ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-3jqw-vv45-mjhh
|
XSS/Script injection vulnerability in matestack
|
matestack-ui-core (RubyGem) before 0.7.4 is vulnerable to XSS/Script injection.
This vulnerability is patched in version 0.7.4.
|
{'CVE-2020-5241'}
|
2022-04-19T19:02:24Z
|
2020-02-12T23:37:46Z
|
HIGH
| 7.7
|
{'CWE-80'}
|
{'https://github.com/advisories/GHSA-3jqw-vv45-mjhh', 'https://github.com/matestack/matestack-ui-core/security/advisories/GHSA-3jqw-vv45-mjhh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5241'}
| null |
GHSA
|
GHSA-74qp-233x-p5j8
|
Cross-site scripting (XSS) in Apache Livy
|
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
|
{'CVE-2021-26544'}
|
2021-05-13T22:30:41Z
|
2021-05-13T22:30:41Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E', 'https://github.com/advisories/GHSA-74qp-233x-p5j8', 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26544', 'http://www.openwall.com/lists/oss-security/2021/02/20/1'}
| null |
GHSA
|
GHSA-rrx2-r989-2c43
|
Integer overflows in Tensorflow
|
### Impact
The [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service):
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseDenseCwiseDiv(
sp_indices=np.array([[9]]),
sp_values=np.array([5]),
sp_shape=np.array([92233720368., 92233720368]),
dense=np.array([4]))
```
We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory.
### Patches
We have patched the issue in GitHub commits [1b54cadd19391b60b6fcccd8d076426f7221d5e8](https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8) and [e952a89b7026b98fe8cbe626514a93ed68b7c510](https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
|
{'CVE-2022-23567'}
|
2022-02-11T17:05:35Z
|
2022-02-09T23:39:33Z
|
MODERATE
| 6.5
|
{'CWE-190'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23567', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510', 'https://github.com/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43'}
| null |
GHSA
|
GHSA-x3g3-334f-q6h4
|
Moderate severity vulnerability that affects editor.md
|
pandao Editor.md 1.5.0 has DOM XSS via input starting with a "<<" substring, which is mishandled during construction of an A element.
|
{'CVE-2018-19056'}
|
2021-09-21T22:01:01Z
|
2018-11-09T17:41:15Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/pandao/editor.md/issues/634', 'https://github.com/advisories/GHSA-x3g3-334f-q6h4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19056'}
| null |
GHSA
|
GHSA-mrmf-qwxg-7c3h
|
XSS in Data URI in remarkable
|
Affected versions of `remarkable` are vulnerable to cross-site scripting. Vulnerable versions of the package allow the use of `data:` URIs in links, and can therefore execute javascript.
## Proof of Concept
```
[link](data:text/html,<script>alert('0')</script>)
```
## Recommendation
Update to v1.7.0 or later
|
{'CVE-2017-16006'}
|
2021-01-08T18:25:54Z
|
2018-11-09T17:48:20Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/319', 'https://github.com/advisories/GHSA-mrmf-qwxg-7c3h', 'https://nodesecurity.io/advisories/319', 'https://github.com/jonschlinkert/remarkable/issues/227', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16006'}
| null |
GHSA
|
GHSA-6394-6h9h-cfjg
|
Regular Expression Denial of Service
|
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
| null |
2021-02-25T17:23:13Z
|
2019-06-07T21:12:35Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-6394-6h9h-cfjg', 'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
| null |
GHSA
|
GHSA-vpfp-5gwq-g533
|
Improper Authentication in Apache ShenYu Admin
|
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
|
{'CVE-2021-37580'}
|
2021-11-18T15:12:16Z
|
2021-11-17T23:15:30Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'http://www.openwall.com/lists/oss-security/2021/11/16/1', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4', 'https://github.com/advisories/GHSA-vpfp-5gwq-g533', 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb'}
| null |
GHSA
|
GHSA-8vcr-vxm8-293m
|
Denial of Service in SheetsJS Pro
|
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).
|
{'CVE-2021-32013'}
|
2022-02-08T21:02:07Z
|
2021-07-22T19:48:13Z
|
MODERATE
| 5.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32013', 'https://github.com/advisories/GHSA-8vcr-vxm8-293m', 'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-hqxw-mm44-gc4r
|
Fragments in Path May Lead to Authorization Policy Bypass
|
### Impact
Istio 1.11.0, 1.10.3 and below, and 1.9.7 and below contain a remotely exploitable vulnerability where an HTTP request with `#fragment` in the path may bypass Istio’s URI path based authorization policies.
### Patches
* Istio 1.11.1 and above
* Istio 1.10.4 and above
* Istio 1.9.8 and above
### Workarounds
A Lua filter may be written to normalize the path. This is similar to the Path normalization presented in the [Security Best Practices](https://istio.io/latest/docs/ops/best-practices/security/#case-normalization) guide.
### References
More details can be found in the [Istio Security Bulletin](https://istio.io/latest/news/security/istio-security-2021-008)
### For more information
If you have any questions or comments about this advisory, please email us at istio-security-vulnerability-reports@googlegroups.com
|
{'CVE-2021-39156'}
|
2022-04-19T19:03:06Z
|
2021-08-30T16:16:14Z
|
HIGH
| 8.1
|
{'CWE-863'}
|
{'https://github.com/advisories/GHSA-hqxw-mm44-gc4r', 'https://istio.io/latest/news/security/istio-security-2021-008', 'https://github.com/istio/istio/security/advisories/GHSA-hqxw-mm44-gc4r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39156'}
| null |
GHSA
|
GHSA-9jxw-cfrh-jxq6
|
New line injection during configuration edition
|
### Impact
Authenticated users, regardless of their privileges (_User_ or _Admin_), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server.
### Patches
This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values.
### Workarounds
Only allow trusted source IP addresses to access to the administration dashboard.
### References
- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository.
|
{'CVE-2021-39172'}
|
2022-04-19T19:03:01Z
|
2021-08-30T16:11:24Z
|
HIGH
| 8.8
|
{'CWE-93'}
|
{'https://github.com/fiveai/Cachet/releases/tag/v2.5.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39172', 'https://github.com/advisories/GHSA-9jxw-cfrh-jxq6', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6'}
| null |
GHSA
|
GHSA-v6gp-9mmm-c6p5
|
Out-of-bounds Write in zlib affects Nokogiri
|
## Summary
Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05.
Please note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.4`, and only if the packaged version of `zlib` is being used. Please see [this document](https://nokogiri.org/LICENSE-DEPENDENCIES.html#default-platform-release-ruby) for a complete description of which platform gems vendor `zlib`. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `zlib` release announcements.
## Mitigation
Upgrade to Nokogiri `>= v1.13.4`.
## Impact
### [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032) in zlib
- **Severity**: High
- **Type**: [CWE-787](https://cwe.mitre.org/data/definitions/787.html) Out of bounds write
- **Description**: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
| null |
2022-04-11T21:40:13Z
|
2022-04-11T21:21:28Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-25032', 'https://github.com/advisories/GHSA-v6gp-9mmm-c6p5', 'https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4', 'https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer', 'https://github.com/advisories/GHSA-jc36-42cf-vqwj', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}
| null |
GHSA
|
GHSA-589w-hccm-265x
|
Inline attribute values were not processed.
|
### Impact
Inline attributes have not been processed escape.
If the data that came from users was not processed, then an XSS vulnerability is possible
### Patches
Fixed in 9.4.4
|
{'CVE-2020-15263'}
|
2021-01-07T22:50:46Z
|
2020-10-19T20:17:47Z
|
HIGH
| 8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15263', 'https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x', 'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169', 'https://github.com/advisories/GHSA-589w-hccm-265x'}
| null |
GHSA
|
GHSA-vv4c-g6q7-p3q7
|
Moderate severity vulnerability that affects doorkeeper-openid_connect
|
Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.
|
{'CVE-2019-9837'}
|
2021-09-20T22:19:26Z
|
2019-03-25T16:15:54Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9837', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/issues/61', 'https://github.com/advisories/GHSA-vv4c-g6q7-p3q7', 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md'}
| null |
GHSA
|
GHSA-573x-jhqh-jg36
|
Moderate severity vulnerability that affects chloride
|
Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previously unknown hosts getting added to the user's known_hosts file without confirmation. In version 0.3.0 this is updated so that the user's known_hosts file is not updated by chloride.
|
{'CVE-2018-6517'}
|
2021-09-01T19:29:07Z
|
2019-03-25T16:16:27Z
|
HIGH
| 7.5
|
{'CWE-295'}
|
{'https://puppet.com/security/cve/CVE-2018-6517', 'https://github.com/advisories/GHSA-573x-jhqh-jg36', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6517'}
| null |
GHSA
|
GHSA-cr4x-w2v7-4mmf
|
Malicious Package in bufver-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:36:14Z
|
2020-09-03T22:26:13Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-cr4x-w2v7-4mmf', 'https://www.npmjs.com/advisories/1265'}
| null |
GHSA
|
GHSA-229r-pqp6-8w6g
|
High severity vulnerability that affects sprout
|
The unpack_zip function in archive_unpacker.rb in the sprout gem 0.7.246 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a (1) filename or (2) path.
|
{'CVE-2013-6421'}
|
2021-08-30T14:57:23Z
|
2017-10-24T18:33:36Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2013-6421', 'http://www.openwall.com/lists/oss-security/2013/12/03/6', 'http://archives.neohapsis.com/archives/bugtraq/2013-12/0077.html', 'https://github.com/advisories/GHSA-229r-pqp6-8w6g', 'http://vapid.dhs.org/advisories/sprout-0.7.246-command-inj.html', 'http://www.openwall.com/lists/oss-security/2013/12/03/1'}
| null |
GHSA
|
GHSA-hrqr-hxpp-chr3
|
Possible Information Leak / Session Hijack Vulnerability in Rack
|
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session.
The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison.
### Impact
The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session.
## Releases
The 1.6.12 and 2.0.8 releases are available at the normal locations.
### Workarounds
There are no known workarounds.
### Patches
To aid users who aren't able to upgrade immediately we have provided patches for
the two supported release series. They are in git-am format and consist of a
single changeset.
* 1-6-session-timing-attack.patch - Patch for 1.6 series
* 2-0-session-timing-attack.patch - Patch for 2.6 series
### Credits
Thanks Will Leinweber for reporting this!
|
{'CVE-2019-16782'}
|
2022-04-19T19:02:23Z
|
2019-12-18T19:01:31Z
|
MODERATE
| 6.3
|
{'CWE-208', 'CWE-203'}
|
{'http://www.openwall.com/lists/oss-security/2020/04/09/2', 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38', 'http://www.openwall.com/lists/oss-security/2020/04/08/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782', 'http://www.openwall.com/lists/oss-security/2019/12/18/2', 'http://www.openwall.com/lists/oss-security/2019/12/19/3', 'https://github.com/advisories/GHSA-hrqr-hxpp-chr3', 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'http://www.openwall.com/lists/oss-security/2019/12/18/3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/'}
| null |
GHSA
|
GHSA-772j-h9xw-ffp5
|
CHECK-fail in SparseCross due to type confusion
|
### Impact
The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service:
```python
import tensorflow as tf
hashed_output = False
num_buckets = 1949315406
hash_key = 1869835877
out_type = tf.string
internal_type = tf.string
indices_1 = tf.constant([0, 6], shape=[1, 2], dtype=tf.int64)
indices_2 = tf.constant([0, 0], shape=[1, 2], dtype=tf.int64)
indices = [indices_1, indices_2]
values_1 = tf.constant([0], dtype=tf.int64)
values_2 = tf.constant([72], dtype=tf.int64)
values = [values_1, values_2]
batch_size = 4
shape_1 = tf.constant([4, 122], dtype=tf.int64)
shape_2 = tf.constant([4, 188], dtype=tf.int64)
shapes = [shape_1, shape_2]
dense_1 = tf.constant([188, 127, 336, 0], shape=[4, 1], dtype=tf.int64)
dense_2 = tf.constant([341, 470, 470, 470], shape=[4, 1], dtype=tf.int64)
dense_3 = tf.constant([188, 188, 341, 922], shape=[4, 1], dtype=tf.int64)
denses = [dense_1, dense_2, dense_3]
tf.raw_ops.SparseCross(indices=indices, values=values, shapes=shapes, dense_inputs=denses, hashed_output=hashed_output,
num_buckets=num_buckets, hash_key=hash_key, out_type=out_type, internal_type=internal_type)
```
The above code will result in a `CHECK` fail in [`tensor.cc`](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/framework/tensor.cc#L670-L675):
```cc
void Tensor::CheckTypeAndIsAligned(DataType expected_dtype) const {
CHECK_EQ(dtype(), expected_dtype)
<< " " << DataTypeString(expected_dtype) << " expected, got "
<< DataTypeString(dtype());
...
}
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements:
```cc
if (DT_STRING == values_.dtype())
return Fingerprint64(values_.vec<tstring>().data()[start + n]);
return values_.vec<int64>().data()[start + n];
```
Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue.
### Patches
We have patched the issue in GitHub commit [b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025](https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29519'}
|
2021-05-21T14:21:08Z
|
2021-05-21T14:21:08Z
|
LOW
| 2.5
|
{'CWE-843'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29519', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5', 'https://github.com/advisories/GHSA-772j-h9xw-ffp5', 'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}
| null |
GHSA
|
GHSA-2j5x-56p6-hj6x
|
Path Traversal in statichttpserver
|
All versions of `statichttpserver` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5480'}
|
2021-01-08T20:41:24Z
|
2019-09-04T10:02:14Z
|
CRITICAL
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5480', 'https://github.com/advisories/GHSA-2j5x-56p6-hj6x', 'https://hackerone.com/reports/570035', 'https://www.npmjs.com/advisories/1143'}
| null |
GHSA
|
GHSA-7f5c-rpf4-86p8
|
Insertion of Sensitive Information into Externally-Accessible File or Directory and Exposure of Sensitive Information to an Unauthorized Actor in hbs
|
The npm hbs package is an Express view engine wrapper for Handlebars. Depending on usage, users of hbs may be vulnerable to a file disclosure vulnerability. There is currently no patch for this vulnerability. hbs mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options a file disclosure vulnerability may be triggered in downstream applications. For an example PoC see the referenced GHSL-2021-020.
|
{'CVE-2021-32822'}
|
2021-09-02T17:16:46Z
|
2021-09-02T17:16:46Z
|
MODERATE
| 4
|
{'CWE-200', 'CWE-538'}
|
{'https://securitylab.github.com/advisories/GHSL-2021-020-pillarjs-hbs/', 'https://github.com/advisories/GHSA-7f5c-rpf4-86p8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32822'}
| null |
GHSA
|
GHSA-jq4v-f5q6-mjqq
|
Cross-Site Scripting in lxml
|
An XSS vulnerability was discovered in the python `lxml` clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in `lxml` 4.6.3.
|
{'CVE-2021-28957'}
|
2021-10-21T17:31:22Z
|
2021-03-22T16:53:53Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://security.netapp.com/advisory/ntap-20210521-0004/', 'https://www.debian.org/security/2021/dsa-4880', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28957', 'https://github.com/lxml/lxml/pull/316', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://pypi.org/project/lxml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/'}
| null |
GHSA
|
GHSA-2x4q-6jfv-8h9h
|
Path Traversal in glance
|
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`.
## Recommendation
Update to version 3.0.4 or later.
|
{'CVE-2018-3715'}
|
2021-01-08T21:14:55Z
|
2018-07-26T14:53:14Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://www.npmjs.com/advisories/590', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
| null |
GHSA
|
GHSA-4f5x-q4jc-xfcf
|
Cross-site Scripting in pimcore
|
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore.
|
{'CVE-2022-0262'}
|
2022-01-21T23:31:35Z
|
2022-01-21T23:31:35Z
|
MODERATE
| 6.6
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0262', 'https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d', 'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7', 'https://github.com/advisories/GHSA-4f5x-q4jc-xfcf'}
| null |
GHSA
|
GHSA-5m6c-jp6f-2vcv
|
Open Redirect in OAuth2 Proxy
|
### Impact
As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access.
This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
|
{'CVE-2020-4037'}
|
2021-12-20T17:58:59Z
|
2021-12-20T17:58:59Z
|
MODERATE
| 4.3
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4037', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv', 'https://github.com/advisories/GHSA-5m6c-jp6f-2vcv', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
| null |
GHSA
|
GHSA-ppc3-fpvh-7396
|
Improper synchronization in Apache Netbeans HTML/Java API
|
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file.
|
{'CVE-2020-17534'}
|
2022-05-03T19:31:06Z
|
2022-02-09T22:25:18Z
|
HIGH
| 7
|
{'CWE-362'}
|
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6', 'https://github.com/advisories/GHSA-ppc3-fpvh-7396', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E'}
| null |
GHSA
|
GHSA-fv82-r8qv-ch4v
|
pomerium_signature is not verified in middleware in github.com/pomerium/pomerium
|
### Impact
Some API endpoints under /.pomerium/ do not verify parameters with pomerium_signature. This could allow modifying parameters intended to be trusted to Pomerium.
The issue mainly affects routes responsible for sign in/out, but does not introduce an authentication bypass.
### Patches
Patched in v0.13.4
### For more information
If you have any questions or comments about this advisory
* Open an issue in [pomerium](http://github.com/pomerium/pomerium)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
{'CVE-2021-29652'}
|
2022-04-19T19:02:52Z
|
2021-05-21T16:24:22Z
|
HIGH
| 5.4
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29652', 'https://github.com/pomerium/pomerium/pull/2048', 'https://github.com/pomerium/pomerium/security/advisories/GHSA-fv82-r8qv-ch4v', 'https://github.com/advisories/GHSA-fv82-r8qv-ch4v'}
| null |
GHSA
|
GHSA-63q7-h895-m982
|
Cross-site Scripting in dompurify
|
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
|
{'CVE-2020-26870'}
|
2022-04-28T17:58:52Z
|
2020-12-18T22:51:40Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/advisories/GHSA-63q7-h895-m982', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
| null |
GHSA
|
GHSA-8fw4-xh83-3j6q
|
Cross-Site Scripting in diagram-js
|
Versions of `diagram-js` prior to 3.3.1 (for 3.x) and 2.6.2 (for 2.x) are vulnerable to Cross-Site Scripting. The package fails to escape output of user-controlled input in `search-pad`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
If you are using diagram-js 3.x, upgrade to version 3.3.1.
If you are using diagram-js 2.x, upgrade to version 2.6.2.
| null |
2021-09-28T16:58:44Z
|
2020-09-11T21:18:05Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-8fw4-xh83-3j6q', 'https://github.com/bpmn-io/diagram-js', 'https://www.npmjs.com/advisories/982'}
| null |
GHSA
|
GHSA-4qr3-m7ww-hh9g
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free.
|
{'CVE-2021-45717'}
|
2022-01-06T22:01:40Z
|
2022-01-06T22:01:40Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45717', 'https://github.com/advisories/GHSA-4qr3-m7ww-hh9g', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
| null |
GHSA
|
GHSA-f698-m2v9-5fh3
|
Command Injection in opencv
|
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.
## Recommendation
Upgrade to version 6.1.0.
| null |
2021-08-04T20:49:45Z
|
2019-06-04T20:11:44Z
|
LOW
| 0
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-f698-m2v9-5fh3', 'https://www.npmjs.com/advisories/789', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
| null |
GHSA
|
GHSA-m46p-ggm5-5j83
|
Moderate severity vulnerability that affects rails
|
Multiple cross-site scripting (XSS) vulnerabilities in actionview/lib/action_view/helpers/number_helper.rb in Ruby on Rails before 3.2.17, 4.0.x before 4.0.3, and 4.1.x before 4.1.0.beta2 allow remote attackers to inject arbitrary web script or HTML via the (1) format, (2) negative_format, or (3) units parameter to the (a) number_to_currency, (b) number_to_percentage, or (c) number_to_human helper.
|
{'CVE-2014-0081'}
|
2021-09-14T22:06:44Z
|
2017-10-24T18:33:36Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-m46p-ggm5-5j83', 'http://www.securitytracker.com/id/1029782', 'http://secunia.com/advisories/57376', 'http://rhn.redhat.com/errata/RHSA-2014-0215.html', 'http://openwall.com/lists/oss-security/2014/02/18/8', 'http://lists.opensuse.org/opensuse-updates/2014-02/msg00081.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0081', 'http://www.securityfocus.com/bid/65647', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/tfp6gZCtzr4/j8LUHmu7fIEJ', 'http://rhn.redhat.com/errata/RHSA-2014-0306.html'}
| null |
GHSA
|
GHSA-xj6r-2jpm-qvxp
|
Code injection issue for java-spring-cloud-stream-template
|
The following was initially reported by @jonaslagoni:
Given the following command:
`ag ./dummy.json @asyncapi/java-spring-cloud-stream-template --force-write --output ./output`
With the following AsyncAPI document:
```json
{
"asyncapi": "2.0.0",
"info": {
"title": "Streetlight",
"version": "1.0.0"
},
"defaultContentType": "json",
"channels": {
"security/audit/channel": {
"description": "Channel for the turn on command which should turn on the streetlight",
"parameters": {
"streetlight_id": {
"description": "The ID of the streetlight",
"schema": {
"type": "string"
}
}
},
"publish": {
"operationId": "test() { System.out.println(\"injected\"); return test(0); }\n public Consumer<CustomClass> someothername",
"message": {
"name": "TurnonCommand",
"payload": {
"$ref": "#/components/schemas/CustomClass"
}
}
}
}
},
"components": {
"schemas" : {
"CustomClass": {
"type": "object",
"properties": {
"prop": {
"type": "string"
}
}
}
}
}
}
```
Which changes the following output:
```java
...
@Bean
public Consumer<CustomClass> test() {
// Add business logic here.
return null;
}
...
```
To
```java
...
@Bean
public Consumer<CustomClass> test() { System.out.println("injected"); return someothername(); }
public Consumer<CustomClass> someothername() {
// Add business logic here.
return null;
}
...
```
|
{'CVE-2021-37694'}
|
2022-04-19T19:03:01Z
|
2021-08-25T14:45:52Z
|
HIGH
| 8.7
|
{'CWE-94'}
|
{'https://github.com/asyncapi/java-spring-cloud-stream-template/security/advisories/GHSA-xj6r-2jpm-qvxp', 'https://github.com/advisories/GHSA-xj6r-2jpm-qvxp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37694'}
| null |
GHSA
|
GHSA-3c48-6pcv-88rm
|
Macro in MathJax running untrusted Javascript within a web browser
|
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
|
{'CVE-2018-1999024'}
|
2022-04-26T18:18:00Z
|
2018-07-27T17:05:27Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
| null |
GHSA
|
GHSA-r9p9-mrjm-926w
|
Use of a Broken or Risky Cryptographic Algorithm
|
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
|
{'CVE-2020-28498'}
|
2021-03-08T16:06:50Z
|
2021-03-08T16:06:50Z
|
MODERATE
| 6.8
|
{'CWE-327'}
|
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://github.com/advisories/GHSA-r9p9-mrjm-926w', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
| null |
GHSA
|
GHSA-4xr4-4c65-hj7f
|
Apache Tika does not properly initialize the XML parser or choose handlers
|
Apache Tika before 1.13 does not properly initialize the XML parser or choose handlers, which might allow remote attackers to conduct XML External Entity (XXE) attacks via vectors involving (1) spreadsheets in OOXML files and (2) XMP metadata in PDF and other file formats, a related issue to CVE-2016-2175.
|
{'CVE-2016-4434'}
|
2022-04-26T21:46:37Z
|
2018-10-17T15:44:22Z
|
HIGH
| 7.8
|
{'CWE-611'}
|
{'http://rhn.redhat.com/errata/RHSA-2017-0272.html', 'http://rhn.redhat.com/errata/RHSA-2017-0248.html', 'http://rhn.redhat.com/errata/RHSA-2017-0249.html', 'http://www.securityfocus.com/archive/1/538500/100/0/threaded', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4434', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-4xr4-4c65-hj7f', 'https://mail-archives.apache.org/mod_mbox/tika-dev/201605.mbox/%3C1705136517.1175366.1464278135251.JavaMail.yahoo%40mail.yahoo.com%3E'}
| null |
GHSA
|
GHSA-c8cw-2c5j-xff3
|
Incorrect Authorization in Apache Ozone
|
In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.
|
{'CVE-2021-39234'}
|
2021-11-23T17:56:30Z
|
2021-11-23T17:56:30Z
|
MODERATE
| 6.8
|
{'CWE-863'}
|
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39234', 'https://github.com/advisories/GHSA-c8cw-2c5j-xff3'}
| null |
GHSA
|
GHSA-29v7-3v4c-gf38
|
Data races in parc
|
An issue was discovered in the parc crate through 2020-11-14 for Rust. LockWeak<T> has an unconditional implementation of Send without trait bounds on T.
|
{'CVE-2020-36454'}
|
2021-08-25T20:57:24Z
|
2021-08-25T20:57:24Z
|
HIGH
| 8.1
|
{'CWE-119', 'CWE-362'}
|
{'https://github.com/advisories/GHSA-29v7-3v4c-gf38', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/parc/RUSTSEC-2020-0134.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0134.html', 'https://github.com/hyyking/rustracts/pull/6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36454'}
| null |
GHSA
|
GHSA-72hv-rp4q-q7f3
|
Hijacked Environment Variables in babelcli
|
The `babelcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16060'}
|
2021-01-08T19:19:20Z
|
2018-08-29T23:57:14Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16060', 'https://nodesecurity.io/advisories/499', 'https://www.npmjs.com/advisories/499', 'https://github.com/advisories/GHSA-72hv-rp4q-q7f3'}
| null |
GHSA
|
GHSA-8867-vpm3-g98g
|
Incorrect Default Permissions in keyring
|
Python keyring has insecure permissions on new databases allowing world-readable files to be created
|
{'CVE-2012-5578'}
|
2021-08-19T21:46:53Z
|
2020-03-10T20:56:41Z
|
MODERATE
| 6.2
|
{'CWE-276'}
|
{'https://github.com/advisories/GHSA-8867-vpm3-g98g', 'http://www.openwall.com/lists/oss-security/2012/11/27/4', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5578', 'https://github.com/jaraco/keyring/blob/master/CHANGES.rst#010', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5578', 'https://access.redhat.com/security/cve/cve-2012-5578', 'https://bugs.launchpad.net/ubuntu/+source/python-keyring/+bug/1031465', 'https://security-tracker.debian.org/tracker/CVE-2012-5578', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-5578'}
| null |
GHSA
|
GHSA-4w46-w44m-3jq3
|
Parse Server stores password in plain text
|
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js.
In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext.
This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
|
{'CVE-2020-26288'}
|
2022-04-19T19:02:42Z
|
2020-12-28T16:33:17Z
|
LOW
| 7.7
|
{'CWE-312'}
|
{'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://www.npmjs.com/package/parse-server', 'https://www.npmjs.com/advisories/1593', 'https://github.com/advisories/GHSA-4w46-w44m-3jq3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288'}
| null |
GHSA
|
GHSA-hx77-5p88-f92r
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
|
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
|
{'CVE-2021-4131'}
|
2022-01-05T20:33:55Z
|
2022-01-05T20:33:55Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4131', 'https://github.com/advisories/GHSA-hx77-5p88-f92r', 'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f', 'https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43'}
| null |
GHSA
|
GHSA-6cgh-hjpw-q3gq
|
Utils.readChallengeTx does not verify the server account signature
|
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.
Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.
Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
|
{'CVE-2021-32738'}
|
2022-04-19T19:03:01Z
|
2021-07-02T19:20:33Z
|
MODERATE
| 6.5
|
{'CWE-287'}
|
{'https://github.com/advisories/GHSA-6cgh-hjpw-q3gq', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3'}
| null |
GHSA
|
GHSA-vcjj-9vg7-vf68
|
Null pointer dereference in TFLite
|
### Impact
An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service:
```python
import tensorflow as tf
model = tf.keras.models.Sequential()
model.add(tf.keras.Input(shape=(1, 2, 3)))
model.add(tf.keras.layers.Dense(0, activation='relu'))
converter = tf.lite.TFLiteConverter.from_keras_model(model)
tflite_model = converter.convert()
interpreter = tf.lite.Interpreter(model_content=tflite_model)
interpreter.allocate_tensors()
interpreter.invoke()
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer.
```cc
if (y4 > 1) {
// ...
} else {
for (int i0 = 0; i0 < y0; ++i0) {
const T* input2_data_ptr = nullptr;
for (int i1 = 0; i1 < y1; ++i1) {
input2_data_ptr = input2_data_reset;
for (int i2 = 0; i2 < y2; ++i2) {
scalar_broadcast_f(y3, params, *input1_data_ptr, input2_data_ptr,
output_data_ptr);
}
}
}
}
```
### Patches
We have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37688'}
|
2021-08-25T14:39:54Z
|
2021-08-25T14:39:54Z
|
HIGH
| 7.8
|
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37688', 'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c', 'https://github.com/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68'}
| null |
GHSA
|
GHSA-g3rq-g295-4j3m
|
Regular Expression Denial of Service (ReDoS) in Jinja2
|
This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
|
{'CVE-2020-28493'}
|
2022-04-18T21:58:05Z
|
2021-03-19T21:28:05Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-g3rq-g295-4j3m', 'https://github.com/pallets/jinja/pull/1343', 'https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVAKCOO7VBVUBM3Q6CBBTPBFNP5NDXF4/', 'https://security.gentoo.org/glsa/202107-19', 'https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28493'}
| null |
GHSA
|
GHSA-j49g-mp79-5vm5
|
Exfiltrates data on installation in coffe-script
|
The `coffe-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffe-script` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16203'}
|
2021-01-08T18:37:36Z
|
2018-08-06T20:06:29Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-j49g-mp79-5vm5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16203', 'https://www.npmjs.com/advisories/543', 'https://nodesecurity.io/advisories/543'}
| null |
GHSA
|
GHSA-q88g-qx42-xfrh
|
Path traversal in bolt/core
|
Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal.
|
{'CVE-2021-27367'}
|
2021-02-24T06:53:22Z
|
2021-02-18T20:51:56Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/bolt/core/releases/tag/4.1.13', 'https://packagist.org/packages/bolt/core', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27367', 'https://github.com/advisories/GHSA-q88g-qx42-xfrh', 'https://github.com/bolt/core/pull/2371'}
| null |
GHSA
|
GHSA-ff84-84q5-fq4f
|
Incorrect Authorization in Apache Ozone
|
In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.
|
{'CVE-2021-39232'}
|
2021-11-23T17:56:54Z
|
2021-11-23T17:56:54Z
|
HIGH
| 8.8
|
{'CWE-863'}
|
{'http://www.openwall.com/lists/oss-security/2021/11/19/3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39232', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E', 'https://github.com/advisories/GHSA-ff84-84q5-fq4f'}
| null |
GHSA
|
GHSA-792j-9wj3-j634
|
Command injection in github-todos
|
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
|
{'CVE-2021-44684'}
|
2021-12-10T20:30:52Z
|
2021-12-10T20:30:52Z
|
MODERATE
| 0
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44684', 'https://github.com/dwisiswant0/advisory/issues/5', 'https://github.com/advisories/GHSA-792j-9wj3-j634', 'https://github.com/naholyr/github-todos/issues/34'}
| null |
GHSA
|
GHSA-rvwf-54qp-4r6v
|
XML Entity Expansion in SnakeYAML
|
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
|
{'CVE-2017-18640'}
|
2022-04-19T19:11:42Z
|
2021-06-04T21:37:45Z
|
HIGH
| 7.5
|
{'CWE-776'}
|
{'https://github.com/advisories/GHSA-rvwf-54qp-4r6v', 'https://lists.apache.org/thread.html/rce5c93bba6e815fb62ad38e28ca1943b3019af1eddeb06507ad4e11a@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r72a3588d62b2de1361dc9648f5d355385735e47f7ba49d089b0e680d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r436988d2cfe8a770ae361c82b181c5b2bf48a249bad84d8a55a3b46e@%3Cdev.phoenix.apache.org%3E', 'https://lists.apache.org/thread.html/r56805265475919252ba7fc10123f15b91097f3009bae86476624ca25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rbaa1f513d903c89a08267c91d86811fa5bcc82e0596b6142c5cea7ea@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r16ae4e529401b75a1f5aa462b272b31bf2a108236f882f06fddc14bc@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r22ac2aa053b7d9c6b75a49db78125c9316499668d0f4a044f3402e2f@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r6d54c2da792c74cc14b9b7665ea89e144c9e238ed478d37fd56292e6@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r8b57c57cffa01e418868a3c7535b987635ff1fb5ab534203bfa2d64a@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r666f29a7d0e1f98fa1425ca01efcfa86e6e3856e01d300828aa7c6ea@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1703a402f30c8a2ee409f8c6f393e95a63f8c952cc9ee5bf9dd586dc@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18640', 'https://lists.apache.org/thread.html/r20350031c60a77b45e0eded33e9b3e9cb0cbfc5e24e1c63bf264df12@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb0e033d5ec8233360203431ad96580cf2ec56f47d9a425d894e279c2@%3Cpr.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r154090b871cf96d985b90864442d84eb027c72c94bc3f0a5727ba2d1@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1dfac8b6a7097bcb4979402bbb6e2f8c36d0d9001e3018717eb22b7e@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r1aab47b48a757c70e40fc0bcb1fcf1a3951afa6a17aee7cd66cf79f8@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTVJC54XGX26UJVVYCXZ7D25X3R5T2G6/', 'https://lists.apache.org/thread.html/reb1751562ee5146d3aca654a2df76a2c13d8036645ce69946f9c219e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r7ce3de03facf7e7f3e24fc25d26d555818519dafdb20f29398a3414b@%3Cdev.phoenix.apache.org%3E', 'https://lists.apache.org/thread.html/rcb4b61dbe2ed1c7a88781a9aff5a9e7342cc7ed026aec0418ee67596@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1ffce2ed3017e9964f03ad2c539d69e49144fc8e9bf772d641612f98@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/recfe569f4f260328b0036f1c82b2956e864d519ab941a5e75d0d832d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re791a854001ec1f79cd4f47328b270e7a1d9d7056debb8f16d962722@%3Cdev.atlas.apache.org%3E', 'https://bitbucket.org/asomov/snakeyaml/issues/377/allow-configuration-for-preventing-billion', 'https://bitbucket.org/asomov/snakeyaml/wiki/Billion%20laughs%20attack', 'https://lists.apache.org/thread.html/raebd2019b3da8c2f90f31e8b203b45353f78770ca93bfe5376f5532e@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re851bbfbedd47c690b6e01942acb98ee08bd00df1a94910b905bc8cd@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rc3211c71f7e0973a1825d1988a3921288c06cd9d793eae97ecd34948@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rfe0aab6c3bebbd9cbfdedb65ff3fdf420714bcb8acdfd346077e1263@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKN7VGIKTYBCAKYBRG55QHXAY5UDZ7HA/', 'https://bitbucket.org/asomov/snakeyaml/commits/da11ddbd91c1f8392ea932b37fa48110fa54ed8c', 'https://lists.apache.org/thread.html/r4d7f37da1bc2df90a5a0f56eb7629b5ea131bfe11eeeb4b4c193f64a@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1058e7646988394de6a3fd0857ea9b1ee0de14d7bb28fee5ff782457@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r55d807f31e64a080c54455897c20b1667ec792e5915132c7b7750533@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r6c91e52b3cc9f4e64afe0f34f20507143fd1f756d12681a56a9b38da@%3Ccommits.pulsar.apache.org%3E', 'https://mvnrepository.com/artifact/org.yaml/snakeyaml/1.25/usages', 'https://lists.apache.org/thread.html/r465d2553a31265b042cf5457ef649b71e0722ab89b6ea94a5d59529b@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c33d0069c927fae16084f0605895b98d231d7c48527bcb822ac48c@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rf95bebee6dfcc55067cebe8482bd31e6f481d9f74ba8e03f860c3ec7@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb7b28ac741e32dd5edb2c22485d635275bead7290b056ee56baf8ce0@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rb34d8d3269ad47a1400f5a1a2d8310e13a80b6576ebd7f512144198d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r8464b6ec951aace8c807bac9ea526d4f9e3116aa16d38be06f7c6524@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r2db207a2431a5e9e95e899858ab1f5eabd9bcc790a6ca7193ae07e94@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r191ceadb1b883357384981848dfa5235cb02a90070c553afbaf9b3d9@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4c682fb8cf69dd14162439656a6ebdf42ea6ad0e4edba95907ea3f14@%3Ccommits.servicecomb.apache.org%3E', 'https://bitbucket.org/asomov/snakeyaml/wiki/Changes', 'https://lists.apache.org/thread.html/r28c9009a48d52cf448f8b02cd823da0f8601d2dff4d66f387a35f1e0@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r643ba53f002ae59068f9352fe1d82e1b6f375387ffb776f13efe8fda@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r2a5b84fdf59042dc398497e914b5bb1aed77328320b1438144ae1953@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r900e020760c89f082df1c6e0d46320eba721e4e47bb9eb521e68cd95@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rd582c64f66c354240290072f340505f5d026ca944ec417226bb0272e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rdd34c0479587e32a656d976649409487d51ca0d296b3e26b6b89c3f5@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rcb2a7037366c58bac6aec6ce3df843a11ef97ae4eb049f05f410eaa5@%3Ccommon-commits.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5510f0125ba409fc1cabd098ab8b457741e5fa314cbd0e61e4339422@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r2b05744c0c2867daa5d1a96832965b7d6220328b0ead06c22a6e7854@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r182e9cf6f3fb22b9be0cac4ff0685199741d2ab6e9a4e27a3693c224@%3Ccommon-issues.hadoop.apache.org%3E'}
| null |
GHSA
|
GHSA-jgrx-mgxx-jf9v
|
Regular Expression Denial of Service in tmpl
|
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
|
{'CVE-2021-3777'}
|
2022-05-04T03:26:17Z
|
2021-09-20T20:27:52Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://github.com/advisories/GHSA-jgrx-mgxx-jf9v', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df'}
| null |
GHSA
|
GHSA-qg3g-2mgh-33j8
|
Sensitive Data Exposure in msrcrypto
|
Versions of `msrcrypto` prior to 1.4.1 are vulnerable to Sensitive Data Exposure. The package's Elliptic Curve Cryptography (ECC) implementation may leak information about a server's private ECC key. It can also allow attackers to craft invalid ECDSA signatures that pass as valid. There is no published proof-of-concept for this vulnerability.
## Recommendation
Upgrade to version 1.4.1 or later.
|
{'CVE-2018-8319'}
|
2021-09-16T19:58:02Z
|
2018-09-10T15:19:49Z
|
CRITICAL
| 9.8
|
{'CWE-682'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8319', 'http://www.securityfocus.com/bid/104655', 'http://www.securitytracker.com/id/1041268', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8319', 'https://github.com/advisories/GHSA-qg3g-2mgh-33j8', 'https://www.npmjs.com/advisories/1112'}
| null |
GHSA
|
GHSA-c8qc-62qv-5p2x
|
Out-of-bounds Write in ChakraCore
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
|
{'CVE-2020-0828'}
|
2021-07-28T18:58:22Z
|
2021-07-28T18:58:22Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0828', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0828', 'https://github.com/advisories/GHSA-c8qc-62qv-5p2x'}
| null |
GHSA
|
GHSA-fw5f-7c6c-3vmv
|
Cross-site Scripting in PrimeFaces
|
An XSS issue was discovered in tooltip/tooltip.js in PrimeTek PrimeFaces 7.0.11. In a web application using PrimeFaces, an attacker can provide JavaScript code in an input field whose data is later used as a tooltip title without any input validation.
|
{'CVE-2020-10544'}
|
2021-05-07T16:16:30Z
|
2021-05-07T16:16:30Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-10544', 'https://github.com/primefaces/primefaces/issues/5642', 'https://github.com/advisories/GHSA-fw5f-7c6c-3vmv'}
| null |
GHSA
|
GHSA-52mh-p2m2-w625
|
Cross-site Scripting in HAPI FHIR
|
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)
|
{'CVE-2019-12741'}
|
2021-08-04T21:01:40Z
|
2019-06-07T20:56:59Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://github.com/advisories/GHSA-52mh-p2m2-w625', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'}
| null |
GHSA
|
GHSA-2mrj-435v-c2cr
|
possible DoS caused by malformed signature decoding in Pure-Python ECDSA
|
**Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g.
|
{'CVE-2019-14853'}
|
2020-06-16T20:17:43Z
|
2019-12-02T18:15:31Z
|
MODERATE
| 0
| null |
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853', 'https://seclists.org/bugtraq/2019/Dec/33', 'https://www.debian.org/security/2019/dsa-4588', 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3', 'https://github.com/advisories/GHSA-2mrj-435v-c2cr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}
| null |
GHSA
|
GHSA-jm34-xm8m-w958
|
Open Redirect in oauth2_proxy
|
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
|
{'CVE-2017-1000070'}
|
2021-12-20T18:04:40Z
|
2021-12-20T18:04:40Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070', 'https://github.com/advisories/GHSA-jm34-xm8m-w958', 'https://github.com/bitly/oauth2_proxy/issues/228', 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050', 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5', 'https://github.com/bitly/oauth2_proxy/pull/359'}
| null |
GHSA
|
GHSA-5949-rw7g-wx7w
|
Deserialization of untrusted data in jackson-databind
|
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
|
{'CVE-2021-20190'}
|
2021-04-26T14:52:04Z
|
2021-01-20T21:20:15Z
|
HIGH
| 0
|
{'CWE-502'}
|
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://github.com/advisories/GHSA-5949-rw7g-wx7w', 'https://security.netapp.com/advisory/ntap-20210219-0008/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E'}
| null |
GHSA
|
GHSA-74mg-6xqx-2vrq
|
Deserialization exploitation in Apache Dubbo
|
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
|
{'CVE-2020-11995'}
|
2022-02-09T22:27:01Z
|
2022-02-09T22:27:01Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11995', 'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-74mg-6xqx-2vrq'}
| null |
GHSA
|
GHSA-xqj7-j8j5-f2xr
|
Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
|
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
|
{'CVE-2018-1000180'}
|
2022-04-26T18:56:39Z
|
2018-10-16T17:44:39Z
|
HIGH
| 7.5
|
{'CWE-327'}
|
{'https://access.redhat.com/errata/RHSA-2018:2423', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000180', 'https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test', 'https://github.com/advisories/GHSA-xqj7-j8j5-f2xr', 'https://security.netapp.com/advisory/ntap-20190204-0003/', 'http://www.securityfocus.com/bid/106567', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://www.debian.org/security/2018/dsa-4233', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html'}
| null |
GHSA
|
GHSA-vm67-mh96-95mq
|
Malicious Package in bubfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:53:44Z
|
2020-09-03T21:40:48Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-vm67-mh96-95mq', 'https://www.npmjs.com/advisories/1232'}
| null |
GHSA
|
GHSA-j8wc-gxx9-82hx
|
Exposure of Sensitive Information to an Unauthorized Actor in Apache Santuario
|
All versions of Apache Santuario - XML Security for Java prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the "secureValidation" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.
|
{'CVE-2021-40690'}
|
2022-04-22T15:41:53Z
|
2021-09-20T23:18:41Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5010', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40690', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html', 'https://github.com/advisories/GHSA-j8wc-gxx9-82hx', 'https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E', 'https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E'}
| null |
GHSA
|
GHSA-qfpc-5pjr-mh26
|
Missing validation in shape inference for `Dequantize`
|
### Impact
The shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments:
```python
import tensorflow as tf
tf.compat.v1.disable_v2_behavior()
tf.raw_ops.Dequantize(
input_tensor = tf.constant(-10.0, dtype=tf.float32),
input_tensor = tf.cast(input_tensor, dtype=tf.quint8),
min_range = tf.constant([], shape=[0], dtype=tf.float32),
max_range = tf.constant([], shape=[0], dtype=tf.float32),
mode = 'MIN_COMBINED',
narrow_range=False,
axis=-10,
dtype=tf.dtypes.float32)
```
The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values.
### Patches
We have patched the issue in GitHub commit [da857cfa0fde8f79ad0afdbc94e88b5d4bbec764](https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang of Baidu Security.
|
{'CVE-2021-37677'}
|
2021-08-25T14:41:23Z
|
2021-08-25T14:41:23Z
|
MODERATE
| 5.5
|
{'CWE-20'}
|
{'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764', 'https://github.com/advisories/GHSA-qfpc-5pjr-mh26', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37677', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26'}
| null |
GHSA
|
GHSA-m836-gxwq-j2pm
|
Improper Access Control in github.com/treeverse/lakefs
|
### Impact
1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name.
1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them.
1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them.
1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit.
### For more information
If you have any questions or comments about this advisory please:
* Email us at security@treeverse.io.
* Open an issue on https://github.com/treeverse/lakeFS/issues/new.
| null |
2022-04-19T19:03:13Z
|
2021-10-28T16:27:03Z
|
MODERATE
| 5.7
|
{'CWE-284'}
|
{'https://github.com/advisories/GHSA-m836-gxwq-j2pm', 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm'}
| null |
GHSA
|
GHSA-rhwf-hqpr-q8g2
|
Code Injection in script-manager
|
An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code.
|
{'CVE-2020-8129'}
|
2021-04-13T15:24:38Z
|
2021-04-13T15:24:38Z
|
HIGH
| 9.8
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8129', 'https://hackerone.com/reports/660563', 'https://github.com/advisories/GHSA-rhwf-hqpr-q8g2'}
| null |
GHSA
|
GHSA-5mc7-m686-p6jg
|
Deserialization of Untrusted Data in Apache Dubbo
|
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final call. The signature for the $invoke or $invokeAsync methods is Ljava/lang/String;[Ljava/lang/String;[Ljava/lang/Object; where the first argument is the name of the method to invoke, the second one is an array with the parameter types for the method being invoked and the third one is an array with the actual call arguments. In addition, the caller also needs to set an RPC attachment specifying that the call is a generic call and how to decode the arguments. The possible values are: - true - raw.return - nativejava - bean - protobuf-json An attacker can control this RPC attachment and set it to nativejava to force the java deserialization of the byte array located in the third argument.
|
{'CVE-2021-30179'}
|
2022-03-21T21:57:10Z
|
2022-03-18T17:57:32Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-30179', 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-5mc7-m686-p6jg', 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67@%3Cdev.dubbo.apache.org%3E'}
| null |
GHSA
|
GHSA-2rr5-8q37-2w7h
|
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
|
### Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.)
### Impact
In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default.
Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected:
- Nokogiri::XML::SAX::Parser
- Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser
- Nokogiri::XML::SAX::PushParser
- Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser
### Mitigation
JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier.
CRuby users are not affected.
|
{'CVE-2021-41098'}
|
2021-11-04T18:25:39Z
|
2021-09-27T20:12:47Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41098', 'https://github.com/advisories/GHSA-2rr5-8q37-2w7h', 'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h'}
| null |
GHSA
|
GHSA-844w-j86r-4x2j
|
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
|
### Impact
A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory.
This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed.
### Patches
Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0.
### For more information
Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2019-16778'}
|
2021-11-01T14:12:43Z
|
2019-12-16T20:17:10Z
|
LOW
| 2.6
|
{'CWE-681', 'CWE-122'}
|
{'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md', 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892', 'https://github.com/advisories/GHSA-844w-j86r-4x2j', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}
| null |
GHSA
|
GHSA-3xpw-vhmv-cw7h
|
Command injection in czproject/git-php
|
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
|
{'CVE-2022-25866'}
|
2022-04-27T14:35:59Z
|
2022-04-26T00:00:35Z
|
HIGH
| 8.1
|
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25866', 'https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349', 'https://github.com/advisories/GHSA-3xpw-vhmv-cw7h', 'https://github.com/czproject/git-php/releases/tag/v4.0.3', 'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}
| null |
GHSA
|
GHSA-8m2f-74r2-x3f2
|
Code injection in accesslog
|
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary JavaScript code on the host that this package is being run on.
|
{'CVE-2022-25760'}
|
2022-03-25T13:20:51Z
|
2022-03-18T00:01:10Z
|
HIGH
| 7.1
|
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-ACCESSLOG-2312099', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25760', 'https://github.com/advisories/GHSA-8m2f-74r2-x3f2', 'https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6'}
| null |
GHSA
|
GHSA-w8qv-6jwh-64r5
|
Regular Expression Denial of Service in browserslist
|
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
|
{'CVE-2021-23364'}
|
2021-05-24T19:52:40Z
|
2021-05-24T19:52:40Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/pull/593', 'https://github.com/advisories/GHSA-w8qv-6jwh-64r5'}
| null |
GHSA
|
GHSA-77qv-gh6f-pgh4
|
Command Injection in Limdu
|
### Impact
The `trainBatch` function has a command injection vulnerability. Clients of the Limdu library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
### Patches
Patched in version 0.95.
### Workarounds
Do not use trainBatch with classifiers that rely on shell execution, such as SVM Perf, SVM Linear or Adaboost
### References
No
|
{'CVE-2020-4066'}
|
2021-01-07T23:50:30Z
|
2020-06-22T15:24:06Z
|
LOW
| 3.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4066', 'https://github.com/erelsgl/limdu/security/advisories/GHSA-77qv-gh6f-pgh4', 'https://github.com/advisories/GHSA-77qv-gh6f-pgh4'}
| null |
GHSA
|
GHSA-8h84-8j4f-p97q
|
Injection in bodymen
|
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
|
{'CVE-2019-10792'}
|
2021-04-13T15:24:21Z
|
2021-04-13T15:24:21Z
|
MODERATE
| 6.3
|
{'CWE-74'}
|
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/advisories/GHSA-8h84-8j4f-p97q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
| null |
GHSA
|
GHSA-4298-89hc-6rfv
|
Open Redirect in Flask-User
|
This affects all versions of package Flask-User. When using the make_safe_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as /////evil.com/path or \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False.
|
{'CVE-2021-23401'}
|
2022-01-10T21:16:00Z
|
2021-08-09T20:44:32Z
|
MODERATE
| 5.4
|
{'CWE-601'}
|
{'https://github.com/lingthio/Flask-User/blob/master/flask_user/user_manager__utils.py', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUSER-1293188', 'https://github.com/lingthio/Flask-User', 'https://github.com/advisories/GHSA-4298-89hc-6rfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23401'}
| null |
GHSA
|
GHSA-mxjr-xmcg-fg7w
|
Arbitrary Code Injection in mobile-icon-resizer
|
mobile-icon-resizer resizes large images for use as icons for iOS and Android.
mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3.
mobile-icon-resizer takes an options object as an argument to define the resulting icons as such:
```
var options = {
config: './config.js'
}
resize(options, function(err){});
```
config.js would need to be a file on the filesystem and look something like:
```
var config = {
iOS: {
"images": [
/* iOS image definitions are not vulnerable */
]
},
android: {
"images" : [
{
"baseRatio" : "console.log('Executing script as baseRatio property')",
"folder" : "drawable-ldpi"
},
{
"ratio" : "console.log('Executing script as ratio property')",
"folder" : "drawable-mdpi"
},
/* other android image defintiions ... */
]
}
};
exports = module.exports = config;
```
The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed.
## Recommendation
Update to version 0.4.3 or later.
| null |
2021-08-17T15:41:59Z
|
2019-06-27T17:25:21Z
|
MODERATE
| 6.5
|
{'CWE-94'}
|
{'https://nodesecurity.io/advisories/317', 'https://github.com/advisories/GHSA-mxjr-xmcg-fg7w', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://www.npmjs.com/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
| null |
GHSA
|
GHSA-7528-7jg5-6g62
|
Cross-site Scripting Vulnerability in CodeIgniter4
|
### Impact
Cross-Site Scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4.
Attackers can do XSS attacks if you are using `API\ResponseTrait`.
### Patches
Upgrade to v4.1.8 or later.
### Workarounds
Do one of the following:
1. Do not use `API\ResponseTrait` nor `ResourceController`
2. Disable Auto Route and [Use Defined Routes Only](https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only)
### References
- [Cross Site Scripting (XSS) Software Attack | OWASP Foundation](https://owasp.org/www-community/attacks/xss/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
{'CVE-2022-21715'}
|
2022-04-19T19:03:21Z
|
2022-01-27T15:09:00Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd', 'https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21715'}
| null |
GHSA
|
GHSA-rq8g-5pc5-wrhr
|
Insufficient Entropy in cryptiles
|
Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed.
## Recommendation
Upgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package.
|
{'CVE-2018-1000620'}
|
2021-09-17T19:26:13Z
|
2018-09-11T18:22:50Z
|
CRITICAL
| 9.8
|
{'CWE-331'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000620', 'https://www.npmjs.com/advisories/720', 'https://github.com/advisories/GHSA-rq8g-5pc5-wrhr', 'https://www.npmjs.com/advisories/1464', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/476.json', 'https://github.com/hapijs/cryptiles/issues/34'}
| null |
GHSA
|
GHSA-9c8h-vvrj-w2p8
|
Heap OOB in `RaggedGather`
|
### Impact
If the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers.
```python
import tensorflow as tf
tf.raw_ops.RaggedGather(
params_nested_splits = [0,0,0],
params_dense_values = [1,1],
indices = [0,0,9,0,0],
OUTPUT_RAGGED_RANK=0)
```
In debug mode, the same code triggers a `CHECK` failure.
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors.
### Patches
We have patched the issue in GitHub commit [a2b743f6017d7b97af1fe49087ae15f0ac634373](https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37641'}
|
2021-08-25T14:43:59Z
|
2021-08-25T14:43:59Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37641', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8'}
| null |
GHSA
|
GHSA-qrgf-jqqm-x7xv
|
High severity vulnerability that affects dragonfly
|
lib/dragonfly/imagemagickutils.rb in the fog-dragonfly gem 0.8.2 for Ruby allows remote attackers to execute arbitrary commands via unspecified vectors.
|
{'CVE-2013-5671'}
|
2021-09-16T21:03:56Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
| null |
{'http://seclists.org/fulldisclosure/2013/Sep/18', 'http://www.osvdb.org/96798', 'http://www.vapid.dhs.org/advisories/fog-dragonfly-0.8.2-cmd-inj.html', 'http://seclists.org/oss-sec/2013/q3/528', 'http://seclists.org/oss-sec/2013/q3/526', 'https://github.com/advisories/GHSA-qrgf-jqqm-x7xv', 'https://nvd.nist.gov/vuln/detail/CVE-2013-5671'}
| null |
GHSA
|
GHSA-882p-jqgm-f45g
|
Moderate severity vulnerability that affects nokogiri
|
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
|
{'CVE-2017-18258'}
|
2021-09-07T14:55:47Z
|
2018-04-13T16:17:46Z
|
MODERATE
| 6.5
|
{'CWE-770'}
|
{'https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html', 'https://usn.ubuntu.com/3739-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18258', 'https://github.com/advisories/GHSA-882p-jqgm-f45g', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284', 'https://security.netapp.com/advisory/ntap-20190719-0001/', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}
| null |
GHSA
|
GHSA-cgvm-rvfv-c92r
|
Malicious Package in ecuvre
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:01:46Z
|
2020-09-03T17:05:51Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-cgvm-rvfv-c92r', 'https://www.npmjs.com/advisories/1396'}
| null |
GHSA
|
GHSA-g95j-p8f6-pwh4
|
Downloads Resources over HTTP in headless-browser-lite
|
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`.
## Recommendation
Update to version 2015.4.18-a or later.
|
{'CVE-2016-10625'}
|
2021-06-10T23:42:14Z
|
2019-02-18T23:56:58Z
|
HIGH
| 8.1
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/230', 'https://nodesecurity.io/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'}
| null |
GHSA
|
GHSA-jvf4-g24p-2qgw
|
Arbitrary Code Execution in shiba
|
"All versions of package shiba are vulnerable to Arbitrary Code Execution due to the default usage of the function load() of the package js-yaml instead of its secure replacement , safeLoad()."
|
{'CVE-2020-7738'}
|
2021-05-10T18:37:34Z
|
2021-05-10T18:37:34Z
|
HIGH
| 8.3
|
{'CWE-94'}
|
{'https://www.npmjs.com/package/shiba', 'https://github.com/advisories/GHSA-jvf4-g24p-2qgw', 'https://snyk.io/vuln/SNYK-JS-SHIBA-596466', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7738'}
| null |
GHSA
|
GHSA-mh24-7wvg-v88g
|
Low severity vulnerability that affects pypiserver
|
CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a %0d%0a in a URI.
|
{'CVE-2019-6802'}
|
2021-07-22T22:31:28Z
|
2019-01-30T20:56:26Z
|
MODERATE
| 6.1
|
{'CWE-74', 'CWE-79'}
|
{'https://github.com/advisories/GHSA-mh24-7wvg-v88g', 'https://github.com/pypiserver/pypiserver/issues/237', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}
| null |
GHSA
|
GHSA-9vfj-5g7h-4p24
|
Server side template injection in Apache Camel
|
Server-Side Template Injection and arbitrary file disclosure on Camel templating components
|
{'CVE-2020-11994'}
|
2021-10-21T21:05:56Z
|
2020-07-29T18:08:48Z
|
HIGH
| 7.5
|
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11994', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-9vfj-5g7h-4p24', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECAMEL-575542', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r0a406dc5a158fe6fab6ee85f6e082a8473c0c346b37db8cc7a4619e6%40%3Cdev.camel.apache.org%3E'}
| null |
GHSA
|
GHSA-mwj7-r5vc-hmc9
|
Directory Traversal in hcbserver
|
Affected versions of `hcbserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16171'}
|
2021-01-14T15:46:25Z
|
2020-09-01T17:35:38Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16171', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/hcbserver', 'https://nodesecurity.io/advisories/414', 'https://github.com/advisories/GHSA-mwj7-r5vc-hmc9', 'https://www.npmjs.com/advisories/414'}
| null |
GHSA
|
GHSA-2hw7-mxvj-m455
|
Path traversal in Node-RED-Dashboard
|
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
|
{'CVE-2021-3223'}
|
2021-01-29T18:13:52Z
|
2021-01-29T18:13:52Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-2hw7-mxvj-m455', 'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://www.npmjs.com/package/node-red-dashboard'}
| null |
GHSA
|
GHSA-ww39-953v-wcq6
|
Regular expression denial of service in glob-parent
|
This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator.
|
{'CVE-2020-28469'}
|
2022-03-30T21:18:41Z
|
2021-06-07T21:56:34Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28469', 'https://github.com/gulpjs/glob-parent/blob/6ce8d11f2f1ed8e80a9526b1dc8cf3aa71f43474/index.js%23L9', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBES128-1059093', 'https://github.com/advisories/GHSA-ww39-953v-wcq6', 'https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059092', 'https://github.com/gulpjs/glob-parent/pull/36', 'https://snyk.io/vuln/SNYK-JS-GLOBPARENT-1016905', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-v6vg-pxvv-g5cq
|
Improper Privilege Management in Snipe-IT
|
Snipe-IT prior to 5.3.9 is vulnerable to improper privilege management. A user who does not have access to the supplier module may view supplier content.
|
{'CVE-2022-0579'}
|
2022-02-26T00:33:40Z
|
2022-02-15T00:02:45Z
|
MODERATE
| 6.5
|
{'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0579', 'https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849', 'https://github.com/advisories/GHSA-v6vg-pxvv-g5cq', 'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}
| null |
GHSA
|
GHSA-x2jj-x3q2-7hph
|
Directory Traversal in 11xiaoli
|
Affected versions of `11xiaoli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16160'}
|
2021-01-14T15:47:30Z
|
2020-09-01T17:28:09Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16160', 'https://nodesecurity.io/advisories/395', 'https://github.com/advisories/GHSA-x2jj-x3q2-7hph', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/11xiaoli', 'https://www.npmjs.com/advisories/395'}
| null |
GHSA
|
GHSA-fpw3-x4xq-6vxq
|
Malicious Package in wepack-cli
|
All versions of `wepack-cli` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:46:23Z
|
2020-09-02T18:32:13Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/839', 'https://github.com/advisories/GHSA-fpw3-x4xq-6vxq'}
| null |
GHSA
|
GHSA-8c9h-4q7g-fp7h
|
Out-of-bounds Read in iText
|
iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
|
{'CVE-2022-24198'}
|
2022-02-10T22:57:07Z
|
2022-02-02T00:01:45Z
|
MODERATE
| 6.5
|
{'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24198', 'https://github.com/advisories/GHSA-8c9h-4q7g-fp7h', 'https://github.com/itext/itext7/pull/78'}
| null |
GHSA
|
GHSA-r88h-6987-g79f
|
Data races on syncpool
|
Affected versions of this crate unconditionally implements `Send` for `Bucket2`. This allows sending non-Send types to other threads.
This can lead to data races when non Send types like `Cell<T>` or `Rc<T>` are contained inside `Bucket2` and sent across thread boundaries. The data races can potentially lead to memory corruption (as demonstrated in the PoC from the original report issue).
The flaw was corrected in commit 15b2828 by adding a `T: Send` bound to the `Send` impl of `Bucket2<T>`.
| null |
2021-08-25T21:00:28Z
|
2021-08-25T21:00:28Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0142.html', 'https://github.com/Chopinsky/byte_buffer/issues/2', 'https://github.com/advisories/GHSA-r88h-6987-g79f', 'https://github.com/RustSec/advisory-db/blob/main/crates/syncpool/RUSTSEC-2020-0142.md'}
| null |
GHSA
|
GHSA-qw8w-2xcp-xg59
|
Low severity vulnerability that affects passenger
|
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
|
{'CVE-2014-1832'}
|
2021-09-16T21:10:03Z
|
2018-10-10T17:29:27Z
|
LOW
| 0
| null |
{'https://bugzilla.redhat.com/show_bug.cgi?id=1058992', 'http://openwall.com/lists/oss-security/2014/01/29/6', 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832'}
| null |
GHSA
|
GHSA-fvhr-7j8m-3cvc
|
Data races in appendix
|
The `appendix` crate implements a key-value mapping data structure called
`Index<K, V>` that is stored on disk. The crate allows for any type to inhabit
the generic `K` and `V` type parameters and implements Send and Sync for them
unconditionally.
Using a type that is not marked as `Send` or `Sync` with `Index` can allow it
to be used across multiple threads leading to data races. Additionally using
reference types for the keys or values will lead to the segmentation faults
in the crate's code.
|
{'CVE-2020-36469'}
|
2021-08-25T20:57:02Z
|
2021-08-25T20:57:02Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36469', 'https://github.com/advisories/GHSA-fvhr-7j8m-3cvc', 'https://rustsec.org/advisories/RUSTSEC-2020-0149.html', 'https://github.com/krl/appendix/issues/6'}
| null |
GHSA
|
GHSA-4v9w-pvwr-38h3
|
OS Command Injection in strong-nginx-controller
|
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
|
{'CVE-2020-7621'}
|
2022-02-10T23:36:54Z
|
2022-02-10T23:36:54Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7621', 'https://github.com/advisories/GHSA-4v9w-pvwr-38h3', 'https://github.com/strongloop/strong-nginx-controller/blob/master/lib/server.js#L65,'}
| null |
GHSA
|
GHSA-f7hx-fqxw-rvvj
|
Insufficient output escaping of attachment names in PHPMailer
|
### Impact
CWE-116: Incorrect output escaping.
An attachment added like this (note the double quote within the attachment name, which is entirely valid):
$mail->addAttachment('/tmp/attachment.tmp', 'filename.html";.jpg');
Will result in a message containing these headers:
Content-Type: application/octet-stream; name="filename.html";.jpg"
Content-Disposition: attachment; filename="filename.html";.jpg"
The attachment will be named `filename.html`, and the trailing `";.jpg"` will be ignored. Mail filters that reject `.html` attachments but permit `.jpg` attachments may be fooled by this.
Note that the MIME type itself is obtained automatically from the *source filename* (in this case `attachment.tmp`, which maps to a generic `application/octet-stream` type), and not the *name* given to the attachment (though these are the same if a separate name is not provided), though it can be set explicitly in other parameters to attachment methods.
### Patches
Patched in PHPMailer 6.1.6 by escaping double quotes within the name using a backslash, as per RFC822 section 3.4.1, resulting in correctly escaped headers like this:
Content-Type: application/octet-stream; name="filename.html\";.jpg"
Content-Disposition: attachment; filename="filename.html\";.jpg"
### Workarounds
Reject or filter names and filenames containing double quote (`"`) characters before passing them to attachment functions such as `addAttachment()`.
### References
[CVE-2020-13625](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13625).
[PHPMailer 6.1.6 release](https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the PHPMailer repo](https://github.com/PHPMailer/PHPMailer/issues)
|
{'CVE-2020-13625'}
|
2021-08-25T21:37:24Z
|
2020-05-27T16:37:02Z
|
HIGH
| 7.5
|
{'CWE-116'}
|
{'https://lists.debian.org/debian-lts-announce/2020/06/msg00014.html', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj', 'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3', 'https://github.com/advisories/GHSA-f7hx-fqxw-rvvj', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://usn.ubuntu.com/4505-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13625', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00004.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/'}
| null |
GHSA
|
GHSA-p5xh-vx83-mxcj
|
HTTP Request Smuggling in Twisted
|
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
|
{'CVE-2020-10109'}
|
2022-04-04T21:10:40Z
|
2020-03-31T15:40:12Z
|
CRITICAL
| 9.8
|
{'CWE-444'}
|
{'https://usn.ubuntu.com/4308-1/', 'https://usn.ubuntu.com/4308-2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10109', 'https://github.com/advisories/GHSA-p5xh-vx83-mxcj', 'https://security.gentoo.org/glsa/202007-24', 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/', 'https://know.bishopfox.com/advisories/twisted-version-19.10.0', 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}
| null |
GHSA
|
GHSA-jg6j-jrxv-2hh9
|
Cross-site Scripting in Apache Pluto
|
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
|
{'CVE-2021-36738'}
|
2022-01-08T00:46:17Z
|
2022-01-08T00:46:17Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36738', 'https://github.com/advisories/GHSA-jg6j-jrxv-2hh9', 'https://lists.apache.org/thread/11j19v1gjsk7o6o8nch1xrydow9b8lll'}
| null |
GHSA
|
GHSA-jjcx-999m-35hc
|
Improper Input Validation in Firefly III
|
Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints.
|
{'CVE-2019-14671'}
|
2021-09-08T17:27:07Z
|
2021-09-08T17:27:07Z
|
LOW
| 3.3
|
{'CWE-20'}
|
{'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14671', 'https://github.com/advisories/GHSA-jjcx-999m-35hc', 'https://github.com/firefly-iii/firefly-iii/issues/2367'}
| null |
GHSA
|
GHSA-cw4j-cf6c-mmfv
|
Use of Uninitialized Resource in binjs_io.
|
An issue was discovered in the binjs_io crate through 2021-01-03 for Rust. The Read method may read from uninitialized memory locations.
|
{'CVE-2021-45683'}
|
2022-01-07T17:36:38Z
|
2022-01-06T22:14:24Z
|
CRITICAL
| 9.8
|
{'CWE-908'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45683', 'https://github.com/advisories/GHSA-cw4j-cf6c-mmfv', 'https://rustsec.org/advisories/RUSTSEC-2021-0085.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/binjs_io/RUSTSEC-2021-0085.md'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.