ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-rvcw-f68w-8h8h
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. Users should upgrade to `^3.11.4`. ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29446'}
2021-04-19T18:29:58Z
2021-04-19T15:00:05Z
MODERATE
5.9
{'CWE-208', 'CWE-696', 'CWE-203'}
{'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29446', 'https://github.com/advisories/GHSA-rvcw-f68w-8h8h', 'https://www.npmjs.com/package/jose-node-cjs-runtime'}
null
GHSA
GHSA-9rf5-jm6f-2fmm
High severity vulnerability that affects activerecord
activerecord/lib/active_record/relation/query_methods.rb in Active Record in Ruby on Rails 4.0.x before 4.0.9 and 4.1.x before 4.1.5 allows remote attackers to bypass the strong parameters protection mechanism via crafted input to an application that makes create_with calls.
{'CVE-2014-3514'}
2021-09-08T21:00:29Z
2017-10-24T18:33:36Z
HIGH
0
null
{'http://rhn.redhat.com/errata/RHSA-2014-1102.html', 'http://secunia.com/advisories/60347', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/M4chq5Sb540/CC1Fh0Y_NWwJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3514', 'http://openwall.com/lists/oss-security/2014/08/18/10', 'https://github.com/advisories/GHSA-9rf5-jm6f-2fmm'}
null
GHSA
GHSA-qv2v-m59f-v5fw
Insecure randomness in socket.io
Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization. ## Recommendation Update to v0.9.7 or later.
{'CVE-2017-16031'}
2021-09-16T21:04:34Z
2018-11-07T00:29:37Z
HIGH
7.5
{'CWE-330'}
{'https://github.com/socketio/socket.io/issues/856', 'https://www.npmjs.com/advisories/321', 'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://github.com/socketio/socket.io/pull/857', 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8', 'https://nodesecurity.io/advisories/321', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031'}
null
GHSA
GHSA-pr49-5hhf-6mm6
Directory Traversal in serverabc
Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16180'}
2021-01-08T18:19:38Z
2018-07-23T20:44:34Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/459', 'https://www.npmjs.com/advisories/459', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16180', 'https://github.com/advisories/GHSA-pr49-5hhf-6mm6'}
null
GHSA
GHSA-9mr8-6prp-gwjv
SQL Injection in query-mysql
All versions of `query-mysql` are vulnerable to SQL injection due to lack of user input sanitization allows to run arbitrary SQL queries when fetching data from database. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is passed into this module.
{'CVE-2018-3754'}
2021-09-08T20:07:00Z
2018-09-10T15:20:30Z
HIGH
8.8
{'CWE-89'}
{'https://www.npmjs.com/advisories/666', 'https://hackerone.com/reports/311244', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3754', 'https://github.com/advisories/GHSA-9mr8-6prp-gwjv'}
null
GHSA
GHSA-34jx-wx69-9x8v
Symlink Attack in kubectl cp
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user’s machine when kubectl cp is called, limited only by the system permissions of the local user. The untar function can both create and follow symbolic links. The issue is resolved in kubectl v1.11.9, v1.12.7, v1.13.5, and v1.14.0.
{'CVE-2019-1002101'}
2022-04-12T22:40:43Z
2022-02-15T01:57:18Z
MODERATE
5.5
{'CWE-59'}
{'https://access.redhat.com/errata/RHBA-2019:0620', 'https://github.com/advisories/GHSA-34jx-wx69-9x8v', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QZB7E3DOZ5WDG46XAIU6K32CXHXPXB2F/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1002101', 'https://access.redhat.com/errata/RHBA-2019:0619', 'http://www.securityfocus.com/bid/107652', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPV2RE5RMOGUVP5WJMXKQJZUBBLAFZPZ/', 'http://www.openwall.com/lists/oss-security/2019/08/05/5', 'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013', 'https://access.redhat.com/errata/RHBA-2019:0636', 'https://www.twistlock.com/labs-blog/disclosing-directory-traversal-vulnerability-kubernetes-copy-cve-2019-1002101/', 'https://github.com/kubernetes/kubernetes/pull/75037', 'http://www.openwall.com/lists/oss-security/2019/06/21/1'}
null
GHSA
GHSA-6fvw-7vch-x489
Downloads Resources over HTTP in selenium-portal
Affected versions of `selenium-portal` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-portal`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10667'}
2021-01-08T19:44:44Z
2019-02-18T23:44:36Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/260', 'https://nodesecurity.io/advisories/260', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10667', 'https://github.com/advisories/GHSA-6fvw-7vch-x489'}
null
GHSA
GHSA-gjqc-q9g6-q2j3
`CHECK`-failures in binary ops in Tensorflow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved: ```cc functor::BinaryFunctor<Device, Functor, 1>()( eigen_device, out->template flat<Tout>(), input_0.template flat<Tin>(), input_1.template flat<Tin>(), error_ptr); ``` If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. ### Patches We have patched the issue in GitHub commit [a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9](https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23583'}
2022-02-11T20:37:11Z
2022-02-10T00:34:13Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9', 'https://github.com/advisories/GHSA-gjqc-q9g6-q2j3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23583'}
null
GHSA
GHSA-mq5p-2mcr-m52j
Code injection in nbgitpuller
### Impact Due to an unsanitized input, visiting maliciously crafted links could result in arbitrary code execution in the user environment. ### Patches 0.10.2 ### Workarounds None, other than upgrade to 0.10.2 or downgrade to 0.8.x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [nbgitpuller](https://github.com/jupyterhub/nbgitpuller/issues) * Email our security team at [security@ipython.org](mailto:security@ipython.org)
{'CVE-2021-39160'}
2022-03-22T21:07:19Z
2021-08-30T16:17:06Z
CRITICAL
0
{'CWE-94'}
{'https://github.com/jupyterhub/nbgitpuller/blob/main/CHANGELOG.md#0102---2021-08-25', 'https://github.com/advisories/GHSA-mq5p-2mcr-m52j', 'https://github.com/jupyterhub/nbgitpuller/security/advisories/GHSA-mq5p-2mcr-m52j', 'https://github.com/jupyterhub/nbgitpuller/commit/07690644f29a566011dd0d7ba14cae3eb0490481', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39160'}
null
GHSA
GHSA-rg3m-hqc5-344v
`SparseFillEmptyRows` heap OOB
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access: ```python import tensorflow as tf data=tf.raw_ops.SparseFillEmptyRows( indices=[[0,0],[0,0],[0,0]], values=['sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss'], dense_shape=[5,3], default_value='o') ``` This occurs whenever the size of `indices` does not match the size of `values`. ### Patches We have patched the issue in GitHub commit [67bfd9feeecfb3c61d80f0e46d89c170fbee682b](https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41224'}
2021-11-10T18:45:55Z
2021-11-10T18:45:55Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-rg3m-hqc5-344v', 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v'}
null
GHSA
GHSA-vf7p-j8x6-xvwp
Incorrect Authorization in Apache Solr
When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts.
{'CVE-2021-29943'}
2021-06-10T17:33:22Z
2021-05-10T15:17:58Z
CRITICAL
9.1
{'CWE-863'}
{'https://github.com/advisories/GHSA-vf7p-j8x6-xvwp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29943', 'https://security.netapp.com/advisory/ntap-20210604-0009/', 'https://lists.apache.org/thread.html/r91dd0ff556e0c9aab4c92852e0e540c59d4633718ce12881558cf44d%40%3Cusers.solr.apache.org%3E'}
null
GHSA
GHSA-qh54-9vc5-m9fg
MD5 hash support in github.com/foxcpp/maddy
### Impact This vulnerability affects maddy 0.5.1, 0.5.0 users using auth.shadow module and an extremely outdated system that still allows MD5 hashes in /etc/shadows. ### Patches Patch is available as part of the 0.5.2 release. ### Workarounds Ensure MD5 hashes are not present in /etc/shadow.
null
2021-10-12T16:06:30Z
2021-10-12T16:06:30Z
LOW
3
{'CWE-261'}
{'https://github.com/advisories/GHSA-qh54-9vc5-m9fg', 'https://github.com/foxcpp/maddy/security/advisories/GHSA-qh54-9vc5-m9fg'}
null
GHSA
GHSA-gc52-xj6p-9pxp
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
Keycloak up to version 6.0.0 allows the end user token (access or id token JWT) to be used as the session cookie for browser sessions for OIDC. As a result an attacker with access to service provider backend could hijack user?s browser session.
{'CVE-2019-3868'}
2021-08-03T21:24:04Z
2019-04-30T15:37:21Z
MODERATE
3.8
{'CWE-200'}
{'https://access.redhat.com/errata/RHSA-2019:2998', 'http://www.securityfocus.com/bid/108061', 'https://github.com/advisories/GHSA-gc52-xj6p-9pxp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3868', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3868', 'https://access.redhat.com/errata/RHSA-2019:1140'}
null
GHSA
GHSA-xpgc-j48j-jwv9
Cross-site Scripting in Keycloak
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak version 15. The issue was fixed in version 17.0.0.
{'CVE-2021-20323'}
2022-03-30T20:50:17Z
2022-03-26T00:00:31Z
MODERATE
6.1
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2013577', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20323', 'https://github.com/advisories/GHSA-xpgc-j48j-jwv9'}
null
GHSA
GHSA-2xmm-g482-4439
DQL injection through sorting parameters blocked
### Impact Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway. ### Patches The issue is fixed in version 1.10.1 and in 1.11-rc.1 ### Workarounds You have to overwrite your `Sylius\Component\Grid\Sorting\Sorter.php` class: ```php <?php // src/App/Sorting/Sorter.php declare(strict_types=1); namespace App\Sorting; use Symfony\Component\HttpKernel\Exception\BadRequestHttpException; use Sylius\Component\Grid\Data\DataSourceInterface; use Sylius\Component\Grid\Definition\Grid; use Sylius\Component\Grid\Parameters; use Sylius\Component\Grid\Sorting\SorterInterface; final class Sorter implements SorterInterface { public function sort(DataSourceInterface $dataSource, Grid $grid, Parameters $parameters): void { $enabledFields = $grid->getFields(); $expressionBuilder = $dataSource->getExpressionBuilder(); $sorting = $parameters->get('sorting', $grid->getSorting()); $this->validateSortingParams($sorting, $enabledFields); foreach ($sorting as $field => $order) { $this->validateFieldNames($field, $enabledFields); $gridField = $grid->getField($field); $property = $gridField->getSortable(); if (null !== $property) { $expressionBuilder->addOrderBy($property, $order); } } } private function validateSortingParams(array $sorting, array $enabledFields): void { foreach (array_keys($enabledFields) as $key) { if (array_key_exists($key, $sorting) && !in_array($sorting[$key], ['asc', 'desc'])) { throw new BadRequestHttpException(sprintf('%s is not valid, use asc or desc instead.', $sorting[$key])); } } } private function validateFieldNames(string $fieldName, array $enabledFields): void { $enabledFieldsNames = array_keys($enabledFields); if (!in_array($fieldName, $enabledFieldsNames, true)) { throw new BadRequestHttpException(sprintf('%s is not valid field, did you mean one of these: %s?', $fieldName, implode(', ', $enabledFieldsNames))); } } } ``` and register it in your container: ```yaml # config/services.yaml services: # ... sylius.grid.sorter: class: App\Sorting\Sorter ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [Sylius issues](https://github.com/Sylius/Sylius/issues) * Email us at [security@sylius.com](mailto:security@sylius.com)
{'CVE-2022-24752'}
2022-04-19T19:03:27Z
2022-03-15T19:09:16Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784', 'https://github.com/Sylius/SyliusGridBundle/pull/222', 'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439', 'https://github.com/advisories/GHSA-2xmm-g482-4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752', 'https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2', 'https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1'}
null
GHSA
GHSA-rxch-gp62-574w
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4108'}
2022-01-04T19:01:10Z
2021-12-16T14:13:27Z
MODERATE
6.4
{'CWE-79'}
{'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108', 'https://github.com/advisories/GHSA-rxch-gp62-574w', 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'}
null
GHSA
GHSA-73qr-pfmq-6rp8
Embedded malware in coa
The npm package `coa` had versions published with malicious code. Users of affected versions (2.0.3 and above) should downgrade to 2.0.2 as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/veged/coa/issues/99) for details as they unfold. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-11-04T18:48:35Z
2021-11-04T16:22:28Z
CRITICAL
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-73qr-pfmq-6rp8', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/veged/coa/issues/99'}
null
GHSA
GHSA-r4r9-mgjc-g6q3
Path Traversal in 626
All versions of `626` are vulnerable to path traversal. This enables a remote attacker to read arbitrary files from the remote server using this module. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
{'CVE-2018-3727'}
2021-01-14T15:32:05Z
2020-09-01T19:06:15Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3727', 'https://www.npmjs.com/advisories/583', 'https://hackerone.com/reports/311216', 'https://github.com/advisories/GHSA-r4r9-mgjc-g6q3'}
null
GHSA
GHSA-44cw-p2hm-gpf6
Disabled Hostname Verification in Opencast
Opencast before version 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle attacks. ### Patches This problem is fixed in Opencast 7.9 and Opencast 8.9 ### Self-Signed Certificates Please be aware that fixing the problem means that Opencast will not simply accept any self-signed certificates any longer without properly importing them. If you need those, please make sure to import them into the Java key store. Better yet, get a valid certificate e.g. from [Let's Encrypt](https://letsencrypt.org).
{'CVE-2020-26234'}
2022-04-19T19:02:40Z
2020-12-08T22:37:59Z
HIGH
4.8
{'CWE-297'}
{'https://github.com/advisories/GHSA-44cw-p2hm-gpf6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26234', 'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc', 'https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6'}
null
GHSA
GHSA-hggv-mcp4-vxc5
Improper Authentication in FreeTAKServer
FreeTAKServer is an open source, lightweight Server for connect TAK clients. An access control issue in the component /ManageRoute/postRoute of FreeTAKServer version 1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false routes for legitimate users. There is currently no known workaround. This issue was fixed in version 1.9.8.5.
{'CVE-2022-25508'}
2022-03-24T23:45:34Z
2022-03-12T00:00:37Z
HIGH
7.5
{'CWE-287', 'CWE-400'}
{'https://github.com/advisories/GHSA-hggv-mcp4-vxc5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25508', 'https://github.com/FreeTAKTeam/FreeTakServer/issues/291'}
null
GHSA
GHSA-g9wf-393q-4w38
Malicious Package in only-test-not-install
All versions of `only-test-not-install` contain malicious code. The package deletes the folder `~/test` from the system as a postinstall script. ## Recommendation Remove the package from your environment. There are no further signs of compromise.
null
2021-09-30T17:44:24Z
2020-09-03T17:28:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-g9wf-393q-4w38', 'https://www.npmjs.com/advisories/1044'}
null
GHSA
GHSA-vc9j-fhvv-8vrf
Remote Code Execution in scratch-vm
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented. NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.
{'CVE-2020-14000'}
2021-09-22T21:24:08Z
2020-07-27T19:55:52Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://github.com/advisories/GHSA-vc9j-fhvv-8vrf', 'https://github.com/LLK/scratch-vm/pull/2476', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000'}
null
GHSA
GHSA-xwxc-j97j-84gf
Race condition in Parc
In the affected versions of this crate, `LockWeak<T>` unconditionally implemented `Send` with no trait bounds on `T`. `LockWeak<T>` doesn't own `T` and only provides `&T`. This allows concurrent access to a non-Sync `T`, which can cause undefined behavior like data races.
null
2021-08-25T21:00:03Z
2021-08-25T21:00:03Z
MODERATE
0
{'CWE-362'}
{'https://github.com/hyyking/rustracts/pull/6', 'https://github.com/advisories/GHSA-xwxc-j97j-84gf', 'https://rustsec.org/advisories/RUSTSEC-2020-0134.html'}
null
GHSA
GHSA-rxq3-5249-8hgg
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-09T17:29:41Z
2020-09-09T17:29:41Z
LOW
0
null
{'https://pypi.org/project/personnummer/', 'https://github.com/personnummer/python/security/advisories/GHSA-rxq3-5249-8hgg', 'https://github.com/advisories/GHSA-rxq3-5249-8hgg'}
null
GHSA
GHSA-gq9m-qvpx-68hc
Insufficient Entropy in werkzeug
Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.
{'CVE-2019-14806'}
2021-08-17T21:13:25Z
2019-08-21T16:15:24Z
HIGH
7.5
{'CWE-331'}
{'https://github.com/advisories/GHSA-gq9m-qvpx-68hc', 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14806', 'https://palletsprojects.com/blog/werkzeug-0-15-3-released/', 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'}
null
GHSA
GHSA-fj59-f6c3-3vw4
Command Injection in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()` ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)
{'CVE-2020-26300'}
2022-04-27T18:18:55Z
2020-10-27T20:40:00Z
MODERATE
5.9
{'CWE-78'}
{'https://github.com/advisories/GHSA-fj59-f6c3-3vw4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4', 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607', 'https://www.npmjs.com/package/systeminformation'}
null
GHSA
GHSA-m8fw-534v-xm85
Cross-Site Scripting (XSS) in cloudcmd
Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable. ## Recommendation Update to version 9.1.6 or later.
null
2021-08-04T20:42:50Z
2019-06-04T15:43:29Z
HIGH
0
{'CWE-79'}
{'https://hackerone.com/reports/341044)', 'https://hackerone.com/reports/341044', 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38', 'https://github.com/advisories/GHSA-m8fw-534v-xm85', 'https://www.npmjs.com/advisories/642'}
null
GHSA
GHSA-mf7c-58q5-7v65
Downloads Resources over HTTP in npm-test-sqlite3-trunk
Affected versions of `npm-test-sqlite3-trunk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `npm-test-sqlite3-trunk`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10695'}
2021-01-14T15:56:04Z
2020-09-01T16:15:28Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/297', 'https://github.com/advisories/GHSA-mf7c-58q5-7v65', 'https://nodesecurity.io/advisories/297', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10695'}
null
GHSA
GHSA-6qvp-r6r3-9p7h
Moderate severity vulnerability that affects nokogiri
A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.
{'CVE-2018-14404'}
2021-09-02T18:20:31Z
2019-01-17T14:05:03Z
HIGH
7.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14404', 'https://usn.ubuntu.com/3739-2/', 'https://github.com/advisories/GHSA-6qvp-r6r3-9p7h', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://usn.ubuntu.com/3739-1/', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817', 'https://gitlab.gnome.org/GNOME/libxml2/issues/10', 'https://security.netapp.com/advisory/ntap-20190719-0002/', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html', 'https://access.redhat.com/errata/RHSA-2019:1543', 'https://bugzilla.redhat.com/show_bug.cgi?id=1595985'}
null
GHSA
GHSA-42f2-f9vc-6365
Private key leak in Apache CXF
Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter `rs.security.keystore.type` to `jwk`. For this case all keys are returned in this file &quot;as is&quot;, including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. `oct` keys, which contain secret keys, are not returned at all.
{'CVE-2019-12423'}
2021-06-17T19:57:20Z
2020-05-22T19:23:04Z
HIGH
7.5
{'CWE-522'}
{'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-42f2-f9vc-6365', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12423', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-12423.txt.asc?version=1&modificationDate=1579178393000&api=v2', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rd588ff96f18563aeb5f87ac8c6bce7aae86cb1a4d4be483f96e7208c@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-7v3x-h7r2-34jv
Insufficient Session Expiration in Pterodactyl API
### Impact A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to. It is important to note that **a malicious user must first compromise an existing API key for a user to exploit this issue**. It cannot be exploited by chance, and requires a coordinated attack against an individual account using a known API key. ### Patches This issue has been addressed in the `v1.7.0` release of Pterodactyl Panel. ### Workarounds Those not wishing to upgrade may apply the change below: ```diff diff --git a/app/Http/Middleware/Api/AuthenticateKey.php b/app/Http/Middleware/Api/AuthenticateKey.php index eb25dac6..857bfab2 100644 --- a/app/Http/Middleware/Api/AuthenticateKey.php +++ b/app/Http/Middleware/Api/AuthenticateKey.php @@ -70,7 +70,7 @@ class AuthenticateKey } else { $model = $this->authenticateApiKey($request->bearerToken(), $keyType); - $this->auth->guard()->loginUsingId($model->user_id); + $this->auth->guard()->onceUsingId($model->user_id); } ``` ### For more information If you have any questions or comments about this advisory please reach out to `Tactical Fish#8008` on [Discord](https://discord.gg/pterodactyl) or email `dane@pterodactyl.io`.
null
2022-04-19T19:03:20Z
2022-01-21T18:43:05Z
MODERATE
6
{'CWE-613'}
{'https://github.com/pterodactyl/panel/releases/tag/v1.7.0', 'https://github.com/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'}
null
GHSA
GHSA-vmm6-w4cf-7f3x
Authentication Bypass For Endpoints With Anonymous Access in Opencast
### Impact Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access. This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication. ### Patches This problem is fixed in Opencast 7.6 and Opencast 8.1 ### Workarounds As a workaround for older, unpatched versions, disabling remember-me cookies in `etc/security/mh_default_org.xml` will mitigate the problem but will obviously also disable this feature without obvious indication. To deactivate this, remove the following line from the security configuration: ```xml <sec:remember-me … /> ``` ### References - [Remember-me cookie in the security configuration file](https://github.com/opencast/opencast/blob/161ee619382f144dc35eea211fc6b556025b98e1/etc/security/mh_default_org.xml#L335-L336) ### For more information If you have any questions or comments about this advisory: - Open an issue in [opencast/opencast](https://github.com/opencast/opencast/issues) - For security-relevant information, email us at security@opencast.org
{'CVE-2020-5206'}
2021-10-20T18:03:08Z
2020-01-30T21:21:30Z
CRITICAL
8.7
{'CWE-285'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x', 'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8', 'https://github.com/advisories/GHSA-vmm6-w4cf-7f3x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5206'}
null
GHSA
GHSA-785x-qw4v-6872
Improper Output Neutralization and Improper Encoding or Escaping of Output for Logs in ansible
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
{'CVE-2020-14330'}
2022-02-09T22:00:08Z
2022-02-09T22:00:08Z
MODERATE
5.5
{'CWE-116', 'CWE-117'}
{'https://github.com/ansible/ansible/issues/68400', 'https://www.debian.org/security/2021/dsa-4950', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14330', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330', 'https://github.com/advisories/GHSA-785x-qw4v-6872'}
null
GHSA
GHSA-9rr6-jpg7-9jg6
Authentication Bypass by Capture-replay in Apache Spark
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later
{'CVE-2021-38296'}
2022-03-15T21:32:41Z
2022-03-11T00:02:36Z
HIGH
7.5
{'CWE-294'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38296', 'https://github.com/advisories/GHSA-9rr6-jpg7-9jg6', 'https://lists.apache.org/thread/70x8fw2gx3g9ty7yk0f2f1dlpqml2smd'}
null
GHSA
GHSA-6pj2-5fqq-xvjc
Incorrect Authorization in latte/latte
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
{'CVE-2021-23803'}
2022-01-06T20:56:27Z
2022-01-06T20:56:27Z
CRITICAL
9.8
{'CWE-863'}
{'https://github.com/advisories/GHSA-6pj2-5fqq-xvjc', 'https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226', 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210', 'https://github.com/nette/latte/issues/279', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23803'}
null
GHSA
GHSA-9w4w-cpc8-h2fq
Exposure of Sensitive Information to an Unauthorized Actor in httpie
### Impact HTTPie have the practical concept of [sessions](https://httpie.io/docs/cli/sessions), which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. As an example, we can make an authenticated request and save it to a [named session](https://httpie.io/docs/cli/named-sessions) called `api`: ```bash $ http --session api -a user:pass pie.dev/basic-auth/user/pass ``` ```json { "authenticated": true, "user": "user" } ``` Since we have now saved the authentication data to that session, we won‘t have to enter it again and again on every invocation. We can simply reference the session, and HTTPie will use the saved state directly from it: ```bash $ http --session api pie.dev/basic-auth/user/pass ``` ```json { "authenticated": true, "user": "user" } ``` One particular use case of these sessions is storing cookies (commonly referred to as a `Cookie Jar`). If a response has a `Set-Cookie` header, HTTPie will parse it and store the actual cookie in the session. And from that point on, all outgoing requests will attach that cookie (in the form of a `Cookie` header). This is extremely useful, especially when you are dealing with websites which manage their own state on the client-side through cookies. ```bash $ http -F --session jar pie.dev/cookies/set/x/y ``` ```json { "cookies": { "x": "y" } } ``` Before `3.1.0`, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website, e.g: ```bash $ http -F --session jar pie.dev/redirect-to url==https://httpbin.org/cookies ``` (Pre 3.1.0) ```json { "cookies": { "x": "y" } } ``` (Post 3.1.0) ```json { "cookies": {} } ``` This behavior has been corrected in this release (with taking [RFC 6265 — HTTP State Management Mechanism](https://datatracker.ietf.org/doc/html/rfc6265) into the consideration). A huge credit goes to [@Glyph](https://github.com/glyph) for disclosing the original vulnerability to us (through [huntr.dev](http://huntr.dev/)). ### Patches We suggest users to upgrade their HTTPie version to `3.1.0` or higher, and run `httpie cli sessions upgrade` command on their sessions. ### For more information If you have any questions or comments about this advisory: * Email us: [`security@httpie.io`](mailto:security@httpie.io) > Please note that this entry is covered by both [CVE-2022-24737](https://www.cvedetails.com/cve/CVE-2022-24737) and [CVE-2022-0430](https://nvd.nist.gov/vuln/detail/CVE-2022-0430).
{'CVE-2022-24737'}
2022-03-29T22:16:58Z
2022-03-07T23:44:28Z
MODERATE
6.5
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24737', 'https://github.com/httpie/httpie/releases/tag/3.1.0', 'https://github.com/advisories/GHSA-9w4w-cpc8-h2fq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXFCHGTW3V32GD6GXXJZE5QAOSDT3RTY/', 'https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/', 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}
null
GHSA
GHSA-g5w6-mrj7-75h2
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39141](https://x-stream.github.io/CVE-2021-39141.html). ### Credits Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39141'}
2022-04-22T15:43:48Z
2021-08-25T14:48:31Z
HIGH
8.5
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-g5w6-mrj7-75h2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39141', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://x-stream.github.io/CVE-2021-39141.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-7hpj-hfcr-5qwm
Code injection in FreeIPA
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
{'CVE-2019-14867'}
2021-12-06T18:17:38Z
2021-12-06T18:17:38Z
HIGH
8.8
{'CWE-94', 'CWE-400'}
{'https://access.redhat.com/errata/RHBA-2019:4268', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14867', 'https://github.com/pypa/advisory-db/tree/main/vulns/ipa/PYSEC-2019-28.yaml', 'https://www.freeipa.org/page/Releases/4.7.4', 'https://www.freeipa.org/page/Releases/4.6.7', 'https://access.redhat.com/errata/RHSA-2020:0378', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/67SEUWJAJ5RMH5K4Q6TS2I7HIMXUGNKF/', 'https://www.freeipa.org/page/Releases/4.8.3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLFL5XDCJ3WT6JCLCQVKHZBLHGW7PW4T/', 'https://github.com/advisories/GHSA-7hpj-hfcr-5qwm'}
null
GHSA
GHSA-pw54-mh39-w3hc
Regular expression denial of service in npm-user-validate
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
{'CVE-2020-7754'}
2021-05-10T19:08:15Z
2021-05-10T19:08:15Z
HIGH
7.5
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://github.com/advisories/GHSA-pw54-mh39-w3hc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e', 'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}
null
GHSA
GHSA-h97g-4mx7-5p2p
Open Redirect in apostrophe
Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end. ## Recommendation Update to version 2.92.0 or later.
null
2021-09-28T21:18:58Z
2020-09-03T17:11:36Z
MODERATE
0
{'CWE-601'}
{'https://github.com/advisories/GHSA-h97g-4mx7-5p2p', 'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089', 'https://www.npmjs.com/advisories/1029'}
null
GHSA
GHSA-mm8j-9x84-m9cv
Arbitrary code injection in json-sanitizer
OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.
{'CVE-2021-23899'}
2021-06-16T17:34:18Z
2021-06-16T17:34:18Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://github.com/advisories/GHSA-mm8j-9x84-m9cv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'}
null
GHSA
GHSA-3357-829x-m9pr
Moderate severity vulnerability that affects org.apache.cxf.fediz:fediz-spring2
Application plugins in Apache CXF Fediz before 1.1.3 and 1.2.x before 1.2.1 allow remote attackers to cause a denial of service.
{'CVE-2015-5175'}
2021-06-17T19:52:31Z
2018-10-18T16:57:00Z
HIGH
7.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=f65c961ea31e3c1851daba8e7e49fc37bbf77b19', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5175', 'https://mail-archives.apache.org/mod_mbox/cxf-dev/201508.mbox/%3CCAB8XdGAx=VL_uepDSecE2h8ggTD4kpagXnyfegVjt7Axi_Ossw@mail.gmail.com%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2015/08/26/3', 'http://www.securityfocus.com/bid/76486', 'https://github.com/advisories/GHSA-3357-829x-m9pr', 'https://cxf.apache.org/security-advisories.data/CVE-2015-5175.txt.asc?version=1&modificationDate=1440598018000&api=v2', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
GHSA
GHSA-8p8g-f9vg-r7xr
Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit
Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path parameter on POST, PUT or DELETE request. This vulnerability appears to have been fixed in 2.5.0 and later.
{'CVE-2018-1000850'}
2021-09-07T20:25:07Z
2018-12-21T17:48:19Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850', 'https://github.com/square/retrofit/blob/master/CHANGELOG.md', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://ihacktoprotect.com/post/retrofit-path-traversal/', 'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892'}
null
GHSA
GHSA-pjjf-hc4q-g298
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3775'}
2021-11-17T21:11:30Z
2021-11-15T23:16:17Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-pjjf-hc4q-g298', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775'}
null
GHSA
GHSA-5w4p-h4gm-3w26
Downloads Resources over HTTP in jser-stat
Affected versions of `jser-stat` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10592'}
2021-01-08T19:47:59Z
2019-02-18T23:50:53Z
MODERATE
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/188', 'https://github.com/jser/stat-js/blob/master/data/url-mapping.js', 'https://github.com/advisories/GHSA-5w4p-h4gm-3w26', 'https://nodesecurity.io/advisories/188', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10592'}
null
GHSA
GHSA-rwv8-jvff-jq28
Path Traversal in public
Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user. ## Recommendation Update to version 0.1.3 or later.
{'CVE-2018-3731'}
2021-01-08T01:57:45Z
2018-07-18T21:20:30Z
HIGH
0
{'CWE-22'}
{'https://hackerone.com/reports/312918', 'https://www.npmjs.com/advisories/571', 'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28'}
null
GHSA
GHSA-3j6g-hxx5-3q26
Observable Discrepancy in Apache Kafka
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.
{'CVE-2021-38153'}
2022-04-22T15:41:46Z
2021-09-23T23:18:58Z
MODERATE
5.9
{'CWE-203'}
{'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cusers.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd9ef217b09fdefaf32a4e1835b59b96629542db57e1f63edb8b006e6@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r45cc0602d5f2cbb72e48896dfadf5e5b87ed85630449598b40e8f0be@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r26390c8b09ecfa356582d665b0c01f4cdcf16ac047c85f9f9f06a88c@%3Cdev.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38153', 'https://github.com/advisories/GHSA-3j6g-hxx5-3q26', 'https://kafka.apache.org/cve-list', 'https://lists.apache.org/thread.html/r35322aec467ddae34002690edaa4d9f16e7df9b5bf7164869b75b62c@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-rgq8-25qc-h54q
Directory Traversal in myserver.alexcthomas18
Affected versions of `myserver.alexcthomas18` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16144'}
2021-01-08T01:57:58Z
2018-07-23T20:48:05Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-rgq8-25qc-h54q', 'https://nodesecurity.io/advisories/469', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/myserver.alexcthomas18', 'https://www.npmjs.com/advisories/469', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16144'}
null
GHSA
GHSA-5pr9-v234-jw36
Remote Code Execution via traversal in TAL expressions
### Impact Most Python modules are not available for using in TAL expressions that you can add through-the-web, for example in Zope Page Templates. This restriction avoids file system access, for example via the 'os' module. But some of the untrusted modules are available indirectly through Python modules that are available for direct use. By default, you need to have the Manager role to add or edit Zope Page Templates through the web. Only sites that allow untrusted users to add/edit Zope Page Templates through the web are at risk. ### Patches The problem has been fixed in Zope 5.2 and 4.6. ### Workarounds A site administrator can restrict adding/editing Zope Page Templates through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing Zope Page Templates through the web should be restricted to trusted users only. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues) * Email us at [security@plone.org](mailto:security@plone.org)
null
2021-06-18T18:44:01Z
2021-06-18T18:44:01Z
MODERATE
6.8
{'CWE-22'}
{'https://github.com/zopefoundation/Zope/security/advisories/GHSA-5pr9-v234-jw36', 'https://github.com/advisories/GHSA-5pr9-v234-jw36'}
null
GHSA
GHSA-52rh-5rpj-c3w6
Improper handling of multiline messages in node-irc
node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to the IRC server verbatim rather than as a message to the channel. The vulnerability has been patched in node-irc version 1.2.1.
null
2022-05-05T16:00:50Z
2022-05-05T16:00:50Z
HIGH
0
null
{'https://matrix.org/blog/2022/05/04/0-34-0-security-release-for-matrix-appservice-irc-high-severity', 'https://github.com/advisories/GHSA-52rh-5rpj-c3w6', 'https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6'}
null
GHSA
GHSA-8m28-w6xg-35hw
Cross-Site Request Forgery (CSRF) in livehelperchat
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2022-0231'}
2022-01-26T20:22:08Z
2022-01-26T20:22:08Z
MODERATE
6.5
{'CWE-352'}
{'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61', 'https://github.com/advisories/GHSA-8m28-w6xg-35hw', 'https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'}
null
GHSA
GHSA-vpc2-7xmf-ppmf
Out-of-bounds Write in ChakraCore
Chakra Scripting Engine Memory Corruption Vulnerability This CVE ID is unique from CVE-2020-17054.
{'CVE-2020-17048'}
2021-08-02T17:26:11Z
2021-08-02T17:26:11Z
HIGH
8.1
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6528', 'https://github.com/advisories/GHSA-vpc2-7xmf-ppmf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17048', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17048', 'https://github.com/chakra-core/ChakraCore/pull/6528/commits/90e222e9a9ba64bd808666f44e6a0913d6318f78'}
null
GHSA
GHSA-5hj3-vjjf-f5m7
Heap OOB in `SdcaOptimizerV2`
### Impact An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `tf.raw_ops.SdcaOptimizerV2`: ```python import tensorflow as tf tf.raw_ops.SdcaOptimizerV2( sparse_example_indices=[[1]], sparse_feature_indices=[[1]], sparse_feature_values=[[1.0,2.0]], dense_features=[[1.0]], example_weights=[1.0], example_labels=[], sparse_indices=[1], sparse_weights=[1.0], dense_weights=[[1.0]], example_state_data=[[100.0,100.0,100.0,100.0]], loss_type='logistic_loss', l1=100.0, l2=100.0, num_loss_partitions=1, num_inner_iterations=1, adaptive=True) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/sdca_internal.cc#L320-L353) does not check that the length of `example_labels` is the same as the number of examples. ### Patches We have patched the issue in GitHub commit [a4e138660270e7599793fa438cd7b2fc2ce215a6](https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37672'}
2021-08-25T14:41:39Z
2021-08-25T14:41:39Z
MODERATE
5.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/a4e138660270e7599793fa438cd7b2fc2ce215a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37672', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hj3-vjjf-f5m7', 'https://github.com/advisories/GHSA-5hj3-vjjf-f5m7'}
null
GHSA
GHSA-7r5f-7qr4-pf6q
Sandbox Breakout / Arbitrary Code Execution in notevil
Versions of `notevil` prior to 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to prevent access to the `Function` constructor by not checking the return values of function calls. This allows attackers to access the Function prototype's constructor leading to the Sandbox Escape. An example payload is: ``` var safeEval = require('notevil') var input = "" + "function fn() {};" + "var constructorProperty = Object.getOwnPropertyDescriptors(fn.__proto__).constructor;" + "var properties = Object.values(constructorProperty);" + "properties.pop();" + "properties.pop();" + "properties.pop();" + "var Function = properties.pop();" + "(Function('return this'))()"; safeEval(input)``` ## Recommendation Upgrade to version 1.3.2 or later.
null
2020-09-03T19:03:33Z
2020-09-03T19:03:33Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1093', 'https://github.com/advisories/GHSA-7r5f-7qr4-pf6q'}
null
GHSA
GHSA-7g2w-6r25-2j7p
Command Injection in libnmap
Versions of `libnmap` before 0.4.16 are vulnerable to command injection. Proof of concept ``` const nmap = require('libnmap'); const opts = { range: [ 'scanme.nmap.org', "x.x.$(touch success.txt)" ] }; nmap.scan(opts, function(err, report) { if (err) throw new Error(err); for (let item in report) { console.log(JSON.stringify(report[item])); } }); ``` ## Recommendation Update to version 0.4.16 or later
{'CVE-2018-16461'}
2021-01-08T19:15:46Z
2018-11-01T14:51:33Z
MODERATE
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-7g2w-6r25-2j7p', 'https://www.npmjs.com/advisories/719', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16461', 'https://hackerone.com/reports/390865', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}
null
GHSA
GHSA-j4ch-mw66-xmqv
Malicious Package in pensi-scheduler
Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:16:44Z
2020-09-03T19:16:44Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-j4ch-mw66-xmqv', 'https://www.npmjs.com/advisories/1107'}
null
GHSA
GHSA-72hm-fx78-xwhc
XSS vulnerability on contacts view
### Impact Mautic versions before 3.3.4/4.0.0 are vulnerable to an inline JS XSS attack through the contact's first or last name and triggered when viewing a contact's details page then clicking on the action drop down and hovering over the Campaigns button. Contact first and last name can be populated from different sources such as UI, API, 3rd party syncing, forms, etc. ### Patches Upgrade to 3.3.4 or 4.0.0 ### Workarounds No ### References https://github.com/mautic/mautic/releases/tag/3.3.4 https://github.com/mautic/mautic/releases/tag/4.0.0 ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2021-27911'}
2022-04-19T19:03:06Z
2021-09-01T18:40:40Z
HIGH
8.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-72hm-fx78-xwhc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27911', 'https://github.com/mautic/mautic/security/advisories/GHSA-72hm-fx78-xwhc'}
null
GHSA
GHSA-wwmf-6p58-6vj2
High severity vulnerability that affects rwiki
The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors.
{'CVE-2006-2582'}
2021-09-21T21:54:53Z
2017-10-24T18:33:38Z
HIGH
0
null
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/26668', 'https://github.com/advisories/GHSA-wwmf-6p58-6vj2', 'http://www.vupen.com/english/advisories/2006/1949', 'https://nvd.nist.gov/vuln/detail/CVE-2006-2582', 'http://secunia.com/advisories/20264'}
null
GHSA
GHSA-hfg5-xpvw-c9x4
Improper Input Validation in Apache Camel
Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0.
{'CVE-2020-11971'}
2022-04-22T18:21:41Z
2021-05-21T19:20:30Z
HIGH
7.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/rc907a3d385a9c62416d686608e7241c864be8ef2ac16a3bdb0e33649@%3Cissues.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11971', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/7', 'https://lists.apache.org/thread.html/rb0033c4e9dade1fdf22493314062364ff477e9a8b417f687dc168468@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r938dc2ded68039ab747f6d7a12153862495d4b38107d3ed111994386@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r7968b5086e861da2cf635a7b215e465ce9912d5f16c683b8e56819c4@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r45da6abb42a9e6853ec8affdbf591f1db3e90c5288de9d3753124c79@%3Cissues.activemq.apache.org%3E', 'https://issues.apache.org/jira/browse/CAMEL-14811', 'https://github.com/advisories/GHSA-hfg5-xpvw-c9x4', 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c', 'https://lists.apache.org/thread.html/r3d0ae14ca224e69fb1c653f0a5d9e56370ee12d8896aa4490aeae14a@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r8988311eb2481fd8a87e69cf17ffb8dc81bfeba5503021537f72db0a@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r16f4f9019840bc923e25d1b029fb42fe2676c4ba36e54824749a8da9@%3Ccommits.camel.apache.org%3E', 'https://camel.apache.org/security/CVE-2020-11971.html', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
GHSA
GHSA-gp2m-7cfp-h6gf
Incorrect persistent NameID generation in SimpleSAMLphp
### Background When a SimpleSAMLphp Identity Provider is misconfigured, a bug in the software when trying to build a persistent `NameID` to univocally identify the authenticating subject could cause different users to get the same identifier generated, depending on the attributes available for them right after authentication. Please note that even though this is possible thanks to a bug, **an IdP must be misconfigured** to release persistent `NameID`s even if it is not properly configured to generate them based on the specifics of the deployment. ### Description Persistent `NameID`s will typically be sent as part of the `Subject` element of a SAML assertion, or as the contents of the `eduPersonTargetedID` attribute. Here is an example of such a `NameID`: <NameID Format=“urn:oasis:names:tc:SAML:2.0:nameid-format:persistent“> zbonsm0Yn9Gnw14uQEEPr6AO7d+IvxwCQN3t+o24jYs= </NameID> Some service providers will use this information to identify a user across sessions because a persistent `NameID` will never change for a given user. This could lead to different users accessing the same account in those service providers. In order to be affected by this issue, the following circumstances must concur: - SimpleSAMLphp acts as an identity provider. - The service provider asking for authentication requests a persistent `NameID`. - No `saml:PersistentNameID` authentication processing filter is configured (neither for the whole IdP, nor for a given SP). - No `simplesaml.nameidattribute` configuration option is set (neither for the whole IdP, nor for a given SP). - One of the following alternatives: - No `userid.attribute` configuration option is set **and** the users don't have an `eduPersonPrincipalName` attribute in the users backend, **or** - the `userid.attribute` configuration option is set to an empty or missing attribute. If all these requirements are met, the `SimpleSAML_Auth_ProcessingChain` class will try to keep a unique user identifier in the state array (`addUserID()` method). Bear in mind that this code is executed **before** all the authentication processing filters configured, meaning that only those attributes retrieved for the user during **initial authentication** will be available. If no `userid.attribute` configuration option is set, the default `eduPersonPrincipalName` will then be used. However, since it is missing, no identifier will be kept. Alternatively, if `userid.attribute` is set to a missing or empty attribute, the `addUserID()` method will abort trying to register an identifier. After executing all authentication processing filters, SimpleSAMLphp will build a SAML assertion. If the service provider requests persistent `NameID`s, SimpleSAMLphp will attempt to generate one given that none is already available (because the `saml:PersistentNameID` filter was not used). At this point, the code will look for the `simplesaml.nameidattribute` configuration option in either the local IdP metadata or in the remote SP metadata. If none of them are configured, it will default to the unique user identifier previously registered by `SimpleSAML_Auth_ProcessingChain`. If no identifier was kept there, the code will log an error message: Unable to generate NameID. Check the userid.attribute option. However, instead of aborting the `NameID` generation at that point, it will go on and use a value missing from the state array as the source for the computation, meaning the `null` type will be used. Hence, all users connecting to a given service provider will get the same `NameID` generated, because all the input parameters will be the same: - The SP's entity identifier. - The IdP's entity identifier. - The `null` value. - The common secret salt from the main configuration. ### Affected versions All SimpleSAMLphp versions between 1.7.0 and 1.14.10, inclusive. ### Impact Those identity providers affected by this bug and misconfigured as previously described could be issuing SAML assertions with common `NameID`s for all or a subset of their users. If a service provider uses those `NameID`s to identify the users of the affected IdP, all the users will be associated with the same user account at the service provider, causing all sorts of potential security issues like information disclosure or unauthorized access. While we can consider this unlikely to happen, some cases have been already observed. In particular, some identity providers using default configurations and consuming metadata automatically (i.e. using the _metarefresh_ module) while using a user backend like _Active Directory_ that does not populate `eduPersonPrincipalName` are particularly sensitive to this issue. ### Resolution Upgrade to the latest version. Configure a `saml:PersistentNameID` authentication processing filter according to your needs. Remember to check that **the attribute used as the source** for the `NameID` **is present at the moment the `saml:PersistentNameID` filter is executed**. The attribute used must be **unique** per user, and **must not change** over time.
{'CVE-2017-12873'}
2021-08-19T16:44:18Z
2020-01-24T21:28:06Z
CRITICAL
9.8
{'CWE-384'}
{'https://simplesamlphp.org/security/201612-04', 'https://github.com/advisories/GHSA-gp2m-7cfp-h6gf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12873', 'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953', 'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-gp2m-7cfp-h6gf', 'https://www.debian.org/security/2018/dsa-4127'}
null
GHSA
GHSA-p493-635q-r6gr
Remote code execution via the `pretty` option.
### Impact If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. ### Patches Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter. ### Workarounds If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade. ### References Original report: https://github.com/pugjs/pug/issues/3312 ### For more information If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md)
{'CVE-2021-21353'}
2021-03-04T17:42:33Z
2021-03-03T02:03:52Z
HIGH
6.8
{'CWE-74'}
{'https://github.com/pugjs/pug/issues/3312', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/pull/3314', 'https://www.npmjs.com/package/pug-code-gen', 'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353', 'https://github.com/advisories/GHSA-p493-635q-r6gr'}
null
GHSA
GHSA-gj76-429m-56wc
Deserialization of Untrusted Data in Apache Olingo
Apache Olingo versions 4.0.0 to 4.6.0 provide the AbstractService class, which is public API, uses ObjectInputStream and doesn't check classes being deserialized. If an attacker can feed malicious metadata to the class, then it may result in running attacker's code in the worse case.
{'CVE-2019-17556'}
2021-08-19T16:54:03Z
2020-02-04T22:38:22Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17556', 'https://issues.apache.org/jira/browse/OLINGO-1410', 'https://github.com/apache/olingo-odata4/pull/60/files', 'https://github.com/advisories/GHSA-gj76-429m-56wc', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d4vbSYaVh3aUWAvcVHK2qcFxxCZd3WAx3xbwZXskPX8nw%40mail.gmail.com%3E'}
null
GHSA
GHSA-h48w-c35p-6m8x
Out-of-bounds Write in Play Framework
An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service.
{'CVE-2020-27196'}
2022-02-10T20:23:25Z
2022-02-10T20:23:25Z
HIGH
7.5
{'CWE-787'}
{'https://www.playframework.com/security/vulnerability/CVE-2020-27196-DosViaJsonStackOverflow', 'https://github.com/playframework/playframework/pull/10321', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27196', 'https://github.com/advisories/GHSA-h48w-c35p-6m8x'}
null
GHSA
GHSA-7jh9-6cpf-h4m7
XSS in hello.js
This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).
{'CVE-2020-7741'}
2021-09-27T20:56:45Z
2021-01-13T19:07:01Z
CRITICAL
0
{'CWE-79'}
{'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546', 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741', 'https://github.com/advisories/GHSA-7jh9-6cpf-h4m7'}
null
GHSA
GHSA-3m2r-q8x3-xmf7
Moderate severity vulnerability that affects Microsoft.AspNetCore.All, Microsoft.AspNetCore.Server.Kestrel.Core, Microsoft.AspNetCore.Server.Kestrel.Transport.Abstractions, and Microsoft.AspNetCore.Server.Kestrel.Transport.Libuv
Microsoft made an internal discovery of a security vulnerability in version 2.x of ASP.NET Core where a specially crafted request can cause excess resource consumption in Kestrel.
null
2021-12-03T14:27:37Z
2018-10-16T19:59:48Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-3m2r-q8x3-xmf7', 'https://github.com/aspnet/Announcements/issues/300'}
null
GHSA
GHSA-j3g9-6fx5-gjv7
Inadequate Encryption Strength in DotNetNuke
DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811.
{'CVE-2018-18325'}
2021-08-17T15:49:31Z
2019-07-05T21:08:16Z
HIGH
7.5
{'CWE-326'}
{'https://www.dnnsoftware.com/community/security/security-center', 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18325', 'https://github.com/dnnsoftware/Dnn.Platform/releases', 'https://github.com/advisories/GHSA-j3g9-6fx5-gjv7'}
null
GHSA
GHSA-3h2h-xqr2-2jp7
Cross-site Scripting (XSS) in Apache ActiveMQ Artemis
In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
{'CVE-2020-13932'}
2022-02-09T22:14:01Z
2022-02-09T22:14:01Z
MODERATE
6.1
{'CWE-79'}
{'https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt', 'https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13932', 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-3h2h-xqr2-2jp7'}
null
GHSA
GHSA-9jp8-cwwx-p64q
XSS in richtext custom tag attributes in ezsystems/ezplatform-richtext
The rich text editor does not escape attribute data when previewing custom tags. This means XSS is possible if custom tags are used, for users who have access to editing rich text content. Frontend content view is not affected, but the vulnerability could be used by editors to attack other editors. The fix ensures custom tag attribute data is escaped in the editor.
null
2021-12-01T18:28:38Z
2021-12-01T18:28:38Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-9jp8-cwwx-p64q', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-010-xss-in-richtext-custom-tag-attributes', 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-9jp8-cwwx-p64q'}
null
GHSA
GHSA-fxhp-wrw9-3r97
XML external entity (XXE) injection in Apache Nutch
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Nutch 1.18.
{'CVE-2021-23901'}
2022-03-21T20:26:43Z
2022-03-18T17:46:29Z
CRITICAL
9.1
{'CWE-611'}
{'https://lists.apache.org/thread.html/r7ddfd680aa7ea001ca8da63bb23e3f8caa095a8b4f2261e46bade5c7@%3Cdev.nutch.apache.org%3E', 'https://lists.apache.org/thread.html/r5e2f7737b42c73a3325f3c2c8cdee1ec27631b3a0e144104d84d70e6@%3Cannounce.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210513-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23901', 'https://github.com/apache/nutch/pull/563', 'https://lists.apache.org/thread.html/r090321840b44cc91086c4e317bf2baffa270749dde6c1273b6567f7c%40%3Cdev.nutch.apache.org%3E', 'https://github.com/advisories/GHSA-fxhp-wrw9-3r97', 'https://issues.apache.org/jira/browse/NUTCH-2841'}
null
GHSA
GHSA-4j46-mp85-mv8c
Path traversal in rollup-plugin-serve
Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation.
{'CVE-2020-7684'}
2021-05-18T01:52:24Z
2021-05-18T01:52:24Z
CRITICAL
9.8
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7684', 'https://github.com/advisories/GHSA-4j46-mp85-mv8c', 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969', 'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2', 'https://vuldb.com/?id.158745'}
null
GHSA
GHSA-q7f7-544h-67h9
FPE in TFLite pooling operations
### Impact The implementations of pooling in TFLite are vulnerable to division by 0 errors as there are no checks for divisors not being 0. ### Patches We have patched the issue in GitHub commit [dfa22b348b70bb89d6d6ec0ff53973bacb4f4695](https://github.com/tensorflow/tensorflow/commit/dfa22b348b70bb89d6d6ec0ff53973bacb4f4695). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37684'}
2021-08-25T14:40:13Z
2021-08-25T14:40:13Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q7f7-544h-67h9', 'https://github.com/advisories/GHSA-q7f7-544h-67h9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37684'}
null
GHSA
GHSA-ffpv-c4hm-3x6v
actionpack is vulnerable to denial of service via a crafted HTTP Accept header
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
{'CVE-2016-0751'}
2022-04-25T20:50:14Z
2017-10-24T18:33:35Z
HIGH
7.5
null
{'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/9oLY_FCzvoc/5CDXbvpYEgAJ', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178067.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'https://github.com/advisories/GHSA-ffpv-c4hm-3x6v', 'http://www.openwall.com/lists/oss-security/2016/01/25/9', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751', 'http://www.securityfocus.com/bid/81800'}
null
GHSA
GHSA-ff2w-cq2g-wv5f
HTTP Request Smuggling in Netty
Netty 4.1.43.Final allows HTTP Request Smuggling because it mishandles Transfer-Encoding whitespace (such as a [space]Transfer-Encoding:chunked line) and a later Content-Length header. This issue exists because of an incomplete fix for CVE-2019-16869.
{'CVE-2020-7238'}
2021-08-19T17:32:40Z
2020-02-21T18:55:50Z
HIGH
7.5
{'CWE-444'}
{'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://netty.io/news/', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7238', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://github.com/netty/netty/pull/9865', 'https://github.com/netty/netty/issues/9861', 'https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E', 'https://github.com/advisories/GHSA-ff2w-cq2g-wv5f', 'https://www.debian.org/security/2021/dsa-4885', 'https://access.redhat.com/errata/RHSA-2020:0601', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://github.com/jdordonezn/CVE-2020-72381/issues/1'}
null
GHSA
GHSA-8786-wg74-f522
Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.
{'CVE-2020-25803'}
2022-02-09T23:07:54Z
2022-02-09T23:07:54Z
HIGH
7.2
{'CWE-913'}
{'https://github.com/advisories/GHSA-8786-wg74-f522', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080102', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25803'}
null
GHSA
GHSA-r577-4hq7-73qh
Remote Code Execution in Apache Dubbo
Apache Dubbo supports various rules to support configuration override or traffic routing (called routing in Dubbo). These rules are loaded into the configuration center (eg: Zookeeper, Nacos, ...) and retrieved by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers will use SnakeYAML library to load the rules which by default will enable calling arbitrary constructors. An attacker with access to the configuration center he will be able to poison the rule so when retrieved by the consumers, it will get RCE on all of them. This was fixed in Dubbo 2.7.13, 3.0.2
{'CVE-2021-36162'}
2021-09-15T18:29:18Z
2021-09-08T20:14:24Z
HIGH
8.8
{'CWE-77'}
{'https://lists.apache.org/thread.html/rfa351115a459e214b99ffcc52c35f33359f3370c547d9c6ba1a60037%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-r577-4hq7-73qh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36162'}
null
GHSA
GHSA-xxvw-45rp-3mj2
Deserialization Code Execution in js-yaml
Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer. ## Proof of Concept ``` const yaml = require('js-yaml'); const x = `test: !!js/function > function f() { console.log(1); }();` yaml.load(x); ``` ## Recommendation Update js-yaml to version 2.0.5 or later, and ensure that all instances where the `.load()` method is called are updated to use `.safeLoad()` instead.
{'CVE-2013-4660'}
2021-09-22T18:27:57Z
2017-10-24T18:33:37Z
CRITICAL
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-xxvw-45rp-3mj2', 'https://www.npmjs.com/advisories/16', 'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660', 'http://portal.nodesecurity.io/advisories/js-yaml'}
null
GHSA
GHSA-3gg9-f3vh-866f
Improper Certificate Validation in Graylog
Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not implement proper certificate validation (regardless of whether the "Allow self-signed certificates" option is used). Therefore, any attacker with the ability to intercept network traffic between a Graylog server and an LDAP server is able to redirect traffic to a different LDAP server (unnoticed by the Graylog server due to the lack of certificate validation), effectively bypassing Graylog's authentication mechanism.
{'CVE-2020-15813'}
2022-02-10T22:39:58Z
2022-02-10T22:39:58Z
HIGH
8.1
{'CWE-295'}
{'https://github.com/Graylog2/graylog2-server/issues/5906', 'https://github.com/Graylog2/graylog2-server/pull/8569', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15813', 'https://github.com/advisories/GHSA-3gg9-f3vh-866f'}
null
GHSA
GHSA-qc65-cgvr-93p6
Code injection in kill-process-by-name
This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.
{'CVE-2021-23356'}
2021-03-25T00:17:45Z
2021-03-19T21:19:18Z
HIGH
9.8
{'CWE-77'}
{'https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534', 'https://github.com/advisories/GHSA-qc65-cgvr-93p6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23356'}
null
GHSA
GHSA-7qmm-q394-fmch
Command Injection in ps-kill
This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)',function(){});
{'CVE-2021-23355'}
2021-03-25T00:17:34Z
2021-03-19T21:19:29Z
CRITICAL
9.8
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23355', 'https://snyk.io/vuln/SNYK-JS-PSKILL-1078529', 'https://github.com/advisories/GHSA-7qmm-q394-fmch'}
null
GHSA
GHSA-2mp5-m968-gwr2
Path Traversal in http-file-server
All versions of `http-file-server` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5447'}
2021-01-08T21:15:58Z
2019-07-16T00:41:34Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/1077', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5447', 'https://hackerone.com/reports/570133', 'https://github.com/advisories/GHSA-2mp5-m968-gwr2'}
null
GHSA
GHSA-2m96-9w4j-wgv7
Prototype Pollution in lodash.merge
Versions of `lodash.merge` before 4.6.1 are vulnerable to Prototype Pollution. The function 'merge' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2021-09-28T22:42:13Z
2020-09-03T18:06:00Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1067', 'https://github.com/advisories/GHSA-2m96-9w4j-wgv7'}
null
GHSA
GHSA-cq58-r77c-5jjw
Cross-site scripting (XSS) from image block content in the site frontend
### Impact Kirby's [blocks field](https://getkirby.com/docs/reference/panel/fields/blocks) stores structured data for each block. This data is then used in [block snippets](https://getkirby.com/docs/reference/panel/fields/blocks#block-snippets) to convert the blocks to HTML for use in your templates. We recommend to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks. Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. The default snippet for the [image block](https://getkirby.com/docs/reference/panel/blocks/image) unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. You are *not* affected if you don't use the blocks field or specifically the image block in any of your blueprints. You are also protected if you use a custom [block snippet](https://getkirby.com/docs/reference/panel/fields/blocks#block-snippets) that either escapes the printed values or doesn't use them. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into the image block content. ### Patches We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by escaping special HTML characters in the output from the default image block snippet. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. ### Credits Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.
{'CVE-2021-41258'}
2022-04-19T19:03:14Z
2021-11-16T17:04:41Z
MODERATE
5.4
{'CWE-79', 'CWE-80'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-cq58-r77c-5jjw', 'https://github.com/advisories/GHSA-cq58-r77c-5jjw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41258', 'https://github.com/getkirby/kirby/pull/3510', 'https://github.com/getkirby/kirby/releases/tag/3.5.8'}
null
GHSA
GHSA-2fwq-wx47-hm6x
Malicious Package in bcion
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:30:20Z
2020-09-04T15:31:39Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1352', 'https://github.com/advisories/GHSA-2fwq-wx47-hm6x'}
null
GHSA
GHSA-xhw6-hjc9-679m
Token validation bypass in Pac4j
Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which allows the attacker to bypass the token validation by injecting a malformed ID token using "none" as the value of "alg" key in the header with an empty signature value.
{'CVE-2021-44878'}
2022-04-01T18:07:15Z
2022-01-08T00:36:05Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44878', 'https://github.com/advisories/GHSA-xhw6-hjc9-679m', 'https://openid.net/specs/openid-connect-core-1_0.html#IDToken', 'https://www.pac4j.org/blog/cve_2021_44878_is_this_serious.html'}
null
GHSA
GHSA-wch2-46wj-6x5j
Malicious Package in bip30
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:38:54Z
2020-09-04T15:37:15Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-wch2-46wj-6x5j', 'https://www.npmjs.com/advisories/1358'}
null
GHSA
GHSA-3cgg-gh9j-w8vm
Directory Traversal in iter-http
Affected versions of `iter-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16094'}
2021-01-08T20:02:06Z
2018-07-24T13:58:10Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16094', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-http', 'https://github.com/advisories/GHSA-3cgg-gh9j-w8vm', 'https://nodesecurity.io/advisories/343', 'https://www.npmjs.com/advisories/343'}
null
GHSA
GHSA-rgjg-66cx-5x9m
Authentication Bypass
Grafana before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
{'CVE-2018-15727'}
2022-04-12T22:18:16Z
2022-02-15T01:57:18Z
CRITICAL
9.8
{'CWE-287'}
{'https://access.redhat.com/errata/RHSA-2019:0019', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15727', 'https://github.com/grafana/grafana/commit/df83bf10a225811927644bdf6265fa80bdea9137', 'https://grafana.com/blog/2018/08/29/grafana-5.2.3-and-4.6.4-released-with-important-security-fix/', 'https://www.securityfocus.com/bid/105184', 'https://github.com/grafana/grafana/commit/7baecf0d0deae0d865e45cf03e082bc0db3f28c3', 'https://github.com/advisories/GHSA-rgjg-66cx-5x9m', 'https://access.redhat.com/errata/RHSA-2018:3829'}
null
GHSA
GHSA-4j77-gg36-9864
Cross-Site Scripting in TYPO3 CMS Link Handling
It has been discovered that link tags generated by `typolink` functionality are vulnerable to cross-site scripting - properties being assigned as HTML attributes have not been parsed correctly. Update to TYPO3 versions 9.5.17 or 10.4.2 that fix the problem described. ### References * https://typo3.org/security/advisory/typo3-core-sa-2020-003
{'CVE-2020-11065'}
2022-04-19T19:02:26Z
2020-05-13T23:18:12Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4j77-gg36-9864', 'https://github.com/advisories/GHSA-4j77-gg36-9864', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11065'}
null
GHSA
GHSA-c5r5-7pfh-6qg6
OS command injection in BibTeX-Ruby
BibTeX-ruby before 5.1.0 allows shell command injection due to unsanitized user input being passed directly to the built-in Ruby Kernel.open method through BibTeX.open.
{'CVE-2019-10780'}
2021-08-19T17:15:39Z
2020-02-14T23:10:01Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-RUBY-BIBTEXRUBY-542602', 'https://github.com/advisories/GHSA-c5r5-7pfh-6qg6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10780', 'https://github.com/inukshuk/bibtex-ruby/commit/14406f4460f4e1ecabd25ca94f809b3ea7c5fb11'}
null
GHSA
GHSA-763g-fqq7-48wg
XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled))
Due to an incomplete fix for [CVE-2019-9658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9658), checkstyle was still vulnerable to XML External Entity (XXE) Processing. ### Impact #### User: Build Maintainers This vulnerability probably doesn't impact Maven/Gradle users as, in most cases, these builds are processing files that are trusted, or pre-vetted by a pull request reviewer before being run on internal CI infrastructure. #### User: Static Analysis as a Service If you operate a site/service that parses "untrusted" Checkstyle XML configuration files, you are vulnerable to this and should patch. Note from the discoverer of the original CVE-2019-9658: > While looking at a few companies that run Checkstyle/PMD/ect... as a service I notice that it's a common pattern to run the static code analysis tool inside of a Docker container with the following flags: > ``` > --net=none \ > --privileged=false \ > --cap-drop=ALL > ``` > Running the analysis in Docker has the advantage that there should be no sensitive local file information that XXE can exfiltrate from the container. Additionally, these flags prevent vulnerabilities in static analysis tools like Checkstyle from being used to exfiltrate data via XXE or to perform SSRF. > \- [Jonathan Leitschuh](https://twitter.com/jlleitschuh) ### Patches _Has the problem been patched? What versions should users upgrade to?_ Patched, will be released with version 8.29 at 26 Jan 2020. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No workaround are available ### References - [CWE-611: Improper Restriction of XML External Entity Reference](https://cwe.mitre.org/data/definitions/611.html) - GitHub Issue https://github.com/checkstyle/checkstyle/issues/7468 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/checkstyle/checkstyle/issues
{'CVE-2019-10782'}
2022-04-19T19:02:47Z
2020-01-31T18:00:07Z
MODERATE
5.3
{'CWE-611'}
{'https://github.com/checkstyle/checkstyle/commit/c46a16d177e6797895b195c288ae9a9a096254b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10782', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00008.html', 'https://snyk.io/vuln/SNYK-JAVA-COMPUPPYCRAWLTOOLS-543266', 'https://github.com/advisories/GHSA-763g-fqq7-48wg', 'https://github.com/checkstyle/checkstyle/issues/7468', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E', 'https://github.com/checkstyle/checkstyle/security/advisories/GHSA-763g-fqq7-48wg'}
null
GHSA
GHSA-qwmj-72mp-q3m2
Missing Authorization in TYPO3 extension
The direct_mail extension through 5.2.3 for TYPO3 allows Information Disclosure via a newsletter subscriber data Special Query.
{'CVE-2020-12700'}
2021-07-28T19:17:49Z
2021-07-26T21:34:58Z
MODERATE
4.3
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12700', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005', 'https://github.com/advisories/GHSA-qwmj-72mp-q3m2'}
null
GHSA
GHSA-cjjf-94ff-43w7
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
{'CVE-2018-12022'}
2021-06-11T15:58:50Z
2019-03-25T18:03:09Z
HIGH
7.5
{'CWE-502'}
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12022', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'http://www.securityfocus.com/bid/107585', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://github.com/advisories/GHSA-cjjf-94ff-43w7', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2052', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1671098', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:1106'}
null
GHSA
GHSA-hjhr-r3gq-qvp6
Timing Attack in csrf-lite
Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences. Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present. ## Recommendation Update to version 0.1.2 or later.
{'CVE-2016-10535'}
2021-01-08T18:40:40Z
2019-02-18T23:39:44Z
HIGH
0
{'CWE-208'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10535', 'https://github.com/advisories/GHSA-hjhr-r3gq-qvp6', 'https://github.com/isaacs/csrf-lite/pull/1', 'https://nodesecurity.io/advisories/94', 'https://www.npmjs.com/advisories/94'}
null
GHSA
GHSA-2363-cqg2-863c
XML External Entity (XXE) Injection in JDOM
An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. At this time there is not released fixed version of JDOM. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded.
{'CVE-2021-33813'}
2022-04-22T15:47:57Z
2021-07-27T19:02:56Z
HIGH
7.5
{'CWE-611'}
{'https://lists.debian.org/debian-lts-announce/2021/07/msg00012.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://alephsecurity.com/vulns/aleph-2021003', 'https://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/', 'https://github.com/hunterhacker/jdom/pull/188', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00026.html', 'https://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f@%3Cissues.solr.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/', 'https://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E', 'https://github.com/hunterhacker/jdom/releases', 'https://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361', 'https://github.com/advisories/GHSA-2363-cqg2-863c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33813', 'https://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89@%3Cissues.solr.apache.org%3E'}
null
GHSA
GHSA-2j2j-8rrv-264g
Cross-Site Scripting in exceljs
Versions of `exceljs` before 1.6.0 are vulnerable to cross-site scripting. This vulnerability is due to `exceljs` does not validate data from parsed XLSX file and allows to embed HTML tags, like `<script>`, directly in the sheet cells. Because of this it's possible to inject malicious JavaScript code and execute it when data from the sheet were displayed in the browser. ## Recommendation Update to version 1.6.0 or later.
{'CVE-2018-16459'}
2021-01-08T20:08:24Z
2018-09-11T18:58:40Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-2j2j-8rrv-264g', 'https://hackerone.com/reports/356809', 'https://www.npmjs.com/advisories/733', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16459', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/464.json'}
null
GHSA
GHSA-5pg8-h4gv-m3p8
Null pointer deference in fltk
An issue was discovered in the fltk crate before 0.15.3 for Rust. There is a NULL pointer dereference during attempted use of a multi label type if the image is nonexistent.
{'CVE-2021-28306'}
2021-08-25T20:53:56Z
2021-08-25T20:53:56Z
HIGH
7.5
{'CWE-476'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28306', 'https://github.com/advisories/GHSA-5pg8-h4gv-m3p8', 'https://github.com/MoAlyousef/fltk-rs/issues/519'}
null
GHSA
GHSA-3pxp-6963-46r9
Command Injection in pdfinfojs
Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor. ## Recommendation Update to version 0.4.1 or later.
{'CVE-2018-3746'}
2021-01-08T20:00:19Z
2018-06-07T19:43:00Z
HIGH
0
{'CWE-77'}
{'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd', 'https://github.com/advisories/GHSA-3pxp-6963-46r9', 'https://hackerone.com/reports/330957', 'https://www.npmjs.com/advisories/643', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746'}
null
GHSA
GHSA-h835-75hw-pj89
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 might allow remote attackers to inject arbitrary web script or HTML via vectors involving a ' (quote) character.
{'CVE-2012-3464'}
2021-09-14T16:52:32Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-h835-75hw-pj89', 'https://groups.google.com/group/rubyonrails-security/msg/8f1bbe1cef8c6caf?dmode=source&output=gplain', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3464', 'http://secunia.com/advisories/50694', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
GHSA
GHSA-vrc7-6g8w-jh56
Improper Input Validation in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
{'CVE-2015-9544'}
2022-04-19T19:03:27Z
2021-12-09T19:29:36Z
HIGH
7.1
{'CWE-20'}
{'https://github.com/advisories/GHSA-vrc7-6g8w-jh56', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9544', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe', 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}
null
GHSA
GHSA-fhv4-fx3v-77w6
quinn invalidly assumes the memory layout of std::net::SocketAddr
An issue was discovered in the quinn crate for Rust. It may have invalid memory access for certain versions of the standard library because it relies on a direct cast of std::net::SocketAddrV4 and std::net::SocketAddrV6 data structures.
{'CVE-2021-28036'}
2021-08-25T20:52:05Z
2021-08-25T20:52:05Z
HIGH
7.5
{'CWE-119'}
{'https://github.com/quinn-rs/quinn/issues/968', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28036', 'https://github.com/advisories/GHSA-fhv4-fx3v-77w6', 'https://rustsec.org/advisories/RUSTSEC-2021-0035.html'}
null