework see the [Updating .NET Core 2.1 on .NET Framework](#updating-2.1) section below.
### <a name="updating-2.1"></a> Updating .NET Core 2.1 on .NET Framework
If you are running .NET Core 2.1 on .NET Framework you need to check your projects for dependencies and update them accordingly.
#### Direct dependencies
Direct dependencies are discoverable by examining your `csproj` file. They can be fixed by [editing the project file](#fixing-direct-dependencies) or using NuGet to update the dependency.
#### Transitive dependencies
Transitive dependencies occur when you add a package to your project that in turn relies on another package. For example, if Contoso publishes a package `Contoso.Utility` which, in turn, depends on `Contoso.Internals` and you add the `Contoso.Utility` package to your project now your project has a direct dependency on `Contoso.Utility` and, because `Contoso.Utility` depends 'Contoso.Internals', your application gains a transitive dependency on the `Contoso.Internals` package.
Transitive dependencies are reviewable in two ways:
* In the Visual Studio Solution Explorer window, which supports searching.
* By examining the `project.assets.json` file contained in the obj directory of your project for `csproj` based projects
The `project.assets.json` files are the authoritative list of all packages used by your project, containing both direct and transitive dependencies.
There are two ways to view transitive dependencies. You can either [use Visual Studio’s Solution Explorer](#vs-solution-explorer), or you can review [the `project.assets.json` file](#project-assets-json)).
##### <a name="vs-solution-explorer"></a>Using Visual Studio Solution Explorer
To use Solution Explorer, open the project in Visual Studio, and then press Ctrl+; to activate the search in Solution Explorer. Search for the [vulnerable package](#affected-software) and make a note of the version numbers of any results you find.
For example, search for `Microsoft.AspNetCore.Authentication.JwtBearer` and update the package to the latest version
##### <a name="project-assets-json"></a> Manually reviewing project.assets.json
Open the *project.assets.json* file from your project’s obj directory in your editor. We suggest you use an editor that understands JSON and allows you to collapse and expand nodes to review this file.
Visual Studio and Visual Studio Code provide JSON friendly editing.
Search the *project.assets.json* file for the [vulnerable package](#affected-software), using the format `packagename/` for each of the package names from the preceding table. If you find the assembly name in your search:
* Examine the line on which they are found, the version number is after the `/`.
* Compare to the [vulnerable versions table](#affected-software).
For example, a search result that shows `Microsoft.AspNetCore.Authentication.JwtBearer/2.1.0` is a reference to version 2.1.1 of `Microsoft.AspNetCore.Authentication.JwtBearer`.
If your *project.assets.json* file includes references to the [vulnerable package](#affected-software), then you need to fix the transitive dependencies.
If you have not found any reference to any vulnerable packages, this means either
* None of your direct dependencies depend on any vulnerable packages, or
* You have already fixed the problem by updating the direct dependencies.
#### Other Details
- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/195
- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/35246
- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34532
| {'CVE-2021-34532'} | 2022-03-03T05:13:20.585140Z | 2021-08-25T14:45:28Z | MODERATE | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-34532', 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-q7cg-43mg-qp69', 'https://github.com/dotnet/aspnetcore', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34532'} | null |
NuGet | GHSA-vhvh-528q-ff3p | Security feature bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated | A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2. | {'CVE-2018-8171'} | 2022-04-26T19:15:58.108161Z | 2018-10-16T19:56:50Z | HIGH | null | {'CWE-287'} | {'http://www.securityfocus.com/bid/104659', 'http://www.securitytracker.com/id/1041267', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8171', 'https://github.com/advisories/GHSA-vhvh-528q-ff3p', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8171'} | null |
NuGet | GHSA-pjpj-f6r8-56rm | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783. | {'CVE-2019-0609'} | 2022-03-03T05:12:48.624001Z | 2019-04-09T19:43:59Z | HIGH | null | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0609', 'https://github.com/advisories/GHSA-pjpj-f6r8-56rm'} | null |
NuGet | GHSA-pwpr-vp2v-99xw | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1138'} | 2022-03-03T05:13:05.852214Z | 2021-03-29T20:56:11Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/1e5d3f5e4f4feb37a6844f654d351ddcc53e2046', 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1138', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1138'} | null |
NuGet | GHSA-q99r-j969-6jwr | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300. | {'CVE-2019-1237'} | 2022-03-03T05:13:44.392146Z | 2021-03-29T20:56:04Z | HIGH | null | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.