ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-85f9-w9cx-h363
Cross site request forgery in Jenkins Job and Node ownership Plugin
Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
{'CVE-2022-28150'}
2022-04-12T21:58:58Z
2022-03-30T00:00:23Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28150', 'https://github.com/advisories/GHSA-85f9-w9cx-h363', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}
null
GHSA
GHSA-9658-c26v-7qvf
Use-after-free in yottadb
An issue was discovered in the yottadb crate before 1.2.0 for Rust. For some memory-allocation patterns, ydb_subscript_next_st and ydb_subscript_prev_st have a use-after-free.
{'CVE-2021-27377'}
2021-08-25T20:55:30Z
2021-08-25T20:55:30Z
CRITICAL
9.8
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0022.html', 'https://github.com/advisories/GHSA-9658-c26v-7qvf', 'https://gitlab.com/YottaDB/Lang/YDBRust/-/issues/40', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27377'}
null
GHSA
GHSA-h2r4-4xgf-3865
Downloads Resources over HTTP in product-monitor
Affected versions of `product-monitor` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `product-monitor`. ## Recommendation Update to versions 2.2.5 or later.
{'CVE-2016-10567'}
2021-01-08T18:44:27Z
2019-02-18T23:35:32Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-h2r4-4xgf-3865', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10567', 'https://nodesecurity.io/advisories/171', 'https://www.npmjs.com/advisories/171'}
null
GHSA
GHSA-74j8-88mm-7496
Confused Deputy in Kubernetes
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
{'CVE-2020-8561'}
2021-10-04T14:15:18Z
2021-09-21T18:28:21Z
MODERATE
4.1
{'CWE-610', 'CWE-441'}
{'https://github.com/advisories/GHSA-74j8-88mm-7496', 'https://github.com/kubernetes/kubernetes/issues/104720', 'https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8561'}
null
GHSA
GHSA-c53x-wwx2-pg96
Cross-Site Scripting in @berslucas/liljs
Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation Upgrade to version 1.0.2 or later.
null
2021-09-28T17:27:44Z
2020-09-03T17:03:58Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/bersLucas/liljs/pull/7', 'https://www.npmjs.com/advisories/1016', 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2', 'https://github.com/advisories/GHSA-c53x-wwx2-pg96', 'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
null
GHSA
GHSA-8gjm-h3xj-mp6w
RPC call failure in ckb
An issue was discovered in the ckb crate before 0.40.0 for Rust. A get_block_template RPC call may fail in situations where it is supposed to select a Nervos CKB blockchain transaction with a higher fee rate than another transaction.
{'CVE-2021-45698'}
2022-01-07T17:55:53Z
2022-01-06T22:10:43Z
CRITICAL
9.8
null
{'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/ckb/RUSTSEC-2021-0107.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0107.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45698', 'https://github.com/advisories/GHSA-8gjm-h3xj-mp6w'}
null
GHSA
GHSA-gw55-jm4h-x339
Improper Validation of Certificate with Host Mismatch in Java-WebSocket
The Java-WebSocket Client does not perform hostname verification. - This means that SSL certificates of other hosts are accepted as long as they are trusted. To exploit this vulnerability an attacker has to perform a man-in-the-middle (MITM) attack between a Java application using the Java-WebSocket Client and an WebSocket server it's connecting to. - TLS normally protects users and systems against MITM attacks, it cannot if certificates from other trusted hosts are accepted by the client. For more information see: CWE-297: Improper Validation of Certificate with Host Mismatch - https://cwe.mitre.org/data/definitions/297.html ## Important note The OWASP Dependency-Check (https://jeremylong.github.io/DependencyCheck/index.html) may report that a dependency of your project is affected by this security vulnerability, but you don't use this lib. This is caused by the fuzzy search in the OWASP implementation. Check out this issue (https://github.com/TooTallNate/Java-WebSocket/issues/1019#issuecomment-628507934) for more information and a way to suppress the warning.
{'CVE-2020-11050'}
2022-04-19T19:02:25Z
2020-05-08T18:54:39Z
HIGH
9
{'CWE-297', 'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11050', 'https://github.com/TooTallNate/Java-WebSocket/security/advisories/GHSA-gw55-jm4h-x339', 'https://github.com/advisories/GHSA-gw55-jm4h-x339'}
null
GHSA
GHSA-fh63-4r66-jc7v
Cross-site scripting (XSS) in Apache Velocity Tools
The default error page for VelocityView in Apache Velocity Tools prior to 3.1 reflects back the vm file that was entered as part of the URL. An attacker can set an XSS payload file as this vm file in the URL which results in this payload being executed. XSS vulnerabilities allow attackers to execute arbitrary JavaScript in the context of the attacked website and the attacked user. This can be abused to steal session cookies, perform requests in the name of the victim or for phishing attacks.
{'CVE-2020-13959'}
2022-04-25T23:35:23Z
2021-03-12T20:24:22Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3%40%3Cuser.velocity.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13959', 'https://lists.apache.org/thread.html/r6802a38c3041059e763a1aadd7b37fe95de75408144b5805e29b84e3@%3Cuser.velocity.apache.org%3E', 'https://lists.apache.org/thread.html/r97edad0655770342d2d36620fb1de50b142fcd6c4f5c53dd72ca41d7@%3Cuser.velocity.apache.org%3E', 'https://security.gentoo.org/glsa/202107-52', 'https://github.com/advisories/GHSA-fh63-4r66-jc7v', 'https://lists.apache.org/thread.html/rf9868c564cff7adfd5283563f2309b93b3e496354a211a57503b2f72@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/10/2', 'https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00021.html'}
null
GHSA
GHSA-m6x4-97wx-4q27
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.datasources.PerUserPoolDataSource.
{'CVE-2020-36184'}
2022-04-22T18:17:12Z
2021-12-09T19:16:26Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-m6x4-97wx-4q27', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/issues/2998', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36184', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-6f89-8j54-29xf
Heap buffer overflow in `FractionalAvgPoolGrad`
### Impact The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf orig_input_tensor_shape = tf.constant([1, 3, 2, 3], shape=[4], dtype=tf.int64) out_backprop = tf.constant([2], shape=[1, 1, 1, 1], dtype=tf.int64) row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) tf.raw_ops.FractionalAvgPoolGrad( orig_input_tensor_shape=orig_input_tensor_shape, out_backprop=out_backprop, row_pooling_sequence=row_pooling_sequence, col_pooling_sequence=col_pooling_sequence, overlapping=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape. ### Patches We have patched the issue in GitHub commit [12c727cee857fa19be717f336943d95fca4ffe4f](https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29578'}
2021-05-21T17:08:41Z
2021-05-21T14:26:21Z
LOW
2.5
{'CWE-119', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29578', 'https://github.com/advisories/GHSA-6f89-8j54-29xf', 'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf'}
null
GHSA
GHSA-5wg8-7c9q-794v
Data races in lock_api
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness.
{'CVE-2020-35912'}
2021-08-25T20:50:00Z
2021-08-25T20:50:00Z
MODERATE
4.7
{'CWE-362'}
{'https://github.com/Amanieu/parking_lot/pull/262', 'https://github.com/advisories/GHSA-5wg8-7c9q-794v', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35912'}
null
GHSA
GHSA-4vww-mc66-62m6
HTTP Request Smuggling in Apache Tomcat
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
{'CVE-2021-33037'}
2022-04-26T21:00:06Z
2021-08-13T15:21:14Z
MODERATE
5.3
{'CWE-444'}
{'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33037', 'https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2@%3Ccommits.tomee.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10366', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-4vww-mc66-62m6', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread/kovg1bft77xo34ksrcskh5nl50p69962', 'https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7@%3Ccommits.tomee.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4952', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-gjrj-9rj4-pgwx
DoS Vulnerability from Upstream Actix Web Issues
### Impact This vulnerability affects all users of the `perseus deploy` functionality who have not exported their sites to static files. If you are using the inbuilt Perseus server in production, there is a memory leak in Actix Web stemming from [this upstream issue](https://github.com/actix/actix-web/issues/1780) which can allow even a single user to cause the process to exhaust its memory on low-memory servers by continuously reloading the page. Note that this issue does not affect all Actix Web applications, but rather results from certain usage patterns which appear to be present in Perseus' server mechanics. ### Patches This vulnerability is addressed in all versions after Perseus `v0.3.0-beta.21`, which temporarily discontinues the use of `perseus-actix-web` (until the upstream bug is fixed) and switches to `perseus-warp` instead, which utilizes [Warp](https://github.com/seanmonstar/warp). Additionally, as of Perseus `v0.3.0-beta.22`, the Actix Web integration has been upgraded to use the latest unstable beta version of Actix Web, which appears to partially resolve this issue (the severity of the memory leak is reduced). However, due to the instability of this version, the default integration will remain Warp for now, and a warning will appear if you attempt to use the Actix Web integration. <details> <summary>Using the Actix Web integration</summary> If the instability of the latest beta version of Actix Web is not a concern for you, you can use this integration by adding `-i actix-web` to `perseus serve` and the like. This will print a warning about instability, and will then operate with the beta version. Please report any failures in functionality that are not security-related to the Perseus team by [opening an issue on the repository](https://github.com/arctic-hen7/perseus/issues/new/choose). Note however that switching to the Warp integration requires no code changes whatsoever unless you've ejected, so there are very few disadvantages to this change. </details> ### Workarounds Due to significant infrastructural changes within other Perseus packages that were needed to support Warp, this integration is not backward-compatible with any previous version of Perseus, meaning there are no easily feasible workarounds. If you're only in development though, this vulnerability is irrelevant until you push to production. ### CVE Status Due to GitHub's requirements, a CVE can't be issued for this security advisory because the issue is technically one with Actix Web (though it's only in combination with certain mechanics in the Perseus server that this problem arises). ### References See [this upstream issue](https://github.com/actix/actix-web/issues/1780) in Actix Web. ### For more information If you have any questions or comments about this advisory: * Open an issue on this repository * Email me at [arctic_hen7@pm.me](mailto:arctic_hen7@pm.me)
null
2022-04-19T19:03:17Z
2021-12-15T22:51:07Z
HIGH
0
null
{'https://github.com/advisories/GHSA-gjrj-9rj4-pgwx', 'https://github.com/actix/actix-web/issues/1780', 'https://github.com/arctic-hen7/perseus/security/advisories/GHSA-gjrj-9rj4-pgwx'}
null
GHSA
GHSA-jqmc-fxxp-r589
Deserialization of Untrusted Data in Tendenci
Tendenci 12.0.10 allows unrestricted deserialization in apps\helpdesk\views\staff.py.
{'CVE-2020-14942'}
2021-06-18T18:31:05Z
2021-06-18T18:31:05Z
HIGH
9.8
{'CWE-502'}
{'https://github.com/tendenci/tendenci/issues/867', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14942', 'https://github.com/advisories/GHSA-jqmc-fxxp-r589'}
null
GHSA
GHSA-5c66-x4wm-rjfx
Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN)
Cross-site scripting (XSS) vulnerability in the user-profile biography section in DotNetNuke (DNN) before 8.0.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted onclick attribute in an IMG element.
{'CVE-2016-7119'}
2022-04-26T18:58:10Z
2018-10-16T19:34:10Z
MODERATE
5.4
{'CWE-79'}
{'http://www.dnnsoftware.com/community/security/security-center', 'http://www.securityfocus.com/bid/92719', 'https://github.com/advisories/GHSA-5c66-x4wm-rjfx', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7119'}
null
GHSA
GHSA-58pf-pcwv-qg85
Path traversal
This affects all versions of package github.com/u-root/u-root/pkg/uzip. It is vulnerable to both leading and non-leading relative path traversal attacks in zip file extraction.
{'CVE-2020-7665'}
2021-05-18T21:08:28Z
2021-05-18T21:08:28Z
MODERATE
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-58pf-pcwv-qg85', 'https://github.com/u-root/u-root/pull/1817', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMUROOTUROOTPKGUZIP-570441', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7665'}
null
GHSA
GHSA-pm52-wwrw-c282
Command Injection in wiki-plugin-datalog
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system. ## Recommendation Upgrade to version 0.1.6 or later.
null
2021-08-16T15:29:05Z
2019-06-13T18:59:06Z
HIGH
6.5
{'CWE-94'}
{'https://github.com/advisories/GHSA-pm52-wwrw-c282', 'https://www.npmjs.com/advisories/926', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540'}
null
GHSA
GHSA-wm7q-rxch-43mx
Byass due to validation before canonicalization in serve
Versions of `serve` before 6.5.2 are vulnerable to the bypass of the ignore functionality. The bypass is possible because validation happens before canonicalization of paths and filenames. Example: Here we have a server that ignores the file test.txt. ``` const serve = require('serve') const server = serve(__dirname, { port: 1337, ignore: ['test.txt'] }) ``` Using the URL encoded form of a letter (%65 instead of e) attacker can bypass the ignore control accessing the file. `curl http://localhost:1337/t%65st.txt` Additionally this technique can be used to get directory listings of ignored directories. ## Recommendation Update to version 6.5.2 or later.
null
2020-09-01T19:38:33Z
2020-09-01T19:38:33Z
HIGH
0
null
{'https://www.npmjs.com/advisories/594', 'https://github.com/advisories/GHSA-wm7q-rxch-43mx', 'https://hackerone.com/reports/308721'}
null
GHSA
GHSA-2cc5-23r7-vc4v
Default client side session signing key is highly predictable
### Impact The client side session module uses the application startup time as the signing key by default. This means that if an attacker can determine this time, and if encryption is not also used (which is recommended, but is not on by default), the session data could be tampered with by someone with the ability to write cookies. The default configuration is unsuitable for production use as an application restart renders all sessions invalid and is not multi-host compatible, but its use is not actively prevented. ### Vulnerability Location https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29 ### Patches As of Ratpack 1.9.0 the default value is a securely randomly generated value, generated at application startup time. ### Workarounds Supply an alternative signing key, as per the documentation's recommendation.
{'CVE-2021-29480'}
2022-04-19T19:02:48Z
2021-07-01T17:02:26Z
MODERATE
4.4
{'CWE-330', 'CWE-340'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29480', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-2cc5-23r7-vc4v', 'https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29', 'https://github.com/advisories/GHSA-2cc5-23r7-vc4v'}
null
GHSA
GHSA-7x36-h62w-vw65
Out-of-bounds Write in actix-web
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can add the Send marker trait to an object that cannot be sent between threads safely, leading to memory corruption.
{'CVE-2018-25026'}
2022-01-06T22:18:58Z
2022-01-06T22:18:58Z
CRITICAL
9.8
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-25026', 'https://github.com/advisories/GHSA-7x36-h62w-vw65', 'https://rustsec.org/advisories/RUSTSEC-2018-0019.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-web/RUSTSEC-2018-0019.md'}
null
GHSA
GHSA-f499-jv47-9wxf
Directory Traversal in desafio
Affected versions of `desafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation no patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16164'}
2021-01-08T18:55:00Z
2018-08-06T21:40:02Z
MODERATE
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/397', 'https://nodesecurity.io/advisories/397', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16164', 'https://github.com/advisories/GHSA-f499-jv47-9wxf', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/desafio'}
null
GHSA
GHSA-x8qc-rrcw-4r46
Symlink reference outside of node_modules in npm
Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected. This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. ## Recommendation Upgrade to version 6.13.3 or later.
{'CVE-2019-16776'}
2022-04-19T19:02:23Z
2019-12-13T15:39:26Z
LOW
7.7
{'CWE-22'}
{'https://access.redhat.com/errata/RHEA-2020:0330', 'https://access.redhat.com/errata/RHSA-2020:0597', 'https://access.redhat.com/errata/RHSA-2020:0602', 'https://access.redhat.com/errata/RHSA-2020:0573', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776', 'https://access.redhat.com/errata/RHSA-2020:0579', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://github.com/advisories/GHSA-x8qc-rrcw-4r46', 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli', 'https://www.npmjs.com/advisories/1436'}
null
GHSA
GHSA-vjmg-pc8h-p6p8
Out of bounds read in fltk
An issue was discovered in the fltk crate before 0.15.3 for Rust. There is an out-of bounds read because the pixmap constructor lacks pixmap input validation.
{'CVE-2021-28308'}
2021-08-25T20:53:58Z
2021-08-25T20:53:58Z
CRITICAL
9.1
{'CWE-125'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0038.html', 'https://github.com/advisories/GHSA-vjmg-pc8h-p6p8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28308', 'https://github.com/MoAlyousef/fltk-rs/issues/519'}
null
GHSA
GHSA-8c26-wmh5-6g9v
Use of a Broken or Risky Cryptographic Algorithm in golang.org/x/crypto/ssh
golang.org/x/crypto/ssh versions 0.0.0-20220214200702-86341886e292 and prior in Go through 1.16.15 and 1.17.x through 1.17.8 allows an attacker to crash a server in certain circumstances involving AddHostKey. Version 0.0.0-20220315160706-3147a52a75dd includes a fix for the vulnerability and support for SHA-2.
{'CVE-2022-27191'}
2022-05-03T03:42:58Z
2022-03-19T00:01:02Z
HIGH
7.5
{'CWE-327'}
{'https://github.com/advisories/GHSA-8c26-wmh5-6g9v', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HHGBEGJ54DZZGTXFUQNS7ZIG3E624YAF/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J5WPM42UR6XIBQNQPNQHM32X7S4LJTRX/', 'https://security.netapp.com/advisory/ntap-20220429-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QTFOIDHQRGNI4P6LYN6ILH5G443RYYKB/', 'https://groups.google.com/g/golang-announce', 'https://groups.google.com/g/golang-announce/c/-cp44ypCT5s', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27191', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQNPPQWSTP2IX7SHE6TS4SP4EVMI5EZK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YHYRQB7TRMHDB3NEHW5XBRG7PPMUTPGV/'}
null
GHSA
GHSA-qmjg-g86h-6rc9
Hijacked Environment Variables in d3.js
The `d3.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16044'}
2021-01-08T01:58:32Z
2018-07-23T21:00:28Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16044', 'https://github.com/advisories/GHSA-qmjg-g86h-6rc9', 'https://www.npmjs.com/advisories/497', 'https://nodesecurity.io/advisories/497'}
null
GHSA
GHSA-p885-prv3-m4xv
Cross-site Scripting in snipe-it
Stored Cross Site Scripting vulnerability in Item name parameter in GitHub repository snipe/snipe-it prior to v5.4.3. The vulnerability is capable of stolen the user Cookie.
{'CVE-2022-1380'}
2022-04-27T20:26:42Z
2022-04-17T00:00:32Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9', 'https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12', 'https://github.com/advisories/GHSA-p885-prv3-m4xv', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1380'}
null
GHSA
GHSA-cfjv-5498-mph5
XSS in Action View
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. ### Impact When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples: ```erb <%# The welcome_html translation is not defined for the current locale: %> <%= t("welcome_html", default: untrusted_user_controlled_string) %> <%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %> <%= t("title.html", default: [:"missing.html", untrusted_user_controlled_string]) %> ``` ### Patches Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations. The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest. To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series * [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases. ### Workarounds Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`): ```erb <%= t("welcome_html", default: h(untrusted_user_controlled_string)) %> ```
{'CVE-2020-15169'}
2022-04-19T19:02:34Z
2020-09-11T15:19:57Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15169', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://github.com/advisories/GHSA-cfjv-5498-mph5', 'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00015.html'}
null
GHSA
GHSA-w42g-7vfc-xf37
Introspection in schema validation in Apollo Server
We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions. ### Impact If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled. The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory. > **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary. In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)). The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP). **The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors. ### Affected packages The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server. Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`. > Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form. ### Resolution The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.) ### Workarounds Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**: ```js const server = new ApolloServer({ subscriptions: false, /* Other options, such as typeDefs, resolvers, schema, etc. */ }); ``` ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist. ### Credit and appreciation Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing. Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing.
null
2020-08-31T19:02:47Z
2020-06-05T19:38:14Z
MODERATE
0
null
{'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1528', 'https://www.npmjs.com/advisories/1530', 'https://www.npmjs.com/advisories/1534', 'https://www.npmjs.com/advisories/1533', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1525', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1527', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1526', 'https://www.npmjs.com/advisories/1531'}
null
GHSA
GHSA-p77h-hv6g-fmfp
Sensitive Data Exposure in ibm_db
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode. ## Recommendation Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
null
2021-09-29T18:49:03Z
2020-09-03T20:43:16Z
MODERATE
5
null
{'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://www.npmjs.com/advisories/1185', 'https://github.com/advisories/GHSA-p77h-hv6g-fmfp', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
null
GHSA
GHSA-36p3-wjmg-h94x
Remote Code Execution in Spring Framework
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).
{'CVE-2022-22965'}
2022-04-01T16:26:09Z
2022-03-31T18:30:50Z
CRITICAL
0
{'CWE-74'}
{'https://tanzu.vmware.com/security/cve-2022-22965', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22965', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6', 'https://github.com/advisories/GHSA-36p3-wjmg-h94x', 'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18', 'https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12'}
null
GHSA
GHSA-g9cg-h3jm-cwrc
Prototype Pollution in @hapi/subtext
Versions of `@hapi/subtext` prior to 6.1.3 or 7.0.3 are vulnerable to Prototype Pollution. A multipart payload can be constructed in a way that one of the parts’ content can be set as the entire payload object’s prototype. If this prototype contains data, it may bypass other validation rules which enforce access and privacy. If this prototype evaluates to null, it can cause unhandled exceptions when the request payload is accessed. ## Recommendation Upgrade to versions 6.1.3, 7.0.3 or later.
null
2021-10-04T21:00:53Z
2020-09-03T15:47:23Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1480', 'https://github.com/advisories/GHSA-g9cg-h3jm-cwrc'}
null
GHSA
GHSA-4hvf-hxvg-f67v
Read and Write outside of bounds in TensorFlow
### Impact An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in [the conversion from sparse tensors to dense tensors](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293). ### Patches We have patched the issue in GitHub commit [6364463d6f5b6254cac3d6aedf999b6a96225038](https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23560'}
2022-02-11T15:08:01Z
2022-02-09T23:53:30Z
HIGH
8.8
{'CWE-787', 'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v', 'https://github.com/advisories/GHSA-4hvf-hxvg-f67v', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23560'}
null
GHSA
GHSA-7h42-5vj2-cq39
High severity vulnerability that affects tiny-json-http
brianleroux tiny-json-http version all versions since commit 9b8e74a232bba4701844e07bcba794173b0238a8 (Oct 29 2016) contains a Missing SSL certificate validation vulnerability in The libraries core functionality is affected. that can result in Exposes the user to man-in-the-middle attacks.
{'CVE-2018-1000096'}
2021-09-03T17:41:04Z
2018-03-13T20:42:00Z
HIGH
8.1
{'CWE-295'}
{'https://github.com/brianleroux/tiny-json-http/pull/15', 'https://github.com/advisories/GHSA-7h42-5vj2-cq39', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000096'}
null
GHSA
GHSA-hw3m-8h25-8frw
Command Injection in Apache Kylin
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
{'CVE-2021-45456'}
2022-01-08T00:42:59Z
2022-01-08T00:42:59Z
MODERATE
0
{'CWE-77'}
{'http://www.openwall.com/lists/oss-security/2022/01/06/1', 'https://github.com/advisories/GHSA-hw3m-8h25-8frw', 'https://github.com/apache/kylin/pull/1781', 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45456', 'https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf'}
null
GHSA
GHSA-fpcv-j2q9-vqhw
Moderate severity vulnerability that affects mayan-edms
An issue was discovered in Mayan EDMS before 3.0.2. The Appearance app sets window.location directly, leading to XSS.
{'CVE-2018-16405'}
2021-09-10T18:44:00Z
2018-09-06T03:24:50Z
MODERATE
6.1
{'CWE-79'}
{'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst', 'https://github.com/advisories/GHSA-fpcv-j2q9-vqhw', 'https://gitlab.com/mayan-edms/mayan-edms/commit/9ebe80595afe4fdd1e2c74358d6a9421f4ce130e', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16405', 'https://gitlab.com/mayan-edms/mayan-edms/issues/494'}
null
GHSA
GHSA-94cq-7ccq-cmcm
lynx doesn't properly sanitize user input and exposes database password to unauthorized users
The lynx gem 0.2.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
{'CVE-2014-5002'}
2022-04-25T22:24:48Z
2018-01-24T17:10:45Z
HIGH
7.8
null
{'https://github.com/panthomakos/lynx/issues/3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5002', 'https://github.com/advisories/GHSA-94cq-7ccq-cmcm', 'http://www.openwall.com/lists/oss-security/2014/07/07/23', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'http://www.vapid.dhs.org/advisories/lynx-0.2.0.html'}
null
GHSA
GHSA-r8rm-4hfj-2x87
Data Amplification in Play Framework
In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.
{'CVE-2020-26882'}
2022-02-10T20:23:28Z
2022-02-10T20:23:28Z
HIGH
7.5
{'CWE-674'}
{'https://github.com/advisories/GHSA-r8rm-4hfj-2x87', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26882', 'https://www.playframework.com/security/vulnerability/CVE-2020-26882-JsonParseDataAmplification', 'https://github.com/playframework/playframework/pull/10495'}
null
GHSA
GHSA-rh7x-ppxx-p34c
Insufficient size checks in ws
An issue was discovered in the ws crate through 2020-09-25 for Rust. The outgoing buffer is not properly limited, leading to a remote memory-consumption attack.
{'CVE-2020-35896'}
2021-08-25T20:49:32Z
2021-08-25T20:49:32Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-rh7x-ppxx-p34c', 'https://github.com/housleyjk/ws-rs/issues/291', 'https://rustsec.org/advisories/RUSTSEC-2020-0043.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35896'}
null
GHSA
GHSA-8qv8-fq5w-p966
phpservermon is vulnerable to CRLF Injection
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences.
{'CVE-2021-4097'}
2021-12-16T14:26:00Z
2021-12-16T14:26:00Z
MODERATE
6.3
{'CWE-93'}
{'https://github.com/advisories/GHSA-8qv8-fq5w-p966', 'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4', 'https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4097'}
null
GHSA
GHSA-jv7g-9g6q-cxvw
Path Traversal in convert-svg packages
This affects all versions of package convert-svg-core; all versions of package convert-svg-to-png; all versions of package convert-svg-to-jpeg. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file.
{'CVE-2021-23631'}
2022-01-27T14:04:28Z
2022-01-27T14:04:28Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23631', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOPNG-2348244', 'https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14', 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGTOJPEG-2348245', 'https://github.com/advisories/GHSA-jv7g-9g6q-cxvw'}
null
GHSA
GHSA-wv5p-gmmv-wh9v
Insertion of Sensitive Information into Log File in ansible
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentiality.
{'CVE-2021-20178'}
2021-06-04T18:53:55Z
2021-06-01T21:53:29Z
MODERATE
5.5
{'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20178', 'https://github.com/ansible/ansible/blob/v2.9.18/changelogs/CHANGELOG-v2.9.rst#security-fixes', 'https://bugzilla.redhat.com/show_bug.cgi?id=1914774', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HIU7QZUV73U6ZQ65VJWSFBTCALVXLH55/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUQ2QKAQA5OW2TY3ACZZMFIAJ2EQTG37/', 'https://github.com/ansible-collections/community.general/pull/1635,', 'https://github.com/advisories/GHSA-wv5p-gmmv-wh9v'}
null
GHSA
GHSA-hv96-xxx2-5v7w
Downloads Resources over HTTP in nw
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`. ## Recommendation Update to version 0.23.6-1 or later.
{'CVE-2016-10588'}
2021-06-10T23:26:25Z
2019-02-18T23:51:04Z
HIGH
8.1
{'CWE-311'}
{'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://www.npmjs.com/advisories/166', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://nodesecurity.io/advisories/166'}
null
GHSA
GHSA-82rf-q3pr-4f6p
Sensitive data exposure in NATS
Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment. The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected. Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. Affected versions: Security impact: * NPM package nats.js: + mainline is unaffected + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 Logic flaw: * NPM package nats.ws: + status: preview + flawed from 1.0.0-85, fixed in 1.0.0-111 * Deno repository https://github.com/nats-io/nats.deno + status: preview + flawed in all git tags prior to fix + fixed with git tag v1.0.0-9 Impact: For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
{'CVE-2020-26149'}
2021-10-04T21:25:48Z
2020-10-08T22:11:32Z
HIGH
7.5
{'CWE-522'}
{'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7', 'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://github.com/advisories/GHSA-82rf-q3pr-4f6p', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149'}
null
GHSA
GHSA-52rg-hpwq-qp56
Allocation of Resources Without Limits or Throttling in Keycloak
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
{'CVE-2020-10758'}
2022-02-09T00:56:51Z
2022-02-09T00:56:51Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/advisories/GHSA-52rg-hpwq-qp56', 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251', 'https://bugzilla.redhat.com/show_bug.cgi?id=1843849', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758'}
null
GHSA
GHSA-9w8r-397f-prfh
Infinite Loop in Pygments
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
{'CVE-2021-20270'}
2021-10-21T17:15:55Z
2021-04-20T16:35:47Z
HIGH
7.5
{'CWE-835'}
{'https://github.com/advisories/GHSA-9w8r-397f-prfh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20270', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1922136', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html', 'https://www.debian.org/security/2021/dsa-4889'}
null
GHSA
GHSA-3whx-qrj5-hh2h
Improper Input Validation in Apache Pulsar
In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisation controls are performed against the topic name and there is not proper validation the that ledger id is valid in the context of such ledger. So it may happen that the user is able to read from a ledger that contains data owned by another tenant. This issue affects Apache Pulsar Apache Pulsar version 2.8.0 and prior versions; Apache Pulsar version 2.7.3 and prior versions; Apache Pulsar version 2.6.4 and prior versions.
{'CVE-2021-41571'}
2022-02-11T17:07:14Z
2022-02-02T00:01:52Z
MODERATE
6.5
{'CWE-20'}
{'https://github.com/apache/pulsar/pull/11852', 'https://github.com/apache/pulsar/pull/11913', 'https://github.com/apache/pulsar/releases/tag/v2.7.4', 'https://github.com/advisories/GHSA-3whx-qrj5-hh2h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41571', 'https://github.com/apache/pulsar/issues/11814', 'https://github.com/apache/pulsar/releases/tag/v2.8.1', 'https://github.com/apache/pulsar/pull/11912', 'https://pulsar.apache.org/admin-rest-api/#operation/getLastMessageId', 'https://lists.apache.org/thread/8n3k7pvyh4cf9q2jfzb6pb32ync6xlvr'}
null
GHSA
GHSA-2qrg-x229-3v8q
Deserialization of Untrusted Data in Log4j
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17. Users are advised to migrate to `org.apache.logging.log4j:log4j-core`
{'CVE-2019-17571'}
2022-04-22T17:28:51Z
2020-01-06T18:43:49Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/752ec92cd1e334a639e79bfbd689a4ec2c6579ec5bb41b53ffdf358d@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6b45a2fcc8e98ac93a179183dbb7f340027bdb8e3ab393418076b153@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r7a1acc95373105169bd44df710c2f462cad31fb805364d2958a5ee03@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r9d0d03f2e7d9e13c68b530f81d02b0fec33133edcf27330d8089fcfb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf2567488cfc9212b42e34c6393cfa1c14e30e4838b98dda84d71041f@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/eea03d504b36e8f870e8321d908e1def1addda16adda04327fe7c125%40%3Cdev.logging.apache.org%3E', 'https://lists.apache.org/thread.html/raedd12dc24412b3780432bf202a2618a21a727788543e5337a458ead@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rcd71280585425dad7e232f239c5709e425efdd0d3de4a92f808a4767@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf9c19bcc2f7a98a880fa3e3456c003d331812b55836b34ef648063c9@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/479471e6debd608c837b9815b76eab24676657d4444fcfd5ef96d6e6@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2ce8d26154bea939536e6cf27ed02d3192bf5c5d04df885a80fe89b3@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r8c6300245c0bcef095e9f07b48157e2c6471df0816db3408fcf1d748@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4686', 'https://lists.apache.org/thread.html/44491fb9cc19acc901f7cff34acb7376619f15638439416e3e14761c@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r8d78a0fbb56d505461e29868d1026e98c402e6a568c13a6da67896a2@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf77f79699c8d7e430c14cf480f12ed1297e6e8cf2ed379a425941e80@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd6254837403e8cbfc7018baa9be29705f3f06bd007c83708f9a97679@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc628307962ae1b8cc2d21b8e4b7dd6d7755b2dd52fa56a151a27e4fd@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd882ab6b642fe59cbbe94dc02bd197342058208f482e57b537940a4b@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r9a9e3b42cd5d1c4536a14ef04f75048dec8e2740ac6a138ea912177f@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rd3a9511eebab60e23f224841390a3f8cd5358cff605c5f7042171e47@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r48d5019bd42e0770f7e5351e420a63a41ff1f16924942442c6aff6a8@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r48efc7cb5aeb4e1f67aaa06fb4b5479a5635d12f07d0b93fc2d08809@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r71e26f9c2d5826c6f95ad60f7d052d75e1e70b0d2dd853db6fc26d5f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r3543ead2317dcd3306f69ee37b07dd383dbba6e2f47ff11eb55879ad@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rdb7ddf28807e27c7801f6e56a0dfb31092d34c61bdd4fa2de9182119@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20200110-0001/', 'https://lists.apache.org/thread.html/r909b8e3a36913944d3b7bafe9635d4ca84f8f0e2cd146a1784f667c2@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/reaf6b996f74f12b4557bc221abe88f58270ac583942fa41293c61f94@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/277b4b5c2b0e06a825ccec565fa65bd671f35a4d58e3e2ec5d0618e1@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r356d57d6225f91fdc30f8b0a2bed229d1ece55e16e552878c5fa809a@%3Cissues.zookeeper.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00022.html', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17571', 'https://lists.apache.org/thread.html/rd7805c1bf9388968508c6c8f84588773216e560055ddcc813d19f347@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r8c392ca48bb7e50754e4bc05865e9731b23d568d18a520fe3d8c1f75@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r107c8737db39ec9ec4f4e7147b249e29be79170b9ef4b80528105a2d@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r189aaeaad897f7d6b96f7c43a8ef2dfb9f6e9f8c1cc9ad182ce9b9ae@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc17d8491beee51607693019857e41e769795366b85be00aa2f4b3159@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb3c94619728c8f8c176d8e175e0a1086ca737ecdfcd5a2214bb768bc@%3Ccommits.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/564f03b4e9511fcba29c68fc0299372dadbdb002718fa8edcc4325e4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra18a903f785aed9403aea38bc6f36844a056283c00dcfc6936b6318c@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8e3f7da12bf5750b0a02e69a78a61073a2ac950eed7451ce70a65177@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdec0d8ac1f03e6905b0de2df1d5fcdb98b94556e4f6cccf7519fdb26@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r1b7734dfdfd938640f2f5fb6f4231a267145c71ed60cc7faa1cbac07@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r7f462c69d5ded4c0223e014d95a3496690423c5f6f05c09e2f2a407a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1cfd4705258c106e488091fcec85f194c82f2bbde6bd151e201870@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd5dbeee4808c0f2b9b51479b50de3cc6adb1072c332a200d9107f13e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rca24a281000fb681d7e26e5c031a21eb4b0593a7735f781b53dae4e2@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r696507338dd5f44efc23d98cafe30f217cf3ba78e77ed1324c7a5179@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/8ab32b4c9f1826f20add7c40be08909de9f58a89dc1de9c09953f5ac@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3784834e80df2f284577a5596340fb84346c91a2dea6a073e65e3397@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r26244f9f7d9a8a27a092eb0b2a0ca9395e88fcde8b5edaeca7ce569c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r944183c871594fe9a555b8519a7c945bbcf6714d72461aa6c929028f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rda4849c6823dd3e83c7a356eb883180811d5c28359fe46865fd151c3@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r05755112a8c164abc1004bb44f198b1e3d8ca3d546a8f13ebd3aa05f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r13d4b5c60ff63f3c4fab51d6ff266655be503b8a1884e2f2fab67c3a@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rbdf18e39428b5c80fc35113470198b1fe53b287a76a46b0f8780b5fd@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/6114ce566200d76e3cc45c521a62c2c5a4eac15738248f58a99f622c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r18f1c010b554a3a2d761e8ffffd8674fd4747bcbcf16c643d708318c@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rbc45eb0f53fd6242af3e666c2189464f848a851d408289840cecc6e3@%3Ccommits.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rf53eeefb7e7e524deaacb9f8671cbf01b8a253e865fb94e7656722c0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8418a0dff1729f19cf1024937e23a2db4c0f94f2794a423f5c10e8e7@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2ff63f210842a3c5e42f03a35d8f3a345134d073c80a04077341c211@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r4b25538be50126194cc646836c718b1a4d8f71bd9c912af5b59134ad@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r7bcdc710857725c311b856c0b82cee6207178af5dcde1bd43d289826@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r746fbc3fc13aee292ae6851f7a5080f592fa3a67b983c6887cdb1fc5@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r6236b5f8646d48af8b66d5050f288304016840788e508c883356fe0e@%3Clog4j-user.logging.apache.org%3E', 'https://lists.apache.org/thread.html/rbd19de368abf0764e4383ec44d527bc9870176f488a494f09a40500d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r9d2e28e71f91ba0b6f4114c8ecd96e2b1f7e0d06bdf8eb768c183aa9@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E', 'https://lists.apache.org/thread.html/ra9611a8431cb62369bce8909d7645597e1dd45c24b448836b1e54940@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb1b29aee737e1c37fe1d48528cb0febac4f5deed51f5412e6fdfe2bf@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rfdf65fa675c64a64459817344e0e6c44d51ee264beea6e5851fb60dc@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9fb3238cfc3222f2392ca6517353aadae18f76866157318ac562e706@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra54fa49be3e773d99ccc9c2a422311cf77e3ecd3b8594ee93043a6b1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc1eaed7f7d774d5d02f66e49baced31e04827a1293d61a70bd003ca7@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r5c084578b3e3b40bd903c9d9e525097421bcd88178e672f612102eb2@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6d34da5a0ca17ab08179a30c971446c7421af0e96f6d60867eabfc52@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3a85514a518f3080ab1fc2652cfe122c2ccf67cfb32356acb1b08fe8@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r3bf7b982dfa0779f8a71f843d2aa6b4184a53e6be7f149ee079387fd@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r681b4432d0605f327b68b9f8a42662993e699d04614de4851c35ffd1@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r3c575cabc7386e646fb12cb82b0b38ae5a6ade8a800f827107824495@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra38785cfc0e7f17f8e24bebf775dd032c033fadcaea29e5bc9fffc60@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/rec34b1cccf907898e7cb36051ffac3ccf1ea89d0b261a2a3b3fb267f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r594411f4bddebaf48a4c70266d0b7849e0d82bb72826f61b3a35bba7@%3Cissues.bookkeeper.apache.org%3E', 'https://usn.ubuntu.com/4495-1/', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r2756fd570b6709d55a61831ca028405bcb3e312175a60bc5d911c81f@%3Cjira.kafka.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00008.html', 'https://lists.apache.org/thread.html/r4ac89cbecd9e298ae9fafb5afda6fa77ac75c78d1ac957837e066c4e@%3Cuser.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-2qrg-x229-3v8q', 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re8c21ed9dd218c217d242ffa90778428e446b082b5e1c29f567e8374@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/rdf2a0d94c3b5b523aeff7741ae71347415276062811b687f30ea6573@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6aec6b8f70167fa325fb98b3b5c9ce0ffaed026e697b69b85ac24628@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r90c23eb8c82835fa82df85ae5e88c81fd9241e20a22971b0fb8f2c34@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1b434e11834a4449cd7addb69ed0aef0923112b5938182b363a968c@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re36da78e4f3955ba6c1c373a2ab85a4deb215ca74b85fcd66142fea1@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3cf50d05ce8cec8c09392624b7bae750e7643dae60ef2438641ee015@%3Cissues.zookeeper.apache.org%3E'}
null
GHSA
GHSA-8vfw-v2jv-9hwc
Reflected cross-site scripting in development mode handler in Vaadin
URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. - https://vaadin.com/security/cve-2021-33604
null
2021-06-28T16:52:45Z
2021-06-28T16:52:45Z
LOW
2.5
{'CWE-172'}
{'https://vaadin.com/security/cve-2021-33604', 'https://github.com/vaadin/flow/security/advisories/GHSA-8vfw-v2jv-9hwc', 'https://github.com/advisories/GHSA-8vfw-v2jv-9hwc'}
null
GHSA
GHSA-8qh8-cv77-h83g
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0769'}
2021-09-07T20:30:03Z
2019-04-09T19:43:46Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0769', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769', 'https://github.com/advisories/GHSA-8qh8-cv77-h83g'}
null
GHSA
GHSA-w7rc-rwvf-8q5r
The `size` option isn't honored after following a redirect in node-fetch
### Impact Node Fetch did not honor the `size` option after following a redirect, which means that when a content size was over the limit, a `FetchError` would never get thrown and the process would end without failure. For most people, this fix will have a little or no impact. However, if you are relying on node-fetch to gate files above a size, the impact could be significant, for example: If you don't double-check the size of the data after `fetch()` has completed, your JS thread could get tied up doing work on a large file (DoS) and/or cost you money in computing. ### Patches We released patched versions for both stable and beta channels: - For `v2`: 2.6.1 - For `v3`: 3.0.0-beta.9 ### Workarounds None, it is strongly recommended to update as soon as possible. ### For more information If you have any questions or comments about this advisory: * Open an issue in [node-fetch](https://github.com/node-fetch/node-fetch/issues/new?assignees=&labels=question&template=support-or-usage.md&title=Question%3A+) * Contact one of the core maintainers.
{'CVE-2020-15168'}
2022-04-19T19:02:34Z
2020-09-10T17:46:21Z
LOW
2.6
{'CWE-20', 'CWE-770'}
{'https://www.npmjs.com/package/node-fetch', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15168', 'https://github.com/advisories/GHSA-w7rc-rwvf-8q5r', 'https://github.com/node-fetch/node-fetch/security/advisories/GHSA-w7rc-rwvf-8q5r'}
null
GHSA
GHSA-28f8-hqmc-7ph8
Malicious Package in ember-power-timepicker
Version 1.0.8 of `ember-power-timepicker` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:19:09Z
2020-09-11T21:19:09Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/931', 'https://github.com/advisories/GHSA-28f8-hqmc-7ph8'}
null
GHSA
GHSA-7q44-r25x-wm4q
Remote Code Execution vulnerability in PHPMailer 6.4.1 running on Windows
PHPMailer 6.4.1 contains a possible remote code execution vulnerability through the `$lang_path` parameter of the `setLanguage()` method. If the `$lang_path` parameter is passed unfiltered from user input, it can be set to [a UNC path](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#unc-paths), and if an attacker is also able to create a remote mount on the server that the UNC path points to, a script file under their control may be executed. ### Impact Arbitrary code may be run by a remote attacker under the web server or PHP process running on Window hosts. ### Patches Mitigated in PHPMailer 6.5.0 by no longer treating translation files as PHP code, but by parsing their text content directly. This approach avoids the possibility of executing unknown code while retaining backward compatibility. This isn't ideal, so the current translation format is deprecated and will be replaced in the next major release. ### Workarounds Any of: * Ensure that calling code does not pass unfiltered user-supplied data to the `$lang_path` parameter of the `setLanguage()` method. * Block or filter the use of unknown UNC paths in this parameter (or altogether). * Ensure that unauthorised users do not have the ability to read from unknown remote servers via UNC paths. * Run on an OS that does not support UNC paths ### References [CVE-2021-34551](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34551). Reported by [listensec.com](https://listensec.com) via Tidelift. ### For more information If you have any questions or comments about this advisory: * Open an issue in [PHPMailer](https://github.com/PHPMailer/PHPMailer) * [Email the maintainers](mailto:phpmailer@synchromedia.co.uk)
{'CVE-2021-34551'}
2022-04-19T19:03:00Z
2021-06-22T15:17:51Z
HIGH
8.1
{'CWE-94', 'CWE-434'}
{'https://github.com/advisories/GHSA-7q44-r25x-wm4q', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7q44-r25x-wm4q', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34551', 'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3', 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md'}
null
GHSA
GHSA-3hxh-8cp2-g4hg
Use after free and segfault in shape inference functions
### Impact When running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault. `ShapeRefiner` is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but we were not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types. ### Patches We have patched the issue in GitHub commit [ee119d4a498979525046fba1c3dd3f13a039fbb1](https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-37690'}
2021-08-25T14:39:22Z
2021-08-25T14:39:22Z
MODERATE
6.6
{'CWE-416'}
{'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1', 'https://github.com/advisories/GHSA-3hxh-8cp2-g4hg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37690'}
null
GHSA
GHSA-rg5m-3fqp-6px8
Moderate severity vulnerability that affects actionmailer
Multiple format string vulnerabilities in log_subscriber.rb files in the log subscriber component in Action Mailer in Ruby on Rails 3.x before 3.2.15 allow remote attackers to cause a denial of service via a crafted e-mail address that is improperly handled during construction of a log message.
{'CVE-2013-4389'}
2021-09-17T17:54:11Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-134'}
{'http://lists.opensuse.org/opensuse-updates/2013-12/msg00094.html', 'http://lists.opensuse.org/opensuse-updates/2014-01/msg00003.html', 'http://www.debian.org/security/2014/dsa-2887', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/yvlR1Vx44c8/elKJkpO2KVgJ', 'http://lists.opensuse.org/opensuse-updates/2013-12/msg00091.html', 'https://github.com/advisories/GHSA-rg5m-3fqp-6px8', 'http://www.debian.org/security/2014/dsa-2888', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4389'}
null
GHSA
GHSA-8g64-9cm2-838j
Malicious Package in bugfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:36:42Z
2020-09-03T22:29:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1266', 'https://github.com/advisories/GHSA-8g64-9cm2-838j'}
null
GHSA
GHSA-wmfg-55f9-j8hq
Server-Side Template Injection
### Impact A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282. ### Patches Effective Immediately, all users should upgrade to version 2.1.2 or higher. ### Workarounds None. ### References https://securitylab.github.com/research/bean-validation-RCE ### For more information If you have any questions or comments about this advisory: * Open an issue in [the BrowserUp Proxy repo](http://github.com/browserup/browserup-proxy) * Contact us via the [BrowserUp website](https://browserup.com) or email us at [support@browserup.com](mailto:support@browserup.com)
{'CVE-2020-26282'}
2022-04-19T19:02:43Z
2020-12-24T20:49:34Z
HIGH
10
{'CWE-74'}
{'https://github.com/browserup/browserup-proxy/security/advisories/GHSA-wmfg-55f9-j8hq', 'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab', 'https://github.com/browserup/browserup-proxy/releases/tag/v2.1.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26282', 'https://github.com/advisories/GHSA-wmfg-55f9-j8hq', 'https://securitylab.github.com/research/bean-validation-RCE'}
null
GHSA
GHSA-vw7g-jq9m-3q9v
Unauthorized File Access in glance
Versions of `glance` prior to 3.0.7 are vulnerable to Unauthorized File Access. The package provides a `--nodot` option meant to hide files and directories with names that begin with a `.`, such as `.git` but fails to hide files inside a folder that begins with `.`. ## Recommendation Upgrade to version 3.0.7 or later.
null
2020-09-02T18:23:35Z
2020-09-02T18:23:35Z
MODERATE
0
null
{'https://www.npmjs.com/advisories/811', 'https://github.com/advisories/GHSA-vw7g-jq9m-3q9v', 'https://hackerone.com/reports/490379'}
null
GHSA
GHSA-92wj-x78c-m4fx
Moderate severity vulnerability that affects org.apache.karaf:karaf
Apache Karaf provides a features deployer, which allows users to "hot deploy" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases.
{'CVE-2018-11788'}
2021-09-07T20:38:45Z
2019-01-07T19:14:49Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-92wj-x78c-m4fx', 'http://www.securityfocus.com/bid/106479', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788', 'http://karaf.apache.org/security/cve-2018-11788.txt'}
null
GHSA
GHSA-fcr8-6q7r-m4wg
Bypass of fix for CVE-2020-26231, Twig sandbox escape
### Impact A bypass of CVE-2020-26231 (fixed in 1.0.470/471 and 1.1.1) was discovered that has the same impact as CVE-2020-26231 & CVE-2020-15247: An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed by the CMS due to `cms.enableSafeMode` being enabled is able to write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This is not a problem for anyone that trusts their users with those permissions to normally write & manage PHP within the CMS by not having `cms.enableSafeMode` enabled, but would be a problem for anyone relying on `cms.enableSafeMode` to ensure that users with those permissions in production do not have access to write & execute arbitrary PHP. ### Patches Issue has been patched in Build 472 (v1.0.472) and v1.1.2. ### Workarounds Apply https://github.com/octobercms/october/commit/f63519ff1e8d375df30deba63156a2fc97aa9ee7 to your installation manually if unable to upgrade to Build 472 or v1.1.2. ### References Reported by [ka1n4t](https://github.com/ka1n4t) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1108" alt="Screen Shot 2020-10-10 at 1 21 13 PM" src="https://user-images.githubusercontent.com/7253840/95663316-7de28b80-0afb-11eb-999d-a6526cf78709.png">
{'CVE-2021-21264'}
2021-05-13T15:06:15Z
2021-05-04T17:42:33Z
MODERATE
5.2
{'CWE-862'}
{'https://github.com/octobercms/october/security/advisories/GHSA-fcr8-6q7r-m4wg', 'https://github.com/advisories/GHSA-fcr8-6q7r-m4wg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21264'}
null
GHSA
GHSA-xvvv-wj7j-r9jm
Cross-site Scripting in Netgen Tags Bundle
Netgen Tags Bundle 3.4.x before 3.4.11 and 4.0.x before 4.0.15 allows XSS in the Tags Admin interface.
{'CVE-2021-45895'}
2022-01-06T22:04:19Z
2022-01-06T22:04:19Z
MODERATE
0
{'CWE-79'}
{'https://github.com/netgen/TagsBundle/releases/tag/4.0.15', 'https://github.com/advisories/GHSA-xvvv-wj7j-r9jm', 'https://github.com/netgen/TagsBundle/releases/tag/3.4.11', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45895'}
null
GHSA
GHSA-v82v-rq72-phq9
Server side request forgery in @isomorphic-git/cors-proxy
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
{'CVE-2021-23664'}
2022-01-31T22:00:02Z
2022-01-26T22:13:05Z
HIGH
8.6
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311', 'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://github.com/advisories/GHSA-v82v-rq72-phq9'}
null
GHSA
GHSA-w36g-q975-37rg
Improper Input Validation (RCE)
Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.
{'CVE-2021-26814'}
2021-03-18T19:30:20Z
2021-03-18T19:30:20Z
HIGH
8.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26814', 'https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html', 'https://github.com/advisories/GHSA-w36g-q975-37rg', 'https://github.com/wazuh/wazuh/releases/tag/v4.0.4'}
null
GHSA
GHSA-48vq-8jqv-gm6f
Remote memory exhaustion in ckb
In the ckb sync protocol, SyncState maintains a HashMap called 'misbehavior' that keeps a score of a peer's violations of the protocol. This HashMap is keyed to PeerIndex (an alias for SessionId), and entries are never removed from it. SessionId is an integer that increases monotonically with every new connection. A remote attacker can manipulate this HashMap to grow forever, resulting in degraded performance and ultimately a panic on allocation failure or being killed by the OS, depending on the platform. This is a critical severity security bug. It could be exploited to create a targeted or network-wide denial of service, to reduce the hash power of the network as part of a 51% attack, and perhaps in other creative ways. An attack is trivial: 1. connect to another node 2. send an invalid sync protocol request, such as `SendHeaders` for non-consecutive blocks 3. disconnect 4. repeat
null
2021-08-25T21:01:23Z
2021-08-25T21:01:23Z
HIGH
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-48vq-8jqv-gm6f', 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-48vq-8jqv-gm6f'}
null
GHSA
GHSA-g7h8-p22m-2rvx
Prototype Pollution in flat-wrap
All versions of `flat-wrap` are vulnerable to prototype pollution. The function `unflatten` does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:08:54Z
2020-09-04T15:08:46Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1327', 'https://github.com/advisories/GHSA-g7h8-p22m-2rvx'}
null
GHSA
GHSA-mfcp-34xw-p57x
Authentication Bypass in saml2-js
Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely. ## Recommendation Upgrade to version 2.0.5 or later.
null
2021-09-29T20:12:43Z
2020-09-03T21:20:52Z
MODERATE
6.8
{'CWE-287'}
{'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637', 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/advisories/GHSA-mfcp-34xw-p57x', 'https://www.npmjs.com/advisories/1222'}
null
GHSA
GHSA-995j-587r-259w
Moderate severity vulnerability that affects rack-mini-profiler
Withdrawn, accidental duplicate publish. The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
null
2021-12-02T23:08:34Z
2018-08-13T20:46:58Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-4442', 'https://github.com/advisories/GHSA-995j-587r-259w'}
null
GHSA
GHSA-w4f3-7f7c-x652
SQL Injection in tribalsystems/zenario
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 and prior allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
{'CVE-2021-26830'}
2022-03-21T20:29:00Z
2022-03-18T17:49:01Z
CRITICAL
9.1
{'CWE-89'}
{'https://github.com/advisories/GHSA-w4f3-7f7c-x652', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26830', 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}
null
GHSA
GHSA-qhrx-hcm6-pmrw
Unsafe deserialization in SmtpTransport in CakePHP
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
{'CVE-2019-11458'}
2021-08-19T15:25:21Z
2019-12-02T18:12:26Z
HIGH
7.5
{'CWE-502'}
{'https://github.com/cakephp/cakephp/commits/master', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/CVE-2019-11458.yaml', 'https://github.com/advisories/GHSA-qhrx-hcm6-pmrw', 'https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7', 'https://github.com/cakephp/cakephp/releases', 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e', 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458'}
null
GHSA
GHSA-r7rh-g777-g5gx
SilverStripe GraphQL Server permission checker not inherited by query subclass.
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.
{'CVE-2021-28661'}
2021-10-18T18:40:16Z
2021-10-12T18:49:23Z
MODERATE
4.3
{'CWE-863'}
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed', 'https://github.com/advisories/GHSA-r7rh-g777-g5gx', 'https://github.com/silverstripe/silverstripe-graphql/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28661', 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/3.5.2', 'https://www.silverstripe.org/download/security-releases/CVE-2021-28661'}
null
GHSA
GHSA-gmv4-vmx3-x9f3
Data races in lock_api
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of RwLockWriteGuard unsoundness.
{'CVE-2020-35914'}
2021-08-25T20:49:37Z
2021-08-25T20:49:37Z
MODERATE
4.7
{'CWE-362'}
{'https://github.com/Amanieu/parking_lot/pull/262', 'https://github.com/advisories/GHSA-gmv4-vmx3-x9f3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35914', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}
null
GHSA
GHSA-cgmg-2v6m-fjg7
Free of uninitialized memory in autorand
An issue was discovered in the autorand crate before 0.2.3 for Rust. Because of impl Random on arrays, uninitialized memory can be dropped when a panic occurs, leading to memory corruption.
{'CVE-2020-36210'}
2021-08-25T20:50:41Z
2021-08-25T20:50:41Z
HIGH
7.8
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0103.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36210', 'https://github.com/mersinvald/autorand-rs/issues/5', 'https://github.com/advisories/GHSA-cgmg-2v6m-fjg7'}
null
GHSA
GHSA-cpjc-p7fc-j9xh
Moderate severity vulnerability that affects mail
The deliver function in the sendmail delivery agent (lib/mail/network/delivery_methods/sendmail.rb) in Ruby Mail gem 2.2.14 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an e-mail address.
{'CVE-2011-0739'}
2021-09-09T20:06:45Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2011-0739', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/65010', 'http://www.vupen.com/english/advisories/2011/0233', 'http://groups.google.com/group/mail-ruby/browse_thread/thread/e93bbd05706478dd?pli=1', 'https://github.com/advisories/GHSA-cpjc-p7fc-j9xh', 'http://secunia.com/advisories/43077', 'http://www.securityfocus.com/bid/46021', 'http://osvdb.org/70667', 'https://github.com/mikel/mail/raw/master/patches/20110126_sendmail.patch'}
null
GHSA
GHSA-4964-cjrr-jg97
Malicious Package in jqeury
Version 3.3.1 of `jqeury` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:55:10Z
2020-09-02T21:38:43Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/906', 'https://github.com/advisories/GHSA-4964-cjrr-jg97'}
null
GHSA
GHSA-ch52-vgq2-943f
Regular Expression Denial of Service in marked
Affected versions of `marked` are vulnerable to Regular Expression Denial of Service (ReDoS). The `_label` subrule may significantly degrade parsing performance of malformed input. ## Recommendation Upgrade to version 0.7.0 or later.
null
2020-09-03T18:15:53Z
2020-09-03T18:15:53Z
LOW
0
null
{'https://github.com/advisories/GHSA-ch52-vgq2-943f', 'https://www.npmjs.com/advisories/1076'}
null
GHSA
GHSA-hhvc-g5hv-48c6
Write to immutable memory region in TensorFlow
### Impact The `tf.raw_ops.ImmutableConst` operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area: ```python >>> import tensorflow as tf >>> with open('/tmp/test.txt','w') as f: f.write('a'*128) >>> tf.raw_ops.ImmutableConst(dtype=tf.string,shape=2, memory_region_name='/tmp/test.txt') ``` If the file is too small, TensorFlow properly returns an error as the memory area has fewer bytes than what is needed for the tensor it creates. However, as soon as there are enough bytes, the above snippet causes a segmentation fault. This is because the alocator used to return the buffer data is not marked as returning an opaque handle since the [needed virtual method](https://github.com/tensorflow/tensorflow/blob/c1e1fc899ad5f8c725dcbb6470069890b5060bc7/tensorflow/core/framework/typed_allocator.h#L78-L85) is [not overriden](https://github.com/tensorflow/tensorflow/blob/acdf3c04fcfa767ae8d109b9e1f727ef050dba4d/tensorflow/core/kernels/immutable_constant_op.cc). ### Patches We have patched the issue in GitHub commit [c1e1fc899ad5f8c725dcbb6470069890b5060bc7](https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-26268'}
2021-01-07T22:37:16Z
2020-12-10T19:07:28Z
LOW
4.4
{'CWE-471'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hhvc-g5hv-48c6', 'https://github.com/advisories/GHSA-hhvc-g5hv-48c6', 'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26268'}
null
GHSA
GHSA-2hpj-g53m-9gj6
Downloads Resources over HTTP in closure-util
Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`. ## Recommendation To mitigate this issue: 1. Install the package using npm's `--ignore-scripts` flag. 2. Navigate to the package directory, and open `default-config.json` in a text editor 3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents 4. run `npm i` in the package directory.
{'CVE-2016-10583'}
2021-08-30T21:55:14Z
2019-02-18T23:58:03Z
HIGH
8.1
null
{'https://github.com/advisories/GHSA-2hpj-g53m-9gj6', 'https://nodesecurity.io/advisories/165', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10583', 'https://www.npmjs.com/advisories/165'}
null
GHSA
GHSA-jrgf-vfw2-hj26
RCE via PHP Object injection via SOAP Requests
### Impact This vulnerability allows an admin user to generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. ### Patches The latest OpenMage Versions up from 19.4.7 and 20.0.3 have this Issue solved ### Credits Credit to Luke Rodgers for reporting
{'CVE-2020-15244'}
2022-04-19T19:02:36Z
2020-10-30T17:06:06Z
HIGH
8
{'CWE-74', 'CWE-502'}
{'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26', 'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b', 'https://github.com/OpenMage/magento-lts', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15244', 'https://github.com/advisories/GHSA-jrgf-vfw2-hj26'}
null
GHSA
GHSA-2mj8-pj3j-h362
Symlink reference outside of node_modules in bin-links
Versions of `bin-links` prior to 1.1.5 are vulnerable to a Symlink reference outside of node_modules. It is possible to create symlinks to files outside of the`node_modules` folder through the `bin` field. This may allow attackers to access unauthorized files. ## Recommendation Upgrade to version 1.1.5 or later.
null
2020-09-04T17:17:39Z
2020-09-04T17:17:39Z
LOW
0
null
{'https://github.com/advisories/GHSA-2mj8-pj3j-h362', 'https://www.npmjs.com/advisories/1435'}
null
GHSA
GHSA-q4j7-v27r-fgcx
Prototype Pollution in realms-shim
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
{'CVE-2021-23543'}
2022-01-13T15:00:36Z
2022-01-13T15:00:36Z
CRITICAL
9.8
{'CWE-1321'}
{'https://www.npmjs.com/package/realms-shim', 'https://github.com/advisories/GHSA-q4j7-v27r-fgcx', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23543'}
null
GHSA
GHSA-8cc8-8vvx-fhgw
Downloads Resources over HTTP in jdf-sass
Affected versions of `jdf-sass` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jdf-sass`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10595'}
2021-01-08T19:10:32Z
2019-02-18T23:34:11Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10595', 'https://nodesecurity.io/advisories/198', 'https://www.npmjs.com/advisories/198', 'https://github.com/advisories/GHSA-8cc8-8vvx-fhgw'}
null
GHSA
GHSA-wqgx-4q47-j2w5
Insecure Cryptography Algorithm in parsel
All versions of `parsel` use an insecure cryptography algorithm. The package uses `aes-256-cbc` without integrity checks, which renders the ciphertext vulnerable to bit-flipping attacks. ## Recommendation The package is deprecated and will not be updated. Consider using an alternative package.
null
2021-10-04T20:50:36Z
2020-09-04T17:36:04Z
CRITICAL
0
{'CWE-327'}
{'https://www.npmjs.com/advisories/1461', 'https://github.com/advisories/GHSA-wqgx-4q47-j2w5'}
null
GHSA
GHSA-rx34-jff5-ph35
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0917'}
2021-03-29T21:00:06Z
2021-03-29T21:00:06Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://github.com/advisories/GHSA-rx34-jff5-ph35'}
null
GHSA
GHSA-fxwm-579q-49qq
Moderate severity vulnerability that affects Bootstrap.Less, bootstrap, and bootstrap.sass
In Bootstrap 4 before 4.3.1 and Bootstrap 3 before 3.4.1, XSS is possible in the tooltip or popover data-template attribute. For more information, see: https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/
{'CVE-2019-8331'}
2021-12-03T14:54:43Z
2019-02-22T20:54:40Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-fxwm-579q-49qq'}
null
GHSA
GHSA-v7mf-qgxf-qmvf
Apache Ranger admin users can store some arbitrary javascript code to be executed when normal users login and access policies
Apache Ranger before 0.6.is vulnerable to a Stored Cross-Site Scripting in when entering custom policy conditions. Admin users can store some arbitrary javascript code to be executed when normal users login and access policies.
{'CVE-2016-8751'}
2022-04-27T13:49:47Z
2018-10-17T17:21:54Z
MODERATE
4.8
{'CWE-79'}
{'http://www.securityfocus.com/bid/99067', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8751', 'https://github.com/advisories/GHSA-v7mf-qgxf-qmvf', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}
null
GHSA
GHSA-7pgq-hhq9-9r27
Directory Traversal in lab6drewfusbyu
Affected versions of `lab6drewfusbyu` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16141'}
2021-01-08T19:15:06Z
2018-07-23T20:48:38Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6drewfusbyu', 'https://nodesecurity.io/advisories/474', 'https://www.npmjs.com/advisories/474', 'https://github.com/advisories/GHSA-7pgq-hhq9-9r27', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16141'}
null
GHSA
GHSA-6jp6-9rf9-gc66
Cross-site Scripting in Weblate
### Impact Due to improper neutralization, it was possible to perform cross-site scripting via crafted user and language names. ### Patches The issues were fixed in the 4.11 release. The following commits are addressing it: * f6753a1a1c63fade6ad418fbda827c6750ab0bda * 9e19a8414337692cc90da2a91c9af5420f2952f1 * 22d577b1f1e88665a88b4569380148030e0f8389 ### Workarounds You can look for crafted user and language names to see if you were affected. ### References * https://hackerone.com/reports/1486674 * https://hackerone.com/reports/1486718 * https://hackerone.com/reports/1485226 ### For more information If you have any questions or comments about this advisory: * Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions) * Email us at [care@weblate.org](mailto:care@weblate.org)
{'CVE-2022-24710'}
2022-04-15T09:19:28Z
2022-02-25T22:18:50Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/advisories/GHSA-6jp6-9rf9-gc66', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda', 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-6jp6-9rf9-gc66', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24710'}
null
GHSA
GHSA-pfxf-wh96-fvjc
Log Forging in generator-jhipster-kotlin
### Impact We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. ### Patches version 1.7.0. ### Workarounds In `AccountResource.kt` you should change the line ```kotlin log.warn("Password reset requested for non existing mail '$mail'"); ``` to ```kotlin log.warn("Password reset requested for non existing mail"); ``` ### References * https://cwe.mitre.org/data/definitions/117.html * https://owasp.org/www-community/attacks/Log_Injection * https://www.baeldung.com/jvm-log-forging ### For more information If you have any questions or comments about this advisory: * Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin)
{'CVE-2020-4072'}
2021-01-07T23:50:01Z
2020-06-25T20:02:51Z
MODERATE
5.3
{'CWE-117'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4072', 'https://github.com/advisories/GHSA-pfxf-wh96-fvjc', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://www.baeldung.com/jvm-log-forging', 'https://owasp.org/www-community/attacks/Log_Injection'}
null
GHSA
GHSA-m79w-4mqv-r39f
Downloads Resources over HTTP in windows-seleniumjar
Affected versions of `windows-seleniumjar` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10691'}
2021-01-08T18:30:32Z
2018-07-31T22:06:33Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/296', 'https://github.com/advisories/GHSA-m79w-4mqv-r39f', 'https://nodesecurity.io/advisories/296', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10691'}
null
GHSA
GHSA-54gp-qff8-946c
Insecure direct object reference of log files of the Import/Export feature
### Impact Insecure direct object reference of log files of the Import/Export feature ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2021-37709'}
2022-04-26T18:04:08Z
2021-08-30T16:14:19Z
MODERATE
6.5
{'CWE-639', 'CWE-532'}
{'https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37709', 'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec', 'https://github.com/advisories/GHSA-54gp-qff8-946c'}
null
GHSA
GHSA-mhpp-875w-9cpv
Denial of Service in jquery
Affected versions of `jquery` use a lowercasing logic on attribute names. When given a boolean attribute with a name that contains uppercase characters, `jquery` enters into an infinite recursion loop, exceeding the call stack limit, and resulting in a denial of service condition. ## Recommendation Update to version 3.0.0 or later.
{'CVE-2016-10707'}
2022-04-21T21:54:44Z
2018-01-22T13:32:42Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-mhpp-875w-9cpv', 'https://github.com/jquery/jquery/pull/3134', 'https://www.npmjs.com/advisories/330', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10707', 'https://github.com/jquery/jquery/issues/3133', 'https://snyk.io/vuln/npm:jquery:20160529'}
null
GHSA
GHSA-fq86-3f29-px2c
`CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow
### Impact The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`IsSimplifiableReshape`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742) would trigger `CHECK` failures. ### Patches We have patched the issue in GitHub commits [ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1](https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1), [1fb27733f943295d874417630edd3b38b34ce082](https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082), and [240655511cd3e701155f944a972db71b6c0b1bb6](https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23581'}
2022-02-11T20:38:44Z
2022-02-07T22:01:14Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742', 'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/advisories/GHSA-fq86-3f29-px2c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23581'}
null
GHSA
GHSA-m6h2-jx9v-58w6
Missing Authorization in Apache Airflow
If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2.
{'CVE-2021-35936'}
2021-08-30T16:25:57Z
2021-08-30T16:25:57Z
MODERATE
5.3
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-35936', 'https://github.com/advisories/GHSA-m6h2-jx9v-58w6', 'https://lists.apache.org/thread.html/r53d6bd7b0a66f92ddaf1313282f10fec802e71246606dd30c16536df%40%3Cusers.airflow.apache.org%3E'}
null
GHSA
GHSA-23fq-q7hc-993r
Improper Preservation of Permissions in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.4.0 through 1.7.3 initialized an underlying database file associated with the Integrated Storage feature with excessively broad filesystem permissions. Fixed in Vault and Vault Enterprise 1.8.0.
{'CVE-2021-38553'}
2021-08-30T17:22:53Z
2021-08-30T17:22:53Z
CRITICAL
9.8
{'CWE-281'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38553', 'https://github.com/advisories/GHSA-23fq-q7hc-993r', 'https://discuss.hashicorp.com/t/hcsec-2021-20-vault-s-integrated-storage-backend-database-file-may-have-excessively-broad-permissions/28168'}
null
GHSA
GHSA-m3j9-p4x2-97q6
Directory Traversal in liyujing
Affected versions of `liyujing` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16120'}
2021-01-14T15:49:25Z
2020-09-01T17:22:49Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/liyujing', 'https://nodesecurity.io/advisories/387', 'https://github.com/advisories/GHSA-m3j9-p4x2-97q6', 'https://www.npmjs.com/advisories/387', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16120'}
null
GHSA
GHSA-m49f-hcxp-6hm6
CSRF allowing an external page to trigger a user logout event
### Impact A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.** ### Patches None. ### Workarounds None. ### For more information If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `dane@pterodactyl.io`.
{'CVE-2021-41176'}
2022-04-19T19:03:12Z
2021-10-25T19:42:46Z
LOW
0
{'CWE-352'}
{'https://github.com/pterodactyl/panel/releases/tag/v1.6.3', 'https://github.com/advisories/GHSA-m49f-hcxp-6hm6', 'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41176', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6'}
null
GHSA
GHSA-qp6m-jqfr-2f7v
Malicious Package in babel-laoder
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:17:25Z
2020-09-04T15:27:11Z
CRITICAL
9.1
{'CWE-506'}
{'https://snyk.io/vuln/SNYK-JS-BABELLAODER-536195', 'https://github.com/advisories/GHSA-qp6m-jqfr-2f7v', 'https://github.com/babel/babel-loader', 'https://www.npmjs.com/advisories/1348'}
null
GHSA
GHSA-6m85-wvcr-pgw3
Prototype Pollution in safetydance
All versions of package safetydance are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7737'}
2022-02-10T20:33:49Z
2022-02-10T20:33:49Z
HIGH
7.3
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7737', 'https://www.npmjs.com/package/safetydance', 'https://github.com/advisories/GHSA-6m85-wvcr-pgw3', 'https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687'}
null
GHSA
GHSA-2pr6-76vf-7546
Denial of Service in js-yaml
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. ## Recommendation Upgrade to version 3.13.0.
null
2021-08-04T21:32:57Z
2019-06-05T14:35:29Z
MODERATE
5.9
{'CWE-400'}
{'https://www.npmjs.com/advisories/788', 'https://github.com/nodeca/js-yaml/issues/475', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999', 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://github.com/advisories/GHSA-2pr6-76vf-7546', 'https://www.npmjs.com/advisories/788/versions'}
null
GHSA
GHSA-mmq6-q8r3-48fm
Crash in `tf.strings.substr` due to `CHECK`-fail
### Impact An attacker can cause a denial of service via `CHECK`-fail in `tf.strings.substr` with invalid arguments: ```python import tensorflow as tf tf.strings.substr(input='abc', len=1, pos=[1,-1]) ``` ```python import tensorflow as tf tf.strings.substr(input='abc', len=1, pos=[1,2]) ``` ### Patches We have received a patch for the issue in GitHub commit [890f7164b70354c57d40eda52dcdd7658677c09f](https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported in [#46900](https://github.com/tensorflow/issues/46900) and fixed in [#46974](https://github.com/tensorflow/issues/46974).
{'CVE-2021-29617'}
2021-09-28T21:11:39Z
2021-05-21T14:28:50Z
LOW
2.5
{'CWE-755'}
{'https://github.com/tensorflow/issues/46900', 'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f', 'https://github.com/tensorflow/issues/46974', 'https://github.com/advisories/GHSA-mmq6-q8r3-48fm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29617', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm'}
null
GHSA
GHSA-vj42-xq3r-hr3r
Out-of-bounds reads in Pillow
In libImaging/Jpeg2KDecode.c in Pillow before 7.0.0, there are multiple out-of-bounds reads via a crafted JP2 file.
{'CVE-2020-10994'}
2021-09-22T21:44:31Z
2020-07-27T21:52:39Z
MODERATE
5.5
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575', 'https://pillow.readthedocs.io/en/stable/releasenotes/', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10994', 'https://github.com/advisories/GHSA-vj42-xq3r-hr3r', 'https://usn.ubuntu.com/4430-2/', 'https://usn.ubuntu.com/4430-1/', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security', 'https://github.com/python-pillow/Pillow/pull/4505'}
null