ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-6xq8-pvg4-3mf3
Moderate severity vulnerability that affects org.eclipse.rdf4j:rdf4j-runtime
Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file.
{'CVE-2018-1000644'}
2021-09-02T19:12:41Z
2018-10-19T16:54:11Z
CRITICAL
10
{'CWE-611'}
{'https://github.com/eclipse/rdf4j/issues/1056', 'https://0dd.zone/2018/08/05/rdf4j-XXE/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000644', 'https://github.com/advisories/GHSA-6xq8-pvg4-3mf3'}
null
GHSA
GHSA-ghhm-xrwp-75m9
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control
{'CVE-2021-4194'}
2022-01-14T19:39:05Z
2022-01-08T00:34:12Z
MODERATE
4.3
{'CWE-668', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114', 'https://github.com/advisories/GHSA-ghhm-xrwp-75m9'}
null
GHSA
GHSA-762c-v946-pf25
Malicious Package in bpi39
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d...
null
2021-10-01T20:44:47Z
2020-09-04T16:47:33Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1373', 'https://github.com/advisories/GHSA-762c-v946-pf25'}
null
GHSA
GHSA-vf7h-6246-hm43
The disqualify lead action may be executed without CSRF token check
### Summary The attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack. ### Workarounds There are no workarounds that address this vulnerability.
{'CVE-2021-39198'}
2021-11-22T18:17:11Z
2021-11-19T20:18:54Z
MODERATE
4.2
{'CWE-352'}
{'https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39198', 'https://github.com/advisories/GHSA-vf7h-6246-hm43'}
null
GHSA
GHSA-w8qp-hmh5-4v9v
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen...
null
2022-04-29T16:23:00Z
2022-04-29T16:22:58Z
CRITICAL
0
{'CWE-281'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge', 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v', 'https://github.com/advisories/GHSA-w8qp-hmh5-4v9v'}
null
GHSA
GHSA-r3x4-wr4h-pw33
Sandbox Breakout / Arbitrary Code Execution in safer-eval
Versions of `safer-eval` prior to 1.3.4 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. For example, evaluating he string `console.constructor.constructor('return process')().env` prints `process.env` to the con...
{'CVE-2019-10759'}
2021-07-27T22:20:06Z
2019-10-21T21:58:34Z
CRITICAL
9.9
{'CWE-94'}
{'https://github.com/advisories/GHSA-r3x4-wr4h-pw33', 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-173772', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10759', 'https://www.npmjs.com/advisories/1021'}
null
GHSA
GHSA-455m-q3h9-34pf
Downloads Resources over HTTP in windows-seleniumjar-mirror
Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system...
{'CVE-2016-10670'}
2021-01-08T21:17:35Z
2019-02-18T23:44:29Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10670', 'https://github.com/advisories/GHSA-455m-q3h9-34pf', 'https://www.npmjs.com/advisories/281', 'https://nodesecurity.io/advisories/281'}
null
GHSA
GHSA-rfgg-vccr-m46m
Missing release of memory in sized-chunks
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, clone can have a memory-safety issue upon a panic.
{'CVE-2020-25794'}
2021-08-25T20:45:58Z
2021-08-25T20:45:58Z
HIGH
7.5
{'CWE-401'}
{'https://github.com/advisories/GHSA-rfgg-vccr-m46m', 'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25794'}
null
GHSA
GHSA-mc7w-4cjf-c973
OS Command Injection in node-opencv
utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.
{'CVE-2019-10061'}
2021-10-12T22:06:57Z
2021-10-12T22:06:57Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10061', 'https://www.npmjs.com/advisories/789', 'https://github.com/advisories/GHSA-mc7w-4cjf-c973', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99d...
null
GHSA
GHSA-36hp-jr8h-556f
Authentication Bypass
When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L8...
{'CVE-2021-29441'}
2021-05-10T14:56:08Z
2021-04-27T20:09:17Z
HIGH
0
{'CWE-290'}
{'https://github.com/alibaba/nacos/pull/4703', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441', 'https://github.com/advisories/GHSA-36hp-jr8h-556f', 'https://github.com/alibaba/nacos/issues/4701'}
null
GHSA
GHSA-fw4p-36j9-rrj3
Denial of Service in sequelize
Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the excepti...
null
2020-09-03T20:25:33Z
2020-09-03T20:25:33Z
MODERATE
0
null
{'https://www.npmjs.com/advisories/1142', 'https://github.com/advisories/GHSA-fw4p-36j9-rrj3', 'https://github.com/sequelize/sequelize/pull/11877'}
null
GHSA
GHSA-xwg3-qrcg-w9x6
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through ...
{'CVE-2021-31404'}
2022-04-19T19:02:54Z
2021-04-19T14:51:25Z
MODERATE
4
{'CWE-208', 'CWE-203'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31404', 'https://vaadin.com/security/cve-2021-31404', 'https://github.com/advisories/GHSA-xwg3-qrcg-w9x6', 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6', 'https://github.com/vaadin/flow/pull/9875'}
null
GHSA
GHSA-jppx-hw2f-8gx4
Downloads Resources over HTTP in chromedriver126
Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `c...
{'CVE-2016-10609'}
2021-01-08T18:32:36Z
2019-02-18T23:33:30Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10609', 'https://nodesecurity.io/advisories/203', 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4', 'https://www.npmjs.com/advisories/203'}
null
GHSA
GHSA-mfv8-q39f-mgfg
Cross-site Scripting in invenio-communities
## Cross-Site Scripting (XSS) vulnerability in Jinja templates ### Impact A Cross-Site Scripting (XSS) vulnerability was discovered in two Jinja templates in the Invenio-Communities module. The vulnerability allows a user to create a new community and include script element tags inside the description and page fields....
{'CVE-2019-1020005'}
2021-04-12T21:50:38Z
2019-07-16T00:52:26Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-mfv8-q39f-mgfg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020005', 'https://github.com/inveniosoftware/invenio-communities/security/advisories/GHSA-mfv8-q39f-mgfg'}
null
GHSA
GHSA-7rg4-266c-jqw6
Predictable CSRF tokens in centreon/centreon
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
{'CVE-2021-28055'}
2021-06-08T20:12:56Z
2021-06-08T20:12:56Z
MODERATE
6.5
{'CWE-352', 'CWE-330'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28055', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/releases/tag/2.8.37', 'https://github.com/advisories/GHSA-7rg4-266c-jqw6', 'https://github.c...
null
GHSA
GHSA-99ch-8mvp-g7m5
Critical severity vulnerability that affects md2pdf
converter.rb in the md2pdf gem 0.0.1 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a filename.
{'CVE-2013-1948'}
2021-12-02T22:35:47Z
2017-10-24T18:33:37Z
CRITICAL
0
null
{'http://osvdb.org/92290', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1948', 'http://vapid.dhs.org/advisories/md2pdf-remote-exec.html', 'http://www.securityfocus.com/bid/59061', 'https://github.com/advisories/GHSA-99ch-8mvp-g7m5', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83416'}
null
GHSA
GHSA-c6j7-4fr9-c76p
Incorrect permissions in Apache Ozone
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
{'CVE-2021-39235'}
2021-11-23T18:17:41Z
2021-11-23T18:17:41Z
MODERATE
6.5
{'CWE-732'}
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39235', 'http://www.openwall.com/lists/oss-security/2021/11/19/6', 'https://github.com/advisories/GHSA-c6j7-4fr9-c76p'}
null
GHSA
GHSA-m9hw-7xfv-wqg7
Prototype Pollution in json-logic-js
Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution. The follo...
null
2020-11-12T19:36:14Z
2020-11-12T19:36:14Z
HIGH
0
{'CWE-471'}
{'https://github.com/advisories/GHSA-m9hw-7xfv-wqg7', 'https://www.npmjs.com/advisories/1542', 'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b', 'https://www.npmjs.com/package/json-logic-js'}
null
GHSA
GHSA-wm2r-rp98-8pmh
Exposure of SSH credentials in Rancher/Fleet
### Impact This vulnerability only affects customers using Fleet for continuous delivery with authenticated Git and/or Helm repositories. A security vulnerability ([CVE-2022-29810](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29810)) was discovered in `go-getter` library in versions prior to [`v1.5.11`](htt...
null
2022-04-27T21:09:14Z
2022-04-27T21:09:13Z
LOW
0
{'CWE-200'}
{'https://github.com/rancher/rancher/security/advisories/GHSA-wm2r-rp98-8pmh', 'https://github.com/advisories/GHSA-wm2r-rp98-8pmh'}
null
GHSA
GHSA-9p47-w5xp-f4xr
Downloads Resources over HTTP in windows-build-tools
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runnin...
{'CVE-2017-16003'}
2021-01-08T19:03:26Z
2018-11-09T17:48:37Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/304', 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://nodesecurity.io/advisories/304', 'https://github.com/felixrie...
null
GHSA
GHSA-hjp8-2cm3-cc45
Cookie exposure in requestretry
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites.
{'CVE-2022-0654'}
2022-03-03T22:02:14Z
2022-02-24T00:00:54Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a', 'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc', 'https://github.com/advisories/GHSA-hjp8-2cm3-cc45', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654'}
null
GHSA
GHSA-w2f4-hxpm-mq98
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2021-3915'}
2021-11-17T21:12:03Z
2021-11-15T23:17:37Z
HIGH
7.6
{'CWE-434'}
{'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915', 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/advisories/GHSA-w2f4-hxpm-mq98'}
null
GHSA
GHSA-748f-wv76-x9hg
Arbitrary file upload in Fork CMS
Arbitrary file upload vulnerability in Fork CMS 5.9.2 allows attackers to create or replace arbitrary files in the /themes directory via a crafted zip file uploaded to the Themes panel.
{'CVE-2021-28931'}
2021-09-08T17:26:26Z
2021-09-08T17:26:26Z
HIGH
8.8
{'CWE-434'}
{'https://github.com/bousalman/ForkCMS-arbitrary-upload/blob/main/README.md', 'https://github.com/forkcms/forkcms/pull/3351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28931', 'https://github.com/advisories/GHSA-748f-wv76-x9hg', 'https://github.com/forkcms/forkcms/releases/tag/5.9.2'}
null
GHSA
GHSA-59q2-x2qc-4c97
Heap OOB access in unicode ops
### Impact An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`: ```python import tensorflow as tf input_values = tf.constant([58], shape=[1], dtype=tf.int32) input_splits = tf.constant([[81, 101, 0]], shape=[3], dtype=tf.int32) output_encoding = "UTF-8" tf.raw_ops.Unic...
{'CVE-2021-29559'}
2021-05-21T14:24:54Z
2021-05-21T14:24:54Z
LOW
2.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-59q2-x2qc-4c97', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97', 'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29559'}
null
GHSA
GHSA-f96g-24cg-f24w
SQL Injection in odata4j
odata4j 0.7.0 allows ExecuteJPQLQueryCommand.java SQL injection. NOTE: this product is apparently discontinued.
{'CVE-2016-11024'}
2021-05-07T15:52:41Z
2021-05-07T15:52:41Z
HIGH
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-11024', 'https://github.com/advisories/GHSA-f96g-24cg-f24w', 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}
null
GHSA
GHSA-hwcf-pp87-7x6p
Moderate severity vulnerability that affects ejs
nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the ejs.renderFile() resulting in code injection
{'CVE-2017-1000188'}
2021-09-14T17:32:10Z
2017-11-30T23:15:05Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'http://www.securityfocus.com/bid/101889', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188', 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}
null
GHSA
GHSA-4vrf-ff7v-hpgr
Division by zero in TFLite's implementation of `EmbeddingLookup`
The implementation of the `EmbeddingLookup` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74): ```cc const int row_size = SizeOfDimension(value, 0); const int row_bytes ...
{'CVE-2021-29596'}
2021-05-21T14:27:51Z
2021-05-21T14:27:51Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29596'}
null
GHSA
GHSA-66rh-8fw6-59q6
Prototype Pollution in assign-deep
Versions of `assign-deep` prior to 1.0.1 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation Upgrade...
{'CVE-2019-10745'}
2021-07-27T21:04:17Z
2019-08-21T16:15:13Z
HIGH
7.5
{'CWE-20', 'CWE-915'}
{'https://www.npmjs.com/advisories/1014', 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745', 'https://github.com/advisories/GHSA-66rh-8fw6-59q6'}
null
GHSA
GHSA-3wxm-m9m4-cprj
Import of incorrectly embargoed keys could cause early publication
### Impact If your installation is using the `export-importer` service, there is potential impact. If your installation is not importing keys via the `export-importer` services, your installation is not impacted. In versions `0.19.1` and earlier, the `export-importer` service assumed that the server it was importing ...
null
2021-05-21T16:24:44Z
2021-05-21T16:24:44Z
MODERATE
0
null
{'https://github.com/google/exposure-notifications-server/security/advisories/GHSA-3wxm-m9m4-cprj', 'https://github.com/advisories/GHSA-3wxm-m9m4-cprj'}
null
GHSA
GHSA-h676-pjr4-hgqx
Path Traversal in S-Cart
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
{'CVE-2021-44111'}
2022-02-26T00:28:57Z
2022-02-12T00:00:42Z
MODERATE
4.4
{'CWE-22'}
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111', 'https://github.com/s-cart/s-cart/issues/102', 'https://github.com/advisories/GHSA-h676-pjr4-hgqx'}
null
GHSA
GHSA-h9wr-xr4r-66fh
Cross-Site Scripting in dmn-js-properties-panel
Versions of `dmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website. ## Recommendation Upgrade to version 0.3.0 or later.
null
2021-09-29T16:21:29Z
2020-09-03T18:20:20Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1081', 'https://github.com/advisories/GHSA-h9wr-xr4r-66fh'}
null
GHSA
GHSA-x3v8-c8qx-3j3r
Null pointer exception in `DeserializeSparse`
### Impact The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference: ```python import tensorflow as tf dataset = tf.data.Dataset.range(3) @tf.function...
{'CVE-2021-41215'}
2021-11-10T18:57:45Z
2021-11-10T18:57:45Z
MODERATE
5.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41215', 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850', 'https://github.com/advisories/GHSA-x3v8-c8qx-3j3r'}
null
GHSA
GHSA-fpqp-v323-44xv
Cross-site scripting in Apache Ranger
Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix.
{'CVE-2019-12397'}
2021-08-17T20:42:33Z
2019-08-16T14:01:35Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12397', 'https://github.com/advisories/GHSA-fpqp-v323-44xv', 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/08/08/1', 'https://cwiki.apache.org/confl...
null
GHSA
GHSA-8xc6-g8xw-h2c4
YARP Denial of Service Vulnerability
### Impact A denial of service vulnerability exists in how YARP processes input. ### Patches If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1). If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1....
{'CVE-2022-26924'}
2022-05-03T17:43:20Z
2022-04-22T20:23:44Z
HIGH
7.5
null
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-8xc6-g8xw-h2c4', 'ht...
null
GHSA
GHSA-9gph-22xh-8x98
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36179'}
2022-04-25T22:00:43Z
2021-12-09T19:15:54Z
HIGH
8.1
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36179', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-9gph-22xh-8x98', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//s...
null
GHSA
GHSA-f2rp-4rv7-fc95
Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox
A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmo...
{'CVE-2021-20259'}
2021-06-16T20:01:38Z
2021-06-10T15:54:43Z
HIGH
7.8
{'CWE-200'}
{'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1', 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20259', 'https://github.com/advisories/GHSA-f2rp-4rv7-fc95', 'https://bugzilla.redhat.com/s...
null
GHSA
GHSA-h96f-fc7c-9r55
Regex denial of service vulnerability in codesample plugin
### Impact A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the `codesample` plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the `codesample` plugin using TinyMCE 5.5.1 or lower. ### Pa...
null
2021-01-06T19:25:46Z
2021-01-06T19:25:46Z
LOW
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-h96f-fc7c-9r55', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55', 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes', 'https://www.npmjs.com/package/tinymce'}
null
GHSA
GHSA-9hc2-w9gg-q6jw
Malicious Package in boogeyman
All versions of `boogeyman` are considered malicious. This particular package would download a payload from pastebin.com, eval it to read ssh keys and the users `.npmrc` and send them to a private pastebin account. ## Recommendation This package was published to the npm Registry for a very short period of time. If y...
null
2021-10-01T13:28:14Z
2020-09-01T21:07:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-9hc2-w9gg-q6jw', 'https://www.npmjs.com/advisories/677'}
null
GHSA
GHSA-r53v-vm87-f72c
Moderate severity vulnerability that affects org.apache.axis:axis
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a co...
{'CVE-2014-3596'}
2021-09-17T14:17:16Z
2018-10-16T20:50:58Z
MODERATE
0
{'CWE-297'}
{'http://www.securityfocus.com/bid/69295', 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3596', 'https://issues.apach...
null
GHSA
GHSA-xm99-6pv5-q363
OS Command injection in github.com/kardianos/service
service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory. The validity of this vulnerability has been [questioned](https://github.com/kardianos/service/pull/290#issuecomment-1109831505) and the reporter h...
{'CVE-2022-29583'}
2022-04-28T20:47:58Z
2022-04-23T00:03:03Z
HIGH
0
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29583', 'https://github.com/advisories/GHSA-xm99-6pv5-q363', 'https://github.com/kardianos/service/issues/289', 'https://github.com/kardianos/service/pull/290'}
null
GHSA
GHSA-2pmw-cvc7-frvh
SQL injection in MCMS
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
{'CVE-2021-44868'}
2022-03-01T22:03:05Z
2022-02-18T00:00:34Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-2pmw-cvc7-frvh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44868', 'https://github.com/ming-soft/MCMS/issues/58'}
null
GHSA
GHSA-jr2m-29wj-w9qc
SQL Injection in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.
{'CVE-2022-25506'}
2022-03-29T21:09:43Z
2022-03-12T00:00:37Z
MODERATE
6.5
{'CWE-89'}
{'https://github.com/advisories/GHSA-jr2m-29wj-w9qc', 'https://github.com/FreeTAKTeam/UI/issues/27', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25506'}
null
GHSA
GHSA-jgjc-332c-8cmc
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
{'CVE-2019-18622'}
2021-08-19T16:24:17Z
2020-01-16T21:56:15Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00002.html', 'https://security.gentoo.org/glsa/202003-39', 'https://www.phpmyadmin.net/security/PMASA-2019-5/', 'https://github.com/advisories/GHSA-jgjc-332c-8cmc', 'https://lists.fedoraproject.org/archi...
null
GHSA
GHSA-mvff-h3cj-wj9c
Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux
### Impact Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind moun...
{'CVE-2021-43816'}
2022-02-16T22:03:34Z
2022-01-06T17:36:59Z
HIGH
8
{'CWE-281'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43816', 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c', 'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299', 'https://github.com/advisories/GHSA-mvff-h3cj-wj9c', 'https://lists.fedoraproject.org/archives/...
null
GHSA
GHSA-xxgp-pcfc-3vgc
Privilege Escalation in Hibernate Validator
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access thos...
{'CVE-2017-7536'}
2022-03-31T22:00:46Z
2020-06-15T19:57:48Z
HIGH
7
{'CWE-470'}
{'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2017:3456', 'http://www.securityfocus.com/bid/101048', 'https://access.redhat.com/errata/RHSA-2018:3817', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a6...
null
GHSA
GHSA-j23j-q57m-63v3
Denial of service in DataCommunicator class in Vaadin 8
Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
null
2021-10-13T18:54:50Z
2021-10-13T18:54:50Z
MODERATE
4.3
{'CWE-400'}
{'https://vaadin.com/security/cve-2021-33609', 'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3', 'https://github.com/vaadin/framework/pull/12415', 'https://github.com/advisories/GHSA-j23j-q57m-63v3'}
null
GHSA
GHSA-qq74-vgcf-54c3
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0946'}
2022-03-23T15:38:13Z
2022-03-15T00:01:00Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0946', 'https://github.com/advisories/GHSA-qq74-vgcf-54c3', 'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1'}
null
GHSA
GHSA-6jmf-mxwf-r3jc
Exposure of Sensitive Information to an Unauthorized Actor in Apache Kafka
When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issu...
{'CVE-2019-12399'}
2022-04-22T17:26:58Z
2020-05-12T00:39:27Z
HIGH
7.5
{'CWE-319'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0e3a613705d70950aca2bfe9a6265c87503...
null
GHSA
GHSA-pmfr-63c2-jr5c
Execution Control List (ECL) Is Insecure in Singularity
### Impact The Singularity Execution Control List (ECL) allows system administrators to set up a policy that defines rules about what signature(s) must be (or must not be) present on a SIF container image for it to be permitted to run. In Singularity 3.x versions below 3.6.0, the following issues allow the ECL to be ...
{'CVE-2020-13845'}
2022-04-19T19:02:30Z
2021-12-20T18:24:30Z
HIGH
7.5
{'CWE-347', 'CWE-354'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13845', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00053.html', 'https://github.com/advisories/GHSA-pmfr-63c2-jr5c', 'https://github.com/hpcng/singularity/security/advisories/GHSA-pmfr-63c2-jr5c', 'http://lists.opensuse.org/opensuse-security-announce/202...
null
GHSA
GHSA-mfc2-93pr-jf92
Malicious code in `loadyaml`
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information: - IP and IP-based geolocation - home directory name - local username The maliciou...
null
2021-10-04T21:21:29Z
2020-10-01T17:10:15Z
CRITICAL
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/1563', 'https://github.com/advisories/GHSA-mfc2-93pr-jf92'}
null
GHSA
GHSA-f2rp-38vg-j3gh
Null characters not escaped
### Impact Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows): ```javascript const cp = require("child_process"); const s...
{'CVE-2021-21384'}
2021-03-22T14:18:23Z
2021-03-18T23:47:56Z
HIGH
6.3
{'CWE-88'}
{'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3', 'https://github.com/advisories/GHSA-f2rp-38vg-j3gh', 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh', 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b', 'https://www.npmj...
null
GHSA
GHSA-28mg-98xm-q493
Open Redirect in archivy
archivy prior to version 1.7.1 is vulnerable to open redirect.
{'CVE-2022-0697'}
2022-04-05T00:13:22Z
2022-03-08T00:00:32Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml', 'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697', 'https://github.com/archivy/archivy/releases/tag/v1.7.1', 'https://github.com/archivy/archivy/commit/2d8cb2985319...
null
GHSA
GHSA-h24f-9mm4-w336
Cross-site Scripting (XSS) - Stored in crud-file-server
Versions of `crud-file-server` before 0.8.0 are vulnerable to stored cross-site scripting (XSS). This is due to insufficient santiziation of filenames when directory index is served by `crud-file-server`. ## Recommendation Update to version 0.8.0 or later.
{'CVE-2018-3726'}
2021-01-08T18:44:58Z
2018-07-18T18:34:27Z
CRITICAL
0
{'CWE-79'}
{'https://hackerone.com/reports/311101', 'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3726', 'https://github.com/advisories/GHSA-h24f-9mm4-w336', 'https://www.npmjs.com/advisories/570'}
null
GHSA
GHSA-5p9f-55j8-922m
Moderate severity vulnerability that affects doorkeeper
Withdrawn, accidental duplicate publish. The Doorkeeper gem before 4.2.0 for Ruby might allow remote attackers to conduct replay attacks or revoke arbitrary tokens by leveraging failure to implement the OAuth 2.0 Token Revocation specification.
null
2021-12-02T23:15:16Z
2018-08-13T20:49:10Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-6582', 'https://github.com/advisories/GHSA-5p9f-55j8-922m'}
null
GHSA
GHSA-7hwc-46rm-65jh
Denial of service in XStream
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
{'CVE-2017-7957'}
2021-09-22T18:46:26Z
2020-06-30T22:48:24Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/advisories/GHSA-7hwc-46rm-65jh', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://access.redhat.com/errata/RHSA-2017...
null
GHSA
GHSA-whv6-rj84-2vh2
Cross-Site Scripting in nextcloud-vue-collections
Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's b...
null
2021-10-04T20:36:43Z
2020-09-04T17:21:58Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-whv6-rj84-2vh2', 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583', 'https://www.npmjs.com/advisories/1442'}
null
GHSA
GHSA-9328-7pcw-vw69
Cross-Site Request Forgery in Moodle
Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course.
{'CVE-2020-1692'}
2022-01-06T18:34:53Z
2022-01-06T18:34:53Z
MODERATE
6.5
{'CWE-352'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1692', 'https://github.com/advisories/GHSA-9328-7pcw-vw69', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1692'}
null
GHSA
GHSA-247x-2f9f-5wp7
Stack overflow in TensorFlow
### Impact The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`: ``` library { function { signature { name: "So...
{'CVE-2022-23591'}
2022-02-11T20:00:23Z
2022-02-09T23:30:01Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23591', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
null
GHSA
GHSA-2xw8-j43j-5vxp
elgg is vulnerable to Cross-site Scripting
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4072'}
2022-01-06T21:35:42Z
2022-01-06T21:35:42Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955', 'https://github.com/advisories/GHSA-2xw8-j43j-5vxp', 'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072'}
null
GHSA
GHSA-53x6-4x5p-rrvv
Denial of Service in Apache Commons Compress
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
{'CVE-2019-12402'}
2022-04-22T17:30:59Z
2019-10-11T18:41:08Z
HIGH
7.5
{'CWE-835'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLJIK2AUOZOWXR3S5XXBUNMOF3RTHTI7/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r05cf37c1e1e662e968cfece1102fcd50fe207181fdbf2c30aadfafd3@%3Cissues.flink.apache.org%3E', '...
null
GHSA
GHSA-p2c4-gxp4-j3xp
Denial of service in Valine
Valine is a fast, simple & powerful comment system. Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.
{'CVE-2021-34801'}
2022-05-04T03:11:26Z
2021-06-21T17:11:25Z
MODERATE
5.3
{'CWE-94'}
{'https://github.com/xCss/Valine/issues/366', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34801', 'https://github.com/advisories/GHSA-p2c4-gxp4-j3xp'}
null
GHSA
GHSA-3xc7-xg67-pw99
Sensitive Data Exposure in sequelize-cli
Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text. ## Recommendation Upgrade to version 5.5.0 or later.
null
2021-08-04T20:54:46Z
2019-06-05T20:43:10Z
LOW
3.5
{'CWE-532'}
{'https://github.com/sequelize/cli/pull/722', 'https://github.com/advisories/GHSA-3xc7-xg67-pw99', 'https://github.com/sequelize/cli/issues/172', 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320', 'https://www.npmjs.com/advisories/825'}
null
GHSA
GHSA-9cwv-cppx-mqjm
Improper Authentication in Capsule Proxy
### Impact Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`. ### Patches Patch has been merged in the v0.2.1 release. ### Workarounds...
{'CVE-2022-23652'}
2022-04-19T19:03:24Z
2022-02-23T21:17:25Z
HIGH
8.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8', 'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/issues/188', 'https://nvd.nist.gov/vuln/detail/C...
null
GHSA
GHSA-399h-cmvp-qgx5
Incorrect Default Permissions in Binance tss-lib
The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.
{'CVE-2020-12118'}
2021-06-29T21:32:11Z
2021-06-29T21:32:11Z
HIGH
7.2
{'CWE-276'}
{'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0', 'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311', 'https://github.com/binance-chain/tss-lib/pull/89', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118', 'https://github.com/advisories/GHSA-399h-cmvp-qgx5'...
null
GHSA
GHSA-jpwx-ffjq-wr4w
Content object state fetch functions open to SQL injection
### Impact This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible. ### Patches The ...
null
2021-09-07T22:54:23Z
2021-09-07T22:54:23Z
HIGH
0
{'CWE-89'}
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection', 'https://github.com/advisories/GHSA-jpwx-ffjq-wr4w', 'https://github.com/ezsystems/ezpublish-l...
null
GHSA
GHSA-6jmh-9gqm-5xrx
Cross-Site Request Forgery (CSRF) in livehelperchat
A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed.
{'CVE-2022-0226'}
2022-01-26T20:21:03Z
2022-01-26T20:21:03Z
MODERATE
4.3
{'CWE-352'}
{'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370', 'https://github.com/advisories/GHSA-6jmh-9gqm-5xrx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226'}
null
GHSA
GHSA-g8hw-794c-4j9g
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext),...
{'CVE-2018-1271'}
2021-10-21T21:29:40Z
2018-10-17T20:07:03Z
MODERATE
5.9
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1271', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/103699', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-aler...
null
GHSA
GHSA-2m34-jcjv-45xf
XSS in Django
An issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
{'CVE-2020-13596'}
2021-08-25T21:58:12Z
2020-06-05T16:24:28Z
MODERATE
6.1
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/', 'https://security.netapp.com/advisory/ntap-20200611-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13596', 'https://www.djang...
null
GHSA
GHSA-4f6x-49g2-99fm
Cross-site Scripting in Mermaid
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
{'CVE-2021-35513'}
2021-12-10T18:57:41Z
2021-12-10T18:57:41Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2', 'https://github.com/mermaid-js/mermaid/issues/2122', 'https://github.com/mermaid-js/mermaid/pull/2123', 'https://github.com/advisories/GHSA-4f6x-49g2-99fm', 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e...
null
GHSA
GHSA-vxh3-mvv7-265j
Cross-site scripting invenio-records
## Cross-Site Scripting (XSS) vulnerability in administration interface ### Impact A Cross-Site Scripting (XSS) vulnerability was discovered when rendering JSON for a record in the administration interface. The vulnerability could be exploited by e.g. a user who had access to upload a new record, that an admin user wo...
{'CVE-2019-1020003'}
2021-04-12T21:46:34Z
2019-07-16T00:52:15Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j', 'https://github.com/advisories/GHSA-vxh3-mvv7-265j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020003'}
null
GHSA
GHSA-rm7f-mpcj-w4f6
Command injection in Apache Unomi
Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.
{'CVE-2021-31164'}
2021-06-16T17:17:24Z
2021-06-16T17:17:24Z
HIGH
7.5
{'CWE-74'}
{'http://unomi.apache.org/security/cve-2021-31164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31164', 'https://github.com/advisories/GHSA-rm7f-mpcj-w4f6'}
null
GHSA
GHSA-jcw8-r9xm-32c6
Command Injection in dns-sync
Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method. ## Recommendation - Use an alternative dns resolver - Do not allow untrusted input into `dns-sync.resolve()`
{'CVE-2017-16100'}
2021-01-08T18:35:10Z
2018-07-18T18:28:02Z
CRITICAL
0
{'CWE-94'}
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://github.com/skoranga/node-dns-sync/issues/1)', 'https://github.com/skoranga/node-dns-sync/issues/1', 'https://github.com/skoranga/node-dns-sync/issues/5', 'https://www.npmjs.com/advisories/523', 'https://github.com/adv...
null
GHSA
GHSA-7g7r-gr46-q4p5
Cross-Site Request Forgery in yetiforce
Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users.
{'CVE-2022-0269'}
2022-01-31T21:47:29Z
2022-01-27T16:21:33Z
HIGH
8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0269', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://github.com/advisories/GHSA-7g7r-gr46-q4p5', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0'}
null
GHSA
GHSA-4xf9-pgvv-xx67
Regular Expression Denial of Service in simple-markdown
Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks. ## Recommendation Upgrade to version 0.5.2 or later.
null
2021-09-29T18:16:34Z
2020-09-03T20:27:46Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540', 'https://www.npmjs.com/advisories/1147', 'https://github.com/advisories/GHSA-4xf9-pgvv-xx67', 'https://github.com/Khan/simple-markdown/issues/71'}
null
GHSA
GHSA-c3cw-c387-pj65
Double free in crossbeam
An issue was discovered in the crossbeam crate before 0.4.1 for Rust. There is a double free because of destructor mishandling.
{'CVE-2018-20996'}
2021-08-25T20:43:21Z
2021-08-25T20:43:21Z
CRITICAL
9.8
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20996', 'https://github.com/advisories/GHSA-c3cw-c387-pj65', 'https://github.com/crossbeam-rs/crossbeam-epoch/issues/82', 'https://rustsec.org/advisories/RUSTSEC-2018-0009.html'}
null
GHSA
GHSA-pj7m-g53m-7638
Moderate severity vulnerability that affects bootstrap
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy. This is similar to CVE-2018-14042.
{'CVE-2018-14041'}
2021-06-15T16:33:24Z
2018-09-13T15:49:56Z
MODERATE
6.1
{'CWE-79'}
{'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://github.com/twbs/bootstrap/issues/26423', 'http://seclists.org/fulldisclosure/2019/May/10', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b...
null
GHSA
GHSA-4r3m-j6x5-48m3
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.
{'CVE-2020-15155'}
2022-04-19T19:02:32Z
2020-08-28T21:20:42Z
LOW
7.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-4r3m-j6x5-48m3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155', 'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f...
null
GHSA
GHSA-p6h9-gw49-rqm4
Moderate severity vulnerability that affects markdown2
An issue was discovered in markdown2 (aka python-markdown2) through 2.3.5. The safe_mode feature, which is supposed to sanitize user input against XSS, is flawed and does not escape the input properly. With a crafted payload, XSS can be triggered, as demonstrated by omitting the final '>' character from an IMG tag.
{'CVE-2018-5773'}
2021-09-16T16:04:09Z
2018-07-12T20:29:21Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-p6h9-gw49-rqm4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5773', 'https://github.com/trentm/python-markdown2/issues/285'}
null
GHSA
GHSA-qxxx-2pp7-5hmx
A deserialization flaw was discovered in the jackson-databind
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
{'CVE-2017-7525'}
2022-04-26T18:44:40Z
2018-10-16T17:21:35Z
CRITICAL
9.8
{'CWE-184', 'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E', 'http://ww...
null
GHSA
GHSA-qrmm-w4v4-q7f8
Unauthorized access through URL manipulation
### Impact The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. ### Patches The vulnerability has been patched in version 1.2.65 of the `master` branch, version 1.1.113 of the 1.1.x series, and version 1.0.12 of the `stable` branch. The Docker image on d...
null
2022-04-19T19:02:56Z
2021-05-06T15:27:22Z
HIGH
0
{'CWE-552'}
{'https://github.com/advisories/GHSA-qrmm-w4v4-q7f8', 'https://github.com/jhpyle/docassemble/security/advisories/GHSA-qrmm-w4v4-q7f8'}
null
GHSA
GHSA-c92m-rrrc-q5wf
High severity vulnerability that affects safemode
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
{'CVE-2016-3693'}
2021-09-08T21:49:15Z
2017-10-24T18:33:35Z
HIGH
8.1
{'CWE-200'}
{'http://projects.theforeman.org/issues/14635', 'http://theforeman.org/security.html#2016-3693', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693', 'http://www.openwall.com/lists/oss-security/2016/04/20/8', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f', 'https://github.com/advis...
null
GHSA
GHSA-8whr-v3gm-w8h9
Command Injection in node-rules
Versions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled. ## Recommendation Upgr...
null
2021-10-04T21:08:30Z
2020-09-03T15:51:04Z
HIGH
8.1
{'CWE-78'}
{'https://github.com/mithunsatheesh/node-rules/issues/84', 'https://www.npmjs.com/advisories/1499', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426', 'https://github.com/advisories/GHSA-8whr-v3gm-w8h9'}
null
GHSA
GHSA-v52p-hfjf-wg88
Division by zero in TFLite's implementation of `SpaceToBatchNd`
### Impact The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83): ```cc TF_LITE_ENSURE_EQ(context, final_dim_size % block_shape[d...
{'CVE-2021-29597'}
2021-05-21T14:27:54Z
2021-05-21T14:27:54Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708', 'https://github.com/advisories/GHSA-v52p-hfjf-wg88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29597', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88'}
null
GHSA
GHSA-r626-fc64-3q28
Data race in abox
An issue was discovered in the abox crate before 0.4.1 for Rust. Affected versions of this crate implements `Send`/`Sync` for `AtomicBox<T>` without requiring `T: Send`/`T: Sync`. This allows to create data races to `T: !Sync` and send `T: !Send` to another thread. Such behavior breaks the compile-time thread safety...
{'CVE-2020-36441'}
2021-08-25T20:59:06Z
2021-08-25T20:59:06Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0121.html', 'https://github.com/SonicFrog/abox/pull/2', 'https://github.com/SonicFrog/abox/issues/1', 'https://github.com/SonicFrog/abox/commit/34c2b9e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36441', 'https://github.com/advisories/GHSA-r626-fc64-3q28'}
null
GHSA
GHSA-g5q2-fcg9-j526
Malicious Package in hsf-clients
All versions of `hsf-clients` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be r...
null
2021-09-30T19:46:51Z
2020-09-03T17:40:18Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-g5q2-fcg9-j526', 'https://www.npmjs.com/advisories/1054'}
null
GHSA
GHSA-hrpp-f84w-xhfg
Outdated Static Dependency in vue-moment
Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability. ## Recommendation Upgrade to version 4...
null
2021-10-04T19:13:24Z
2020-09-04T16:55:06Z
MODERATE
5.3
{'CWE-1104'}
{'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934', 'https://github.com/advisories/GHSA-hrpp-f84w-xhfg', 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e', 'https://www.npmjs.com/advisories/532', 'https://www.npmjs.com/advisories/1425'}
null
GHSA
GHSA-34p9-f4q3-c4r7
Improper Certificate Validation in openssl
An issue was discovered in the openssl crate before 0.9.0 for Rust. There is an SSL/TLS man-in-the-middle vulnerability because certificate verification is off by default and there is no API for hostname verification.
{'CVE-2016-10931'}
2021-08-25T20:43:11Z
2021-08-25T20:43:11Z
HIGH
8.1
{'CWE-295'}
{'https://github.com/sfackler/rust-openssl/releases/tag/v0.9.0', 'https://rustsec.org/advisories/RUSTSEC-2016-0001.html', 'https://github.com/advisories/GHSA-34p9-f4q3-c4r7', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10931'}
null
GHSA
GHSA-6v7w-535j-rq5m
Moderate severity vulnerability that affects org.springframework:spring-core
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
{'CVE-2015-3192'}
2021-09-02T18:26:06Z
2018-10-17T20:29:12Z
MODERATE
5.5
{'CWE-119'}
{'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html', 'https://access.redhat.com/errata/RHSA-2016:1218', 'http://rhn.redhat.com/errata/RHSA-2016-1592.html', 'http://rhn.redhat.com/errata/RHSA-2016-1593.html', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://access.redhat.com/errata/RHSA-201...
null
GHSA
GHSA-whrh-9j4q-g7ph
CSRF Vulnerability in polaris-website
### Impact CSRF vulnerability: In some very specific circumstances, an attacker would be able to update your settings. Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings. ### Patch...
null
2021-09-23T18:38:12Z
2020-08-05T21:43:19Z
MODERATE
6.8
{'CWE-352'}
{'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph', 'https://github.com/advisories/GHSA-whrh-9j4q-g7ph', 'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d820...
null
GHSA
GHSA-rvfc-g8j5-9ccf
Generation of Error Message Containing Sensitive Information in keybloack
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
{'CVE-2020-1717'}
2022-02-09T00:59:06Z
2022-02-09T00:59:06Z
MODERATE
2.7
{'CWE-209'}
{'https://issues.jboss.org/browse/KEYCLOAK-12014', 'https://github.com/advisories/GHSA-rvfc-g8j5-9ccf', 'https://bugzilla.redhat.com/show_bug.cgi?id=1796281', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1717'}
null
GHSA
GHSA-fpj7-9xm6-8hgr
Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin
Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
{'CVE-2022-23106'}
2022-01-21T23:38:30Z
2022-01-21T23:38:30Z
MODERATE
5.3
{'CWE-208', 'CWE-203'}
{'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141', 'https://github.com/advisories/GHSA-fpj7-9xm6-8hgr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23106'}
null
GHSA
GHSA-qr95-4mq5-r3fh
Phar unserialization vulnerability in phpMussel
### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone using >= v1.0.0 < v1.6.0. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be prefe...
{'CVE-2020-4043'}
2021-01-08T20:12:51Z
2020-06-10T19:40:30Z
HIGH
7.7
{'CWE-502'}
{'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4043', 'https://github.com/advisories/GHSA-qr95-4mq5-r3fh', 'https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-...
null
GHSA
GHSA-pqqp-xmhj-wgcw
Data race in crossbeam-deque
### Impact In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause...
{'CVE-2021-32810'}
2022-04-19T19:03:04Z
2021-08-25T21:01:15Z
CRITICAL
9.8
{'CWE-362'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/', 'https://lists.fedoraproject.org/archives/list/package-...
null
GHSA
GHSA-pp4v-55vr-9gxh
Regular Expression Denial of Service in riot-compiler
Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability. ## Recommendation Update to version 2.3.22 or later.
{'CVE-2016-10527'}
2021-01-08T18:20:42Z
2019-02-18T23:39:13Z
MODERATE
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10527', 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh', 'https://nodesecurity.io/advisories/86', 'https://www.npmjs.com/advisories/86', 'https://github.com/riot/compiler/issues/46'}
null
GHSA
GHSA-v4rh-8p82-6h5w
Regular expression denial of service in url-regex
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
{'CVE-2020-7661'}
2021-09-22T18:35:59Z
2020-06-22T14:39:03Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/kevva/url-regex/issues/70', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7661', 'https://snyk.io/vuln/SNYK-JS-URLREGEX-569472', 'https://github.com/advisories/GHSA-v4rh-8p82-6h5w'}
null
GHSA
GHSA-x3v4-pxvm-63j8
HTTP Request Smuggling in reel
reel through 0.6.1 allows Request Smuggling attacks due to incorrect Content-Length and Transfer encoding header parsing. It is possible to conduct HTTP request smuggling attacks by sending the Content-Length header twice. Furthermore, invalid Transfer Encoding headers were found to be parsed as valid which could be le...
{'CVE-2020-7659'}
2021-05-24T18:13:36Z
2021-05-24T18:13:36Z
MODERATE
7.5
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7659', 'https://github.com/advisories/GHSA-x3v4-pxvm-63j8', 'https://snyk.io/vuln/SNYK-RUBY-REEL-569135'}
null
GHSA
GHSA-2ccw-7px8-vmpf
Open Redirect in Flask-AppBuilder
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later. ### For more information If you h...
{'CVE-2022-24776'}
2022-04-07T00:09:52Z
2022-03-25T19:27:39Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea', 'https://github.com/advisories/GHSA-2ccw-7px8-vmpf', 'https://nvd.nist.gov/vuln/detail...
null
GHSA
GHSA-cg54-gpgr-4rm6
user-readable api tokens in systemd units for JupyterHub
### Impact user API tokens issued to single-user servers are specified in the environment of systemd units, which are accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. ### Patches Patched in jupyterhub-systemdspawner v0.15 ### Workarounds No workaround...
{'CVE-2020-26261'}
2022-04-19T19:02:42Z
2020-12-09T16:27:43Z
HIGH
7.9
{'CWE-668'}
{'https://pypi.org/project/jupyterhub-systemdspawner/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26261', 'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580', 'https://github.com/jupyterhub/systemdspawner/blob/master/CHANGELOG.md#v015', 'https://github.com/advisories/GHSA-cg5...
null
GHSA
GHSA-7p8h-86p5-wv3p
Cross-site scripting
Two kinds of XSS were found: 1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2. Data cells identified as media will be rendered a...
{'CVE-2021-21422'}
2022-04-19T19:03:00Z
2021-06-28T17:18:04Z
HIGH
8.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21422', 'https://github.com/mongo-express/mongo-express/issues/577', 'https://github.com/advisories/GHSA-7p8h-86p5-wv3p', 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b', 'https://github.com/mongo-express/mongo-express/security...
null
GHSA
GHSA-4448-rc82-fcr7
Path Traversal in serve-here.js
Versions of serve-here.js prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
{'CVE-2019-5444'}
2021-09-22T18:40:57Z
2021-09-22T18:40:57Z
MODERATE
5.3
{'CWE-22'}
{'https://hackerone.com/reports/569966', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5444', 'https://www.npmjs.com/advisories/1019', 'https://github.com/advisories/GHSA-4448-rc82-fcr7'}
null