ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-3jqw-vv45-mjhh
XSS/Script injection vulnerability in matestack
matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection. This vulnerability is patched in version 0.7.4.
{'CVE-2020-5241'}
2022-04-19T19:02:24Z
2020-02-12T23:37:46Z
HIGH
7.7
{'CWE-80'}
{'https://github.com/advisories/GHSA-3jqw-vv45-mjhh', 'https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5241'}
null
GHSA
GHSA-74qp-233x-p5j8
Cross-site scripting (XSS) in Apache Livy
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
{'CVE-2021-26544'}
2021-05-13T22:30:41Z
2021-05-13T22:30:41Z
MODERATE
5.4
{'CWE-79'}
{'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E', 'https://github.com/advisories/GHSA-74qp-233x-p5j8', 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26544', 'http://www.openwall.com/lists/oss-security/2021/02/20/1'}
null
GHSA
GHSA-rrx2-r989-2c43
Integer overflows in Tensorflow
### Impact The [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service): ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseDenseCwiseDiv( sp_indices=np.array([[9]]), sp_values=np.array([5]), sp_shape=np.array([92233720368., 92233720368]), dense=np.array([4])) ``` We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory. ### Patches We have patched the issue in GitHub commits [1b54cadd19391b60b6fcccd8d076426f7221d5e8](https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8) and [e952a89b7026b98fe8cbe626514a93ed68b7c510](https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-23567'}
2022-02-11T17:05:35Z
2022-02-09T23:39:33Z
MODERATE
6.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23567', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510', 'https://github.com/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43'}
null
GHSA
GHSA-x3g3-334f-q6h4
Moderate severity vulnerability that affects editor.md
pandao Editor.md 1.5.0 has DOM XSS via input starting with a "<<" substring, which is mishandled during construction of an A element.
{'CVE-2018-19056'}
2021-09-21T22:01:01Z
2018-11-09T17:41:15Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/pandao/editor.md/issues/634', 'https://github.com/advisories/GHSA-x3g3-334f-q6h4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056'}
null
GHSA
GHSA-mrmf-qwxg-7c3h
XSS in Data URI in remarkable
Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript. ## Proof of Concept ``` [link](data:text/html,<script>alert('0')</script>) ``` ## Recommendation Update to v1.7.0 or later
{'CVE-2017-16006'}
2021-01-08T18:25:54Z
2018-11-09T17:48:20Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/319', 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h', 'https://nodesecurity.io/advisories/319', 'https://github.com/jonschlinkert/remarkable/issues/227', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006'}
null
GHSA
GHSA-6394-6h9h-cfjg
Regular Expression Denial of Service
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
null
2021-02-25T17:23:13Z
2019-06-07T21:12:35Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-6394-6h9h-cfjg', 'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
null
GHSA
GHSA-vpfp-5gwq-g533
Improper Authentication in Apache ShenYu Admin
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
{'CVE-2021-37580'}
2021-11-18T15:12:16Z
2021-11-17T23:15:30Z
CRITICAL
9.8
{'CWE-287'}
{'http://www.openwall.com/lists/oss-security/2021/11/16/1', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4', 'https://github.com/advisories/GHSA-vpfp-5gwq-g533', 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb'}
null
GHSA
GHSA-8vcr-vxm8-293m
Denial of Service in SheetsJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).
{'CVE-2021-32013'}
2022-02-08T21:02:07Z
2021-07-22T19:48:13Z
MODERATE
5.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32013', 'https://github.com/advisories/GHSA-8vcr-vxm8-293m', 'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-hqxw-mm44-gc4r
Fragments in Path May Lead to Authorization Policy Bypass
### Impact Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies. ### Patches * Istio 1.11.1 and above * Istio 1.10.4 and above * Istio 1.9.8 and above ### Workarounds A Lua filter may be written to normalize the path. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide. ### References More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008) ### For more information If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com
{'CVE-2021-39156'}
2022-04-19T19:03:06Z
2021-08-30T16:16:14Z
HIGH
8.1
{'CWE-863'}
{'https://github.com/advisories/GHSA-hqxw-mm44-gc4r', 'https://istio.io/latest/news/security/istio-security-2021-008', 'https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39156'}
null
GHSA
GHSA-9jxw-cfrh-jxq6
New line injection during configuration edition
### Impact Authenticated users, regardless of their privileges (_User_ or _Admin_), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server. ### Patches This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values. ### Workarounds Only allow trusted source IP addresses to access to the administration dashboard. ### References - https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-39172'}
2022-04-19T19:03:01Z
2021-08-30T16:11:24Z
HIGH
8.8
{'CWE-93'}
{'https://github.com/fiveai/Cachet/releases/tag/v2.5.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39172', 'https://github.com/advisories/GHSA-9jxw-cfrh-jxq6', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6'}
null
GHSA
GHSA-v6gp-9mmm-c6p5
Out-of-bounds Write in zlib affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05. Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.4`, and only if the packaged version of `zlib` is being used. Please see [this document](https://nokogiri.org/LICENSE-DEPENDENCIES.html#default-platform-release-ruby) for a complete description of which platform gems vendor `zlib`. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `zlib` release announcements. ## Mitigation Upgrade to Nokogiri `>= v1.13.4`. ## Impact ### [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032) in zlib - **Severity**: High - **Type**: [CWE-787](https://cwe.mitre.org/data/definitions/787.html) Out of bounds write - **Description**: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
null
2022-04-11T21:40:13Z
2022-04-11T21:21:28Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-25032', 'https://github.com/advisories/GHSA-v6gp-9mmm-c6p5', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://github.com/advisories/GHSA-jc36-42cf-vqwj', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}
null
GHSA
GHSA-589w-hccm-265x
Inline attribute values were not processed.
### Impact Inline attributes have not been processed escape. If the data that came from users was not processed, then an XSS vulnerability is possible ### Patches Fixed in 9.4.4
{'CVE-2020-15263'}
2021-01-07T22:50:46Z
2020-10-19T20:17:47Z
HIGH
8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15263', 'https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x', 'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169', 'https://github.com/advisories/GHSA-589w-hccm-265x'}
null
GHSA
GHSA-vv4c-g6q7-p3q7
Moderate severity vulnerability that affects doorkeeper-openid_connect
Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.
{'CVE-2019-9837'}
2021-09-20T22:19:26Z
2019-03-25T16:15:54Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9837', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/issues/61', 'https://github.com/advisories/GHSA-vv4c-g6q7-p3q7', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md'}
null
GHSA
GHSA-573x-jhqh-jg36
Moderate severity vulnerability that affects chloride
Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previously unknown hosts getting added to the user's known_hosts file without confirmation. In version 0.3.0 this is updated so that the user's known_hosts file is not updated by chloride.
{'CVE-2018-6517'}
2021-09-01T19:29:07Z
2019-03-25T16:16:27Z
HIGH
7.5
{'CWE-295'}
{'https://puppet.com/security/cve/CVE-2018-6517', 'https://github.com/advisories/GHSA-573x-jhqh-jg36', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6517'}
null
GHSA
GHSA-cr4x-w2v7-4mmf
Malicious Package in bufver-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:36:14Z
2020-09-03T22:26:13Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-cr4x-w2v7-4mmf', 'https://www.npmjs.com/advisories/1265'}
null
GHSA
GHSA-229r-pqp6-8w6g
High severity vulnerability that affects sprout
The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
{'CVE-2013-6421'}
2021-08-30T14:57:23Z
2017-10-24T18:33:36Z
HIGH
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2013-6421', 'http://www.openwall.com/lists/oss-security/2013/12/03/6', 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html', 'https://github.com/advisories/GHSA-229r-pqp6-8w6g', 'http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html', 'http://www.openwall.com/lists/oss-security/2013/12/03/1'}
null
GHSA
GHSA-hrqr-hxpp-chr3
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison. ### Impact The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session. ## Releases The 1.6.12 and 2.0.8 releases are available at the normal locations. ### Workarounds There are no known workarounds. ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 1-6-session-timing-attack.patch - Patch for 1.6 series * 2-0-session-timing-attack.patch - Patch for 2.6 series ### Credits Thanks Will Leinweber for reporting this!
{'CVE-2019-16782'}
2022-04-19T19:02:23Z
2019-12-18T19:01:31Z
MODERATE
6.3
{'CWE-208', 'CWE-203'}
{'http://www.openwall.com/lists/oss-security/2020/04/09/2', 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38', 'http://www.openwall.com/lists/oss-security/2020/04/08/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782', 'http://www.openwall.com/lists/oss-security/2019/12/18/2', 'http://www.openwall.com/lists/oss-security/2019/12/19/3', 'https://github.com/advisories/GHSA-hrqr-hxpp-chr3', 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'http://www.openwall.com/lists/oss-security/2019/12/18/3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/'}
null
GHSA
GHSA-772j-h9xw-ffp5
CHECK-fail in SparseCross due to type confusion
### Impact The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service: ```python import tensorflow as tf hashed_output = False num_buckets = 1949315406 hash_key = 1869835877 out_type = tf.string internal_type = tf.string indices_1 = tf.constant([0, 6], shape=[1, 2], dtype=tf.int64) indices_2 = tf.constant([0, 0], shape=[1, 2], dtype=tf.int64) indices = [indices_1, indices_2] values_1 = tf.constant([0], dtype=tf.int64) values_2 = tf.constant([72], dtype=tf.int64) values = [values_1, values_2] batch_size = 4 shape_1 = tf.constant([4, 122], dtype=tf.int64) shape_2 = tf.constant([4, 188], dtype=tf.int64) shapes = [shape_1, shape_2] dense_1 = tf.constant([188, 127, 336, 0], shape=[4, 1], dtype=tf.int64) dense_2 = tf.constant([341, 470, 470, 470], shape=[4, 1], dtype=tf.int64) dense_3 = tf.constant([188, 188, 341, 922], shape=[4, 1], dtype=tf.int64) denses = [dense_1, dense_2, dense_3] tf.raw_ops.SparseCross(indices=indices, values=values, shapes=shapes, dense_inputs=denses, hashed_output=hashed_output, num_buckets=num_buckets, hash_key=hash_key, out_type=out_type, internal_type=internal_type) ``` The above code will result in a `CHECK` fail in [`tensor.cc`](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/framework/tensor.cc#L670-L675): ```cc void Tensor::CheckTypeAndIsAligned(DataType expected_dtype) const { CHECK_EQ(dtype(), expected_dtype) << " " << DataTypeString(expected_dtype) << " expected, got " << DataTypeString(dtype()); ... } ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements: ```cc if (DT_STRING == values_.dtype()) return Fingerprint64(values_.vec<tstring>().data()[start + n]); return values_.vec<int64>().data()[start + n]; ``` Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue. ### Patches We have patched the issue in GitHub commit [b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025](https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29519'}
2021-05-21T14:21:08Z
2021-05-21T14:21:08Z
LOW
2.5
{'CWE-843'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29519', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5', 'https://github.com/advisories/GHSA-772j-h9xw-ffp5', 'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}
null
GHSA
GHSA-2j5x-56p6-hj6x
Path Traversal in statichttpserver
All versions of `statichttpserver` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5480'}
2021-01-08T20:41:24Z
2019-09-04T10:02:14Z
CRITICAL
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5480', 'https://github.com/advisories/GHSA-2j5x-56p6-hj6x', 'https://hackerone.com/reports/570035', 'https://www.npmjs.com/advisories/1143'}
null
GHSA
GHSA-7f5c-rpf4-86p8
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs
The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.
{'CVE-2021-32822'}
2021-09-02T17:16:46Z
2021-09-02T17:16:46Z
MODERATE
4
{'CWE-200', 'CWE-538'}
{'https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/', 'https://github.com/advisories/GHSA-7f5c-rpf4-86p8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32822'}
null
GHSA
GHSA-jq4v-f5q6-mjqq
Cross-Site Scripting in lxml
An XSS vulnerability was discovered in the python `lxml` clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in `lxml` 4.6.3.
{'CVE-2021-28957'}
2021-10-21T17:31:22Z
2021-03-22T16:53:53Z
MODERATE
6.1
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20210521-0004/', 'https://www.debian.org/security/2021/dsa-4880', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28957', 'https://github.com/lxml/lxml/pull/316', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://pypi.org/project/lxml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/'}
null
GHSA
GHSA-2x4q-6jfv-8h9h
Path Traversal in glance
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`. ## Recommendation Update to version 3.0.4 or later.
{'CVE-2018-3715'}
2021-01-08T21:14:55Z
2018-07-26T14:53:14Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://www.npmjs.com/advisories/590', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
null
GHSA
GHSA-4f5x-q4jc-xfcf
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore.
{'CVE-2022-0262'}
2022-01-21T23:31:35Z
2022-01-21T23:31:35Z
MODERATE
6.6
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0262', 'https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d', 'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7', 'https://github.com/advisories/GHSA-4f5x-q4jc-xfcf'}
null
GHSA
GHSA-5m6c-jp6f-2vcv
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
{'CVE-2020-4037'}
2021-12-20T17:58:59Z
2021-12-20T17:58:59Z
MODERATE
4.3
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4037', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv', 'https://github.com/advisories/GHSA-5m6c-jp6f-2vcv', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
null
GHSA
GHSA-ppc3-fpvh-7396
Improper synchronization in Apache Netbeans HTML/Java API
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file.
{'CVE-2020-17534'}
2022-05-03T19:31:06Z
2022-02-09T22:25:18Z
HIGH
7
{'CWE-362'}
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6', 'https://github.com/advisories/GHSA-ppc3-fpvh-7396', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E'}
null
GHSA
GHSA-fv82-r8qv-ch4v
pomerium_signature is not verified in middleware in github.com/pomerium/pomerium
### Impact Some API endpoints under /.pomerium/ do not verify parameters with pomerium_signature. This could allow modifying parameters intended to be trusted to Pomerium. The issue mainly affects routes responsible for sign in/out, but does not introduce an authentication bypass. ### Patches Patched in v0.13.4 ### For more information If you have any questions or comments about this advisory * Open an issue in [pomerium](http://github.com/pomerium/pomerium) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
{'CVE-2021-29652'}
2022-04-19T19:02:52Z
2021-05-21T16:24:22Z
HIGH
5.4
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29652', 'https://github.com/pomerium/pomerium/pull/2048', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v', 'https://github.com/advisories/GHSA-fv82-r8qv-ch4v'}
null
GHSA
GHSA-63q7-h895-m982
Cross-site Scripting in dompurify
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
{'CVE-2020-26870'}
2022-04-28T17:58:52Z
2020-12-18T22:51:40Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/advisories/GHSA-63q7-h895-m982', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
null
GHSA
GHSA-8fw4-xh83-3j6q
Cross-Site Scripting in diagram-js
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript. ## Recommendation If you are using diagram-js 3.x, upgrade to version 3.3.1. If you are using diagram-js 2.x, upgrade to version 2.6.2.
null
2021-09-28T16:58:44Z
2020-09-11T21:18:05Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-8fw4-xh83-3j6q', 'https://github.com/bpmn-io/diagram-js', 'https://www.npmjs.com/advisories/982'}
null
GHSA
GHSA-4qr3-m7ww-hh9g
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free.
{'CVE-2021-45717'}
2022-01-06T22:01:40Z
2022-01-06T22:01:40Z
HIGH
7.5
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45717', 'https://github.com/advisories/GHSA-4qr3-m7ww-hh9g', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
null
GHSA
GHSA-f698-m2v9-5fh3
Command Injection in opencv
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands. ## Recommendation Upgrade to version 6.1.0.
null
2021-08-04T20:49:45Z
2019-06-04T20:11:44Z
LOW
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-f698-m2v9-5fh3', 'https://www.npmjs.com/advisories/789', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
null
GHSA
GHSA-m46p-ggm5-5j83
Moderate severity vulnerability that affects rails
Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
{'CVE-2014-0081'}
2021-09-14T22:06:44Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-m46p-ggm5-5j83', 'http://www.securitytracker.com/id/1029782', 'http://secunia.com/advisories/57376', 'http://rhn.redhat.com/errata/RHSA-2014-0215.html', 'http://openwall.com/lists/oss-security/2014/02/18/8', 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081', 'http://www.securityfocus.com/bid/65647', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ', 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}
null
GHSA
GHSA-xj6r-2jpm-qvxp
Code injection issue for java-spring-cloud-stream-template
The following was initially reported by @jonaslagoni: Given the following command: `ag ./dummy.json @asyncapi/java-spring-cloud-stream-template --force-write --output ./output` With the following AsyncAPI document: ```json { "asyncapi": "2.0.0", "info": { "title": "Streetlight", "version": "1.0.0" }, "defaultContentType": "json", "channels": { "security/audit/channel": { "description": "Channel for the turn on command which should turn on the streetlight", "parameters": { "streetlight_id": { "description": "The ID of the streetlight", "schema": { "type": "string" } } }, "publish": { "operationId": "test() { System.out.println(\"injected\"); return test(0); }\n public Consumer<CustomClass> someothername", "message": { "name": "TurnonCommand", "payload": { "$ref": "#/components/schemas/CustomClass" } } } } }, "components": { "schemas" : { "CustomClass": { "type": "object", "properties": { "prop": { "type": "string" } } } } } } ``` Which changes the following output: ```java ... @Bean public Consumer<CustomClass> test() { // Add business logic here. return null; } ... ``` To ```java ... @Bean public Consumer<CustomClass> test() { System.out.println("injected"); return someothername(); } public Consumer<CustomClass> someothername() { // Add business logic here. return null; } ... ```
{'CVE-2021-37694'}
2022-04-19T19:03:01Z
2021-08-25T14:45:52Z
HIGH
8.7
{'CWE-94'}
{'https://github.com/asyncapi/java-spring-cloud-stream-template/security/advisories/GHSA-xj6r-2jpm-qvxp', 'https://github.com/advisories/GHSA-xj6r-2jpm-qvxp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37694'}
null
GHSA
GHSA-3c48-6pcv-88rm
Macro in MathJax running untrusted Javascript within a web browser
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
{'CVE-2018-1999024'}
2022-04-26T18:18:00Z
2018-07-27T17:05:27Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
null
GHSA
GHSA-r9p9-mrjm-926w
Use of a Broken or Risky Cryptographic Algorithm
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
{'CVE-2020-28498'}
2021-03-08T16:06:50Z
2021-03-08T16:06:50Z
MODERATE
6.8
{'CWE-327'}
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://github.com/advisories/GHSA-r9p9-mrjm-926w', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
null
GHSA
GHSA-4xr4-4c65-hj7f
Apache Tika does not properly initialize the XML parser or choose handlers
Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175.
{'CVE-2016-4434'}
2022-04-26T21:46:37Z
2018-10-17T15:44:22Z
HIGH
7.8
{'CWE-611'}
{'http://rhn.redhat.com/errata/RHSA-2017-0272.html', 'http://rhn.redhat.com/errata/RHSA-2017-0248.html', 'http://rhn.redhat.com/errata/RHSA-2017-0249.html', 'http://www.securityfocus.com/archive/1/538500/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4434', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-4xr4-4c65-hj7f', 'https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E'}
null
GHSA
GHSA-c8cw-2c5j-xff3
Incorrect Authorization in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.
{'CVE-2021-39234'}
2021-11-23T17:56:30Z
2021-11-23T17:56:30Z
MODERATE
6.8
{'CWE-863'}
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39234', 'https://github.com/advisories/GHSA-c8cw-2c5j-xff3'}
null
GHSA
GHSA-29v7-3v4c-gf38
Data races in parc
An issue was discovered in the parc crate through 2020-11-14 for Rust. LockWeak<T> has an unconditional implementation of Send without trait bounds on T.
{'CVE-2020-36454'}
2021-08-25T20:57:24Z
2021-08-25T20:57:24Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://github.com/advisories/GHSA-29v7-3v4c-gf38', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/parc/RUSTSEC-2020-0134.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0134.html', 'https://github.com/hyyking/rustracts/pull/6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36454'}
null
GHSA
GHSA-72hv-rp4q-q7f3
Hijacked Environment Variables in babelcli
The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16060'}
2021-01-08T19:19:20Z
2018-08-29T23:57:14Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16060', 'https://nodesecurity.io/advisories/499', 'https://www.npmjs.com/advisories/499', 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3'}
null
GHSA
GHSA-8867-vpm3-g98g
Incorrect Default Permissions in keyring
Python keyring has insecure permissions on new databases allowing world-readable files to be created
{'CVE-2012-5578'}
2021-08-19T21:46:53Z
2020-03-10T20:56:41Z
MODERATE
6.2
{'CWE-276'}
{'https://github.com/advisories/GHSA-8867-vpm3-g98g', 'http://www.openwall.com/lists/oss-security/2012/11/27/4', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5578', 'https://github.com/jaraco/keyring/blob/master/CHANGES.rst#010', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5578', 'https://access.redhat.com/security/cve/cve-2012-5578', 'https://bugs.launchpad.net/ubuntu/+source/python-keyring/+bug/1031465', 'https://security-tracker.debian.org/tracker/CVE-2012-5578', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5578'}
null
GHSA
GHSA-4w46-w44m-3jq3
Parse Server stores password in plain text
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
{'CVE-2020-26288'}
2022-04-19T19:02:42Z
2020-12-28T16:33:17Z
LOW
7.7
{'CWE-312'}
{'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://www.npmjs.com/package/parse-server', 'https://www.npmjs.com/advisories/1593', 'https://github.com/advisories/GHSA-4w46-w44m-3jq3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288'}
null
GHSA
GHSA-hx77-5p88-f92r
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4131'}
2022-01-05T20:33:55Z
2022-01-05T20:33:55Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4131', 'https://github.com/advisories/GHSA-hx77-5p88-f92r', 'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f', 'https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43'}
null
GHSA
GHSA-6cgh-hjpw-q3gq
Utils.readChallengeTx does not verify the server account signature
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
{'CVE-2021-32738'}
2022-04-19T19:03:01Z
2021-07-02T19:20:33Z
MODERATE
6.5
{'CWE-287'}
{'https://github.com/advisories/GHSA-6cgh-hjpw-q3gq', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3'}
null
GHSA
GHSA-vcjj-9vg7-vf68
Null pointer dereference in TFLite
### Impact An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service: ```python import tensorflow as tf model = tf.keras.models.Sequential() model.add(tf.keras.Input(shape=(1, 2, 3))) model.add(tf.keras.layers.Dense(0, activation='relu')) converter = tf.lite.TFLiteConverter.from_keras_model(model) tflite_model = converter.convert() interpreter = tf.lite.Interpreter(model_content=tflite_model) interpreter.allocate_tensors() interpreter.invoke() ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer. ```cc if (y4 > 1) { // ... } else { for (int i0 = 0; i0 < y0; ++i0) { const T* input2_data_ptr = nullptr; for (int i1 = 0; i1 < y1; ++i1) { input2_data_ptr = input2_data_reset; for (int i2 = 0; i2 < y2; ++i2) { scalar_broadcast_f(y3, params, *input1_data_ptr, input2_data_ptr, output_data_ptr); } } } } ``` ### Patches We have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37688'}
2021-08-25T14:39:54Z
2021-08-25T14:39:54Z
HIGH
7.8
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37688', 'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c', 'https://github.com/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68'}
null
GHSA
GHSA-g3rq-g295-4j3m
Regular Expression Denial of Service (ReDoS) in Jinja2
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
{'CVE-2020-28493'}
2022-04-18T21:58:05Z
2021-03-19T21:28:05Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/advisories/GHSA-g3rq-g295-4j3m', 'https://github.com/pallets/jinja/pull/1343', 'https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVAKCOO7VBVUBM3Q6CBBTPBFNP5NDXF4/', 'https://security.gentoo.org/glsa/202107-19', 'https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28493'}
null
GHSA
GHSA-j49g-mp79-5vm5
Exfiltrates data on installation in coffe-script
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffe-script` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16203'}
2021-01-08T18:37:36Z
2018-08-06T20:06:29Z
MODERATE
0
{'CWE-506'}
{'https://github.com/advisories/GHSA-j49g-mp79-5vm5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203', 'https://www.npmjs.com/advisories/543', 'https://nodesecurity.io/advisories/543'}
null
GHSA
GHSA-q88g-qx42-xfrh
Path traversal in bolt/core
Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal.
{'CVE-2021-27367'}
2021-02-24T06:53:22Z
2021-02-18T20:51:56Z
HIGH
0
{'CWE-22'}
{'https://github.com/bolt/core/releases/tag/4.1.13', 'https://packagist.org/packages/bolt/core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27367', 'https://github.com/advisories/GHSA-q88g-qx42-xfrh', 'https://github.com/bolt/core/pull/2371'}
null
GHSA
GHSA-ff84-84q5-fq4f
Incorrect Authorization in Apache Ozone
In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.
{'CVE-2021-39232'}
2021-11-23T17:56:54Z
2021-11-23T17:56:54Z
HIGH
8.8
{'CWE-863'}
{'http://www.openwall.com/lists/oss-security/2021/11/19/3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39232', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E', 'https://github.com/advisories/GHSA-ff84-84q5-fq4f'}
null
GHSA
GHSA-792j-9wj3-j634
Command injection in github-todos
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
{'CVE-2021-44684'}
2021-12-10T20:30:52Z
2021-12-10T20:30:52Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44684', 'https://github.com/dwisiswant0/advisory/issues/5', 'https://github.com/advisories/GHSA-792j-9wj3-j634', 'https://github.com/naholyr/github-todos/issues/34'}
null
GHSA
GHSA-rvwf-54qp-4r6v
XML Entity Expansion in SnakeYAML
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
{'CVE-2017-18640'}
2022-04-19T19:11:42Z
2021-06-04T21:37:45Z
HIGH
7.5
{'CWE-776'}
{'https://github.com/advisories/GHSA-rvwf-54qp-4r6v', 'https://lists.apache.org/thread.html/rce5c93bba6e815fb62ad38e28ca1943b3019af1eddeb06507ad4e11a@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r72a3588d62b2de1361dc9648f5d355385735e47f7ba49d089b0e680d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r436988d2cfe8a770ae361c82b181c5b2bf48a249bad84d8a55a3b46e@%3Cdev.phoenix.apache.org%3E', 'https://lists.apache.org/thread.html/r56805265475919252ba7fc10123f15b91097f3009bae86476624ca25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rbaa1f513d903c89a08267c91d86811fa5bcc82e0596b6142c5cea7ea@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r22ac2aa053b7d9c6b75a49db78125c9316499668d0f4a044f3402e2f@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r6d54c2da792c74cc14b9b7665ea89e144c9e238ed478d37fd56292e6@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r8b57c57cffa01e418868a3c7535b987635ff1fb5ab534203bfa2d64a@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r666f29a7d0e1f98fa1425ca01efcfa86e6e3856e01d300828aa7c6ea@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18640', 'https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb0e033d5ec8233360203431ad96580cf2ec56f47d9a425d894e279c2@%3Cpr.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTVJC54XGX26UJVVYCXZ7D25X3R5T2G6/', 'https://lists.apache.org/thread.html/reb1751562ee5146d3aca654a2df76a2c13d8036645ce69946f9c219e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E', 'https://lists.apache.org/thread.html/rcb4b61dbe2ed1c7a88781a9aff5a9e7342cc7ed026aec0418ee67596@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/recfe569f4f260328b0036f1c82b2956e864d519ab941a5e75d0d832d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re791a854001ec1f79cd4f47328b270e7a1d9d7056debb8f16d962722@%3Cdev.atlas.apache.org%3E', 'https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion', 'https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack', 'https://lists.apache.org/thread.html/raebd2019b3da8c2f90f31e8b203b45353f78770ca93bfe5376f5532e@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re851bbfbedd47c690b6e01942acb98ee08bd00df1a94910b905bc8cd@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rc3211c71f7e0973a1825d1988a3921288c06cd9d793eae97ecd34948@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKN7VGIKTYBCAKYBRG55QHXAY5UDZ7HA/', 'https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c', 'https://lists.apache.org/thread.html/r4d7f37da1bc2df90a5a0f56eb7629b5ea131bfe11eeeb4b4c193f64a@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r55d807f31e64a080c54455897c20b1667ec792e5915132c7b7750533@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r6c91e52b3cc9f4e64afe0f34f20507143fd1f756d12681a56a9b38da@%3Ccommits.pulsar.apache.org%3E', 'https://mvnrepository.com/artifact/org.yaml/snakeyaml/1.25/usages', 'https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c33d0069c927fae16084f0605895b98d231d7c48527bcb822ac48c@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rf95bebee6dfcc55067cebe8482bd31e6f481d9f74ba8e03f860c3ec7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb7b28ac741e32dd5edb2c22485d635275bead7290b056ee56baf8ce0@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rb34d8d3269ad47a1400f5a1a2d8310e13a80b6576ebd7f512144198d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r8464b6ec951aace8c807bac9ea526d4f9e3116aa16d38be06f7c6524@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r2db207a2431a5e9e95e899858ab1f5eabd9bcc790a6ca7193ae07e94@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4c682fb8cf69dd14162439656a6ebdf42ea6ad0e4edba95907ea3f14@%3Ccommits.servicecomb.apache.org%3E', 'https://bitbucket.org/asomov/snakeyaml/wiki/Changes', 'https://lists.apache.org/thread.html/r28c9009a48d52cf448f8b02cd823da0f8601d2dff4d66f387a35f1e0@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r643ba53f002ae59068f9352fe1d82e1b6f375387ffb776f13efe8fda@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r2a5b84fdf59042dc398497e914b5bb1aed77328320b1438144ae1953@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r900e020760c89f082df1c6e0d46320eba721e4e47bb9eb521e68cd95@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rd582c64f66c354240290072f340505f5d026ca944ec417226bb0272e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2a7037366c58bac6aec6ce3df843a11ef97ae4eb049f05f410eaa5@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5510f0125ba409fc1cabd098ab8b457741e5fa314cbd0e61e4339422@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r2b05744c0c2867daa5d1a96832965b7d6220328b0ead06c22a6e7854@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E'}
null
GHSA
GHSA-jgrx-mgxx-jf9v
Regular Expression Denial of Service in tmpl
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
{'CVE-2021-3777'}
2022-05-04T03:26:17Z
2021-09-20T20:27:52Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://github.com/advisories/GHSA-jgrx-mgxx-jf9v', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df'}
null
GHSA
GHSA-qg3g-2mgh-33j8
Sensitive Data Exposure in msrcrypto
Versions of `msrcrypto` prior to 1.4.1 are vulnerable to Sensitive Data Exposure. The package's Elliptic Curve Cryptography (ECC) implementation may leak information about a server's private ECC key. It can also allow attackers to craft invalid ECDSA signatures that pass as valid. There is no published proof-of-concept for this vulnerability. ## Recommendation Upgrade to version 1.4.1 or later.
{'CVE-2018-8319'}
2021-09-16T19:58:02Z
2018-09-10T15:19:49Z
CRITICAL
9.8
{'CWE-682'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8319', 'http://www.securityfocus.com/bid/104655', 'http://www.securitytracker.com/id/1041268', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8319', 'https://github.com/advisories/GHSA-qg3g-2mgh-33j8', 'https://www.npmjs.com/advisories/1112'}
null
GHSA
GHSA-c8qc-62qv-5p2x
Out-of-bounds Write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0828'}
2021-07-28T18:58:22Z
2021-07-28T18:58:22Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0828', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0828', 'https://github.com/advisories/GHSA-c8qc-62qv-5p2x'}
null
GHSA
GHSA-fw5f-7c6c-3vmv
Cross-site Scripting in PrimeFaces
An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.
{'CVE-2020-10544'}
2021-05-07T16:16:30Z
2021-05-07T16:16:30Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10544', 'https://github.com/primefaces/primefaces/issues/5642', 'https://github.com/advisories/GHSA-fw5f-7c6c-3vmv'}
null
GHSA
GHSA-52mh-p2m2-w625
Cross-site Scripting in HAPI FHIR
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)
{'CVE-2019-12741'}
2021-08-04T21:01:40Z
2019-06-07T20:56:59Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://github.com/advisories/GHSA-52mh-p2m2-w625', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'}
null
GHSA
GHSA-2mrj-435v-c2cr
possible DoS caused by malformed signature decoding in Pure-Python ECDSA
**Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g.
{'CVE-2019-14853'}
2020-06-16T20:17:43Z
2019-12-02T18:15:31Z
MODERATE
0
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853', 'https://seclists.org/bugtraq/2019/Dec/33', 'https://www.debian.org/security/2019/dsa-4588', 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3', 'https://github.com/advisories/GHSA-2mrj-435v-c2cr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}
null
GHSA
GHSA-jm34-xm8m-w958
Open Redirect in oauth2_proxy
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
{'CVE-2017-1000070'}
2021-12-20T18:04:40Z
2021-12-20T18:04:40Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070', 'https://github.com/advisories/GHSA-jm34-xm8m-w958', 'https://github.com/bitly/oauth2_proxy/issues/228', 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050', 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5', 'https://github.com/bitly/oauth2_proxy/pull/359'}
null
GHSA
GHSA-5949-rw7g-wx7w
Deserialization of untrusted data in jackson-databind
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20190'}
2021-04-26T14:52:04Z
2021-01-20T21:20:15Z
HIGH
0
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://github.com/advisories/GHSA-5949-rw7g-wx7w', 'https://security.netapp.com/advisory/ntap-20210219-0008/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E'}
null
GHSA
GHSA-74mg-6xqx-2vrq
Deserialization exploitation in Apache Dubbo
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
{'CVE-2020-11995'}
2022-02-09T22:27:01Z
2022-02-09T22:27:01Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11995', 'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-74mg-6xqx-2vrq'}
null
GHSA
GHSA-xqj7-j8j5-f2xr
Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
{'CVE-2018-1000180'}
2022-04-26T18:56:39Z
2018-10-16T17:44:39Z
HIGH
7.5
{'CWE-327'}
{'https://access.redhat.com/errata/RHSA-2018:2423', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000180', 'https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test', 'https://github.com/advisories/GHSA-xqj7-j8j5-f2xr', 'https://security.netapp.com/advisory/ntap-20190204-0003/', 'http://www.securityfocus.com/bid/106567', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://www.debian.org/security/2018/dsa-4233', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html'}
null
GHSA
GHSA-vm67-mh96-95mq
Malicious Package in bubfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:53:44Z
2020-09-03T21:40:48Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-vm67-mh96-95mq', 'https://www.npmjs.com/advisories/1232'}
null
GHSA
GHSA-j8wc-gxx9-82hx
Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
{'CVE-2021-40690'}
2022-04-22T15:41:53Z
2021-09-20T23:18:41Z
HIGH
7.5
{'CWE-200'}
{'https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5010', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40690', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html', 'https://github.com/advisories/GHSA-j8wc-gxx9-82hx', 'https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E', 'https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E'}
null
GHSA
GHSA-qfpc-5pjr-mh26
Missing validation in shape inference for `Dequantize`
### Impact The shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments: ```python import tensorflow as tf tf.compat.v1.disable_v2_behavior() tf.raw_ops.Dequantize( input_tensor = tf.constant(-10.0, dtype=tf.float32), input_tensor = tf.cast(input_tensor, dtype=tf.quint8), min_range = tf.constant([], shape=[0], dtype=tf.float32), max_range = tf.constant([], shape=[0], dtype=tf.float32), mode = 'MIN_COMBINED', narrow_range=False, axis=-10, dtype=tf.dtypes.float32) ``` The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values. ### Patches We have patched the issue in GitHub commit [da857cfa0fde8f79ad0afdbc94e88b5d4bbec764](https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37677'}
2021-08-25T14:41:23Z
2021-08-25T14:41:23Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764', 'https://github.com/advisories/GHSA-qfpc-5pjr-mh26', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37677', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26'}
null
GHSA
GHSA-m836-gxwq-j2pm
Improper Access Control in github.com/treeverse/lakefs
### Impact 1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name. 1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them. 1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them. 1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit. ### For more information If you have any questions or comments about this advisory please: * Email us at security@treeverse.io. * Open an issue on https://github.com/treeverse/lakeFS/issues/new.
null
2022-04-19T19:03:13Z
2021-10-28T16:27:03Z
MODERATE
5.7
{'CWE-284'}
{'https://github.com/advisories/GHSA-m836-gxwq-j2pm', 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm'}
null
GHSA
GHSA-rhwf-hqpr-q8g2
Code Injection in script-manager
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.
{'CVE-2020-8129'}
2021-04-13T15:24:38Z
2021-04-13T15:24:38Z
HIGH
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8129', 'https://hackerone.com/reports/660563', 'https://github.com/advisories/GHSA-rhwf-hqpr-q8g2'}
null
GHSA
GHSA-5mc7-m686-p6jg
Deserialization of Untrusted Data in Apache Dubbo
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument.
{'CVE-2021-30179'}
2022-03-21T21:57:10Z
2022-03-18T17:57:32Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30179', 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-5mc7-m686-p6jg', 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67@%3Cdev.dubbo.apache.org%3E'}
null
GHSA
GHSA-2rr5-8q37-2w7h
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
### Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.) ### Impact In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: - Nokogiri::XML::SAX::Parser - Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser - Nokogiri::XML::SAX::PushParser - Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser ### Mitigation JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.
{'CVE-2021-41098'}
2021-11-04T18:25:39Z
2021-09-27T20:12:47Z
HIGH
7.5
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41098', 'https://github.com/advisories/GHSA-2rr5-8q37-2w7h', 'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h'}
null
GHSA
GHSA-844w-j86r-4x2j
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
### Impact A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed. ### Patches Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0. ### For more information Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2019-16778'}
2021-11-01T14:12:43Z
2019-12-16T20:17:10Z
LOW
2.6
{'CWE-681', 'CWE-122'}
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md', 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892', 'https://github.com/advisories/GHSA-844w-j86r-4x2j', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}
null
GHSA
GHSA-3xpw-vhmv-cw7h
Command injection in czproject/git-php
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-25866'}
2022-04-27T14:35:59Z
2022-04-26T00:00:35Z
HIGH
8.1
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25866', 'https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349', 'https://github.com/advisories/GHSA-3xpw-vhmv-cw7h', 'https://github.com/czproject/git-php/releases/tag/v4.0.3', 'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}
null
GHSA
GHSA-8m2f-74r2-x3f2
Code injection in accesslog
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
{'CVE-2022-25760'}
2022-03-25T13:20:51Z
2022-03-18T00:01:10Z
HIGH
7.1
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25760', 'https://github.com/advisories/GHSA-8m2f-74r2-x3f2', 'https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6'}
null
GHSA
GHSA-w8qv-6jwh-64r5
Regular Expression Denial of Service in browserslist
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
{'CVE-2021-23364'}
2021-05-24T19:52:40Z
2021-05-24T19:52:40Z
MODERATE
5.3
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/pull/593', 'https://github.com/advisories/GHSA-w8qv-6jwh-64r5'}
null
GHSA
GHSA-77qv-gh6f-pgh4
Command Injection in Limdu
### Impact The `trainBatch` function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. ### Patches Patched in version 0.95. ### Workarounds Do not use trainBatch with classifiers that rely on shell execution, such as SVM Perf, SVM Linear or Adaboost ### References No
{'CVE-2020-4066'}
2021-01-07T23:50:30Z
2020-06-22T15:24:06Z
LOW
3.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4066', 'https://github.com/erelsgl/limdu/security/advisories/GHSA-77qv-gh6f-pgh4', 'https://github.com/advisories/GHSA-77qv-gh6f-pgh4'}
null
GHSA
GHSA-8h84-8j4f-p97q
Injection in bodymen
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10792'}
2021-04-13T15:24:21Z
2021-04-13T15:24:21Z
MODERATE
6.3
{'CWE-74'}
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/advisories/GHSA-8h84-8j4f-p97q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
null
GHSA
GHSA-4298-89hc-6rfv
Open Redirect in Flask-User
This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
{'CVE-2021-23401'}
2022-01-10T21:16:00Z
2021-08-09T20:44:32Z
MODERATE
5.4
{'CWE-601'}
{'https://github.com/lingthio/Flask-User/blob/master/flask_user/user_manager__utils.py', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188', 'https://github.com/lingthio/Flask-User', 'https://github.com/advisories/GHSA-4298-89hc-6rfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23401'}
null
GHSA
GHSA-mxjr-xmcg-fg7w
Arbitrary Code Injection in mobile-icon-resizer
mobile-icon-resizer resizes large images for use as icons for iOS and Android. mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3. mobile-icon-resizer takes an options object as an argument to define the resulting icons as such: ``` var options = { config: './config.js' } resize(options, function(err){}); ``` config.js would need to be a file on the filesystem and look something like: ``` var config = { iOS: { "images": [ /* iOS image definitions are not vulnerable */ ] }, android: { "images" : [ { "baseRatio" : "console.log('Executing script as baseRatio property')", "folder" : "drawable-ldpi" }, { "ratio" : "console.log('Executing script as ratio property')", "folder" : "drawable-mdpi" }, /* other android image defintiions ... */ ] } }; exports = module.exports = config; ``` The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed. ## Recommendation Update to version 0.4.3 or later.
null
2021-08-17T15:41:59Z
2019-06-27T17:25:21Z
MODERATE
6.5
{'CWE-94'}
{'https://nodesecurity.io/advisories/317', 'https://github.com/advisories/GHSA-mxjr-xmcg-fg7w', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://www.npmjs.com/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
null
GHSA
GHSA-7528-7jg5-6g62
Cross-site Scripting Vulnerability in CodeIgniter4
### Impact Cross-Site Scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4. Attackers can do XSS attacks if you are using `API\ResponseTrait`. ### Patches Upgrade to v4.1.8 or later. ### Workarounds Do one of the following: 1. Do not use `API\ResponseTrait` nor `ResourceController` 2. Disable Auto Route and [Use Defined Routes Only](https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only) ### References - [Cross Site Scripting (XSS) Software Attack | OWASP Foundation](https://owasp.org/www-community/attacks/xss/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-21715'}
2022-04-19T19:03:21Z
2022-01-27T15:09:00Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd', 'https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21715'}
null
GHSA
GHSA-rq8g-5pc5-wrhr
Insufficient Entropy in cryptiles
Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed. ## Recommendation Upgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package.
{'CVE-2018-1000620'}
2021-09-17T19:26:13Z
2018-09-11T18:22:50Z
CRITICAL
9.8
{'CWE-331'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000620', 'https://www.npmjs.com/advisories/720', 'https://github.com/advisories/GHSA-rq8g-5pc5-wrhr', 'https://www.npmjs.com/advisories/1464', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/476.json', 'https://github.com/hapijs/cryptiles/issues/34'}
null
GHSA
GHSA-9c8h-vvrj-w2p8
Heap OOB in `RaggedGather`
### Impact If the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. ```python import tensorflow as tf tf.raw_ops.RaggedGather( params_nested_splits = [0,0,0], params_dense_values = [1,1], indices = [0,0,9,0,0], OUTPUT_RAGGED_RANK=0) ``` In debug mode, the same code triggers a `CHECK` failure. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. ### Patches We have patched the issue in GitHub commit [a2b743f6017d7b97af1fe49087ae15f0ac634373](https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37641'}
2021-08-25T14:43:59Z
2021-08-25T14:43:59Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37641', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8'}
null
GHSA
GHSA-qrgf-jqqm-x7xv
High severity vulnerability that affects dragonfly
lib/dragonfly/imagemagickutils.rb in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.
{'CVE-2013-5671'}
2021-09-16T21:03:56Z
2017-10-24T18:33:37Z
HIGH
0
null
{'http://seclists.org/fulldisclosure/2013/Sep/18', 'http://www.osvdb.org/96798', 'http://www.vapid.dhs.org/advisories/fog-dragonfly-0.8.2-cmd-inj.html', 'http://seclists.org/oss-sec/2013/q3/528', 'http://seclists.org/oss-sec/2013/q3/526', 'https://github.com/advisories/GHSA-qrgf-jqqm-x7xv', 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671'}
null
GHSA
GHSA-882p-jqgm-f45g
Moderate severity vulnerability that affects nokogiri
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
{'CVE-2017-18258'}
2021-09-07T14:55:47Z
2018-04-13T16:17:46Z
MODERATE
6.5
{'CWE-770'}
{'https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://usn.ubuntu.com/3739-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18258', 'https://github.com/advisories/GHSA-882p-jqgm-f45g', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284', 'https://security.netapp.com/advisory/ntap-20190719-0001/', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}
null
GHSA
GHSA-cgvm-rvfv-c92r
Malicious Package in ecuvre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:01:46Z
2020-09-03T17:05:51Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-cgvm-rvfv-c92r', 'https://www.npmjs.com/advisories/1396'}
null
GHSA
GHSA-g95j-p8f6-pwh4
Downloads Resources over HTTP in headless-browser-lite
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`. ## Recommendation Update to version 2015.4.18-a or later.
{'CVE-2016-10625'}
2021-06-10T23:42:14Z
2019-02-18T23:56:58Z
HIGH
8.1
{'CWE-311'}
{'https://www.npmjs.com/advisories/230', 'https://nodesecurity.io/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'}
null
GHSA
GHSA-jvf4-g24p-2qgw
Arbitrary Code Execution in shiba
"All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad()."
{'CVE-2020-7738'}
2021-05-10T18:37:34Z
2021-05-10T18:37:34Z
HIGH
8.3
{'CWE-94'}
{'https://www.npmjs.com/package/shiba', 'https://github.com/advisories/GHSA-jvf4-g24p-2qgw', 'https://snyk.io/vuln/SNYK-JS-SHIBA-596466', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7738'}
null
GHSA
GHSA-mh24-7wvg-v88g
Low severity vulnerability that affects pypiserver
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI.
{'CVE-2019-6802'}
2021-07-22T22:31:28Z
2019-01-30T20:56:26Z
MODERATE
6.1
{'CWE-74', 'CWE-79'}
{'https://github.com/advisories/GHSA-mh24-7wvg-v88g', 'https://github.com/pypiserver/pypiserver/issues/237', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}
null
GHSA
GHSA-9vfj-5g7h-4p24
Server side template injection in Apache Camel
Server-Side Template Injection and arbitrary file disclosure on Camel templating components
{'CVE-2020-11994'}
2021-10-21T21:05:56Z
2020-07-29T18:08:48Z
HIGH
7.5
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11994', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-9vfj-5g7h-4p24', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECAMEL-575542', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r0a406dc5a158fe6fab6ee85f6e082a8473c0c346b37db8cc7a4619e6%40%3Cdev.camel.apache.org%3E'}
null
GHSA
GHSA-mwj7-r5vc-hmc9
Directory Traversal in hcbserver
Affected versions of `hcbserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16171'}
2021-01-14T15:46:25Z
2020-09-01T17:35:38Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16171', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver', 'https://nodesecurity.io/advisories/414', 'https://github.com/advisories/GHSA-mwj7-r5vc-hmc9', 'https://www.npmjs.com/advisories/414'}
null
GHSA
GHSA-2hw7-mxvj-m455
Path traversal in Node-RED-Dashboard
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
{'CVE-2021-3223'}
2021-01-29T18:13:52Z
2021-01-29T18:13:52Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-2hw7-mxvj-m455', 'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://www.npmjs.com/package/node-red-dashboard'}
null
GHSA
GHSA-ww39-953v-wcq6
Regular expression denial of service in glob-parent
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
{'CVE-2020-28469'}
2022-03-30T21:18:41Z
2021-06-07T21:56:34Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28469', 'https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093', 'https://github.com/advisories/GHSA-ww39-953v-wcq6', 'https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092', 'https://github.com/gulpjs/glob-parent/pull/36', 'https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-v6vg-pxvv-g5cq
Improper Privilege Management in Snipe-IT
Snipe-IT prior to 5.3.9 is vulnerable to improper privilege management. A user who does not have access to the supplier module may view supplier content.
{'CVE-2022-0579'}
2022-02-26T00:33:40Z
2022-02-15T00:02:45Z
MODERATE
6.5
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0579', 'https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849', 'https://github.com/advisories/GHSA-v6vg-pxvv-g5cq', 'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}
null
GHSA
GHSA-x2jj-x3q2-7hph
Directory Traversal in 11xiaoli
Affected versions of `11xiaoli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16160'}
2021-01-14T15:47:30Z
2020-09-01T17:28:09Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16160', 'https://nodesecurity.io/advisories/395', 'https://github.com/advisories/GHSA-x2jj-x3q2-7hph', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli', 'https://www.npmjs.com/advisories/395'}
null
GHSA
GHSA-fpw3-x4xq-6vxq
Malicious Package in wepack-cli
All versions of `wepack-cli` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:46:23Z
2020-09-02T18:32:13Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/839', 'https://github.com/advisories/GHSA-fpw3-x4xq-6vxq'}
null
GHSA
GHSA-8c9h-4q7g-fp7h
Out-of-bounds Read in iText
iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
{'CVE-2022-24198'}
2022-02-10T22:57:07Z
2022-02-02T00:01:45Z
MODERATE
6.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24198', 'https://github.com/advisories/GHSA-8c9h-4q7g-fp7h', 'https://github.com/itext/itext7/pull/78'}
null
GHSA
GHSA-r88h-6987-g79f
Data races on syncpool
Affected versions of this crate unconditionally implements `Send` for `Bucket2`. This allows sending non-Send types to other threads. This can lead to data races when non Send types like `Cell<T>` or `Rc<T>` are contained inside `Bucket2` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue). The flaw was corrected in commit 15b2828 by adding a `T: Send` bound to the `Send` impl of `Bucket2<T>`.
null
2021-08-25T21:00:28Z
2021-08-25T21:00:28Z
MODERATE
0
{'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0142.html', 'https://github.com/Chopinsky/byte_buffer/issues/2', 'https://github.com/advisories/GHSA-r88h-6987-g79f', 'https://github.com/RustSec/advisory-db/blob/main/crates/syncpool/RUSTSEC-2020-0142.md'}
null
GHSA
GHSA-qw8w-2xcp-xg59
Low severity vulnerability that affects passenger
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
{'CVE-2014-1832'}
2021-09-16T21:10:03Z
2018-10-10T17:29:27Z
LOW
0
null
{'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'http://openwall.com/lists/oss-security/2014/01/29/6', 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832'}
null
GHSA
GHSA-fvhr-7j8m-3cvc
Data races in appendix
The `appendix` crate implements a key-value mapping data structure called `Index<K, V>` that is stored on disk. The crate allows for any type to inhabit the generic `K` and `V` type parameters and implements Send and Sync for them unconditionally. Using a type that is not marked as `Send` or `Sync` with `Index` can allow it to be used across multiple threads leading to data races. Additionally using reference types for the keys or values will lead to the segmentation faults in the crate's code.
{'CVE-2020-36469'}
2021-08-25T20:57:02Z
2021-08-25T20:57:02Z
MODERATE
5.9
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36469', 'https://github.com/advisories/GHSA-fvhr-7j8m-3cvc', 'https://rustsec.org/advisories/RUSTSEC-2020-0149.html', 'https://github.com/krl/appendix/issues/6'}
null
GHSA
GHSA-4v9w-pvwr-38h3
OS Command Injection in strong-nginx-controller
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
{'CVE-2020-7621'}
2022-02-10T23:36:54Z
2022-02-10T23:36:54Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7621', 'https://github.com/advisories/GHSA-4v9w-pvwr-38h3', 'https://github.com/strongloop/strong-nginx-controller/blob/master/lib/server.js#L65,'}
null
GHSA
GHSA-f7hx-fqxw-rvvj
Insufficient output escaping of attachment names in PHPMailer
### Impact CWE-116: Incorrect output escaping. An attachment added like this (note the double quote within the attachment name, which is entirely valid): $mail->addAttachment('/tmp/attachment.tmp', 'filename.html";.jpg'); Will result in a message containing these headers: Content-Type: application/octet-stream; name="filename.html";.jpg" Content-Disposition: attachment; filename="filename.html";.jpg" The attachment will be named `filename.html`, and the trailing `";.jpg"` will be ignored. Mail filters that reject `.html` attachments but permit `.jpg` attachments may be fooled by this. Note that the MIME type itself is obtained automatically from the *source filename* (in this case `attachment.tmp`, which maps to a generic `application/octet-stream` type), and not the *name* given to the attachment (though these are the same if a separate name is not provided), though it can be set explicitly in other parameters to attachment methods. ### Patches Patched in PHPMailer 6.1.6 by escaping double quotes within the name using a backslash, as per RFC822 section 3.4.1, resulting in correctly escaped headers like this: Content-Type: application/octet-stream; name="filename.html\";.jpg" Content-Disposition: attachment; filename="filename.html\";.jpg" ### Workarounds Reject or filter names and filenames containing double quote (`"`) characters before passing them to attachment functions such as `addAttachment()`. ### References [CVE-2020-13625](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13625). [PHPMailer 6.1.6 release](https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PHPMailer repo](https://github.com/PHPMailer/PHPMailer/issues)
{'CVE-2020-13625'}
2021-08-25T21:37:24Z
2020-05-27T16:37:02Z
HIGH
7.5
{'CWE-116'}
{'https://lists.debian.org/debian-lts-announce/2020/06/msg00014.html', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj', 'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3', 'https://github.com/advisories/GHSA-f7hx-fqxw-rvvj', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://usn.ubuntu.com/4505-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13625', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00004.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/'}
null
GHSA
GHSA-p5xh-vx83-mxcj
HTTP Request Smuggling in Twisted
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
{'CVE-2020-10109'}
2022-04-04T21:10:40Z
2020-03-31T15:40:12Z
CRITICAL
9.8
{'CWE-444'}
{'https://usn.ubuntu.com/4308-1/', 'https://usn.ubuntu.com/4308-2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10109', 'https://github.com/advisories/GHSA-p5xh-vx83-mxcj', 'https://security.gentoo.org/glsa/202007-24', 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/', 'https://know.bishopfox.com/advisories/twisted-version-19.10.0', 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}
null
GHSA
GHSA-jg6j-jrxv-2hh9
Cross-site Scripting in Apache Pluto
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
{'CVE-2021-36738'}
2022-01-08T00:46:17Z
2022-01-08T00:46:17Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36738', 'https://github.com/advisories/GHSA-jg6j-jrxv-2hh9', 'https://lists.apache.org/thread/11j19v1gjsk7o6o8nch1xrydow9b8lll'}
null
GHSA
GHSA-jjcx-999m-35hc
Improper Input Validation in Firefly III
Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints.
{'CVE-2019-14671'}
2021-09-08T17:27:07Z
2021-09-08T17:27:07Z
LOW
3.3
{'CWE-20'}
{'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14671', 'https://github.com/advisories/GHSA-jjcx-999m-35hc', 'https://github.com/firefly-iii/firefly-iii/issues/2367'}
null
GHSA
GHSA-cw4j-cf6c-mmfv
Use of Uninitialized Resource in binjs_io.
An issue was discovered in the binjs_io crate through 2021-01-03 for Rust. The Read method may read from uninitialized memory locations.
{'CVE-2021-45683'}
2022-01-07T17:36:38Z
2022-01-06T22:14:24Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45683', 'https://github.com/advisories/GHSA-cw4j-cf6c-mmfv', 'https://rustsec.org/advisories/RUSTSEC-2021-0085.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/binjs_io/RUSTSEC-2021-0085.md'}
null