ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-vmfh-c547-v45h
Remote code execution in ruby-jss
The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.
{'CVE-2021-33575'}
2021-10-06T17:48:27Z
2021-10-06T17:48:27Z
CRITICAL
9.8
null
{'https://github.com/advisories/GHSA-vmfh-c547-v45h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33575', 'https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations', 'https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24'}
null
GHSA
GHSA-r34r-f84j-5x4x
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
{'CVE-2017-7678'}
2021-09-17T14:13:38Z
2018-11-09T17:43:08Z
MODERATE
6.1
{'CWE-79'}
{'http://www.securityfocus.com/bid/99603', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7678', 'https://github.com/advisories/GHSA-r34r-f84j-5x4x', 'http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html'}
null
GHSA
GHSA-pr38-qpxm-g88x
Uncontrolled Resource Consumption in Apache ActiveMQ Artemis
In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.
{'CVE-2022-23913'}
2022-05-03T02:20:46Z
2022-02-06T00:00:55Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/apache/activemq-artemis/pull/3862', 'https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2', 'https://issues.apache.org/jira/browse/ARTEMIS-3593', 'https://security.netapp.com/advisory/ntap-20220303-0003/', 'https://github.com/apache/activemq-artemis/pull/3871', 'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7', 'https://github.com/advisories/GHSA-pr38-qpxm-g88x', 'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913', 'https://github.com/github/codeql-java-CVE-coverage/issues/1061'}
null
GHSA
GHSA-756f-6j3f-48q9
Directory Traversal in calmquist.static-server
Affected versions of `calmquist.static-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16165'}
2021-01-08T19:17:46Z
2018-07-23T20:45:51Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16165', 'https://www.npmjs.com/advisories/398', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server', 'https://github.com/advisories/GHSA-756f-6j3f-48q9', 'https://nodesecurity.io/advisories/398'}
null
GHSA
GHSA-m9m5-cg5h-r582
Improper random number generation in nanorand
An issue was discovered in the nanorand crate before 0.5.1 for Rust. It caused any random number generator (even ChaCha) to return all zeroes because integer truncation was mishandled.
{'CVE-2020-35926'}
2021-08-25T20:50:24Z
2021-08-25T20:50:24Z
CRITICAL
5.1
{'CWE-338'}
{'https://github.com/advisories/GHSA-m9m5-cg5h-r582', 'https://github.com/Absolucy/nanorand-rs/commit/5ba218ac29df4786b002d7d12b47fa0c04a331f2', 'https://rustsec.org/advisories/RUSTSEC-2020-0089.html', 'https://twitter.com/aspenluxxxy/status/1336684692284772352', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35926'}
null
GHSA
GHSA-94xh-2fmc-xf5j
command injection vulnerability
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite() ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
{'CVE-2020-7752'}
2021-10-08T21:15:37Z
2020-10-27T20:30:20Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://github.com/advisories/GHSA-94xh-2fmc-xf5j', 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://www.npmjs.com/package/systeminformation'}
null
GHSA
GHSA-44qp-9wwf-734r
Heap overflow in Tensorflow
### Impact The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) is vulnerable to a heap overflow: ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseCountSparseOutput( indices=[[-1,-1]], values=[2], dense_shape=[1, 1], weights=[1], binary_output=True, minlength=-1, maxlength=-1, name=None) ``` ### Patches We have patched the issue in GitHub commits [2b7100d6cdff36aa21010a82269bc05a6d1cc74a](https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a) and [adbbabdb0d3abb3cdeac69e38a96de1d678b24b3](https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-21740'}
2022-02-11T16:21:12Z
2022-02-09T23:47:14Z
HIGH
7.6
{'CWE-787', 'CWE-120'}
{'https://github.com/advisories/GHSA-44qp-9wwf-734r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21740', 'https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r', 'https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273'}
null
GHSA
GHSA-6g5f-f5pm-mjrg
Vulnerability in Istio
Istio 1.1.x through 1.1.6 has Incorrect Access Control.
{'CVE-2019-12243'}
2022-04-20T21:05:19Z
2022-02-15T01:57:18Z
HIGH
8.9
{'CWE-284'}
{'https://istio.io/blog/2019/cve-2019-12243/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12243', 'https://github.com/advisories/GHSA-6g5f-f5pm-mjrg', 'https://istio.io/about/notes/'}
null
GHSA
GHSA-prxj-c66c-4gcf
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0924'}
2021-03-29T21:00:12Z
2021-03-29T21:00:12Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/advisories/GHSA-prxj-c66c-4gcf', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924'}
null
GHSA
GHSA-m43c-649m-pm48
Integer Overflow or Wraparound in OpenCV.
In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 (corresponding with OpenCV-Python 3.3.0.9) and earlier.
{'CVE-2017-1000450'}
2021-11-18T15:31:29Z
2021-10-12T22:03:32Z
HIGH
8.8
{'CWE-190'}
{'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9723', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000450', 'https://github.com/advisories/GHSA-m43c-649m-pm48', 'https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html', 'https://github.com/opencv/opencv/pull/9726/commits/c58152d94ba878b2d7d76bcac59146312199b9eb', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}
null
GHSA
GHSA-rpw6-9xfx-jvcx
Directory Traversal in Archive_Tar
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948. :exclamation: Note: There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulnerability made in version `1.4.12`. That fix introduced a bug which was [fixed in 1.4.13](https://github.com/pear/Archive_Tar/pull/36). Therefore we have set the first-patched-version to `1.4.13` which the earliest working version that avoids this vulnerability.
{'CVE-2020-36193'}
2021-09-27T18:45:02Z
2021-04-22T16:20:36Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-rpw6-9xfx-jvcx', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-36193.yaml', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00007.html', 'https://packagist.org/packages/pear/archive_tar', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36193', 'https://security.gentoo.org/glsa/202101-23', 'https://www.drupal.org/sa-core-2021-001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOZNK4FIIV7FSFCJNNFWMJZTTV7NFJV2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://github.com/pear/Archive_Tar/issues/35', 'https://github.com/pear/Archive_Tar/releases/tag/1.4.13', 'https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKD5WEFA4WT6AVTMRAYBNXZNLWZHM7FH/', 'https://www.debian.org/security/2021/dsa-4894'}
null
GHSA
GHSA-5vwc-r48g-wj6c
Exposure of Resource to Wrong Sphere in abomonation
An issue was discovered in the abomonation crate through 2021-10-17 for Rust. Because transmute operations are insufficiently constrained, there can be an information leak or ASLR bypass.
{'CVE-2021-45708'}
2022-01-07T18:26:56Z
2022-01-06T22:08:22Z
HIGH
7.5
{'CWE-668'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0120.html', 'https://github.com/TimelyDataflow/abomonation/issues/23', 'https://github.com/advisories/GHSA-5vwc-r48g-wj6c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45708', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/abomonation/RUSTSEC-2021-0120.md'}
null
GHSA
GHSA-5jjv-x4fq-qjwp
Possible timing attack in derivation_endpoint
### Impact When using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL. ### Patches The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater. ### Workarounds Users of older Shrine versions can apply the following monkey-patch after loading the `derivation_endpoint` plugin: ```rb class Shrine class UrlSigner def verify_signature(string, signature) if signature.nil? fail InvalidSignature, "missing \"signature\" param" elsif !Rack::Utils.secure_compare(signature, generate_signature(string)) fail InvalidSignature, "provided signature does not match the calculated signature" end end end end ``` ### References You can read more about timing attacks [here](https://en.wikipedia.org/wiki/Timing_attack).
{'CVE-2020-15237'}
2022-04-19T19:02:36Z
2020-10-05T15:48:34Z
MODERATE
5.9
{'CWE-208', 'CWE-203'}
{'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15237', 'https://github.com/shrinerb/shrine/security/advisories/GHSA-5jjv-x4fq-qjwp', 'https://github.com/advisories/GHSA-5jjv-x4fq-qjwp'}
null
GHSA
GHSA-xf64-2f9p-6pqq
Information Exposure in type-graphql
Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request. ## Recommendation Upgrade to version 0.17.6 or later.
null
2021-10-04T20:44:20Z
2020-09-04T17:24:08Z
LOW
0
{'CWE-209'}
{'https://www.npmjs.com/advisories/1444', 'https://github.com/advisories/GHSA-xf64-2f9p-6pqq', 'https://github.com/MichalLytek/type-graphql/issues/489'}
null
GHSA
GHSA-fh56-85cw-5pq6
Out-of-bounds Write in ujson
UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode).
{'CVE-2021-45958'}
2022-03-30T16:44:03Z
2022-01-21T23:27:45Z
MODERATE
5.5
{'CWE-787'}
{'https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml', 'https://github.com/ultrajson/ultrajson/issues/501', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009', 'https://github.com/ultrajson/ultrajson/pull/504', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45958', 'https://github.com/advisories/GHSA-fh56-85cw-5pq6', 'https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284'}
null
GHSA
GHSA-mh6h-f25p-98f8
Uncontrolled memory consumption in protobuf
An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve calls.
{'CVE-2019-15544'}
2021-09-03T20:36:40Z
2021-08-25T20:44:05Z
HIGH
7.5
{'CWE-770'}
{'https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd@%3Cdev.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-mh6h-f25p-98f8', 'https://github.com/stepancheg/rust-protobuf/issues/411', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15544', 'https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae@%3Cissues.hbase.apache.org%3E', 'https://rustsec.org/advisories/RUSTSEC-2019-0003.html', 'https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf@%3Cissues.hbase.apache.org%3E'}
null
GHSA
GHSA-5xqr-grq4-qwgx
Moderate severity vulnerability that affects com.github.junrar:junrar
Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files.
{'CVE-2018-12418'}
2021-09-01T22:36:11Z
2018-10-17T00:04:05Z
MODERATE
5.5
{'CWE-835'}
{'https://github.com/advisories/GHSA-5xqr-grq4-qwgx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12418', 'https://github.com/junrar/junrar/pull/8', 'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'}
null
GHSA
GHSA-f4w8-cv6p-x6r5
Denial of Service by Uncontrolled Resource Consumption
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
{'CVE-2021-27921'}
2021-12-07T17:52:23Z
2021-03-18T19:55:13Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27921', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-f4w8-cv6p-x6r5', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}
null
GHSA
GHSA-xx65-cc7g-9pfp
Moderate severity vulnerability that affects org.springframework.boot:spring-boot
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
{'CVE-2018-1196'}
2021-09-22T18:26:44Z
2018-10-18T18:05:57Z
MODERATE
5.9
{'CWE-59'}
{'https://pivotal.io/security/cve-2018-1196', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1196', 'https://github.com/advisories/GHSA-xx65-cc7g-9pfp'}
null
GHSA
GHSA-fffj-9qwg-qmh5
Improper Input Validation in OpenCV
OpenCV 3.0.0 allows remote attackers to cause a denial of service (segfault) via vectors involving corrupt chunks. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV 3.3.1.11).
{'CVE-2016-1517'}
2021-10-12T22:00:31Z
2021-10-12T22:00:31Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-fffj-9qwg-qmh5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1517', 'https://arxiv.org/pdf/1701.04739.pdf', 'https://github.com/opencv/opencv/issues/5956', 'https://github.com/opencv/opencv/pull/9376'}
null
GHSA
GHSA-7q9f-x6rm-qmxr
Command Injection in compass-compile
compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
{'CVE-2020-7635'}
2022-04-19T19:03:24Z
2021-12-09T19:27:46Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25', 'https://github.com/advisories/GHSA-7q9f-x6rm-qmxr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635', 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}
null
GHSA
GHSA-f2rc-6xjq-95gq
Directory Traversal in shenliru
Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16161'}
2021-01-14T15:49:12Z
2020-09-01T17:24:57Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-f2rc-6xjq-95gq', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16161', 'https://www.npmjs.com/advisories/389', 'https://nodesecurity.io/advisories/389'}
null
GHSA
GHSA-jh67-3wqw-cvhr
Malicious Package in js-sxa3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:35:03Z
2020-09-03T23:13:52Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-jh67-3wqw-cvhr', 'https://www.npmjs.com/advisories/1293'}
null
GHSA
GHSA-38rv-5jqc-m2cv
High severity vulnerability that affects recurly
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources.
{'CVE-2017-0906'}
2021-01-08T20:03:04Z
2019-01-04T17:48:09Z
HIGH
0
{'CWE-918'}
{'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742', 'https://github.com/advisories/GHSA-38rv-5jqc-m2cv', 'https://hackerone.com/reports/288635', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906', 'https://dev.recurly.com/page/python-updates'}
null
GHSA
GHSA-72rj-36qc-47g7
Information Disclosure
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
{'CVE-2021-31671'}
2021-06-09T23:09:49Z
2021-04-27T15:54:52Z
HIGH
7.5
{'CWE-319'}
{'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671', 'https://github.com/ankane/pgsync/issues/121', 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26', 'https://github.com/advisories/GHSA-72rj-36qc-47g7', 'https://rubygems.org/gems/pgsync'}
null
GHSA
GHSA-qhm4-jxv7-j9pq
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
{'CVE-2020-8551'}
2022-04-12T22:00:18Z
2022-02-15T01:57:18Z
LOW
4.3
{'CWE-789'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://github.com/advisories/GHSA-qhm4-jxv7-j9pq', 'https://github.com/kubernetes/kubernetes/issues/89377', 'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8551', 'https://github.com/kubernetes/kubernetes/pull/87913', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s', 'https://github.com/kubernetes/kubernetes/commit/9802bfcec0580169cffce2a3d468689a407fa7dc'}
null
GHSA
GHSA-q25j-gcmv-5qpp
Moderate severity vulnerability that affects org.grails.plugins:fields and org.grails:grails-core
Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnerability in Using the display tag that can result in XSS . This vulnerability appears to have been fixed in 2.2.8.
{'CVE-2018-1000529'}
2021-09-16T19:18:42Z
2018-10-19T16:46:01Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/grails-fields-plugin/grails-fields/issues/278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000529', 'https://github.com/advisories/GHSA-q25j-gcmv-5qpp', 'https://github.com/martinfrancois/CVE-2018-1000529'}
null
GHSA
GHSA-qj73-v688-wqxf
Hijacked Environment Variables in proxy.js
The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16076'}
2021-01-08T01:58:37Z
2018-08-29T23:19:13Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-qj73-v688-wqxf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076', 'https://www.npmjs.com/advisories/515', 'https://nodesecurity.io/advisories/515'}
null
GHSA
GHSA-vfqx-hv88-f9cv
Double-free in id-map
An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in get_or_insert upon a panic of a user-provided f function.
{'CVE-2021-30456'}
2021-08-25T20:55:22Z
2021-08-25T20:55:22Z
CRITICAL
9.8
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30456', 'https://github.com/andrewhickman/id-map/issues/3', 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html', 'https://github.com/advisories/GHSA-vfqx-hv88-f9cv'}
null
GHSA
GHSA-ghcq-472w-vf4h
Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx
### Impact Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those. ### Patches This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6. ### Workarounds There's no easy workaround for this issue, administrators should upgrade their wiki. ### References https://jira.xwiki.org/browse/XWIKI-19155 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security ML](mailto:security@xwiki.org)
{'CVE-2022-24821'}
2022-04-12T21:43:26Z
2022-04-08T21:59:04Z
MODERATE
6.8
{'CWE-648'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24821', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h', 'https://jira.xwiki.org/browse/XWIKI-19155', 'https://github.com/advisories/GHSA-ghcq-472w-vf4h'}
null
GHSA
GHSA-j545-frh3-r9gq
SQL Injection in dolibarr
dolibarr is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
{'CVE-2022-0224'}
2022-01-21T23:56:39Z
2022-01-21T23:56:39Z
HIGH
8.3
{'CWE-89'}
{'https://github.com/advisories/GHSA-j545-frh3-r9gq', 'https://huntr.dev/bounties/f1d1ce3e-ca92-4c7b-b1b8-934e28eaa486', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0224', 'https://github.com/dolibarr/dolibarr/commit/b9b45fb50618aa8053961f50bc8604b188d0ea79'}
null
GHSA
GHSA-c2q3-4qrh-fm48
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).
{'CVE-2020-14061'}
2021-10-21T21:08:31Z
2020-06-18T14:44:50Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2698', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14061', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-c2q3-4qrh-fm48', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-pgmg-gf5p-54j8
Prototype Pollution in gammautils
"All versions of package gammautils up to and including version 0.0.81 are vulnerable to Prototype Pollution via the deepSet and deepMerge functions."
{'CVE-2020-7718'}
2021-07-29T22:08:51Z
2021-05-06T18:26:14Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-pgmg-gf5p-54j8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7718', 'https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670'}
null
GHSA
GHSA-q4g7-jrxv-67r9
Silent Configuration Failure in Puppet Agent
A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.
{'CVE-2021-27025'}
2021-12-02T17:54:25Z
2021-12-02T17:54:25Z
MODERATE
6.5
null
{'https://github.com/advisories/GHSA-q4g7-jrxv-67r9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27025', 'https://puppet.com/security/cve/cve-2021-27025'}
null
GHSA
GHSA-6gr8-c3m5-mvrg
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
{'CVE-2021-32717'}
2021-09-08T18:00:47Z
2021-09-08T18:00:47Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32717', 'https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3', 'https://github.com/advisories/GHSA-6gr8-c3m5-mvrg', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}
null
GHSA
GHSA-gx5g-xcxj-cx2w
Critical severity vulnerability that affects smart_proxy_dynflow
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
{'CVE-2018-14643'}
2021-09-13T14:29:48Z
2018-10-08T23:18:13Z
CRITICAL
9.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14643', 'https://github.com/advisories/GHSA-gx5g-xcxj-cx2w'}
null
GHSA
GHSA-792r-mh2q-p8qp
Server Side Request Forgery (SSRF) in org.mitre:openid-connect-server
The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.
{'CVE-2021-26715'}
2021-05-13T22:30:52Z
2021-05-13T22:30:52Z
HIGH
9.1
{'CWE-918'}
{'https://github.com/advisories/GHSA-792r-mh2q-p8qp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26715', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases', 'https://portswigger.net/research/hidden-oauth-attack-vectors'}
null
GHSA
GHSA-6r92-cgxc-r5fg
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was privately reported to me. ### Patches This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.) ### Workarounds Again, users should use the latest version of this library. In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if— - it begins with a byte other than 0x80 through 0xDF, or - it does not contain a byte in the range 0xa0 through 0xBF. Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
null
2022-01-24T22:05:32Z
2022-01-21T23:35:35Z
HIGH
0
{'CWE-407'}
{'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}
null
GHSA
GHSA-rjf2-j2r6-q8gr
Prototype Pollution in vm2
This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.
{'CVE-2021-23449'}
2021-11-01T14:07:45Z
2021-10-19T15:28:45Z
CRITICAL
9.8
{'CWE-1321', 'CWE-915'}
{'https://security.netapp.com/advisory/ntap-20211029-0010/', 'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/advisories/GHSA-rjf2-j2r6-q8gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449'}
null
GHSA
GHSA-82hx-w2r5-c2wq
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
{'CVE-2020-8552'}
2022-04-12T22:00:04Z
2022-02-15T01:57:18Z
MODERATE
5.3
{'CWE-789', 'CWE-400'}
{'https://github.com/kubernetes/kubernetes/pull/87669', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://github.com/advisories/GHSA-82hx-w2r5-c2wq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8552', 'https://github.com/kubernetes/kubernetes/issues/89378', 'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s'}
null
GHSA
GHSA-7g9h-c88w-r7h2
High severity vulnerability that affects django
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
{'CVE-2011-0698'}
2021-09-02T21:19:04Z
2018-07-23T19:52:31Z
HIGH
0
{'CWE-22'}
{'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'https://github.com/advisories/GHSA-7g9h-c88w-r7h2', 'http://www.securityfocus.com/bid/46296', 'http://www.vupen.com/english/advisories/2011/0372', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0698', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://secunia.com/advisories/43230', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'http://www.vupen.com/english/advisories/2011/0439'}
null
GHSA
GHSA-fqh4-rh59-xhvf
Denial of service
The package `github.com/pires/go-proxyproto` before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.
{'CVE-2021-23351'}
2021-05-18T21:07:43Z
2021-05-18T21:07:43Z
MODERATE
4.9
{'CWE-400'}
{'https://github.com/pires/go-proxyproto/pull/71', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46/', 'https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b', 'https://github.com/pires/go-proxyproto/issues/69', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23351', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU/', 'https://github.com/advisories/GHSA-fqh4-rh59-xhvf', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577'}
null
GHSA
GHSA-6jq2-789q-fff2
High severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.
{'CVE-2018-11761'}
2021-09-02T16:41:19Z
2018-10-17T15:49:36Z
HIGH
7.5
{'CWE-611'}
{'http://www.securityfocus.com/bid/105514', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-6jq2-789q-fff2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11761', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}
null
GHSA
GHSA-79jw-2f46-wv22
Authenticated remote code execution in October CMS
### Impact An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code. - This issue only affects admin panels that rely on safe mode and restricted permissions. - To exploit this vulnerability, an attacker must first have access to the backend area. ### Patches The issue has been patched in Build 474 (v1.0.474) and v1.1.10. ### Workarounds Apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation manually if unable to upgrade to Build 474 or v1.1.10. ### References Credits to: - David Miller ### For more information If you have any questions or comments about this advisory: - Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
{'CVE-2022-21705'}
2022-04-19T19:03:20Z
2022-02-23T21:08:44Z
HIGH
7.2
{'CWE-74'}
{'https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe', 'https://github.com/advisories/GHSA-79jw-2f46-wv22', 'https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21705'}
null
GHSA
GHSA-j7c4-2xj8-wm7r
Moderate severity vulnerability that affects kdcproxy
python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.
{'CVE-2015-5159'}
2021-09-14T19:12:11Z
2018-11-01T14:49:30Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882', 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5159', 'https://github.com/advisories/GHSA-j7c4-2xj8-wm7r'}
null
GHSA
GHSA-77g3-3j5w-64w4
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.
{'CVE-2020-10685'}
2022-01-04T19:33:37Z
2021-04-07T20:36:46Z
LOW
5.5
{'CWE-668', 'CWE-377', 'CWE-459'}
{'https://github.com/ansible/ansible/pull/68433', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10685', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685', 'https://github.com/advisories/GHSA-77g3-3j5w-64w4'}
null
GHSA
GHSA-838h-jqp6-cf2f
Sandbox bypass leading to arbitrary code execution in Deno
### Impact The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass permission checks and execute arbitrary shell code. There is **no** evidence that this vulnerability has been exploited in the wild. This vulnerability does **not** affect users of Deno Deploy. ### Patches The vulnerability has been patched in Deno 1.20.3. ### Workarounds There is no workaround. All users are recommended to upgrade to 1.20.3 immediately --- The cause of this error was that certain FFI operations did not correctly check for permissions. The issue was fixed in [this](https://github.com/denoland/deno/pull/14115) pull request.
{'CVE-2022-24783'}
2022-05-02T19:39:06Z
2022-03-29T22:10:10Z
CRITICAL
10
{'CWE-269'}
{'https://github.com/denoland/deno/security/advisories/GHSA-838h-jqp6-cf2f', 'https://github.com/denoland/deno/pull/14115', 'https://github.com/denoland/deno/releases/tag/v1.20.3', 'https://github.com/advisories/GHSA-838h-jqp6-cf2f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24783'}
null
GHSA
GHSA-gcr6-rf47-jrgf
Loaded Databook of Tablib prone to python insertion resulting in command execution
An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.
{'CVE-2017-2810'}
2022-04-26T18:16:34Z
2018-07-13T16:01:25Z
CRITICAL
9.8
null
{'https://github.com/jazzband/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e', 'https://security.gentoo.org/glsa/201811-18', 'http://www.securityfocus.com/bid/99076', 'https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307', 'https://github.com/advisories/GHSA-gcr6-rf47-jrgf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2810'}
null
GHSA
GHSA-f7f4-5w9j-23p2
festivaltts4r allows arbitrary command execution
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb.
{'CVE-2016-10194'}
2022-04-25T16:55:58Z
2017-10-24T18:33:35Z
CRITICAL
9.8
{'CWE-77'}
{'http://www.openwall.com/lists/oss-security/2017/01/31/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194', 'https://github.com/advisories/GHSA-f7f4-5w9j-23p2', 'http://www.openwall.com/lists/oss-security/2017/02/02/5', 'https://github.com/spejman/festivaltts4r/issues/1'}
null
GHSA
GHSA-cg8j-8w52-735v
Missing warning can lead to unauthenticated admin access in SilverStripe
In SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access.
{'CVE-2019-12204'}
2021-12-03T14:39:17Z
2019-11-12T23:01:25Z
CRITICAL
9.8
null
{'https://forum.silverstripe.org/c/releases', 'https://github.com/advisories/GHSA-cg8j-8w52-735v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12204', 'https://www.silverstripe.org/download/security-releases/', 'https://packagist.org/packages/silverstripe/cms', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12204', 'https://packagist.org/packages/silverstripe/framework'}
null
GHSA
GHSA-cpgr-wmr9-qxv4
Cross-Site Scripting in serve
Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation Upgrade to version 10.0.2 or later.
null
2021-09-28T17:03:27Z
2020-09-11T21:20:14Z
MODERATE
0
{'CWE-79'}
{'https://hackerone.com/reports/398285', 'https://www.npmjs.com/advisories/992', 'https://github.com/advisories/GHSA-cpgr-wmr9-qxv4'}
null
GHSA
GHSA-3vg2-4qxc-ch4j
Directory Traversal in unicorn-list
Affected versions of `unicorn-list` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16131'}
2021-01-08T19:58:34Z
2018-07-23T20:49:38Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16131', 'https://github.com/advisories/GHSA-3vg2-4qxc-ch4j', 'https://nodesecurity.io/advisories/477', 'https://www.npmjs.com/advisories/477'}
null
GHSA
GHSA-fj67-w3m4-rfmp
Cross-site scripting in Plone
Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool.
{'CVE-2021-33513'}
2021-06-08T23:19:28Z
2021-06-08T23:19:28Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-fj67-w3m4-rfmp', 'https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33513'}
null
GHSA
GHSA-vv2x-vrpj-qqpq
Cross-site scripting in Bleach
### Impact A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with all of: * `svg` or `math` in the allowed tags * `p` or `br` in allowed tags * `style`, `title`, `noscript`, `script`, `textarea`, `noframes`, `iframe`, or `xmp` in allowed tags * the keyword argument `strip_comments=False` Note: none of the above tags are in the default allowed tags and `strip_comments` defaults to `True`. ### Patches Users are encouraged to upgrade to bleach v3.3.0 or greater. Note: bleach v3.3.0 introduces a breaking change to escape HTML comments by default. ### Workarounds * modify `bleach.clean` calls to at least one of: * not allow the `style`, `title`, `noscript`, `script`, `textarea`, `noframes`, `iframe`, or `xmp` tag * not allow `svg` or `math` tags * not allow `p` or `br` tags * set `strip_comments=True` * A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk. ### References * https://bugzilla.mozilla.org/show_bug.cgi?id=1689399 * https://advisory.checkmarx.net/advisory/CX-2021-4303 * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23980 * https://cure53.de/fp170.pdf ### Credits * Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx * Additional eject tags not mentioned in the original advisory and the CSP mitigation line being truncated in the revised advisory reported by [Michał Bentkowski](https://twitter.com/SecurityMB) at Securitum ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues) * Email us at [security@mozilla.org](mailto:security@mozilla.org)
{'CVE-2021-23980'}
2021-09-28T20:48:50Z
2021-02-02T17:58:40Z
MODERATE
0
{'CWE-79'}
{'https://github.com/mozilla/bleach/blob/79b7a3c5e56a09d1d323a5006afa59b56162eb13/CHANGES#L4', 'https://cure53.de/fp170.pdf', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1689399', 'https://github.com/mozilla/bleach/security/advisories/GHSA-vv2x-vrpj-qqpq', 'https://github.com/advisories/GHSA-vv2x-vrpj-qqpq', 'https://github.com/mozilla/bleach/commit/79b7a3c5e56a09d1d323a5006afa59b56162eb13', 'https://pypi.org/project/bleach/'}
null
GHSA
GHSA-m52x-29pq-w3vv
Cross-Site Scripting in pannellum
Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser. ## Recommendation Upgrade to version 2.5.6 or later.
{'CVE-2019-16763'}
2022-04-19T19:02:23Z
2019-11-22T18:18:03Z
MODERATE
4.8
{'CWE-79'}
{'https://www.npmjs.com/advisories/1418', 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763', 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv'}
null
GHSA
GHSA-7mvr-5x2g-wfc8
Moderate severity vulnerability that affects bootstrap
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.
{'CVE-2018-14042'}
2021-06-15T16:30:20Z
2018-09-13T15:50:32Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-7mvr-5x2g-wfc8', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://github.com/twbs/bootstrap/issues/26628', 'https://github.com/twbs/bootstrap/issues/26423', 'https://github.com/twbs/bootstrap/pull/26630', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14042', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-646x-m363-9rh4
Hijacked Environment Variables in node-opensl
The `node-opensl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16063'}
2021-01-08T21:18:36Z
2018-10-03T20:27:55Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16063', 'https://github.com/advisories/GHSA-646x-m363-9rh4', 'https://nodesecurity.io/advisories/502', 'https://www.npmjs.com/advisories/502'}
null
GHSA
GHSA-hm2p-fhwx-9285
Incorrect Permission Assignment for Critical Resource in Plone
Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.
{'CVE-2021-33509'}
2022-03-22T22:32:35Z
2021-06-15T16:11:38Z
CRITICAL
9.9
{'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33509', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-hm2p-fhwx-9285', 'https://plone.org/security/hotfix/20210518/writing-arbitrary-files-via-docutils-and-python-script'}
null
GHSA
GHSA-gf8v-vxf9-7c66
Downloads Resources over HTTP in cloudpub-redis
Affected versions of `cloudpub-redis` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cloudpub-redis`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10672'}
2021-01-08T18:47:44Z
2019-02-18T23:44:26Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/282', 'https://github.com/advisories/GHSA-gf8v-vxf9-7c66', 'https://nodesecurity.io/advisories/282', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10672'}
null
GHSA
GHSA-2r3v-q9x3-7g46
Link injection in SimpleSAMLphp
### Background Several scripts part of SimpleSAMLphp display a web page with links obtained from the request parameters. This allows us to enhance usability, as the users are presented with links they can follow after completing a certain action, like logging out. ### Description The following scripts were not checking the URLs obtained via the HTTP request before displaying them as the target of links that the user may click on: - `www/logout.php` - `modules/core/www/no_cookie.php` The issue allowed attackers to display links targeting a malicious website inside a trusted site running SimpleSAMLphp, due to the lack of security checks involving the `link_href` and `retryURL` HTTP parameters, respectively. The issue was resolved by including a verification of the URLs received in the request against a white list of websites specified in the `trusted.url.domains` configuration option. ### Affected versions All SimpleSAMLphp versions prior to 1.14.4. ### Impact A remote attacker could craft a link pointing to a trusted website running SimpleSAMLphp, including a parameter pointing to a malicious website, and try to fool the victim into visiting that website by clicking on a link in the page presented by SimpleSAMLphp. ### Resolution Upgrade to the latest version. ### Credit This security issue was discovered and reported by John Page (hyp3rlinx).
null
2022-04-19T19:02:23Z
2020-01-24T21:27:16Z
LOW
3.7
{'CWE-74'}
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-2r3v-q9x3-7g46', 'https://github.com/advisories/GHSA-2r3v-q9x3-7g46', 'https://snyk.io/vuln/SNYK-PHP-SIMPLESAMLPHPSIMPLESAMLPHP-70160'}
null
GHSA
GHSA-2f29-pmpx-vj62
Directory Traversal in serverwg
`serverwg` is a simple http server. `serverwg` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` and response: ``` HTTP/1.1 200 OK Date: Wed, 17 May 2017 22:52:08 GMT Connection: keep-alive {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16101'}
2021-01-14T15:54:31Z
2020-09-01T16:52:33Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16101', 'https://www.npmjs.com/advisories/364', 'https://github.com/advisories/GHSA-2f29-pmpx-vj62', 'https://nodesecurity.io/advisories/364'}
null
GHSA
GHSA-c9rv-3jmq-527w
Unexpected panic when decoding tokens in branca
An issue was discovered in the branca crate before 0.10.0 for Rust. Decoding tokens (with invalid base62 data) can panic.
{'CVE-2020-35918'}
2021-08-25T20:49:50Z
2021-08-25T20:49:50Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-c9rv-3jmq-527w', 'https://github.com/tuupola/branca-spec/issues/22', 'https://github.com/return/branca/issues/24', 'https://rustsec.org/advisories/RUSTSEC-2020-0075.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35918'}
null
GHSA
GHSA-9gjv-6qq6-v7qm
2FA bypass through deleting devices in wagtail-2fa
### Impact Any user with access to the CMS can view and delete other users' 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user's device they can disable the target user's 2FA devices and potentially compromise the account if they figure out their password. ### Patches The problem has been patched in version 1.4.1. ### Workarounds There is no workaround for this issue. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) * Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
{'CVE-2020-5240'}
2021-01-08T20:26:35Z
2020-03-13T21:18:55Z
HIGH
7.6
{'CWE-285'}
{'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm', 'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74', 'https://github.com/advisories/GHSA-9gjv-6qq6-v7qm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5240'}
null
GHSA
GHSA-ccxc-vr6p-4858
Improper Certificate Validation in Cosign
### Impact Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. #### Signing with a keypair <details> To reproduce this vulnerability, create a keypair and sign an image. Don't store the signature in Rekor: ``` $ cosign generate-key-pair $ cosign sign --key cosign.key IMAGE ``` If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. To accomplish this, the attacker needs to: 1. Pull the signature image 2. Annotate the signature image with any valid Rekor bundle under the `dev.sigstore.cosign/bundle` annotation 3. Push the signature image back to OCI Verification then prints out the following: ``` $ cosign verify [--key] [IMAGE] Verification for [IMAGE] -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The signatures were verified against the specified public key - Any certificates were verified against the Fulcio roots. […] ``` The claim that `Existence of the claims in the transparency log was verified offline` is inaccurate since an entry for this image doesn't exist in the log. The claim that `Any certificates were verified against the Fulcio roots.` is technically correct but since there were no certificates that should be explicitly called out. </details> #### "Keyless signing" with an OIDC flow <details> To reproduce this vulnerability, sign the image with a Fulcio identity. Don't store the signature in Rekor: ``` $ COSIGN_EXPERIMENTAL=1 cosign sign IMAGE [...] IMAGE appears to be a private repository, please confirm uploading to the transparency log at "https://rekor.sigstore.dev" [Y/N]: n ``` Then, create a keypair and sign the image again. Store an entry for the signature in Rekor: ``` $ cosign generate-key-pair $ COSIGN_EXPERIMENTAL=1 cosign sign --key cosign.key IMAGE Enter password for private key: IMAGE appears to be a private repository, please confirm uploading to the transparency log at "https://rekor.sigstore.dev" [Y/N]: y ``` If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. To accomplish this, the attacker needs to: 1. Pull the signature image 2. Copy the rekor bundle from the second signature into the first signature under the `dev.sigstore.cosign/bundle` annotation 3. Push the signature image back to OCI _Note: For this to work, both signatures must occur during the valid lifespan of the certificate (~20 minutes)._ Verification then prints out the following: ``` $ cosign verify [--key] [IMAGE] Verification for [IMAGE] -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline - The signatures were verified against the specified public key - Any certificates were verified against the Fulcio roots. […] ``` The claim that `Existence of the claims in the transparency log was verified offline` is inaccurate since an entry for this image doesn't exist in the log. The claim that `Any certificates were verified against the Fulcio roots.` is technically correct but since there were no certificates that should be explicitly called out. </details> ### Patches The vulnerability has been patched in v1.5.2 of cosign. The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail. Cosign output now only informs the user that certificates were verified if a certificate was in fact verified. ### Workarounds The only workaround is upgrading. ### For more information If you have any questions or comments about this advisory: * Open an issue in [cosign](https://github.com/sigstore/cosign) * Send us a message on [Slack](https://sigstore.slack.com/). Invite link [here](https://join.slack.com/t/sigstore/shared_invite/zt-mhs55zh0-XmY3bcfWn4XEyMqUUutbUQ). ### Thank you Thank you to @mtrmac for finding and reporting this vulnerability. Thank you to everyone who worked on fixing this: * @nsmith5 * @znewman01 * @dlorenc * @mattmoor * @priyawadhwa
{'CVE-2022-23649'}
2022-04-19T19:03:23Z
2022-02-22T19:34:09Z
LOW
3.3
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23649', 'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49', 'https://github.com/sigstore/cosign/releases/tag/v1.5.2', 'https://github.com/advisories/GHSA-ccxc-vr6p-4858', 'https://github.com/sigstore/cosign/security/advisories/GHSA-ccxc-vr6p-4858'}
null
GHSA
GHSA-3rh7-vm4x-q2hp
Hijacked Environment Variables in sqlserver
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16055'}
2021-01-08T20:00:20Z
2018-11-09T17:49:22Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/486', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055', 'https://nodesecurity.io/advisories/486', 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp'}
null
GHSA
GHSA-9gcm-f4x3-8jpw
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.
{'CVE-2018-11039'}
2021-10-21T21:27:38Z
2018-10-16T17:35:54Z
MODERATE
5.9
null
{'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/107984', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://pivotal.io/security/cve-2018-11039', 'https://github.com/advisories/GHSA-9gcm-f4x3-8jpw', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11039', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}
null
GHSA
GHSA-c4r5-xvgw-2942
Metrics exposure in Wildfly
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data.
{'CVE-2021-3503'}
2022-04-28T21:16:02Z
2022-04-19T00:00:50Z
MODERATE
5.3
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3503', 'https://github.com/wildfly/wildfly/pull/14136', 'https://issues.redhat.com/browse/WFLY-11933', 'https://github.com/advisories/GHSA-c4r5-xvgw-2942', 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'}
null
GHSA
GHSA-h45v-vgvp-3h5v
Out-of-bounds write in stack
An issue was discovered in the stack crate before 0.3.1 for Rust. ArrayVec has an out-of-bounds write via element insertion.
{'CVE-2020-35895'}
2021-08-25T20:49:13Z
2021-08-25T20:49:13Z
CRITICAL
9.8
{'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0042.html', 'https://github.com/arcnmx/stack-rs/issues/4', 'https://github.com/advisories/GHSA-h45v-vgvp-3h5v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35895'}
null
GHSA
GHSA-8j65-4pcq-xq95
Options structure open to XSS if passed unfiltered
### Impact In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. Especially when using the `useHTML` flag, HTML string options would be inserted unfiltered directly into the DOM. When `useHTML` was false, malicious code could be inserted by using various character replacement tricks or malformed HTML. If your chart configuration comes from a trusted source like a static setup or pre-filtered HTML (or no markup at all in the configuration), you are not impacted. ### Patches In version 9, the whole rendering layer was refactored to use an DOMParser, an AST and tag and HTML allow-listing to make sure only safe content entered the DOM. In addition, prototype pollution was stopped. ### Workarounds Implementers who are not able to upgrade may apply [DOMPurify](https://github.com/cure53/DOMPurify) recursively [to the options structure](https://jsfiddle.net/highcharts/zd3wcm5L/) to filter out malicious markup. ### References * Details on the improved [Highcharts security](https://www.highcharts.com/docs/chart-concepts/security) * [The AST and TextBuilder refactoring](https://github.com/highcharts/highcharts/pull/14913) * [The fix for prototype pollution](https://github.com/highcharts/highcharts/pull/14884) ### For more information If you have any questions or comments about this advisory: * Visit our [support page](https://www.highcharts.com/blog/support/) * For more Email us at [security@highcharts.com](mailto:security@highcharts.com)
{'CVE-2021-29489'}
2021-06-24T13:08:08Z
2021-05-06T15:45:03Z
HIGH
7.6
{'CWE-79'}
{'https://github.com/advisories/GHSA-8j65-4pcq-xq95', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29489', 'https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95', 'https://security.netapp.com/advisory/ntap-20210622-0005/', 'https://www.npmjs.com/package/highcharts'}
null
GHSA
GHSA-4c32-xmgj-2g98
High severity vulnerability that affects org.apache.pdfbox:pdfbox
Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.
{'CVE-2016-2175'}
2021-09-01T14:12:01Z
2018-10-17T18:22:15Z
HIGH
7.8
{'CWE-611'}
{'http://rhn.redhat.com/errata/RHSA-2017-0272.html', 'http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html', 'http://rhn.redhat.com/errata/RHSA-2017-0248.html', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E', 'https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2175', 'http://rhn.redhat.com/errata/RHSA-2017-0249.html', 'http://svn.apache.org/viewvc?view=revision&revision=1739564', 'http://svn.apache.org/viewvc?view=revision&revision=1739565', 'http://www.securityfocus.com/bid/90902', 'https://github.com/advisories/GHSA-4c32-xmgj-2g98', 'http://rhn.redhat.com/errata/RHSA-2017-0179.html', 'http://www.securityfocus.com/archive/1/538503/100/0/threaded', 'http://www.debian.org/security/2016/dsa-3606'}
null
GHSA
GHSA-vgv5-cxvh-vfxh
Arbitrary code execution in clickhouse-driver
clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow.
{'CVE-2020-26759'}
2021-04-07T20:50:57Z
2021-04-07T20:50:57Z
CRITICAL
9.8
{'CWE-120'}
{'https://github.com/advisories/GHSA-vgv5-cxvh-vfxh', 'https://github.com/mymarilyn/clickhouse-driver/commit/d708ed548e1d6f254ba81a21de8ba543a53b5598', 'https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26759'}
null
GHSA
GHSA-wg5r-c793-w5w2
Downloads Resources over HTTP in mystem-wrapper
Affected versions of `mystem-wrapper` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem-wrapper`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10671'}
2021-01-08T01:56:51Z
2019-02-18T23:44:28Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-wg5r-c793-w5w2', 'https://www.npmjs.com/advisories/280', 'https://nodesecurity.io/advisories/280', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10671'}
null
GHSA
GHSA-6jhm-4vmx-mr76
SQL injection in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
{'CVE-2022-0332'}
2022-02-02T16:11:17Z
2022-01-28T22:08:14Z
CRITICAL
9.8
{'CWE-89'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2043661', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0332', 'https://github.com/advisories/GHSA-6jhm-4vmx-mr76', 'https://github.com/moodle/moodle/commit/c7a62a8c82219b50589257f79021da1df1a76808', 'https://moodle.org/mod/forum/discuss.php?d=431099'}
null
GHSA
GHSA-pw3c-h7wp-cvhx
Improper Initialization in Pillow
Pillow is the friendly PIL (Python Imaging Library) fork. path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
{'CVE-2022-22815'}
2022-05-05T13:40:38Z
2022-01-12T20:07:43Z
CRITICAL
9.8
{'CWE-665'}
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22815', 'https://www.debian.org/security/2022/dsa-5053', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331', 'https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c', 'https://github.com/advisories/GHSA-pw3c-h7wp-cvhx'}
null
GHSA
GHSA-8q89-pwhh-7wfq
Moderate severity vulnerability that affects com.github.penggle:kaptcha
text/impl/DefaultTextCreator.java, text/impl/ChineseTextProducer.java, and text/impl/FiveLetterFirstNameTextCreator.java in kaptcha 2.3.2 use the Random (rather than SecureRandom) function for generating CAPTCHA values, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force approach.
{'CVE-2018-18531'}
2021-09-07T20:28:58Z
2018-10-23T16:08:56Z
CRITICAL
9.8
{'CWE-330'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18531', 'https://github.com/penggle/kaptcha/issues/3', 'https://github.com/advisories/GHSA-8q89-pwhh-7wfq'}
null
GHSA
GHSA-3ww4-cp53-6g2x
Cross Site Request Forgery in kindeditor
Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:/examples/uploadbutton.html) and then use the authority of this website to trick users into clicking your malicious html link.
{'CVE-2021-42228'}
2021-10-21T14:56:51Z
2021-10-18T19:44:06Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42228', 'https://github.com/kindsoft/kindeditor/issues/337', 'https://github.com/advisories/GHSA-3ww4-cp53-6g2x'}
null
GHSA
GHSA-vx3p-948g-6vhq
Regular Expression Denial of Service (ReDoS)
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
{'CVE-2021-27290'}
2022-03-11T21:28:07Z
2021-03-19T21:24:36Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://www.npmjs.com/package/ssri', 'https://github.com/advisories/GHSA-vx3p-948g-6vhq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290', 'https://npmjs.com', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf', 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf'}
null
GHSA
GHSA-3h4r-pjv6-cph9
Escape sequence injection in RubyGems
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
{'CVE-2019-8323'}
2021-08-17T13:18:16Z
2019-06-20T16:05:57Z
HIGH
7.5
{'CWE-74'}
{'https://hackerone.com/reports/315081', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8323', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://github.com/advisories/GHSA-3h4r-pjv6-cph9'}
null
GHSA
GHSA-j6x7-42x2-hpcf
Malicious Package in buffer-xoz
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:15:10Z
2020-09-03T22:14:20Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-j6x7-42x2-hpcf', 'https://www.npmjs.com/advisories/1253'}
null
GHSA
GHSA-pq64-v7f5-gqh8
Regular Expression Denial of Service (ReDoS) in Pygments
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
{'CVE-2021-27291'}
2021-05-10T15:14:50Z
2021-03-29T16:33:03Z
MODERATE
7.5
{'CWE-400'}
{'https://www.debian.org/security/2021/dsa-4878', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/', 'https://github.com/advisories/GHSA-pq64-v7f5-gqh8', 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27291', 'https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce', 'https://www.debian.org/security/2021/dsa-4889'}
null
GHSA
GHSA-jr9c-h74f-2v28
Improper Authorization in Gitea
Gitea 1.16.3 and prior is vulnerable to improper authorization. A patch is available and is anticipated to be part of the 1.16.4 release.
{'CVE-2022-0905'}
2022-03-28T22:24:30Z
2022-03-11T00:02:35Z
MODERATE
7.1
{'CWE-863', 'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0905', 'https://github.com/advisories/GHSA-jr9c-h74f-2v28', 'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2', 'https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb'}
null
GHSA
GHSA-4x2f-54wr-4hjg
Potential Zip Slip Vulnerability in baserCMS
There is a OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier versions Vulnerability OS Command Injection Vulnerability. Countermeasures Update to the latest version of baserCMS Credits Daniele Scanu @SoterItSecurity
{'CVE-2021-41279'}
2021-12-01T18:29:32Z
2021-12-01T18:29:32Z
HIGH
7.7
{'CWE-22'}
{'https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg', 'https://github.com/advisories/GHSA-4x2f-54wr-4hjg', 'https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41279'}
null
GHSA
GHSA-2m7g-9q74-9m3q
Improper Certificate Validation in Apache Beam
The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code running in the same JVM.
{'CVE-2020-1929'}
2021-08-25T21:06:45Z
2020-05-06T20:49:04Z
HIGH
7.5
{'CWE-295'}
{'https://github.com/advisories/GHSA-2m7g-9q74-9m3q', 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b', 'https://lists.apache.org/thread.html/rdd0e85b71bf0274471b40fa1396d77f7b2d1165eaea4becbdc69aa04%40%3Cuser.beam.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929'}
null
GHSA
GHSA-c72p-9xmj-rx3w
Archive package allows chmod of file outside of unpack target directory
## Impact A bug was found in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process. ## Patches This bug has been fixed in containerd 1.5.4 and 1.4.8. Users should update to these versions as soon as they are released. Running containers do not need to be restarted. ## Workarounds Ensure you only pull images from trusted sources. Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with unexpected files. ## For more information If you have any questions or comments about this advisory: * [Open an issue](https://github.com/containerd/containerd/issues/new/choose) * Email us at security@containerd.io if you think you’ve found a security bug.
{'CVE-2021-32760'}
2021-10-21T13:16:23Z
2021-07-26T21:17:45Z
MODERATE
5
{'CWE-668'}
{'https://github.com/containerd/containerd/releases/tag/v1.5.4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32760', 'https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w', 'https://github.com/advisories/GHSA-c72p-9xmj-rx3w', 'https://github.com/containerd/containerd/releases/tag/v1.4.8'}
null
GHSA
GHSA-4q2f-8g74-qm56
Cross-Site Scripting in takeapeek
All versions of `takeapeek` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-28T21:57:44Z
2020-09-03T17:18:05Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1038', 'https://hackerone.com/reports/490728', 'https://github.com/advisories/GHSA-4q2f-8g74-qm56'}
null
GHSA
GHSA-543v-gj2c-r3ch
Moderate severity vulnerability that affects activemodel
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
{'CVE-2016-0753'}
2021-06-11T14:36:52Z
2017-10-24T18:33:35Z
MODERATE
5.3
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-0753', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html', 'http://www.securityfocus.com/bid/82247', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.openwall.com/lists/oss-security/2016/01/25/14', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html', 'https://github.com/advisories/GHSA-543v-gj2c-r3ch'}
null
GHSA
GHSA-c7vm-f5p4-8fqh
Open redirect in Jupyter Notebook
[localhost](http://localhost:8888) ### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability - a maliciously crafted link to a notebook server could redirect the browser to a different website. All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may *appear* safe, but ultimately redirect to a spoofed server on the public internet. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Patched in notebook 6.1.5 ### References [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org). Credit: zhuonan li of Alibaba Application Security Team
{'CVE-2020-26215'}
2021-01-07T22:42:00Z
2020-11-18T21:06:36Z
MODERATE
4.4
{'CWE-601'}
{'https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74', 'https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh', 'https://github.com/advisories/GHSA-c7vm-f5p4-8fqh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26215', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00004.html'}
null
GHSA
GHSA-5xg3-j2j6-rcx4
Relative Path Traversal in git-delta
git-delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.
{'CVE-2021-36376'}
2021-09-09T16:46:43Z
2021-08-25T21:01:39Z
HIGH
7.8
{'CWE-427', 'CWE-23'}
{'https://vuln.ryotak.me/advisories/54', 'https://github.com/advisories/GHSA-5xg3-j2j6-rcx4', 'https://github.com/dandavison/delta/releases/tag/0.8.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36376', 'https://github.com/dandavison/delta/commit/f01846bd443aaf92fdd5ac20f461beac3f6ee3fd'}
null
GHSA
GHSA-33vf-4xgg-9r58
HTTP Response Splitting (Early Hints) in Puma
### Impact If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting) While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), which fixed this vulnerability but only for regular responses. ### Patches This has been fixed in 4.3.3 and 3.12.4. ### Workarounds Users can not allow untrusted/user input in the Early Hints response header. ### For more information If you have any questions or comments about this advisory: * Open an issue in [puma](https://github.com/puma/puma) * Email us a project maintainer. [Email addresses are listed in our Code of Conduct](https://github.com/puma/puma/blob/master/CODE_OF_CONDUCT.md#enforcement).
{'CVE-2020-5249'}
2021-01-08T20:28:11Z
2020-03-03T23:33:16Z
MODERATE
6.5
{'CWE-113'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://github.com/advisories/GHSA-33vf-4xgg-9r58', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5249', 'https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58', 'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3'}
null
GHSA
GHSA-8278-88vv-x98r
Execution of untrusted code through config file
### Impact It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file. ### Workarounds Manually adjust yaml.load() to yaml.safe_load() ### For more information If you have any questions or comments about this advisory: * Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues) * Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)
{'CVE-2021-21371'}
2022-04-19T19:02:50Z
2021-03-10T21:51:17Z
MODERATE
0
{'CWE-502'}
{'https://pypi.org/project/tenable-jira-cloud/', 'https://github.com/advisories/GHSA-8278-88vv-x98r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21371', 'https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r', 'https://pyyaml.docsforge.com/master/documentation/#loading-yaml', 'https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0'}
null
GHSA
GHSA-p62j-hrxm-xcxf
Book page text, count, and author/title length is not limited in PocketMine-MP
### Impact Players can fill book pages with as many characters as they like; the server does not check this. In addition, the maximum of 50 pages is also not enforced, meaning that players can create "book bombs". This causes a variety of problems: - Oversized NBT on the wire costing excess bandwidth for server and client - Server crashes when saving region-based worlds due to exceeding maximum chunk size of 1 MB (PM3-specific) - Server crashes if any book page exceeds 32 KiB (due to TAG_String size limit) (PM4-specific) This does, however, require that an attacker obtain a writable book in the first place in order to exploit the problem. ### Patches The bug has been fixed in 3.26.5 and 4.0.5. ### Workarounds Ban writable books, or use a plugin to cancel `PlayerEditBookEvent` to cancel the event if `strlen(text) > 1024 || mb_strlen(text) > 256`. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-06T23:53:35Z
2022-01-06T23:53:35Z
MODERATE
6.5
null
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-p62j-hrxm-xcxf', 'https://github.com/advisories/GHSA-p62j-hrxm-xcxf'}
null
GHSA
GHSA-9mmw-3fmh-96g3
Malicious Package in calk
All versions of `calk` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:03:33Z
2020-09-02T20:23:38Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/855', 'https://github.com/advisories/GHSA-9mmw-3fmh-96g3'}
null
GHSA
GHSA-h352-g5vw-3926
Improper Input Validation in fruity
An issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\0' byte, which might not be the end of the string.
{'CVE-2021-43620'}
2021-11-19T13:24:04Z
2021-11-16T17:26:47Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/rustsec/advisory-db/pull/1102', 'https://github.com/advisories/GHSA-h352-g5vw-3926', 'https://rustsec.org/advisories/RUSTSEC-2021-0123.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43620', 'https://github.com/nvzqz/fruity/issues/14'}
null
GHSA
GHSA-gww7-p5w4-wrfv
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
{'CVE-2019-20330'}
2022-04-07T16:50:35Z
2020-03-04T20:52:11Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c@%3Cdev.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200127-0004/', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-gww7-p5w4-wrfv', 'https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2526', 'https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20330', 'https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2', 'https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0@%3Cnotifications.zookeeper.apache.org%3E'}
null
GHSA
GHSA-qc8j-m8j3-rjq6
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
null
2021-12-03T14:24:20Z
2018-09-17T21:57:58Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'https://github.com/advisories/GHSA-qc8j-m8j3-rjq6'}
null
GHSA
GHSA-hhm3-48h2-597v
Insufficiently Protected Credentials in Apache Superset
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
{'CVE-2021-44451'}
2022-02-10T22:41:08Z
2022-02-02T00:01:46Z
MODERATE
6.5
{'CWE-522'}
{'https://github.com/advisories/GHSA-hhm3-48h2-597v', 'https://lists.apache.org/thread/xww1pccs2ckb5506wrf1v4lmxg198vkb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44451'}
null
GHSA
GHSA-43f8-2h32-f4cj
Regular Expression Denial of Service in hosted-git-info
The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity
{'CVE-2021-23362'}
2022-03-18T20:25:44Z
2021-05-06T16:10:39Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/pull/76', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://github.com/advisories/GHSA-43f8-2h32-f4cj', 'https://github.com/npm/hosted-git-info/commits/v2'}
null
GHSA
GHSA-67mq-h2r9-rh2m
Prototype pollution in multi-ini
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
{'CVE-2020-28460'}
2021-04-13T15:23:41Z
2021-04-13T15:23:41Z
HIGH
5.6
{'CWE-1321'}
{'https://github.com/advisories/GHSA-67mq-h2r9-rh2m', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}
null
GHSA
GHSA-95q3-8gr9-gm8w
Denial of Service by Uncontrolled Resource Consumption
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
{'CVE-2021-27923'}
2021-12-07T17:53:04Z
2021-03-18T19:54:43Z
HIGH
7.5
{'CWE-400'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/', 'https://security.gentoo.org/glsa/202107-33', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27923', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/', 'https://github.com/advisories/GHSA-95q3-8gr9-gm8w'}
null
GHSA
GHSA-x28w-hvwc-mp75
Static Code Injection in Microweber
Microweber is a new generation CMS with drag and drop. Prior to version 1.3, Microweber is vulnerable to static code injection.
{'CVE-2022-0895'}
2022-03-25T17:18:06Z
2022-03-11T00:02:35Z
HIGH
7.7
{'CWE-94', 'CWE-96'}
{'https://github.com/advisories/GHSA-x28w-hvwc-mp75', 'https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d', 'https://github.com/microweber/microweber/commit/b2baab6e582b2efe63788d367a2bb61a2fa26470', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0895'}
null