ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-2v7p-f4qm-r5pc
SQL Injection found in Pimcore
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
{'CVE-2022-1429'}
2022-05-03T21:01:42Z
2022-04-23T00:03:03Z
HIGH
7.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1429', 'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://github.com/advisories/GHSA-2v7p-f4qm-r5pc'}
null
GHSA
GHSA-p6h9-hpcg-c6gm
High severity vulnerability that affects Plone and Zope2
Unspecified vulnerability in (1) Zope 2.12.x before 2.12.19 and 2.13.x before 2.13.8, as used in Plone 4.x and other products, and (2) PloneHotfix20110720 for Plone 3.x allows attackers to gain privileges via unspecified vectors, related to a "highly serious vulnerability." NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-0720.
{'CVE-2011-2528'}
2021-09-16T16:05:50Z
2018-07-23T19:52:02Z
HIGH
0
null
{'http://www.openwall.com/lists/oss-security/2011/07/12/9', 'http://plone.org/products/plone/security/advisories/20110622', 'https://mail.zope.org/pipermail/zope-announce/2011-June/002260.html', 'http://secunia.com/advisories/45056', 'https://github.com/advisories/GHSA-p6h9-hpcg-c6gm', 'http://www.openwall.com/lists/oss-security/2011/07/04/6', 'https://bugzilla.redhat.com/show_bug.cgi?id=718824', 'http://secunia.com/advisories/45111', 'http://plone.org/products/plone-hotfix/releases/20110622', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2528'}
null
GHSA
GHSA-4c7m-vv47-7c69
Insecure Permissions in Gogs
In Gogs 0.11.91, MakeEmailPrimary in models/user_mail.go lacks a "not the owner of the email" check.
{'CVE-2020-14958'}
2021-05-18T20:33:05Z
2021-05-18T20:33:05Z
MODERATE
5.3
{'CWE-281'}
{'https://github.com/advisories/GHSA-4c7m-vv47-7c69', 'https://github.com/gogs/gogs/commit/82ff0c5852f29daa5f95d965fd50665581e7ea3c', 'https://github.com/gogs/gogs/pull/5988', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14958'}
null
GHSA
GHSA-67j6-xv27-w6ww
Moderate severity vulnerability that affects web-console
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
{'CVE-2015-3224'}
2021-09-01T22:40:56Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-284'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html', 'https://github.com/rails/web-console/blob/master/CHANGELOG.markdown', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ', 'http://www.securityfocus.com/bid/75237', 'https://github.com/advisories/GHSA-67j6-xv27-w6ww', 'http://openwall.com/lists/oss-security/2015/06/16/18', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'}
null
GHSA
GHSA-mh5c-679w-hh4r
Denial of Service in mongodb
Versions of `mongodb` prior to 3.1.13 are vulnerable to Denial of Service. The package fails to properly catch an exception when a collection name is invalid and the DB does not exist, crashing the application. ## Recommendation Upgrade to version 3.1.13 or later.
null
2020-09-03T21:12:01Z
2020-09-03T21:12:01Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1203', 'https://github.com/advisories/GHSA-mh5c-679w-hh4r'}
null
GHSA
GHSA-523c-xh4g-mh5m
Denial of Service in Apache POI
Apache POI in versions prior to release 3.17 are vulnerable to Denial of Service Attacks: - Infinite Loops while parsing crafted WMF, EMF, MSG and macros (POI bugs 61338 and 61294) - Out of Memory Exceptions while parsing crafted DOC, PPT and XLS (POI bugs 52372 and 61295)
{'CVE-2017-12626'}
2021-06-15T16:29:27Z
2021-01-14T19:18:22Z
HIGH
7.5
{'CWE-835'}
{'https://access.redhat.com/errata/RHSA-2018:1322', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/102879', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12626', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-523c-xh4g-mh5m', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/453d9af5dbabaccd9afb58d27279a9dbfe8e35f4e5ea1645ddd6960b@%3Cdev.poi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-wc9v-mj63-m9g5
Remote Code Execution in pg
Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name. There are two specific scenarios in which it is likely for an application to be vulnerable: 1. The application executes unsafe, user-supplied sql which contains malicious column names. 2. The application connects to an untrusted database and executes a query returning results which contain a malicious column name. ## Proof of Concept ``` const { Client } = require('pg') const client = new Client() client.connect() const sql = `SELECT 1 AS "\\'/*", 2 AS "\\'*/\n + console.log(process.env)] = null;\n//"` client.query(sql, (err, res) => { client.end() }) ``` ## Recommendation * Version 2.x.x: Update to version 2.11.2 or later. * Version 3.x.x: Update to version 3.6.4 or later. * Version 4.x.x: Update to version 4.5.7 or later. * Version 5.x.x: Update to version 5.2.1 or later. * Version 6.x.x: Update to version 6.4.2 or later. ( Note that versions 6.1.6, 6.2.5, and 6.3.3 are also patched. ) * Version 7.x.x: Update to version 7.1.2 or later. ( Note that version 7.0.2 is also patched. )
{'CVE-2017-16082'}
2021-01-08T01:56:54Z
2018-07-24T19:44:42Z
HIGH
0
{'CWE-94'}
{'https://www.npmjs.com/advisories/521', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082', 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5', 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability', 'https://nodesecurity.io/advisories/521'}
null
GHSA
GHSA-53xv-c2hx-5w6q
Command Injection in node-windows
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
{'CVE-2021-45459'}
2022-03-30T21:13:50Z
2022-01-05T20:39:21Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/dwisiswant0/advisory/issues/4', 'https://github.com/advisories/GHSA-53xv-c2hx-5w6q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45459', 'https://security.netapp.com/advisory/ntap-20220107-0004/', 'https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6'}
null
GHSA
GHSA-gp4j-w3vj-7299
Information Exposure in RunC
RunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container. This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.
{'CVE-2016-9962'}
2021-12-20T18:21:43Z
2021-12-20T18:21:43Z
MODERATE
6.4
{'CWE-200'}
{'https://github.com/docker/docker/releases/tag/v1.12.6', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962', 'https://github.com/advisories/GHSA-gp4j-w3vj-7299', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9962', 'https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6', 'https://security.gentoo.org/glsa/201701-34', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ/', 'http://rhn.redhat.com/errata/RHSA-2017-0116.html', 'http://seclists.org/fulldisclosure/2017/Jan/29', 'http://www.securityfocus.com/bid/95361', 'http://www.securityfocus.com/archive/1/540001/100/0/threaded', 'https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5', 'http://seclists.org/fulldisclosure/2017/Jan/21', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP/', 'https://access.redhat.com/security/vulnerabilities/cve-2016-9962', 'http://rhn.redhat.com/errata/RHSA-2017-0123.html', 'http://rhn.redhat.com/errata/RHSA-2017-0127.html', 'https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK/'}
null
GHSA
GHSA-jc87-6vpp-7ff3
Heap buffer overflow in Tensorflow
### Impact The `SparseCountSparseOutput` implementation does not validate that the input arguments form a valid sparse tensor. In particular, there is no validation that the `indices` tensor has the same shape as the `values` one. The values in these tensors are always accessed in parallel: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L193-L195 Thus, a shape mismatch can result in accesses outside the bounds of heap allocated buffers. ### Patches We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release. We recommend users to upgrade to TensorFlow 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)
{'CVE-2020-15198'}
2021-08-26T15:11:47Z
2020-09-25T18:28:22Z
MODERATE
5.4
{'CWE-119', 'CWE-122'}
{'https://github.com/advisories/GHSA-jc87-6vpp-7ff3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15198', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jc87-6vpp-7ff3'}
null
GHSA
GHSA-mf4f-j588-5xm8
Apache Log4j Remote Code Execution
### Impact Opencast uses an Apache Log4j2 version which, combined with older JDK versions, can be used for remote code execution attacks which have been found to be actively exploited. Apache Log4j2 <=2.14.1 JNDI features is not sufficiently protected. An attacker who can control log messages or log message parameters can execute arbitrary code when message lookup substitution is enabled. ### Who is affected - Opencast before 9.10 or 10.6 are affected - Log4j version: all 2.x versions before 2.15.0 are affected ### Patches The issue has been fixed in Opencast 9.10 and 10.6. ### Workarounds The vulnerability can be mitigated by setting system property `log4j2.formatMsgNoLookups` to `true`. ### References - [Opencast pull request mitigating the vulnerability](https://github.com/opencast/opencast/pull/3253) - [CVE-2021-44228 Detail](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) - [Analysis and Remediation Guidance to the Log4j Zero-Day RCE (CVE-2021-44228) Vulnerability](https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228) - [VE-2021-44228 – Log4j 2 Vulnerability Analysis](https://www.randori.com/blog/cve-2021-44228/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) * Email us at [security@opencast.org](mailto:security@opencast.org) ### Note about dependencies This issue affects many Java applications. Please also verify these are not vulnerable.
null
2022-04-19T19:03:17Z
2021-12-14T21:07:14Z
CRITICAL
0
null
{'https://github.com/opencast/opencast/security/advisories/GHSA-mf4f-j588-5xm8', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106', 'https://docs.opencast.org/r/9.x/admin/#changelog/#opencast-910', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44228', 'https://github.com/advisories/GHSA-mf4f-j588-5xm8', 'https://github.com/opencast/opencast/pull/3253'}
null
GHSA
GHSA-vjv6-gq77-3mjw
XXE attack in Mapfish Print
### Impact A user can do to an XML External Entity (XXE) attack with the provided SDL style. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://cwe.mitre.org/data/definitions/611.html * https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e ### For more information If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397
{'CVE-2020-15232'}
2021-01-07T23:47:51Z
2020-07-07T16:32:45Z
LOW
9.3
{'CWE-611'}
{'https://github.com/advisories/GHSA-vjv6-gq77-3mjw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/pull/1397'}
null
GHSA
GHSA-wfxp-4qgw-qp3c
XML external entity (XXE) attacks in Jenkins Xcode integration Plugin
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2021-21656'}
2022-03-21T20:39:19Z
2022-03-18T17:52:43Z
HIGH
7.1
{'CWE-611'}
{'https://github.com/advisories/GHSA-wfxp-4qgw-qp3c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21656', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2335'}
null
GHSA
GHSA-x2p8-rgfm-qw3v
Access Control vulnerability within CoreNLP
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
{'CVE-2021-44550'}
2022-03-03T22:07:42Z
2022-02-25T00:01:07Z
CRITICAL
9.8
{'CWE-863'}
{'https://github.com/advisories/GHSA-x2p8-rgfm-qw3v', 'https://github.com/stanfordnlp/CoreNLP/issues/1222', 'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550'}
null
GHSA
GHSA-jf66-3q76-h5p5
Tenant and Verifier might not use the same registrar data
Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the validation happens first and then the agent gets added to the verifier because the timing is easier and the verifier does not validate the regcount entry being equal to 1. At this time, there are no known workaround.
{'CVE-2022-1053'}
2022-05-05T15:59:37Z
2022-05-05T15:59:35Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-jf66-3q76-h5p5', 'https://github.com/keylime/keylime/security/advisories/GHSA-jf66-3q76-h5p5'}
null
GHSA
GHSA-c9rj-pgxv-84jc
Exfiltrates data on installation in cofee-script
The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofee-script` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16206'}
2021-09-08T21:59:37Z
2018-08-06T20:12:46Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-c9rj-pgxv-84jc', 'https://nodesecurity.io/advisories/540', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16206', 'https://www.npmjs.com/advisories/540'}
null
GHSA
GHSA-rrpm-pj7p-7j9q
Remote code execution affecting org.springframework.security.oauth:spring-security-oauth2
Spring Security OAuth, versions 2.3 prior to 2.3.3, 2.2 prior to 2.2.2, 2.1 prior to 2.1.2, 2.0 prior to 2.0.15 and older unsupported versions contain a remote code execution vulnerability. A malicious user or attacker can craft an authorization request to the authorization endpoint that can lead to remote code execution when the resource owner is forwarded to the approval endpoint. This vulnerability exposes applications that meet all of the following requirements: - Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) - Use the default Approval Endpoint This vulnerability does not expose applications that: - Act in the role of an Authorization Server but override the default Approval Endpoint - Act in the role of a Resource Server only (e.g. @EnableResourceServer) - Act in the role of a Client only (e.g. @EnableOAuthClient)
{'CVE-2018-1260'}
2022-04-19T19:03:26Z
2018-10-18T18:05:34Z
CRITICAL
9.8
{'CWE-94'}
{'http://www.securityfocus.com/bid/104158', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2018:1809', 'https://github.com/advisories/GHSA-rrpm-pj7p-7j9q', 'https://pivotal.io/security/cve-2018-1260', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1260'}
null
GHSA
GHSA-8gf4-pcj6-54rp
Downloads Resources over HTTP in strider-sauce
Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`. ## Recommendation While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number. In order to resolve the vulnerability, you will need to install the module manually from github: ``` npm install github:Strider-CD/strider-sauce#5ff6d65 ``` As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.
{'CVE-2016-10611'}
2021-06-11T12:35:11Z
2019-02-18T23:47:53Z
HIGH
8.1
{'CWE-311'}
{'https://www.npmjs.com/advisories/202', 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp', 'https://nodesecurity.io/advisories/202', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611'}
null
GHSA
GHSA-f3pp-32qc-36w4
Prototype Pollution in jointjs
This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
{'CVE-2021-23444'}
2021-10-04T14:21:41Z
2021-09-22T20:36:34Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://github.com/clientIO/joint/pull/1514', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817', 'https://github.com/clientIO/joint/releases/tag/v3.4.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816', 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578', 'https://github.com/advisories/GHSA-f3pp-32qc-36w4'}
null
GHSA
GHSA-rc9v-h28f-jcmf
There is a XML external entity expansion (XXE) vulnerability in Apache Solr config files
This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs.
{'CVE-2018-8010'}
2022-04-27T14:45:20Z
2018-10-17T19:56:04Z
MODERATE
5.5
{'CWE-611'}
{'https://mail-archives.apache.org/mod_mbox/www-announce/201805.mbox/%3C08a801d3f0f9%24df46d300%249dd47900%24%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8010', 'https://github.com/advisories/GHSA-rc9v-h28f-jcmf', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/104239'}
null
GHSA
GHSA-98hv-qff3-8793
Unrestricted Upload of File with Dangerous Type in django-widgy
Unrestricted Upload of File with Dangerous Type in Django-Widgy v0.8.4 allows remote attackers to execute arbitrary code via the 'image' widget in the component 'Change Widgy Page'.
{'CVE-2020-18704'}
2021-08-30T16:24:08Z
2021-08-30T16:24:08Z
CRITICAL
9.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-18704', 'https://github.com/fusionbox/django-widgy/issues/387', 'https://github.com/advisories/GHSA-98hv-qff3-8793'}
null
GHSA
GHSA-69rr-wvh9-6c4q
Directory Traversal in st
Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server. ## Recommendation Update to version 0.2.5 or later.
{'CVE-2014-3744'}
2021-09-23T21:00:00Z
2020-08-31T22:58:04Z
HIGH
7.5
{'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://www.npmjs.com/advisories/36', 'http://www.securityfocus.com/bid/67389', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3744', 'https://github.com/advisories/GHSA-69rr-wvh9-6c4q', 'https://nodesecurity.io/advisories/st_directory_traversal', 'https://github.com/isaacs/st#security-status', 'https://github.com/isaacs/st', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
GHSA
GHSA-2mvq-xp48-4c77
Denial of Service in subtext
All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2.
null
2021-09-29T18:37:05Z
2020-09-03T20:35:29Z
HIGH
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/1168', 'https://github.com/advisories/GHSA-2mvq-xp48-4c77', 'https://github.com/hapijs/subtext/issues/72'}
null
GHSA
GHSA-cq76-mxrc-vchh
Crash in `tf.math.segment_*` operations
### Impact The implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. ```python import tensorflow as tf tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) ``` This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the [implementation](https://github.com/tensorflow/tensorflow/blob/dae66e518c88de9c11718cd0f8f40a0b666a90a0/tensorflow/core/kernels/segment_reduction_ops_impl.h) (both on CPU and GPU) computes the output shape using [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408). However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440). ### Patches We have patched the issue in GitHub commit [e9c81c1e1a9cd8dd31f4e83676cab61b60658429](https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46888).
{'CVE-2021-41195'}
2021-11-10T19:36:50Z
2021-11-10T19:36:50Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/pull/51733', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41195', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/issues/46888', 'https://github.com/advisories/GHSA-cq76-mxrc-vchh', 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}
null
GHSA
GHSA-hpw4-m59j-9p52
Directory Traversal in dylmomo
Affected versions of `dylmomo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16163'}
2021-01-14T15:47:02Z
2020-09-01T17:29:13Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo', 'https://nodesecurity.io/advisories/396', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16163', 'https://www.npmjs.com/advisories/396', 'https://github.com/advisories/GHSA-hpw4-m59j-9p52'}
null
GHSA
GHSA-6wf9-jmg9-vxcc
XStream can cause a Denial of Service
### Impact The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39140](https://x-stream.github.io/CVE-2021-39140.html). ### Credits The vulnerability was discovered and reported by Lai Han of nsfocus security team. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39140'}
2022-04-22T15:42:25Z
2021-08-25T14:48:39Z
MODERATE
6.5
{'CWE-835', 'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2021-39140.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39140', 'https://github.com/advisories/GHSA-6wf9-jmg9-vxcc', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-6wf9-jmg9-vxcc', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-j9cf-pr2x-5273
Prototype Pollution in dot-object
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10793'}
2022-04-19T19:03:24Z
2022-02-09T22:33:31Z
MODERATE
6.3
{'CWE-74'}
{'https://github.com/advisories/GHSA-j9cf-pr2x-5273', 'https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905', 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10793'}
null
GHSA
GHSA-hf79-8hjp-rrvq
Use After Free in lucet
### Impact There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the `Instance` objects, it is possible to trigger a use-after-free when the `Instance` is dropped. ### Patches Users should upgrade to the `main` branch of the Lucet repository. Lucet does not provide versioned releases on crates.io. ### Workarounds There is no way to remediate this vulnerability without upgrading. ### Description Lucet uses a "pool" allocator for new WebAssembly instances that are created. This pool allocator manages everything from the linear memory of the wasm instance, the runtime stack for async switching, as well as the memory behind the Instance itself. `Instances` are referred to via an `InstanceHandle` type which will, on drop, release the memory backing the Instance back to the pool. When an Instance is dropped, the fields of the `Instance` are destructed top-to-bottom, however when the `alloc: Alloc` field is destructed, the memory backing the `Instance` is released back to the pool before the destructors of the remaining fields are run. If another thread allocates the same memory from the pool while these destructors are still running, a race condition occurs that can lead to use-after-free errors. The bug was corrected by changing how the `InstanceHandle` destructor operates to ensure that the memory backing an Instance is only returned to the pool once the `Instance` has been completely destroyed. This security advisory has been assigned CVE-2021-43790. ### For more information If you have any questions or comments about this advisory: * Open an issue in [lucet repository](https://github.com/bytecodealliance/lucet) * Email [the lucet team](mailto:lucet@fastly.com) * See the [Bytecode Alliance security policy](https://bytecodealliance.org/security)
{'CVE-2021-43790'}
2022-04-19T19:03:16Z
2021-11-30T22:20:36Z
HIGH
8.5
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43790', 'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8', 'https://github.com/advisories/GHSA-hf79-8hjp-rrvq', 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq', 'https://crates.io/crates/lucet-runtime'}
null
GHSA
GHSA-3vfw-7rcp-3xgm
Moderate severity vulnerability that affects actionpack
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
{'CVE-2011-3187'}
2021-08-31T21:31:48Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html', 'http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-3187', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://github.com/advisories/GHSA-3vfw-7rcp-3xgm', 'https://bugzilla.novell.com/show_bug.cgi?id=673010'}
null
GHSA
GHSA-5jq3-8437-x35p
Multiple cross-site scripting (XSS) vulnerabilities in Roundup
Multiple cross-site scripting (XSS) vulnerabilities in Roundup before 1.4.20 allow remote attackers to inject arbitrary web script or HTML via the (1) @ok_message or (2) @error_message parameter to issue*.
{'CVE-2012-6133'}
2022-04-26T20:47:41Z
2022-04-23T00:40:39Z
MODERATE
6.1
{'CWE-79'}
{'http://issues.roundup-tracker.org/issue2550724', 'https://github.com/advisories/GHSA-5jq3-8437-x35p', 'http://www.openwall.com/lists/oss-security/2013/02/13/8', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6133', 'https://bugzilla.redhat.com/show_bug.cgi?id=722672', 'http://www.openwall.com/lists/oss-security/2012/11/10/2', 'https://pypi.python.org/pypi/roundup/1.4.20'}
null
GHSA
GHSA-5x5w-v4xq-p64r
Directory Traversal in ewgaddis.lab6
Affected versions of `ewgaddis.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16175'}
2021-01-08T21:08:08Z
2018-07-23T20:44:52Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/465', 'https://github.com/advisories/GHSA-5x5w-v4xq-p64r', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16175', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6', 'https://www.npmjs.com/advisories/465'}
null
GHSA
GHSA-6gm7-j668-w6h9
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
{'CVE-2022-1219'}
2022-04-22T20:42:11Z
2022-04-09T00:00:30Z
HIGH
7.5
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017', 'https://github.com/advisories/GHSA-6gm7-j668-w6h9'}
null
GHSA
GHSA-r8hp-5m7c-jhv4
Cross-site Scripting OrchardCore.Application.Cms.Targets
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
{'CVE-2022-0274'}
2022-01-21T23:08:50Z
2022-01-21T23:08:50Z
MODERATE
6.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-r8hp-5m7c-jhv4', 'https://huntr.dev/bounties/a82a714a-9b71-475e-bfc3-43326fcaf764', 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0274'}
null
GHSA
GHSA-8hw9-22v6-9jr9
Any logged in user could edit any other logged in user.
### Impact Everyone who is running a12n-server. A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. ### Patches Patched in v0.18.2
{'CVE-2021-29452'}
2021-04-19T15:14:33Z
2021-04-19T15:14:33Z
HIGH
8.1
{'CWE-269'}
{'https://github.com/advisories/GHSA-8hw9-22v6-9jr9', 'https://www.npmjs.com/package/@curveball/a12n-server', 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452'}
null
GHSA
GHSA-v24h-pjjv-mcp6
Denial of service in Tendermint
### Description **Denial of Service 1** Tendermint 0.33.2 and earlier does not limit the number of P2P connection requests. For each p2p connection, Tendermint allocates XXX bytes. Even though this memory is garbage collected once the connection is terminated (due to duplicate IP or reaching a maximum number of inbound peers), temporary memory spikes can lead to OOM (Out-Of-Memory) exceptions. Tendermint 0.33.3 (and 0.32.10) limits the total number of P2P incoming connection requests to to `p2p.max_num_inbound_peers + len(p2p.unconditional_peer_ids)`. Notes: - Tendermint does not rate limit P2P connection requests per IP (an attacker can saturate all the inbound slots); - Tendermint does not rate limit HTTP(S) requests. If you expose any RPC endpoints to the public, please make sure to put in place some protection (https://www.nginx.com/blog/rate-limiting-nginx/). We may implement this in the future (https://github.com/tendermint/tendermint/issues/1696). **Denial of Service 2** Tendermint 0.33.2 and earlier does not reclaim `activeID` of a peer after it's removed in `Mempool` reactor. This does not happen all the time. It only happens when a connection fails (for any reason) before the `Peer` is created and added to all reactors. `RemovePeer` is therefore called before `AddPeer`, which leads to always growing memory (`activeIDs` map). The `activeIDs` map has a maximum size of 65535 and the node will panic if this map reaches the maximum. An attacker can create a lot of connection attempts (exploiting Denial of Service 1), which ultimately will lead to the node panicking. Tendermint 0.33.3 (and 0.32.10) claims `activeID` for a peer in `InitPeer`, which is executed before `MConnection` is started. Notes: - `InitPeer` function was added to all reactors to combat a similar issue - https://github.com/tendermint/tendermint/issues/3338; - Denial of Service 2 is independent of Denial of Service 1 and can be executed without it. ### Impact - All full nodes (except for validators who are behind closed networks) - Node's memory usage increases, then it panics either in the mempool or due to OOM. ### Patches - v0.33.3 - v0.32.10 - v0.31.12 ### Workarounds No workarounds. ### References - https://hackerone.com/reports/820317 (not disclosed yet) - https://github.com/tendermint/tendermint/issues/3338 - https://github.com/tendermint/tendermint/issues/1696 ### For more information If you have any questions or comments about this advisory: * Open an issue in [tendermint/tendermint](https://github.com/tendermint/tendermint) * Email us at [security@tendermint.com](mailto:security@tendermint.com) More information can be found [here](https://tendermint.com/security/). ### Credits - [fudongbai](https://hackerone.com/fudongbai) for discovering and reporting Denial of Service 2 - Ethan Buchman (@ebuchman) for writing a test case for Denial of Service 2 and Tess Rinearson (@tessr) for fixing it - Anton Kaliaev (@melekes) for fixing Denial of Service 1
{'CVE-2020-5303'}
2021-05-27T18:44:09Z
2021-05-27T18:44:09Z
LOW
3.1
{'CWE-789', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5303', 'https://github.com/tendermint/tendermint/security/advisories/GHSA-v24h-pjjv-mcp6', 'https://github.com/tendermint/tendermint/commit/e2d6859afd7dba4cf97c7f7d412e7d8fc908d1cd', 'https://github.com/tendermint/tendermint/blob/master/CHANGELOG.md#denial-of-service-1', 'https://github.com/tendermint/tendermint/issues/3338', 'https://github.com/tendermint/tendermint/issues/1696', 'https://hackerone.com/reports/820317', 'https://github.com/advisories/GHSA-v24h-pjjv-mcp6'}
null
GHSA
GHSA-hf23-9pf7-388p
Deserialization of Untrusted Data and Code Injection in xstream
It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285)
{'CVE-2019-10173'}
2021-07-27T20:56:11Z
2019-07-26T16:09:47Z
CRITICAL
9.8
{'CWE-94', 'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://x-stream.github.io/changes.html#1.4.11', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10173', 'https://github.com/advisories/GHSA-hf23-9pf7-388p', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10173'}
null
GHSA
GHSA-vc6r-4x6g-mmqc
Path Traversal in m-server
Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server. ## Recommendation Update to version 1.4.2 or later.
null
2021-08-04T21:07:26Z
2019-06-11T16:16:23Z
MODERATE
0
{'CWE-22'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json', 'https://hackerone.com/reports/319795', 'https://www.npmjs.com/advisories/731', 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a', 'https://github.com/advisories/GHSA-vc6r-4x6g-mmqc'}
null
GHSA
GHSA-wqhw-frpx-5mmp
Command Injection in tomato
All versions of `tomato` are vulnerable to Command Injection. The /api/exec endpoint does not validate user input allowing attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T16:16:14Z
2020-09-02T16:01:33Z
HIGH
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/797', 'https://github.com/advisories/GHSA-wqhw-frpx-5mmp'}
null
GHSA
GHSA-6qh5-wx38-q92g
Directory Traversal in ltt.js
Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2021-08-04T20:10:41Z
2019-05-30T17:15:59Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/411', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js', 'https://github.com/advisories/GHSA-6qh5-wx38-q92g'}
null
GHSA
GHSA-cx4j-fxr7-jxg8
Double free in glsl-layout
An issue was discovered in the glsl-layout crate before 0.4.0 for Rust. When a panic occurs, map_array can perform a double drop.
{'CVE-2021-25902'}
2021-08-25T20:53:01Z
2021-08-25T20:53:01Z
HIGH
7.5
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25902', 'https://github.com/rustgd/glsl-layout/pull/10', 'https://github.com/advisories/GHSA-cx4j-fxr7-jxg8', 'https://rustsec.org/advisories/RUSTSEC-2021-0005.html'}
null
GHSA
GHSA-m4hj-wg2r-qpcr
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3776'}
2021-11-17T21:10:57Z
2021-11-15T23:13:34Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-m4hj-wg2r-qpcr', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
null
GHSA
GHSA-9m6f-7xcq-8vf8
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.docx4j.org.apache.xalan.lib.sql.JNDIConnectionPool.
{'CVE-2020-36183'}
2022-04-22T18:15:48Z
2021-12-09T19:16:34Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36183', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/FasterXML/jackson-databind/issues/3003', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/advisories/GHSA-9m6f-7xcq-8vf8', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-vfp9-gwrh-wq9g
Path Traversal in crud-file-server
Versions of `crud-file-server` prior to 0.9.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 0.9.0 or later.
{'CVE-2018-3733'}
2021-01-08T01:57:29Z
2018-07-18T21:20:19Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/310690', 'https://github.com/omphalos/crud-file-server/commit/4fc3b404f718abb789f4ce4272c39c7a138c7a82', 'https://github.com/advisories/GHSA-vfp9-gwrh-wq9g', 'https://www.npmjs.com/advisories/1003', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3733'}
null
GHSA
GHSA-w4xf-2pqw-5mq7
Reference binding to nullptr in `RaggedTensorToVariant`
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`: ```python import tensorflow as tf tf.raw_ops.RaggedTensorToVariant( rt_nested_splits=[], rt_dense_values=[1,2,3], batched_input=True) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L129) has an incomplete validation of the splits values, missing the case when the argument would be empty. ### Patches We have patched the issue in GitHub commit [be7a4de6adfbd303ce08be4332554dff70362612](https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37666'}
2021-08-25T14:42:13Z
2021-08-25T14:42:13Z
HIGH
7.8
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37666', 'https://github.com/advisories/GHSA-w4xf-2pqw-5mq7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7', 'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'}
null
GHSA
GHSA-f8m6-h2c7-8h9x
Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize)
### Impact The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.word_tokenize). Any users of this class, or these two functions, are vulnerable to a Regular Expression Denial of Service (ReDoS) attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. The effect of this vulnerability is noticeable with the following example: ```python from nltk.tokenize import word_tokenize n = 8 for length in [10**i for i in range(2, n)]: # Prepare a malicious input text = "a" * length start_t = time.time() # Call `word_tokenize` and naively measure the execution time word_tokenize(text) print(f"A length of {length:<{n}} takes {time.time() - start_t:.4f}s") ``` Which gave the following output during testing: ```python A length of 100 takes 0.0060s A length of 1000 takes 0.0060s A length of 10000 takes 0.6320s A length of 100000 takes 56.3322s ... ``` I canceled the execution of the program after running it for several hours. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability, or applying the workaround described below. ### Patches The problem has been patched in NLTK 3.6.6. After the fix, running the above program gives the following result: ```python A length of 100 takes 0.0070s A length of 1000 takes 0.0010s A length of 10000 takes 0.0060s A length of 100000 takes 0.0400s A length of 1000000 takes 0.3520s A length of 10000000 takes 3.4641s ``` This output shows a linear relationship in execution time versus input length, which is desirable for regular expressions. We recommend updating to NLTK 3.6.6+ if possible. ### Workarounds The execution time of the vulnerable functions is exponential to the length of a malicious input. With other words, the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit. ### References * The issue showcasing the vulnerability: https://github.com/nltk/nltk/issues/2866 * The pull request containing considerably more information on the vulnerability, and the fix: https://github.com/nltk/nltk/pull/2869 * The commit containing the fix: 1405aad979c6b8080dbbc8e0858f89b2e3690341 * Information on CWE-1333: Inefficient Regular Expression Complexity: https://cwe.mitre.org/data/definitions/1333.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/nltk/nltk](https://github.com/nltk/nltk) * Email us at [nltk.team@gmail.com](mailto:nltk.team@gmail.com)
{'CVE-2021-43854'}
2022-04-19T19:03:16Z
2022-01-06T17:38:45Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/nltk/nltk/issues/2866', 'https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341', 'https://github.com/advisories/GHSA-f8m6-h2c7-8h9x', 'https://github.com/nltk/nltk/pull/2869', 'https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43854'}
null
GHSA
GHSA-r2rg-683g-ff96
Malicious Package in axios-http
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:11:07Z
2020-09-03T19:40:12Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1123', 'https://github.com/advisories/GHSA-r2rg-683g-ff96'}
null
GHSA
GHSA-4q96-9f63-p7jj
Path Traversal in ImpressCMS
ImpressCMS before 1.4.3 allows libraries/image-editor/image-edit.php image_temp Directory Traversal.
{'CVE-2021-26601'}
2022-04-05T21:19:17Z
2022-03-29T00:01:16Z
HIGH
8.1
{'CWE-22'}
{'https://hackerone.com/reports/1081878', 'http://seclists.org/fulldisclosure/2022/Mar/44', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3', 'https://github.com/ImpressCMS/impresscms/pull/915', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26601', 'http://karmainsecurity.com/KIS-2022-02', 'http://packetstormsecurity.com/files/166402/ImpressCMS-1.4.2-Path-Traversal.html', 'https://github.com/ImpressCMS/impresscms/issues/914', 'https://github.com/advisories/GHSA-4q96-9f63-p7jj'}
null
GHSA
GHSA-jf7h-7m85-w2v2
Integer overflow in TFLite memory allocation
### Impact The TFLite code for allocating `TFLiteIntArray`s is [vulnerable to an integer overflow issue](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L24-L27): ```cc int TfLiteIntArrayGetSizeInBytes(int size) { static TfLiteIntArray dummy; return sizeof(dummy) + sizeof(dummy.data[0]) * size; } ``` An attacker can craft a model such that the `size` multiplier is so large that the return value overflows the `int` datatype and becomes negative. In turn, this results in [invalid value being given to `malloc`](https://github.com/tensorflow/tensorflow/blob/4ceffae632721e52bf3501b736e4fe9d1221cdfa/tensorflow/lite/c/common.c#L47-L52): ```cc TfLiteIntArray* TfLiteIntArrayCreate(int size) { TfLiteIntArray* ret = (TfLiteIntArray*)malloc(TfLiteIntArrayGetSizeInBytes(size)); ret->size = size; return ret; } ``` In this case, `ret->size` would dereference an invalid pointer. ### Patches We have patched the issue in GitHub commit [7c8cc4ec69cd348e44ad6a2699057ca88faad3e5](https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29605'}
2021-05-21T14:28:22Z
2021-05-21T14:28:22Z
HIGH
7.1
{'CWE-190'}
{'https://github.com/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jf7h-7m85-w2v2', 'https://github.com/tensorflow/tensorflow/commit/7c8cc4ec69cd348e44ad6a2699057ca88faad3e5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29605'}
null
GHSA
GHSA-gf8j-v8x5-h9qp
XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes
enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript&#9;:alert substring.
{'CVE-2019-18857'}
2022-04-19T19:03:23Z
2020-01-08T17:15:37Z
HIGH
7.5
{'CWE-79'}
{'https://github.com/advisories/GHSA-gf8j-v8x5-h9qp', 'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18857'}
null
GHSA
GHSA-g9xh-3w5g-229r
SQL Injection in LibreNMS
An issue was discovered in LibreNMS through 1.47. It does not parameterize all user supplied input within database queries, resulting in SQL injection. An authenticated attacker can subvert these database queries to extract or manipulate data, as demonstrated by the graph.php sort parameter.
{'CVE-2019-10671'}
2021-08-18T17:22:23Z
2019-10-11T18:43:33Z
HIGH
8.8
{'CWE-89'}
{'https://www.darkmatter.ae/xen1thlabs/librenms-multiple-sql-injection-vulnerability-xl-19-025/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10671', 'https://github.com/advisories/GHSA-g9xh-3w5g-229r'}
null
GHSA
GHSA-hr52-f9vp-582c
Use of Uninitialized Resource in messagepack-rs.
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations.
{'CVE-2021-45692'}
2022-01-07T16:30:51Z
2022-01-06T22:12:28Z
CRITICAL
9.8
{'CWE-908'}
{'https://github.com/advisories/GHSA-hr52-f9vp-582c', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45692'}
null
GHSA
GHSA-mf79-f657-47ww
Insufficient Session Expiration in Admidio
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
{'CVE-2022-0991'}
2022-03-29T21:39:04Z
2022-03-20T00:00:29Z
HIGH
8.2
{'CWE-613'}
{'https://github.com/Admidio/admidio/issues/1238', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/releases/tag/v4.1.9', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://github.com/advisories/GHSA-mf79-f657-47ww', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4'}
null
GHSA
GHSA-v86x-f47q-f7f4
Unauthorized File Access in atompm
Versions of `atompm` prior to 0.8.2 are vulnerable to Unauthorized File Access. The package fails to sanitize relative paths in the URL for file downloads, allowing attackers to download arbitrary files from the system. ## Recommendation Upgrade to version 0.8.2 or later.
null
2021-09-28T15:20:06Z
2020-09-11T21:09:24Z
HIGH
0
{'CWE-200'}
{'https://github.com/advisories/GHSA-v86x-f47q-f7f4', 'https://www.npmjs.com/advisories/959'}
null
GHSA
GHSA-vrgh-5w3c-ggf8
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).
{'CVE-2021-3990'}
2021-12-03T20:38:50Z
2021-12-03T20:38:50Z
MODERATE
6.5
{'CWE-338'}
{'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0', 'https://github.com/advisories/GHSA-vrgh-5w3c-ggf8', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3990'}
null
GHSA
GHSA-vhm6-gw82-6f8j
Cross site scripting in LibreNMS
LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting.
{'CVE-2022-0772'}
2022-03-08T18:06:06Z
2022-02-28T00:00:34Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://github.com/advisories/GHSA-vhm6-gw82-6f8j'}
null
GHSA
GHSA-7rjr-3q55-vv33
Incomplete fix for Apache Log4j vulnerability
# Impact The fix to address [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allow attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a remote code execution (RCE) attack. ## Affected packages Only the `org.apache.logging.log4j:log4j-core` package is directly affected by this vulnerability. The `org.apache.logging.log4j:log4j-api` should be kept at the same version as the `org.apache.logging.log4j:log4j-core` package to ensure compatability if in use. # Mitigation Log4j 2.16.0 fixes this issue by removing support for message lookup patterns and disabling JNDI functionality by default. This issue can be mitigated in prior releases (< 2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default. Note that previous mitigations involving configuration such as to set the system property `log4j2.formatMsgNoLookups` to `true` do NOT mitigate this specific vulnerability.
{'CVE-2021-45046'}
2022-04-19T19:03:27Z
2021-12-14T18:01:28Z
CRITICAL
9
{'CWE-502'}
{'https://www.oracle.com/security-alerts/alert-cve-2021-44228.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-714170.pdf', 'https://cert-portal.siemens.com/productcert/pdf/ssa-479842.pdf', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd', 'http://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://github.com/advisories/GHSA-7rjr-3q55-vv33', 'https://www.debian.org/security/2021/dsa-5022', 'https://www.openwall.com/lists/oss-security/2021/12/14/4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EOKPQGV24RRBBI4TBZUDQMM4MEH7MXCY/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45046', 'https://cert-portal.siemens.com/productcert/pdf/ssa-661247.pdf', 'http://www.openwall.com/lists/oss-security/2021/12/18/1', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://logging.apache.org/log4j/2.x/security.html', 'https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00646.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SIG7FZULMNK2XF6FZRU4VWYDQXNMUGAJ/', 'http://www.openwall.com/lists/oss-security/2021/12/15/3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-397453.pdf', 'https://www.cve.org/CVERecord?id=CVE-2021-44228', 'https://www.kb.cert.org/vuls/id/930724', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q'}
null
GHSA
GHSA-3f97-rj68-2pjf
Malicious Package in buffe2-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:57:29Z
2020-09-03T21:48:35Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1238', 'https://github.com/advisories/GHSA-3f97-rj68-2pjf'}
null
GHSA
GHSA-89gv-h8wf-cg8r
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. Example URL: `https:/\/\/\expected-example.com/path` Escaped string: `https:/\\/\\/\\expected-example.com/path` (JavaScript strings must escape backslash) Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html). ### Patches Version 1.19.7 is patched against all known payload variants. ### References https://github.com/medialize/URI.js/releases/tag/v1.19.7 (fix for this particular bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for related bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass) [PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling) ### For more information If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js ### Reporter credit [ready-research](https://github.com/ready-research) via https://huntr.dev/
{'CVE-2021-3647'}
2022-04-19T19:03:03Z
2021-07-19T21:22:36Z
MODERATE
5.3
{'CWE-601'}
{'https://github.com/medialize/URI.js/pull/233', 'https://github.com/advisories/GHSA-89gv-h8wf-cg8r', 'https://github.com/medialize/URI.js/releases/tag/v1.19.6', 'https://github.com/medialize/URI.js/releases/tag/v1.19.3', 'https://github.com/medialize/URI.js/security/advisories/GHSA-89gv-h8wf-cg8r', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://github.com/medialize/URI.js/releases/tag/v1.19.7', 'https://huntr.dev/bounties/1625558772840-medialize/URI.js', 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3647'}
null
GHSA
GHSA-pmgv-94f5-6w7w
Malicious Package in eact
All versions of `eact` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:03:03Z
2020-09-02T20:21:30Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-pmgv-94f5-6w7w', 'https://www.npmjs.com/advisories/853'}
null
GHSA
GHSA-qq3j-xp49-j73f
Plugin archive directory traversal in Helm
The Helm core maintainers have identified an information disclosure vulnerability in Helm 3.0.0-3.2.3. ### Impact A traversal attack is possible when installing Helm plugins from a tar archive over HTTP. It is possible for a malicious plugin author to inject a relative path into a plugin archive, and copy a file outside of the intended directory. Traversal Attacks are a form of a Directory Traversal that can be exploited by extracting files from an archive. The premise of the Directory Traversal vulnerability is that an attacker can gain access to parts of the file system outside of the target folder in which they should reside. The attacker can then overwrite executable files and either invoke them remotely or wait for the system or user to call them, thus achieving Remote Command Execution on the victim's machine. The vulnerability can also cause damage by overwriting configuration files or other sensitive resources, and can be exploited on both client (user) machines and servers. https://snyk.io/research/zip-slip-vulnerability ### Patches This issue has been fixed in Helm 3.2.4 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the Helm repository](https://github.com/helm/helm/issues) * For security-specific issues, email us at [cncf-helm-security@lists.cncf.io](mailto:cncf-helm-security@lists.cncf.io)
{'CVE-2020-4053'}
2022-04-19T19:02:28Z
2021-06-23T18:14:36Z
LOW
3.7
{'CWE-22'}
{'https://github.com/helm/helm/pull/8317', 'https://github.com/helm/helm/releases/tag/v3.2.4', 'https://github.com/helm/helm/security/advisories/GHSA-qq3j-xp49-j73f', 'https://github.com/advisories/GHSA-qq3j-xp49-j73f', 'https://github.com/helm/helm/commit/b6bbe4f08bbb98eadd6c9cd726b08a5c639908b3', 'https://github.com/helm/helm/commit/0ad800ef43d3b826f31a5ad8dfbb4fe05d143688', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4053'}
null
GHSA
GHSA-r578-pj6f-r4ff
Auto-merging Person Records Compromised
### Impact New user registrations are able to access anyone's account by only knowing their basic profile information (name, birthday, gender, etc). This includes all app functionality within the app, as well as any authenticated links to Rock-based webpages (such as giving and events). ### Patches We have released a security patch on v2.20.0. The solution was to create a duplicate person and then patch the new person with their profile details. ### Workarounds If you do not wish to upgrade your app to the new version, you can patch your server by overriding the `create` data source method on the `People` class. ```js create = async (profile) => { const rockUpdateFields = this.mapApollosFieldsToRock(profile); // auto-merge functionality is compromised // we are creating a new user and patching them with profile details const id = await this.post('/People', { Gender: 0, // required by Rock. Listed first so it can be overridden. IsSystem: false, // required by rock }); await this.patch(`/People/${id}`, { ...rockUpdateFields, }); return id; }; ``` ### For more information If you have any questions or comments about this advisory: * Email us at [support@apollos.app](mailto:support@apollos.app)
{'CVE-2021-32691'}
2021-06-25T13:13:03Z
2021-06-21T17:07:47Z
HIGH
8.8
{'CWE-287', 'CWE-303'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32691', 'https://github.com/advisories/GHSA-r578-pj6f-r4ff', 'https://github.com/ApollosProject/apollos-apps/releases/tag/v2.20.0', 'https://github.com/ApollosProject/apollos-apps/commit/cb5f8f1c0b24f1b215b2bb5eb6f9a8e16d728ce2', 'https://github.com/ApollosProject/apollos-apps/security/advisories/GHSA-r578-pj6f-r4ff'}
null
GHSA
GHSA-xh55-2fqp-p775
Command injection in mail agent settings
### Impact Command injection in mail agent settings ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2021-37708'}
2021-08-30T16:14:09Z
2021-08-30T16:14:09Z
HIGH
8.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}
null
GHSA
GHSA-w2pm-r78h-4m7v
OS Command Injection in Laravel Framework
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
{'CVE-2020-19316'}
2022-01-06T23:13:42Z
2022-01-06T23:13:42Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'https://github.com/advisories/GHSA-w2pm-r78h-4m7v', 'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/'}
null
GHSA
GHSA-9gwq-6cwj-47h3
Integer overflow in TFLite array creation
### Impact An attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60): ```cc TfLiteIntArray* TfLiteIntArrayCreate(int size) { int alloc_size = TfLiteIntArrayGetSizeInBytes(size); // ... TfLiteIntArray* ret = (TfLiteIntArray*)malloc(alloc_size); // ... } ``` The [`TfLiteIntArrayGetSizeInBytes`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33) returns an `int` instead of a `size_t`: ```cc int TfLiteIntArrayGetSizeInBytes(int size) { static TfLiteIntArray dummy; int computed_size = sizeof(dummy) + sizeof(dummy.data[0]) * size; #if defined(_MSC_VER) // Context for why this is needed is in http://b/189926408#comment21 computed_size -= sizeof(dummy.data[0]); #endif return computed_size; } ``` An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. ### Patches We have patched the issue in GitHub commit [a1e1511dde36b3f8aa27a6ec630838e7ea40e091](https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23558'}
2022-02-11T15:08:44Z
2022-02-09T23:52:24Z
HIGH
7.6
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60', 'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L24-L33', 'https://github.com/advisories/GHSA-9gwq-6cwj-47h3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23558'}
null
GHSA
GHSA-pq7m-3gw7-gq5x
Execution with Unnecessary Privileges in ipython
We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another. Proof of concept User1: ``` mkdir -m 777 /tmp/profile_default mkdir -m 777 /tmp/profile_default/startup echo 'print("stealing your private secrets")' > /tmp/profile_default/startup/foo.py ``` User2: ``` cd /tmp ipython ``` User2 will see: ``` Python 3.9.7 (default, Oct 25 2021, 01:04:21) Type 'copyright', 'credits' or 'license' for more information IPython 7.29.0 -- An enhanced Interactive Python. Type '?' for help. stealing your private secrets ``` ## Patched release and documentation See https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699, Version 8.0.1, 7.31.1 for current Python version are recommended. Version 7.16.3 has also been published for Python 3.6 users, Version 5.11 (source only, 5.x branch on github) for older Python versions.
{'CVE-2022-21699'}
2022-02-16T22:13:05Z
2022-01-21T18:55:30Z
HIGH
8.2
{'CWE-279', 'CWE-269', 'CWE-250'}
{'https://github.com/advisories/GHSA-pq7m-3gw7-gq5x', 'https://ipython.readthedocs.io/en/stable/whatsnew/version8.html#ipython-8-0-1-cve-2022-21699', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRQRTWHYXMLDJ572VGVUZMUPEOTPM3KB/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21699', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00021.html', 'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668', 'https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZ7LVZBB4D7KVSFNEQUBEHFO3JW6D2ZK/'}
null
GHSA
GHSA-8gg6-3r63-25m8
High severity vulnerability that affects git-fastclone
git-fastclone before 1.0.1 permits arbitrary shell command execution from .gitmodules. If an attacker can instruct a user to run a recursive clone from a repository they control, they can get a client to run an arbitrary shell command. Alternately, if an attacker can MITM an unencrypted git clone, they could exploit this. The ext command will be run if the repository is recursively cloned or if submodules are updated. This attack works when cloning both local and remote repositories.
{'CVE-2015-8968'}
2021-09-07T19:46:31Z
2018-08-15T20:03:37Z
HIGH
8.8
{'CWE-77'}
{'https://github.com/square/git-fastclone/pull/2', 'https://hackerone.com/reports/104465', 'http://www.securityfocus.com/bid/81433', 'https://github.com/advisories/GHSA-8gg6-3r63-25m8', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8968'}
null
GHSA
GHSA-mqm2-cgpr-p4m6
Unintended read access in kramdown gem
The kramdown gem before 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.
{'CVE-2020-14001'}
2022-04-29T20:26:20Z
2020-08-07T22:27:41Z
CRITICAL
9.8
{'CWE-862'}
{'https://kramdown.gettalong.org/news.html', 'https://github.com/gettalong/kramdown/commit/1b8fd33c3120bfc6e5164b449e2c2fc9c9306fde', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00014.html', 'https://github.com/gettalong/kramdown/compare/REL_2_2_1...REL_2_3_0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KBLTGBYU7NKOUOHDKVCU4GFZMGA6BP4L/', 'https://www.debian.org/security/2020/dsa-4743', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14001', 'https://kramdown.gettalong.org', 'https://rubygems.org/gems/kramdown', 'https://usn.ubuntu.com/4562-1/', 'https://security.netapp.com/advisory/ntap-20200731-0004/', 'https://github.com/advisories/GHSA-mqm2-cgpr-p4m6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENMMGKHRQIZ3QKGOMBBBGB6B4LB5I7NQ/', 'https://lists.apache.org/thread.html/r96df7899fbb456fe2705882f710a0c8e8614b573fbffd8d12e3f54d2@%3Cnotifications.fluo.apache.org%3E'}
null
GHSA
GHSA-73wx-rpj3-mx46
Path traversal in MCMS
MCMS v5.2.4 was discovered to contain an arbitrary file deletion vulnerability via the component /template/unzip.do.
{'CVE-2021-46037'}
2022-03-01T21:31:22Z
2022-02-19T00:01:25Z
HIGH
8.1
{'CWE-22'}
{'https://github.com/advisories/GHSA-73wx-rpj3-mx46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46037', 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}
null
GHSA
GHSA-vf8q-pw7h-r2x2
Malicious Package in epress
Version 4.13.2 of `epress` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-30T22:03:15Z
2020-09-11T21:15:54Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/925', 'https://github.com/advisories/GHSA-vf8q-pw7h-r2x2'}
null
GHSA
GHSA-m2pf-hprp-3vqm
Use after free in image
An issue was discovered in the image crate before 0.21.3 for Rust, affecting the HDR image format decoder. Vec::set_len is called on an uninitialized vector, leading to a use-after-free and arbitrary code execution.
{'CVE-2019-16138'}
2021-08-25T20:44:43Z
2021-08-25T20:44:43Z
CRITICAL
9.8
{'CWE-416'}
{'https://github.com/image-rs/image/pull/985', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16138', 'https://rustsec.org/advisories/RUSTSEC-2019-0014.html', 'https://github.com/advisories/GHSA-m2pf-hprp-3vqm'}
null
GHSA
GHSA-mhxg-pr3j-v9gr
Malicious Package in colne
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:04Z
2020-09-03T19:41:22Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1386', 'https://github.com/advisories/GHSA-mhxg-pr3j-v9gr'}
null
GHSA
GHSA-6g3c-2mh5-7q6x
Missing validation of JWT signature in `ManyDesigns/Portofino`
### Impact https://github.com/ManyDesigns/Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. ### Patches The issue will be patched in the upcoming 5.2.1 release. ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/ManyDesigns/Portofino](https://github.com/ManyDesigns/Portofino)
{'CVE-2021-29451'}
2022-04-19T19:02:53Z
2021-04-19T14:56:33Z
CRITICAL
9.1
{'CWE-347'}
{'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x', 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451', 'https://github.com/advisories/GHSA-6g3c-2mh5-7q6x', 'https://mvnrepository.com/artifact/com.manydesigns/portofino'}
null
GHSA
GHSA-v3f7-j968-4h5f
Division by zero in Tensorflow
### Impact The [estimator for the cost of some convolution operations](https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198) can be made to execute a division by 0: ```python import tensorflow as tf @tf.function def test(): y=tf.raw_ops.AvgPoolGrad( orig_input_shape=[1,1,1,1], grad=[[[[1.0],[1.0],[1.0]]],[[[2.0],[2.0],[2.0]]],[[[3.0],[3.0],[3.0]]]], ksize=[1,1,1,1], strides=[1,1,1,0], padding='VALID', data_format='NCHW') return y test() ``` The function fails to check that the stride argument is stricly positive: ```cc int64_t GetOutputSize(const int64_t input, const int64_t filter, const int64_t stride, const Padding& padding) { // Logic for calculating output shape is from GetWindowedOutputSizeVerbose() // function in third_party/tensorflow/core/framework/common_shape_fns.cc. if (padding == Padding::VALID) { return (input - filter + stride) / stride; } else { // SAME. return (input + stride - 1) / stride; } } ``` Hence, the fix is to add a check for the stride argument to ensure it is valid. ### Patches We have patched the issue in GitHub commit [3218043d6d3a019756607643cf65574fbfef5d7a](https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21725'}
2022-02-11T17:05:09Z
2022-02-10T00:15:07Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-v3f7-j968-4h5f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f', 'https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198', 'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21725'}
null
GHSA
GHSA-w534-q4xf-h5v2
XSS in Mapfish Print relating to JSONP support
### Impact A user can use the JSONP support to do a Cross-site scripting. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e * https://cwe.mitre.org/data/definitions/79.html ### For more information If you have any questions or comments about this advisory Comment the pull request: https://github.com/mapfish/mapfish-print/pull/1397
{'CVE-2020-15231'}
2021-01-07T23:47:27Z
2020-07-07T16:32:49Z
LOW
9.3
{'CWE-79'}
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2', 'https://github.com/advisories/GHSA-w534-q4xf-h5v2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15231'}
null
GHSA
GHSA-w729-7633-2fw5
Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm
An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4
{'CVE-2021-40865'}
2021-10-29T13:51:59Z
2021-10-27T18:52:06Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-w729-7633-2fw5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40865', 'https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E', 'https://seclists.org/oss-sec/2021/q4/45'}
null
GHSA
GHSA-wgmx-52ph-qqcw
High severity vulnerability that affects qutebrowser
qutebrowser before version 1.4.1 is vulnerable to a cross-site request forgery flaw that allows websites to access 'qute://*' URLs. A malicious website could exploit this to load a 'qute://settings/set' URL, which then sets 'editor.command' to a bash script, resulting in arbitrary code execution.
{'CVE-2018-10895'}
2021-09-21T20:42:18Z
2018-10-10T16:05:23Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-wgmx-52ph-qqcw', 'https://github.com/qutebrowser/qutebrowser/commit/43e58ac865ff862c2008c510fc5f7627e10b4660', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10895'}
null
GHSA
GHSA-87cj-px37-rc3x
OS Command Injection in bikeshed
This affects the package bikeshed before 3.0.0. This can occur when an untrusted source file containing Inline Tag Command metadata is processed. When an arbitrary OS command is executed, the command output would be included in the HTML output.
{'CVE-2021-23422'}
2021-08-30T16:25:35Z
2021-08-30T16:25:35Z
HIGH
7.8
{'CWE-78'}
{'https://github.com/tabatkins/bikeshed/commit/b2f668fca204260b1cad28d5078e93471cb6b2dd', 'https://github.com/advisories/GHSA-87cj-px37-rc3x', 'https://snyk.io/vuln/SNYK-PYTHON-BIKESHED-1537646', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23422'}
null
GHSA
GHSA-jc6q-27mw-p55w
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that when Keycloak before 2.5.5 receives a Logout request with a Extensions in the middle of the request, the SAMLSloRequestParser.parse() method ends in a infinite loop. An attacker could use this flaw to conduct denial of service attacks.
{'CVE-2017-2646'}
2021-09-14T19:37:32Z
2018-10-18T16:49:29Z
HIGH
7.5
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-2646', 'https://github.com/advisories/GHSA-jc6q-27mw-p55w'}
null
GHSA
GHSA-f9wg-5f46-cjmw
NextAuth.js default redirect callback vulnerable to open redirects
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to upgrade for any reason, you can add a configuration to your `callbacks` option: ```js // async redirect(url, baseUrl) { // v3 async redirect({ url, baseUrl }) { // v4 // Allows relative callback URLs if (url.startsWith("/")) return new URL(url, baseUrl).toString() // Allows callback URLs on the same origin else if (new URL(url).origin === baseUrl) return url return baseUrl } ``` If you already have a `redirect` callback, make sure that you match the incoming `url` origin against the `baseUrl`.
{'CVE-2022-24858'}
2022-05-03T02:26:17Z
2022-04-22T20:49:09Z
MODERATE
6.1
{'CWE-290', 'CWE-601'}
{'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw', 'https://github.com/advisories/GHSA-f9wg-5f46-cjmw', 'https://next-auth.js.org/getting-started/upgrade-v4', 'https://next-auth.js.org/configuration/callbacks#redirect-callback', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858', 'https://github.com/nextauthjs/next-auth/releases/tag/next-auth%40v4.3.2', 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}
null
GHSA
GHSA-8qh7-xw58-3ww7
Malicious Package in radic-util
Version 1.0.2 of `radic-util` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:25:37Z
2020-09-11T21:25:37Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-8qh7-xw58-3ww7', 'https://www.npmjs.com/advisories/942'}
null
GHSA
GHSA-8m5h-hrqm-pxm2
Path traversal in the OWASP Enterprise Security API
### Impact The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string representing the 'input' path. ### Patches This vulnerability is patched in release 2.3.0.0 of ESAPI. See https://github.com/ESAPI/esapi-java-legacy/releases/tag/esapi-2.3.0.0 for details. ### Workarounds Yes; in theory, one _could_ write the own implementation of the Validator interface. This would most easily be done by sub-classing a version of the affected `DefaultValidator` class and then overriding the affected `getValidDirectoryPath()` to correct the issue. However, this is not recommended. ### For more information If you have any questions or comments about this advisory: * Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders". * Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
{'CVE-2022-23457'}
2022-04-27T21:09:46Z
2022-04-27T21:09:43Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23457', 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md', 'https://github.com/advisories/GHSA-8m5h-hrqm-pxm2'}
null
GHSA
GHSA-vf6q-9f2f-mwhv
Improper network isolation in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise up to version 1.0.4 bridge networking mode allows ARP spoofing from other bridged tasks on the same node. Fixed in 0.12.12, 1.0.5, and 1.1.0 RC1.
{'CVE-2021-32575'}
2021-06-24T20:28:21Z
2021-06-24T20:28:21Z
MODERATE
6.5
{'CWE-1100'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32575', 'https://github.com/advisories/GHSA-vf6q-9f2f-mwhv', 'https://www.hashicorp.com/blog/category/nomad', 'https://discuss.hashicorp.com/t/hcsec-2021-14-nomad-bridge-networking-mode-allows-arp-spoofing-from-other-bridged-tasks-on-same-node/24296'}
null
GHSA
GHSA-8x44-pwr2-rgc6
Cross-site Scripting in pimcore
Pimcore settings module is vulnerable to stored cross site scripting
{'CVE-2022-0348'}
2022-02-03T19:56:46Z
2022-01-28T23:05:03Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://github.com/advisories/GHSA-8x44-pwr2-rgc6'}
null
GHSA
GHSA-gv73-9mwv-fwgq
Out of bounds write in prost
An issue was discovered in the prost crate before 0.6.1 for Rust. There is stack consumption via a crafted message, causing a denial of service (e.g., x86) or possibly remote code execution (e.g., ARM).
{'CVE-2020-35858'}
2021-08-25T20:46:11Z
2021-08-25T20:46:11Z
CRITICAL
9.8
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35858', 'https://rustsec.org/advisories/RUSTSEC-2020-0002.html', 'https://github.com/danburkert/prost/issues/267', 'https://github.com/advisories/GHSA-gv73-9mwv-fwgq'}
null
GHSA
GHSA-wr66-vrwm-5g5x
Denial of Service Vulnerability in next.js
### Impact Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality. - **Affected:** All of the following must be true to be affected by this CVE - Next.js versions above v12.0.0 - Using next start or a custom server - Using the built-in i18n support - **Not affected:** - Deployments on Vercel (vercel.com) are not affected along with similar environments where invalid requests are filtered before reaching Next.js. ### Patches A patch has been released, `next@12.0.9`, that mitigates this issue. We recommend all affected users upgrade as soon as possible. ### Workarounds We recommend upgrading whether you can reproduce or not although you can ensure `/${locale}/_next/` is blocked from reaching the Next.js instance until you upgrade. ### For more information If you have any questions or comments about this advisory: * Open an issue in [next](https://github.com/vercel/next.js) * Email us at [security@vercel.com](mailto:security@vercel.com)
{'CVE-2022-21721'}
2022-04-19T19:03:21Z
2022-01-28T23:09:22Z
MODERATE
5.9
{'CWE-20', 'CWE-400'}
{'https://github.com/vercel/next.js/pull/33503', 'https://github.com/advisories/GHSA-wr66-vrwm-5g5x', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21721', 'https://github.com/vercel/next.js/releases/tag/v12.0.9', 'https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x'}
null
GHSA
GHSA-f54p-f6jp-4rhr
Heap OOB in `FusedBatchNorm` kernels
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/fused_batch_norm_op.cc#L1292) of `FusedBatchNorm` kernels is vulnerable to a heap OOB: ```python import tensorflow as tf tf.raw_ops.FusedBatchNormGrad( y_backprop=tf.constant([i for i in range(9)],shape=(1,1,3,3),dtype=tf.float32) x=tf.constant([i for i in range(2)],shape=(1,1,1,2),dtype=tf.float32) scale=[1,1], reserve_space_1=[1,1], reserve_space_2=[1,1,1], epsilon=1.0, data_format='NCHW', is_training=True) ``` ### Patches We have patched the issue in GitHub commit [aab9998916c2ffbd8f0592059fad352622f89cda](https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41223'}
2021-11-10T18:46:52Z
2021-11-10T18:46:52Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-f54p-f6jp-4rhr', 'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41223'}
null
GHSA
GHSA-23hm-7w47-xw72
Out of bounds read in Tensorflow
### Impact The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.Dequantize( input=tf.constant([1,1],dtype=tf.qint32), min_range=[1.0], max_range=[10.0], mode='MIN_COMBINED', narrow_range=False, axis=2**31-1, dtype=tf.bfloat16) return y test() ``` The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked and this results in reading past the end of the array containing the dimensions of the input tensor: ```cc if (axis_ > -1) { num_slices = input.dim_size(axis_); } // ... int64_t pre_dim = 1, post_dim = 1; for (int i = 0; i < axis_; ++i) { pre_dim *= float_output.dim_size(i); } for (int i = axis_ + 1; i < float_output.dims(); ++i) { post_dim *= float_output.dim_size(i); } ``` ### Patches We have patched the issue in GitHub commit [23968a8bf65b009120c43b5ebcceaf52dbc9e943](https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21726'}
2022-02-10T00:15:47Z
2022-02-09T18:28:54Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72', 'https://github.com/advisories/GHSA-23hm-7w47-xw72', 'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21726'}
null
GHSA
GHSA-h6h9-pphv-m266
Topydo contains a CWE-20: Improper Input Validation vulnerability
topydo contains a CWE-20: Improper Input Validation vulnerability in ListFormatParser::parse, file topydo/lib/ListFormat.py line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line..
{'CVE-2018-1000523'}
2022-04-26T18:31:23Z
2018-09-13T15:47:26Z
HIGH
8.1
{'CWE-20'}
{'https://github.com/bram85/topydo/issues/240', 'https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292', 'https://github.com/advisories/GHSA-h6h9-pphv-m266', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000523'}
null
GHSA
GHSA-mq9h-cwc2-6j5r
Malicious Package in midway-dataproxy
All versions of `midway-dataproxy` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:22Z
2020-09-03T17:42:27Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1056', 'https://github.com/advisories/GHSA-mq9h-cwc2-6j5r'}
null
GHSA
GHSA-qhf6-vqq9-q2p7
Directory Traversal in gaoxiaotingtingting
Affected versions of `gaoxiaotingtingting` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16108'}
2021-01-14T15:51:04Z
2020-09-01T16:58:58Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-qhf6-vqq9-q2p7', 'https://www.npmjs.com/advisories/377', 'https://nodesecurity.io/advisories/377', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16108', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/static-html-server'}
null
GHSA
GHSA-qpjp-7rp2-9c3f
Moderate severity vulnerability that affects validator
The validator module before 1.1.0 for Node.js allows remote attackers to bypass the XSS filter via a nested tag.
{'CVE-2013-7451'}
2021-09-16T20:03:06Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'https://nodesecurity.io/advisories/41', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://github.com/advisories/GHSA-qpjp-7rp2-9c3f', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7451'}
null
GHSA
GHSA-fpm5-vv97-jfwg
Uncontrolled Resource Consumption in firebase
This affects the package @firebase/util before 0.3.4. This vulnerability relates to the deepExtend function within the DeepCopy.ts file. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
{'CVE-2020-7765'}
2021-05-18T01:57:24Z
2021-05-18T01:57:24Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/firebase/firebase-js-sdk/pull/4001', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7765', 'https://github.com/firebase/firebase-js-sdk/commit/9cf727fcc3d049551b16ae0698ac33dc2fe45ada', 'https://snyk.io/vuln/SNYK-JS-FIREBASEUTIL-1038324', 'https://github.com/advisories/GHSA-fpm5-vv97-jfwg'}
null
GHSA
GHSA-cr67-78jr-j94p
Local File Inclusion in domokeeper
All versions of `domokeeper` are vulnerable to Local File Inclusion. The `/plugin/` route passes a GET parameter unsanitized to a `require()` call. It then returns the output of `require()` in the server response. This may allow attackers to load unintended code in the application. It also allows attackers to exfiltrate information in `.json` files. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-03T18:14:47Z
2020-09-03T18:14:47Z
MODERATE
0
null
{'https://www.npmjs.com/advisories/1075', 'https://github.com/advisories/GHSA-cr67-78jr-j94p'}
null
GHSA
GHSA-3xh2-74w9-5vxm
Integer overflow in github.com/gorilla/websocket
An integer overflow vulnerability exists with the length of websocket frames received via a websocket connection. An attacker would use this flaw to cause a denial of service attack on an HTTP Server allowing websocket connections.
{'CVE-2020-27813'}
2021-05-18T21:08:02Z
2021-05-18T21:08:02Z
HIGH
7.5
{'CWE-400', 'CWE-190'}
{'https://github.com/advisories/GHSA-3xh2-74w9-5vxm', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00008.html', 'https://github.com/gorilla/websocket/pull/537', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27813', 'https://github.com/gorilla/websocket/commit/5b740c29263eb386f33f265561c8262522f19d37', 'https://bugzilla.redhat.com/show_bug.cgi?id=1902111', 'https://github.com/gorilla/websocket/security/advisories/GHSA-jf24-p9p9-4rjh'}
null
GHSA
GHSA-73rg-x683-m3qw
Buffer overflow in canvas
A buffer overflow is present in canvas versions before 1.6.11, which could lead to a Denial of Service or execution of arbitrary code when it processes a user-provided image.
{'CVE-2020-8215'}
2021-05-07T16:05:16Z
2021-05-07T16:05:16Z
HIGH
8.8
{'CWE-120'}
{'https://hackerone.com/reports/315037', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957', 'https://www.npmjs.com/package/canvas', 'https://github.com/advisories/GHSA-73rg-x683-m3qw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8215'}
null
GHSA
GHSA-p23j-g745-8449
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.
{'CVE-2019-1335'}
2021-03-29T20:55:40Z
2021-03-29T20:55:40Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-p23j-g745-8449', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335', 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'}
null
GHSA
GHSA-8w57-jfpm-945m
Denial of Service in http-proxy-agent
Versions of `http-proxy-agent` before 2.1.0 are vulnerable to denial of service and uninitialized memory leak when unsanitized options are passed to `Buffer`. ## Recommendation Update to version 2.1.0 or later.
null
2020-08-31T18:29:42Z
2019-06-11T16:16:07Z
HIGH
0
null
{'https://nodesecurity.io/advisories/607', 'https://hackerone.com/reports/321631', 'https://www.npmjs.com/advisories/607', 'https://github.com/advisories/GHSA-8w57-jfpm-945m', 'https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80'}
null
GHSA
GHSA-8vmc-g99q-xj94
Directory Traversal in dcdcdcdcdc
Affected versions of `dcdcdcdcdc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16190'}
2021-01-14T15:40:03Z
2020-09-01T18:23:52Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/439', 'https://github.com/advisories/GHSA-8vmc-g99q-xj94', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16190', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dcdcdcdcdc', 'https://nodesecurity.io/advisories/439'}
null
GHSA
GHSA-q85f-69q7-55h2
Uninitialized variable access in Tensorflow
### Impact The [implementation of `AssignOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143) can result in copying unitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand side is also initialized. ### Patches We have patched the issue in GitHub commit [ef1d027be116f25e25bb94a60da491c2cf55bd0b](https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23573'}
2022-02-11T20:47:00Z
2022-02-09T23:26:50Z
HIGH
7.6
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b', 'https://github.com/advisories/GHSA-q85f-69q7-55h2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23573', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143'}
null
GHSA
GHSA-ch82-gqh6-9xj9
Prototype Pollution in get-setter
All versions of `get-setter` are vulnerable to prototype pollution. The function `set` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:10:11Z
2020-09-04T15:13:19Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1332', 'https://github.com/advisories/GHSA-ch82-gqh6-9xj9'}
null