ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-hqm2-gwqf-r5g5
|
SQL injection in TYPO3 extension
|
It has been discovered that the extension is susceptible to SQL Injection when processing bounced emails.
|
{'CVE-2021-38302'}
|
2021-09-02T17:17:06Z
|
2021-09-02T17:17:06Z
|
CRITICAL
| 3.9
|
{'CWE-89'}
|
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-014', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38302', 'https://github.com/advisories/GHSA-hqm2-gwqf-r5g5'}
| null |
GHSA
|
GHSA-p44j-xrqg-4xrr
|
URL Redirection to Untrusted Site ('Open Redirect') in Products.PluggableAuthService
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability - a maliciously crafted link to the login form and login functionality could redirect the browser to a different website.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install "Products.PluggableAuthService>=2.6.1"`
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
There is no workaround. Users are encouraged to upgrade.
### References
_Are there any links users can visit to find out more?_
- [GHSA-p44j-xrqg-4xrr](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr)
- [Products.PluggableAuthService on PyPI](https://pypi.org/project/Products.PluggableAuthService/)
- [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues)
* Email us at [security@plone.org](mailto:security@plone.org)
|
{'CVE-2021-21337'}
|
2022-04-19T19:02:49Z
|
2021-03-08T21:06:23Z
|
LOW
| 0
|
{'CWE-601'}
|
{'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr', 'https://github.com/advisories/GHSA-p44j-xrqg-4xrr', 'https://pypi.org/project/Products.PluggableAuthService/', 'http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21337', 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'}
| null |
GHSA
|
GHSA-wcg3-cvx6-7396
|
Segmentation fault in time
|
### Impact
Unix-like operating systems may segfault due to dereferencing a dangling pointer in specific circumstances. This requires an environment variable to be set in a different thread than the affected functions. This may occur without the user's knowledge, notably in a third-party library.
The affected functions from time 0.2.7 through 0.2.22 are:
- `time::UtcOffset::local_offset_at`
- `time::UtcOffset::try_local_offset_at`
- `time::UtcOffset::current_local_offset`
- `time::UtcOffset::try_current_local_offset`
- `time::OffsetDateTime::now_local`
- `time::OffsetDateTime::try_now_local`
The affected functions in time 0.1 (all versions) are:
- `at`
- `at_utc`
- `now`
Non-Unix targets (including Windows and wasm) are unaffected.
### Patches
Pending a proper fix, the internal method that determines the local offset has been modified to always return `None` on the affected operating systems. This has the effect of returning an `Err` on the `try_*` methods and `UTC` on the non-`try_*` methods.
Users and library authors with time in their dependency tree should perform `cargo update`, which will pull in the updated, unaffected code.
Users of time 0.1 do not have a patch and should upgrade to an unaffected version: time 0.2.23 or greater or the 0.3. series.
### Workarounds
No workarounds are known.
### References
time-rs/time#293
|
{'CVE-2020-26235'}
|
2022-04-19T19:02:40Z
|
2021-08-25T20:56:46Z
|
MODERATE
| 6.2
|
{'CWE-476'}
|
{'https://github.com/time-rs/time/security/advisories/GHSA-wcg3-cvx6-7396', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26235', 'https://rustsec.org/advisories/RUSTSEC-2020-0071.html', 'https://github.com/advisories/GHSA-wcg3-cvx6-7396', 'https://github.com/time-rs/time/issues/293'}
| null |
GHSA
|
GHSA-77cr-6gr8-7rr9
|
Use After Free in HashiCorp Nomad
|
HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6
|
{'CVE-2020-27195'}
|
2022-04-12T22:55:43Z
|
2022-02-15T01:57:18Z
|
CRITICAL
| 7.1
|
{'CWE-416'}
|
{'https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0126-october-21-2020', 'https://github.com/hashicorp/nomad/pull/9139', 'https://github.com/advisories/GHSA-77cr-6gr8-7rr9', 'https://github.com/hashicorp/nomad/issues/9129', 'https://www.nomadproject.io/downloads', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27195'}
| null |
GHSA
|
GHSA-75pc-qvwc-jf3g
|
Improper Input Validation in HashiCorp Vault
|
HashiCorp Vault and Vault Enterprise 1.4.x before 1.4.2 has Incorrect Access Control.
|
{'CVE-2020-12757'}
|
2021-05-18T18:20:48Z
|
2021-05-18T18:20:48Z
|
HIGH
| 4
|
{'CWE-20'}
|
{'https://github.com/hashicorp/vault-plugin-secrets-gcp/commit/e43d20870c50f7428dead1411debcec075b35fb4', 'https://github.com/advisories/GHSA-75pc-qvwc-jf3g', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#142-may-21st-2020', 'https://www.hashicorp.com/blog/category/vault/', 'https://github.com/hashicorp/vault-plugin-secrets-gcp/pull/85', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12757', 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md'}
| null |
GHSA
|
GHSA-j9wr-49vq-rm5g
|
Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19
|
Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
- https://vaadin.com/security/cve-2021-31407
| null |
2021-10-08T21:24:56Z
|
2021-04-19T14:46:49Z
|
HIGH
| 8.6
|
{'CWE-402'}
|
{'https://github.com/vaadin/platform/security/advisories/GHSA-j9wr-49vq-rm5g', 'https://vaadin.com/security/cve-2021-31407', 'https://github.com/advisories/GHSA-j9wr-49vq-rm5g'}
| null |
GHSA
|
GHSA-7qg7-6g3g-8vxg
|
Malicious Package in bwffer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T15:46:18Z
|
2020-09-03T22:46:25Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1269', 'https://github.com/advisories/GHSA-7qg7-6g3g-8vxg'}
| null |
GHSA
|
GHSA-q99r-j969-6jwr
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300.
|
{'CVE-2019-1237'}
|
2021-03-29T20:56:04Z
|
2021-03-29T20:56:04Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://github.com/chakra-core/ChakraCore/commit/31f2588c7ba5b446bccf2769e9ecf4d444b73045', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1237', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1237', 'https://github.com/advisories/GHSA-q99r-j969-6jwr'}
| null |
GHSA
|
GHSA-77mr-wc79-m8j3
|
A validation function with the same name as a built-in validator can be called
|
If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`.
### Impact
Low impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway.
### Patches
This is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break.
### Workarounds
Inject your own email validator function.
### References
Reported by [Vikrant Singh Chauhan](mailto:vi@hackberry.xyz) via [huntr.dev](https://www.huntr.dev/).
[CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
* [Email us](mailto:phpmailer@synchromedia.co.uk).
|
{'CVE-2021-3603'}
|
2022-04-19T19:03:00Z
|
2021-06-22T15:18:02Z
|
LOW
| 0
|
{'CWE-74'}
|
{'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-77mr-wc79-m8j3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3603', 'https://www.huntr.dev/bounties/1-PHPMailer/PHPMailer/', 'https://github.com/advisories/GHSA-77mr-wc79-m8j3', 'https://github.com/PHPMailer/PHPMailer/commit/45f3c18dc6a2de1cb1bf49b9b249a9ee36a5f7f3', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603'}
| null |
GHSA
|
GHSA-hx78-272p-mqqh
|
Authorization Bypass in graphql-shield
|
Versions of `graphql-shield` prior to 6.0.6 are vulnerable to an Authorization Bypass. The rule caching option `no_cache` relies on keys generated by cryptographically insecure functions, which may cause rules to be incorrectly cached. This allows attackers to access information they should not have access to in case of a key collision.
## Recommendation
Upgrade to version 6.0.6 or later.
| null |
2021-09-29T16:26:51Z
|
2020-09-03T19:21:11Z
|
LOW
| 0
|
{'CWE-285'}
|
{'https://www.npmjs.com/advisories/1121', 'https://github.com/advisories/GHSA-hx78-272p-mqqh'}
| null |
GHSA
|
GHSA-wrvw-hg22-4m67
|
A potential Denial of Service issue in protobuf-java
|
## Summary
A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data.
Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz)
Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" users (typically Android) are not affected.
## Severity
[CVE-2021-22569](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22569) **High** - CVSS Score: 7.5, An implementation weakness in how unknown fields are parsed in Java. A small (~800 KB) malicious payload can occupy the parser for several minutes by creating large numbers of short-lived objects that cause frequent, repeated GC pauses.
## Proof of Concept
For reproduction details, please refer to the oss-fuzz issue that identifies the specific inputs that exercise this parsing weakness.
## Remediation and Mitigation
Please update to the latest available versions of the following packages:
- protobuf-java (3.16.1, 3.18.2, 3.19.2)
- protobuf-kotlin (3.18.2, 3.19.2)
- google-protobuf [JRuby gem only] (3.19.2)
|
{'CVE-2021-22569'}
|
2022-04-22T15:36:22Z
|
2022-01-07T22:31:44Z
|
HIGH
| 7.5
|
{'CWE-696'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'http://www.openwall.com/lists/oss-security/2022/01/12/7', 'http://www.openwall.com/lists/oss-security/2022/01/12/4', 'https://cloud.google.com/support/bulletins#gcp-2022-001', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22569', 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67', 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330', 'https://github.com/advisories/GHSA-wrvw-hg22-4m67'}
| null |
GHSA
|
GHSA-r96p-v3cr-gfv8
|
Cross-site Scripting (XSS) in @scullyio/scully
|
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
|
{'CVE-2020-28470'}
|
2021-07-29T20:42:20Z
|
2021-04-13T15:28:01Z
|
HIGH
| 7.3
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-r96p-v3cr-gfv8', 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470', 'https://github.com/scullyio/scully/pull/1182'}
| null |
GHSA
|
GHSA-5vm8-hhgr-jcjp
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the URL sanitization logic of the core parser for `form` elements. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or APIs, and then submitting the form. However, as TinyMCE does not allow forms to be submitted while editing, the vulnerability could only be triggered when the content was previewed or rendered outside of the editor. This impacts all users who are using TinyMCE 5.7.0 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.7.1 by improved URL sanitization logic.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.7.1 or higher
- Manually sanitize `form` URL attributes using a [TinyMCE node filter](https://www.tiny.cloud/docs/api/tinymce.html/tinymce.html.domparser/#addnodefilter).
- Disable `form` elements in your content using the [invalid_elements](https://www.tiny.cloud/docs/configure/content-filtering/#invalid_elements) setting.
#### Example: Sanitizing using a node filter
```js
editor.parser.addNodeFilter('form', function(nodes) {
nodes.forEach(function(node) {
if (node.attributes) {
node.attributes.forEach(function(attr) {
var name = attr.name;
var value = attr.value;
// Sanitize the attribute value here or remove it entirely
var sanitizedValue = ...;
node.attr(name, santizedValue);
});
}
});
});
```
#### Example: Using invalid_elements
```js
invalid_elements: 'form'
```
### Acknowledgements
Tiny Technologies would like to thank Mikhail Khramenkov at Solar Security Research Team for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes571/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-05-28T19:18:53Z
|
2021-05-28T19:18:53Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5vm8-hhgr-jcjp', 'https://github.com/advisories/GHSA-5vm8-hhgr-jcjp'}
| null |
GHSA
|
GHSA-5p34-5m6p-p58g
|
jackson-databind mishandles the interaction between serialization gadgets and typing
|
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
|
{'CVE-2020-9546'}
|
2021-10-21T21:13:15Z
|
2020-04-23T21:08:40Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/FasterXML/jackson-databind/issues/2631', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-5p34-5m6p-p58g', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9546', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E'}
| null |
GHSA
|
GHSA-gwfq-qwmp-x9xg
|
Cross-site scripting in Apache JSPWiki
|
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Page Revision History, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
|
{'CVE-2019-10087'}
|
2021-08-17T22:34:46Z
|
2019-10-11T18:41:50Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-gwfq-qwmp-x9xg', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10087', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10087'}
| null |
GHSA
|
GHSA-q4qv-fmwc-qxpx
|
SQL Injection in NukeViet
|
modules/banners/funcs/click.php in NukeViet before 4.3.04 has a SQL INSERT statement with raw header data from an HTTP request (e.g., Referer and User-Agent).
|
{'CVE-2019-7726'}
|
2021-06-22T15:24:55Z
|
2021-06-22T15:24:55Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-q4qv-fmwc-qxpx', 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7726', 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}
| null |
GHSA
|
GHSA-5gvm-hrw5-h6xf
|
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
|
The LDAP implementation in HiveServer2 in Apache Hive before 1.0.1 and 1.1.x before 1.1.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, mishandles simple unauthenticated and anonymous bind configurations, which allows remote attackers to bypass authentication via a crafted LDAP request.
|
{'CVE-2015-1772'}
|
2021-09-01T22:13:59Z
|
2019-03-14T15:40:44Z
|
HIGH
| 7.3
|
{'CWE-287'}
|
{'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCAOpgucy52yzNN1FaRcxwhZmx8ZtNRjmK6V0Bxk4svAD-R1q70Q@mail.gmail.com%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546', 'http://www.securitytracker.com/id/1034365', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1772', 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html', 'https://github.com/advisories/GHSA-5gvm-hrw5-h6xf'}
| null |
GHSA
|
GHSA-9cc3-5w85-pxvx
|
Cross Site Request Forgery in intelliants/subrion
|
Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.
|
{'CVE-2020-18326'}
|
2022-03-17T21:38:41Z
|
2022-03-05T00:00:45Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-9cc3-5w85-pxvx', 'https://github.com/hamm0nz/CVE-2020-18326', 'https://nvd.nist.gov/vuln/detail/CVE-2020-18326'}
| null |
GHSA
|
GHSA-6g8v-hpgw-h2v7
|
Prototype pollution in gsap
|
There is a prototype pollution vulnerability in gsap which affects all versions before 3.6.0.
|
{'CVE-2020-28478'}
|
2021-01-20T21:21:50Z
|
2021-01-20T21:21:50Z
|
HIGH
| 0
|
{'CWE-400'}
|
{'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js%23L147', 'https://github.com/greensock/GSAP/releases/tag/3.6.0', 'https://github.com/advisories/GHSA-6g8v-hpgw-h2v7', 'https://snyk.io/vuln/SNYK-JS-GSAP-1054614', 'https://www.npmjs.com/package/gsap/v/3.6.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28478', 'https://github.com/greensock/GSAP/blob/master/src/gsap-core.js#L150'}
| null |
GHSA
|
GHSA-78hj-86cr-6j2v
|
Improper Access Control in Lightning Network Daemon
|
Lightning Network Daemon (lnd) before 0.7 allows attackers to trigger loss of funds because of Incorrect Access Control.
|
{'CVE-2019-12999'}
|
2021-05-18T15:30:22Z
|
2021-05-18T15:30:22Z
|
HIGH
| 7.5
|
{'CWE-284'}
|
{'https://github.com/lightningnetwork/lnd/commits/master', 'https://github.com/lightninglabs/chanleakcheck', 'https://github.com/advisories/GHSA-78hj-86cr-6j2v', 'https://lists.linuxfoundation.org/pipermail/lightning-dev/2019-September/002174.html', 'https://github.com/lightningnetwork/lnd/releases/tag/v0.7.0-beta', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12999'}
| null |
GHSA
|
GHSA-c5qq-g673-5p49
|
Low severity vulnerability that affects puppet
|
telnet.rb in Puppet 2.7.x before 2.7.13 and Puppet Enterprise (PE) 1.2.x, 2.0.x, and 2.5.x before 2.5.1 allows local users to overwrite arbitrary files via a symlink attack on the NET::Telnet connection log (/tmp/out.log).
|
{'CVE-2012-1989'}
|
2021-09-08T21:29:19Z
|
2017-10-24T18:33:38Z
|
LOW
| 0
| null |
{'http://projects.puppetlabs.com/issues/13606', 'http://secunia.com/advisories/48743', 'https://hermes.opensuse.org/messages/15087408', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/74797', 'http://projects.puppetlabs.com/projects/1/wiki/Release_Notes#2.7.13', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1989', 'https://github.com/advisories/GHSA-c5qq-g673-5p49', 'http://lists.opensuse.org/opensuse-updates/2012-05/msg00012.html', 'http://secunia.com/advisories/49136', 'http://www.securityfocus.com/bid/52975', 'http://secunia.com/advisories/48748', 'http://puppetlabs.com/security/cve/cve-2012-1989/', 'http://ubuntu.com/usn/usn-1419-1'}
| null |
GHSA
|
GHSA-hpmr-prr2-cqc4
|
Remote Code Execution
|
models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution.
|
{'CVE-2019-11229'}
|
2022-04-12T22:01:59Z
|
2022-02-15T01:57:18Z
|
HIGH
| 7.5
|
{'CWE-94'}
|
{'http://packetstormsecurity.com/files/160833/Gitea-1.7.5-Remote-Code-Execution.html', 'https://github.com/go-gitea/gitea/pull/6593', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11229', 'https://github.com/advisories/GHSA-hpmr-prr2-cqc4', 'https://github.com/go-gitea/gitea/pull/6595', 'https://www.exploit-db.com/exploits/49383', 'https://github.com/go-gitea/gitea/releases/tag/v1.8.0-rc3', 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}
| null |
GHSA
|
GHSA-jggw-2q6g-c3m6
|
Out-of-bounds Read in OpenCV
|
An out-of-bounds read was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.0.25). Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy.
|
{'CVE-2019-19624'}
|
2021-10-12T22:22:58Z
|
2021-10-12T22:22:58Z
|
MODERATE
| 6.5
|
{'CWE-125'}
|
{'https://github.com/opencv/opencv/issues/14554', 'https://github.com/opencv/opencv-python/releases/tag/25', 'https://access.redhat.com/security/cve/cve-2019-19624', 'https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418', 'https://github.com/advisories/GHSA-jggw-2q6g-c3m6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19624'}
| null |
GHSA
|
GHSA-jvx5-rm6q-gx7p
|
Lack of access control on upoaded files
|
SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.
|
{'CVE-2019-12245'}
|
2021-08-18T22:29:09Z
|
2019-11-12T23:01:50Z
|
MODERATE
| 5.3
|
{'CWE-732'}
|
{'https://forum.silverstripe.org/c/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12245', 'https://www.silverstripe.org/download/security-releases/', 'https://www.silverstripe.org/download/security-releases/CVE-2019-12245', 'https://github.com/advisories/GHSA-jvx5-rm6q-gx7p'}
| null |
GHSA
|
GHSA-wp3c-xw9g-gpcg
|
Lack of validation in `SparseDenseCwiseMul`
|
### Impact
Due to lack of validation in `tf.raw_ops.SparseDenseCwiseMul`, an attacker can trigger denial of service via `CHECK`-fails or accesses to outside the bounds of heap allocated data:
```python
import tensorflow as tf
indices = tf.constant([], shape=[10, 0], dtype=tf.int64)
values = tf.constant([], shape=[0], dtype=tf.int64)
shape = tf.constant([0, 0], shape=[2], dtype=tf.int64)
dense = tf.constant([], shape=[0], dtype=tf.int64)
tf.raw_ops.SparseDenseCwiseMul(
sp_indices=indices, sp_values=values, sp_shape=shape, dense=dense)
```
Since the [implementation](https://github.com/tensorflow/tensorflow/blob/38178a2f7a681a7835bb0912702a134bfe3b4d84/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L68-L80) only validates the rank of the input arguments but no [constraints between dimensions](https://www.tensorflow.org/api_docs/python/tf/raw_ops/SparseDenseCwiseMul), an attacker can abuse them to trigger internal `CHECK` assertions (and cause program termination, denial of service) or to write to memory outside of bounds of heap allocated tensor buffers.
### Patches
We have patched the issue in GitHub commit [7ae2af34087fb4b5c8915279efd03da3b81028bc](https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29567'}
|
2021-05-21T14:25:16Z
|
2021-05-21T14:25:16Z
|
LOW
| 2.5
|
{'CWE-617'}
|
{'https://github.com/advisories/GHSA-wp3c-xw9g-gpcg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29567', 'https://github.com/tensorflow/tensorflow/commit/7ae2af34087fb4b5c8915279efd03da3b81028bc', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wp3c-xw9g-gpcg'}
| null |
GHSA
|
GHSA-9pr6-grf4-x2fr
|
Omniauth allows POST parameters to be stored in session
|
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
|
{'CVE-2017-18076'}
|
2022-04-25T22:27:19Z
|
2018-01-29T15:45:28Z
|
HIGH
| 7.5
| null |
{'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b', 'https://www.debian.org/security/2018/dsa-4109', 'https://github.com/advisories/GHSA-9pr6-grf4-x2fr', 'https://bugs.debian.org/888523', 'https://github.com/omniauth/omniauth/pull/867', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076'}
| null |
GHSA
|
GHSA-xvwv-6wvx-px9x
|
Moderate severity vulnerability that affects plone
|
By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website. (The specific url can be seen by inspecting the hotfix code, but we don't want to make it too easy for attackers by spelling it out here.)
|
{'CVE-2017-1000484'}
|
2021-09-22T17:58:21Z
|
2019-01-04T17:47:21Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://plone.org/security/hotfix/20171128/an-open-redirection-when-calling-a-specific-url', 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}
| null |
GHSA
|
GHSA-m4jx-6526-vvhm
|
Denial of service in github.com/nats-io/nats-server/server
|
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers - Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git.
|
{'CVE-2020-28466'}
|
2022-04-12T22:56:52Z
|
2022-02-15T01:57:18Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'http://www.openwall.com/lists/oss-security/2021/03/16/2', 'https://github.com/nats-io/nats-server/pull/1731', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28466', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMNATSIONATSSERVERSERVER-1042967', 'https://github.com/nats-io/nats-server/pull/1731/commits/2e3c22672936f4980d343fb1d328b38919e74796', 'http://www.openwall.com/lists/oss-security/2021/03/16/1', 'https://github.com/advisories/GHSA-m4jx-6526-vvhm'}
| null |
GHSA
|
GHSA-c84h-w6cr-5v8q
|
Markdown-supplied Shell Command Execution
|
### Impact
lookatme versions prior to 2.3.0 automatically loaded the built-in "terminal" and "file_loader" extensions. Users that use lookatme to render untrusted markdown may have malicious shell commands automatically run on their system.
### Patches
Users should upgrade to lookatme versions 2.3.0 or above.
### Workarounds
The `lookatme/contrib/terminal.py` and `lookatme/contrib/file_loader.py` files may be manually deleted. Additionally, it is always recommended to be aware of what is being rendered with lookatme.
### References
* https://github.com/d0c-s4vage/lookatme/pull/110
* https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [d0c-s4vage/lookatme](https://github.com/d0c-s4vage/lookatme)
|
{'CVE-2020-15271'}
|
2022-03-22T20:38:43Z
|
2020-10-27T17:59:54Z
|
CRITICAL
| 9.3
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-c84h-w6cr-5v8q', 'https://github.com/d0c-s4vage/lookatme/pull/110', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15271', 'https://pypi.org/project/lookatme/#history', 'https://github.com/d0c-s4vage/lookatme/commit/72fe36b784b234548d49dae60b840c37f0eb8d84', 'https://github.com/d0c-s4vage/lookatme/releases/tag/v2.3.0', 'https://github.com/d0c-s4vage/lookatme/security/advisories/GHSA-c84h-w6cr-5v8q'}
| null |
GHSA
|
GHSA-2qgv-2cv4-g4cg
|
Out-of-bounds write in ChakraCore
|
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848.
|
{'CVE-2020-0832'}
|
2021-07-28T18:57:27Z
|
2021-07-28T18:57:27Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-0832', 'https://github.com/advisories/GHSA-2qgv-2cv4-g4cg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'}
| null |
GHSA
|
GHSA-5gwh-g79j-vh4q
|
Command Injection in pdf-image
|
Versions of `pdf-image` before 2.0.0 are vulnerable to command injection. This vulnerability is exploitable if the attacker has control over the `pdfFilePath` variable passed into `pdf-image`.
## Recommendation
Update to version 2.0.0 or later.
|
{'CVE-2018-3757'}
|
2021-09-24T20:36:09Z
|
2020-09-01T20:44:52Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-5gwh-g79j-vh4q', 'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3757', 'https://hackerone.com/reports/340208', 'https://www.npmjs.com/advisories/670'}
| null |
GHSA
|
GHSA-x5rq-j2xg-h7qm
|
Regular Expression Denial of Service (ReDoS) in lodash
|
lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.
|
{'CVE-2019-1010266'}
|
2022-04-19T19:03:26Z
|
2019-07-19T16:13:07Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266', 'https://snyk.io/vuln/SNYK-JS-LODASH-73639', 'https://github.com/lodash/lodash/wiki/Changelog', 'https://github.com/advisories/GHSA-x5rq-j2xg-h7qm', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347', 'https://github.com/lodash/lodash/issues/3359'}
| null |
GHSA
|
GHSA-89ch-hqf9-rgp3
|
Outdated versions of JS libraries used with known security vulnerabilities
|
An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities.
|
{'CVE-2019-8121'}
|
2019-11-15T20:11:31Z
|
2019-11-12T22:59:28Z
|
HIGH
| 0
| null |
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8121.yaml', 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://github.com/advisories/GHSA-89ch-hqf9-rgp3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8121'}
| null |
GHSA
|
GHSA-r5hc-wm3g-hjw6
|
Server-Side Request Forgery (SSRF) in rudloff/alltube
|
### Impact
Releases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname.
### Patches
3.0.2 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
Part of the fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/148a171b240e7ceb076b9e198bef412de14ac55d/patches/youtube-dl-redirect.diff) to youtube-dl to prevent it from following HTTP redirects. If you are using the version of youtube-dl bundled with 3.0.2, it is already patched.
However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**.
### References
* https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d
* https://github.com/Rudloff/alltube/commit/1b099bb9836a3ce7c427a41722a7ab5a3d1c1b2d
* https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903/
* https://nvd.nist.gov/vuln/detail/CVE-2022-0768
* https://github.com/ytdl-org/youtube-dl/issues/30691
|
{'CVE-2022-0768'}
|
2022-03-18T20:42:55Z
|
2022-03-01T22:01:30Z
|
CRITICAL
| 9.1
|
{'CWE-918'}
|
{'https://huntr.dev/bounties/9b14cc46-ec08-4940-83cc-9f986b2a5903', 'https://github.com/rudloff/alltube/commit/148a171b240e7ceb076b9e198bef412de14ac55d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0768', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-r5hc-wm3g-hjw6', 'https://github.com/advisories/GHSA-r5hc-wm3g-hjw6', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}
| null |
GHSA
|
GHSA-4ffq-6g62-j4v4
|
Cross-Site Request Forgery in the Jenkins Claim plugin
|
A cross-site request forgery (CSRF) vulnerability in Jenkins Claim Plugin 2.18.1 and earlier allows attackers to change claims.
|
{'CVE-2021-21620'}
|
2021-06-16T17:29:43Z
|
2021-06-16T17:29:43Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21620', 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20(2)', 'https://github.com/advisories/GHSA-4ffq-6g62-j4v4'}
| null |
GHSA
|
GHSA-qjg4-w4c6-f6c6
|
Command injection in mversion
|
### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
### Patches
Patched by version 2.0.0. Previous releases are deprecated in npm.
### Workarounds
Make sure to escape git commit messages when using the commitMessage option for the update function.
|
{'CVE-2020-4059'}
|
2021-01-08T21:00:25Z
|
2020-06-18T19:23:17Z
|
HIGH
| 7.3
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-qjg4-w4c6-f6c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4059', 'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338', 'https://github.com/mikaelbr/mversion/security/advisories/GHSA-qjg4-w4c6-f6c6'}
| null |
GHSA
|
GHSA-5hx2-qx8j-qjqm
|
Overflow/crash in `tf.image.resize` when size is large
|
### Impact
If `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow.
```python
import tensorflow as tf
import numpy as np
tf.keras.layers.UpSampling2D(
size=1610637938,
data_format='channels_first',
interpolation='bilinear')(np.ones((5,1,1,1)))
```
The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process.
### Patches
We have patched the issue in GitHub commit [e5272d4204ff5b46136a1ef1204fc00597e21837](https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837) (merging [#51497](https://github.com/tensorflow/tensorflow/pull/51497)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46914).
|
{'CVE-2021-41199'}
|
2021-11-10T19:33:24Z
|
2021-11-10T19:33:24Z
|
MODERATE
| 5.5
|
{'CWE-190'}
|
{'https://github.com/advisories/GHSA-5hx2-qx8j-qjqm', 'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837', 'https://github.com/tensorflow/tensorflow/issues/46914', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41199'}
| null |
GHSA
|
GHSA-mvr2-9pj6-7w5j
|
Denial of Service in Google Guava
|
Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows remote attackers to conduct denial of service attacks against servers that depend on this library and deserialize attacker-provided data, because the AtomicDoubleArray class (when serialized with Java serialization) and the CompoundOrdering class (when serialized with GWT serialization) perform eager allocation without appropriate checks on what a client has sent and whether the data size is reasonable.
|
{'CVE-2018-10237'}
|
2021-10-21T21:28:40Z
|
2020-06-15T20:35:11Z
|
MODERATE
| 5.9
|
{'CWE-502', 'CWE-770'}
|
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rb3da574c34bc6bd37972d2266af3093b90d7e437460423c24f477919@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/3d5dbdd92ac9ceaef90e40f78599f9109f2f345252e0ac9d98e7e084@%3Cgitbox.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r2ea4e5e5aa8ad73b001a466c582899620961f47d77a40af712c1fdf9@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r43491b25b2e5c368c34b106a82eff910a5cea3e90de82ad75cc16540@%3Cdev.syncope.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://lists.apache.org/thread.html/r30e7d7b6bfa630dacc41649a0e96dad75165d50474c1241068aa0f94@%3Cissues.storm.apache.org%3E', 'https://lists.apache.org/thread.html/ra4f44016926dcb034b3b230280a18102062f94ae55b8a31bb92fed84@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rd0c8ec6e044aa2958dd0549ebf8ecead7f5968c9474ba73a504161b2@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r352e40ca9874d1beb4ad95403792adca7eb295e6bc3bd7b65fabcc21@%3Ccommits.samza.apache.org%3E', 'https://lists.apache.org/thread.html/ra8906723927aef2a599398c238eacfc845b74d812e0093ec2fc70a7d@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/google/guava/wiki/CVE-2018-10237', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10237', 'https://github.com/advisories/GHSA-mvr2-9pj6-7w5j', 'https://lists.apache.org/thread.html/19fa48533bc7ea1accf6b12746a74ed888ae6e49a5cf81ae4f807495@%3Ccommon-dev.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rdc56c15693c236e31e1e95f847b8e5e74fc0a05741d47488e7fc8c45@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/cc48fe770c45a74dc3b37ed0817393e0c96701fc49bc431ed922f3cc@%3Chdfs-dev.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rc78f6e84f82cc662860e96526d8ab969f34dbe12dc560e22d9d147a3@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/3ddd79c801edd99c0978e83dbe2168ebd36fd42acfa5dac38fb03dd6@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r38e2ab87528d3c904e7fac496e8fd766b9277656ff95b97d6b6b6dcd@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r27eb79a87a760335226dbfa6a7b7bffea539a535f8e80c41e482106d@%3Cdev.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r22c8173b804cd4a420c43064ba4e363d0022aa421008b1989f7354d4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r223bc776a077d0795786c38cbc6e7dd808fce1a9161b00ba9c0a5d55@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/33c6bccfeb7adf644d4d79894ca8f09370be6ed4b20632c2e228d085@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:2598', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://lists.apache.org/thread.html/r95799427b335807a4c54776908125c3e66597b65845ae50096d9278a@%3Cdev.cxf.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://groups.google.com/d/topic/guava-announce/xqWALw4W1vs/discussion', 'http://www.securitytracker.com/id/1041707', 'https://lists.apache.org/thread.html/rd01f5ff0164c468ec7abc96ff7646cea3cce6378da2e4aa29c6bcb95@%3Cgithub.arrow.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r3c3b33ee5bef0c67391d27a97cbfd89d44f328cf072b601b58d4e748@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r50fc0bcc734dd82e691d36d209258683141bfc0083739a77e56ad92d@%3Cdev.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r841c5e14e1b55281523ebcde661ece00b38a0569e00ef5e12bd5f6ba@%3Cissues.maven.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://lists.apache.org/thread.html/rc8467f357b943ceaa86f289f8bc1a5d1c7955b75d3bac1426f2d4ac1@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b@%3Cusers.kafka.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-45hc-r4fj-qj89
|
SQL injection in pagekit/pagekit
|
Pagekit is a modular and lightweight CMS built with Symfony components and Vue.js. The configAction in SettingsController allow user to set the order of comments listing. The allowed options are ASC and DESC. That config then get concatenated directly to the SQL query. Due to the fact that there wasnt any sanitizion before saving that config, it can lead to the SQL Injection vulnerability.
|
{'CVE-2021-44135'}
|
2022-04-18T21:49:19Z
|
2022-04-02T00:00:15Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-45hc-r4fj-qj89', 'https://huntr.dev/bounties/82f09b08-ceeb-4249-8855-b8bc718c4868/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44135'}
| null |
GHSA
|
GHSA-8mrf-g42m-5qc8
|
Downloads Resources over HTTP in dalek-browser-chrome-canary
|
Affected versions of `dalek-browser-chrome-canary` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome-canary`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10584'}
|
2021-01-08T19:09:15Z
|
2019-02-18T23:51:14Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/181', 'https://github.com/advisories/GHSA-8mrf-g42m-5qc8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10584', 'https://www.npmjs.com/advisories/181'}
| null |
GHSA
|
GHSA-m3ww-7hrp-gw9w
|
Drop of uninitialized memory in Ozone
|
An issue was discovered in the ozone crate through 2020-07-04 for Rust. Memory safety is violated because of the dropping of uninitialized memory.
|
{'CVE-2020-35878'}
|
2021-08-25T20:47:41Z
|
2021-08-25T20:47:41Z
|
CRITICAL
| 9.8
|
{'CWE-119', 'CWE-908'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35878', 'https://github.com/advisories/GHSA-m3ww-7hrp-gw9w'}
| null |
GHSA
|
GHSA-rhh9-cm65-3w54
|
Improper Authentication in Apache Hadoop
|
In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled.
|
{'CVE-2018-11765'}
|
2021-10-05T16:27:34Z
|
2021-04-30T17:29:30Z
|
HIGH
| 7.5
|
{'CWE-287'}
|
{'https://security.netapp.com/advisory/ntap-20201016-0005/', 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf9dfa8b77585c9227db9637552eebb2ab029255a0db4eb76c2b6c4cf@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbe25cac0f499374f8ae17a4a44a8404927b56de28d4c41940d82b7a4@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-rhh9-cm65-3w54', 'https://lists.apache.org/thread.html/rb241464d83baa3749b08cd3dabc8dba70a9a9027edcef3b5d4c24ef4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r2c7f899911a04164ed1707083fcd4135f8427e04778c87d83509b0da%40%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r46447f38ea8c89421614e9efd7de5e656186d35e10fc97cf88477a01@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r74825601e93582167eb7cdc2f764c74c9c6d8006fa90018562fda60f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/reea5eb8622afbfbfca46bc758f79db83d90a3263a906c4d1acba4971@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r79b15c5b66c6df175d01d7560adf0cd5c369129b9a161905e0339927@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}
| null |
GHSA
|
GHSA-prr5-pfr8-q9f3
|
Moderate severity vulnerability that affects Plone
|
ftp.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to read hidden folder contents via unspecified vectors.
|
{'CVE-2012-5503'}
|
2021-09-16T19:14:18Z
|
2018-07-23T19:52:35Z
|
MODERATE
| 0
| null |
{'https://plone.org/products/plone/security/advisories/20121106/19', 'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://nvd.nist.gov/vuln/detail/CVE-2012-5503', 'https://plone.org/products/plone-hotfix/releases/20121106', 'https://github.com/advisories/GHSA-prr5-pfr8-q9f3', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}
| null |
GHSA
|
GHSA-87xh-9q6h-r5cc
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free.
|
{'CVE-2021-45715'}
|
2022-01-07T16:08:56Z
|
2022-01-06T22:00:49Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-87xh-9q6h-r5cc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45715', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
| null |
GHSA
|
GHSA-3fv6-q5xv-fhpw
|
Malicious Package in coffee-project
|
Version 1.7.5 of `coffee-project` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.7.5 of this module is found installed you will want to replace it with a version before or after 1.7.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-01T19:50:23Z
|
2020-09-01T19:50:23Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/621', 'https://github.com/advisories/GHSA-3fv6-q5xv-fhpw'}
| null |
GHSA
|
GHSA-254q-rqmw-vx45
|
Exposure of Sensitive Information to an Unauthorized Actor in librenms
|
Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.
|
{'CVE-2022-0588'}
|
2022-02-24T13:05:39Z
|
2022-02-16T00:01:52Z
|
MODERATE
| 6.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-254q-rqmw-vx45', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://huntr.dev/bounties/caab3310-0d70-4c8a-8768-956f8dd3326d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0588', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html'}
| null |
GHSA
|
GHSA-35vc-w93w-75c2
|
JWT leak via Open Redirect in Programmatic access
|
### Impact
Using programmatic access on protected sites, one can get a signed login URL with pomerium_redirect_uri set to an arbitrary URL. Then, if the user has already logged into Pomerium, they will be redirected to the specified pomerium_redirect_uri with a JWT attached. This allows an outside attacker to get a signed login URL that, upon visiting it, will redirect a victim to the attacker’s site. This creates an issue of Open Redirect and, more seriously, JWT leakage.
With a leaked JWT, the attacker will be able to unveil the victim’s identity (.e.g. email address) by supplying the JWT to the authenticate service or verify.pomerium.com. In addition, if an application integrating Pomerium only verifies the iss claim and others but not the aud claim, the attacker will be able to access it as the victim.
### Patches
Patched in Pomerium v0.13.4
### For more information
If you have any questions or comments about this advisory
* Open an issue in [pomerium](http://github.com/pomerium/pomerium)
* Email us at [security@pomerium.com](mailto:security@pomerium.com)
|
{'CVE-2021-29651'}
|
2022-04-19T19:02:52Z
|
2021-05-21T16:24:34Z
|
HIGH
| 6.3
|
{'CWE-200', 'CWE-601'}
|
{'https://github.com/pomerium/pomerium/security/advisories/GHSA-35vc-w93w-75c2', 'https://github.com/pomerium/pomerium/pull/2049', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29651', 'https://github.com/advisories/GHSA-35vc-w93w-75c2'}
| null |
GHSA
|
GHSA-j85f-xw9x-ffwp
|
yetiforcecrm is vulnerable to Cross-site Scripting
|
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
|
{'CVE-2021-4121'}
|
2022-01-04T18:52:13Z
|
2021-12-17T20:00:12Z
|
MODERATE
| 6.4
|
{'CWE-79'}
|
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/6b5967198e43b6fbb3b2715b49c6cd5b12ce08c3', 'https://huntr.dev/bounties/6da878de-acdb-4b97-b9ff-9674c3f0881d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4121', 'https://github.com/advisories/GHSA-j85f-xw9x-ffwp'}
| null |
GHSA
|
GHSA-8rhc-48pp-52gr
|
High severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
|
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe deserialization of data received by its socket. This makes applications launched programmatically using the launcher API potentially vulnerable to arbitrary code execution by an attacker with access to any user account on the local machine. It does not affect apps run by spark-submit or spark-shell. The attacker would be able to execute code as the user that ran the Spark application. Users are encouraged to update to version 2.1.2, 2.2.0 or later.
|
{'CVE-2017-12612'}
|
2021-09-07T20:33:04Z
|
2018-11-09T17:43:25Z
|
HIGH
| 7.8
|
{'CWE-502'}
|
{'http://www.securityfocus.com/bid/100823', 'https://github.com/advisories/GHSA-8rhc-48pp-52gr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12612', 'https://mail-archives.apache.org/mod_mbox/spark-dev/201709.mbox/%3CCAEccTyy-1yYuhdNgkBUg0sr9NeaZSrBKkBePdTNZbxXZNTAR-g%40mail.gmail.com%3E'}
| null |
GHSA
|
GHSA-m6gj-h9gm-gw44
|
Incorrect Default Permissions
|
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
|
{'CVE-2020-24583'}
|
2021-03-18T20:30:13Z
|
2021-03-18T20:30:13Z
|
HIGH
| 7.5
|
{'CWE-276'}
|
{'https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24583', 'https://security.netapp.com/advisory/ntap-20200918-0004/', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.openwall.com/lists/oss-security/2020/09/01/2', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-m6gj-h9gm-gw44', 'https://usn.ubuntu.com/4479-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/', 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/', 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM', 'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU'}
| null |
GHSA
|
GHSA-xhqq-x44f-9fgg
|
Authentication Bypass in github.com/russellhaering/gosaml2
|
### Impact
Given a valid SAML Response, it may be possible for an attacker to mutate the XML document in such a way that gosaml2 will trust a different portion of the document than was signed.
Depending on the implementation of the Service Provider this enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the Identity Provider, or full authentication bypass.
### Patches
Service Providers utilizing gosaml2 should upgrade to v0.6.0 or greater.
|
{'CVE-2020-29509'}
|
2022-04-19T19:02:42Z
|
2022-02-11T23:58:09Z
|
CRITICAL
| 9.8
|
{'CWE-115'}
|
{'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg', 'https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-attributes.md', 'https://security.netapp.com/advisory/ntap-20210129-0006/', 'https://github.com/advisories/GHSA-xhqq-x44f-9fgg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29509'}
| null |
GHSA
|
GHSA-gwc9-348x-qwv2
|
Use after free in Wasmtime
|
There is a use after free vulnerability in Wasmtime when both running Wasm that uses `externref`s and enabling [epoch interruption](https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.epoch_interruption) in Wasmtime. If you are not explicitly enabling epoch interruption (it is disabled by default) then you are not affected. If you are explicitly disabling the Wasm reference types proposal (it is enabled by default) then you are also not affected.
The use after free is caused by Cranelift failing to emit stack maps when there are safepoints inside cold blocks. Cold blocks occur when epoch interruption is enabled. Cold blocks are emitted at the end of compiled functions, and change the order blocks are emitted versus defined. This reordering accidentally caused Cranelift to skip emitting some stack maps because it expected to emit the stack maps in block definition order, rather than block emission order. When Wasmtime would eventually collect garbage, it would fail to find live references on the stack because of the missing stack maps, think that they were unreferenced garbage, and therefore reclaim them. Then after the collection ended, the Wasm code could use the reclaimed-too-early references, which is a use after free.
This bug was discovered while extending our fuzz targets for `externref`s and GC in Wasmtime. The updated fuzz target thoroughly exercises these code paths and feature combinations now. We have also added a regression test for this bug. Released versions 0.34.2 and 0.35.2, which fix the vulnerability. We recommend all Wasmtime users upgrade to these patched versions. If upgrading is not an option for you at this time, you can avoid the vulnerability by either disabling the Wasm reference types proposal or by disabling epoch interruption if you were previously enabling it.
|
{'CVE-2022-24791'}
|
2022-04-12T23:16:18Z
|
2022-04-01T13:36:12Z
|
HIGH
| 8.1
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-gwc9-348x-qwv2', 'https://docs.rs/wasmtime/latest/wasmtime/struct.Config.html#method.epoch_interruption', 'https://github.com/WebAssembly/reference-types', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24791', 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-gwc9-348x-qwv2', 'https://github.com/bytecodealliance/wasmtime/commit/666c2554ea0e1728c35aa41178cf235920db888a'}
| null |
GHSA
|
GHSA-qq5v-f4c3-395c
|
Possible XSS when using SSO with the CLI in github.com/argoproj/argo-cd/v2
|
### Impact
When using SSO with the Argo CD CLI, a malicious SSO provider could have sent specially crafted error message that would result in XSS on the client by means of executing arbitrary JavaScript code.
We believe the exploitation of this vulnerability is only be possible when Argo CD is connected to a compromised/malicious SSO provider.
### Patches
A patch for this vulnerability is available with the v1.8.7 and v1.7.14 releases of Argo CD.
### Workarounds
* Do not use SSO with the CLI when you don't trust your SSO provider
If you have any questions or comments about this advisory:
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd`
### Credits
The issue was found during static code scanning with CodeQL and fixed by the Argo CD team. While we believed that a rogue SSO provider would pose a severe threat by itself, we fixed it like a regular bug.
The Argo CD team would like to thank Adam Gold of Snyk (https://snyk.io) for stepping up and classifying this correctly as a security issue and for his help in determining its severity. Also, Snyk kindly reserved and provided the CVE for this vulnerability.
We fully agree with Adam that this bug is a security vulnerability and justifies publishing a SA, to provide our community and users full transparancy.
|
{'CVE-2021-23347'}
|
2021-05-21T14:31:41Z
|
2021-05-21T14:31:41Z
|
MODERATE
| 4.7
|
{'CWE-79'}
|
{'https://github.com/argoproj/argo-cd/security/advisories/GHSA-qq5v-f4c3-395c', 'https://github.com/advisories/GHSA-qq5v-f4c3-395c'}
| null |
GHSA
|
GHSA-29v9-2fpx-j5g9
|
CSV Injection vulnerability with exported contact lists in Mautic
|
### Impact
Mautic versions before 2.13.0 had a vulnerability that allowed a CSV injection with exported contact lists - https://www.owasp.org/index.php/CSV_Injection.
### Patches
Update to 2.13.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](mailto:security@mautic.org)
|
{'CVE-2018-8092'}
|
2021-01-19T21:16:29Z
|
2021-01-19T21:16:29Z
|
MODERATE
| 9.8
|
{'CWE-1236'}
|
{'https://github.com/advisories/GHSA-29v9-2fpx-j5g9', 'https://github.com/mautic/mautic/security/advisories/GHSA-29v9-2fpx-j5g9', 'https://github.com/mautic/mautic/commit/cbc49f0ac4cc7e3acc07f2a85c079b2f85225a6b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8092', 'https://github.com/mautic/mautic/releases/tag/2.13.0'}
| null |
GHSA
|
GHSA-3v56-q6r6-4gcw
|
Insecure Inherited Permissions in neoan3-apps/template
|
### Impact
Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously.
In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible.
### Patches
Version 1.1.1 has addressed this vulnerability.
```php
$params = [
'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1
'value' => 'My website'
]
TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated)
Template::embrace('<h1>{{reverse(value)}}</h1>', $params);
```
### Workarounds
Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade.
### References
As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)
|
{'CVE-2021-41170'}
|
2021-11-17T21:25:14Z
|
2021-11-10T16:41:08Z
|
HIGH
| 7.5
|
{'CWE-732', 'CWE-74', 'CWE-277'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41170', 'https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw', 'https://github.com/sroehrl/neoan3-template/issues/8', 'https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934', 'https://github.com/advisories/GHSA-3v56-q6r6-4gcw'}
| null |
GHSA
|
GHSA-8jrj-525p-826v
|
XStream is vulnerable to an Arbitrary Code Execution attack
|
### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39145](https://x-stream.github.io/CVE-2021-39145.html).
### Credits
李安诺 (Li4n0) from Alibaba Cloud Security Team and Smi1e of DBAPPSecurity WEBIN Lab found and reported the issue independently to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-39145'}
|
2022-04-22T15:43:33Z
|
2021-08-25T14:48:12Z
|
HIGH
| 8.5
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v', 'https://www.debian.org/security/2021/dsa-5004', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://x-stream.github.io/CVE-2021-39145.html', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/advisories/GHSA-8jrj-525p-826v', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39145', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-gh87-6jr3-8q47
|
Null pointer deference in cache
|
An issue was discovered in the cache crate through 2021-01-01 for Rust. A raw pointer is dereferenced.
|
{'CVE-2021-25903'}
|
2021-08-25T20:52:57Z
|
2021-08-25T20:52:57Z
|
HIGH
| 7.5
|
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-gh87-6jr3-8q47', 'https://github.com/krl/cache/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25903', 'https://rustsec.org/advisories/RUSTSEC-2021-0006.html'}
| null |
GHSA
|
GHSA-hwj9-h5mp-3pm3
|
Regular Expression Denial of Service in postcss
|
The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing.
|
{'CVE-2021-23368'}
|
2021-06-15T15:12:14Z
|
2021-05-10T15:29:24Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5', 'https://lists.apache.org/thread.html/r5acd89f3827ad9a9cad6d24ed93e377f7114867cd98cfba616c6e013@%3Ccommits.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r8def971a66cf3e375178fbee752e1b04a812a047cc478ad292007e33@%3Cdev.myfaces.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23368', 'https://lists.apache.org/thread.html/r16e295b4f02d81b79981237d602cb0b9e59709bafaa73ac98be7cef1@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/rad5af2044afb51668b1008b389ac815a28ecea9eb75ae2cab5a00ebb@%3Ccommits.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1090595', 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795', 'https://github.com/advisories/GHSA-hwj9-h5mp-3pm3', 'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4'}
| null |
GHSA
|
GHSA-3j58-p785-f27x
|
Cross-site Scripting in microweber
|
There is a reflected cross sitem scripting attack in microweber via url parameters.
|
{'CVE-2022-0378'}
|
2022-02-03T20:34:29Z
|
2022-01-28T22:15:24Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/529b65c0-5be7-49d4-9419-f905b8153d31', 'https://github.com/microweber/microweber/commit/fc7e1a026735b93f0e0047700d08c44954fce9ce', 'https://github.com/advisories/GHSA-3j58-p785-f27x', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0378'}
| null |
GHSA
|
GHSA-85cp-p426-42f5
|
Prototype Pollution in deep-get-set
|
All versions of package deep-get-set prior to version 1.1.1 are vulnerable to Prototype Pollution via the main function.
|
{'CVE-2020-7715'}
|
2021-07-29T22:06:52Z
|
2021-05-06T18:12:59Z
|
HIGH
| 9.8
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7715', 'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666', 'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4', 'https://github.com/advisories/GHSA-85cp-p426-42f5'}
| null |
GHSA
|
GHSA-f5w6-r7rg-mcgq
|
Regular Expression Denial of Service in validator
|
Versions of `validator` prior to 3.22.1 are affected by a regular expression denial of service vulnerability in the `isURL` method.
## Recommendation
Update to version 3.22.1 or later.
|
{'CVE-2014-8882'}
|
2021-09-23T21:03:26Z
|
2020-08-31T23:01:13Z
|
HIGH
| 7.5
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8882', 'https://www.npmjs.com/advisories/42', 'https://snyk.io/vuln/npm:validator:20130705', 'https://github.com/advisories/GHSA-f5w6-r7rg-mcgq', 'https://github.com/chriso/validator.js/issues/152#issuecomment-48107184'}
| null |
GHSA
|
GHSA-45w7-7g63-2m5w
|
Drop of uninitialized memory in stack_dst
|
Affected versions of stack_dst used a push_inner function that increased the internal length of the array and then called val.clone(). If the val.clone() call panics, the stack could drop an already dropped element or drop uninitialized memory. This issue was fixed in 2a4d538 by increasing the length of the array after elements are cloned.
|
{'CVE-2021-28035'}
|
2021-09-01T18:30:55Z
|
2021-09-01T18:30:55Z
|
CRITICAL
| 9.8
|
{'CWE-908'}
|
{'https://github.com/thepowersgang/stack_dst-rs/commit/2a4d538', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28035', 'https://github.com/thepowersgang/stack_dst-rs/issues/5', 'https://rustsec.org/advisories/RUSTSEC-2021-0033.html', 'https://github.com/advisories/GHSA-45w7-7g63-2m5w'}
| null |
GHSA
|
GHSA-38r5-34mr-mvm7
|
"catalog's registry v2 api exposed on unauthenticated path in Harbor"
|
### **Impact**
Javier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API.
The catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it requires to be authenticated as an admin.
"GET /v2/_catalog"
However, the authorization can be bypassed by using the following path
"GET /v2/_catalog/"
### **Patches**
If your product uses the affected releases of Harbor, update to either version v2.1.2 or v2.0.5 to fix this issue immediately
https://github.com/goharbor/harbor/releases/tag/v2.1.2
https://github.com/goharbor/harbor/releases/tag/v2.0.5
### **Workarounds**
If you cannot access a patched release, it can be mitigated by disabling that API. For example, redirecting it to a 404 sink hole in the ingress.
### **For more information**
If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io
View our security policy at https://github.com/goharbor/harbor/security/policy
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29662
|
{'CVE-2020-29662'}
|
2022-02-12T00:01:58Z
|
2022-02-12T00:01:51Z
|
MODERATE
| 5.3
|
{'CWE-287', 'CWE-319'}
|
{'https://github.com/goharbor/harbor/releases/tag/v2.0.5', 'https://github.com/goharbor/harbor/releases/tag/v2.1.2', 'https://github.com/goharbor/harbor/pull/13676', 'https://github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7', 'https://github.com/goharbor/harbor/commit/3481722f140e1fdf6e6d290b0cd5c86e509feed4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29662', 'https://github.com/advisories/GHSA-38r5-34mr-mvm7', 'https://github.com/goharbor/harbor/commit/c7c409a8e5a8b3fd42841dda84759c9d77977853'}
| null |
GHSA
|
GHSA-vfj6-275q-4pvm
|
graphite.composer.views.send_email vulnerable to SSRF
|
### Impact
send_email in graphite-web/webapp/graphite/composer/views.py in Graphite through 1.1.5 is vulnerable to SSRF. The vulnerable SSRF endpoint can be used by an attacker to have the Graphite web server request any resource. The response to this SSRF request is encoded into an image file and then sent to an e-mail address that can be supplied by the attacker. Thus, an attacker can exfiltrate any information. Email will be send through SMTP server configured in Graphite, by default it's 'localhost'
### Patches
Problem was patched in Graphite-web 1.1.6. Also patches was released for graphite-web [1.0.x](https://github.com/graphite-project/graphite-web/pull/2501) and [0.9.x](https://github.com/graphite-project/graphite-web/pull/2500), and we'll discuss releases of non-supported branches later.
### Workarounds
You can manually remove function `send_email` from file `webapp/graphite/composer/views.py`. This function are not in use and will not affect your Graphite installation.
### References
For more information check this graphite-web Github issue #2008
### For more information
If you have any questions or comments about this advisory:
* Add comment in [issue #2008](https://github.com/graphite-project/graphite-web/issues/2008)
|
{'CVE-2017-18638'}
|
2022-04-19T19:02:27Z
|
2019-10-25T13:55:20Z
|
HIGH
| 7.5
|
{'CWE-918'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18638', 'https://blog.orange.tw/2017/07/how-i-chained-4-vulnerabilities-on.html#second-bug-internal-graphite-ssrf', 'https://github.com/graphite-project/graphite-web/commit/71726a0e41a5263f49b973a7b856505a5b931c1f', 'https://github.com/graphite-project/graphite-web/security/advisories/GHSA-vfj6-275q-4pvm', 'https://github.com/advisories/GHSA-vfj6-275q-4pvm', 'https://www.youtube.com/watch?v=ds4Gp4xoaeA', 'https://github.com/graphite-project/graphite-web/pull/2499', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00030.html', 'https://github.com/graphite-project/graphite-web/issues/2008'}
| null |
GHSA
|
GHSA-xm3x-787m-p66r
|
Cross-site Scripting in ShowDoc
|
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload.
|
{'CVE-2022-0964'}
|
2022-03-29T21:23:07Z
|
2022-03-16T00:00:46Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-xm3x-787m-p66r', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0964', 'https://huntr.dev/bounties/dbe39998-8eb7-46ea-997f-7b27f6f16ea0', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
| null |
GHSA
|
GHSA-7ww4-c3mj-93cf
|
Downloads Resources over HTTP in pm2-kafka
|
Affected versions of `pm2-kafka` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pm2-kafka`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10693'}
|
2021-01-14T15:56:20Z
|
2020-09-01T16:16:33Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10693', 'https://github.com/advisories/GHSA-7ww4-c3mj-93cf', 'https://www.npmjs.com/advisories/299', 'https://nodesecurity.io/advisories/299'}
| null |
GHSA
|
GHSA-62gw-3rmj-wmp2
|
High severity vulnerability that affects System.Management.Automation
|
## Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in .NET Core
# Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in PowerShell Core
## Executive Summary
A denial of service vulnerability exists when PowerShell Core or .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a PowerShell Core scripts.
The update addresses the vulnerability by correcting how the .NET Core handles web requests.
System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).)
## Discussion
Please [open a support question](https://github.com/PowerShell/PowerShell/issues/new?assignees=&labels=Issue-Question&template=Support_Question.md&title=Support+Question) to discussion the PowerShell aspects of this advisory.
Please use dotnet/announcements#121 for discussion of the .NET aspects this advisory.
## <a name="affected-software">Affected Software</a>
The vulnerability affects PowerShell Core prior to the following versions:
| PowerShell Core Version | Fixed in |
|-------------------------|-------------------|
| 6.1 | 6.1.6 |
| 6.2 | 6.2.3 |
| 7.0 | unaffected |
## Advisory FAQ
### How do I know if I am affected?
If all of the following are true:
1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected.
1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`.
### How do I update to an unaffected version?
Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core.
## Other Information
### Reporting Security Issues
If you have found a potential security issue in PowerShell Core,
please email details to secure@microsoft.com.
### Support
You can ask questions about this issue on GitHub in the PowerShell organization.
This is located at https://github.com/PowerShell/.
The Announcements repo (https://github.com/PowerShell/Announcements)
will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions.
### What if the update breaks my script or module?
You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core.
This should be treated as a temporary measure.
Therefore, the script or module should be updated to work with the patched version of PowerShell Core.
### Acknowledgments
Paul Ryman of VMware Sydney Engineering Team
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure.
See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information.
### External Links
[CVE-2019-1301](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301)
### Revisions
V1.0 (September 12, 2019): Advisory published.
*Version 1.0*
*Last Updated 2019-09-12*
|
{'CVE-2019-1301'}
|
2021-09-01T22:36:40Z
|
2019-09-13T13:25:47Z
|
HIGH
| 7.5
| null |
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301', 'https://github.com/advisories/GHSA-62gw-3rmj-wmp2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1301', 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-62gw-3rmj-wmp2'}
| null |
GHSA
|
GHSA-cpx9-4rwv-486v
|
Hessian protocol configuration vulnerability in Apache Dubbo
|
In Apache Dubbo, users may choose to use the Hessian protocol. The Hessian protocol is implemented on top of HTTP and passes the body of a POST request directly to a HessianSkeleton: New HessianSkeleton are created without any configuration of the serialization factory and therefore without applying the dubbo properties for applying allowed or blocked type lists. In addition, the generic service is always exposed and therefore attackers do not need to figure out a valid service/method name pair. This is fixed in 2.7.13, 2.6.10.1
|
{'CVE-2021-36163'}
|
2021-09-15T18:29:58Z
|
2021-09-08T20:14:14Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/apache/dubbo/pull/8238', 'https://lists.apache.org/thread.html/r8d0adc057bb15a37199502cc366f4b1164c9c536ce28e4defdb428c0%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36163', 'https://github.com/advisories/GHSA-cpx9-4rwv-486v', 'https://github.com/apache/dubbo/releases/tag/dubbo-2.6.10.1', 'https://github.com/apache/dubbo/releases/tag/dubbo-2.7.13'}
| null |
GHSA
|
GHSA-6v6p-g8cg-2hgg
|
Improper Certificate Validation in node-sass affects eZ Platform
|
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsystems/ezplatform-page-builder.
| null |
2022-04-05T21:38:32Z
|
2022-04-01T12:56:28Z
|
MODERATE
| 5.3
|
{'CWE-295'}
|
{'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass', 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg', 'https://github.com/ezsystems/ezplatform-admin-ui/releases/tag/v1.5.27', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025', 'https://github.com/advisories/GHSA-r8f7-9pfq-mjmv', 'https://github.com/advisories/GHSA-6v6p-g8cg-2hgg'}
| null |
GHSA
|
GHSA-vxh4-x6gv-mphf
|
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
|
Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat.
|
{'CVE-2022-0245'}
|
2022-01-25T20:48:53Z
|
2022-01-21T23:25:45Z
|
MODERATE
| 4.3
|
{'CWE-352'}
|
{'https://github.com/advisories/GHSA-vxh4-x6gv-mphf', 'https://github.com/livehelperchat/livehelperchat/commit/c2fa19afeb8b1ea927fea3fd452515c95f289fb9', 'https://huntr.dev/bounties/6a6aca72-32b7-45b3-a8ba-9b400b2d669c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0245'}
| null |
GHSA
|
GHSA-9xgh-xgw5-p5cw
|
Hijacked Environment Variables in nodemssql
|
The `nodemssql` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16057'}
|
2021-01-08T19:01:37Z
|
2018-11-09T17:42:54Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/484', 'https://nodesecurity.io/advisories/484', 'https://github.com/advisories/GHSA-9xgh-xgw5-p5cw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16057'}
| null |
GHSA
|
GHSA-7fpw-cfc4-3p2c
|
High severity vulnerability that affects passport-wsfed-saml2
|
A vulnerability has been discovered in the Auth0 passport-wsfed-saml2 library affecting versions < 3.0.5. This vulnerability allows an attacker to impersonate another user and potentially elevate their privileges if the SAML identity provider does not sign the full SAML response (e.g., only signs the assertion within the response).
|
{'CVE-2017-16897'}
|
2021-09-02T21:17:06Z
|
2017-12-28T22:51:45Z
|
HIGH
| 8.1
|
{'CWE-290'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16897', 'https://auth0.com/docs/security/bulletins/cve-2017-16897', 'https://github.com/advisories/GHSA-7fpw-cfc4-3p2c'}
| null |
GHSA
|
GHSA-3988-h75v-hwf6
|
Arbitrary shell execution
|
A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option
| null |
2022-03-26T00:32:01Z
|
2022-03-26T00:06:45Z
|
HIGH
| 0
| null |
{'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1', 'https://github.com/advisories/GHSA-3988-h75v-hwf6', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml'}
| null |
GHSA
|
GHSA-vh2r-x97c-2vpr
|
SQL Injection in Jeecg-boot
|
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.
|
{'CVE-2022-22880'}
|
2022-02-26T00:52:37Z
|
2022-02-17T00:00:26Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22880', 'https://github.com/advisories/GHSA-vh2r-x97c-2vpr', 'https://github.com/jeecgboot/jeecg-boot/issues/3347'}
| null |
GHSA
|
GHSA-fr76-2wp8-fp92
|
Insecure template handling in Express-handlebars
|
Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted in that only files with existing extentions (i.e. file.extension) can be included, files that lack an extension will have .handlebars appended to them. For complete details refer to the referenced GHSL-2021-018 report. Notes in documentation have been added to help users avoid this potential information exposure vulnerability.
A fix is discussed in https://github.com/express-handlebars/express-handlebars/pull/163
|
{'CVE-2021-32820'}
|
2022-02-10T23:35:42Z
|
2022-02-10T23:35:21Z
|
HIGH
| 8.6
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-fr76-2wp8-fp92', 'https://github.com/express-handlebars/express-handlebars#danger-', 'https://github.com/express-handlebars/express-handlebars/pull/163', 'https://www.npmjs.com/package/express-handlebars', 'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72', 'https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820', 'https://github.com/express-handlebars/express-handlebars/blob/78c47a235c4ad7bc2674bddd8ec2721567ed8c72/README.md#danger-'}
| null |
GHSA
|
GHSA-jphm-g89m-v42p
|
Path traversal in Grafana Cortex
|
An issue was discovered in Grafana Cortex through 1.9.0. The header value X-Scope-OrgID is used to construct file paths for rules files, and if crafted to conduct directory traversal such as ae ../../sensitive/path/in/deployment pathname, then Cortex will attempt to parse a rules file at that location and include some of the contents in the error message. (Other Cortex API requests can also be sent a malicious OrgID header, e.g., tricking the ingester into writing metrics to a different location, but the effect is nuisance rather than information disclosure.)
|
{'CVE-2021-36157'}
|
2021-09-02T21:59:50Z
|
2021-09-02T21:59:50Z
|
MODERATE
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-jphm-g89m-v42p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36157', 'https://grafana.com/docs/grafana/latest/release-notes/', 'https://github.com/cortexproject/cortex/commit/d9e1f81f40c607b9e97c2fc6db70ae54679917c4', 'https://github.com/cortexproject/cortex/pull/4375'}
| null |
GHSA
|
GHSA-qr2j-wrhx-4829
|
Improper Input Validation
|
In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.
|
{'CVE-2018-16733'}
|
2021-05-18T18:38:06Z
|
2021-05-18T18:38:06Z
|
MODERATE
| 7.5
|
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16733', 'https://github.com/advisories/GHSA-qr2j-wrhx-4829', 'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'}
| null |
GHSA
|
GHSA-qpg4-4w7w-2mq5
|
Authentication and extension bypass in Faye
|
On 20 April 2020 it was reported to me that the potential for authentication
bypass exists in [Faye][1]'s extension system. This vulnerability has existed in
the Node.js and Ruby versions of the server since version 0.5.0, when extensions
were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and
1.2.5, which we are releasing today.
The vulnerability allows any client to bypass checks put in place by server-side
extensions, by appending extra segments to the message channel. For example, the
Faye [extension docs][2] suggest that users implement access control for
subscriptions by checking incoming messages for the `/meta/subscribe` channel,
for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel === '/meta/subscribe') {
if (message.ext.authToken !== 'my super secret password') {
message.error = 'Invalid auth token';
}
}
callback(message);
}
});
```
A bug in the server's code for recognising the special `/meta/*` channels, which
trigger connection and subscription events, means that a client can bypass this
check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`:
```json
{
"channel": "/meta/subscribe/x",
"clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3",
"subscription": "/foo"
}
```
This message will not be checked by the above extension, as it checks the
message's channel is exactly equal to `/meta/subscribe`. But it will still be
processed as a subscription request by the server, so the client becomes
subscribed to the channel `/foo` without supplying the necessary credentials.
The vulnerability is caused by the way the Faye server recognises meta channels.
It will treat a message to any channel that's a prefix-match for one of the
special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`,
`/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for
that channel. So, a message to `/meta/subscribe/x` is still processed as a
subscription request, for example.
An authentication bypass for subscription requests is the most serious effect of
this but all other meta channels are susceptible to similar manipulation.
This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5.
These should be drop-in replacements for prior versions and you should upgrade
immediately if you are running any prior version.
If you are unable to install one of these versions, you can make your extensions
catch all messages the server would process by checking the channel _begins_
with the expected channel name, for example:
```js
server.addExtension({
incoming: function(message, callback) {
if (message.channel.startsWith('/meta/subscribe')) {
// authentication logic
}
callback(message);
}
});
```
[1]: https://faye.jcoglan.com/
[2]: https://faye.jcoglan.com/node/extensions.html
|
{'CVE-2020-11020'}
|
2021-01-08T20:21:05Z
|
2020-04-29T17:41:15Z
|
HIGH
| 8.5
|
{'CWE-287'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11020', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5', 'https://github.com/advisories/GHSA-qpg4-4w7w-2mq5'}
| null |
GHSA
|
GHSA-h6q6-9hqw-rwfv
|
Misinterpretation of malicious XML input
|
### Impact
xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents.
This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to 0.5.0 (once it is released)
### Workarounds
Downstream applications can validate the input and reject the maliciously crafted documents.
### References
Similar to this one reported on the Go standard library:
- https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom)
* Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom`
|
{'CVE-2021-21366'}
|
2022-04-19T19:02:49Z
|
2021-03-12T22:39:39Z
|
LOW
| 0
|
{'CWE-115', 'CWE-436'}
|
{'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv', 'https://www.npmjs.com/package/xmldom', 'https://github.com/advisories/GHSA-h6q6-9hqw-rwfv'}
| null |
GHSA
|
GHSA-74cv-f58x-f9wf
|
XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights
|
### Impact
The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21343](https://x-stream.github.io/CVE-2021-21343.html).
### Credits
钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2021-21343'}
|
2022-02-08T21:32:56Z
|
2021-03-22T23:28:13Z
|
MODERATE
| 5.3
|
{'CWE-502', 'CWE-73'}
|
{'https://x-stream.github.io/CVE-2021-21343.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf', 'https://x-stream.github.io/security.html#workaround', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21343', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-74cv-f58x-f9wf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-85p9-j7c9-v4gr
|
Insufficiently Protected Credentials
|
The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.
|
{'CVE-2019-10214'}
|
2022-04-12T22:01:11Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 6.4
|
{'CWE-522'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10214', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00035.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1732508', 'https://github.com/containers/image/pull/669', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10214', 'https://github.com/containers/image/pull/655', 'https://github.com/advisories/GHSA-85p9-j7c9-v4gr'}
| null |
GHSA
|
GHSA-wmj9-xh24-j4gx
|
Cross-site Scripting in microweber
|
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
|
{'CVE-2022-0558'}
|
2022-02-23T21:58:40Z
|
2022-02-11T00:00:47Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0558', 'https://github.com/advisories/GHSA-wmj9-xh24-j4gx', 'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'}
| null |
GHSA
|
GHSA-29gp-92wp-94q8
|
Remote Code Execution in react-dev-utils
|
`react-dev-utils` on Windows is vulnerable to remote code execution.
## Recommendation
Update to one of the follow versions, depending on the release line that you are using.
- 1.0.4
- 2.0.2
- 3.1.2
- 4.2.2
- 5.0.2
- 6.0.0-next.a671462c
|
{'CVE-2018-6342'}
|
2021-01-08T20:09:18Z
|
2019-01-04T17:41:20Z
|
HIGH
| 0
|
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-29gp-92wp-94q8', 'https://github.com/facebook/create-react-app/pull/4866', 'https://www.npmjs.com/advisories/695', 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}
| null |
GHSA
|
GHSA-m9r7-q9fc-qwx5
|
Malicious Package in maybemaliciouspackage
|
All versions of `maybemaliciouspackage` contain malicious code. The package prints the system's SSH keys to the console as a postinstall script.
## Recommendation
Remove the package from your environment. There are no further signs of compromise.
| null |
2021-09-30T17:43:48Z
|
2020-09-03T17:22:24Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1042', 'https://github.com/advisories/GHSA-m9r7-q9fc-qwx5'}
| null |
GHSA
|
GHSA-6c7v-2f49-8h26
|
Cleartext Transmission of Sensitive Information in Django
|
An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.
|
{'CVE-2019-12781'}
|
2021-05-10T21:37:52Z
|
2019-07-03T20:37:25Z
|
MODERATE
| 5.3
|
{'CWE-319'}
|
{'https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ', 'https://usn.ubuntu.com/4043-1/', 'https://www.djangoproject.com/weblog/2019/jul/01/security-releases/', 'http://www.openwall.com/lists/oss-security/2019/07/01/3', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12781', 'https://security.netapp.com/advisory/ntap-20190705-0002/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://www.debian.org/security/2019/dsa-4476', 'http://www.securityfocus.com/bid/109018', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://github.com/advisories/GHSA-6c7v-2f49-8h26', 'https://seclists.org/bugtraq/2019/Jul/10'}
| null |
GHSA
|
GHSA-683w-6h9j-57wq
|
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
|
In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS.
|
{'CVE-2016-10006'}
|
2021-09-01T22:41:28Z
|
2018-10-18T17:21:47Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/nahsra/antisamy/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10006', 'http://www.securityfocus.com/bid/95101', 'https://github.com/advisories/GHSA-683w-6h9j-57wq', 'http://www.securitytracker.com/id/1037532'}
| null |
GHSA
|
GHSA-hqv3-qq72-78cv
|
Directory Traversal in startserver
|
All versions of package startserver are vulnerable to Directory Traversal due to missing sanitization.
|
{'CVE-2021-23430'}
|
2021-09-02T17:09:40Z
|
2021-09-02T17:09:40Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/xudafeng/startserver/blob/bef0c4e4d21da42a40ce87cf25fd54ac8d8cb2d8/lib/index.js%23L71', 'https://github.com/advisories/GHSA-hqv3-qq72-78cv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23430', 'https://snyk.io/vuln/SNYK-JS-STARTSERVER-1296388'}
| null |
GHSA
|
GHSA-jxqq-cqm6-pfq9
|
Regular Expression Denial of Service in slug
|
Affected versions of `slug` are vulnerable to a regular expression denial of service when parsing untrusted user input.
The issue is low severity, as it takes 50,000 characters to cause the event loop to block for 2 seconds,
About 50k characters can block the event loop for 2 seconds.
## Recommendation
Update to version 0.9.2 or later.
|
{'CVE-2017-16117'}
|
2021-01-08T18:32:29Z
|
2018-07-24T20:06:45Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/dodo/node-slug/issues/82', 'https://github.com/advisories/GHSA-jxqq-cqm6-pfq9', 'https://nodesecurity.io/advisories/537', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16117', 'https://www.npmjs.com/advisories/537'}
| null |
GHSA
|
GHSA-g87g-4x3w-f8jp
|
Directory Traversal in serverwzl
|
Affected versions of `serverwzl` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16105'}
|
2021-01-14T15:54:57Z
|
2020-09-01T16:51:28Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16105', 'https://github.com/advisories/GHSA-g87g-4x3w-f8jp', 'https://www.npmjs.com/advisories/363', 'https://nodesecurity.io/advisories/363', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl'}
| null |
GHSA
|
GHSA-mg5p-95m9-rmfp
|
Arbitrary file write in actionpack-page_caching gem
|
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
|
{'CVE-2020-8159'}
|
2022-04-07T15:10:56Z
|
2020-05-13T16:28:46Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://github.com/advisories/GHSA-mg5p-95m9-rmfp'}
| null |
GHSA
|
GHSA-qxrj-x7rm-2h49
|
Malicious Package in dhkey
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T21:01:14Z
|
2020-09-03T17:05:59Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-qxrj-x7rm-2h49', 'https://www.npmjs.com/advisories/1394'}
| null |
GHSA
|
GHSA-pc3m-v286-2jwj
|
Moderate severity vulnerability that affects actionview
|
Cross-site scripting (XSS) vulnerability in Action View in Ruby on Rails 3.x before 3.2.22.3, 4.x before 4.2.7.1, and 5.x before 5.0.0.1 might allow remote attackers to inject arbitrary web script or HTML via text declared as "HTML safe" and used as attribute values in tag handlers.
|
{'CVE-2016-6316'}
|
2021-09-16T18:54:09Z
|
2017-10-24T18:33:35Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://puppet.com/security/cve/cve-2016-6316', 'http://www.debian.org/security/2016/dsa-3651', 'http://www.openwall.com/lists/oss-security/2016/08/11/3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6316', 'https://groups.google.com/forum/#!topic/ruby-security-ann/8B2iV2tPRSE', 'http://www.securityfocus.com/bid/92430', 'http://rhn.redhat.com/errata/RHSA-2016-1858.html', 'http://rhn.redhat.com/errata/RHSA-2016-1855.html', 'http://weblog.rubyonrails.org/2016/8/11/Rails-5-0-0-1-4-2-7-2-and-3-2-22-3-have-been-released/', 'https://github.com/advisories/GHSA-pc3m-v286-2jwj', 'http://rhn.redhat.com/errata/RHSA-2016-1856.html', 'http://rhn.redhat.com/errata/RHSA-2016-1857.html'}
| null |
GHSA
|
GHSA-8c6g-4xc5-w96c
|
Uninitialized memory exposure in claxon
|
An issue was discovered in the claxon crate before 0.4.1 for Rust. Uninitialized memory can be exposed because certain decode buffer sizes are mishandled.
|
{'CVE-2018-20992'}
|
2021-08-25T20:43:52Z
|
2021-08-25T20:43:52Z
|
MODERATE
| 6.5
|
{'CWE-908'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20992', 'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c', 'https://github.com/advisories/GHSA-8c6g-4xc5-w96c', 'https://rustsec.org/advisories/RUSTSEC-2018-0004.html'}
| null |
GHSA
|
GHSA-q492-f7gr-27rp
|
Improper Restriction of Operations within the Bounds of a Memory Buffer in Google TensorFlow
|
Invalid memory access and/or a heap buffer overflow in the TensorFlow XLA compiler in Google TensorFlow before 1.7.1 could cause a crash or read from other parts of process memory via a crafted configuration file.
|
{'CVE-2018-10055'}
|
2021-08-03T21:05:56Z
|
2019-04-30T15:37:31Z
|
HIGH
| 8.1
|
{'CWE-119'}
|
{'https://github.com/advisories/GHSA-q492-f7gr-27rp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10055', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-006.md'}
| null |
GHSA
|
GHSA-pq37-4c4g-v38c
|
Cross-site Scripting in vditor
|
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
|
{'CVE-2022-0341'}
|
2022-03-23T15:36:26Z
|
2022-03-15T00:01:02Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/advisories/GHSA-pq37-4c4g-v38c', 'https://github.com/Vanessa219/vditor/issues/1102', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628', 'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}
| null |
GHSA
|
GHSA-jh6m-3pqw-242h
|
Authentication Bypass by Primary Weakness in keycloak
|
A vulnerability was found in all versions of keycloak, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty server and use lowercase headers.
|
{'CVE-2020-14359'}
|
2022-02-09T00:56:04Z
|
2022-02-09T00:56:04Z
|
HIGH
| 7.3
|
{'CWE-305'}
|
{'https://issues.jboss.org/browse/KEYCLOAK-14090', 'https://github.com/advisories/GHSA-jh6m-3pqw-242h', 'https://bugzilla.redhat.com/show_bug.cgi?id=1868591', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14359'}
| null |
GHSA
|
GHSA-4j54-mmmv-hjpm
|
Malicious Package in slush-fullstack-framework
|
Version 0.9.2 of `slush-fullstack-framework` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T19:17:51Z
|
2020-09-03T19:17:51Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1108', 'https://github.com/advisories/GHSA-4j54-mmmv-hjpm'}
| null |
GHSA
|
GHSA-qf8x-vqjv-92gr
|
Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter
|
Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading it.
|
{'CVE-2022-24901'}
|
2022-05-07T01:48:25Z
|
2022-05-04T18:59:46Z
|
HIGH
| 7.5
|
{'CWE-287', 'CWE-295'}
|
{'https://github.com/advisories/GHSA-qf8x-vqjv-92gr', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901', 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}
| null |
GHSA
|
GHSA-pv6r-vchh-cxg9
|
Denial of Service in apostrophe
|
Versions of `apostrophe` prior to 2.97.1 are vulnerable to Denial of Service. The `apostrophe-jobs` module sets a callback for incoming jobs and doesn't clear it regardless of its status. This causes the server to accumulate callbacks, allowing an attacker to start a large number of jobs and exhaust system memory.
## Recommendation
Upgrade to version 2.97.1 or later.
| null |
2021-09-29T18:47:42Z
|
2020-09-03T20:42:09Z
|
LOW
| 0
|
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/1183', 'https://github.com/advisories/GHSA-pv6r-vchh-cxg9'}
| null |
GHSA
|
GHSA-9p8q-j6q5-mjw8
|
Buffer Overflow in galois_2p8
|
In galois_2p8 before 0.1.2, PrimitivePolynomialField::new has an off-by-one buffer overflow for a vector.
|
{'CVE-2022-24988'}
|
2022-02-26T00:35:51Z
|
2022-02-15T00:02:45Z
|
CRITICAL
| 9.8
|
{'CWE-120'}
|
{'https://github.com/djsweet/galois_2p8/blob/master/CHANGELOG.md', 'https://github.com/advisories/GHSA-9p8q-j6q5-mjw8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24988'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.