ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-hqm2-gwqf-r5g5
SQL injection in TYPO3 extension
It has been discovered that the extension is susceptible to SQL Injection when processing bounced emails.
{'CVE-2021-38302'}
2021-09-02T17:17:06Z
2021-09-02T17:17:06Z
CRITICAL
3.9
{'CWE-89'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-014', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38302', 'https://github.com/advisories/GHSA-hqm2-gwqf-r5g5'}
null
GHSA
GHSA-p44j-xrqg-4xrr
URL Redirection to Untrusted Site ('Open Redirect') in Products.PluggableAuthService
### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability - a maliciously crafted link to the login form and login functionality could redirect the browser to a different website. ### Patches _Has the problem been patched? What versions should users upgrade to?_ The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install "Products.PluggableAuthService>=2.6.1"` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ There is no workaround. Users are encouraged to upgrade. ### References _Are there any links users can visit to find out more?_ - [GHSA-p44j-xrqg-4xrr](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr) - [Products.PluggableAuthService on PyPI](https://pypi.org/project/Products.PluggableAuthService/) - [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues) * Email us at [security@plone.org](mailto:security@plone.org)
{'CVE-2021-21337'}
2022-04-19T19:02:49Z
2021-03-08T21:06:23Z
LOW
0
{'CWE-601'}
{'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr', 'https://github.com/advisories/GHSA-p44j-xrqg-4xrr', 'https://pypi.org/project/Products.PluggableAuthService/', 'http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21337', 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'}
null
GHSA
GHSA-wcg3-cvx6-7396
Segmentation fault in time
### Impact Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library. The affected functions from time 0.2.7 through 0.2.22 are: - `time::UtcOffset::local_offset_at` - `time::UtcOffset::try_local_offset_at` - `time::UtcOffset::current_local_offset` - `time::UtcOffset::try_current_local_offset` - `time::OffsetDateTime::now_local` - `time::OffsetDateTime::try_now_local` The affected functions in time 0.1 (all versions) are: - `at` - `at_utc` - `now` Non-Unix targets (including Windows and wasm) are unaffected. ### Patches Pending a proper fix, the internal method that determines the local offset has been modified to always return `None` on the affected operating systems. This has the effect of returning an `Err` on the `try_*` methods and `UTC` on the non-`try_*` methods. Users and library authors with time in their dependency tree should perform `cargo update`, which will pull in the updated, unaffected code. Users of time 0.1 do not have a patch and should upgrade to an unaffected version: time 0.2.23 or greater or the 0.3. series. ### Workarounds No workarounds are known. ### References time-rs/time#293
{'CVE-2020-26235'}
2022-04-19T19:02:40Z
2021-08-25T20:56:46Z
MODERATE
6.2
{'CWE-476'}
{'https://github.com/time-rs/time/security/advisories/GHSA-wcg3-cvx6-7396', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26235', 'https://rustsec.org/advisories/RUSTSEC-2020-0071.html', 'https://github.com/advisories/GHSA-wcg3-cvx6-7396', 'https://github.com/time-rs/time/issues/293'}
null
GHSA
GHSA-77cr-6gr8-7rr9
Use After Free in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6
{'CVE-2020-27195'}
2022-04-12T22:55:43Z
2022-02-15T01:57:18Z
CRITICAL
7.1
{'CWE-416'}
{'https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0126-october-21-2020', 'https://github.com/hashicorp/nomad/pull/9139', 'https://github.com/advisories/GHSA-77cr-6gr8-7rr9', 'https://github.com/hashicorp/nomad/issues/9129', 'https://www.nomadproject.io/downloads', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27195'}
null
GHSA
GHSA-75pc-qvwc-jf3g
Improper Input Validation in HashiCorp Vault
HashiCorp Vault and Vault Enterprise 1.4.x before 1.4.2 has Incorrect Access Control.
{'CVE-2020-12757'}
2021-05-18T18:20:48Z
2021-05-18T18:20:48Z
HIGH
4
{'CWE-20'}
{'https://github.com/hashicorp/vault-plugin-secrets-gcp/commit/e43d20870c50f7428dead1411debcec075b35fb4', 'https://github.com/advisories/GHSA-75pc-qvwc-jf3g', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020', 'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/85', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12757', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md'}
null
GHSA
GHSA-j9wr-49vq-rm5g
Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19
Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request. - https://vaadin.com/security/cve-2021-31407
null
2021-10-08T21:24:56Z
2021-04-19T14:46:49Z
HIGH
8.6
{'CWE-402'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-j9wr-49vq-rm5g', 'https://vaadin.com/security/cve-2021-31407', 'https://github.com/advisories/GHSA-j9wr-49vq-rm5g'}
null
GHSA
GHSA-7qg7-6g3g-8vxg
Malicious Package in bwffer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T15:46:18Z
2020-09-03T22:46:25Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1269', 'https://github.com/advisories/GHSA-7qg7-6g3g-8vxg'}
null
GHSA
GHSA-q99r-j969-6jwr
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300.
{'CVE-2019-1237'}
2021-03-29T20:56:04Z
2021-03-29T20:56:04Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237', 'https://github.com/advisories/GHSA-q99r-j969-6jwr'}
null
GHSA
GHSA-77mr-wc79-m8j3
A validation function with the same name as a built-in validator can be called
If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`. ### Impact Low impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway. ### Patches This is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break. ### Workarounds Inject your own email validator function. ### References Reported by [Vikrant Singh Chauhan](mailto:vi@hackberry.xyz) via [huntr.dev](https://www.huntr.dev/). [CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) * [Email us](mailto:phpmailer@synchromedia.co.uk).
{'CVE-2021-3603'}
2022-04-19T19:03:00Z
2021-06-22T15:18:02Z
LOW
0
{'CWE-74'}
{'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-77mr-wc79-m8j3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3603', 'https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/', 'https://github.com/advisories/GHSA-77mr-wc79-m8j3', 'https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603'}
null
GHSA
GHSA-hx78-272p-mqqh
Authorization Bypass in graphql-shield
Versions of `graphql-shield` prior to 6.0.6 are vulnerable to an Authorization Bypass. The rule caching option `no_cache` relies on keys generated by cryptographically insecure functions, which may cause rules to be incorrectly cached. This allows attackers to access information they should not have access to in case of a key collision. ## Recommendation Upgrade to version 6.0.6 or later.
null
2021-09-29T16:26:51Z
2020-09-03T19:21:11Z
LOW
0
{'CWE-285'}
{'https://www.npmjs.com/advisories/1121', 'https://github.com/advisories/GHSA-hx78-272p-mqqh'}
null
GHSA
GHSA-wrvw-hg22-4m67
A potential Denial of Service issue in protobuf-java
## Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data. Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected. ## Severity [CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) **High** - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses. ## Proof of Concept For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness. ## Remediation and Mitigation Please update to the latest available versions of the following packages: - protobuf-java (3.16.1, 3.18.2, 3.19.2) - protobuf-kotlin (3.18.2, 3.19.2) - google-protobuf [JRuby gem only] (3.19.2)
{'CVE-2021-22569'}
2022-04-22T15:36:22Z
2022-01-07T22:31:44Z
HIGH
7.5
{'CWE-696'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2022/01/12/7', 'http://www.openwall.com/lists/oss-security/2022/01/12/4', 'https://cloud.google.com/support/bulletins#gcp-2022-001', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22569', 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330', 'https://github.com/advisories/GHSA-wrvw-hg22-4m67'}
null
GHSA
GHSA-r96p-v3cr-gfv8
Cross-site Scripting (XSS) in @scullyio/scully
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
{'CVE-2020-28470'}
2021-07-29T20:42:20Z
2021-04-13T15:28:01Z
HIGH
7.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-r96p-v3cr-gfv8', 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470', 'https://github.com/scullyio/scully/pull/1182'}
null
GHSA
GHSA-5vm8-hhgr-jcjp
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser for `form` elements. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs, and then submitting the form. However, as TinyMCE does not allow forms to be submitted while editing, the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. This impacts all users who are using TinyMCE 5.7.0 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.7.1 by improved URL sanitization logic. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.7.1 or higher - Manually sanitize `form` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter). - Disable `form` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting. #### Example: Sanitizing using a node filter ```js editor.parser.addNodeFilter('form', function(nodes) { nodes.forEach(function(node) { if (node.attributes) { node.attributes.forEach(function(attr) { var name = attr.name; var value = attr.value; // Sanitize the attribute value here or remove it entirely var sanitizedValue = ...; node.attr(name, santizedValue); }); } }); }); ``` #### Example: Using invalid_elements ```js invalid_elements: 'form' ``` ### Acknowledgements Tiny Technologies would like to thank Mikhail Khramenkov at Solar Security Research Team for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes571/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
null
2021-05-28T19:18:53Z
2021-05-28T19:18:53Z
MODERATE
0
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5vm8-hhgr-jcjp', 'https://github.com/advisories/GHSA-5vm8-hhgr-jcjp'}
null
GHSA
GHSA-5p34-5m6p-p58g
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
{'CVE-2020-9546'}
2021-10-21T21:13:15Z
2020-04-23T21:08:40Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2631', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-5p34-5m6p-p58g', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9546', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}
null
GHSA
GHSA-gwfq-qwmp-x9xg
Cross-site scripting in Apache JSPWiki
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Page Revision History, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
{'CVE-2019-10087'}
2021-08-17T22:34:46Z
2019-10-11T18:41:50Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-gwfq-qwmp-x9xg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10087', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10087'}
null
GHSA
GHSA-q4qv-fmwc-qxpx
SQL Injection in NukeViet
modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent).
{'CVE-2019-7726'}
2021-06-22T15:24:55Z
2021-06-22T15:24:55Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-q4qv-fmwc-qxpx', 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7726', 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}
null
GHSA
GHSA-5gvm-hrw5-h6xf
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
The LDAP implementation in HiveServer2 in Apache Hive before 1.0.1 and 1.1.x before 1.1.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, mishandles simple unauthenticated and anonymous bind configurations, which allows remote attackers to bypass authentication via a crafted LDAP request.
{'CVE-2015-1772'}
2021-09-01T22:13:59Z
2019-03-14T15:40:44Z
HIGH
7.3
{'CWE-287'}
{'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCAOpgucy52yzNN1FaRcxwhZmx8ZtNRjmK6V0Bxk4svAD-R1q70Q@mail.gmail.com%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546', 'http://www.securitytracker.com/id/1034365', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1772', 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html', 'https://github.com/advisories/GHSA-5gvm-hrw5-h6xf'}
null
GHSA
GHSA-9cc3-5w85-pxvx
Cross Site Request Forgery in intelliants/subrion
Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.
{'CVE-2020-18326'}
2022-03-17T21:38:41Z
2022-03-05T00:00:45Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-9cc3-5w85-pxvx', 'https://github.com/hamm0nz/CVE-2020-18326', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18326'}
null
GHSA
GHSA-6g8v-hpgw-h2v7
Prototype pollution in gsap
There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0.
{'CVE-2020-28478'}
2021-01-20T21:21:50Z
2021-01-20T21:21:50Z
HIGH
0
{'CWE-400'}
{'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147', 'https://github.com/greensock/GSAP/releases/tag/3.6.0', 'https://github.com/advisories/GHSA-6g8v-hpgw-h2v7', 'https://snyk.io/vuln/SNYK-JS-GSAP-1054614', 'https://www.npmjs.com/package/gsap/v/3.6.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478', 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150'}
null
GHSA
GHSA-78hj-86cr-6j2v
Improper Access Control in Lightning Network Daemon
Lightning Network Daemon (lnd) before 0.7 allows attackers to trigger loss of funds because of Incorrect Access Control.
{'CVE-2019-12999'}
2021-05-18T15:30:22Z
2021-05-18T15:30:22Z
HIGH
7.5
{'CWE-284'}
{'https://github.com/lightningnetwork/lnd/commits/master', 'https://github.com/lightninglabs/chanleakcheck', 'https://github.com/advisories/GHSA-78hj-86cr-6j2v', 'https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html', 'https://github.com/lightningnetwork/lnd/releases/tag/v0.7.0-beta', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12999'}
null
GHSA
GHSA-c5qq-g673-5p49
Low severity vulnerability that affects puppet
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
{'CVE-2012-1989'}
2021-09-08T21:29:19Z
2017-10-24T18:33:38Z
LOW
0
null
{'http://projects.puppetlabs.com/issues/13606', 'http://secunia.com/advisories/48743', 'https://hermes.opensuse.org/messages/15087408', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797', 'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989', 'https://github.com/advisories/GHSA-c5qq-g673-5p49', 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html', 'http://secunia.com/advisories/49136', 'http://www.securityfocus.com/bid/52975', 'http://secunia.com/advisories/48748', 'http://puppetlabs.com/security/cve/cve-2012-1989/', 'http://ubuntu.com/usn/usn-1419-1'}
null
GHSA
GHSA-hpmr-prr2-cqc4
Remote Code Execution
models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution.
{'CVE-2019-11229'}
2022-04-12T22:01:59Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-94'}
{'http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html', 'https://github.com/go-gitea/gitea/pull/6593', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11229', 'https://github.com/advisories/GHSA-hpmr-prr2-cqc4', 'https://github.com/go-gitea/gitea/pull/6595', 'https://www.exploit-db.com/exploits/49383', 'https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3', 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}
null
GHSA
GHSA-jggw-2q6g-c3m6
Out-of-bounds Read in OpenCV
An out-of-bounds read was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.0.25). Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy.
{'CVE-2019-19624'}
2021-10-12T22:22:58Z
2021-10-12T22:22:58Z
MODERATE
6.5
{'CWE-125'}
{'https://github.com/opencv/opencv/issues/14554', 'https://github.com/opencv/opencv-python/releases/tag/25', 'https://access.redhat.com/security/cve/cve-2019-19624', 'https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418', 'https://github.com/advisories/GHSA-jggw-2q6g-c3m6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19624'}
null
GHSA
GHSA-jvx5-rm6q-gx7p
Lack of access control on upoaded files
SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.
{'CVE-2019-12245'}
2021-08-18T22:29:09Z
2019-11-12T23:01:50Z
MODERATE
5.3
{'CWE-732'}
{'https://forum.silverstripe.org/c/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12245', 'https://www.silverstripe.org/download/security-releases/', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12245', 'https://github.com/advisories/GHSA-jvx5-rm6q-gx7p'}
null
GHSA
GHSA-wp3c-xw9g-gpcg
Lack of validation in `SparseDenseCwiseMul`
### Impact Due to lack of validation in `tf.raw_ops.SparseDenseCwiseMul`, an attacker can trigger denial of service via `CHECK`-fails or accesses to outside the bounds of heap allocated data: ```python import tensorflow as tf indices = tf.constant([], shape=[10, 0], dtype=tf.int64) values = tf.constant([], shape=[0], dtype=tf.int64) shape = tf.constant([0, 0], shape=[2], dtype=tf.int64) dense = tf.constant([], shape=[0], dtype=tf.int64) tf.raw_ops.SparseDenseCwiseMul( sp_indices=indices, sp_values=values, sp_shape=shape, dense=dense) ``` Since the [implementation](https://github.com/tensorflow/tensorflow/blob/38178a2f7a681a7835bb0912702a134bfe3b4d84/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L68-L80) only validates the rank of the input arguments but no [constraints between dimensions](https://www.tensorflow.org/api_docs/python/tf/raw_ops/SparseDenseCwiseMul), an attacker can abuse them to trigger internal `CHECK` assertions (and cause program termination, denial of service) or to write to memory outside of bounds of heap allocated tensor buffers. ### Patches We have patched the issue in GitHub commit [7ae2af34087fb4b5c8915279efd03da3b81028bc](https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29567'}
2021-05-21T14:25:16Z
2021-05-21T14:25:16Z
LOW
2.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-wp3c-xw9g-gpcg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29567', 'https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp3c-xw9g-gpcg'}
null
GHSA
GHSA-9pr6-grf4-x2fr
Omniauth allows POST parameters to be stored in session
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
{'CVE-2017-18076'}
2022-04-25T22:27:19Z
2018-01-29T15:45:28Z
HIGH
7.5
null
{'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b', 'https://www.debian.org/security/2018/dsa-4109', 'https://github.com/advisories/GHSA-9pr6-grf4-x2fr', 'https://bugs.debian.org/888523', 'https://github.com/omniauth/omniauth/pull/867', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076'}
null
GHSA
GHSA-xvwv-6wvx-px9x
Moderate severity vulnerability that affects plone
By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website. (The specific url can be seen by inspecting the hotfix code, but we don't want to make it too easy for attackers by spelling it out here.)
{'CVE-2017-1000484'}
2021-09-22T17:58:21Z
2019-01-04T17:47:21Z
MODERATE
6.1
{'CWE-601'}
{'https://plone.org/security/hotfix/20171128/an-open-redirection-when-calling-a-specific-url', 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}
null
GHSA
GHSA-m4jx-6526-vvhm
Denial of service in github.com/nats-io/nats-server/server
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers - Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git.
{'CVE-2020-28466'}
2022-04-12T22:56:52Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-400'}
{'http://www.openwall.com/lists/oss-security/2021/03/16/2', 'https://github.com/nats-io/nats-server/pull/1731', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28466', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967', 'https://github.com/nats-io/nats-server/pull/1731/commits/2e3c22672936f4980d343fb1d328b38919e74796', 'http://www.openwall.com/lists/oss-security/2021/03/16/1', 'https://github.com/advisories/GHSA-m4jx-6526-vvhm'}
null
GHSA
GHSA-c84h-w6cr-5v8q
Markdown-supplied Shell Command Execution
### Impact lookatme versions prior to 2.3.0 automatically loaded the built-in "terminal" and "file_loader" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system. ### Patches Users should upgrade to lookatme versions 2.3.0 or above. ### Workarounds The `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme. ### References * https://github.com/d0c-s4vage/lookatme/pull/110 * https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0 ### For more information If you have any questions or comments about this advisory: * Open an issue in [d0c-s4vage/lookatme](https://github.com/d0c-s4vage/lookatme)
{'CVE-2020-15271'}
2022-03-22T20:38:43Z
2020-10-27T17:59:54Z
CRITICAL
9.3
{'CWE-78'}
{'https://github.com/advisories/GHSA-c84h-w6cr-5v8q', 'https://github.com/d0c-s4vage/lookatme/pull/110', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15271', 'https://pypi.org/project/lookatme/#history', 'https://github.com/d0c-s4vage/lookatme/commit/72fe36b784b234548d49dae60b840c37f0eb8d84', 'https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0', 'https://github.com/d0c-s4vage/lookatme/security/advisories/GHSA-c84h-w6cr-5v8q'}
null
GHSA
GHSA-2qgv-2cv4-g4cg
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0832'}
2021-07-28T18:57:27Z
2021-07-28T18:57:27Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0832', 'https://github.com/advisories/GHSA-2qgv-2cv4-g4cg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'}
null
GHSA
GHSA-5gwh-g79j-vh4q
Command Injection in pdf-image
Versions of `pdf-image` before 2.0.0 are vulnerable to command injection. This vulnerability is exploitable if the attacker has control over the `pdfFilePath` variable passed into `pdf-image`. ## Recommendation Update to version 2.0.0 or later.
{'CVE-2018-3757'}
2021-09-24T20:36:09Z
2020-09-01T20:44:52Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-5gwh-g79j-vh4q', 'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3757', 'https://hackerone.com/reports/340208', 'https://www.npmjs.com/advisories/670'}
null
GHSA
GHSA-x5rq-j2xg-h7qm
Regular Expression Denial of Service (ReDoS) in lodash
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
{'CVE-2019-1010266'}
2022-04-19T19:03:26Z
2019-07-19T16:13:07Z
MODERATE
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266', 'https://snyk.io/vuln/SNYK-JS-LODASH-73639', 'https://github.com/lodash/lodash/wiki/Changelog', 'https://github.com/advisories/GHSA-x5rq-j2xg-h7qm', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347', 'https://github.com/lodash/lodash/issues/3359'}
null
GHSA
GHSA-89ch-hqf9-rgp3
Outdated versions of JS libraries used with known security vulnerabilities
An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities.
{'CVE-2019-8121'}
2019-11-15T20:11:31Z
2019-11-12T22:59:28Z
HIGH
0
null
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8121.yaml', 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/advisories/GHSA-89ch-hqf9-rgp3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8121'}
null
GHSA
GHSA-r5hc-wm3g-hjw6
Server-Side Request Forgery (SSRF) in rudloff/alltube
### Impact Releases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname. ### Patches 3.0.2 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) Part of the fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/148a171b240e7ceb076b9e198bef412de14ac55d/patches/youtube-dl-redirect.diff) to youtube-dl to prevent it from following HTTP redirects. If you are using the version of youtube-dl bundled with 3.0.2, it is already patched. However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**. ### References * https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d * https://github.com/Rudloff/alltube/commit/1b099bb9836a3ce7c427a41722a7ab5a3d1c1b2d * https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903/ * https://nvd.nist.gov/vuln/detail/CVE-2022-0768 * https://github.com/ytdl-org/youtube-dl/issues/30691
{'CVE-2022-0768'}
2022-03-18T20:42:55Z
2022-03-01T22:01:30Z
CRITICAL
9.1
{'CWE-918'}
{'https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903', 'https://github.com/rudloff/alltube/commit/148a171b240e7ceb076b9e198bef412de14ac55d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0768', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-r5hc-wm3g-hjw6', 'https://github.com/advisories/GHSA-r5hc-wm3g-hjw6', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}
null
GHSA
GHSA-4ffq-6g62-j4v4
Cross-Site Request Forgery in the Jenkins Claim plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Claim Plugin 2.18.1 and earlier allows attackers to change claims.
{'CVE-2021-21620'}
2021-06-16T17:29:43Z
2021-06-16T17:29:43Z
MODERATE
4.3
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21620', 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(2)', 'https://github.com/advisories/GHSA-4ffq-6g62-j4v4'}
null
GHSA
GHSA-qjg4-w4c6-f6c6
Command injection in mversion
### Impact This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. ### Patches Patched by version 2.0.0. Previous releases are deprecated in npm. ### Workarounds Make sure to escape git commit messages when using the commitMessage option for the update function.
{'CVE-2020-4059'}
2021-01-08T21:00:25Z
2020-06-18T19:23:17Z
HIGH
7.3
{'CWE-77'}
{'https://github.com/advisories/GHSA-qjg4-w4c6-f6c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4059', 'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338', 'https://github.com/mikaelbr/mversion/security/advisories/GHSA-qjg4-w4c6-f6c6'}
null
GHSA
GHSA-5hx2-qx8j-qjqm
Overflow/crash in `tf.image.resize` when size is large
### Impact If `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. ```python import tensorflow as tf import numpy as np tf.keras.layers.UpSampling2D( size=1610637938, data_format='channels_first', interpolation='bilinear')(np.ones((5,1,1,1))) ``` The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. ### Patches We have patched the issue in GitHub commit [e5272d4204ff5b46136a1ef1204fc00597e21837](https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837) (merging [#51497](https://github.com/tensorflow/tensorflow/pull/51497)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46914).
{'CVE-2021-41199'}
2021-11-10T19:33:24Z
2021-11-10T19:33:24Z
MODERATE
5.5
{'CWE-190'}
{'https://github.com/advisories/GHSA-5hx2-qx8j-qjqm', 'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837', 'https://github.com/tensorflow/tensorflow/issues/46914', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41199'}
null
GHSA
GHSA-mvr2-9pj6-7w5j
Denial of Service in Google Guava
Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.
{'CVE-2018-10237'}
2021-10-21T21:28:40Z
2020-06-15T20:35:11Z
MODERATE
5.9
{'CWE-502', 'CWE-770'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E', 'https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E', 'https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/google/guava/wiki/CVE-2018-10237', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10237', 'https://github.com/advisories/GHSA-mvr2-9pj6-7w5j', 'https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:2598', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion', 'http://www.securitytracker.com/id/1041707', 'https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927'}
null
GHSA
GHSA-45hc-r4fj-qj89
SQL injection in pagekit/pagekit
Pagekit is a modular and lightweight CMS built with Symfony components and Vue.js. The configAction in SettingsController allow user to set the order of comments listing. The allowed options are ASC and DESC. That config then get concatenated directly to the SQL query. Due to the fact that there wasnt any sanitizion before saving that config, it can lead to the SQL Injection vulnerability.
{'CVE-2021-44135'}
2022-04-18T21:49:19Z
2022-04-02T00:00:15Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-45hc-r4fj-qj89', 'https://huntr.dev/bounties/82f09b08-ceeb-4249-8855-b8bc718c4868/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44135'}
null
GHSA
GHSA-8mrf-g42m-5qc8
Downloads Resources over HTTP in dalek-browser-chrome-canary
Affected versions of `dalek-browser-chrome-canary` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome-canary`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10584'}
2021-01-08T19:09:15Z
2019-02-18T23:51:14Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/181', 'https://github.com/advisories/GHSA-8mrf-g42m-5qc8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10584', 'https://www.npmjs.com/advisories/181'}
null
GHSA
GHSA-m3ww-7hrp-gw9w
Drop of uninitialized memory in Ozone
An issue was discovered in the ozone crate through 2020-07-04 for Rust. Memory safety is violated because of the dropping of uninitialized memory.
{'CVE-2020-35878'}
2021-08-25T20:47:41Z
2021-08-25T20:47:41Z
CRITICAL
9.8
{'CWE-119', 'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35878', 'https://github.com/advisories/GHSA-m3ww-7hrp-gw9w'}
null
GHSA
GHSA-rhh9-cm65-3w54
Improper Authentication in Apache Hadoop
In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled.
{'CVE-2018-11765'}
2021-10-05T16:27:34Z
2021-04-30T17:29:30Z
HIGH
7.5
{'CWE-287'}
{'https://security.netapp.com/advisory/ntap-20201016-0005/', 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf9dfa8b77585c9227db9637552eebb2ab029255a0db4eb76c2b6c4cf@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbe25cac0f499374f8ae17a4a44a8404927b56de28d4c41940d82b7a4@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-rhh9-cm65-3w54', 'https://lists.apache.org/thread.html/rb241464d83baa3749b08cd3dabc8dba70a9a9027edcef3b5d4c24ef4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2c7f899911a04164ed1707083fcd4135f8427e04778c87d83509b0da%40%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r46447f38ea8c89421614e9efd7de5e656186d35e10fc97cf88477a01@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r74825601e93582167eb7cdc2f764c74c9c6d8006fa90018562fda60f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/reea5eb8622afbfbfca46bc758f79db83d90a3263a906c4d1acba4971@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r79b15c5b66c6df175d01d7560adf0cd5c369129b9a161905e0339927@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}
null
GHSA
GHSA-prr5-pfr8-q9f3
Moderate severity vulnerability that affects Plone
ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.
{'CVE-2012-5503'}
2021-09-16T19:14:18Z
2018-07-23T19:52:35Z
MODERATE
0
null
{'https://plone.org/products/plone/security/advisories/20121106/19', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5503', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://github.com/advisories/GHSA-prr5-pfr8-q9f3', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}
null
GHSA
GHSA-87xh-9q6h-r5cc
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free.
{'CVE-2021-45715'}
2022-01-07T16:08:56Z
2022-01-06T22:00:49Z
HIGH
7.5
{'CWE-416'}
{'https://github.com/advisories/GHSA-87xh-9q6h-r5cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45715', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
null
GHSA
GHSA-3fv6-q5xv-fhpw
Malicious Package in coffee-project
Version 1.7.5 of `coffee-project` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.7.5 of this module is found installed you will want to replace it with a version before or after 1.7.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T19:50:23Z
2020-09-01T19:50:23Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/621', 'https://github.com/advisories/GHSA-3fv6-q5xv-fhpw'}
null
GHSA
GHSA-254q-rqmw-vx45
Exposure of Sensitive Information to an Unauthorized Actor in librenms
Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0588'}
2022-02-24T13:05:39Z
2022-02-16T00:01:52Z
MODERATE
6.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-254q-rqmw-vx45', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://huntr.dev/bounties/caab3310-0d70-4c8a-8768-956f8dd3326d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0588', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
null
GHSA
GHSA-35vc-w93w-75c2
JWT leak via Open Redirect in Programmatic access
### Impact Using programmatic access on protected sites, one can get a signed login URL with pomerium_redirect_uri set to an arbitrary URL. Then, if the user has already logged into Pomerium, they will be redirected to the specified pomerium_redirect_uri with a JWT attached. This allows an outside attacker to get a signed login URL that, upon visiting it, will redirect a victim to the attacker’s site. This creates an issue of Open Redirect and, more seriously, JWT leakage. With a leaked JWT, the attacker will be able to unveil the victim’s identity (.e.g. email address) by supplying the JWT to the authenticate service or verify.pomerium.com. In addition, if an application integrating Pomerium only verifies the iss claim and others but not the aud claim, the attacker will be able to access it as the victim. ### Patches Patched in Pomerium v0.13.4 ### For more information If you have any questions or comments about this advisory * Open an issue in [pomerium](http://github.com/pomerium/pomerium) * Email us at [security@pomerium.com](mailto:security@pomerium.com)
{'CVE-2021-29651'}
2022-04-19T19:02:52Z
2021-05-21T16:24:34Z
HIGH
6.3
{'CWE-200', 'CWE-601'}
{'https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2', 'https://github.com/pomerium/pomerium/pull/2049', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29651', 'https://github.com/advisories/GHSA-35vc-w93w-75c2'}
null
GHSA
GHSA-j85f-xw9x-ffwp
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4121'}
2022-01-04T18:52:13Z
2021-12-17T20:00:12Z
MODERATE
6.4
{'CWE-79'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/6b5967198e43b6fbb3b2715b49c6cd5b12ce08c3', 'https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4121', 'https://github.com/advisories/GHSA-j85f-xw9x-ffwp'}
null
GHSA
GHSA-8rhc-48pp-52gr
High severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.1.2, 2.2.0 or later.
{'CVE-2017-12612'}
2021-09-07T20:33:04Z
2018-11-09T17:43:25Z
HIGH
7.8
{'CWE-502'}
{'http://www.securityfocus.com/bid/100823', 'https://github.com/advisories/GHSA-8rhc-48pp-52gr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12612', 'https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E'}
null
GHSA
GHSA-m6gj-h9gm-gw44
Incorrect Default Permissions
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
{'CVE-2020-24583'}
2021-03-18T20:30:13Z
2021-03-18T20:30:13Z
HIGH
7.5
{'CWE-276'}
{'https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24583', 'https://security.netapp.com/advisory/ntap-20200918-0004/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.openwall.com/lists/oss-security/2020/09/01/2', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-m6gj-h9gm-gw44', 'https://usn.ubuntu.com/4479-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/', 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/', 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM', 'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU'}
null
GHSA
GHSA-xhqq-x44f-9fgg
Authentication Bypass in github.com/russellhaering/gosaml2
### Impact Given a valid SAML Response, it may be possible for an attacker to mutate the XML document in such a way that gosaml2 will trust a different portion of the document than was signed. Depending on the implementation of the Service Provider this enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the Identity Provider, or full authentication bypass. ### Patches Service Providers utilizing gosaml2 should upgrade to v0.6.0 or greater.
{'CVE-2020-29509'}
2022-04-19T19:02:42Z
2022-02-11T23:58:09Z
CRITICAL
9.8
{'CWE-115'}
{'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg', 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://security.netapp.com/advisory/ntap-20210129-0006/', 'https://github.com/advisories/GHSA-xhqq-x44f-9fgg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29509'}
null
GHSA
GHSA-gwc9-348x-qwv2
Use after free in Wasmtime
There is a use after free vulnerability in Wasmtime when both running Wasm that uses `externref`s and enabling [epoch interruption](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.epoch_interruption) in Wasmtime. If you are not explicitly enabling epoch interruption (it is disabled by default) then you are not affected. If you are explicitly disabling the Wasm reference types proposal (it is enabled by default) then you are also not affected. The use after free is caused by Cranelift failing to emit stack maps when there are safepoints inside cold blocks. Cold blocks occur when epoch interruption is enabled. Cold blocks are emitted at the end of compiled functions, and change the order blocks are emitted versus defined. This reordering accidentally caused Cranelift to skip emitting some stack maps because it expected to emit the stack maps in block definition order, rather than block emission order. When Wasmtime would eventually collect garbage, it would fail to find live references on the stack because of the missing stack maps, think that they were unreferenced garbage, and therefore reclaim them. Then after the collection ended, the Wasm code could use the reclaimed-too-early references, which is a use after free. This bug was discovered while extending our fuzz targets for `externref`s and GC in Wasmtime. The updated fuzz target thoroughly exercises these code paths and feature combinations now. We have also added a regression test for this bug. Released versions 0.34.2 and 0.35.2, which fix the vulnerability. We recommend all Wasmtime users upgrade to these patched versions. If upgrading is not an option for you at this time, you can avoid the vulnerability by either disabling the Wasm reference types proposal or by disabling epoch interruption if you were previously enabling it.
{'CVE-2022-24791'}
2022-04-12T23:16:18Z
2022-04-01T13:36:12Z
HIGH
8.1
{'CWE-416'}
{'https://github.com/advisories/GHSA-gwc9-348x-qwv2', 'https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.epoch_interruption', 'https://github.com/WebAssembly/reference-types', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24791', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-gwc9-348x-qwv2', 'https://github.com/bytecodealliance/wasmtime/commit/666c2554ea0e1728c35aa41178cf235920db888a'}
null
GHSA
GHSA-qq5v-f4c3-395c
Possible XSS when using SSO with the CLI in github.com/argoproj/argo-cd/v2
### Impact When using SSO with the Argo CD CLI, a malicious SSO provider could have sent specially crafted error message that would result in XSS on the client by means of executing arbitrary JavaScript code. We believe the exploitation of this vulnerability is only be possible when Argo CD is connected to a compromised/malicious SSO provider. ### Patches A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD. ### Workarounds * Do not use SSO with the CLI when you don't trust your SSO provider If you have any questions or comments about this advisory: * Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) * Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd` ### Credits The issue was found during static code scanning with CodeQL and fixed by the Argo CD team. While we believed that a rogue SSO provider would pose a severe threat by itself, we fixed it like a regular bug. The Argo CD team would like to thank Adam Gold of Snyk (https://snyk.io) for stepping up and classifying this correctly as a security issue and for his help in determining its severity. Also, Snyk kindly reserved and provided the CVE for this vulnerability. We fully agree with Adam that this bug is a security vulnerability and justifies publishing a SA, to provide our community and users full transparancy.
{'CVE-2021-23347'}
2021-05-21T14:31:41Z
2021-05-21T14:31:41Z
MODERATE
4.7
{'CWE-79'}
{'https://github.com/argoproj/argo-cd/security/advisories/GHSA-qq5v-f4c3-395c', 'https://github.com/advisories/GHSA-qq5v-f4c3-395c'}
null
GHSA
GHSA-29v9-2fpx-j5g9
CSV Injection vulnerability with exported contact lists in Mautic
### Impact Mautic versions before 2.13.0 had a vulnerability that allowed a CSV injection with exported contact lists - https://www.owasp.org/index.php/CSV_Injection. ### Patches Update to 2.13.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2018-8092'}
2021-01-19T21:16:29Z
2021-01-19T21:16:29Z
MODERATE
9.8
{'CWE-1236'}
{'https://github.com/advisories/GHSA-29v9-2fpx-j5g9', 'https://github.com/mautic/mautic/security/advisories/GHSA-29v9-2fpx-j5g9', 'https://github.com/mautic/mautic/commit/cbc49f0ac4cc7e3acc07f2a85c079b2f85225a6b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8092', 'https://github.com/mautic/mautic/releases/tag/2.13.0'}
null
GHSA
GHSA-3v56-q6r6-4gcw
Insecure Inherited Permissions in neoan3-apps/template
### Impact Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. ### Patches Version 1.1.1 has addressed this vulnerability. ```php $params = [ 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1 'value' => 'My website' ] TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated) Template::embrace('<h1>{{reverse(value)}}</h1>', $params); ``` ### Workarounds Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. ### References As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)
{'CVE-2021-41170'}
2021-11-17T21:25:14Z
2021-11-10T16:41:08Z
HIGH
7.5
{'CWE-732', 'CWE-74', 'CWE-277'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41170', 'https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw', 'https://github.com/sroehrl/neoan3-template/issues/8', 'https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934', 'https://github.com/advisories/GHSA-3v56-q6r6-4gcw'}
null
GHSA
GHSA-8jrj-525p-826v
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39145](https://x-stream.github.io/CVE-2021-39145.html). ### Credits 李安诺 (Li4n0) from Alibaba Cloud Security Team and Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue independently to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39145'}
2022-04-22T15:43:33Z
2021-08-25T14:48:12Z
HIGH
8.5
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://x-stream.github.io/CVE-2021-39145.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/advisories/GHSA-8jrj-525p-826v', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39145', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-gh87-6jr3-8q47
Null pointer deference in cache
An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.
{'CVE-2021-25903'}
2021-08-25T20:52:57Z
2021-08-25T20:52:57Z
HIGH
7.5
{'CWE-476'}
{'https://github.com/advisories/GHSA-gh87-6jr3-8q47', 'https://github.com/krl/cache/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25903', 'https://rustsec.org/advisories/RUSTSEC-2021-0006.html'}
null
GHSA
GHSA-hwj9-h5mp-3pm3
Regular Expression Denial of Service in postcss
The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.
{'CVE-2021-23368'}
2021-06-15T15:12:14Z
2021-05-10T15:29:24Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5', 'https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23368', 'https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595', 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795', 'https://github.com/advisories/GHSA-hwj9-h5mp-3pm3', 'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4'}
null
GHSA
GHSA-3j58-p785-f27x
Cross-site Scripting in microweber
There is a reflected cross sitem scripting attack in microweber via url parameters.
{'CVE-2022-0378'}
2022-02-03T20:34:29Z
2022-01-28T22:15:24Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31', 'https://github.com/microweber/microweber/commit/fc7e1a026735b93f0e0047700d08c44954fce9ce', 'https://github.com/advisories/GHSA-3j58-p785-f27x', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0378'}
null
GHSA
GHSA-85cp-p426-42f5
Prototype Pollution in deep-get-set
All versions of package deep-get-set prior to version 1.1.1 are vulnerable to Prototype Pollution via the main function.
{'CVE-2020-7715'}
2021-07-29T22:06:52Z
2021-05-06T18:12:59Z
HIGH
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7715', 'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666', 'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4', 'https://github.com/advisories/GHSA-85cp-p426-42f5'}
null
GHSA
GHSA-f5w6-r7rg-mcgq
Regular Expression Denial of Service in validator
Versions of `validator` prior to 3.22.1 are affected by a regular expression denial of service vulnerability in the `isURL` method. ## Recommendation Update to version 3.22.1 or later.
{'CVE-2014-8882'}
2021-09-23T21:03:26Z
2020-08-31T23:01:13Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8882', 'https://www.npmjs.com/advisories/42', 'https://snyk.io/vuln/npm:validator:20130705', 'https://github.com/advisories/GHSA-f5w6-r7rg-mcgq', 'https://github.com/chriso/validator.js/issues/152#issuecomment-48107184'}
null
GHSA
GHSA-45w7-7g63-2m5w
Drop of uninitialized memory in stack_dst
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in 2a4d538 by increasing the length of the array after elements are cloned.
{'CVE-2021-28035'}
2021-09-01T18:30:55Z
2021-09-01T18:30:55Z
CRITICAL
9.8
{'CWE-908'}
{'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28035', 'https://github.com/thepowersgang/stack_dst-rs/issues/5', 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html', 'https://github.com/advisories/GHSA-45w7-7g63-2m5w'}
null
GHSA
GHSA-38r5-34mr-mvm7
"catalog's registry v2 api exposed on unauthenticated path in Harbor"
### **Impact** Javier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API. The catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it requires to be authenticated as an admin. "GET /v2/_catalog" However, the authorization can be bypassed by using the following path "GET /v2/_catalog/" ### **Patches** If your product uses the affected releases of Harbor, update to either version v2.1.2 or v2.0.5 to fix this issue immediately https://github.com/goharbor/harbor/releases/tag/v2.1.2 https://github.com/goharbor/harbor/releases/tag/v2.0.5 ### **Workarounds** If you cannot access a patched release, it can be mitigated by disabling that API. For example, redirecting it to a 404 sink hole in the ingress. ### **For more information** If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29662
{'CVE-2020-29662'}
2022-02-12T00:01:58Z
2022-02-12T00:01:51Z
MODERATE
5.3
{'CWE-287', 'CWE-319'}
{'https://github.com/goharbor/harbor/releases/tag/v2.0.5', 'https://github.com/goharbor/harbor/releases/tag/v2.1.2', 'https://github.com/goharbor/harbor/pull/13676', 'https://github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7', 'https://github.com/goharbor/harbor/commit/3481722f140e1fdf6e6d290b0cd5c86e509feed4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29662', 'https://github.com/advisories/GHSA-38r5-34mr-mvm7', 'https://github.com/goharbor/harbor/commit/c7c409a8e5a8b3fd42841dda84759c9d77977853'}
null
GHSA
GHSA-vfj6-275q-4pvm
graphite.composer.views.send_email vulnerable to SSRF
### Impact send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. Email will be send through SMTP server configured in Graphite, by default it's 'localhost' ### Patches Problem was patched in Graphite-web 1.1.6. Also patches was released for graphite-web [1.0.x](https://github.com/graphite-project/graphite-web/pull/2501) and [0.9.x](https://github.com/graphite-project/graphite-web/pull/2500), and we'll discuss releases of non-supported branches later. ### Workarounds You can manually remove function `send_email` from file `webapp/graphite/composer/views.py`. This function are not in use and will not affect your Graphite installation. ### References For more information check this graphite-web Github issue #2008 ### For more information If you have any questions or comments about this advisory: * Add comment in [issue #2008](https://github.com/graphite-project/graphite-web/issues/2008)
{'CVE-2017-18638'}
2022-04-19T19:02:27Z
2019-10-25T13:55:20Z
HIGH
7.5
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18638', 'https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf', 'https://github.com/graphite-project/graphite-web/commit/71726a0e41a5263f49b973a7b856505a5b931c1f', 'https://github.com/graphite-project/graphite-web/security/advisories/GHSA-vfj6-275q-4pvm', 'https://github.com/advisories/GHSA-vfj6-275q-4pvm', 'https://www.youtube.com/watch?v=ds4Gp4xoaeA', 'https://github.com/graphite-project/graphite-web/pull/2499', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00030.html', 'https://github.com/graphite-project/graphite-web/issues/2008'}
null
GHSA
GHSA-xm3x-787m-p66r
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload.
{'CVE-2022-0964'}
2022-03-29T21:23:07Z
2022-03-16T00:00:46Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-xm3x-787m-p66r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0964', 'https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
GHSA
GHSA-7ww4-c3mj-93cf
Downloads Resources over HTTP in pm2-kafka
Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10693'}
2021-01-14T15:56:20Z
2020-09-01T16:16:33Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10693', 'https://github.com/advisories/GHSA-7ww4-c3mj-93cf', 'https://www.npmjs.com/advisories/299', 'https://nodesecurity.io/advisories/299'}
null
GHSA
GHSA-62gw-3rmj-wmp2
High severity vulnerability that affects System.Management.Automation
## Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in .NET Core # Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in PowerShell Core ## Executive Summary A denial of service vulnerability exists when PowerShell Core or .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a PowerShell Core scripts. The update addresses the vulnerability by correcting how the .NET Core handles web requests. System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).) ## Discussion Please [open a support question](https://github.com/PowerShell/PowerShell/issues/new?assignees=&labels=Issue-Question&template=Support_Question.md&title=Support+Question) to discussion the PowerShell aspects of this advisory. Please use dotnet/announcements#121 for discussion of the .NET aspects this advisory. ## <a name="affected-software">Affected Software</a> The vulnerability affects PowerShell Core prior to the following versions: | PowerShell Core Version | Fixed in | |-------------------------|-------------------| | 6.1 | 6.1.6 | | 6.2 | 6.2.3 | | 7.0 | unaffected | ## Advisory FAQ ### How do I know if I am affected? If all of the following are true: 1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected. 1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`. ### How do I update to an unaffected version? Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core. ## Other Information ### Reporting Security Issues If you have found a potential security issue in PowerShell Core, please email details to secure@microsoft.com. ### Support You can ask questions about this issue on GitHub in the PowerShell organization. This is located at https://github.com/PowerShell/. The Announcements repo (https://github.com/PowerShell/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions. ### What if the update breaks my script or module? You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core. This should be treated as a temporary measure. Therefore, the script or module should be updated to work with the patched version of PowerShell Core. ### Acknowledgments Paul Ryman of VMware Sydney Engineering Team Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information. ### External Links [CVE-2019-1301](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301) ### Revisions V1.0 (September 12, 2019): Advisory published. *Version 1.0* *Last Updated 2019-09-12*
{'CVE-2019-1301'}
2021-09-01T22:36:40Z
2019-09-13T13:25:47Z
HIGH
7.5
null
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301', 'https://github.com/advisories/GHSA-62gw-3rmj-wmp2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1301', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-62gw-3rmj-wmp2'}
null
GHSA
GHSA-cpx9-4rwv-486v
Hessian protocol configuration vulnerability in Apache Dubbo
In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
{'CVE-2021-36163'}
2021-09-15T18:29:58Z
2021-09-08T20:14:14Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/apache/dubbo/pull/8238', 'https://lists.apache.org/thread.html/r8d0adc057bb15a37199502cc366f4b1164c9c536ce28e4defdb428c0%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36163', 'https://github.com/advisories/GHSA-cpx9-4rwv-486v', 'https://github.com/apache/dubbo/releases/tag/dubbo-2.6.10.1', 'https://github.com/apache/dubbo/releases/tag/dubbo-2.7.13'}
null
GHSA
GHSA-6v6p-g8cg-2hgg
Improper Certificate Validation in node-sass affects eZ Platform
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsystems/ezplatform-page-builder.
null
2022-04-05T21:38:32Z
2022-04-01T12:56:28Z
MODERATE
5.3
{'CWE-295'}
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass', 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg', 'https://github.com/ezsystems/ezplatform-admin-ui/releases/tag/v1.5.27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv', 'https://github.com/advisories/GHSA-6v6p-g8cg-2hgg'}
null
GHSA
GHSA-vxh4-x6gv-mphf
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat.
{'CVE-2022-0245'}
2022-01-25T20:48:53Z
2022-01-21T23:25:45Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-vxh4-x6gv-mphf', 'https://github.com/livehelperchat/livehelperchat/commit/c2fa19afeb8b1ea927fea3fd452515c95f289fb9', 'https://huntr.dev/bounties/6a6aca72-32b7-45b3-a8ba-9b400b2d669c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0245'}
null
GHSA
GHSA-9xgh-xgw5-p5cw
Hijacked Environment Variables in nodemssql
The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16057'}
2021-01-08T19:01:37Z
2018-11-09T17:42:54Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/484', 'https://nodesecurity.io/advisories/484', 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}
null
GHSA
GHSA-7fpw-cfc4-3p2c
High severity vulnerability that affects passport-wsfed-saml2
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
{'CVE-2017-16897'}
2021-09-02T21:17:06Z
2017-12-28T22:51:45Z
HIGH
8.1
{'CWE-290'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16897', 'https://auth0.com/docs/security/bulletins/cve-2017-16897', 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}
null
GHSA
GHSA-3988-h75v-hwf6
Arbitrary shell execution
A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option
null
2022-03-26T00:32:01Z
2022-03-26T00:06:45Z
HIGH
0
null
{'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1', 'https://github.com/advisories/GHSA-3988-h75v-hwf6', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml'}
null
GHSA
GHSA-vh2r-x97c-2vpr
SQL Injection in Jeecg-boot
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.
{'CVE-2022-22880'}
2022-02-26T00:52:37Z
2022-02-17T00:00:26Z
CRITICAL
9.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22880', 'https://github.com/advisories/GHSA-vh2r-x97c-2vpr', 'https://github.com/jeecgboot/jeecg-boot/issues/3347'}
null
GHSA
GHSA-fr76-2wp8-fp92
Insecure template handling in Express-handlebars
Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability. A fix is discussed in https://github.com/express-handlebars/express-handlebars/pull/163
{'CVE-2021-32820'}
2022-02-10T23:35:42Z
2022-02-10T23:35:21Z
HIGH
8.6
{'CWE-200'}
{'https://github.com/advisories/GHSA-fr76-2wp8-fp92', 'https://github.com/express-handlebars/express-handlebars#danger-', 'https://github.com/express-handlebars/express-handlebars/pull/163', 'https://www.npmjs.com/package/express-handlebars', 'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72', 'https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820', 'https://github.com/express-handlebars/express-handlebars/blob/78c47a235c4ad7bc2674bddd8ec2721567ed8c72/README.md#danger-'}
null
GHSA
GHSA-jphm-g89m-v42p
Path traversal in Grafana Cortex
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
{'CVE-2021-36157'}
2021-09-02T21:59:50Z
2021-09-02T21:59:50Z
MODERATE
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-jphm-g89m-v42p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36157', 'https://grafana.com/docs/grafana/latest/release-notes/', 'https://github.com/cortexproject/cortex/commit/d9e1f81f40c607b9e97c2fc6db70ae54679917c4', 'https://github.com/cortexproject/cortex/pull/4375'}
null
GHSA
GHSA-qr2j-wrhx-4829
Improper Input Validation
In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.
{'CVE-2018-16733'}
2021-05-18T18:38:06Z
2021-05-18T18:38:06Z
MODERATE
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16733', 'https://github.com/advisories/GHSA-qr2j-wrhx-4829', 'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'}
null
GHSA
GHSA-qpg4-4w7w-2mq5
Authentication and extension bypass in Faye
On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1.2.5, which we are releasing today. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. For example, the Faye [extension docs][2] suggest that users implement access control for subscriptions by checking incoming messages for the `/meta/subscribe` channel, for example: ```js server.addExtension({ incoming: function(message, callback) { if (message.channel === '/meta/subscribe') { if (message.ext.authToken !== 'my super secret password') { message.error = 'Invalid auth token'; } } callback(message); } }); ``` A bug in the server's code for recognising the special `/meta/*` channels, which trigger connection and subscription events, means that a client can bypass this check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`: ```json { "channel": "/meta/subscribe/x", "clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3", "subscription": "/foo" } ``` This message will not be checked by the above extension, as it checks the message's channel is exactly equal to `/meta/subscribe`. But it will still be processed as a subscription request by the server, so the client becomes subscribed to the channel `/foo` without supplying the necessary credentials. The vulnerability is caused by the way the Faye server recognises meta channels. It will treat a message to any channel that's a prefix-match for one of the special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`, `/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for that channel. So, a message to `/meta/subscribe/x` is still processed as a subscription request, for example. An authentication bypass for subscription requests is the most serious effect of this but all other meta channels are susceptible to similar manipulation. This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5. These should be drop-in replacements for prior versions and you should upgrade immediately if you are running any prior version. If you are unable to install one of these versions, you can make your extensions catch all messages the server would process by checking the channel _begins_ with the expected channel name, for example: ```js server.addExtension({ incoming: function(message, callback) { if (message.channel.startsWith('/meta/subscribe')) { // authentication logic } callback(message); } }); ``` [1]: https://faye.jcoglan.com/ [2]: https://faye.jcoglan.com/node/extensions.html
{'CVE-2020-11020'}
2021-01-08T20:21:05Z
2020-04-29T17:41:15Z
HIGH
8.5
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11020', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5', 'https://github.com/advisories/GHSA-qpg4-4w7w-2mq5'}
null
GHSA
GHSA-h6q6-9hqw-rwfv
Misinterpretation of malicious XML input
### Impact xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to 0.5.0 (once it is released) ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom`
{'CVE-2021-21366'}
2022-04-19T19:02:49Z
2021-03-12T22:39:39Z
LOW
0
{'CWE-115', 'CWE-436'}
{'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv', 'https://www.npmjs.com/package/xmldom', 'https://github.com/advisories/GHSA-h6q6-9hqw-rwfv'}
null
GHSA
GHSA-74cv-f58x-f9wf
XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights
### Impact The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21343](https://x-stream.github.io/CVE-2021-21343.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21343'}
2022-02-08T21:32:56Z
2021-03-22T23:28:13Z
MODERATE
5.3
{'CWE-502', 'CWE-73'}
{'https://x-stream.github.io/CVE-2021-21343.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf', 'https://x-stream.github.io/security.html#workaround', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21343', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-74cv-f58x-f9wf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-85p9-j7c9-v4gr
Insufficiently Protected Credentials
The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.
{'CVE-2019-10214'}
2022-04-12T22:01:11Z
2022-02-15T01:57:18Z
MODERATE
6.4
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10214', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1732508', 'https://github.com/containers/image/pull/669', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214', 'https://github.com/containers/image/pull/655', 'https://github.com/advisories/GHSA-85p9-j7c9-v4gr'}
null
GHSA
GHSA-wmj9-xh24-j4gx
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0558'}
2022-02-23T21:58:40Z
2022-02-11T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0558', 'https://github.com/advisories/GHSA-wmj9-xh24-j4gx', 'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'}
null
GHSA
GHSA-29gp-92wp-94q8
Remote Code Execution in react-dev-utils
`react-dev-utils` on Windows is vulnerable to remote code execution. ## Recommendation Update to one of the follow versions, depending on the release line that you are using. - 1.0.4 - 2.0.2 - 3.1.2 - 4.2.2 - 5.0.2 - 6.0.0-next.a671462c
{'CVE-2018-6342'}
2021-01-08T20:09:18Z
2019-01-04T17:41:20Z
HIGH
0
{'CWE-78'}
{'https://github.com/advisories/GHSA-29gp-92wp-94q8', 'https://github.com/facebook/create-react-app/pull/4866', 'https://www.npmjs.com/advisories/695', 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}
null
GHSA
GHSA-m9r7-q9fc-qwx5
Malicious Package in maybemaliciouspackage
All versions of `maybemaliciouspackage` contain malicious code. The package prints the system's SSH keys to the console as a postinstall script. ## Recommendation Remove the package from your environment. There are no further signs of compromise.
null
2021-09-30T17:43:48Z
2020-09-03T17:22:24Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1042', 'https://github.com/advisories/GHSA-m9r7-q9fc-qwx5'}
null
GHSA
GHSA-6c7v-2f49-8h26
Cleartext Transmission of Sensitive Information in Django
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
{'CVE-2019-12781'}
2021-05-10T21:37:52Z
2019-07-03T20:37:25Z
MODERATE
5.3
{'CWE-319'}
{'https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ', 'https://usn.ubuntu.com/4043-1/', 'https://www.djangoproject.com/weblog/2019/jul/01/security-releases/', 'http://www.openwall.com/lists/oss-security/2019/07/01/3', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12781', 'https://security.netapp.com/advisory/ntap-20190705-0002/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4476', 'http://www.securityfocus.com/bid/109018', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://github.com/advisories/GHSA-6c7v-2f49-8h26', 'https://seclists.org/bugtraq/2019/Jul/10'}
null
GHSA
GHSA-683w-6h9j-57wq
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
{'CVE-2016-10006'}
2021-09-01T22:41:28Z
2018-10-18T17:21:47Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/nahsra/antisamy/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10006', 'http://www.securityfocus.com/bid/95101', 'https://github.com/advisories/GHSA-683w-6h9j-57wq', 'http://www.securitytracker.com/id/1037532'}
null
GHSA
GHSA-hqv3-qq72-78cv
Directory Traversal in startserver
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
{'CVE-2021-23430'}
2021-09-02T17:09:40Z
2021-09-02T17:09:40Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71', 'https://github.com/advisories/GHSA-hqv3-qq72-78cv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23430', 'https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388'}
null
GHSA
GHSA-jxqq-cqm6-pfq9
Regular Expression Denial of Service in slug
Affected versions of `slug` are vulnerable to a regular expression denial of service when parsing untrusted user input. The issue is low severity, as it takes 50,000 characters to cause the event loop to block for 2 seconds, About 50k characters can block the event loop for 2 seconds. ## Recommendation Update to version 0.9.2 or later.
{'CVE-2017-16117'}
2021-01-08T18:32:29Z
2018-07-24T20:06:45Z
MODERATE
0
{'CWE-400'}
{'https://github.com/dodo/node-slug/issues/82', 'https://github.com/advisories/GHSA-jxqq-cqm6-pfq9', 'https://nodesecurity.io/advisories/537', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16117', 'https://www.npmjs.com/advisories/537'}
null
GHSA
GHSA-g87g-4x3w-f8jp
Directory Traversal in serverwzl
Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16105'}
2021-01-14T15:54:57Z
2020-09-01T16:51:28Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16105', 'https://github.com/advisories/GHSA-g87g-4x3w-f8jp', 'https://www.npmjs.com/advisories/363', 'https://nodesecurity.io/advisories/363', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl'}
null
GHSA
GHSA-mg5p-95m9-rmfp
Arbitrary file write in actionpack-page_caching gem
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
{'CVE-2020-8159'}
2022-04-07T15:10:56Z
2020-05-13T16:28:46Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://github.com/advisories/GHSA-mg5p-95m9-rmfp'}
null
GHSA
GHSA-qxrj-x7rm-2h49
Malicious Package in dhkey
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:01:14Z
2020-09-03T17:05:59Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-qxrj-x7rm-2h49', 'https://www.npmjs.com/advisories/1394'}
null
GHSA
GHSA-pc3m-v286-2jwj
Moderate severity vulnerability that affects actionview
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
{'CVE-2016-6316'}
2021-09-16T18:54:09Z
2017-10-24T18:33:35Z
MODERATE
6.1
{'CWE-79'}
{'https://puppet.com/security/cve/cve-2016-6316', 'http://www.debian.org/security/2016/dsa-3651', 'http://www.openwall.com/lists/oss-security/2016/08/11/3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316', 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE', 'http://www.securityfocus.com/bid/92430', 'http://rhn.redhat.com/errata/RHSA-2016-1858.html', 'http://rhn.redhat.com/errata/RHSA-2016-1855.html', 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/', 'https://github.com/advisories/GHSA-pc3m-v286-2jwj', 'http://rhn.redhat.com/errata/RHSA-2016-1856.html', 'http://rhn.redhat.com/errata/RHSA-2016-1857.html'}
null
GHSA
GHSA-8c6g-4xc5-w96c
Uninitialized memory exposure in claxon
An issue was discovered in the claxon crate before 0.4.1 for Rust. Uninitialized memory can be exposed because certain decode buffer sizes are mishandled.
{'CVE-2018-20992'}
2021-08-25T20:43:52Z
2021-08-25T20:43:52Z
MODERATE
6.5
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20992', 'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c', 'https://github.com/advisories/GHSA-8c6g-4xc5-w96c', 'https://rustsec.org/advisories/RUSTSEC-2018-0004.html'}
null
GHSA
GHSA-q492-f7gr-27rp
Improper Restriction of Operations within the Bounds of a Memory Buffer in Google TensorFlow
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
{'CVE-2018-10055'}
2021-08-03T21:05:56Z
2019-04-30T15:37:31Z
HIGH
8.1
{'CWE-119'}
{'https://github.com/advisories/GHSA-q492-f7gr-27rp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10055', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md'}
null
GHSA
GHSA-pq37-4c4g-v38c
Cross-site Scripting in vditor
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
{'CVE-2022-0341'}
2022-03-23T15:36:26Z
2022-03-15T00:01:02Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/advisories/GHSA-pq37-4c4g-v38c', 'https://github.com/Vanessa219/vditor/issues/1102', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628', 'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}
null
GHSA
GHSA-jh6m-3pqw-242h
Authentication Bypass by Primary Weakness in keycloak
A vulnerability was found in all versions of keycloak, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
{'CVE-2020-14359'}
2022-02-09T00:56:04Z
2022-02-09T00:56:04Z
HIGH
7.3
{'CWE-305'}
{'https://issues.jboss.org/browse/KEYCLOAK-14090', 'https://github.com/advisories/GHSA-jh6m-3pqw-242h', 'https://bugzilla.redhat.com/show_bug.cgi?id=1868591', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14359'}
null
GHSA
GHSA-4j54-mmmv-hjpm
Malicious Package in slush-fullstack-framework
Version 0.9.2 of `slush-fullstack-framework` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:17:51Z
2020-09-03T19:17:51Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1108', 'https://github.com/advisories/GHSA-4j54-mmmv-hjpm'}
null
GHSA
GHSA-qf8x-vqjv-92gr
Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter
Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading it.
{'CVE-2022-24901'}
2022-05-07T01:48:25Z
2022-05-04T18:59:46Z
HIGH
7.5
{'CWE-287', 'CWE-295'}
{'https://github.com/advisories/GHSA-qf8x-vqjv-92gr', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901', 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}
null
GHSA
GHSA-pv6r-vchh-cxg9
Denial of Service in apostrophe
Versions of `apostrophe` prior to 2.97.1 are vulnerable to Denial of Service. The `apostrophe-jobs` module sets a callback for incoming jobs and doesn't clear it regardless of its status. This causes the server to accumulate callbacks, allowing an attacker to start a large number of jobs and exhaust system memory. ## Recommendation Upgrade to version 2.97.1 or later.
null
2021-09-29T18:47:42Z
2020-09-03T20:42:09Z
LOW
0
{'CWE-400'}
{'https://www.npmjs.com/advisories/1183', 'https://github.com/advisories/GHSA-pv6r-vchh-cxg9'}
null
GHSA
GHSA-9p8q-j6q5-mjw8
Buffer Overflow in galois_2p8
In galois_2p8 before 0.1.2, PrimitivePolynomialField::new has an off-by-one buffer overflow for a vector.
{'CVE-2022-24988'}
2022-02-26T00:35:51Z
2022-02-15T00:02:45Z
CRITICAL
9.8
{'CWE-120'}
{'https://github.com/djsweet/galois_2p8/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-9p8q-j6q5-mjw8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24988'}
null