ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-2v7p-f4qm-r5pc
|
SQL Injection found in Pimcore
|
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
|
{'CVE-2022-1429'}
|
2022-05-03T21:01:42Z
|
2022-04-23T00:03:03Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1429', 'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://github.com/advisories/GHSA-2v7p-f4qm-r5pc'}
| null |
GHSA
|
GHSA-p6h9-hpcg-c6gm
|
High severity vulnerability that affects Plone and Zope2
|
Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720.
|
{'CVE-2011-2528'}
|
2021-09-16T16:05:50Z
|
2018-07-23T19:52:02Z
|
HIGH
| 0
| null |
{'http://www.openwall.com/lists/oss-security/2011/07/12/9', 'http://plone.org/products/plone/security/advisories/20110622', 'https://mail.zope.org/pipermail/zope-announce/2011-June/002260.html', 'http://secunia.com/advisories/45056', 'https://github.com/advisories/GHSA-p6h9-hpcg-c6gm', 'http://www.openwall.com/lists/oss-security/2011/07/04/6', 'https://bugzilla.redhat.com/show_bug.cgi?id=718824', 'http://secunia.com/advisories/45111', 'http://plone.org/products/plone-hotfix/releases/20110622', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2528'}
| null |
GHSA
|
GHSA-4c7m-vv47-7c69
|
Insecure Permissions in Gogs
|
In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check.
|
{'CVE-2020-14958'}
|
2021-05-18T20:33:05Z
|
2021-05-18T20:33:05Z
|
MODERATE
| 5.3
|
{'CWE-281'}
|
{'https://github.com/advisories/GHSA-4c7m-vv47-7c69', 'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c', 'https://github.com/gogs/gogs/pull/5988', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14958'}
| null |
GHSA
|
GHSA-67j6-xv27-w6ww
|
Moderate severity vulnerability that affects web-console
|
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
|
{'CVE-2015-3224'}
|
2021-09-01T22:40:56Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
|
{'CWE-284'}
|
{'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html', 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ', 'http://www.securityfocus.com/bid/75237', 'https://github.com/advisories/GHSA-67j6-xv27-w6ww', 'http://openwall.com/lists/oss-security/2015/06/16/18', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}
| null |
GHSA
|
GHSA-mh5c-679w-hh4r
|
Denial of Service in mongodb
|
Versions of `mongodb` prior to 3.1.13 are vulnerable to Denial of Service. The package fails to properly catch an exception when a collection name is invalid and the DB does not exist, crashing the application.
## Recommendation
Upgrade to version 3.1.13 or later.
| null |
2020-09-03T21:12:01Z
|
2020-09-03T21:12:01Z
|
HIGH
| 0
| null |
{'https://www.npmjs.com/advisories/1203', 'https://github.com/advisories/GHSA-mh5c-679w-hh4r'}
| null |
GHSA
|
GHSA-523c-xh4g-mh5m
|
Denial of Service in Apache POI
|
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks:
- Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294)
- Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)
|
{'CVE-2017-12626'}
|
2021-06-15T16:29:27Z
|
2021-01-14T19:18:22Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://access.redhat.com/errata/RHSA-2018:1322', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/102879', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12626', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-523c-xh4g-mh5m', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
| null |
GHSA
|
GHSA-wc9v-mj63-m9g5
|
Remote Code Execution in pg
|
Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name.
There are two specific scenarios in which it is likely for an application to be vulnerable:
1. The application executes unsafe, user-supplied sql which contains malicious column names.
2. The application connects to an untrusted database and executes a query returning results which contain a malicious column name.
## Proof of Concept
```
const { Client } = require('pg')
const client = new Client()
client.connect()
const sql = `SELECT 1 AS "\\'/*", 2 AS "\\'*/\n + console.log(process.env)] = null;\n//"`
client.query(sql, (err, res) => {
client.end()
})
```
## Recommendation
* Version 2.x.x: Update to version 2.11.2 or later.
* Version 3.x.x: Update to version 3.6.4 or later.
* Version 4.x.x: Update to version 4.5.7 or later.
* Version 5.x.x: Update to version 5.2.1 or later.
* Version 6.x.x: Update to version 6.4.2 or later. ( Note that versions 6.1.6, 6.2.5, and 6.3.3 are also patched. )
* Version 7.x.x: Update to version 7.1.2 or later. ( Note that version 7.0.2 is also patched. )
|
{'CVE-2017-16082'}
|
2021-01-08T01:56:54Z
|
2018-07-24T19:44:42Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/521', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082', 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5', 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability', 'https://nodesecurity.io/advisories/521'}
| null |
GHSA
|
GHSA-53xv-c2hx-5w6q
|
Command Injection in node-windows
|
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
|
{'CVE-2021-45459'}
|
2022-03-30T21:13:50Z
|
2022-01-05T20:39:21Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'https://github.com/dwisiswant0/advisory/issues/4', 'https://github.com/advisories/GHSA-53xv-c2hx-5w6q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45459', 'https://security.netapp.com/advisory/ntap-20220107-0004/', 'https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6'}
| null |
GHSA
|
GHSA-gp4j-w3vj-7299
|
Information Exposure in RunC
|
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
|
{'CVE-2016-9962'}
|
2021-12-20T18:21:43Z
|
2021-12-20T18:21:43Z
|
MODERATE
| 6.4
|
{'CWE-200'}
|
{'https://github.com/docker/docker/releases/tag/v1.12.6', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962', 'https://github.com/advisories/GHSA-gp4j-w3vj-7299', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9962', 'https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6', 'https://security.gentoo.org/glsa/201701-34', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/', 'http://rhn.redhat.com/errata/RHSA-2017-0116.html', 'http://seclists.org/fulldisclosure/2017/Jan/29', 'http://www.securityfocus.com/bid/95361', 'http://www.securityfocus.com/archive/1/540001/100/0/threaded', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'http://seclists.org/fulldisclosure/2017/Jan/21', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/', 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962', 'http://rhn.redhat.com/errata/RHSA-2017-0123.html', 'http://rhn.redhat.com/errata/RHSA-2017-0127.html', 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/'}
| null |
GHSA
|
GHSA-jc87-6vpp-7ff3
|
Heap buffer overflow in Tensorflow
|
### Impact
The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L193-L195
Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers.
### Patches
We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release.
We recommend users to upgrade to TensorFlow 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)
|
{'CVE-2020-15198'}
|
2021-08-26T15:11:47Z
|
2020-09-25T18:28:22Z
|
MODERATE
| 5.4
|
{'CWE-119', 'CWE-122'}
|
{'https://github.com/advisories/GHSA-jc87-6vpp-7ff3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15198', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3'}
| null |
GHSA
|
GHSA-mf4f-j588-5xm8
|
Apache Log4j Remote Code Execution
|
### Impact
Opencast uses an Apache Log4j2 version which, combined with older JDK versions, can be used for remote code execution attacks which have been found to be actively exploited.
Apache Log4j2 <=2.14.1 JNDI features is not sufficiently protected. An attacker who can control log messages or log message parameters can execute arbitrary code when message lookup substitution is enabled.
### Who is affected
- Opencast before 9.10 or 10.6 are affected
- Log4j version: all 2.x versions before 2.15.0 are affected
### Patches
The issue has been fixed in Opencast 9.10 and 10.6.
### Workarounds
The vulnerability can be mitigated by setting system property `log4j2.formatMsgNoLookups` to `true`.
### References
- [Opencast pull request mitigating the vulnerability](https://github.com/opencast/opencast/pull/3253)
- [CVE-2021-44228 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-44228)
- [Analysis and Remediation Guidance to the Log4j Zero-Day RCE (CVE-2021-44228) Vulnerability](https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228)
- [VE-2021-44228 – Log4j 2 Vulnerability Analysis](https://www.randori.com/blog/cve-2021-44228/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
* Email us at [security@opencast.org](mailto:security@opencast.org)
### Note about dependencies
This issue affects many Java applications. Please also verify these are not vulnerable.
| null |
2022-04-19T19:03:17Z
|
2021-12-14T21:07:14Z
|
CRITICAL
| 0
| null |
{'https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106', 'https://docs.opencast.org/r/9.x/admin/#changelog/#opencast-910', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228', 'https://github.com/advisories/GHSA-mf4f-j588-5xm8', 'https://github.com/opencast/opencast/pull/3253'}
| null |
GHSA
|
GHSA-vjv6-gq77-3mjw
|
XXE attack in Mapfish Print
|
### Impact
A user can do to an XML External Entity (XXE) attack with the provided SDL style.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://cwe.mitre.org/data/definitions/611.html
* https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e
### For more information
If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397
|
{'CVE-2020-15232'}
|
2021-01-07T23:47:51Z
|
2020-07-07T16:32:45Z
|
LOW
| 9.3
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-vjv6-gq77-3mjw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/pull/1397'}
| null |
GHSA
|
GHSA-wfxp-4qgw-qp3c
|
XML external entity (XXE) attacks in Jenkins Xcode integration Plugin
|
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
{'CVE-2021-21656'}
|
2022-03-21T20:39:19Z
|
2022-03-18T17:52:43Z
|
HIGH
| 7.1
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-wfxp-4qgw-qp3c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21656', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2335'}
| null |
GHSA
|
GHSA-x2p8-rgfm-qw3v
|
Access Control vulnerability within CoreNLP
|
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
|
{'CVE-2021-44550'}
|
2022-03-03T22:07:42Z
|
2022-02-25T00:01:07Z
|
CRITICAL
| 9.8
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-x2p8-rgfm-qw3v', 'https://github.com/stanfordnlp/CoreNLP/issues/1222', 'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550'}
| null |
GHSA
|
GHSA-jf66-3q76-h5p5
|
Tenant and Verifier might not use the same registrar data
|
Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1. At this time, there are no known workaround.
|
{'CVE-2022-1053'}
|
2022-05-05T15:59:37Z
|
2022-05-05T15:59:35Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-jf66-3q76-h5p5', 'https://github.com/keylime/keylime/security/advisories/GHSA-jf66-3q76-h5p5'}
| null |
GHSA
|
GHSA-c9rj-pgxv-84jc
|
Exfiltrates data on installation in cofee-script
|
The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofee-script` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16206'}
|
2021-09-08T21:59:37Z
|
2018-08-06T20:12:46Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-c9rj-pgxv-84jc', 'https://nodesecurity.io/advisories/540', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16206', 'https://www.npmjs.com/advisories/540'}
| null |
GHSA
|
GHSA-rrpm-pj7p-7j9q
|
Remote code execution affecting org.springframework.security.oauth:spring-security-oauth2
|
Spring Security OAuth, versions 2.3 prior to 2.3.3, 2.2 prior to 2.2.2, 2.1 prior to 2.1.2, 2.0 prior to 2.0.15 and older unsupported versions contain a remote code execution vulnerability. A malicious user or attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint.
This vulnerability exposes applications that meet all of the following requirements:
- Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer)
- Use the default Approval Endpoint
This vulnerability does not expose applications that:
- Act in the role of an Authorization Server but override the default Approval Endpoint
- Act in the role of a Resource Server only (e.g. @EnableResourceServer)
- Act in the role of a Client only (e.g. @EnableOAuthClient)
|
{'CVE-2018-1260'}
|
2022-04-19T19:03:26Z
|
2018-10-18T18:05:34Z
|
CRITICAL
| 9.8
|
{'CWE-94'}
|
{'http://www.securityfocus.com/bid/104158', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2018:1809', 'https://github.com/advisories/GHSA-rrpm-pj7p-7j9q', 'https://pivotal.io/security/cve-2018-1260', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1260'}
| null |
GHSA
|
GHSA-8gf4-pcj6-54rp
|
Downloads Resources over HTTP in strider-sauce
|
Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`.
## Recommendation
While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number.
In order to resolve the vulnerability, you will need to install the module manually from github:
```
npm install github:Strider-CD/strider-sauce#5ff6d65
```
As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.
|
{'CVE-2016-10611'}
|
2021-06-11T12:35:11Z
|
2019-02-18T23:47:53Z
|
HIGH
| 8.1
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/202', 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp', 'https://nodesecurity.io/advisories/202', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611'}
| null |
GHSA
|
GHSA-f3pp-32qc-36w4
|
Prototype Pollution in jointjs
|
This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
|
{'CVE-2021-23444'}
|
2021-10-04T14:21:41Z
|
2021-09-22T20:36:34Z
|
MODERATE
| 5.6
|
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/clientIO/joint/pull/1514', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817', 'https://github.com/clientIO/joint/releases/tag/v3.4.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816', 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578', 'https://github.com/advisories/GHSA-f3pp-32qc-36w4'}
| null |
GHSA
|
GHSA-rc9v-h28f-jcmf
|
There is a XML external entity expansion (XXE) vulnerability in Apache Solr config files
|
This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs.
|
{'CVE-2018-8010'}
|
2022-04-27T14:45:20Z
|
2018-10-17T19:56:04Z
|
MODERATE
| 5.5
|
{'CWE-611'}
|
{'https://mail-archives.apache.org/mod_mbox/www-announce/201805.mbox/%3C08a801d3f0f9%24df46d300%249dd47900%24%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8010', 'https://github.com/advisories/GHSA-rc9v-h28f-jcmf', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/104239'}
| null |
GHSA
|
GHSA-98hv-qff3-8793
|
Unrestricted Upload of File with Dangerous Type in django-widgy
|
Unrestricted Upload of File with Dangerous Type in Django-Widgy v0.8.4 allows remote attackers to execute arbitrary code via the 'image' widget in the component 'Change Widgy Page'.
|
{'CVE-2020-18704'}
|
2021-08-30T16:24:08Z
|
2021-08-30T16:24:08Z
|
CRITICAL
| 9.8
|
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18704', 'https://github.com/fusionbox/django-widgy/issues/387', 'https://github.com/advisories/GHSA-98hv-qff3-8793'}
| null |
GHSA
|
GHSA-69rr-wvh9-6c4q
|
Directory Traversal in st
|
Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server.
## Recommendation
Update to version 0.2.5 or later.
|
{'CVE-2014-3744'}
|
2021-09-23T21:00:00Z
|
2020-08-31T22:58:04Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://www.npmjs.com/advisories/36', 'http://www.securityfocus.com/bid/67389', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3744', 'https://github.com/advisories/GHSA-69rr-wvh9-6c4q', 'https://nodesecurity.io/advisories/st_directory_traversal', 'https://github.com/isaacs/st#security-status', 'https://github.com/isaacs/st', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
| null |
GHSA
|
GHSA-2mvq-xp48-4c77
|
Denial of Service in subtext
|
All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
## Recommendation
This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2.
| null |
2021-09-29T18:37:05Z
|
2020-09-03T20:35:29Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1168', 'https://github.com/advisories/GHSA-2mvq-xp48-4c77', 'https://github.com/hapijs/subtext/issues/72'}
| null |
GHSA
|
GHSA-cq76-mxrc-vchh
|
Crash in `tf.math.segment_*` operations
|
### Impact
The implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large.
```python
import tensorflow as tf
tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
```
This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the [implementation](https://github.com/tensorflow/tensorflow/blob/dae66e518c88de9c11718cd0f8f40a0b666a90a0/tensorflow/core/kernels/segment_reduction_ops_impl.h) (both on CPU and GPU) computes the output shape using [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408). However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440).
### Patches
We have patched the issue in GitHub commit [e9c81c1e1a9cd8dd31f4e83676cab61b60658429](https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46888).
|
{'CVE-2021-41195'}
|
2021-11-10T19:36:50Z
|
2021-11-10T19:36:50Z
|
MODERATE
| 5.5
|
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/pull/51733', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41195', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/issues/46888', 'https://github.com/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}
| null |
GHSA
|
GHSA-hpw4-m59j-9p52
|
Directory Traversal in dylmomo
|
Affected versions of `dylmomo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16163'}
|
2021-01-14T15:47:02Z
|
2020-09-01T17:29:13Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo', 'https://nodesecurity.io/advisories/396', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16163', 'https://www.npmjs.com/advisories/396', 'https://github.com/advisories/GHSA-hpw4-m59j-9p52'}
| null |
GHSA
|
GHSA-6wf9-jmg9-vxcc
|
XStream can cause a Denial of Service
|
### Impact
The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39140](https://x-stream.github.io/CVE-2021-39140.html).
### Credits
The vulnerability was discovered and reported by Lai Han of nsfocus security team.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39140'}
|
2022-04-22T15:42:25Z
|
2021-08-25T14:48:39Z
|
MODERATE
| 6.5
|
{'CWE-835', 'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39140.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39140', 'https://github.com/advisories/GHSA-6wf9-jmg9-vxcc', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-j9cf-pr2x-5273
|
Prototype Pollution in dot-object
|
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
|
{'CVE-2019-10793'}
|
2022-04-19T19:03:24Z
|
2022-02-09T22:33:31Z
|
MODERATE
| 6.3
|
{'CWE-74'}
|
{'https://github.com/advisories/GHSA-j9cf-pr2x-5273', 'https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905', 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10793'}
| null |
GHSA
|
GHSA-hf79-8hjp-rrvq
|
Use After Free in lucet
|
### Impact
There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the `Instance` objects, it is possible to trigger a use-after-free when the `Instance` is dropped.
### Patches
Users should upgrade to the `main` branch of the Lucet repository. Lucet does not provide versioned releases on crates.io.
### Workarounds
There is no way to remediate this vulnerability without upgrading.
### Description
Lucet uses a "pool" allocator for new WebAssembly instances that are created. This pool allocator manages everything from the linear memory of the wasm instance, the runtime stack for async switching, as well as the memory behind the Instance itself. `Instances` are referred to via an `InstanceHandle` type which will, on drop, release the memory backing the Instance back to the pool.
When an Instance is dropped, the fields of the `Instance` are destructed top-to-bottom, however when the `alloc: Alloc` field is destructed, the memory backing the `Instance` is released back to the pool before the destructors of the remaining fields are run. If another thread allocates the same memory from the pool while these destructors are still running, a race condition occurs that can lead to use-after-free errors.
The bug was corrected by changing how the `InstanceHandle` destructor operates to ensure that the memory backing an Instance is only returned to the pool once the `Instance` has been completely destroyed.
This security advisory has been assigned CVE-2021-43790.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [lucet repository](https://github.com/bytecodealliance/lucet)
* Email [the lucet team](mailto:lucet@fastly.com)
* See the [Bytecode Alliance security policy](https://bytecodealliance.org/security)
|
{'CVE-2021-43790'}
|
2022-04-19T19:03:16Z
|
2021-11-30T22:20:36Z
|
HIGH
| 8.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43790', 'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8', 'https://github.com/advisories/GHSA-hf79-8hjp-rrvq', 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq', 'https://crates.io/crates/lucet-runtime'}
| null |
GHSA
|
GHSA-3vfw-7rcp-3xgm
|
Moderate severity vulnerability that affects actionpack
|
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
|
{'CVE-2011-3187'}
|
2021-08-31T21:31:48Z
|
2017-10-24T18:33:38Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html', 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://github.com/advisories/GHSA-3vfw-7rcp-3xgm', 'https://bugzilla.novell.com/show_bug.cgi?id=673010'}
| null |
GHSA
|
GHSA-5jq3-8437-x35p
|
Multiple cross-site scripting (XSS) vulnerabilities in Roundup
|
Multiple cross-site scripting (XSS) vulnerabilities in Roundup before 1.4.20 allow remote attackers to inject arbitrary web script or HTML via the (1) @ok_message or (2) @error_message parameter to issue*.
|
{'CVE-2012-6133'}
|
2022-04-26T20:47:41Z
|
2022-04-23T00:40:39Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://issues.roundup-tracker.org/issue2550724', 'https://github.com/advisories/GHSA-5jq3-8437-x35p', 'http://www.openwall.com/lists/oss-security/2013/02/13/8', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6133', 'https://bugzilla.redhat.com/show_bug.cgi?id=722672', 'http://www.openwall.com/lists/oss-security/2012/11/10/2', 'https://pypi.python.org/pypi/roundup/1.4.20'}
| null |
GHSA
|
GHSA-5x5w-v4xq-p64r
|
Directory Traversal in ewgaddis.lab6
|
Affected versions of `ewgaddis.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16175'}
|
2021-01-08T21:08:08Z
|
2018-07-23T20:44:52Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/465', 'https://github.com/advisories/GHSA-5x5w-v4xq-p64r', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16175', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6', 'https://www.npmjs.com/advisories/465'}
| null |
GHSA
|
GHSA-6gm7-j668-w6h9
|
SQL Injection in Pimcore
|
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
|
{'CVE-2022-1219'}
|
2022-04-22T20:42:11Z
|
2022-04-09T00:00:30Z
|
HIGH
| 7.5
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017', 'https://github.com/advisories/GHSA-6gm7-j668-w6h9'}
| null |
GHSA
|
GHSA-r8hp-5m7c-jhv4
|
Cross-site Scripting OrchardCore.Application.Cms.Targets
|
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
|
{'CVE-2022-0274'}
|
2022-01-21T23:08:50Z
|
2022-01-21T23:08:50Z
|
MODERATE
| 6.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-r8hp-5m7c-jhv4', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0274'}
| null |
GHSA
|
GHSA-8hw9-22v6-9jr9
|
Any logged in user could edit any other logged in user.
|
### Impact
Everyone who is running a12n-server.
A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change.
### Patches
Patched in v0.18.2
|
{'CVE-2021-29452'}
|
2021-04-19T15:14:33Z
|
2021-04-19T15:14:33Z
|
HIGH
| 8.1
|
{'CWE-269'}
|
{'https://github.com/advisories/GHSA-8hw9-22v6-9jr9', 'https://www.npmjs.com/package/@curveball/a12n-server', 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452'}
| null |
GHSA
|
GHSA-v24h-pjjv-mcp6
|
Denial of service in Tendermint
|
### Description
**Denial of Service 1**
Tendermint 0.33.2 and earlier does not limit the number of P2P connection requests. For each p2p connection, Tendermint allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbound peers), temporary memory spikes can lead to OOM (Out-Of-Memory) exceptions.
Tendermint 0.33.3 (and 0.32.10) limits the total number of P2P incoming connection requests to to `p2p.max_num_inbound_peers + len(p2p.unconditional_peer_ids)`.
Notes:
- Tendermint does not rate limit P2P connection requests per IP (an attacker can saturate all the inbound slots);
- Tendermint does not rate limit HTTP(S) requests. If you expose any RPC endpoints to the public, please make sure to put in place some protection (https://www.nginx.com/blog/rate-limiting-nginx/). We may implement this in the future (https://github.com/tendermint/tendermint/issues/1696).
**Denial of Service 2**
Tendermint 0.33.2 and earlier does not reclaim `activeID` of a peer after it's removed in `Mempool` reactor. This does not happen all the time. It only happens when a connection fails (for any reason) before the `Peer` is created and added to all reactors. `RemovePeer` is therefore called before `AddPeer`, which leads to always growing memory (`activeIDs` map). The `activeIDs` map has a maximum size of 65535 and the node will panic if this map reaches the maximum. An attacker can create a lot of connection attempts (exploiting Denial of Service 1), which ultimately will lead to the node panicking.
Tendermint 0.33.3 (and 0.32.10) claims `activeID` for a peer in `InitPeer`, which is executed before `MConnection` is started.
Notes:
- `InitPeer` function was added to all reactors to combat a similar issue - https://github.com/tendermint/tendermint/issues/3338;
- Denial of Service 2 is independent of Denial of Service 1 and can be executed without it.
### Impact
- All full nodes (except for validators who are behind closed networks)
- Node's memory usage increases, then it panics either in the mempool or due to OOM.
### Patches
- v0.33.3
- v0.32.10
- v0.31.12
### Workarounds
No workarounds.
### References
- https://hackerone.com/reports/820317 (not disclosed yet)
- https://github.com/tendermint/tendermint/issues/3338
- https://github.com/tendermint/tendermint/issues/1696
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint)
* Email us at [security@tendermint.com](mailto:security@tendermint.com)
More information can be found [here](https://tendermint.com/security/).
### Credits
- [fudongbai](https://hackerone.com/fudongbai) for discovering and reporting Denial of Service 2
- Ethan Buchman (@ebuchman) for writing a test case for Denial of Service 2 and Tess Rinearson (@tessr) for fixing it
- Anton Kaliaev (@melekes) for fixing Denial of Service 1
|
{'CVE-2020-5303'}
|
2021-05-27T18:44:09Z
|
2021-05-27T18:44:09Z
|
LOW
| 3.1
|
{'CWE-789', 'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5303', 'https://github.com/tendermint/tendermint/security/advisories/GHSA-v24h-pjjv-mcp6', 'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd', 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#denial-of-service-1', 'https://github.com/tendermint/tendermint/issues/3338', 'https://github.com/tendermint/tendermint/issues/1696', 'https://hackerone.com/reports/820317', 'https://github.com/advisories/GHSA-v24h-pjjv-mcp6'}
| null |
GHSA
|
GHSA-hf23-9pf7-388p
|
Deserialization of Untrusted Data and Code Injection in xstream
|
It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)
|
{'CVE-2019-10173'}
|
2021-07-27T20:56:11Z
|
2019-07-26T16:09:47Z
|
CRITICAL
| 9.8
|
{'CWE-94', 'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://x-stream.github.io/changes.html#1.4.11', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10173', 'https://github.com/advisories/GHSA-hf23-9pf7-388p', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10173'}
| null |
GHSA
|
GHSA-vc6r-4x6g-mmqc
|
Path Traversal in m-server
|
Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server.
## Recommendation
Update to version 1.4.2 or later.
| null |
2021-08-04T21:07:26Z
|
2019-06-11T16:16:23Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json', 'https://hackerone.com/reports/319795', 'https://www.npmjs.com/advisories/731', 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a', 'https://github.com/advisories/GHSA-vc6r-4x6g-mmqc'}
| null |
GHSA
|
GHSA-wqhw-frpx-5mmp
|
Command Injection in tomato
|
All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2021-09-27T16:16:14Z
|
2020-09-02T16:01:33Z
|
HIGH
| 0
|
{'CWE-77'}
|
{'https://www.npmjs.com/advisories/797', 'https://github.com/advisories/GHSA-wqhw-frpx-5mmp'}
| null |
GHSA
|
GHSA-6qh5-wx38-q92g
|
Directory Traversal in ltt.js
|
Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2021-08-04T20:10:41Z
|
2019-05-30T17:15:59Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/411', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js', 'https://github.com/advisories/GHSA-6qh5-wx38-q92g'}
| null |
GHSA
|
GHSA-cx4j-fxr7-jxg8
|
Double free in glsl-layout
|
An issue was discovered in the glsl-layout crate before 0.4.0 for Rust. When a panic occurs, map_array can perform a double drop.
|
{'CVE-2021-25902'}
|
2021-08-25T20:53:01Z
|
2021-08-25T20:53:01Z
|
HIGH
| 7.5
|
{'CWE-415'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25902', 'https://github.com/rustgd/glsl-layout/pull/10', 'https://github.com/advisories/GHSA-cx4j-fxr7-jxg8', 'https://rustsec.org/advisories/RUSTSEC-2021-0005.html'}
| null |
GHSA
|
GHSA-m4hj-wg2r-qpcr
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
|
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
|
{'CVE-2021-3776'}
|
2021-11-17T21:10:57Z
|
2021-11-15T23:13:34Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-m4hj-wg2r-qpcr', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
| null |
GHSA
|
GHSA-9m6f-7xcq-8vf8
|
Unsafe Deserialization in jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.
|
{'CVE-2020-36183'}
|
2022-04-22T18:15:48Z
|
2021-12-09T19:16:34Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36183', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/FasterXML/jackson-databind/issues/3003', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/advisories/GHSA-9m6f-7xcq-8vf8', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
| null |
GHSA
|
GHSA-vfp9-gwrh-wq9g
|
Path Traversal in crud-file-server
|
Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 0.9.0 or later.
|
{'CVE-2018-3733'}
|
2021-01-08T01:57:29Z
|
2018-07-18T21:20:19Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://hackerone.com/reports/310690', 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82', 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g', 'https://www.npmjs.com/advisories/1003', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733'}
| null |
GHSA
|
GHSA-w4xf-2pqw-5mq7
|
Reference binding to nullptr in `RaggedTensorToVariant`
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`:
```python
import tensorflow as tf
tf.raw_ops.RaggedTensorToVariant(
rt_nested_splits=[],
rt_dense_values=[1,2,3],
batched_input=True)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L129) has an incomplete validation of the splits values, missing the case when the argument would be empty.
### Patches
We have patched the issue in GitHub commit [be7a4de6adfbd303ce08be4332554dff70362612](https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37666'}
|
2021-08-25T14:42:13Z
|
2021-08-25T14:42:13Z
|
HIGH
| 7.8
|
{'CWE-824'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37666', 'https://github.com/advisories/GHSA-w4xf-2pqw-5mq7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7', 'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'}
| null |
GHSA
|
GHSA-f8m6-h2c7-8h9x
|
Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize)
|
### Impact
The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.word_tokenize). Any users of this class, or these two functions, are vulnerable to a Regular Expression Denial of Service (ReDoS) attack.
In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. The effect of this vulnerability is noticeable with the following example:
```python
from nltk.tokenize import word_tokenize
n = 8
for length in [10**i for i in range(2, n)]:
# Prepare a malicious input
text = "a" * length
start_t = time.time()
# Call `word_tokenize` and naively measure the execution time
word_tokenize(text)
print(f"A length of {length:<{n}} takes {time.time() - start_t:.4f}s")
```
Which gave the following output during testing:
```python
A length of 100 takes 0.0060s
A length of 1000 takes 0.0060s
A length of 10000 takes 0.6320s
A length of 100000 takes 56.3322s
...
```
I canceled the execution of the program after running it for several hours.
If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability, or applying the workaround described below.
### Patches
The problem has been patched in NLTK 3.6.6. After the fix, running the above program gives the following result:
```python
A length of 100 takes 0.0070s
A length of 1000 takes 0.0010s
A length of 10000 takes 0.0060s
A length of 100000 takes 0.0400s
A length of 1000000 takes 0.3520s
A length of 10000000 takes 3.4641s
```
This output shows a linear relationship in execution time versus input length, which is desirable for regular expressions.
We recommend updating to NLTK 3.6.6+ if possible.
### Workarounds
The execution time of the vulnerable functions is exponential to the length of a malicious input. With other words, the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit.
### References
* The issue showcasing the vulnerability: https://github.com/nltk/nltk/issues/2866
* The pull request containing considerably more information on the vulnerability, and the fix: https://github.com/nltk/nltk/pull/2869
* The commit containing the fix: 1405aad979c6b8080dbbc8e0858f89b2e3690341
* Information on CWE-1333: Inefficient Regular Expression Complexity: https://cwe.mitre.org/data/definitions/1333.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/nltk/nltk](https://github.com/nltk/nltk)
* Email us at [nltk.team@gmail.com](mailto:nltk.team@gmail.com)
|
{'CVE-2021-43854'}
|
2022-04-19T19:03:16Z
|
2022-01-06T17:38:45Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/nltk/nltk/issues/2866', 'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341', 'https://github.com/advisories/GHSA-f8m6-h2c7-8h9x', 'https://github.com/nltk/nltk/pull/2869', 'https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43854'}
| null |
GHSA
|
GHSA-r2rg-683g-ff96
|
Malicious Package in axios-http
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:11:07Z
|
2020-09-03T19:40:12Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1123', 'https://github.com/advisories/GHSA-r2rg-683g-ff96'}
| null |
GHSA
|
GHSA-4q96-9f63-p7jj
|
Path Traversal in ImpressCMS
|
ImpressCMS before 1.4.3 allows libraries/image-editor/image-edit.php image_temp Directory Traversal.
|
{'CVE-2021-26601'}
|
2022-04-05T21:19:17Z
|
2022-03-29T00:01:16Z
|
HIGH
| 8.1
|
{'CWE-22'}
|
{'https://hackerone.com/reports/1081878', 'http://seclists.org/fulldisclosure/2022/Mar/44', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://github.com/ImpressCMS/impresscms/pull/915', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26601', 'http://karmainsecurity.com/KIS-2022-02', 'http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html', 'https://github.com/ImpressCMS/impresscms/issues/914', 'https://github.com/advisories/GHSA-4q96-9f63-p7jj'}
| null |
GHSA
|
GHSA-jf7h-7m85-w2v2
|
Integer overflow in TFLite memory allocation
|
### Impact
The TFLite code for allocating `TFLiteIntArray`s is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27):
```cc
int TfLiteIntArrayGetSizeInBytes(int size) {
static TfLiteIntArray dummy;
return sizeof(dummy) + sizeof(dummy.data[0]) * size;
}
```
An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in [invalid value being given to `malloc`](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52):
```cc
TfLiteIntArray* TfLiteIntArrayCreate(int size) {
TfLiteIntArray* ret = (TfLiteIntArray*)malloc(TfLiteIntArrayGetSizeInBytes(size));
ret->size = size;
return ret;
}
```
In this case, `ret->size` would dereference an invalid pointer.
### Patches
We have patched the issue in GitHub commit [7c8cc4ec69cd348e44ad6a2699057ca88faad3e5](https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29605'}
|
2021-05-21T14:28:22Z
|
2021-05-21T14:28:22Z
|
HIGH
| 7.1
|
{'CWE-190'}
|
{'https://github.com/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29605'}
| null |
GHSA
|
GHSA-gf8j-v8x5-h9qp
|
XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes
|
enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring.
|
{'CVE-2019-18857'}
|
2022-04-19T19:03:23Z
|
2020-01-08T17:15:37Z
|
HIGH
| 7.5
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-gf8j-v8x5-h9qp', 'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18857'}
| null |
GHSA
|
GHSA-g9xh-3w5g-229r
|
SQL Injection in LibreNMS
|
An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter.
|
{'CVE-2019-10671'}
|
2021-08-18T17:22:23Z
|
2019-10-11T18:43:33Z
|
HIGH
| 8.8
|
{'CWE-89'}
|
{'https://www.darkmatter.ae/xen1thlabs/librenms-multiple-sql-injection-vulnerability-xl-19-025/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10671', 'https://github.com/advisories/GHSA-g9xh-3w5g-229r'}
| null |
GHSA
|
GHSA-hr52-f9vp-582c
|
Use of Uninitialized Resource in messagepack-rs.
|
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations.
|
{'CVE-2021-45692'}
|
2022-01-07T16:30:51Z
|
2022-01-06T22:12:28Z
|
CRITICAL
| 9.8
|
{'CWE-908'}
|
{'https://github.com/advisories/GHSA-hr52-f9vp-582c', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45692'}
| null |
GHSA
|
GHSA-mf79-f657-47ww
|
Insufficient Session Expiration in Admidio
|
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
|
{'CVE-2022-0991'}
|
2022-03-29T21:39:04Z
|
2022-03-20T00:00:29Z
|
HIGH
| 8.2
|
{'CWE-613'}
|
{'https://github.com/Admidio/admidio/issues/1238', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/releases/tag/v4.1.9', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://github.com/advisories/GHSA-mf79-f657-47ww', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4'}
| null |
GHSA
|
GHSA-v86x-f47q-f7f4
|
Unauthorized File Access in atompm
|
Versions of `atompm` prior to 0.8.2 are vulnerable to Unauthorized File Access. The package fails to sanitize relative paths in the URL for file downloads, allowing attackers to download arbitrary files from the system.
## Recommendation
Upgrade to version 0.8.2 or later.
| null |
2021-09-28T15:20:06Z
|
2020-09-11T21:09:24Z
|
HIGH
| 0
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-v86x-f47q-f7f4', 'https://www.npmjs.com/advisories/959'}
| null |
GHSA
|
GHSA-vrgh-5w3c-ggf8
|
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).
|
{'CVE-2021-3990'}
|
2021-12-03T20:38:50Z
|
2021-12-03T20:38:50Z
|
MODERATE
| 6.5
|
{'CWE-338'}
|
{'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0', 'https://github.com/advisories/GHSA-vrgh-5w3c-ggf8', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3990'}
| null |
GHSA
|
GHSA-vhm6-gw82-6f8j
|
Cross site scripting in LibreNMS
|
LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting.
|
{'CVE-2022-0772'}
|
2022-03-08T18:06:06Z
|
2022-02-28T00:00:34Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://github.com/advisories/GHSA-vhm6-gw82-6f8j'}
| null |
GHSA
|
GHSA-7rjr-3q55-vv33
|
Incomplete fix for Apache Log4j vulnerability
|
# Impact
The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack.
## Affected packages
Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use.
# Mitigation
Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).
Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.
|
{'CVE-2021-45046'}
|
2022-04-19T19:03:27Z
|
2021-12-14T18:01:28Z
|
CRITICAL
| 9
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'http://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://github.com/advisories/GHSA-7rjr-3q55-vv33', 'https://www.debian.org/security/2021/dsa-5022', 'https://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45046', 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf', 'http://www.openwall.com/lists/oss-security/2021/12/18/1', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/', 'http://www.openwall.com/lists/oss-security/2021/12/15/3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf', 'https://www.cve.org/CVERecord?id=CVE-2021-44228', 'https://www.kb.cert.org/vuls/id/930724', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}
| null |
GHSA
|
GHSA-3f97-rj68-2pjf
|
Malicious Package in buffe2-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:57:29Z
|
2020-09-03T21:48:35Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1238', 'https://github.com/advisories/GHSA-3f97-rj68-2pjf'}
| null |
GHSA
|
GHSA-89gv-h8wf-cg8r
|
Hostname spoofing via backslashes in URL
|
### Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect.
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Example URL: `https:/\/\/\expected-example.com/path`
Escaped string: `https:/\\/\\/\\expected-example.com/path` (JavaScript strings must escape backslash)
Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html).
### Patches
Version 1.19.7 is patched against all known payload variants.
### References
https://github.com/medialize/URI.js/releases/tag/v1.19.7 (fix for this particular bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for related bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass)
[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling)
### For more information
If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
### Reporter credit
[ready-research](https://github.com/ready-research) via https://huntr.dev/
|
{'CVE-2021-3647'}
|
2022-04-19T19:03:03Z
|
2021-07-19T21:22:36Z
|
MODERATE
| 5.3
|
{'CWE-601'}
|
{'https://github.com/medialize/URI.js/pull/233', 'https://github.com/advisories/GHSA-89gv-h8wf-cg8r', 'https://github.com/medialize/URI.js/releases/tag/v1.19.6', 'https://github.com/medialize/URI.js/releases/tag/v1.19.3', 'https://github.com/medialize/URI.js/security/advisories/GHSA-89gv-h8wf-cg8r', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://github.com/medialize/URI.js/releases/tag/v1.19.7', 'https://huntr.dev/bounties/1625558772840-medialize/URI.js', 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3647'}
| null |
GHSA
|
GHSA-pmgv-94f5-6w7w
|
Malicious Package in eact
|
All versions of `eact` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:03:03Z
|
2020-09-02T20:21:30Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-pmgv-94f5-6w7w', 'https://www.npmjs.com/advisories/853'}
| null |
GHSA
|
GHSA-qq3j-xp49-j73f
|
Plugin archive directory traversal in Helm
|
The Helm core maintainers have identified an information disclosure
vulnerability in Helm 3.0.0-3.2.3.
### Impact
A traversal attack is possible when installing Helm plugins from a tar
archive over HTTP. It is possible for a malicious plugin author to inject a relative
path into a plugin archive, and copy a file outside of the intended directory.
Traversal Attacks are a form of a Directory Traversal that can be exploited by
extracting files from an archive. The premise of the Directory Traversal
vulnerability is that an attacker can gain access to parts of the file system
outside of the target folder in which they should reside. The attacker can
then overwrite executable files and either invoke them remotely or wait for
the system or user to call them, thus achieving Remote Command Execution on
the victim's machine. The vulnerability can also cause damage by overwriting
configuration files or other sensitive resources, and can be exploited on both
client (user) machines and servers.
https://snyk.io/research/zip-slip-vulnerability
### Patches
This issue has been fixed in Helm 3.2.4
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the Helm repository](https://github.com/helm/helm/issues)
* For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io)
|
{'CVE-2020-4053'}
|
2022-04-19T19:02:28Z
|
2021-06-23T18:14:36Z
|
LOW
| 3.7
|
{'CWE-22'}
|
{'https://github.com/helm/helm/pull/8317', 'https://github.com/helm/helm/releases/tag/v3.2.4', 'https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f', 'https://github.com/advisories/GHSA-qq3j-xp49-j73f', 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053'}
| null |
GHSA
|
GHSA-r578-pj6f-r4ff
|
Auto-merging Person Records Compromised
|
### Impact
New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events).
### Patches
We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details.
### Workarounds
If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class.
```js
create = async (profile) => {
const rockUpdateFields = this.mapApollosFieldsToRock(profile);
// auto-merge functionality is compromised
// we are creating a new user and patching them with profile details
const id = await this.post('/People', {
Gender: 0, // required by Rock. Listed first so it can be overridden.
IsSystem: false, // required by rock
});
await this.patch(`/People/${id}`, {
...rockUpdateFields,
});
return id;
};
```
### For more information
If you have any questions or comments about this advisory:
* Email us at [support@apollos.app](mailto:support@apollos.app)
|
{'CVE-2021-32691'}
|
2021-06-25T13:13:03Z
|
2021-06-21T17:07:47Z
|
HIGH
| 8.8
|
{'CWE-287', 'CWE-303'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32691', 'https://github.com/advisories/GHSA-r578-pj6f-r4ff', 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0', 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2', 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}
| null |
GHSA
|
GHSA-xh55-2fqp-p775
|
Command injection in mail agent settings
|
### Impact
Command injection in mail agent settings
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
|
{'CVE-2021-37708'}
|
2021-08-30T16:14:09Z
|
2021-08-30T16:14:09Z
|
HIGH
| 8.8
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}
| null |
GHSA
|
GHSA-w2pm-r78h-4m7v
|
OS Command Injection in Laravel Framework
|
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
|
{'CVE-2020-19316'}
|
2022-01-06T23:13:42Z
|
2022-01-06T23:13:42Z
|
HIGH
| 8.8
|
{'CWE-78'}
|
{'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'https://github.com/advisories/GHSA-w2pm-r78h-4m7v', 'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/'}
| null |
GHSA
|
GHSA-9gwq-6cwj-47h3
|
Integer overflow in TFLite array creation
|
### Impact
An attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60):
```cc
TfLiteIntArray* TfLiteIntArrayCreate(int size) {
int alloc_size = TfLiteIntArrayGetSizeInBytes(size);
// ...
TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size);
// ...
}
```
The [`TfLiteIntArrayGetSizeInBytes`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33) returns an `int` instead of a `size_t`:
```cc
int TfLiteIntArrayGetSizeInBytes(int size) {
static TfLiteIntArray dummy;
int computed_size = sizeof(dummy) + sizeof(dummy.data[0]) * size;
#if defined(_MSC_VER)
// Context for why this is needed is in http://b/189926408#comment21
computed_size -= sizeof(dummy.data[0]);
#endif
return computed_size;
}
```
An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype.
### Patches
We have patched the issue in GitHub commit [a1e1511dde36b3f8aa27a6ec630838e7ea40e091](https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
|
{'CVE-2022-23558'}
|
2022-02-11T15:08:44Z
|
2022-02-09T23:52:24Z
|
HIGH
| 7.6
|
{'CWE-190'}
|
{'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60', 'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33', 'https://github.com/advisories/GHSA-9gwq-6cwj-47h3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23558'}
| null |
GHSA
|
GHSA-pq7m-3gw7-gq5x
|
Execution with Unnecessary Privileges in ipython
|
We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another.
Proof of concept
User1:
```
mkdir -m 777 /tmp/profile_default
mkdir -m 777 /tmp/profile_default/startup
echo 'print("stealing your private secrets")' > /tmp/profile_default/startup/foo.py
```
User2:
```
cd /tmp
ipython
```
User2 will see:
```
Python 3.9.7 (default, Oct 25 2021, 01:04:21)
Type 'copyright', 'credits' or 'license' for more information
IPython 7.29.0 -- An enhanced Interactive Python. Type '?' for help.
stealing your private secrets
```
## Patched release and documentation
See https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699,
Version 8.0.1, 7.31.1 for current Python version are recommended.
Version 7.16.3 has also been published for Python 3.6 users,
Version 5.11 (source only, 5.x branch on github) for older Python versions.
|
{'CVE-2022-21699'}
|
2022-02-16T22:13:05Z
|
2022-01-21T18:55:30Z
|
HIGH
| 8.2
|
{'CWE-279', 'CWE-269', 'CWE-250'}
|
{'https://github.com/advisories/GHSA-pq7m-3gw7-gq5x', 'https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21699', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html', 'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668', 'https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/'}
| null |
GHSA
|
GHSA-8gg6-3r63-25m8
|
High severity vulnerability that affects git-fastclone
|
git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories.
|
{'CVE-2015-8968'}
|
2021-09-07T19:46:31Z
|
2018-08-15T20:03:37Z
|
HIGH
| 8.8
|
{'CWE-77'}
|
{'https://github.com/square/git-fastclone/pull/2', 'https://hackerone.com/reports/104465', 'http://www.securityfocus.com/bid/81433', 'https://github.com/advisories/GHSA-8gg6-3r63-25m8', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8968'}
| null |
GHSA
|
GHSA-mqm2-cgpr-p4m6
|
Unintended read access in kramdown gem
|
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
|
{'CVE-2020-14001'}
|
2022-04-29T20:26:20Z
|
2020-08-07T22:27:41Z
|
CRITICAL
| 9.8
|
{'CWE-862'}
|
{'https://kramdown.gettalong.org/news.html', 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html', 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/', 'https://www.debian.org/security/2020/dsa-4743', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001', 'https://kramdown.gettalong.org', 'https://rubygems.org/gems/kramdown', 'https://usn.ubuntu.com/4562-1/', 'https://security.netapp.com/advisory/ntap-20200731-0004/', 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'}
| null |
GHSA
|
GHSA-73wx-rpj3-mx46
|
Path traversal in MCMS
|
MCMS v5.2.4 was discovered to contain an arbitrary file deletion vulnerability via the component /template/unzip.do.
|
{'CVE-2021-46037'}
|
2022-03-01T21:31:22Z
|
2022-02-19T00:01:25Z
|
HIGH
| 8.1
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-73wx-rpj3-mx46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46037', 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}
| null |
GHSA
|
GHSA-vf8q-pw7h-r2x2
|
Malicious Package in epress
|
Version 4.13.2 of `epress` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-30T22:03:15Z
|
2020-09-11T21:15:54Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/925', 'https://github.com/advisories/GHSA-vf8q-pw7h-r2x2'}
| null |
GHSA
|
GHSA-m2pf-hprp-3vqm
|
Use after free in image
|
An issue was discovered in the image crate before 0.21.3 for Rust, affecting the HDR image format decoder. Vec::set_len is called on an uninitialized vector, leading to a use-after-free and arbitrary code execution.
|
{'CVE-2019-16138'}
|
2021-08-25T20:44:43Z
|
2021-08-25T20:44:43Z
|
CRITICAL
| 9.8
|
{'CWE-416'}
|
{'https://github.com/image-rs/image/pull/985', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16138', 'https://rustsec.org/advisories/RUSTSEC-2019-0014.html', 'https://github.com/advisories/GHSA-m2pf-hprp-3vqm'}
| null |
GHSA
|
GHSA-mhxg-pr3j-v9gr
|
Malicious Package in colne
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:59:04Z
|
2020-09-03T19:41:22Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1386', 'https://github.com/advisories/GHSA-mhxg-pr3j-v9gr'}
| null |
GHSA
|
GHSA-6g3c-2mh5-7q6x
|
Missing validation of JWT signature in `ManyDesigns/Portofino`
|
### Impact
https://github.com/ManyDesigns/Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens.
This allows forging a valid JWT.
### Patches
The issue will be patched in the upcoming 5.2.1 release.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/ManyDesigns/Portofino](https://github.com/ManyDesigns/Portofino)
|
{'CVE-2021-29451'}
|
2022-04-19T19:02:53Z
|
2021-04-19T14:56:33Z
|
CRITICAL
| 9.1
|
{'CWE-347'}
|
{'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x', 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451', 'https://github.com/advisories/GHSA-6g3c-2mh5-7q6x', 'https://mvnrepository.com/artifact/com.manydesigns/portofino'}
| null |
GHSA
|
GHSA-v3f7-j968-4h5f
|
Division by zero in Tensorflow
|
### Impact
The [estimator for the cost of some convolution operations](https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198) can be made to execute a division by 0:
```python
import tensorflow as tf
@tf.function
def test():
y=tf.raw_ops.AvgPoolGrad(
orig_input_shape=[1,1,1,1],
grad=[[[[1.0],[1.0],[1.0]]],[[[2.0],[2.0],[2.0]]],[[[3.0],[3.0],[3.0]]]],
ksize=[1,1,1,1],
strides=[1,1,1,0],
padding='VALID',
data_format='NCHW')
return y
test()
```
The function fails to check that the stride argument is stricly positive:
```cc
int64_t GetOutputSize(const int64_t input, const int64_t filter,
const int64_t stride, const Padding& padding) {
// Logic for calculating output shape is from GetWindowedOutputSizeVerbose()
// function in third_party/tensorflow/core/framework/common_shape_fns.cc.
if (padding == Padding::VALID) {
return (input - filter + stride) / stride;
} else { // SAME.
return (input + stride - 1) / stride;
}
}
```
Hence, the fix is to add a check for the stride argument to ensure it is valid.
### Patches
We have patched the issue in GitHub commit [3218043d6d3a019756607643cf65574fbfef5d7a](https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
|
{'CVE-2022-21725'}
|
2022-02-11T17:05:09Z
|
2022-02-10T00:15:07Z
|
MODERATE
| 6.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-v3f7-j968-4h5f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f', 'https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198', 'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21725'}
| null |
GHSA
|
GHSA-w534-q4xf-h5v2
|
XSS in Mapfish Print relating to JSONP support
|
### Impact
A user can use the JSONP support to do a Cross-site scripting.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e
* https://cwe.mitre.org/data/definitions/79.html
### For more information
If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397
|
{'CVE-2020-15231'}
|
2021-01-07T23:47:27Z
|
2020-07-07T16:32:49Z
|
LOW
| 9.3
|
{'CWE-79'}
|
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2', 'https://github.com/advisories/GHSA-w534-q4xf-h5v2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15231'}
| null |
GHSA
|
GHSA-w729-7633-2fw5
|
Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm
|
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
|
{'CVE-2021-40865'}
|
2021-10-29T13:51:59Z
|
2021-10-27T18:52:06Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/advisories/GHSA-w729-7633-2fw5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40865', 'https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E', 'https://seclists.org/oss-sec/2021/q4/45'}
| null |
GHSA
|
GHSA-wgmx-52ph-qqcw
|
High severity vulnerability that affects qutebrowser
|
qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access 'qute://*' URLs. A malicious website could exploit this to load a 'qute://settings/set' URL, which then sets 'editor.command' to a bash script, resulting in arbitrary code execution.
|
{'CVE-2018-10895'}
|
2021-09-21T20:42:18Z
|
2018-10-10T16:05:23Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-wgmx-52ph-qqcw', 'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10895'}
| null |
GHSA
|
GHSA-87cj-px37-rc3x
|
OS Command Injection in bikeshed
|
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing Inline Tag Command metadata is processed. When an arbitrary OS command is executed, the command output would be included in the HTML output.
|
{'CVE-2021-23422'}
|
2021-08-30T16:25:35Z
|
2021-08-30T16:25:35Z
|
HIGH
| 7.8
|
{'CWE-78'}
|
{'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://github.com/advisories/GHSA-87cj-px37-rc3x', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537646', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23422'}
| null |
GHSA
|
GHSA-jc6q-27mw-p55w
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core
|
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.
|
{'CVE-2017-2646'}
|
2021-09-14T19:37:32Z
|
2018-10-18T16:49:29Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-2646', 'https://github.com/advisories/GHSA-jc6q-27mw-p55w'}
| null |
GHSA
|
GHSA-f9wg-5f46-cjmw
|
NextAuth.js default redirect callback vulnerable to open redirects
|
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your `callbacks` option:
```js
// async redirect(url, baseUrl) { // v3
async redirect({ url, baseUrl }) { // v4
// Allows relative callback URLs
if (url.startsWith("/")) return new URL(url, baseUrl).toString()
// Allows callback URLs on the same origin
else if (new URL(url).origin === baseUrl) return url
return baseUrl
}
```
If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
|
{'CVE-2022-24858'}
|
2022-05-03T02:26:17Z
|
2022-04-22T20:49:09Z
|
MODERATE
| 6.1
|
{'CWE-290', 'CWE-601'}
|
{'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw', 'https://github.com/advisories/GHSA-f9wg-5f46-cjmw', 'https://next-auth.js.org/getting-started/upgrade-v4', 'https://next-auth.js.org/configuration/callbacks#redirect-callback', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858', 'https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.2', 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}
| null |
GHSA
|
GHSA-8qh7-xw58-3ww7
|
Malicious Package in radic-util
|
Version 1.0.2 of `radic-util` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-11T21:25:37Z
|
2020-09-11T21:25:37Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-8qh7-xw58-3ww7', 'https://www.npmjs.com/advisories/942'}
| null |
GHSA
|
GHSA-8m5h-hrqm-pxm2
|
Path traversal in the OWASP Enterprise Security API
|
### Impact
The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path.
### Patches
This vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details.
### Workarounds
Yes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended.
### For more information
If you have any questions or comments about this advisory:
* Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders".
* Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
|
{'CVE-2022-23457'}
|
2022-04-27T21:09:46Z
|
2022-04-27T21:09:43Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23457', 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md', 'https://github.com/advisories/GHSA-8m5h-hrqm-pxm2'}
| null |
GHSA
|
GHSA-vf6q-9f2f-mwhv
|
Improper network isolation in Hashicorp Nomad
|
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
|
{'CVE-2021-32575'}
|
2021-06-24T20:28:21Z
|
2021-06-24T20:28:21Z
|
MODERATE
| 6.5
|
{'CWE-1100'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32575', 'https://github.com/advisories/GHSA-vf6q-9f2f-mwhv', 'https://www.hashicorp.com/blog/category/nomad', 'https://discuss.hashicorp.com/t/hcsec-2021-14-nomad-bridge-networking-mode-allows-arp-spoofing-from-other-bridged-tasks-on-same-node/24296'}
| null |
GHSA
|
GHSA-8x44-pwr2-rgc6
|
Cross-site Scripting in pimcore
|
Pimcore settings module is vulnerable to stored cross site scripting
|
{'CVE-2022-0348'}
|
2022-02-03T19:56:46Z
|
2022-01-28T23:05:03Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://github.com/advisories/GHSA-8x44-pwr2-rgc6'}
| null |
GHSA
|
GHSA-gv73-9mwv-fwgq
|
Out of bounds write in prost
|
An issue was discovered in the prost crate before 0.6.1 for Rust. There is stack consumption via a crafted message, causing a denial of service (e.g., x86) or possibly remote code execution (e.g., ARM).
|
{'CVE-2020-35858'}
|
2021-08-25T20:46:11Z
|
2021-08-25T20:46:11Z
|
CRITICAL
| 9.8
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35858', 'https://rustsec.org/advisories/RUSTSEC-2020-0002.html', 'https://github.com/danburkert/prost/issues/267', 'https://github.com/advisories/GHSA-gv73-9mwv-fwgq'}
| null |
GHSA
|
GHSA-wr66-vrwm-5g5x
|
Denial of Service Vulnerability in next.js
|
### Impact
Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality.
- **Affected:** All of the following must be true to be affected by this CVE
- Next.js versions above v12.0.0
- Using next start or a custom server
- Using the built-in i18n support
- **Not affected:**
- Deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js.
### Patches
A patch has been released, `next@12.0.9`, that mitigates this issue. We recommend all affected users upgrade as soon as possible.
### Workarounds
We recommend upgrading whether you can reproduce or not although you can ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until you upgrade.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [next](https://github.com/vercel/next.js)
* Email us at [security@vercel.com](mailto:security@vercel.com)
|
{'CVE-2022-21721'}
|
2022-04-19T19:03:21Z
|
2022-01-28T23:09:22Z
|
MODERATE
| 5.9
|
{'CWE-20', 'CWE-400'}
|
{'https://github.com/vercel/next.js/pull/33503', 'https://github.com/advisories/GHSA-wr66-vrwm-5g5x', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21721', 'https://github.com/vercel/next.js/releases/tag/v12.0.9', 'https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x'}
| null |
GHSA
|
GHSA-f54p-f6jp-4rhr
|
Heap OOB in `FusedBatchNorm` kernels
|
### Impact
The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/fused_batch_norm_op.cc#L1292) of `FusedBatchNorm` kernels is vulnerable to a heap OOB:
```python
import tensorflow as tf
tf.raw_ops.FusedBatchNormGrad(
y_backprop=tf.constant([i for i in range(9)],shape=(1,1,3,3),dtype=tf.float32)
x=tf.constant([i for i in range(2)],shape=(1,1,1,2),dtype=tf.float32)
scale=[1,1],
reserve_space_1=[1,1],
reserve_space_2=[1,1,1],
epsilon=1.0,
data_format='NCHW',
is_training=True)
```
### Patches
We have patched the issue in GitHub commit [aab9998916c2ffbd8f0592059fad352622f89cda](https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41223'}
|
2021-11-10T18:46:52Z
|
2021-11-10T18:46:52Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-f54p-f6jp-4rhr', 'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41223'}
| null |
GHSA
|
GHSA-23hm-7w47-xw72
|
Out of bounds read in Tensorflow
|
### Impact
The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.Dequantize(
input=tf.constant([1,1],dtype=tf.qint32),
min_range=[1.0],
max_range=[10.0],
mode='MIN_COMBINED',
narrow_range=False,
axis=2**31-1,
dtype=tf.bfloat16)
return y
test()
```
The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked and this results in reading past the end of the array containing the dimensions of the input tensor:
```cc
if (axis_ > -1) {
num_slices = input.dim_size(axis_);
}
// ...
int64_t pre_dim = 1, post_dim = 1;
for (int i = 0; i < axis_; ++i) {
pre_dim *= float_output.dim_size(i);
}
for (int i = axis_ + 1; i < float_output.dims(); ++i) {
post_dim *= float_output.dim_size(i);
}
```
### Patches
We have patched the issue in GitHub commit [23968a8bf65b009120c43b5ebcceaf52dbc9e943](https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
|
{'CVE-2022-21726'}
|
2022-02-10T00:15:47Z
|
2022-02-09T18:28:54Z
|
HIGH
| 8.1
|
{'CWE-125'}
|
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72', 'https://github.com/advisories/GHSA-23hm-7w47-xw72', 'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21726'}
| null |
GHSA
|
GHSA-h6h9-pphv-m266
|
Topydo contains a CWE-20: Improper Input Validation vulnerability
|
topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line..
|
{'CVE-2018-1000523'}
|
2022-04-26T18:31:23Z
|
2018-09-13T15:47:26Z
|
HIGH
| 8.1
|
{'CWE-20'}
|
{'https://github.com/bram85/topydo/issues/240', 'https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292', 'https://github.com/advisories/GHSA-h6h9-pphv-m266', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000523'}
| null |
GHSA
|
GHSA-mq9h-cwc2-6j5r
|
Malicious Package in midway-dataproxy
|
All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:22Z
|
2020-09-03T17:42:27Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1056', 'https://github.com/advisories/GHSA-mq9h-cwc2-6j5r'}
| null |
GHSA
|
GHSA-qhf6-vqq9-q2p7
|
Directory Traversal in gaoxiaotingtingting
|
Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16108'}
|
2021-01-14T15:51:04Z
|
2020-09-01T16:58:58Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-qhf6-vqq9-q2p7', 'https://www.npmjs.com/advisories/377', 'https://nodesecurity.io/advisories/377', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}
| null |
GHSA
|
GHSA-qpjp-7rp2-9c3f
|
Moderate severity vulnerability that affects validator
|
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
|
{'CVE-2013-7451'}
|
2021-09-16T20:03:06Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nodesecurity.io/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451'}
| null |
GHSA
|
GHSA-fpm5-vv97-jfwg
|
Uncontrolled Resource Consumption in firebase
|
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
|
{'CVE-2020-7765'}
|
2021-05-18T01:57:24Z
|
2021-05-18T01:57:24Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/firebase/firebase-js-sdk/pull/4001', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7765', 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada', 'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324', 'https://github.com/advisories/GHSA-fpm5-vv97-jfwg'}
| null |
GHSA
|
GHSA-cr67-78jr-j94p
|
Local File Inclusion in domokeeper
|
All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-09-03T18:14:47Z
|
2020-09-03T18:14:47Z
|
MODERATE
| 0
| null |
{'https://www.npmjs.com/advisories/1075', 'https://github.com/advisories/GHSA-cr67-78jr-j94p'}
| null |
GHSA
|
GHSA-3xh2-74w9-5vxm
|
Integer overflow in github.com/gorilla/websocket
|
An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.
|
{'CVE-2020-27813'}
|
2021-05-18T21:08:02Z
|
2021-05-18T21:08:02Z
|
HIGH
| 7.5
|
{'CWE-400', 'CWE-190'}
|
{'https://github.com/advisories/GHSA-3xh2-74w9-5vxm', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html', 'https://github.com/gorilla/websocket/pull/537', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27813', 'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37', 'https://bugzilla.redhat.com/show_bug.cgi?id=1902111', 'https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh'}
| null |
GHSA
|
GHSA-73rg-x683-m3qw
|
Buffer overflow in canvas
|
A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image.
|
{'CVE-2020-8215'}
|
2021-05-07T16:05:16Z
|
2021-05-07T16:05:16Z
|
HIGH
| 8.8
|
{'CWE-120'}
|
{'https://hackerone.com/reports/315037', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://www.npmjs.com/package/canvas', 'https://github.com/advisories/GHSA-73rg-x683-m3qw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215'}
| null |
GHSA
|
GHSA-p23j-g745-8449
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.
|
{'CVE-2019-1335'}
|
2021-03-29T20:55:40Z
|
2021-03-29T20:55:40Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-p23j-g745-8449', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335', 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'}
| null |
GHSA
|
GHSA-8w57-jfpm-945m
|
Denial of Service in http-proxy-agent
|
Versions of `http-proxy-agent` before 2.1.0 are vulnerable to denial of service and uninitialized memory leak when unsanitized options are passed to `Buffer`.
## Recommendation
Update to version 2.1.0 or later.
| null |
2020-08-31T18:29:42Z
|
2019-06-11T16:16:07Z
|
HIGH
| 0
| null |
{'https://nodesecurity.io/advisories/607', 'https://hackerone.com/reports/321631', 'https://www.npmjs.com/advisories/607', 'https://github.com/advisories/GHSA-8w57-jfpm-945m', 'https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80'}
| null |
GHSA
|
GHSA-8vmc-g99q-xj94
|
Directory Traversal in dcdcdcdcdc
|
Affected versions of `dcdcdcdcdc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16190'}
|
2021-01-14T15:40:03Z
|
2020-09-01T18:23:52Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/439', 'https://github.com/advisories/GHSA-8vmc-g99q-xj94', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16190', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc', 'https://nodesecurity.io/advisories/439'}
| null |
GHSA
|
GHSA-q85f-69q7-55h2
|
Uninitialized variable access in Tensorflow
|
### Impact
The [implementation of `AssignOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143) can result in copying unitialized data to a new tensor. This later results in undefined behavior.
The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand side is also initialized.
### Patches
We have patched the issue in GitHub commit [ef1d027be116f25e25bb94a60da491c2cf55bd0b](https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23573'}
|
2022-02-11T20:47:00Z
|
2022-02-09T23:26:50Z
|
HIGH
| 7.6
|
{'CWE-908'}
|
{'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b', 'https://github.com/advisories/GHSA-q85f-69q7-55h2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23573', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143'}
| null |
GHSA
|
GHSA-ch82-gqh6-9xj9
|
Prototype Pollution in get-setter
|
All versions of `get-setter` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-10-01T20:10:11Z
|
2020-09-04T15:13:19Z
|
HIGH
| 0
|
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1332', 'https://github.com/advisories/GHSA-ch82-gqh6-9xj9'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.