ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-vmfh-c547-v45h
|
Remote code execution in ruby-jss
|
The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.
|
{'CVE-2021-33575'}
|
2021-10-06T17:48:27Z
|
2021-10-06T17:48:27Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/advisories/GHSA-vmfh-c547-v45h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33575', 'https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations', 'https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24'}
| null |
GHSA
|
GHSA-r34r-f84j-5x4x
|
Moderate severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
|
In Apache Spark before 2.2.0, it is possible for an attacker to take advantage of a user's trust in the server to trick them into visiting a link that points to a shared Spark cluster and submits data including MHTML to the Spark master, or history server. This data, which could contain a script, would then be reflected back to the user and could be evaluated and executed by MS Windows-based clients. It is not an attack on Spark itself, but on the user, who may then execute the script inadvertently when viewing elements of the Spark web UIs.
|
{'CVE-2017-7678'}
|
2021-09-17T14:13:38Z
|
2018-11-09T17:43:08Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/99603', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7678', 'https://github.com/advisories/GHSA-r34r-f84j-5x4x', 'http://apache-spark-developers-list.1001551.n3.nabble.com/CVE-2017-7678-Apache-Spark-XSS-web-UI-MHTML-vulnerability-td21947.html'}
| null |
GHSA
|
GHSA-pr38-qpxm-g88x
|
Uncontrolled Resource Consumption in Apache ActiveMQ Artemis
|
In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.
|
{'CVE-2022-23913'}
|
2022-05-03T02:20:46Z
|
2022-02-06T00:00:55Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/apache/activemq-artemis/pull/3862', 'https://lists.apache.org/thread/fjynj57rd99s814rdn5hzvmx8lz403q2', 'https://issues.apache.org/jira/browse/ARTEMIS-3593', 'https://security.netapp.com/advisory/ntap-20220303-0003/', 'https://github.com/apache/activemq-artemis/pull/3871', 'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7', 'https://github.com/advisories/GHSA-pr38-qpxm-g88x', 'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913', 'https://github.com/github/codeql-java-CVE-coverage/issues/1061'}
| null |
GHSA
|
GHSA-756f-6j3f-48q9
|
Directory Traversal in calmquist.static-server
|
Affected versions of `calmquist.static-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16165'}
|
2021-01-08T19:17:46Z
|
2018-07-23T20:45:51Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16165', 'https://www.npmjs.com/advisories/398', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server', 'https://github.com/advisories/GHSA-756f-6j3f-48q9', 'https://nodesecurity.io/advisories/398'}
| null |
GHSA
|
GHSA-m9m5-cg5h-r582
|
Improper random number generation in nanorand
|
An issue was discovered in the nanorand crate before 0.5.1 for Rust. It caused any random number generator (even ChaCha) to return all zeroes because integer truncation was mishandled.
|
{'CVE-2020-35926'}
|
2021-08-25T20:50:24Z
|
2021-08-25T20:50:24Z
|
CRITICAL
| 5.1
|
{'CWE-338'}
|
{'https://github.com/advisories/GHSA-m9m5-cg5h-r582', 'https://github.com/Absolucy/nanorand-rs/commit/5ba218ac29df4786b002d7d12b47fa0c04a331f2', 'https://rustsec.org/advisories/RUSTSEC-2020-0089.html', 'https://twitter.com/aspenluxxxy/status/1336684692284772352', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35926'}
| null |
GHSA
|
GHSA-94xh-2fmc-xf5j
|
command injection vulnerability
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
|
{'CVE-2020-7752'}
|
2021-10-08T21:15:37Z
|
2020-10-27T20:30:20Z
|
HIGH
| 8.8
|
{'CWE-78'}
|
{'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://github.com/advisories/GHSA-94xh-2fmc-xf5j', 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://www.npmjs.com/package/systeminformation'}
| null |
GHSA
|
GHSA-44qp-9wwf-734r
|
Heap overflow in Tensorflow
|
### Impact
The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) is vulnerable to a heap overflow:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseCountSparseOutput(
indices=[[-1,-1]],
values=[2],
dense_shape=[1, 1],
weights=[1],
binary_output=True,
minlength=-1,
maxlength=-1,
name=None)
```
### Patches
We have patched the issue in GitHub commits [2b7100d6cdff36aa21010a82269bc05a6d1cc74a](https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a) and [adbbabdb0d3abb3cdeac69e38a96de1d678b24b3](https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-21740'}
|
2022-02-11T16:21:12Z
|
2022-02-09T23:47:14Z
|
HIGH
| 7.6
|
{'CWE-787', 'CWE-120'}
|
{'https://github.com/advisories/GHSA-44qp-9wwf-734r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21740', 'https://github.com/tensorflow/tensorflow/commit/adbbabdb0d3abb3cdeac69e38a96de1d678b24b3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r', 'https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273'}
| null |
GHSA
|
GHSA-6g5f-f5pm-mjrg
|
Vulnerability in Istio
|
Istio 1.1.x through 1.1.6 has Incorrect Access Control.
|
{'CVE-2019-12243'}
|
2022-04-20T21:05:19Z
|
2022-02-15T01:57:18Z
|
HIGH
| 8.9
|
{'CWE-284'}
|
{'https://istio.io/blog/2019/cve-2019-12243/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12243', 'https://github.com/advisories/GHSA-6g5f-f5pm-mjrg', 'https://istio.io/about/notes/'}
| null |
GHSA
|
GHSA-prxj-c66c-4gcf
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
|
{'CVE-2019-0924'}
|
2021-03-29T21:00:12Z
|
2021-03-29T21:00:12Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0924', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f', 'https://github.com/advisories/GHSA-prxj-c66c-4gcf', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924'}
| null |
GHSA
|
GHSA-m43c-649m-pm48
|
Integer Overflow or Wraparound in OpenCV.
|
In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 (corresponding with OpenCV-Python 3.3.0.9) and earlier.
|
{'CVE-2017-1000450'}
|
2021-11-18T15:31:29Z
|
2021-10-12T22:03:32Z
|
HIGH
| 8.8
|
{'CWE-190'}
|
{'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/issues/9723', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000450', 'https://github.com/advisories/GHSA-m43c-649m-pm48', 'https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html', 'https://github.com/opencv/opencv/pull/9726/commits/c58152d94ba878b2d7d76bcac59146312199b9eb', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}
| null |
GHSA
|
GHSA-rpw6-9xfx-jvcx
|
Directory Traversal in Archive_Tar
|
Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
:exclamation: Note: There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulnerability made in version `1.4.12`. That fix introduced a bug which was [fixed in 1.4.13](https://github.com/pear/Archive_Tar/pull/36). Therefore we have set the first-patched-version to `1.4.13` which the earliest working version that avoids this vulnerability.
|
{'CVE-2020-36193'}
|
2021-09-27T18:45:02Z
|
2021-04-22T16:20:36Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-rpw6-9xfx-jvcx', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-36193.yaml', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00007.html', 'https://packagist.org/packages/pear/archive_tar', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36193', 'https://security.gentoo.org/glsa/202101-23', 'https://www.drupal.org/sa-core-2021-001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOZNK4FIIV7FSFCJNNFWMJZTTV7NFJV2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://github.com/pear/Archive_Tar/issues/35', 'https://github.com/pear/Archive_Tar/releases/tag/1.4.13', 'https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKD5WEFA4WT6AVTMRAYBNXZNLWZHM7FH/', 'https://www.debian.org/security/2021/dsa-4894'}
| null |
GHSA
|
GHSA-5vwc-r48g-wj6c
|
Exposure of Resource to Wrong Sphere in abomonation
|
An issue was discovered in the abomonation crate through 2021-10-17 for Rust. Because transmute operations are insufficiently constrained, there can be an information leak or ASLR bypass.
|
{'CVE-2021-45708'}
|
2022-01-07T18:26:56Z
|
2022-01-06T22:08:22Z
|
HIGH
| 7.5
|
{'CWE-668'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0120.html', 'https://github.com/TimelyDataflow/abomonation/issues/23', 'https://github.com/advisories/GHSA-5vwc-r48g-wj6c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45708', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/abomonation/RUSTSEC-2021-0120.md'}
| null |
GHSA
|
GHSA-5jjv-x4fq-qjwp
|
Possible timing attack in derivation_endpoint
|
### Impact
When using the `derivation_endpoint` plugin, it's possible for the attacker to use a timing attack to guess the signature of the derivation URL.
### Patches
The problem has been fixed by comparing sent and calculated signature in constant time, using `Rack::Utils.secure_compare`. Users using the `derivation_endpoint` plugin are urged to upgrade to Shrine 3.3.0 or greater.
### Workarounds
Users of older Shrine versions can apply the following monkey-patch after loading the `derivation_endpoint` plugin:
```rb
class Shrine
class UrlSigner
def verify_signature(string, signature)
if signature.nil?
fail InvalidSignature, "missing \"signature\" param"
elsif !Rack::Utils.secure_compare(signature, generate_signature(string))
fail InvalidSignature, "provided signature does not match the calculated signature"
end
end
end
end
```
### References
You can read more about timing attacks [here](https://en.wikipedia.org/wiki/Timing_attack).
|
{'CVE-2020-15237'}
|
2022-04-19T19:02:36Z
|
2020-10-05T15:48:34Z
|
MODERATE
| 5.9
|
{'CWE-208', 'CWE-203'}
|
{'https://github.com/shrinerb/shrine/commit/1b27090ce31543bf39f186c20ea47c8250fca2f0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15237', 'https://github.com/shrinerb/shrine/security/advisories/GHSA-5jjv-x4fq-qjwp', 'https://github.com/advisories/GHSA-5jjv-x4fq-qjwp'}
| null |
GHSA
|
GHSA-xf64-2f9p-6pqq
|
Information Exposure in type-graphql
|
Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request.
## Recommendation
Upgrade to version 0.17.6 or later.
| null |
2021-10-04T20:44:20Z
|
2020-09-04T17:24:08Z
|
LOW
| 0
|
{'CWE-209'}
|
{'https://www.npmjs.com/advisories/1444', 'https://github.com/advisories/GHSA-xf64-2f9p-6pqq', 'https://github.com/MichalLytek/type-graphql/issues/489'}
| null |
GHSA
|
GHSA-fh56-85cw-5pq6
|
Out-of-bounds Write in ujson
|
UltraJSON (aka ujson) 4.0.2 through 5.0.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode).
|
{'CVE-2021-45958'}
|
2022-03-30T16:44:03Z
|
2022-01-21T23:27:45Z
|
MODERATE
| 5.5
|
{'CWE-787'}
|
{'https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml', 'https://github.com/ultrajson/ultrajson/issues/501', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009', 'https://github.com/ultrajson/ultrajson/pull/504', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45958', 'https://github.com/advisories/GHSA-fh56-85cw-5pq6', 'https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284'}
| null |
GHSA
|
GHSA-mh6h-f25p-98f8
|
Uncontrolled memory consumption in protobuf
|
An issue was discovered in the protobuf crate before 2.6.0 for Rust. Attackers can exhaust all memory via Vec::reserve calls.
|
{'CVE-2019-15544'}
|
2021-09-03T20:36:40Z
|
2021-08-25T20:44:05Z
|
HIGH
| 7.5
|
{'CWE-770'}
|
{'https://lists.apache.org/thread.html/r00097d0b5b6164ea428554007121d5dc1f88ba2af7b9e977a10572cd@%3Cdev.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-mh6h-f25p-98f8', 'https://github.com/stepancheg/rust-protobuf/issues/411', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15544', 'https://lists.apache.org/thread.html/r7fed8dd9bee494094e7011cf3c2ab75bd8754ea314c6734688c42932@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rd64381fb8f92d640c1975dc50dcdf1b8512e02a2a7b20292d3565cae@%3Cissues.hbase.apache.org%3E', 'https://rustsec.org/advisories/RUSTSEC-2019-0003.html', 'https://lists.apache.org/thread.html/r4ef574a5621b0e670a3ce641e9922543e34f22bf4c9ee9584aa67fcf@%3Cissues.hbase.apache.org%3E'}
| null |
GHSA
|
GHSA-5xqr-grq4-qwgx
|
Moderate severity vulnerability that affects com.github.junrar:junrar
|
Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files.
|
{'CVE-2018-12418'}
|
2021-09-01T22:36:11Z
|
2018-10-17T00:04:05Z
|
MODERATE
| 5.5
|
{'CWE-835'}
|
{'https://github.com/advisories/GHSA-5xqr-grq4-qwgx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12418', 'https://github.com/junrar/junrar/pull/8', 'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'}
| null |
GHSA
|
GHSA-f4w8-cv6p-x6r5
|
Denial of Service by Uncontrolled Resource Consumption
|
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.
|
{'CVE-2021-27921'}
|
2021-12-07T17:52:23Z
|
2021-03-18T19:55:13Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27921', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-f4w8-cv6p-x6r5', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}
| null |
GHSA
|
GHSA-xx65-cc7g-9pfp
|
Moderate severity vulnerability that affects org.springframework.boot:spring-boot
|
Spring Boot supports an embedded launch script that can be used to easily run the application as a systemd or init.d linux service. The script included with Spring Boot 1.5.9 and earlier and 2.0.0.M1 through 2.0.0.M7 is susceptible to a symlink attack which allows the "run_user" to overwrite and take ownership of any file on the same system. In order to instigate the attack, the application must be installed as a service and the "run_user" requires shell access to the server. Spring Boot application that are not installed as a service, or are not using the embedded launch script are not susceptible.
|
{'CVE-2018-1196'}
|
2021-09-22T18:26:44Z
|
2018-10-18T18:05:57Z
|
MODERATE
| 5.9
|
{'CWE-59'}
|
{'https://pivotal.io/security/cve-2018-1196', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1196', 'https://github.com/advisories/GHSA-xx65-cc7g-9pfp'}
| null |
GHSA
|
GHSA-fffj-9qwg-qmh5
|
Improper Input Validation in OpenCV
|
OpenCV 3.0.0 allows remote attackers to cause a denial of service (segfault) via vectors involving corrupt chunks. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV 3.3.1.11).
|
{'CVE-2016-1517'}
|
2021-10-12T22:00:31Z
|
2021-10-12T22:00:31Z
|
MODERATE
| 5.5
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-fffj-9qwg-qmh5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1517', 'https://arxiv.org/pdf/1701.04739.pdf', 'https://github.com/opencv/opencv/issues/5956', 'https://github.com/opencv/opencv/pull/9376'}
| null |
GHSA
|
GHSA-7q9f-x6rm-qmxr
|
Command Injection in compass-compile
|
compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
|
{'CVE-2020-7635'}
|
2022-04-19T19:03:24Z
|
2021-12-09T19:27:46Z
|
CRITICAL
| 9.8
|
{'CWE-74'}
|
{'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25', 'https://github.com/advisories/GHSA-7q9f-x6rm-qmxr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635', 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}
| null |
GHSA
|
GHSA-f2rc-6xjq-95gq
|
Directory Traversal in shenliru
|
Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16161'}
|
2021-01-14T15:49:12Z
|
2020-09-01T17:24:57Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-f2rc-6xjq-95gq', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16161', 'https://www.npmjs.com/advisories/389', 'https://nodesecurity.io/advisories/389'}
| null |
GHSA
|
GHSA-jh67-3wqw-cvhr
|
Malicious Package in js-sxa3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:35:03Z
|
2020-09-03T23:13:52Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-jh67-3wqw-cvhr', 'https://www.npmjs.com/advisories/1293'}
| null |
GHSA
|
GHSA-38rv-5jqc-m2cv
|
High severity vulnerability that affects recurly
|
The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource.get" method that could result in compromise of API keys or other critical resources.
|
{'CVE-2017-0906'}
|
2021-01-08T20:03:04Z
|
2019-01-04T17:48:09Z
|
HIGH
| 0
|
{'CWE-918'}
|
{'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742', 'https://github.com/advisories/GHSA-38rv-5jqc-m2cv', 'https://hackerone.com/reports/288635', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906', 'https://dev.recurly.com/page/python-updates'}
| null |
GHSA
|
GHSA-72rj-36qc-47g7
|
Information Disclosure
|
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the --schema-first and --schema-only options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
|
{'CVE-2021-31671'}
|
2021-06-09T23:09:49Z
|
2021-04-27T15:54:52Z
|
HIGH
| 7.5
|
{'CWE-319'}
|
{'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671', 'https://github.com/ankane/pgsync/issues/121', 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26', 'https://github.com/advisories/GHSA-72rj-36qc-47g7', 'https://rubygems.org/gems/pgsync'}
| null |
GHSA
|
GHSA-qhm4-jxv7-j9pq
|
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
|
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
|
{'CVE-2020-8551'}
|
2022-04-12T22:00:18Z
|
2022-02-15T01:57:18Z
|
LOW
| 4.3
|
{'CWE-789'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://github.com/advisories/GHSA-qhm4-jxv7-j9pq', 'https://github.com/kubernetes/kubernetes/issues/89377', 'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8551', 'https://github.com/kubernetes/kubernetes/pull/87913', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s', 'https://github.com/kubernetes/kubernetes/commit/9802bfcec0580169cffce2a3d468689a407fa7dc'}
| null |
GHSA
|
GHSA-q25j-gcmv-5qpp
|
Moderate severity vulnerability that affects org.grails.plugins:fields and org.grails:grails-core
|
Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnerability in Using the display tag that can result in XSS . This vulnerability appears to have been fixed in 2.2.8.
|
{'CVE-2018-1000529'}
|
2021-09-16T19:18:42Z
|
2018-10-19T16:46:01Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/grails-fields-plugin/grails-fields/issues/278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000529', 'https://github.com/advisories/GHSA-q25j-gcmv-5qpp', 'https://github.com/martinfrancois/CVE-2018-1000529'}
| null |
GHSA
|
GHSA-qj73-v688-wqxf
|
Hijacked Environment Variables in proxy.js
|
The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16076'}
|
2021-01-08T01:58:37Z
|
2018-08-29T23:19:13Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-qj73-v688-wqxf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076', 'https://www.npmjs.com/advisories/515', 'https://nodesecurity.io/advisories/515'}
| null |
GHSA
|
GHSA-vfqx-hv88-f9cv
|
Double-free in id-map
|
An issue was discovered in the id-map crate through 2021-02-26 for Rust. A double free can occur in get_or_insert upon a panic of a user-provided f function.
|
{'CVE-2021-30456'}
|
2021-08-25T20:55:22Z
|
2021-08-25T20:55:22Z
|
CRITICAL
| 9.8
|
{'CWE-415'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30456', 'https://github.com/andrewhickman/id-map/issues/3', 'https://rustsec.org/advisories/RUSTSEC-2021-0052.html', 'https://github.com/advisories/GHSA-vfqx-hv88-f9cv'}
| null |
GHSA
|
GHSA-ghcq-472w-vf4h
|
Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx
|
### Impact
Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those.
### Patches
This issue has been patched in XWiki 13.10-rc-1, 12.10.11 and 13.4.6.
### Workarounds
There's no easy workaround for this issue, administrators should upgrade their wiki.
### References
https://jira.xwiki.org/browse/XWIKI-19155
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [JIRA](https://jira.xwiki.org)
* Email us at [XWiki Security ML](mailto:security@xwiki.org)
|
{'CVE-2022-24821'}
|
2022-04-12T21:43:26Z
|
2022-04-08T21:59:04Z
|
MODERATE
| 6.8
|
{'CWE-648'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24821', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h', 'https://jira.xwiki.org/browse/XWIKI-19155', 'https://github.com/advisories/GHSA-ghcq-472w-vf4h'}
| null |
GHSA
|
GHSA-j545-frh3-r9gq
|
SQL Injection in dolibarr
|
dolibarr is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
|
{'CVE-2022-0224'}
|
2022-01-21T23:56:39Z
|
2022-01-21T23:56:39Z
|
HIGH
| 8.3
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-j545-frh3-r9gq', 'https://huntr.dev/bounties/f1d1ce3e-ca92-4c7b-b1b8-934e28eaa486', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0224', 'https://github.com/dolibarr/dolibarr/commit/b9b45fb50618aa8053961f50bc8604b188d0ea79'}
| null |
GHSA
|
GHSA-c2q3-4qrh-fm48
|
Deserialization of untrusted data in Jackson Databind
|
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnectionFactory (aka weblogic/oracle-aqjms).
|
{'CVE-2020-14061'}
|
2021-10-21T21:08:31Z
|
2020-06-18T14:44:50Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2698', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14061', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://github.com/advisories/GHSA-c2q3-4qrh-fm48', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-pgmg-gf5p-54j8
|
Prototype Pollution in gammautils
|
"All versions of package gammautils up to and including version 0.0.81 are vulnerable to Prototype Pollution via the deepSet and deepMerge functions."
|
{'CVE-2020-7718'}
|
2021-07-29T22:08:51Z
|
2021-05-06T18:26:14Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-pgmg-gf5p-54j8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7718', 'https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670'}
| null |
GHSA
|
GHSA-q4g7-jrxv-67r9
|
Silent Configuration Failure in Puppet Agent
|
A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.
|
{'CVE-2021-27025'}
|
2021-12-02T17:54:25Z
|
2021-12-02T17:54:25Z
|
MODERATE
| 6.5
| null |
{'https://github.com/advisories/GHSA-q4g7-jrxv-67r9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/62SELE7EKVKZL4GABFMVYMIIUZ7FPEF7/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27025', 'https://puppet.com/security/cve/cve-2021-27025'}
| null |
GHSA
|
GHSA-6gr8-c3m5-mvrg
|
Exposure of Sensitive Information to an Unauthorized Actor
|
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 private files publicly accessible with Cloud Storage providers when the hashed URL is known. Users are recommend to first change their configuration to set the correct visibility according to the documentation. The visibility must be at the same level as `type`. When the Storage is saved on Amazon AWS we recommending disabling public access to the bucket containing the private files: https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html. Otherwise, update to Shopware 6.4.1.1 or install or update the Security plugin (https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659) and run the command `./bin/console s3:set-visibility` to correct your cloud file visibilities.
|
{'CVE-2021-32717'}
|
2021-09-08T18:00:47Z
|
2021-09-08T18:00:47Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/shopware/platform/security/advisories/GHSA-vrf2-xghr-j52v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32717', 'https://github.com/shopware/platform/commit/ba52f683372b8417a00e9014f481ed3d539f34b3', 'https://github.com/advisories/GHSA-6gr8-c3m5-mvrg', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}
| null |
GHSA
|
GHSA-gx5g-xcxj-cx2w
|
Critical severity vulnerability that affects smart_proxy_dynflow
|
An authentication bypass flaw was found in the smart_proxy_dynflow component used by Foreman. A malicious attacker can use this flaw to remotely execute arbitrary commands on machines managed by vulnerable Foreman instances, in a highly privileged context.
|
{'CVE-2018-14643'}
|
2021-09-13T14:29:48Z
|
2018-10-08T23:18:13Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-14643', 'https://github.com/advisories/GHSA-gx5g-xcxj-cx2w'}
| null |
GHSA
|
GHSA-792r-mh2q-p8qp
|
Server Side Request Forgery (SSRF) in org.mitre:openid-connect-server
|
The OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Server Side Request Forgery (SSRF) vulnerability. The vulnerability arises due to unsafe usage of the logo_uri parameter in the Dynamic Client Registration request. An unauthenticated attacker can make a HTTP request from the vulnerable server to any address in the internal network and obtain its response (which might, for example, have a JavaScript payload for resultant XSS). The issue can be exploited to bypass network boundaries, obtain sensitive data, or attack other hosts in the internal network.
|
{'CVE-2021-26715'}
|
2021-05-13T22:30:52Z
|
2021-05-13T22:30:52Z
|
HIGH
| 9.1
|
{'CWE-918'}
|
{'https://github.com/advisories/GHSA-792r-mh2q-p8qp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26715', 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/releases', 'https://portswigger.net/research/hidden-oauth-attack-vectors'}
| null |
GHSA
|
GHSA-6r92-cgxc-r5fg
|
Denial of service in CBOR library
|
### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was privately reported to me.
### Patches
This issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.)
### Workarounds
Again, users should use the latest version of this library.
In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if—
- it begins with a byte other than 0x80 through 0xDF, or
- it does not contain a byte in the range 0xa0 through 0xBF.
Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR).
| null |
2022-01-24T22:05:32Z
|
2022-01-21T23:35:35Z
|
HIGH
| 0
|
{'CWE-407'}
|
{'https://github.com/peteroupc/CBOR/compare/v4.5...v4.5.1', 'https://github.com/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg', 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}
| null |
GHSA
|
GHSA-rjf2-j2r6-q8gr
|
Prototype Pollution in vm2
|
This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.
|
{'CVE-2021-23449'}
|
2021-11-01T14:07:45Z
|
2021-10-19T15:28:45Z
|
CRITICAL
| 9.8
|
{'CWE-1321', 'CWE-915'}
|
{'https://security.netapp.com/advisory/ntap-20211029-0010/', 'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/advisories/GHSA-rjf2-j2r6-q8gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449'}
| null |
GHSA
|
GHSA-82hx-w2r5-c2wq
|
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
|
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
|
{'CVE-2020-8552'}
|
2022-04-12T22:00:04Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 5.3
|
{'CWE-789', 'CWE-400'}
|
{'https://github.com/kubernetes/kubernetes/pull/87669', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3SOCLOPTSYABTE4CLTSPDIFE6ZZZR4LX/', 'https://github.com/advisories/GHSA-82hx-w2r5-c2wq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8552', 'https://github.com/kubernetes/kubernetes/issues/89378', 'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://github.com/kubernetes/kubernetes/commit/5978856c4c7f10737a11c9540fe60b8475beecbb', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/2UOlsba2g0s'}
| null |
GHSA
|
GHSA-7g9h-c88w-r7h2
|
High severity vulnerability that affects django
|
Directory traversal vulnerability in Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 on Windows might allow remote attackers to read or execute files via a / (slash) character in a key in a session cookie, related to session replays.
|
{'CVE-2011-0698'}
|
2021-09-02T21:19:04Z
|
2018-07-23T19:52:31Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'http://www.djangoproject.com/weblog/2011/feb/08/security/', 'https://github.com/advisories/GHSA-7g9h-c88w-r7h2', 'http://www.securityfocus.com/bid/46296', 'http://www.vupen.com/english/advisories/2011/0372', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0698', 'http://www.mandriva.com/security/advisories?name=MDVSA-2011:031', 'http://secunia.com/advisories/43230', 'http://openwall.com/lists/oss-security/2011/02/09/6', 'http://www.vupen.com/english/advisories/2011/0439'}
| null |
GHSA
|
GHSA-fqh4-rh59-xhvf
|
Denial of service
|
The package `github.com/pires/go-proxyproto` before 0.5.0 are vulnerable to Denial of Service (DoS) via the parseVersion1() function. The reader in this package is a default bufio.Reader wrapping a net.Conn. It will read from the connection until it finds a newline. Since no limits are implemented in the code, a deliberately malformed V1 header could be used to exhaust memory in a server process using this code - and create a DoS. This can be exploited by sending a stream starting with PROXY and continuing to send data (which does not contain a newline) until the target stops acknowledging. The risk here is small, because only trusted sources should be allowed to send proxy protocol headers.
|
{'CVE-2021-23351'}
|
2021-05-18T21:07:43Z
|
2021-05-18T21:07:43Z
|
MODERATE
| 4.9
|
{'CWE-400'}
|
{'https://github.com/pires/go-proxyproto/pull/71', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4BNVGJMVI3ZTZ675EFPUHPGXCKCGSX46/', 'https://github.com/pires/go-proxyproto/commit/7f48261db810703d173f27f3309a808cc2b49b8b', 'https://github.com/pires/go-proxyproto/issues/69', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23351', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36IBVOZXRTWM7MGTRUTOM56P5RR74VU/', 'https://github.com/advisories/GHSA-fqh4-rh59-xhvf', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1081577'}
| null |
GHSA
|
GHSA-6jq2-789q-fff2
|
High severity vulnerability that affects org.apache.tika:tika-core
|
In Apache Tika 0.1 to 1.18, the XML parsers were not configured to limit entity expansion. They were therefore vulnerable to an entity expansion vulnerability which can lead to a denial of service attack.
|
{'CVE-2018-11761'}
|
2021-09-02T16:41:19Z
|
2018-10-17T15:49:36Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'http://www.securityfocus.com/bid/105514', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/5553e10bba5604117967466618f219c0cae710075819c70cfb3fb421@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-6jq2-789q-fff2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11761', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}
| null |
GHSA
|
GHSA-79jw-2f46-wv22
|
Authenticated remote code execution in October CMS
|
### Impact
An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code.
- This issue only affects admin panels that rely on safe mode and restricted permissions.
- To exploit this vulnerability, an attacker must first have access to the backend area.
### Patches
The issue has been patched in Build 474 (v1.0.474) and v1.1.10.
### Workarounds
Apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation manually if unable to upgrade to Build 474 or v1.1.10.
### References
Credits to:
- David Miller
### For more information
If you have any questions or comments about this advisory:
- Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
|
{'CVE-2022-21705'}
|
2022-04-19T19:03:20Z
|
2022-02-23T21:08:44Z
|
HIGH
| 7.2
|
{'CWE-74'}
|
{'https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe', 'https://github.com/advisories/GHSA-79jw-2f46-wv22', 'https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21705'}
| null |
GHSA
|
GHSA-j7c4-2xj8-wm7r
|
Moderate severity vulnerability that affects kdcproxy
|
python-kdcproxy before 0.3.2 allows remote attackers to cause a denial of service via a large POST request.
|
{'CVE-2015-5159'}
|
2021-09-14T19:12:11Z
|
2018-11-01T14:49:30Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/latchset/kdcproxy/commit/f274aa6787cb8b3ec1cc12c440a56665b7231882', 'https://bugzilla.redhat.com/show_bug.cgi?id=1245200', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5159', 'https://github.com/advisories/GHSA-j7c4-2xj8-wm7r'}
| null |
GHSA
|
GHSA-77g3-3j5w-64w4
|
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
|
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.
|
{'CVE-2020-10685'}
|
2022-01-04T19:33:37Z
|
2021-04-07T20:36:46Z
|
LOW
| 5.5
|
{'CWE-668', 'CWE-377', 'CWE-459'}
|
{'https://github.com/ansible/ansible/pull/68433', 'https://security.gentoo.org/glsa/202006-11', 'https://www.debian.org/security/2021/dsa-4950', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10685', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685', 'https://github.com/advisories/GHSA-77g3-3j5w-64w4'}
| null |
GHSA
|
GHSA-838h-jqp6-cf2f
|
Sandbox bypass leading to arbitrary code execution in Deno
|
### Impact
The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass permission checks and execute arbitrary shell code.
There is **no** evidence that this vulnerability has been exploited in the wild.
This vulnerability does **not** affect users of Deno Deploy.
### Patches
The vulnerability has been patched in Deno 1.20.3.
### Workarounds
There is no workaround. All users are recommended to upgrade to 1.20.3 immediately
---
The cause of this error was that certain FFI operations did not correctly check for permissions. The issue was fixed in [this](https://github.com/denoland/deno/pull/14115) pull request.
|
{'CVE-2022-24783'}
|
2022-05-02T19:39:06Z
|
2022-03-29T22:10:10Z
|
CRITICAL
| 10
|
{'CWE-269'}
|
{'https://github.com/denoland/deno/security/advisories/GHSA-838h-jqp6-cf2f', 'https://github.com/denoland/deno/pull/14115', 'https://github.com/denoland/deno/releases/tag/v1.20.3', 'https://github.com/advisories/GHSA-838h-jqp6-cf2f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24783'}
| null |
GHSA
|
GHSA-gcr6-rf47-jrgf
|
Loaded Databook of Tablib prone to python insertion resulting in command execution
|
An exploitable vulnerability exists in the Databook loading functionality of Tablib 0.11.4. A yaml loaded Databook can execute arbitrary python commands resulting in command execution. An attacker can insert python into loaded yaml to trigger this vulnerability.
|
{'CVE-2017-2810'}
|
2022-04-26T18:16:34Z
|
2018-07-13T16:01:25Z
|
CRITICAL
| 9.8
| null |
{'https://github.com/jazzband/tablib/commit/69abfc3ada5d754cb152119c0b4777043657cb6e', 'https://security.gentoo.org/glsa/201811-18', 'http://www.securityfocus.com/bid/99076', 'https://talosintelligence.com/vulnerability_reports/TALOS-2017-0307', 'https://github.com/advisories/GHSA-gcr6-rf47-jrgf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2810'}
| null |
GHSA
|
GHSA-f7f4-5w9j-23p2
|
festivaltts4r allows arbitrary command execution
|
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) to_speech or (2) to_mp3 method in lib/festivaltts4r/festival4r.rb.
|
{'CVE-2016-10194'}
|
2022-04-25T16:55:58Z
|
2017-10-24T18:33:35Z
|
CRITICAL
| 9.8
|
{'CWE-77'}
|
{'http://www.openwall.com/lists/oss-security/2017/01/31/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10194', 'https://github.com/advisories/GHSA-f7f4-5w9j-23p2', 'http://www.openwall.com/lists/oss-security/2017/02/02/5', 'https://github.com/spejman/festivaltts4r/issues/1'}
| null |
GHSA
|
GHSA-cg8j-8w52-735v
|
Missing warning can lead to unauthenticated admin access in SilverStripe
|
In SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access.
|
{'CVE-2019-12204'}
|
2021-12-03T14:39:17Z
|
2019-11-12T23:01:25Z
|
CRITICAL
| 9.8
| null |
{'https://forum.silverstripe.org/c/releases', 'https://github.com/advisories/GHSA-cg8j-8w52-735v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12204', 'https://www.silverstripe.org/download/security-releases/', 'https://packagist.org/packages/silverstripe/cms', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12204', 'https://packagist.org/packages/silverstripe/framework'}
| null |
GHSA
|
GHSA-cpgr-wmr9-qxv4
|
Cross-Site Scripting in serve
|
Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
Upgrade to version 10.0.2 or later.
| null |
2021-09-28T17:03:27Z
|
2020-09-11T21:20:14Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://hackerone.com/reports/398285', 'https://www.npmjs.com/advisories/992', 'https://github.com/advisories/GHSA-cpgr-wmr9-qxv4'}
| null |
GHSA
|
GHSA-3vg2-4qxc-ch4j
|
Directory Traversal in unicorn-list
|
Affected versions of `unicorn-list` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16131'}
|
2021-01-08T19:58:34Z
|
2018-07-23T20:49:38Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16131', 'https://github.com/advisories/GHSA-3vg2-4qxc-ch4j', 'https://nodesecurity.io/advisories/477', 'https://www.npmjs.com/advisories/477'}
| null |
GHSA
|
GHSA-fj67-w3m4-rfmp
|
Cross-site scripting in Plone
|
Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool.
|
{'CVE-2021-33513'}
|
2021-06-08T23:19:28Z
|
2021-06-08T23:19:28Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-fj67-w3m4-rfmp', 'https://plone.org/security/hotfix/20210518/xss-vulnerability-in-cmfdifftool', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33513'}
| null |
GHSA
|
GHSA-vv2x-vrpj-qqpq
|
Cross-site scripting in Bleach
|
### Impact
A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with all of:
* `svg` or `math` in the allowed tags
* `p` or `br` in allowed tags
* `style`, `title`, `noscript`, `script`, `textarea`, `noframes`, `iframe`, or `xmp` in allowed tags
* the keyword argument `strip_comments=False`
Note: none of the above tags are in the default allowed tags and `strip_comments` defaults to `True`.
### Patches
Users are encouraged to upgrade to bleach v3.3.0 or greater.
Note: bleach v3.3.0 introduces a breaking change to escape HTML comments by default.
### Workarounds
* modify `bleach.clean` calls to at least one of:
* not allow the `style`, `title`, `noscript`, `script`, `textarea`, `noframes`, `iframe`, or `xmp` tag
* not allow `svg` or `math` tags
* not allow `p` or `br` tags
* set `strip_comments=True`
* A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk.
### References
* https://bugzilla.mozilla.org/show_bug.cgi?id=1689399
* https://advisory.checkmarx.net/advisory/CX-2021-4303
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23980
* https://cure53.de/fp170.pdf
### Credits
* Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx
* Additional eject tags not mentioned in the original advisory and the CSP mitigation line being truncated in the revised advisory reported by [Michał Bentkowski](https://twitter.com/SecurityMB) at Securitum
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues)
* Email us at [security@mozilla.org](mailto:security@mozilla.org)
|
{'CVE-2021-23980'}
|
2021-09-28T20:48:50Z
|
2021-02-02T17:58:40Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/mozilla/bleach/blob/79b7a3c5e56a09d1d323a5006afa59b56162eb13/CHANGES#L4', 'https://cure53.de/fp170.pdf', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1689399', 'https://github.com/mozilla/bleach/security/advisories/GHSA-vv2x-vrpj-qqpq', 'https://github.com/advisories/GHSA-vv2x-vrpj-qqpq', 'https://github.com/mozilla/bleach/commit/79b7a3c5e56a09d1d323a5006afa59b56162eb13', 'https://pypi.org/project/bleach/'}
| null |
GHSA
|
GHSA-m52x-29pq-w3vv
|
Cross-Site Scripting in pannellum
|
Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 2.5.6 or later.
|
{'CVE-2019-16763'}
|
2022-04-19T19:02:23Z
|
2019-11-22T18:18:03Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1418', 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763', 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv'}
| null |
GHSA
|
GHSA-7mvr-5x2g-wfc8
|
Moderate severity vulnerability that affects bootstrap
|
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.
|
{'CVE-2018-14042'}
|
2021-06-15T16:30:20Z
|
2018-09-13T15:50:32Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-7mvr-5x2g-wfc8', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://github.com/twbs/bootstrap/issues/26628', 'https://github.com/twbs/bootstrap/issues/26423', 'https://github.com/twbs/bootstrap/pull/26630', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14042', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
GHSA
|
GHSA-646x-m363-9rh4
|
Hijacked Environment Variables in node-opensl
|
The `node-opensl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16063'}
|
2021-01-08T21:18:36Z
|
2018-10-03T20:27:55Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16063', 'https://github.com/advisories/GHSA-646x-m363-9rh4', 'https://nodesecurity.io/advisories/502', 'https://www.npmjs.com/advisories/502'}
| null |
GHSA
|
GHSA-hm2p-fhwx-9285
|
Incorrect Permission Assignment for Critical Resource in Plone
|
Plone through 5.2.4 allows remote authenticated managers to perform disk I/O via crafted keyword arguments to the ReStructuredText transform in a Python script.
|
{'CVE-2021-33509'}
|
2022-03-22T22:32:35Z
|
2021-06-15T16:11:38Z
|
CRITICAL
| 9.9
|
{'CWE-732'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33509', 'http://www.openwall.com/lists/oss-security/2021/05/22/1', 'https://github.com/advisories/GHSA-hm2p-fhwx-9285', 'https://plone.org/security/hotfix/20210518/writing-arbitrary-files-via-docutils-and-python-script'}
| null |
GHSA
|
GHSA-gf8v-vxf9-7c66
|
Downloads Resources over HTTP in cloudpub-redis
|
Affected versions of `cloudpub-redis` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cloudpub-redis`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10672'}
|
2021-01-08T18:47:44Z
|
2019-02-18T23:44:26Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/282', 'https://github.com/advisories/GHSA-gf8v-vxf9-7c66', 'https://nodesecurity.io/advisories/282', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10672'}
| null |
GHSA
|
GHSA-2r3v-q9x3-7g46
|
Link injection in SimpleSAMLphp
|
### Background
Several scripts part of SimpleSAMLphp display a web page with links obtained from the request parameters. This allows us to enhance usability, as the users are presented with links they can follow after completing a certain action, like logging out.
### Description
The following scripts were not checking the URLs obtained via the HTTP request before displaying them as the target of links that the user may click on:
- `www/logout.php`
- `modules/core/www/no_cookie.php`
The issue allowed attackers to display links targeting a malicious website inside a trusted site running SimpleSAMLphp, due to the lack of security checks involving the `link_href` and `retryURL` HTTP parameters, respectively. The issue was resolved by including a verification of the URLs received in the request against a white list of websites specified in the `trusted.url.domains` configuration option.
### Affected versions
All SimpleSAMLphp versions prior to 1.14.4.
### Impact
A remote attacker could craft a link pointing to a trusted website running SimpleSAMLphp, including a parameter pointing to a malicious website, and try to fool the victim into visiting that website by clicking on a link in the page presented by SimpleSAMLphp.
### Resolution
Upgrade to the latest version.
### Credit
This security issue was discovered and reported by John Page (hyp3rlinx).
| null |
2022-04-19T19:02:23Z
|
2020-01-24T21:27:16Z
|
LOW
| 3.7
|
{'CWE-74'}
|
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-2r3v-q9x3-7g46', 'https://github.com/advisories/GHSA-2r3v-q9x3-7g46', 'https://snyk.io/vuln/SNYK-PHP-SIMPLESAMLPHPSIMPLESAMLPHP-70160'}
| null |
GHSA
|
GHSA-2f29-pmpx-vj62
|
Directory Traversal in serverwg
|
`serverwg` is a simple http server.
`serverwg` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
and response:
```
HTTP/1.1 200 OK
Date: Wed, 17 May 2017 22:52:08 GMT
Connection: keep-alive
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16101'}
|
2021-01-14T15:54:31Z
|
2020-09-01T16:52:33Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16101', 'https://www.npmjs.com/advisories/364', 'https://github.com/advisories/GHSA-2f29-pmpx-vj62', 'https://nodesecurity.io/advisories/364'}
| null |
GHSA
|
GHSA-c9rv-3jmq-527w
|
Unexpected panic when decoding tokens in branca
|
An issue was discovered in the branca crate before 0.10.0 for Rust. Decoding tokens (with invalid base62 data) can panic.
|
{'CVE-2020-35918'}
|
2021-08-25T20:49:50Z
|
2021-08-25T20:49:50Z
|
MODERATE
| 5.5
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-c9rv-3jmq-527w', 'https://github.com/tuupola/branca-spec/issues/22', 'https://github.com/return/branca/issues/24', 'https://rustsec.org/advisories/RUSTSEC-2020-0075.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35918'}
| null |
GHSA
|
GHSA-9gjv-6qq6-v7qm
|
2FA bypass through deleting devices in wagtail-2fa
|
### Impact
Any user with access to the CMS can view and delete other users' 2FA devices by going to the correct path. The user does not require special permissions in order to do so. By deleting the other user's device they can disable the target user's 2FA devices and potentially compromise the account if they figure out their password.
### Patches
The problem has been patched in version 1.4.1.
### Workarounds
There is no workaround for this issue.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa)
* Email us at [security@labdigital.nl](mailto:security@labdigital.nl)
|
{'CVE-2020-5240'}
|
2021-01-08T20:26:35Z
|
2020-03-13T21:18:55Z
|
HIGH
| 7.6
|
{'CWE-285'}
|
{'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-9gjv-6qq6-v7qm', 'https://github.com/labd/wagtail-2fa/commit/ac23550d33b7436e90e3beea904647907eba5b74', 'https://github.com/advisories/GHSA-9gjv-6qq6-v7qm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5240'}
| null |
GHSA
|
GHSA-ccxc-vr6p-4858
|
Improper Certificate Validation in Cosign
|
### Impact
Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio.
#### Signing with a keypair
<details>
To reproduce this vulnerability, create a keypair and sign an image. Don't store the signature in Rekor:
```
$ cosign generate-key-pair
$ cosign sign --key cosign.key IMAGE
```
If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. To accomplish this, the attacker needs to:
1. Pull the signature image
2. Annotate the signature image with any valid Rekor bundle under the `dev.sigstore.cosign/bundle` annotation
3. Push the signature image back to OCI
Verification then prints out the following:
```
$ cosign verify [--key] [IMAGE]
Verification for [IMAGE] --
The following checks were performed on each of these signatures:
- The cosign claims were validated
- Existence of the claims in the transparency log was verified offline
- The signatures were verified against the specified public key
- Any certificates were verified against the Fulcio roots.
[…]
```
The claim that `Existence of the claims in the transparency log was verified offline` is inaccurate since an entry for this image doesn't exist in the log.
The claim that `Any certificates were verified against the Fulcio roots.` is technically correct but since there were no certificates that should be explicitly called out.
</details>
#### "Keyless signing" with an OIDC flow
<details>
To reproduce this vulnerability, sign the image with a Fulcio identity. Don't store the signature in Rekor:
```
$ COSIGN_EXPERIMENTAL=1 cosign sign IMAGE
[...]
IMAGE appears to be a private repository, please confirm uploading to the transparency log at "https://rekor.sigstore.dev" [Y/N]: n
```
Then, create a keypair and sign the image again. Store an entry for the signature in Rekor:
```
$ cosign generate-key-pair
$ COSIGN_EXPERIMENTAL=1 cosign sign --key cosign.key IMAGE
Enter password for private key: IMAGE appears to be a private repository, please confirm uploading to the transparency log at "https://rekor.sigstore.dev" [Y/N]: y
```
If an attacker has access to the signature in OCI, they can manipulate cosign into believing the entry was stored in Rekor even though it wasn't. To accomplish this, the attacker needs to:
1. Pull the signature image
2. Copy the rekor bundle from the second signature into the first signature under the `dev.sigstore.cosign/bundle` annotation
3. Push the signature image back to OCI
_Note: For this to work, both signatures must occur during the valid lifespan of the certificate (~20 minutes)._
Verification then prints out the following:
```
$ cosign verify [--key] [IMAGE]
Verification for [IMAGE] --
The following checks were performed on each of these signatures:
- The cosign claims were validated
- Existence of the claims in the transparency log was verified offline
- The signatures were verified against the specified public key
- Any certificates were verified against the Fulcio roots.
[…]
```
The claim that `Existence of the claims in the transparency log was verified offline` is inaccurate since an entry for this image doesn't exist in the log.
The claim that `Any certificates were verified against the Fulcio roots.` is technically correct but since there were no certificates that should be explicitly called out.
</details>
### Patches
The vulnerability has been patched in v1.5.2 of cosign.
The `signature` in the `signedEntryTimestamp` provided by Rekor is now compared to the `signature` that is being verified. If these don't match, then an error is returned. If a valid bundle is copied to a different signature, verification should fail.
Cosign output now only informs the user that certificates were verified if a certificate was in fact verified.
### Workarounds
The only workaround is upgrading.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [cosign](https://github.com/sigstore/cosign)
* Send us a message on [Slack](https://sigstore.slack.com/). Invite link [here](https://join.slack.com/t/sigstore/shared_invite/zt-mhs55zh0-XmY3bcfWn4XEyMqUUutbUQ).
### Thank you
Thank you to @mtrmac for finding and reporting this vulnerability.
Thank you to everyone who worked on fixing this:
* @nsmith5
* @znewman01
* @dlorenc
* @mattmoor
* @priyawadhwa
|
{'CVE-2022-23649'}
|
2022-04-19T19:03:23Z
|
2022-02-22T19:34:09Z
|
LOW
| 3.3
|
{'CWE-295'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23649', 'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49', 'https://github.com/sigstore/cosign/releases/tag/v1.5.2', 'https://github.com/advisories/GHSA-ccxc-vr6p-4858', 'https://github.com/sigstore/cosign/security/advisories/GHSA-ccxc-vr6p-4858'}
| null |
GHSA
|
GHSA-3rh7-vm4x-q2hp
|
Hijacked Environment Variables in sqlserver
|
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16055'}
|
2021-01-08T20:00:20Z
|
2018-11-09T17:49:22Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/486', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055', 'https://nodesecurity.io/advisories/486', 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp'}
| null |
GHSA
|
GHSA-9gcm-f4x3-8jpw
|
Moderate severity vulnerability that affects org.springframework:spring-core
|
Spring Framework (versions 5.0.x prior to 5.0.7, versions 4.3.x prior to 4.3.18, and older unsupported versions) allow web applications to change the HTTP request method to any HTTP method (including TRACE) using the HiddenHttpMethodFilter in Spring MVC. If an application has a pre-existing XSS vulnerability, a malicious user (or attacker) can use this filter to escalate to an XST (Cross Site Tracing) attack.
|
{'CVE-2018-11039'}
|
2021-10-21T21:27:38Z
|
2018-10-16T17:35:54Z
|
MODERATE
| 5.9
| null |
{'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/107984', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://pivotal.io/security/cve-2018-11039', 'https://github.com/advisories/GHSA-9gcm-f4x3-8jpw', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11039', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}
| null |
GHSA
|
GHSA-c4r5-xvgw-2942
|
Metrics exposure in Wildfly
|
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data.
|
{'CVE-2021-3503'}
|
2022-04-28T21:16:02Z
|
2022-04-19T00:00:50Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3503', 'https://github.com/wildfly/wildfly/pull/14136', 'https://issues.redhat.com/browse/WFLY-11933', 'https://github.com/advisories/GHSA-c4r5-xvgw-2942', 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'}
| null |
GHSA
|
GHSA-h45v-vgvp-3h5v
|
Out-of-bounds write in stack
|
An issue was discovered in the stack crate before 0.3.1 for Rust. ArrayVec has an out-of-bounds write via element insertion.
|
{'CVE-2020-35895'}
|
2021-08-25T20:49:13Z
|
2021-08-25T20:49:13Z
|
CRITICAL
| 9.8
|
{'CWE-787'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0042.html', 'https://github.com/arcnmx/stack-rs/issues/4', 'https://github.com/advisories/GHSA-h45v-vgvp-3h5v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35895'}
| null |
GHSA
|
GHSA-8j65-4pcq-xq95
|
Options structure open to XSS if passed unfiltered
|
### Impact
In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. Especially when using the `useHTML` flag, HTML string options would be inserted unfiltered directly into the DOM. When `useHTML` was false, malicious code could be inserted by using various character replacement tricks or malformed HTML.
If your chart configuration comes from a trusted source like a static setup or pre-filtered HTML (or no markup at all in the configuration), you are not impacted.
### Patches
In version 9, the whole rendering layer was refactored to use an DOMParser, an AST and tag and HTML allow-listing to make sure only safe content entered the DOM. In addition, prototype pollution was stopped.
### Workarounds
Implementers who are not able to upgrade may apply [DOMPurify](https://github.com/cure53/DOMPurify) recursively [to the options structure](https://jsfiddle.net/highcharts/zd3wcm5L/) to filter out malicious markup.
### References
* Details on the improved [Highcharts security](https://www.highcharts.com/docs/chart-concepts/security)
* [The AST and TextBuilder refactoring](https://github.com/highcharts/highcharts/pull/14913)
* [The fix for prototype pollution](https://github.com/highcharts/highcharts/pull/14884)
### For more information
If you have any questions or comments about this advisory:
* Visit our [support page](https://www.highcharts.com/blog/support/)
* For more Email us at [security@highcharts.com](mailto:security@highcharts.com)
|
{'CVE-2021-29489'}
|
2021-06-24T13:08:08Z
|
2021-05-06T15:45:03Z
|
HIGH
| 7.6
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-8j65-4pcq-xq95', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29489', 'https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95', 'https://security.netapp.com/advisory/ntap-20210622-0005/', 'https://www.npmjs.com/package/highcharts'}
| null |
GHSA
|
GHSA-4c32-xmgj-2g98
|
High severity vulnerability that affects org.apache.pdfbox:pdfbox
|
Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize the XML parsers, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted PDF.
|
{'CVE-2016-2175'}
|
2021-09-01T14:12:01Z
|
2018-10-17T18:22:15Z
|
HIGH
| 7.8
|
{'CWE-611'}
|
{'http://rhn.redhat.com/errata/RHSA-2017-0272.html', 'http://packetstormsecurity.com/files/137214/Apache-PDFBox-1.8.11-2.0.0-XML-Injection.html', 'http://rhn.redhat.com/errata/RHSA-2017-0248.html', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201605.mbox/%3C83a03bcf-f86b-4688-37b5-615c080291d8@apache.org%3E', 'https://lists.apache.org/thread.html/ad5fbc86c1d1821ae1b963e8561ab6d6a5f66b2848e84f5a31477f54@%3Ccommits.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2175', 'http://rhn.redhat.com/errata/RHSA-2017-0249.html', 'http://svn.apache.org/viewvc?view=revision&revision=1739564', 'http://svn.apache.org/viewvc?view=revision&revision=1739565', 'http://www.securityfocus.com/bid/90902', 'https://github.com/advisories/GHSA-4c32-xmgj-2g98', 'http://rhn.redhat.com/errata/RHSA-2017-0179.html', 'http://www.securityfocus.com/archive/1/538503/100/0/threaded', 'http://www.debian.org/security/2016/dsa-3606'}
| null |
GHSA
|
GHSA-vgv5-cxvh-vfxh
|
Arbitrary code execution in clickhouse-driver
|
clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow.
|
{'CVE-2020-26759'}
|
2021-04-07T20:50:57Z
|
2021-04-07T20:50:57Z
|
CRITICAL
| 9.8
|
{'CWE-120'}
|
{'https://github.com/advisories/GHSA-vgv5-cxvh-vfxh', 'https://github.com/mymarilyn/clickhouse-driver/commit/d708ed548e1d6f254ba81a21de8ba543a53b5598', 'https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26759'}
| null |
GHSA
|
GHSA-wg5r-c793-w5w2
|
Downloads Resources over HTTP in mystem-wrapper
|
Affected versions of `mystem-wrapper` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem-wrapper`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10671'}
|
2021-01-08T01:56:51Z
|
2019-02-18T23:44:28Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-wg5r-c793-w5w2', 'https://www.npmjs.com/advisories/280', 'https://nodesecurity.io/advisories/280', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10671'}
| null |
GHSA
|
GHSA-6jhm-4vmx-mr76
|
SQL injection in Moodle
|
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
|
{'CVE-2022-0332'}
|
2022-02-02T16:11:17Z
|
2022-01-28T22:08:14Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=2043661', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0332', 'https://github.com/advisories/GHSA-6jhm-4vmx-mr76', 'https://github.com/moodle/moodle/commit/c7a62a8c82219b50589257f79021da1df1a76808', 'https://moodle.org/mod/forum/discuss.php?d=431099'}
| null |
GHSA
|
GHSA-pw3c-h7wp-cvhx
|
Improper Initialization in Pillow
|
Pillow is the friendly PIL (Python Imaging Library) fork. path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
|
{'CVE-2022-22815'}
|
2022-05-05T13:40:38Z
|
2022-01-12T20:07:43Z
|
CRITICAL
| 9.8
|
{'CWE-665'}
|
{'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22815', 'https://www.debian.org/security/2022/dsa-5053', 'https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331', 'https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c', 'https://github.com/advisories/GHSA-pw3c-h7wp-cvhx'}
| null |
GHSA
|
GHSA-8q89-pwhh-7wfq
|
Moderate severity vulnerability that affects com.github.penggle:kaptcha
|
text/impl/DefaultTextCreator.java, text/impl/ChineseTextProducer.java, and text/impl/FiveLetterFirstNameTextCreator.java in kaptcha 2.3.2 use the Random (rather than SecureRandom) function for generating CAPTCHA values, which makes it easier for remote attackers to bypass intended access restrictions via a brute-force approach.
|
{'CVE-2018-18531'}
|
2021-09-07T20:28:58Z
|
2018-10-23T16:08:56Z
|
CRITICAL
| 9.8
|
{'CWE-330'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-18531', 'https://github.com/penggle/kaptcha/issues/3', 'https://github.com/advisories/GHSA-8q89-pwhh-7wfq'}
| null |
GHSA
|
GHSA-3ww4-cp53-6g2x
|
Cross Site Request Forgery in kindeditor
|
Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:/examples/uploadbutton.html) and then use the authority of this website to trick users into clicking your malicious html link.
|
{'CVE-2021-42228'}
|
2021-10-21T14:56:51Z
|
2021-10-18T19:44:06Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42228', 'https://github.com/kindsoft/kindeditor/issues/337', 'https://github.com/advisories/GHSA-3ww4-cp53-6g2x'}
| null |
GHSA
|
GHSA-vx3p-948g-6vhq
|
Regular Expression Denial of Service (ReDoS)
|
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
|
{'CVE-2021-27290'}
|
2022-03-11T21:28:07Z
|
2021-03-19T21:24:36Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://www.npmjs.com/package/ssri', 'https://github.com/advisories/GHSA-vx3p-948g-6vhq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290', 'https://npmjs.com', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf', 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf'}
| null |
GHSA
|
GHSA-3h4r-pjv6-cph9
|
Escape sequence injection in RubyGems
|
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
|
{'CVE-2019-8323'}
|
2021-08-17T13:18:16Z
|
2019-06-20T16:05:57Z
|
HIGH
| 7.5
|
{'CWE-74'}
|
{'https://hackerone.com/reports/315081', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8323', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html', 'https://github.com/advisories/GHSA-3h4r-pjv6-cph9'}
| null |
GHSA
|
GHSA-j6x7-42x2-hpcf
|
Malicious Package in buffer-xoz
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:15:10Z
|
2020-09-03T22:14:20Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-j6x7-42x2-hpcf', 'https://www.npmjs.com/advisories/1253'}
| null |
GHSA
|
GHSA-pq64-v7f5-gqh8
|
Regular Expression Denial of Service (ReDoS) in Pygments
|
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
|
{'CVE-2021-27291'}
|
2021-05-10T15:14:50Z
|
2021-03-29T16:33:03Z
|
MODERATE
| 7.5
|
{'CWE-400'}
|
{'https://www.debian.org/security/2021/dsa-4878', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/', 'https://github.com/advisories/GHSA-pq64-v7f5-gqh8', 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27291', 'https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce', 'https://www.debian.org/security/2021/dsa-4889'}
| null |
GHSA
|
GHSA-jr9c-h74f-2v28
|
Improper Authorization in Gitea
|
Gitea 1.16.3 and prior is vulnerable to improper authorization. A patch is available and is anticipated to be part of the 1.16.4 release.
|
{'CVE-2022-0905'}
|
2022-03-28T22:24:30Z
|
2022-03-11T00:02:35Z
|
MODERATE
| 7.1
|
{'CWE-863', 'CWE-285'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0905', 'https://github.com/advisories/GHSA-jr9c-h74f-2v28', 'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2', 'https://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb'}
| null |
GHSA
|
GHSA-4x2f-54wr-4hjg
|
Potential Zip Slip Vulnerability in baserCMS
|
There is a OS Command Injection Vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
Target
baserCMS 4.5.3 and earlier versions
Vulnerability
OS Command Injection Vulnerability.
Countermeasures
Update to the latest version of baserCMS
Credits
Daniele Scanu @SoterItSecurity
|
{'CVE-2021-41279'}
|
2021-12-01T18:29:32Z
|
2021-12-01T18:29:32Z
|
HIGH
| 7.7
|
{'CWE-22'}
|
{'https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg', 'https://github.com/advisories/GHSA-4x2f-54wr-4hjg', 'https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41279'}
| null |
GHSA
|
GHSA-2m7g-9q74-9m3q
|
Improper Certificate Validation in Apache Beam
|
The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code running in the same JVM.
|
{'CVE-2020-1929'}
|
2021-08-25T21:06:45Z
|
2020-05-06T20:49:04Z
|
HIGH
| 7.5
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-2m7g-9q74-9m3q', 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b', 'https://lists.apache.org/thread.html/rdd0e85b71bf0274471b40fa1396d77f7b2d1165eaea4becbdc69aa04%40%3Cuser.beam.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929'}
| null |
GHSA
|
GHSA-c72p-9xmj-rx3w
|
Archive package allows chmod of file outside of unpack target directory
|
## Impact
A bug was found in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.
## Patches
This bug has been fixed in containerd 1.5.4 and 1.4.8. Users should update to these versions as soon as they are released. Running containers do not need to be restarted.
## Workarounds
Ensure you only pull images from trusted sources.
Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with unexpected files.
## For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/containerd/containerd/issues/new/choose)
* Email us at security@containerd.io if you think you’ve found a security bug.
|
{'CVE-2021-32760'}
|
2021-10-21T13:16:23Z
|
2021-07-26T21:17:45Z
|
MODERATE
| 5
|
{'CWE-668'}
|
{'https://github.com/containerd/containerd/releases/tag/v1.5.4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32760', 'https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w', 'https://github.com/advisories/GHSA-c72p-9xmj-rx3w', 'https://github.com/containerd/containerd/releases/tag/v1.4.8'}
| null |
GHSA
|
GHSA-4q2f-8g74-qm56
|
Cross-Site Scripting in takeapeek
|
All versions of `takeapeek` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-28T21:57:44Z
|
2020-09-03T17:18:05Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1038', 'https://hackerone.com/reports/490728', 'https://github.com/advisories/GHSA-4q2f-8g74-qm56'}
| null |
GHSA
|
GHSA-543v-gj2c-r3ch
|
Moderate severity vulnerability that affects activemodel
|
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
|
{'CVE-2016-0753'}
|
2021-06-11T14:36:52Z
|
2017-10-24T18:33:35Z
|
MODERATE
| 5.3
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-0753', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178065.html', 'http://www.securityfocus.com/bid/82247', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178041.html', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/6jQVC1geukQ/3Iy0GU1ZEgAJ', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178043.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178047.html', 'http://www.debian.org/security/2016/dsa-3464', 'http://www.openwall.com/lists/oss-security/2016/01/25/14', 'http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178066.html', 'https://github.com/advisories/GHSA-543v-gj2c-r3ch'}
| null |
GHSA
|
GHSA-c7vm-f5p4-8fqh
|
Open redirect in Jupyter Notebook
|
[localhost](http://localhost:8888)
### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability - a maliciously crafted link to a notebook server could redirect the browser to a different website.
All notebook servers are technically affected, however, these maliciously crafted links can only be reasonably made for known notebook server hosts. A link to your notebook server may *appear* safe, but ultimately redirect to a spoofed server on the public internet.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Patched in notebook 6.1.5
### References
[OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory, or vulnerabilities to report, please email our security list [security@ipython.org](mailto:security@ipython.org).
Credit: zhuonan li of Alibaba Application Security Team
|
{'CVE-2020-26215'}
|
2021-01-07T22:42:00Z
|
2020-11-18T21:06:36Z
|
MODERATE
| 4.4
|
{'CWE-601'}
|
{'https://github.com/jupyter/notebook/commit/3cec4bbe21756de9f0c4bccf18cf61d840314d74', 'https://github.com/jupyter/notebook/security/advisories/GHSA-c7vm-f5p4-8fqh', 'https://github.com/advisories/GHSA-c7vm-f5p4-8fqh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26215', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00004.html'}
| null |
GHSA
|
GHSA-5xg3-j2j6-rcx4
|
Relative Path Traversal in git-delta
|
git-delta before 0.8.3 on Windows resolves an executable's pathname as a relative path from the current directory.
|
{'CVE-2021-36376'}
|
2021-09-09T16:46:43Z
|
2021-08-25T21:01:39Z
|
HIGH
| 7.8
|
{'CWE-427', 'CWE-23'}
|
{'https://vuln.ryotak.me/advisories/54', 'https://github.com/advisories/GHSA-5xg3-j2j6-rcx4', 'https://github.com/dandavison/delta/releases/tag/0.8.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36376', 'https://github.com/dandavison/delta/commit/f01846bd443aaf92fdd5ac20f461beac3f6ee3fd'}
| null |
GHSA
|
GHSA-33vf-4xgg-9r58
|
HTTP Response Splitting (Early Hints) in Puma
|
### Impact
If an application using Puma allows untrusted input in an early-hints header, an attacker can use a carriage return character to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as [HTTP Response Splitting](https://owasp.org/www-community/attacks/HTTP_Response_Splitting)
While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS).
This is related to [CVE-2020-5247](https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v), which fixed this vulnerability but only for regular responses.
### Patches
This has been fixed in 4.3.3 and 3.12.4.
### Workarounds
Users can not allow untrusted/user input in the Early Hints response header.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [puma](https://github.com/puma/puma)
* Email us a project maintainer. [Email addresses are listed in our Code of Conduct](https://github.com/puma/puma/blob/master/CODE_OF_CONDUCT.md#enforcement).
|
{'CVE-2020-5249'}
|
2021-01-08T20:28:11Z
|
2020-03-03T23:33:16Z
|
MODERATE
| 6.5
|
{'CWE-113'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://github.com/advisories/GHSA-33vf-4xgg-9r58', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5249', 'https://github.com/puma/puma/security/advisories/GHSA-33vf-4xgg-9r58', 'https://github.com/puma/puma/commit/c22712fc93284a45a93f9ad7023888f3a65524f3'}
| null |
GHSA
|
GHSA-8278-88vv-x98r
|
Execution of untrusted code through config file
|
### Impact
It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file.
### Workarounds
Manually adjust yaml.load() to yaml.safe_load()
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues)
* Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)
|
{'CVE-2021-21371'}
|
2022-04-19T19:02:50Z
|
2021-03-10T21:51:17Z
|
MODERATE
| 0
|
{'CWE-502'}
|
{'https://pypi.org/project/tenable-jira-cloud/', 'https://github.com/advisories/GHSA-8278-88vv-x98r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21371', 'https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r', 'https://pyyaml.docsforge.com/master/documentation/#loading-yaml', 'https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0'}
| null |
GHSA
|
GHSA-p62j-hrxm-xcxf
|
Book page text, count, and author/title length is not limited in PocketMine-MP
|
### Impact
Players can fill book pages with as many characters as they like; the server does not check this.
In addition, the maximum of 50 pages is also not enforced, meaning that players can create "book bombs".
This causes a variety of problems:
- Oversized NBT on the wire costing excess bandwidth for server and client
- Server crashes when saving region-based worlds due to exceeding maximum chunk size of 1 MB (PM3-specific)
- Server crashes if any book page exceeds 32 KiB (due to TAG_String size limit) (PM4-specific)
This does, however, require that an attacker obtain a writable book in the first place in order to exploit the problem.
### Patches
The bug has been fixed in 3.26.5 and 4.0.5.
### Workarounds
Ban writable books, or use a plugin to cancel `PlayerEditBookEvent` to cancel the event if `strlen(text) > 1024 || mb_strlen(text) > 256`.
### For more information
If you have any questions or comments about this advisory:
* Email us at [team@pmmp.io](mailto:team@pmmp.io)
| null |
2022-01-06T23:53:35Z
|
2022-01-06T23:53:35Z
|
MODERATE
| 6.5
| null |
{'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-p62j-hrxm-xcxf', 'https://github.com/advisories/GHSA-p62j-hrxm-xcxf'}
| null |
GHSA
|
GHSA-9mmw-3fmh-96g3
|
Malicious Package in calk
|
All versions of `calk` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:03:33Z
|
2020-09-02T20:23:38Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/855', 'https://github.com/advisories/GHSA-9mmw-3fmh-96g3'}
| null |
GHSA
|
GHSA-h352-g5vw-3926
|
Improper Input Validation in fruity
|
An issue was discovered in the fruity crate through 0.2.0 for Rust. Security-relevant validation of filename extensions is plausibly affected. Methods of NSString for conversion to a string may return a partial result. Because they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first '\0' byte, which might not be the end of the string.
|
{'CVE-2021-43620'}
|
2021-11-19T13:24:04Z
|
2021-11-16T17:26:47Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/rustsec/advisory-db/pull/1102', 'https://github.com/advisories/GHSA-h352-g5vw-3926', 'https://rustsec.org/advisories/RUSTSEC-2021-0123.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43620', 'https://github.com/nvzqz/fruity/issues/14'}
| null |
GHSA
|
GHSA-gww7-p5w4-wrfv
|
Deserialization of Untrusted Data in jackson-databind
|
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain net.sf.ehcache blocking.
|
{'CVE-2019-20330'}
|
2022-04-07T16:50:35Z
|
2020-03-04T20:52:11Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/r7fb123e7dad49af5886cfec7135c0fd5b74e4c67af029e1dc91ba744@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r67f4d4c48197454b83d62afbed8bebbda3764e6e3a6e26a848961764@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra8a80dbc7319916946397823aec0d893d24713cbf7b5aee0e957298c@%3Cdev.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200127-0004/', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://lists.apache.org/thread.html/rfa57d9c2a27d3af14c69607fb1a3da00e758b2092aa88eb6a51b6e99@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r5c14fdcabdeaba258857bcb67198652e4dce1d33ddc590cd81d82393@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-gww7-p5w4-wrfv', 'https://lists.apache.org/thread.html/ra2e572f568de8df5ba151e6aebb225a0629faaf0476bf7c7ed877af8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r707d23bb9ee245f50aa909add0da6e8d8f24719b1278ddd99d2428b2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8831b7fa5ca87a1cf23ee08d6dedb7877a964c1d2bd869af24056a63@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5c3644c97f0434d1ceb48ff48897a67bdbf3baf7efbe7d04625425b3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd49cfa41bbb71ef33b53736a6af2aa8ba88c2106e30f2a34902a87d2@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2c77dd6ab8344285bd8e481b57cf3029965a4b0036eefccef74cdd44@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7a0821b44247a1e6c6fe5f2943b90ebc4f80a8d1fb0aa9a8b29a59a2@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb532fed78d031fff477fd840b81946f6d1200f93a63698dae65aa528@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3f8180d0d25a7c6473ebb9714b0c1d19a73f455ae70d0c5fefc17e6c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r909c822409a276ba04dc2ae31179b16f6864ba02c4f9911bdffebf95@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2526', 'https://lists.apache.org/thread.html/rd6c6fef14944f3dcfb58d35f9317eb1c32a700e86c1b5231e45d3d0b@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r5d3d10fdf28110da3f9ac1b7d08d7e252f98d7d37ce0a6bd139a2e4f@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20330', 'https://lists.apache.org/thread.html/r428735963bee7cb99877b88d3228e28ec28af64646455c4f3e7a3c94@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.10.1...jackson-databind-2.9.10.2', 'https://lists.apache.org/thread.html/rd1f346227e11fc515914f3a7b20d81543e51e5822ba71baa0452634a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r50f513772f12e1babf65c7c2b9c16425bac2d945351879e2e267517f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra5ce96faec37c26b0aa15b4b6a8b1cbb145a748653e56ae83e9685d0@%3Cnotifications.zookeeper.apache.org%3E'}
| null |
GHSA
|
GHSA-qc8j-m8j3-rjq6
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
| null |
2021-12-03T14:24:20Z
|
2018-09-17T21:57:58Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'https://github.com/advisories/GHSA-qc8j-m8j3-rjq6'}
| null |
GHSA
|
GHSA-hhm3-48h2-597v
|
Insufficiently Protected Credentials in Apache Superset
|
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
|
{'CVE-2021-44451'}
|
2022-02-10T22:41:08Z
|
2022-02-02T00:01:46Z
|
MODERATE
| 6.5
|
{'CWE-522'}
|
{'https://github.com/advisories/GHSA-hhm3-48h2-597v', 'https://lists.apache.org/thread/xww1pccs2ckb5506wrf1v4lmxg198vkb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44451'}
| null |
GHSA
|
GHSA-43f8-2h32-f4cj
|
Regular Expression Denial of Service in hosted-git-info
|
The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity
|
{'CVE-2021-23362'}
|
2022-03-18T20:25:44Z
|
2021-05-06T16:10:39Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/pull/76', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://github.com/advisories/GHSA-43f8-2h32-f4cj', 'https://github.com/npm/hosted-git-info/commits/v2'}
| null |
GHSA
|
GHSA-67mq-h2r9-rh2m
|
Prototype pollution in multi-ini
|
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
|
{'CVE-2020-28460'}
|
2021-04-13T15:23:41Z
|
2021-04-13T15:23:41Z
|
HIGH
| 5.6
|
{'CWE-1321'}
|
{'https://github.com/advisories/GHSA-67mq-h2r9-rh2m', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}
| null |
GHSA
|
GHSA-95q3-8gr9-gm8w
|
Denial of Service by Uncontrolled Resource Consumption
|
Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.
|
{'CVE-2021-27923'}
|
2021-12-07T17:53:04Z
|
2021-03-18T19:54:43Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/', 'https://security.gentoo.org/glsa/202107-33', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27923', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/', 'https://github.com/advisories/GHSA-95q3-8gr9-gm8w'}
| null |
GHSA
|
GHSA-x28w-hvwc-mp75
|
Static Code Injection in Microweber
|
Microweber is a new generation CMS with drag and drop. Prior to version 1.3, Microweber is vulnerable to static code injection.
|
{'CVE-2022-0895'}
|
2022-03-25T17:18:06Z
|
2022-03-11T00:02:35Z
|
HIGH
| 7.7
|
{'CWE-94', 'CWE-96'}
|
{'https://github.com/advisories/GHSA-x28w-hvwc-mp75', 'https://huntr.dev/bounties/3c070828-fd00-476c-be33-9c877172363d', 'https://github.com/microweber/microweber/commit/b2baab6e582b2efe63788d367a2bb61a2fa26470', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0895'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.