ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-86wf-436m-h424
Resource Exhaustion Denial of Service in http-proxy-agent
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
{'CVE-2019-10196'}
2022-01-06T20:30:13Z
2022-01-06T20:30:13Z
MODERATE
9.8
{'CWE-665'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10196', 'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb', 'https://github.com/advisories/GHSA-86wf-436m-h424', 'https://www.npmjs.com/advisories/607', 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245'}
null
GHSA
GHSA-gmq2-39ff-f5qg
A failed upgrade may lead to hung goroutines
### Impact Processes using tableflip may encounter hung goroutines in the parent process, after a failed upgrade. The Go runtime has annoying behaviour around setting and clearing O_NONBLOCK: exec.Cmd.Start() ends up calling os.File.Fd() for any file in exec.Cmd.ExtraFiles. os.File.Fd() disables both the use of the runtime poller for the file and clears O_NONBLOCK from the underlying open file descriptor. This can lead to goroutines hanging in a parent process, after at least one failed upgrade. The bug manifests in goroutines which rely on either a deadline or interruption via Close() to be unblocked being stuck in read or accept like syscalls. As far as I can tell we've not experienced this problem in production, so it's most likely quite rare. ### Patches The problem has been fixed in v1.2.2. ### Workarounds None. ### References * https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0
null
2021-05-21T16:25:48Z
2021-05-21T16:25:48Z
LOW
0
null
{'https://github.com/cloudflare/tableflip/security/advisories/GHSA-gmq2-39ff-f5qg', 'https://github.com/cloudflare/tableflip/commit/cae714b289e199db5da5f08af861ea65be6232c0', 'https://github.com/advisories/GHSA-gmq2-39ff-f5qg'}
null
GHSA
GHSA-2mqv-4j3r-vjvp
Open redirect in @auth0/nextjs-auth0
### Overview Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability. ### Am I affected? You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`. ### How to fix that? Upgrade to version `>=1.6.2` ### Will this update impact my users? The fix provided in the patch will not affect your users.
{'CVE-2021-43812'}
2021-12-17T19:11:45Z
2021-12-16T18:52:21Z
MODERATE
6.4
{'CWE-601'}
{'https://github.com/advisories/GHSA-2mqv-4j3r-vjvp', 'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp'}
null
GHSA
GHSA-j9wj-26p5-fj2v
Directory Traversal in gaoxuyan
Affected versions of `gaoxuyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16153'}
2021-01-14T16:03:32Z
2020-09-01T17:17:29Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16153', 'https://github.com/advisories/GHSA-j9wj-26p5-fj2v', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gaoxuyan', 'https://www.npmjs.com/advisories/378', 'https://nodesecurity.io/advisories/378'}
null
GHSA
GHSA-cvw2-xj8r-mjf7
Activerecord-session_store Timing Attack
The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782. ## Recommendation This has been fixed in version 2.0.0. All users are advised to update to this version or later.
{'CVE-2019-25025'}
2021-03-24T17:32:13Z
2021-03-09T00:45:31Z
MODERATE
0
{'CWE-208'}
{'https://rubygems.org/gems/activerecord-session_store', 'https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml', 'https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0', 'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25025', 'https://github.com/rails/activerecord-session_store/pull/151', 'https://github.com/advisories/GHSA-cvw2-xj8r-mjf7'}
null
GHSA
GHSA-87v6-crgm-2gfj
Division by zero in Tensorflow
### Impact The [implementation of `FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192) can be made to crash a TensorFlow process via a division by 0: ```python import tensorflow as tf import numpy as np tf.raw_ops.FractionalMaxPool( value=tf.constant(value=[[[[1, 4, 2, 3]]]], dtype=tf.int64), pooling_ratio=[1.0, 1.44, 1.73, 1.0], pseudo_random=False, overlapping=False, deterministic=False, seed=0, seed2=0, name=None) ``` ### Patches We have patched the issue in GitHub commit [ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb](https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-21735'}
2022-02-11T16:23:19Z
2022-02-10T00:21:32Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192', 'https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj', 'https://github.com/advisories/GHSA-87v6-crgm-2gfj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21735'}
null
GHSA
GHSA-mf27-wg66-m8f5
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
A vulnerability in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via a Raft session flooding attack using Raft OpenSessionRequest messages.
{'CVE-2020-35210'}
2022-01-04T18:57:50Z
2021-12-17T20:41:09Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-mf27-wg66-m8f5', 'https://docs.google.com/presentation/d/1eZznIciFI06_5UJrXvlLugH2-nmjfYpQO5NyNMc9RxU/edit?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35210'}
null
GHSA
GHSA-vfvf-6gx5-mqv6
Incorrect Authorization in ORY Oathkeeper
ORY Oathkeeper is an Identity & Access Proxy (IAP) and Access Control Decision API that authorizes HTTP requests based on sets of Access Rules. When you make a request to an endpoint that requires the scope `foo` using an access token granted with that `foo` scope, introspection will be valid and that token will be cached. The problem comes when a second requests to an endpoint that requires the scope `bar` is made before the cache has expired. Whether the token is granted or not to the `bar` scope, introspection will be valid. A patch will be released with `v0.38.12-beta.1`. Per default, caching is disabled for the `oauth2_introspection` authenticator. When caching is disabled, this vulnerability does not exist. The cache is checked in [`func (a *AuthenticatorOAuth2Introspection) Authenticate(...)`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L152). From [`tokenFromCache()`](https://github.com/ory/oathkeeper/blob/6a31df1c3779425e05db1c2a381166b087cb29a4/pipeline/authn/authenticator_oauth2_introspection.go#L97) it seems that it only validates the token expiration date, but ignores whether the token has or not the proper scopes. The vulnerability was introduced in PR #424. During review, we failed to require appropriate test coverage by the submitter which is the primary reason that the vulnerability passed the review process.
{'CVE-2021-32701'}
2021-06-24T20:16:02Z
2021-06-24T20:16:02Z
HIGH
7.5
{'CWE-863'}
{'https://github.com/ory/oathkeeper/pull/424', 'https://github.com/ory/oathkeeper/commit/1f9f625c1a49e134ae2299ee95b8cf158feec932', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32701', 'https://github.com/advisories/GHSA-vfvf-6gx5-mqv6', 'https://github.com/ory/oathkeeper/security/advisories/GHSA-qvp4-rpmr-xwrr'}
null
GHSA
GHSA-f6px-w8rh-7r89
Data race in Beego
The File Session Manager in Beego 1.10.0 allows local users to read session files because there is a race condition involving file creation within a directory with weak permissions.
{'CVE-2019-16354'}
2021-08-02T17:15:05Z
2021-08-02T17:15:05Z
MODERATE
4.7
{'CWE-362', 'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16354', 'https://github.com/beego/beego/issues/3763', 'https://github.com/astaxie/beego/blob/develop/session/sess_file.go#L141', 'https://github.com/astaxie/beego/issues/3763', 'https://github.com/advisories/GHSA-f6px-w8rh-7r89', 'https://github.com/beego/beego/pull/3975/commits/f99cbe0fa40936f2f8dd28e70620c559b6e5e2fd'}
null
GHSA
GHSA-hx7j-43w2-7rj7
Prototype pollution in nconf-toml
Prototype pollution vulnerability in `nconf-toml` versions 0.0.1 through 0.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25946'}
2021-10-05T17:22:39Z
2021-06-07T22:12:13Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/RobLoach/nconf-toml/blob/8ade08cd1cfb9691ab7cc5c3514cc05c5085918f/index.js#L8', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25946', 'https://github.com/advisories/GHSA-hx7j-43w2-7rj7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25946'}
null
GHSA
GHSA-9vxv-wpv4-f52p
Information leakage in Error Handler
### Impact Information leakage in Error Handler ### Patches We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021
null
2021-05-21T14:29:33Z
2021-05-21T14:29:33Z
MODERATE
0
{'CWE-209'}
{'https://github.com/advisories/GHSA-9vxv-wpv4-f52p', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}
null
GHSA
GHSA-pxqr-8v54-m2hj
Moderate severity vulnerability that affects rails_admin
rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.
{'CVE-2016-10522'}
2021-01-08T18:19:29Z
2018-08-08T22:30:35Z
MODERATE
0
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10522', 'https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/', 'https://github.com/advisories/GHSA-pxqr-8v54-m2hj', 'https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a', 'https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173'}
null
GHSA
GHSA-q7cg-43mg-qp69
ASP.NET Core Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. An information disclosure vulnerability exists in .NET 5.0, .NET Core 3.1 and .NET Core 2.1 where a JWT token is logged if it cannot be parsed. ### Patches * If you're using .NET 5.0, you should download and install Runtime 5.0.9 or SDK 5.0.206 (for Visual Studio 2019 v16.8) or SDK 5.0.303 (for Visual Studio 2019 V16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0. * If you're using .NET Core 3.1, you should download and install Runtime 3.1.18 or SDK 3.1.118 (for Visual Studio 2019 v16.4) or 3.1.412 (for Visual Studio 2019 v16.7 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1. * If you're using .NET Core 2.1, you should download and install Runtime 2.1.29 or SDK 2.1.525 (for Visual Studio 2019 v15.9) or 2.1.817 from https://dotnet.microsoft.com/download/dotnet-core/2.1. * If your application is using .NET Core 2.1 running on .NET Framework see the [Updating .NET Core 2.1 on .NET Framework](#updating-2.1) section below. ### <a name="updating-2.1"></a> Updating .NET Core 2.1 on .NET Framework If you are running .NET Core 2.1 on .NET Framework you need to check your projects for dependencies and update them accordingly. #### Direct dependencies Direct dependencies are discoverable by examining your `csproj` file. They can be fixed by [editing the project file](#fixing-direct-dependencies) or using NuGet to update the dependency. #### Transitive dependencies Transitive dependencies occur when you add a package to your project that in turn relies on another package. For example, if Contoso publishes a package `Contoso.Utility` which, in turn, depends on `Contoso.Internals` and you add the `Contoso.Utility` package to your project now your project has a direct dependency on `Contoso.Utility` and, because `Contoso.Utility` depends 'Contoso.Internals', your application gains a transitive dependency on the `Contoso.Internals` package. Transitive dependencies are reviewable in two ways: * In the Visual Studio Solution Explorer window, which supports searching. * By examining the `project.assets.json` file contained in the obj directory of your project for `csproj` based projects The `project.assets.json` files are the authoritative list of all packages used by your project, containing both direct and transitive dependencies. There are two ways to view transitive dependencies. You can either [use Visual Studio’s Solution Explorer](#vs-solution-explorer), or you can review [the `project.assets.json` file](#project-assets-json)). ##### <a name="vs-solution-explorer"></a>Using Visual Studio Solution Explorer To use Solution Explorer, open the project in Visual Studio, and then press Ctrl+; to activate the search in Solution Explorer. Search for the [vulnerable package](#affected-software) and make a note of the version numbers of any results you find. For example, search for `Microsoft.AspNetCore.Authentication.JwtBearer` and update the package to the latest version ##### <a name="project-assets-json"></a> Manually reviewing project.assets.json Open the *project.assets.json* file from your project’s obj directory in your editor. We suggest you use an editor that understands JSON and allows you to collapse and expand nodes to review this file. Visual Studio and Visual Studio Code provide JSON friendly editing. Search the *project.assets.json* file for the [vulnerable package](#affected-software), using the format `packagename/` for each of the package names from the preceding table. If you find the assembly name in your search: * Examine the line on which they are found, the version number is after the `/`. * Compare to the [vulnerable versions table](#affected-software). For example, a search result that shows `Microsoft.AspNetCore.Authentication.JwtBearer/2.1.0` is a reference to version 2.1.1 of `Microsoft.AspNetCore.Authentication.JwtBearer`. If your *project.assets.json* file includes references to the [vulnerable package](#affected-software), then you need to fix the transitive dependencies. If you have not found any reference to any vulnerable packages, this means either * None of your direct dependencies depend on any vulnerable packages, or * You have already fixed the problem by updating the direct dependencies. #### Other Details - Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/195 - An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/35246 - MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-34532
{'CVE-2021-34532'}
2021-10-21T14:15:43Z
2021-08-25T14:45:28Z
MODERATE
5.5
null
{'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-q7cg-43mg-qp69', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34532', 'https://nvd.nist.gov/vuln/detail/CVE-2021-34532', 'https://github.com/advisories/GHSA-q7cg-43mg-qp69'}
null
GHSA
GHSA-97jg-43c9-q6pf
Unauthenticated user can retrieve the list of users through uorgsuggest.vm
A guest user without the right to view pages of the wiki can still list documents related to users of the wiki. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
{'CVE-2022-24819'}
2022-04-19T15:25:48Z
2022-04-08T21:53:38Z
MODERATE
5.3
{'CWE-359'}
{'https://github.com/advisories/GHSA-97jg-43c9-q6pf', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24819', 'https://jira.xwiki.org/browse/XWIKI-18850'}
null
GHSA
GHSA-2ppp-9496-p23q
Insufficient Entropy in Spring Security
Spring Security versions 5.3.x prior to 5.3.2, 5.2.x prior to 5.2.4, 5.1.x prior to 5.1.10, 5.0.x prior to 5.0.16 and 4.2.x prior to 4.2.16 use a fixed null initialization vector with CBC Mode in the implementation of the queryable text encryptor. A malicious user with access to the data that has been encrypted using such an encryptor may be able to derive the unencrypted values using a dictionary attack.
{'CVE-2020-5408'}
2021-06-15T17:57:30Z
2020-06-15T19:34:31Z
MODERATE
6.5
{'CWE-329', 'CWE-330'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5408', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://tanzu.vmware.com/security/cve-2020-5408', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-2ppp-9496-p23q'}
null
GHSA
GHSA-fp5j-3fpf-mhj5
Sensitive data written to disk unencrypted in Spark
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.
{'CVE-2019-10099'}
2021-07-27T20:59:49Z
2019-08-08T15:18:22Z
HIGH
7.5
{'CWE-312'}
{'https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E', 'https://github.com/advisories/GHSA-fp5j-3fpf-mhj5', 'https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10099'}
null
GHSA
GHSA-7r96-8g3x-g36m
Improper Verification of Cryptographic Signature
### Impact The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid. ### Patches Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verification method, the previous signatures are still valid. We highly recommend reverifying any signatures that were previously verified with the vulnerable `verifyWithMessage` method. ### Workarounds In `tenvoy.js` under the `verifyWithMessage` method definition within the `tEnvoyNaClSigningKey` class, ensure that the return statement call to `this.verify` ends in `.verified`. For example, the return statement should start with `return this.verify(signed, password).verified && ` instead of `return this.verify(signed, password) && `. ### For more information If you have any questions or comments about this advisory: * Open an issue in [github.com/TogaTech/tEnvoy](https://github.com/TogaTech/tEnvoy)
null
2022-01-04T19:36:52Z
2021-06-28T17:16:56Z
CRITICAL
9.8
{'CWE-347'}
{'https://github.com/advisories/GHSA-7r96-8g3x-g36m', 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m', 'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'}
null
GHSA
GHSA-p694-23q3-rvrc
Remote Code Execution in Apache Synapse
In Apache Synapse, by default no authentication is required for Java Remote Method Invocation (RMI). So Apache Synapse 3.0.1 or all previous releases (3.0.0, 2.1.0, 2.0.0, 1.2, 1.1.2, 1.1.1) allows remote code execution attacks that can be performed by injecting specially crafted serialized objects. And the presence of Apache Commons Collections 3.2.1 (commons-collections-3.2.1.jar) or previous versions in Synapse distribution makes this exploitable. To mitigate the issue, we need to limit RMI access to trusted users only. Further upgrading to 3.0.1 version will eliminate the risk of having said Commons Collection version. In Synapse 3.0.1, Commons Collection has been updated to 3.2.2 version.
{'CVE-2017-15708'}
2022-03-18T20:16:32Z
2020-11-04T18:23:25Z
CRITICAL
9.8
{'CWE-74', 'CWE-502'}
{'https://github.com/advisories/GHSA-p694-23q3-rvrc', 'https://lists.apache.org/thread.html/77f2accf240d25d91b47033e2f8ebec84ffbc6e6627112b2f98b66c9@%3Cdev.synapse.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r0fb289cd38c915b9a13a3376134f96222dd9100f1ef66b41631865c6@%3Ccommits.doris.apache.org%3E', 'http://www.securityfocus.com/bid/102154', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15708', 'https://security.gentoo.org/glsa/202107-37', 'https://www.oracle.com/security-alerts/cpujan2020.html'}
null
GHSA
GHSA-rhrq-64mq-hf9h
FPE in TFLite division operations
### Impact The implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc) There is no check that the divisor tensor does not contain zero elements. ### Patches We have patched the issue in GitHub commit [1e206baedf8bef0334cca3eb92bab134ef525a28](https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37683'}
2021-08-25T14:40:16Z
2021-08-25T14:40:16Z
MODERATE
5.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37683', 'https://github.com/advisories/GHSA-rhrq-64mq-hf9h', 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h'}
null
GHSA
GHSA-2wr2-8qjq-gh55
Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.
{'CVE-2021-23264'}
2021-12-16T15:27:35Z
2021-12-16T15:27:35Z
CRITICAL
9.1
{'CWE-402', 'CWE-668'}
{'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1', 'https://github.com/advisories/GHSA-2wr2-8qjq-gh55', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23264'}
null
GHSA
GHSA-mc84-xr9p-938r
High severity vulnerability that affects generator-jhipster
## Generated code uses repository configuration that downloads over HTTP instead of HTTPS ### Impact Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time. ### Patches Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1. If you are not able to upgrade make sure not to use a Maven repository via `http` in your build file. ### Workarounds Replace all custom repository definitions in `build.gradle` or `pom.xml` with their `https` version. e.g. ```xml <repository> <id>oss.sonatype.org-snapshot</id> <url>https://oss.sonatype.org/content/repositories/snapshots</url> // <-- must be httpS <releases> <enabled>false</enabled> </releases> <snapshots> <enabled>true</enabled> </snapshots> </repository> ``` ```gradle maven { url "https://repo.spring.io/plugins-release" } // <-- must be httpS ``` ### References * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/jhipster/generator-jhipster/issues](https://github.com/jhipster/generator-jhipster/issues)
null
2021-09-15T18:50:23Z
2019-09-23T18:31:05Z
HIGH
8.1
{'CWE-829', 'CWE-494'}
{'https://github.com/advisories/GHSA-mc84-xr9p-938r', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-536074', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mc84-xr9p-938r'}
null
GHSA
GHSA-2hwp-g4g7-mwwj
Reflected Cross-Site Scripting in jquery.terminal
Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization. ## Recommendation Upgrade to version 1.21.0 or later
null
2021-08-04T20:10:06Z
2019-05-29T20:25:35Z
MODERATE
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/769', 'https://github.com/advisories/GHSA-2hwp-g4g7-mwwj', 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}
null
GHSA
GHSA-44m4-9cjp-j587
IBX-1392: Image filenames sanitization
ezsystems/ezpublish-kernel versions 7.5.* before 7.5.26 are vulnerable to certain injection attacks and unauthorized access to some image files.
null
2022-01-21T23:24:14Z
2022-01-21T23:24:14Z
HIGH
0
null
{'https://github.com/advisories/GHSA-44m4-9cjp-j587', 'https://github.com/ezsystems/ezpublish-kernel/releases/tag/v7.5.26', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-44m4-9cjp-j587', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
null
GHSA
GHSA-r33q-22hv-j29q
Denial of service in github.com/ethereum/go-ethereum
### Impact A DoS vulnerability can make a LES server crash via malicious `GetProofsV2` request from a connected LES client. ### Patches The vulnerability was patched in https://github.com/ethereum/go-ethereum/pull/21896. ### Workarounds This vulnerability only concerns users explicitly enabling `les` server; disabling `les` prevents the exploit. It can also be patched by manually applying the patch in https://github.com/ethereum/go-ethereum/pull/21896. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
{'CVE-2020-26264'}
2022-04-19T19:02:42Z
2021-06-29T21:14:07Z
MODERATE
6.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26264', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-r33q-22hv-j29q', 'https://github.com/advisories/GHSA-r33q-22hv-j29q', 'https://github.com/ethereum/go-ethereum/commit/bddd103a9f0af27ef533f04e06ea429cf76b6d46', 'https://github.com/ethereum/go-ethereum/pull/21896', 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.25'}
null
GHSA
GHSA-qxjq-v4wf-ppvh
Out of bounds read in dync
An issue was discovered in the dync crate before 0.5.0 for Rust. VecCopy allows misaligned element access because u8 is not always the type in question.
{'CVE-2020-35903'}
2021-08-25T20:49:47Z
2021-08-25T20:49:47Z
MODERATE
5.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35903', 'https://github.com/elrnv/dync/issues/4', 'https://rustsec.org/advisories/RUSTSEC-2020-0050.html', 'https://github.com/advisories/GHSA-qxjq-v4wf-ppvh'}
null
GHSA
GHSA-9hfg-pxr6-q4vp
Use of a Broken or Risky Cryptographic Algorithm in crypto2
An issue was discovered in the crypto2 crate through 2021-10-08 for Rust. During Chacha20 encryption and decryption, an unaligned read of a u32 may occur.
{'CVE-2021-45709'}
2022-01-07T18:25:56Z
2022-01-06T22:04:51Z
CRITICAL
9.8
{'CWE-327'}
{'https://github.com/advisories/GHSA-9hfg-pxr6-q4vp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45709', 'https://rustsec.org/advisories/RUSTSEC-2021-0121.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/crypto2/RUSTSEC-2021-0121.md'}
null
GHSA
GHSA-v98j-7crc-wvrj
Authentication bypass in Apache Shiro
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
{'CVE-2020-17523'}
2022-02-24T13:47:13Z
2022-02-09T22:03:57Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/apache/shiro/pull/263', 'https://lists.apache.org/thread.html/rce5943430a6136d37a1f2fc201d245fe094e2727a0bc27e3b2d43a39%40%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r679ca97813384bdb1a4c087810ba44d9ad9c7c11583979bb7481d196@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17523', 'https://issues.apache.org/jira/browse/SHIRO-797', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec454cfa5baec4ad0ffae235@%3Cgitbox.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-v98j-7crc-wvrj', 'http://shiro.apache.org/download.html', 'https://lists.apache.org/thread.html/rd4b613e121438b97e3eb263cac3137caddb1dbd8f648b73a4f1898a6@%3Cissues.activemq.apache.org%3E'}
null
GHSA
GHSA-rvg8-pwq2-xj7q
Out-of-bounds Read in base64url
Versions of `base64url` before 3.0.0 are vulnerable to to out-of-bounds reads as it allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below. ## Recommendation Update to version 3.0.0 or later.
null
2021-09-24T20:34:57Z
2020-09-01T20:42:44Z
MODERATE
0
{'CWE-125'}
{'https://github.com/advisories/GHSA-rvg8-pwq2-xj7q', 'https://hackerone.com/reports/321687', 'https://www.npmjs.com/advisories/658', 'https://github.com/brianloveswords/base64url/pull/25'}
null
GHSA
GHSA-9wrq-xvmp-xjc8
High severity vulnerability that affects rails.
Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than CVE-2006-4111.
{'CVE-2006-4112'}
2021-12-01T19:40:38Z
2017-10-24T18:33:38Z
HIGH
0
null
{'https://github.com/advisories/GHSA-9wrq-xvmp-xjc8', 'http://www.securityfocus.com/bid/19454', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/28364', 'http://www.securityfocus.com/archive/1/442934/100/0/threaded', 'http://secunia.com/advisories/21466', 'http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure', 'http://secunia.com/advisories/21424', 'http://secunia.com/advisories/21749', 'http://securitytracker.com/id?1016673', 'http://www.kb.cert.org/vuls/id/699540', 'https://nvd.nist.gov/vuln/detail/CVE-2006-4112', 'http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml', 'http://www.novell.com/linux/security/advisories/2006_21_sr.html'}
null
GHSA
GHSA-qc9x-gjcv-465w
Pipenv's requirements.txt parsing allows malicious index url in comments
## Issue Summary Due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file (e.g. with "`pipenv install -r requirements.txt`") to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker can trigger arbitrary remote code execution (RCE) on the victims' systems. ### Impact The impact of successful exploitation is **severe/critical**. If an attacker is able to hide a malicious `--index-url` option in a requirements file that a victim installs with pipenv, the attacker can embed arbitrary malicious code in packages served from their malicious index server that will be executed on the victim's host during installation (remote code execution/RCE). Exploitation using this technique would be relatively simple to achieve for an attacker with basic knowledge of Python, as the attacker can simply build a source distribution for any of the packages specified in the requirements file, and embed arbitrary malicious code in the setup.py file. When pip installs from a source distribution, any code in the setup.py is executed by the install process. Basic attacks might use the initial RCE triggered when a victim installs the attacker's malicious package to steal credentials from the victim's host, leach the host's resources to mine cryptocurrency, or install exploit kits or other malware. More sophisticated attackers may use more advanced techniques to persist access to the victim's host, hide or remove evidence of their attack by deleting references to the malicious index server in the Pipfile and Pipfile.lock generated by pipenv or other potential indicators of compromise. Highly sophisticated attackers could attempt to pivot to additional targets from the initial compromised host, and might leverage any exposed credentials in the compromised host environment or implicit authorization granted to the host to gain privileged access to other systems or resources, such as source repositories or package registries. ### Likelihood The overall likelihood of exploitation is **low to moderate** depending on a range of factors. The primary hurdle to successful exploitation of this vulnerability depends on an attacker's ability to surreptitiously insert a specially crafted string into a requirements.txt file which will be installed by a victim (or victims). Unfortunately, because the attacker can insert this string into a comment, the attacker's ability to evade suspicion is greatly increased, and they may even be able to hide the initial payload in plain sight if a victim assumes that comments will be ignored by pipenv as expected. In many common usage contexts — for example in environments where a requirements file is used to lock or "freeze" dependency versions for reproducible builds — requirements files can often become quite large, particularly when leveraging pip's integrity checking, which requires every dependency specified in the requirements file to includes hashes for all of its distribution files. In such cases, a malicious actor might mask an exploitation attempt by opening a pull request ostensibly to update or "bump" the project's dependencies to their latest versions, but surreptitiously insert a malicious `—index-url` option amidst the many other changes associated with updating the dependencies in a lock file. As these dependency updates often result in hundreds or even thousands of changes spread across the requirements file and are not easy to review manually, such an attack could be difficult to identify or prevent without tools or other mitigating controls. Moreover, because the `argparse` module is used to parse the `--index-url`, `--extra-index-url`, and `--trusted-host` options, an attacker's ability to obfuscate their payload and hide their malicious intent is even more greatly enhanced, as the attacker may use abbreviated option names, which are supported by default with `argparse`. For example, an attacker can insert the string, "`--t pypi.org`" into a comment anywhere in the requirements file, which will automatically be expanded to "`--trusted-host pypi.org`" during processing by pipenv. This "`--trusted-host pypi.org`" option will disable SSL/TLS validation when pipenv attempts to connect to the default/official package index server (https://pypi.org/simple), and could allow a malicious index server to pose as the pipi.org index server in a man-in-the-middle attack. Setting up the malicious index server to serve compromised package versions is relatively simple, even for a non-sophisticated attacker. As `pip` uses a simple directory format for serving packages, the malicious packages simply need to be placed in the correct folder structure and served using an HTTP server with autoindex enabled (e.g. `python3 -m http.server`). Packaging up the exploit code into the malicious package versions would also be trivial for an attacker with basic knowledge of Python development, as the attacker can simply clone the source code for any of the packages specified in the requirements file, embed their malicious exploit code in the cloned package's setup.py file, and then build a source distribution of the package. When pip installs a package from a source distribution, any code in the setup.py is executed by the install process. ### Additional Context & Details According to the requirements file format specification (https://pip.pypa.io/en/stable/reference/requirements-file-format/#comments), any lines which begin with a "#" character, and/or any text in a line following a whitespace and a "#" character, should be interpreted as a comment which will be removed/ignored during processing of the requirements file. However, due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file (e.g. with "`pipenv install -r requirements.txt`") to download dependencies from a package index server controlled by the attacker. By embedding malicious code in packages served from their malicious index server, the attacker is then able to gain arbitrary remote code execution on the victims' systems. The vulnerable requirements file parsing code is in the parse_indexes(str: line) function of the pipenv.utils module: https://github.com/pypa/pipenv/blob/cdde3f7bcee6bacba89538f73aba9401337be10c/pipenv/utils.py#L2061-L2078 This function is called iteratively on each line of a requirements file, and uses the argparse module to find and process `--index-url`, `--extra-index-url`, and `--trusted-host` options (and variations thereof). However, it does not ignore these options when they appear in comments, or validate that these options appear on their own lines as required by the requirements file specification (see: https://pip.pypa.io/en/stable/reference/requirements-file-format/#global-options). The options can also be abbreviated due to default behavior provided by the `argparse.ArgumentParser` object used to parse these options in the requirements file, so that `--trusted-host` and `--t` will be treated as equivalent by pipenv, for example. ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/pypa/pipenv/](https://github.com/pypa/pipenv/) * Contact the pipenv maintainers: * [Dan Ryan](https://github.com/techalchemy) * [Tzu-ping Chung](https://github.com/uranusjr) * [Nate Prewitt](https://github.com/nateprewitt) * Contact the contributor who discovered the issue and authored this report: * [Chris Passarello](https://github.com/milo-minderbinder)
{'CVE-2022-21668'}
2022-03-30T16:44:16Z
2022-01-12T22:29:41Z
HIGH
8
{'CWE-20', 'CWE-77'}
{'https://github.com/pypa/pipenv/releases/tag/v2022.1.8', 'https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w', 'https://github.com/advisories/GHSA-qc9x-gjcv-465w', 'https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/56HBA3EOSLEDNCCBJVHE6DO34P56EOUM/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21668', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHQRIWKDP3SVJABAPEXBIQPKDI6UP7G4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KCROBYHUS6DKQPCXBRPCZ5CDBNQTYAWT/'}
null
GHSA
GHSA-c56f-grv3-gpfr
Regular expression denial of service in forms
The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation.
{'CVE-2021-23388'}
2021-06-07T22:10:13Z
2021-06-07T22:10:13Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-FORMS-1296389', 'https://github.com/caolan/forms/pull/214', 'https://github.com/advisories/GHSA-c56f-grv3-gpfr', 'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23388'}
null
GHSA
GHSA-7qw8-847f-pggm
Improper Locking in github.com/containers/storage
A deadlock vulnerability was found in 'github.com/containers/storage' in versions before 1.28.1. When a container image is processed, each layer is unpacked using `tar`. If one of those layers is not a valid `tar` archive this causes an error leading to an unexpected situation where the code indefinitely waits for the tar unpacked stream, which never finishes. An attacker could use this vulnerability to craft a malicious image, which when downloaded and stored by an application using containers/storage, would then cause a deadlock leading to a Denial of Service (DoS).
{'CVE-2021-20291'}
2021-05-25T21:58:26Z
2021-05-10T19:35:07Z
HIGH
6.5
{'CWE-667', 'CWE-400'}
{'https://github.com/advisories/GHSA-7qw8-847f-pggm', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNMB7O2UIXE34PGSCSOULGHPX5LIJBMM/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPYOHNG2Q7DCAQZMGYLMENLKALGDLG3X/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R5D7XL7FL24TWFMGQ3K2S72EOUSLZMKL/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WX24EITRXVHDM5M223BVTJA2ODF2FSHI/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1939485', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20291', 'https://github.com/containers/storage/commit/306fcabc964470e4b3b87a43a8f6b7d698209ee1', 'https://unit42.paloaltonetworks.com/cve-2021-20291/'}
null
GHSA
GHSA-58p8-9g59-q2hr
Potential DOS attack due to unrestricted attachment count in messages
Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property "attachment-max-count".
{'CVE-2019-12406'}
2021-06-17T19:59:48Z
2019-11-08T17:15:11Z
MODERATE
6.5
{'CWE-770'}
{'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rca465c9d1e1969281338522b76701c85a07abd045c494261137236e0@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rb2a6dab1f781f55326543c56dc29ea677759439ddfeba920c83037e6@%3Cissues.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-58p8-9g59-q2hr', 'https://lists.apache.org/thread.html/r92238967ba2783d3ab5a483f2e17f5fdaa8ace98990f69f9e8e15de0@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rabc395b38acb7f2465bfbf0bc16d6e1e95720c89bea87abe8808eeea@%3Cissues.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12406', 'https://www.oracle.com/security-alerts/cpujan2020.html'}
null
GHSA
GHSA-2pwf-xwr3-hp55
Moderate severity vulnerability that affects actionview
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
null
2021-12-02T23:15:02Z
2018-08-13T20:48:52Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-2pwf-xwr3-hp55', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2097'}
null
GHSA
GHSA-4hfc-fv33-ph9p
Malicious Package in sj-tw-abc
All versions of `sj-tw-abc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:15:38Z
2020-09-03T23:26:33Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-4hfc-fv33-ph9p', 'https://www.npmjs.com/advisories/1310'}
null
GHSA
GHSA-8fg4-j562-mjrc
Low severity vulnerability that affects apache-airflow
In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.
{'CVE-2017-15720'}
2021-09-07T17:25:40Z
2019-01-25T16:19:01Z
HIGH
8.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15720', 'https://github.com/advisories/GHSA-8fg4-j562-mjrc', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-hvmf-r92r-27hr
Django allows unintended model editing
Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)
{'CVE-2019-19118'}
2021-08-19T16:04:59Z
2019-12-04T21:26:28Z
MODERATE
6.5
{'CWE-276'}
{'https://security.gentoo.org/glsa/202004-17', 'https://github.com/advisories/GHSA-hvmf-r92r-27hr', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://security.netapp.com/advisory/ntap-20191217-0003/', 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118', 'http://www.openwall.com/lists/oss-security/2019/12/02/1', 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244', 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21', 'https://www.djangoproject.com/weblog/2019/dec/02/security-releases/'}
null
GHSA
GHSA-27xw-p8v6-9jjr
Moderate severity vulnerability that affects org.springframework.security:spring-security-core
Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.
{'CVE-2018-15801'}
2022-04-08T21:48:09Z
2018-12-20T22:01:31Z
HIGH
7.4
{'CWE-345'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-15801', 'https://pivotal.io/security/cve-2018-15801', 'https://github.com/advisories/GHSA-27xw-p8v6-9jjr'}
null
GHSA
GHSA-c7vg-w8q8-c3wf
Session Fixation
Shopware is an open source eCommerce platform. Potential session hijacking of store customers in versions below 6.3.5.2. We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2021-32710'}
2021-09-08T18:00:20Z
2021-09-08T18:00:20Z
MODERATE
5.9
{'CWE-384'}
{'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32710', 'https://github.com/advisories/GHSA-c7vg-w8q8-c3wf'}
null
GHSA
GHSA-5w74-jx7m-x6hv
XSS vulnerability in theme config file in Mautic
### Impact Mautic before v2.13.0 has stored XSS via a theme config file. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-8071'}
2021-01-19T21:16:17Z
2021-01-19T21:16:17Z
LOW
6.1
{'CWE-79'}
{'https://github.com/mautic/mautic/commit/3add236e9cc00ea9b211b52cccc4660379b2ee8b', 'https://github.com/advisories/GHSA-5w74-jx7m-x6hv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8071', 'https://github.com/mautic/mautic/security/advisories/GHSA-5w74-jx7m-x6hv', 'https://github.com/mautic/mautic/releases/tag/2.13.0'}
null
GHSA
GHSA-rggc-4g3r-j7ff
Remote Code Execution in Contao Managed Edition
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
{'CVE-2022-26265'}
2022-03-30T16:47:05Z
2022-03-20T00:00:30Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/advisories/GHSA-rggc-4g3r-j7ff', 'https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26265'}
null
GHSA
GHSA-ccmq-qvcp-5mrm
Critical severity vulnerability that affects owlmixin
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
{'CVE-2017-16618'}
2022-03-22T21:47:59Z
2018-07-13T16:01:12Z
CRITICAL
9.8
null
{'https://github.com/advisories/GHSA-ccmq-qvcp-5mrm', 'https://github.com/tadashi-aikawa/owlmixin/commit/5d0575303f6df869a515ced4285f24ba721e0d4e', 'https://joel-malwarebenchmark.github.io/blog/2017/11/08/cve-2017-16618-convert-through-owlmixin/', 'https://github.com/tadashi-aikawa/owlmixin/issues/12', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16618'}
null
GHSA
GHSA-v6fq-q792-j46j
Improper Input Validation in Apache Unomi
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
{'CVE-2020-11975'}
2022-02-09T23:20:47Z
2022-02-09T23:20:47Z
HIGH
9.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-v6fq-q792-j46j', 'http://unomi.apache.org/security/cve-2020-11975.txt', 'https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376281200a8e61c6d5ef5bb705e9a363460@%3Ccommits.unomi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11975', 'https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95@%3Ccommits.unomi.apache.org%3E'}
null
GHSA
GHSA-vhvh-528q-ff3p
Security feature bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated
A Security Feature Bypass vulnerability exists in ASP.NET when the number of incorrect login attempts is not validated, aka "ASP.NET Security Feature Bypass Vulnerability." This affects ASP.NET, ASP.NET Core 1.1, ASP.NET Core 1.0, ASP.NET Core 2.0, ASP.NET MVC 5.2.
{'CVE-2018-8171'}
2022-04-26T19:05:55Z
2018-10-16T19:56:50Z
HIGH
7.5
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8171', 'http://www.securityfocus.com/bid/104659', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8171', 'http://www.securitytracker.com/id/1041267', 'https://github.com/advisories/GHSA-vhvh-528q-ff3p'}
null
GHSA
GHSA-65q2-x652-xx84
Downloads Resources over HTTP in dalek-browser-ie
Affected versions of `dalek-browser-ie` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10605'}
2021-01-08T19:46:45Z
2019-02-18T23:50:04Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10605', 'https://www.npmjs.com/advisories/209', 'https://nodesecurity.io/advisories/209', 'https://github.com/advisories/GHSA-65q2-x652-xx84'}
null
GHSA
GHSA-h4x4-5qp2-wp46
Moderate severity vulnerability that affects com.fasterxml.jackson.datatype:jackson-datatype-jsr353
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
{'CVE-2018-1000873'}
2021-09-13T15:14:09Z
2018-12-21T17:46:54Z
MODERATE
6.5
{'CWE-20'}
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000873', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-modules-java8/pull/87', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-h4x4-5qp2-wp46', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=1665601', 'https://github.com/FasterXML/jackson-modules-java8/issues/90', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
GHSA
GHSA-jgrh-5m3h-9c5f
Web Cache Poisoning in find-my-way
This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack.
{'CVE-2020-7764'}
2020-11-10T20:19:43Z
2020-11-09T22:17:13Z
MODERATE
5.9
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7764', 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac', 'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269', 'https://github.com/advisories/GHSA-jgrh-5m3h-9c5f', 'https://www.npmjs.com/package/find-my-way'}
null
GHSA
GHSA-44gg-pmqr-4669
Access Restriction Bypass in Docker
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
{'CVE-2014-6408'}
2022-04-12T22:38:18Z
2022-02-15T01:57:18Z
MODERATE
0
{'CWE-285'}
{'https://lists.opensuse.org/opensuse-security-announce/2014-12/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6408', 'https://www.openwall.com/lists/oss-security/2014/11/24/5', 'https://docs.docker.com/v1.3/release-notes/', 'https://secunia.com/advisories/60171', 'https://secunia.com/advisories/60241', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6408', 'https://github.com/docker/docker/commit/c9379eb3fbbc484c056f5a5e49d8d0b755a29c45', 'https://github.com/advisories/GHSA-44gg-pmqr-4669', 'https://lists.fedoraproject.org/pipermail/package-announce/2014-December/145154.html'}
null
GHSA
GHSA-hrjm-c879-pp86
Side-channel timing attack in libsecp256k1
An issue was discovered in the libsecp256k1 crate before 0.3.1 for Rust. Scalar::check_overflow allows a timing side-channel attack; consequently, attackers can obtain sensitive information.
{'CVE-2019-25003'}
2021-08-25T20:46:46Z
2021-08-25T20:46:46Z
HIGH
7.5
{'CWE-208'}
{'https://github.com/paritytech/libsecp256k1/commit/11ba23a9766a5079918cd9f515bc100bc8164b50', 'https://github.com/advisories/GHSA-hrjm-c879-pp86', 'https://rustsec.org/advisories/RUSTSEC-2019-0027.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25003'}
null
GHSA
GHSA-m3f9-w3p3-p669
Heap buffer overflow in `QuantizedMul`
### Impact An attacker can cause a heap buffer overflow in `QuantizedMul` by passing in invalid thresholds for the quantization: ```python import tensorflow as tf x = tf.constant([256, 328], shape=[1, 2], dtype=tf.quint8) y = tf.constant([256, 328], shape=[1, 2], dtype=tf.quint8) min_x = tf.constant([], dtype=tf.float32) max_x = tf.constant([], dtype=tf.float32) min_y = tf.constant([], dtype=tf.float32) max_y = tf.constant([], dtype=tf.float32) tf.raw_ops.QuantizedMul(x=x, y=y, min_x=min_x, max_x=max_x, min_y=min_y, max_y=max_y) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/87cf4d3ea9949051e50ca3f071fc909538a51cd0/tensorflow/core/kernels/quantized_mul_op.cc#L287-L290) assumes that the 4 arguments are always valid scalars and tries to access the numeric value directly: ```cc const float min_x = context->input(2).flat<float>()(0); const float max_x = context->input(3).flat<float>()(0); const float min_y = context->input(4).flat<float>()(0); const float max_y = context->input(5).flat<float>()(0); ``` However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. ### Patches We have patched the issue in GitHub commit [efea03b38fb8d3b81762237dc85e579cc5fc6e87](https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29535'}
2021-05-21T14:22:28Z
2021-05-21T14:22:28Z
LOW
2.5
{'CWE-131', 'CWE-787'}
{'https://github.com/advisories/GHSA-m3f9-w3p3-p669', 'https://github.com/tensorflow/tensorflow/commit/efea03b38fb8d3b81762237dc85e579cc5fc6e87', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m3f9-w3p3-p669', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29535'}
null
GHSA
GHSA-jvfv-jhw9-jmpp
Malicious Package in b5ffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:22:22Z
2020-09-03T21:23:09Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1228', 'https://github.com/advisories/GHSA-jvfv-jhw9-jmpp'}
null
GHSA
GHSA-244r-fcj3-ghjq
Exposure of class information in RESTEasy
A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
{'CVE-2021-20289'}
2022-04-22T15:49:36Z
2021-04-07T21:51:33Z
MODERATE
5.3
{'CWE-209', 'CWE-668'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20210528-0008/', 'https://github.com/advisories/GHSA-244r-fcj3-ghjq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20289', 'https://bugzilla.redhat.com/show_bug.cgi?id=1935927', 'https://bugzilla.redhat.com/show_bug.cgi?id=1941544', 'https://issues.redhat.com/browse/RESTEASY-2843'}
null
GHSA
GHSA-9fj5-jg6f-qg5r
Use of Hard-coded Credentials in Apache Kylin
Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into kylin's configuration file, there is a risk that the password may be decrypted. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
{'CVE-2021-45458'}
2022-01-14T19:39:33Z
2022-01-08T00:43:09Z
MODERATE
0
{'CWE-798', 'CWE-326'}
{'https://github.com/apache/kylin/pull/1782', 'https://github.com/advisories/GHSA-9fj5-jg6f-qg5r', 'http://www.openwall.com/lists/oss-security/2022/01/06/7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45458', 'https://lists.apache.org/thread/oof215qz188k16vhlo97cm1jksxdowfy', 'https://github.com/apache/kylin/pull/1781', 'http://www.openwall.com/lists/oss-security/2022/01/06/3'}
null
GHSA
GHSA-84rm-qf37-fgc2
Integer Overflow in openssl-src
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
{'CVE-2021-23841'}
2022-05-05T00:15:24Z
2021-08-25T20:52:21Z
MODERATE
5.9
{'CWE-476', 'CWE-190'}
{'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://seclists.org/fulldisclosure/2021/May/70', 'https://www.tenable.com/security/tns-2021-03', 'https://rustsec.org/advisories/RUSTSEC-2021-0058', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://support.apple.com/kb/HT212534', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.openssl.org/news/secadv/20210216.txt', 'https://security.gentoo.org/glsa/202103-03', 'http://seclists.org/fulldisclosure/2021/May/68', 'https://security.netapp.com/advisory/ntap-20210513-0002/', 'http://seclists.org/fulldisclosure/2021/May/67', 'https://support.apple.com/kb/HT212528', 'https://www.tenable.com/security/tns-2021-09', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23841', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807', 'https://security.netapp.com/advisory/ntap-20210219-0009/', 'https://support.apple.com/kb/HT212529', 'https://www.debian.org/security/2021/dsa-4855', 'https://github.com/advisories/GHSA-84rm-qf37-fgc2', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-6hrm-jqp3-64cv
Improper Certificate Validation in TweetStream
TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.
{'CVE-2020-24393'}
2021-04-13T15:42:36Z
2021-04-13T15:42:36Z
MODERATE
5.9
{'CWE-295'}
{'https://github.com/advisories/GHSA-6hrm-jqp3-64cv', 'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream', 'https://github.com/tweetstream/tweetstream', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}
null
GHSA
GHSA-8j36-q8x7-pm6q
OS Command Injection in systeminformation
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
{'CVE-2020-7778'}
2022-02-09T23:14:11Z
2022-02-09T23:14:11Z
HIGH
7.3
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753', 'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7778', 'https://github.com/advisories/GHSA-8j36-q8x7-pm6q', 'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://gist.github.com/EffectRenan/b434438938eed0b21b376cedf5c81e80'}
null
GHSA
GHSA-p699-3wgc-7h72
Moderate severity vulnerability that affects org.apache.tika:tika-core
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's ChmParser in versions of Apache Tika before 1.18.
{'CVE-2018-1339'}
2021-09-15T21:42:37Z
2018-10-17T15:43:59Z
MODERATE
5.5
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1339', 'https://github.com/advisories/GHSA-p699-3wgc-7h72', 'https://lists.apache.org/thread.html/4d2cb5c819401bb075e2a1130e0d14f0404a136541a6f91da0225828@%3Cdev.tika.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2669'}
null
GHSA
GHSA-rjh8-p66p-jrh5
Data races in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via an Auxdata API data race.
{'CVE-2020-35871'}
2021-08-25T20:46:59Z
2021-08-25T20:46:59Z
HIGH
8.1
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35871', 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://github.com/advisories/GHSA-rjh8-p66p-jrh5', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/rusqlite/rusqlite/commit/2ef3628dac35aeba0a97d5fb3a57746b4e1d62b3'}
null
GHSA
GHSA-qppg-v75c-r5ff
S3Scanner before 2.0.2 allows Directory Traversal
S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element.
{'CVE-2021-32061'}
2021-11-30T22:21:36Z
2021-11-30T22:21:36Z
MODERATE
5.3
{'CWE-22'}
{'https://vuln.ryotak.me/advisories/62', 'https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2', 'https://github.com/sa7mon/S3Scanner/issues/122', 'https://github.com/advisories/GHSA-qppg-v75c-r5ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32061'}
null
GHSA
GHSA-m956-frf4-m2wr
Ansible is vulnerable to an improper input validation in Ansible's handling of data sent from client systems
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
{'CVE-2016-9587'}
2022-04-26T18:42:56Z
2018-10-10T17:22:53Z
HIGH
8.1
{'CWE-20'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587', 'https://www.exploit-db.com/exploits/41013/', 'https://access.redhat.com/errata/RHSA-2017:0515', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9587', 'http://rhn.redhat.com/errata/RHSA-2017-0195.html', 'https://access.redhat.com/errata/RHSA-2017:0448', 'https://github.com/advisories/GHSA-m956-frf4-m2wr', 'https://access.redhat.com/errata/RHSA-2017:1685', 'http://rhn.redhat.com/errata/RHSA-2017-0260.html', 'http://www.securityfocus.com/bid/95352', 'https://security.gentoo.org/glsa/201701-77'}
null
GHSA
GHSA-x6wp-rfwh-hcx7
Regular Expression Denial of Service in content
Affected versions of `content` are vulnerable to a regular expression denial of service when parsing malicious `Content-Type` and `Content-Disposition` headers. ## Recommendation Update to version 3.0.6 or later.
{'CVE-2017-16111'}
2021-01-08T00:19:21Z
2018-07-24T19:55:05Z
HIGH
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/530', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16111', 'https://nodesecurity.io/advisories/530', 'https://github.com/advisories/GHSA-x6wp-rfwh-hcx7'}
null
GHSA
GHSA-39pj-gq8q-9pfj
Authentication Weakness in keystone
Versions of `keystone` prior to 0.3.16 are affected by a partial authentication bypass vulnerability. In the default sign in functionality, if an attacker provides a full and correct password, yet only provides part of the associated email address, authentication will be granted. ## Recommendation Update to version 0.3.16 or later.
{'CVE-2015-9240'}
2021-08-31T20:54:56Z
2018-06-07T19:43:20Z
HIGH
7.5
{'CWE-1255'}
{'https://www.npmjs.com/package/keystone', 'https://nodesecurity.io/advisories/60', 'https://www.npmjs.com/advisories/60', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9240', 'https://github.com/advisories/GHSA-39pj-gq8q-9pfj'}
null
GHSA
GHSA-fjq3-5pxw-4wj4
Cross-Site Request Forgery in Webargs
flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.
{'CVE-2020-7965'}
2021-04-07T21:06:30Z
2021-04-07T21:06:30Z
MODERATE
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7965', 'https://github.com/advisories/GHSA-fjq3-5pxw-4wj4', 'https://webargs.readthedocs.io/en/latest/changelog.html'}
null
GHSA
GHSA-9mrq-cjgh-32g2
Low severity vulnerability that affects smartbanner.js
## rel noopener vulnerability ### Impact Clicking on smartbanner _View_ link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile 3rd parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. ### Patches `rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. ### Workarounds If you can not upgrade to `v1.14.1`: 1. Ensure _View_ link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams 2. If _View_ link is going to a 3rd party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links. Following combination of smartbanner meta tags can be used to achieve the above: ```html <meta name="smartbanner:enabled-platforms" content="none"> <meta name="smartbanner:include-user-agent-regex" content="Mobile.*Safari"> ``` ### References * [About rel=noopener](https://mathiasbynens.github.io/rel-noopener/) * [Safari 12.1 Release Notes](https://developer.apple.com/documentation/safari_release_notes/safari_12_1_release_notes#3130296) ### For more information If you have any questions or comments about this advisory: * Open an issue in [smartbanner.js](https://github.com/ain/smartbanner.js/issues/new)
null
2021-12-03T14:38:19Z
2019-09-13T13:22:33Z
LOW
0
null
{'https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2', 'https://github.com/advisories/GHSA-9mrq-cjgh-32g2'}
null
GHSA
GHSA-484f-743f-6jx2
Object injection in cookie driver in phpfastcache
## Object injection in cookie driver ### Impact An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases). ### Patches The issue has been addressed by enforcing JSON conversion when deserializing ### Workarounds If you can't fix it, use another driver such as "Files" (Filesystem) ### References Fixing release: https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues) * Email us at [security@geolim4.com](mailto:security@geolim4.com)
{'CVE-2019-16774'}
2021-01-08T21:28:17Z
2019-12-12T22:50:20Z
HIGH
4.4
{'CWE-94'}
{'https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13', 'https://github.com/advisories/GHSA-484f-743f-6jx2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}
null
GHSA
GHSA-fxjm-wvj9-9c39
Information disclosure in Apache Superset
An information disclosure issue was found in Apache Superset 0.34.0, 0.34.1, 0.35.0, and 0.35.1. Authenticated Apache Superset users are able to retrieve other users' information, including hashed passwords, by accessing an unused and undocumented API endpoint on Apache Superset.
{'CVE-2020-1932'}
2021-07-28T18:07:36Z
2020-02-26T19:54:57Z
MODERATE
6.5
{'CWE-200'}
{'https://lists.apache.org/thread.html/r4e5323c3bc786005495311a6ff53ac6d990b2c7eb52941a1a13ce227%40%3Cdev.superset.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1932', 'https://github.com/advisories/GHSA-fxjm-wvj9-9c39'}
null
GHSA
GHSA-jfvf-rfmq-qwf8
Croos-site scripting in Croogo
Croogo before 3.0.7 allows XSS via the title to admin/menus/menus or admin/taxonomy/vocabularies.
{'CVE-2019-20789'}
2021-06-22T15:23:21Z
2021-06-22T15:23:21Z
LOW
4.8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20789', 'https://github.com/croogo/croogo/issues/940', 'https://github.com/advisories/GHSA-jfvf-rfmq-qwf8', 'https://github.com/croogo/croogo/compare/3.0.6...3.0.7'}
null
GHSA
GHSA-jx6h-3fjx-cgv5
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
{'CVE-2018-1305'}
2021-09-14T19:53:27Z
2018-10-17T16:31:48Z
MODERATE
6.5
null
{'https://access.redhat.com/errata/RHSA-2018:0466', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20180706-0001/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html', 'https://www.debian.org/security/2018/dsa-4281', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1305', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-jx6h-3fjx-cgv5', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0465', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/103144', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'http://www.securitytracker.com/id/1040428', 'https://lists.apache.org/thread.html/d3354bb0a4eda4acc0a66f3eb24a213fdb75d12c7d16060b23e65781@%3Cannounce.tomcat.apache.org%3E', 'https://usn.ubuntu.com/3665-1/'}
null
GHSA
GHSA-jchg-g94r-64qg
Malicious Package in mogobd
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:20:04Z
2020-09-03T19:50:10Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-jchg-g94r-64qg', 'https://www.npmjs.com/advisories/1132'}
null
GHSA
GHSA-4wcx-c9c4-89p2
Malicious Package in react-datepicker-plus
Versions 2.4.3 and 2.4.2 of `react-datepicker-plus` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:08:43Z
2020-09-11T21:23:30Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/946', 'https://github.com/advisories/GHSA-4wcx-c9c4-89p2'}
null
GHSA
GHSA-9cx9-x2gp-9qvh
CRLF vulnerability in Fiber
### Impact The filename that is given in [c.Attachment()](https://docs.gofiber.io/ctx#attachment) is not escaped, and therefore vulnerable for a CRLF injection attack. I.e. an attacker could upload a custom filename and then give the link to the victim. With this filename, the attacker can change the name of the downloaded file, redirect to another site, change the authorization header, etc. ### Steps to reproduce ```go package main import "github.com/gofiber/fiber" const badFileName = "another secret document.pdf\"\r\nLocation: google.com\r\nAuthorization: \"example_of_session_fixation" func splitTheResponse(c *fiber.Ctx) { c.Attachment(badFileName) } func main() { app := fiber.New() app.Get("/attack", splitTheResponse) app.Listen("127.0.0.1:8080") } ``` ``` HTTP/1.1 200 OK Date: Fri, 10 Jul 2020 19:47:04 GMT Content-Type: application/octet-stream Content-Length: 0 Content-Disposition: attachment; filename="another secret document.pdf" Location: google.com Authorization: "example_of_session_fixation" ``` ### Patches This issue has been patched in `v1.12.6` with commit [579](https://github.com/gofiber/fiber/pull/579/commits/f698b5d5066cfe594102ae252cd58a1fe57cf56f) escaping the filename by default. ### Workarounds You could of course serialize the input yourself before passing it to `ctx.Attachment()`, this is actually a good practice by default. But in case you forget, we got you covered 👍 ### References A CRLF injection attack is one of several types of injection attacks. It can be used to escalate to more malicious attacks such as Cross-site Scripting (XSS), page injection, web cache poisoning, cache-based defacement, and more. A CRLF injection vulnerability exists if an attacker can inject the CRLF characters into a web application, for example using a user input form or an HTTP request, [see acunetix](https://www.acunetix.com/websitesecurity/crlf-injection/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [gofiber/fiber](https://github.com/gofiber/fiber) * Join us on [Discord](https://gofiber.io/discord)
{'CVE-2020-15111'}
2022-04-19T19:02:30Z
2021-06-29T21:24:28Z
MODERATE
4.2
{'CWE-93', 'CWE-74'}
{'https://github.com/gofiber/fiber/pull/579/commits/f698b5d5066cfe594102ae252cd58a1fe57cf56f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15111', 'https://github.com/gofiber/fiber/security/advisories/GHSA-9cx9-x2gp-9qvh', 'https://github.com/advisories/GHSA-9cx9-x2gp-9qvh'}
null
GHSA
GHSA-vjcj-5g2r-vxqc
Moderate severity vulnerability that affects editor.md
Pandao Editor.md 1.5.0 allows XSS via crafted attributes of an invalid IMG element.
{'CVE-2018-16330'}
2021-09-20T22:06:18Z
2018-09-06T03:22:00Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16330', 'https://github.com/pandao/editor.md/issues/612', 'https://github.com/advisories/GHSA-vjcj-5g2r-vxqc'}
null
GHSA
GHSA-h582-2pch-3xv3
High severity vulnerability that affects django
The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
{'CVE-2015-5143'}
2021-09-13T16:09:05Z
2019-07-05T21:10:39Z
HIGH
0
null
{'http://www.securitytracker.com/id/1032820', 'https://github.com/advisories/GHSA-h582-2pch-3xv3', 'http://www.ubuntu.com/usn/USN-2671-1', 'https://security.gentoo.org/glsa/201510-06', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html', 'http://rhn.redhat.com/errata/RHSA-2015-1678.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5143', 'http://www.debian.org/security/2015/dsa-3305', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html', 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html', 'http://www.securityfocus.com/bid/75666', 'http://rhn.redhat.com/errata/RHSA-2015-1686.html', 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html', 'https://www.djangoproject.com/weblog/2015/jul/08/security-releases/'}
null
GHSA
GHSA-9pcf-h8q9-63f6
Sandbox Breakout / Arbitrary Code Execution in safe-eval
All versions of `safe-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload chaining a function's callee and caller constructors can escape the sandbox and execute arbitrary code. For example, the payload ``` ((() => { const targetKey = Object.keys(this)[0]; Object.defineProperty(this, targetKey, { get: function() { return arguments.callee.caller.constructor( "return global.process.mainModule.require('child_process').execSync('pwd').toString()" )(); } }); })();``` may be used to print the `pwd` to the console. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-03T17:12:41Z
2020-09-03T17:12:41Z
HIGH
0
null
{'https://github.com/advisories/GHSA-9pcf-h8q9-63f6', 'https://www.npmjs.com/advisories/1033'}
null
GHSA
GHSA-7phj-gmgx-2r66
Moderate severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish. activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
null
2021-12-03T14:24:44Z
2018-09-17T21:58:09Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7577', 'https://github.com/advisories/GHSA-7phj-gmgx-2r66'}
null
GHSA
GHSA-xq58-69h2-765m
Cross Site Request Forgery in mailman
In GNU Mailman before 2.1.38, a list member or moderator can get a CSRF token and craft an admin request (using that token) to set a new admin password or make other changes.
{'CVE-2021-44227'}
2021-12-16T15:27:06Z
2021-12-16T15:27:06Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44227', 'https://github.com/advisories/GHSA-xq58-69h2-765m', 'https://bugs.launchpad.net/mailman/+bug/1952384'}
null
GHSA
GHSA-qr7j-h6gg-jmgc
Deserialization of Untrusted Data in jackson-databind
An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.
{'CVE-2018-11307'}
2021-04-27T16:01:46Z
2019-07-16T17:42:21Z
CRITICAL
9.8
{'CWE-502'}
{'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-qr7j-h6gg-jmgc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11307', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2032', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1822'}
null
GHSA
GHSA-8hqw-qp6r-vqcm
Malicious Package in bitcoin-sweep
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:42:45Z
2020-09-04T16:40:00Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1366', 'https://github.com/advisories/GHSA-8hqw-qp6r-vqcm'}
null
GHSA
GHSA-hvxq-j2r4-4jm8
Regular Expression Denial of Service in sql-injection
All versions of `sql-injection` are vulnerable to Regular Expression Denial of Service. The package processes a request's body with regular expressions that may take exponentially longer to execute for large inputs. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-09-03T20:31:04Z
2020-09-03T20:31:04Z
HIGH
0
null
{'https://www.npmjs.com/advisories/1163', 'https://github.com/advisories/GHSA-hvxq-j2r4-4jm8'}
null
GHSA
GHSA-879r-7f3w-8jj3
Moderate severity vulnerability that affects Plone and Zope2
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.
{'CVE-2012-5489'}
2021-09-07T14:31:58Z
2018-07-23T19:52:06Z
MODERATE
0
null
{'https://bugs.launchpad.net/zope2/+bug/1079238', 'https://github.com/advisories/GHSA-879r-7f3w-8jj3', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://plone.org/products/plone/security/advisories/20121106/05', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5489'}
null
GHSA
GHSA-rhq2-2574-78mc
Unzip function in ZipUtil.java in Hutool allows remote attackers to overwrite arbitrary files via directory traversal
The unzip function in ZipUtil.java in Hutool before 4.1.12 allows remote attackers to overwrite arbitrary files via directory traversal sequences in a filename within a ZIP archive.
{'CVE-2018-17297'}
2022-04-27T14:42:54Z
2018-10-17T19:54:53Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/looly/hutool/issues/162', 'https://github.com/advisories/GHSA-rhq2-2574-78mc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17297'}
null
GHSA
GHSA-95jp-77w6-qj52
Cross-site Scripting in python-cjson
Python-cjson 1.0.5 does not properly handle a ['/'] argument to cjson.encode, which makes it easier for remote attackers to conduct certain cross-site scripting (XSS) attacks involving Firefox and the end tag of a SCRIPT element.
{'CVE-2009-4924'}
2021-12-06T18:19:27Z
2021-12-06T18:17:45Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2009-4924', 'http://t3.dotgnu.info/blog/insecurity/quotes-dont-help.html', 'https://github.com/advisories/GHSA-95jp-77w6-qj52', 'http://pypi.python.org/pypi/python-cjson/', 'https://github.com/pypa/advisory-db/tree/main/vulns/python-cjson/PYSEC-2010-26.yaml'}
null
GHSA
GHSA-j3rh-8vwq-wh84
Use of Cryptographically Weak Pseudo-Random Number Generator in JHipster Kotlin
JHipster Kotlin is using an insecure source of randomness to generate all of it's random values. JHipster Kotlin relies upon apache commons lang3 `RandomStringUtils`. From the documentation: > Caveat: Instances of Random, upon which the implementation of this class relies, are not cryptographically secure. > \- https://commons.apache.org/proper/commons-lang/javadocs/api-3.9/org/apache/commons/lang3/RandomStringUtils.html Here are the examples of JHipster Kotlin'ss use of an insecure PRNG: https://github.com/jhipster/jhipster-kotlin/blob/193ae8f13c0be686f9687e78bacfedb144c47d8c/generators/server/templates/src/main/kotlin/package/service/util/RandomUtil.kt.ejs#L32 ## Proof Of Concepts Already Exist There has been a POC of taking one RNG value generated `RandomStringUtils` and reversing it to generate all of the past/future RNG values public since March 3rd, 2018. https://medium.com/@alex91ar/the-java-soothsayer-a-practical-application-for-insecure-randomness-c67b0cd148cd POC Repository: https://github.com/alex91ar/randomstringutils ## Potential Impact Technical All that is required is to get one password reset token from a JHipster Kotlin generated service and using the POC above, you can reverse what all future password reset tokens to be generated by this server. This allows an attacker to pick and choose what account they would like to takeover by sending account password reset requests for targeted accounts. ## Potential Impact Scale Not as large as for the original jhipster project as the kotlin blueprint is not that widely used. ### Patches Update your generated applications to > 1.2.0 ### Workarounds Change the content of `RandomUtil.kt` like this: ```kotlin import java.security.SecureRandom import org.apache.commons.lang3.RandomStringUtils private const val DEF_COUNT = 20 object RandomUtil { private val secureRandom: SecureRandom = SecureRandom() init { secureRandom.nextBytes(byteArrayOf(64.toByte())) } private fun generateRandomAlphanumericString(): String { return RandomStringUtils.random(DEF_COUNT, 0, 0, true, true, null, secureRandom) } /** * Generate a password. * * @return the generated password. */ fun generatePassword(): String = generateRandomAlphanumericString() } ``` Important is to exchange **every** call of `RandomStringUtils.randomAlphaNumeric`. ### For more information If you have any questions or comments about this advisory: * Open an issue in [JHipster Kotlin](https://github.com/jhipster/jhipster-kotlin)
{'CVE-2019-16303'}
2022-04-19T19:02:30Z
2020-06-26T16:48:13Z
CRITICAL
9.8
{'CWE-338'}
{'https://github.com/jhipster/jhipster-kotlin/issues/183', 'https://lists.apache.org/thread.html/rc87fa35a48b5d70b06af6fb81785ed82e82686eb83307aae6d250dc9@%3Cissues.commons.apache.org%3E', 'https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html', 'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-j3rh-8vwq-wh84', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16303', 'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7', 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-466980', 'https://www.npmjs.com/advisories/1187', 'https://github.com/jhipster/generator-jhipster/issues/10401', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://github.com/advisories/GHSA-j3rh-8vwq-wh84', 'https://lists.apache.org/thread.html/rc3f00f5d3d2ec0e2381a3b9096d5f5b4d46ec1587ee7e251a3dbb897@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r6d243e7e3f25daeb242dacf3def411fba32a9388d3ff84918cb28ddd@%3Cissues.commons.apache.org%3E', 'https://www.npmjs.com/advisories/1188'}
null
GHSA
GHSA-wvjw-p9f5-vq28
Segfault in `tf.raw_ops.SparseCountSparseOutput`
### Impact Passing invalid arguments (e.g., discovered via fuzzing) to `tf.raw_ops.SparseCountSparseOutput` results in segfault. ### Patches We have patched the issue in GitHub commit [82e6203221865de4008445b13c69b6826d2b28d9](https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-29619'}
2021-05-21T14:29:02Z
2021-05-21T14:29:02Z
LOW
2.5
{'CWE-755'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wvjw-p9f5-vq28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29619', 'https://github.com/tensorflow/tensorflow/commit/82e6203221865de4008445b13c69b6826d2b28d9', 'https://github.com/advisories/GHSA-wvjw-p9f5-vq28'}
null
GHSA
GHSA-pjpj-f6r8-56rm
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783.
{'CVE-2019-0609'}
2021-09-16T18:14:39Z
2019-04-09T19:43:59Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-pjpj-f6r8-56rm', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0609', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0609'}
null
GHSA
GHSA-ggmv-6q9p-9gm6
Cross-site Scripting in django-unicorn
The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.
{'CVE-2021-42134'}
2021-10-19T14:51:12Z
2021-10-12T17:51:04Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1', 'https://github.com/advisories/GHSA-ggmv-6q9p-9gm6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42134', 'https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6'}
null
GHSA
GHSA-j88m-953w-8r2c
Moderate severity vulnerability that affects rendertron
Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.
{'CVE-2017-18352'}
2021-09-14T19:19:43Z
2019-01-07T19:14:21Z
MODERATE
6.1
{'CWE-79'}
{'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352', 'https://github.com/advisories/GHSA-j88m-953w-8r2c', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
null
GHSA
GHSA-cg3h-rc9q-g8v9
Cross-site Scripting in pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0509'}
2022-02-14T22:35:25Z
2022-02-09T00:00:30Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0509', 'https://github.com/pimcore/pimcore/commit/6ccb5c12fc1be065ebce9c89c4677ee939b88597', 'https://huntr.dev/bounties/26cdf86c-8edc-4af6-8411-d569699ecd1b', 'https://github.com/advisories/GHSA-cg3h-rc9q-g8v9'}
null
GHSA
GHSA-2575-pghm-6qqx
Incorrect Permission Assignment for Critical Resource and Use of Cache Containing Sensitive Information in Kubernetes
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by --cache-dir (defaulting to $HOME/.kube/http-cache), written with world-writeable permissions (rw-rw-rw-). If --cache-dir is specified and pointed at a different location accessible to other users/groups, the written files may be modified by other users/groups and disrupt the kubectl invocation.
{'CVE-2019-11244'}
2022-04-12T22:00:59Z
2022-02-15T01:57:18Z
MODERATE
2.8
{'CWE-524', 'CWE-732'}
{'http://www.securityfocus.com/bid/108064', 'https://github.com/kubernetes/kubernetes/pull/77874/commits/f228ae3364729caed59087e23c42868454bc3ff4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11244', 'https://access.redhat.com/errata/RHSA-2020:0020', 'https://github.com/kubernetes/client-go/commit/790a4f63632139cf6731014d00a9a8338f1fbd7d', 'https://security.netapp.com/advisory/ntap-20190509-0002/', 'https://access.redhat.com/errata/RHSA-2019:3942', 'https://github.com/advisories/GHSA-2575-pghm-6qqx', 'https://github.com/kubernetes/kubernetes/pull/77874', 'https://access.redhat.com/errata/RHSA-2020:0074', 'https://github.com/kubernetes/kubernetes/issues/76676'}
null
GHSA
GHSA-gmch-cm2p-9qw9
Cross-site Scripting in lightning-server
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
{'CVE-2020-7747'}
2021-05-10T18:39:15Z
2021-05-10T18:39:15Z
MODERATE
6.3
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-LIGHTNINGSERVER-1019381', 'https://github.com/lightning-viz/lightning/blob/master/app/controllers/session.js%23L230', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7747', 'https://github.com/advisories/GHSA-gmch-cm2p-9qw9'}
null
GHSA
GHSA-h436-432x-8fvx
High severity vulnerability that affects org.apache.commons:commons-compress
A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.
{'CVE-2018-1324'}
2022-02-08T22:08:36Z
2019-03-14T15:41:12Z
MODERATE
5.5
{'CWE-835'}
{'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://www.securityfocus.com/bid/103490', 'https://github.com/advisories/GHSA-h436-432x-8fvx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1324', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r5532dc8d5456b5151e8c286801e2e5769f5c04118b29c3b5d13ea387@%3Cissues.beam.apache.org%3E', 'https://lists.apache.org/thread.html/1c7b6df6d1c5c8583518a0afa017782924918e4d6acfaf23ed5b2089@%3Cdev.commons.apache.org%3E', 'http://www.securitytracker.com/id/1040549', 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E'}
null
GHSA
GHSA-h466-j336-74wx
Prototype Pollution in mpath
Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation Update to version `0.5.1` or later.
{'CVE-2018-16490'}
2021-01-08T18:44:33Z
2019-02-07T18:17:26Z
MODERATE
0
{'CWE-400'}
{'https://hackerone.com/reports/390860', 'https://www.npmjs.com/advisories/779', 'https://github.com/advisories/GHSA-h466-j336-74wx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}
null
GHSA
GHSA-x489-jjwm-52g7
Tinfoil Devise-two-factor does not "burn" a successfully validated one-time password (OTP)
Tinfoil Devise-two-factor before 2.0.0 does not strictly follow section 5.2 of RFC 6238 and does not "burn" a successfully validated one-time password (aka OTP), which allows remote or physically proximate attackers with a target user's login credentials to log in as said user by obtaining the OTP through performing a man-in-the-middle attack between the provider and verifier, or shoulder surfing, and replaying the OTP in the current time-step.
{'CVE-2015-7225'}
2022-04-26T18:26:36Z
2018-08-28T22:34:15Z
MODERATE
5.3
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7225', 'https://github.com/tinfoil/devise-two-factor/issues/45#issuecomment-139335608', 'http://www.securityfocus.com/bid/76789', 'https://github.com/tinfoil/devise-two-factor/blob/master/UPGRADING.md', 'http://www.openwall.com/lists/oss-security/2015/06/20/4', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798466', 'https://github.com/advisories/GHSA-x489-jjwm-52g7', 'http://www.openwall.com/lists/oss-security/2015/09/17/2'}
null
GHSA
GHSA-c7gp-2pch-qh2v
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread.
{'CVE-2017-12604'}
2021-11-18T15:33:03Z
2021-10-12T22:01:55Z
HIGH
8.8
{'CWE-787'}
{'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12604', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md', 'https://github.com/advisories/GHSA-c7gp-2pch-qh2v'}
null
GHSA
GHSA-544j-77x9-h938
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
null
2021-12-03T14:12:21Z
2018-09-17T21:53:30Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7581', 'https://github.com/advisories/GHSA-544j-77x9-h938'}
null
GHSA
GHSA-6r7x-hc8m-985r
Cross-site Scripting in Joplin
Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS).
{'CVE-2020-9038'}
2022-01-04T19:44:56Z
2020-10-13T17:29:25Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc', 'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038', 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20', 'https://github.com/advisories/GHSA-6r7x-hc8m-985r'}
null
GHSA
GHSA-2367-c296-3mp2
Link following in tar
An issue was discovered in the tar crate before 0.4.16 for Rust. Arbitrary file overwrite can occur via a symlink or hardlink in a TAR archive.
{'CVE-2018-20990'}
2021-08-25T20:43:54Z
2021-08-25T20:43:54Z
HIGH
7.5
{'CWE-59'}
{'https://rustsec.org/advisories/RUSTSEC-2018-0002.html', 'https://github.com/advisories/GHSA-2367-c296-3mp2', 'https://github.com/alexcrichton/tar-rs/pull/156', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20990'}
null
GHSA
GHSA-6566-9526-52v6
Exposure of Sensitive Information to an Unauthorized Actor in Concord
An issue was discovered in Walmart Labs Concord before 1.44.0. CORS Access-Control-Allow-Origin headers have a potentially unsafe dependency on Origin headers, and are not configurable. This allows remote attackers to discover host information, nodes, API metadata, and references to usernames via api/v1/apikey.
{'CVE-2020-10591'}
2022-02-10T20:48:59Z
2022-02-10T20:48:47Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/walmartlabs/concord/issues/22', 'https://github.com/walmartlabs/concord/compare/1.43.0...1.44.0', 'https://github.com/advisories/GHSA-6566-9526-52v6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10591'}
null
GHSA
GHSA-p2cq-cprg-frvm
Out of bounds write in tensorflow-lite
### Impact In TensorFlow Lite models using segment sum can trigger a write out bounds / segmentation fault if the segment ids are not sorted. Code assumes that the segment ids are in increasing order, using the last element of the tensor holding them to determine the dimensionality of output tensor: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/segment_sum.cc#L39-L44 This results in allocating insufficient memory for the output tensor and in a write outside the bounds of the output array: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631 This usually results in a segmentation fault, but depending on runtime conditions it can provide for a write gadget to be used in future memory corruption-based exploits. ### Patches We have patched the issue in 204945b and will release patch releases for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1. ### Workarounds A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are sorted, although this only handles the case when the segment ids are stored statically in the model. A similar validation could be done if the segment ids are generated at runtime between inference steps. If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15214'}
2021-08-26T15:20:07Z
2020-09-25T18:28:56Z
HIGH
8.1
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15214', 'https://github.com/advisories/GHSA-p2cq-cprg-frvm', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}
null
GHSA
GHSA-92qm-hc53-jjrj
Downloads Resources over HTTP in ibapi
Affected versions of `ibapi` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `ibapi`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10593'}
2021-09-16T20:44:03Z
2019-02-18T23:34:17Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://github.com/advisories/GHSA-92qm-hc53-jjrj', 'https://www.npmjs.com/package/ibapi/v/2.5.6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10593', 'https://www.npmjs.com/advisories/182', 'https://gitlord.com/summary/~dchem%2Fnode-ibapi-addon.git', 'https://nodesecurity.io/advisories/182', 'https://gitlord.com/commitdiff/~dchem%2Fnode-ibapi-addon.git/c00dd7c98cca0423052148337e523eeb7776da68'}
null