ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-j229-2h63-rvh9
Improper Authentication for Keycloak
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
{'CVE-2020-1718'}
2022-02-09T00:59:32Z
2022-02-09T00:59:32Z
MODERATE
8.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-j229-2h63-rvh9', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1718', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1718'}
null
GHSA
GHSA-4873-36h9-wv49
Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime
### Impact There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm...
{'CVE-2021-39218'}
2022-04-19T19:03:08Z
2021-09-20T19:54:16Z
MODERATE
6.3
{'CWE-590', 'CWE-787', 'CWE-125'}
{'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c', 'https://github.com/advisories/GHSA-4873-36h9-wv49', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://crates.io/crates/wasmtime', '...
null
GHSA
GHSA-3q6f-8grx-pr4v
Cross-site scripting in jspdf
"It's possible to use nested script tags in order to bypass the filtering regex."
{'CVE-2020-7691'}
2021-05-11T16:43:52Z
2021-05-11T16:43:52Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7691', 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255', 'https://git...
null
GHSA
GHSA-qf2g-q4mc-w7rr
Cross-site Scripting in Fork CMS
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
{'CVE-2022-0145'}
2022-03-30T21:04:26Z
2022-03-25T00:00:34Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/advisories/GHSA-qf2g-q4mc-w7rr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}
null
GHSA
GHSA-j899-348x-h3rq
Malicious Package in serializes
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:54Z
2020-09-03T19:57:54Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1139', 'https://github.com/advisories/GHSA-j899-348x-h3rq'}
null
GHSA
GHSA-32w7-9whp-cjp9
High severity vulnerability that affects tryton
The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle.
{'CVE-2018-19443'}
2021-08-31T20:33:25Z
2018-11-29T21:30:56Z
MODERATE
5.9
{'CWE-384'}
{'https://github.com/advisories/GHSA-32w7-9whp-cjp9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443', 'https://bugs.tryton.org/issue7792', 'https://discuss.tryton.org/t/security-release-for-issue7792/830'}
null
GHSA
GHSA-pjmx-9xr3-82qr
ReDoS via long UserAgent header in useragent
Affected versions of `useragent` are vulnerable to regular expression denial of service when an arbitrarily long `User-Agent` header is parsed. ## Proof of Concept ``` var useragent = require('useragent'); var badUserAgent = 'MSIE 0.0'+Array(900000).join('0')+'XBLWP'; var request = 'GET / HTTP/1.1\r\nUser-Agent: ' +...
{'CVE-2017-16030'}
2021-01-08T21:18:50Z
2018-07-24T19:59:13Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/312', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16030', 'https://www.npmjs.com/advisories/312', 'https://github.com/advisories/GHSA-pjmx-9xr3-82qr'}
null
GHSA
GHSA-9p2w-rmx4-9mw7
Command Injection in strapi
Versions of `strapi` before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the `/admin/plugins/install/` route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server. ## Recommendation Upgrade to version 3.0.0-beta.1...
null
2021-10-04T19:12:13Z
2020-09-04T16:54:02Z
HIGH
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-9p2w-rmx4-9mw7', 'https://www.npmjs.com/advisories/1424'}
null
GHSA
GHSA-m5p4-7wf9-6w99
Malicious Package in regenrator
All versions of `regenrator` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was publi...
null
2021-10-01T13:29:07Z
2020-09-01T21:10:53Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/685', 'https://github.com/advisories/GHSA-m5p4-7wf9-6w99'}
null
GHSA
GHSA-43jj-2rwc-2m3f
Broken access control on files
In SilverStripe assets 4.0, there is broken access control on files.
{'CVE-2019-14273'}
2021-09-22T21:03:47Z
2020-07-15T17:38:04Z
MODERATE
5.3
{'CWE-552'}
{'https://www.silverstripe.org/blog/tag/release', 'https://forum.silverstripe.org/c/releases', 'https://www.silverstripe.org/download/security-releases/', 'https://github.com/advisories/GHSA-43jj-2rwc-2m3f', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-14273.yaml', 'h...
null
GHSA
GHSA-8jjf-w7j6-323c
Authentication Bypass in samlify
Versions of `samlify` prior to 2.4.0 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allo...
{'CVE-2017-1000452'}
2021-09-07T19:47:56Z
2018-01-04T21:03:33Z
HIGH
7.5
{'CWE-91'}
{'https://www.whitehats.nl/blog/xml-signature-wrapping-samlify', 'https://github.com/advisories/GHSA-8jjf-w7j6-323c', 'https://www.npmjs.com/advisories/969', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000452', 'https://hackerone.com/reports/356284', 'https://github.com/tngan/samlify/releases/tag/v2.3.0'}
null
GHSA
GHSA-49q3-8867-5wmp
Remote Command Execution in reg-keygen-git-hash-plugin
### Impact `reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands. ### Patches Upgrade to version 0.10.16 or later. ### For more information If you have any questions or comments about this advisory: - Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-...
{'CVE-2021-32673'}
2022-04-19T19:02:59Z
2021-06-08T18:47:06Z
HIGH
8.8
{'CWE-94', 'CWE-78'}
{'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87', 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673', 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin', 'https://github.com/reg-viz/reg-suit/relea...
null
GHSA
GHSA-qj5r-f9mv-rffh
`CHECK`-fails when building invalid tensor shapes in Tensorflow
### Impact Multiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes. ### Patch...
{'CVE-2022-23569'}
2022-02-11T16:23:32Z
2022-02-09T23:38:56Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23569', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md', 'https://github.com/advisories/GHSA-qj5r-f9mv-rffh'}
null
GHSA
GHSA-4jh2-3c85-q67h
Improper Privilege Management in apache-airflow
In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for.
{'CVE-2021-45230'}
2022-01-28T21:55:34Z
2022-01-28T21:55:34Z
MODERATE
6.5
{'CWE-269'}
{'https://lists.apache.org/thread/m778ojn0k595rwco4ht9wjql89mjoxnl', 'https://github.com/advisories/GHSA-4jh2-3c85-q67h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45230'}
null
GHSA
GHSA-rm4w-6696-r77p
nb-connect invalidly assumes the memory layout of std::net::SocketAddr
An issue was discovered in the nb-connect crate before 1.0.3 for Rust. It may have invalid memory access for certain versions of the standard library because it relies on a direct cast of std::net::SocketAddrV4 and std::net::SocketAddrV6 data structures.
{'CVE-2021-27376'}
2021-08-25T20:52:14Z
2021-08-25T20:52:14Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/advisories/GHSA-rm4w-6696-r77p', 'https://rustsec.org/advisories/RUSTSEC-2021-0021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27376', 'https://github.com/smol-rs/nb-connect/issues/1'}
null
GHSA
GHSA-8pmx-p244-g88h
Interpreter crash from `tf.io.decode_raw`
### Impact The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes. ```python import tensorflow as tf tf.io.decode_raw(tf.constant(["1","2","3","4"]), tf.uint16, fixed_length=4) ``` The...
{'CVE-2021-29614'}
2022-04-26T18:09:06Z
2021-05-21T14:28:42Z
HIGH
7.1
{'CWE-665', 'CWE-787'}
{'https://github.com/advisories/GHSA-8pmx-p244-g88h', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29614', 'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'}
null
GHSA
GHSA-8q2v-67v7-6vc6
Data races in rocket
An issue was discovered in the rocket crate before 0.4.5 for Rust. LocalRequest::clone creates more than one mutable references to the same object, possibly causing a data race.
{'CVE-2020-35882'}
2021-08-25T20:48:07Z
2021-08-25T20:48:07Z
HIGH
8.1
{'CWE-362'}
{'https://github.com/advisories/GHSA-8q2v-67v7-6vc6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35882', 'https://rustsec.org/advisories/RUSTSEC-2020-0028.html', 'https://github.com/SergioBenitez/Rocket/issues/1312'}
null
GHSA
GHSA-9783-42pm-x5jq
Use of Uninitialized Resource in csv-sniffer.
An issue was discovered in the csv-sniffer crate through 2021-01-05 for Rust. preamble_skipcount may read from uninitialized memory locations.
{'CVE-2021-45686'}
2022-01-07T17:33:34Z
2022-01-06T22:13:58Z
CRITICAL
9.8
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0088.html', 'https://github.com/advisories/GHSA-9783-42pm-x5jq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45686', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/csv-sniffer/RUSTSEC-2021-0088.md'}
null
GHSA
GHSA-x3v2-fgr6-3wmm
Double free in fil-ocl
An issue was discovered in the fil-ocl crate through 2021-01-04 for Rust. From<EventList> can lead to a double free.
{'CVE-2021-25908'}
2021-08-25T20:53:03Z
2021-08-25T20:53:03Z
HIGH
7.5
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25908', 'https://github.com/cogciprocate/ocl/issues/194', 'https://rustsec.org/advisories/RUSTSEC-2021-0011.html', 'https://github.com/advisories/GHSA-x3v2-fgr6-3wmm'}
null
GHSA
GHSA-fxmx-pfm2-85m2
Cross-site Scripting in Ericsson CodeChecker
In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
{'CVE-2021-44217'}
2022-01-21T23:32:32Z
2022-01-21T23:32:32Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44217', 'https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png', 'https://github.com/Ericsson/codechecker/releases/tag/v6.18.2', 'https://github.com/Ericsson/codechecker/pull/3549', 'https://github.com/Ericsson/codechecker/commit...
null
GHSA
GHSA-wh69-wc6q-7888
Command injection in node-dns-sync
dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
{'CVE-2020-11079'}
2021-11-04T17:08:10Z
2020-05-28T18:42:59Z
HIGH
8.6
{'CWE-94', 'CWE-77'}
{'https://github.com/advisories/GHSA-wh69-wc6q-7888', 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079', 'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888'}
null
GHSA
GHSA-m4hf-j54p-p353
Type confusion leading to segfault in Tensorflow
### Impact The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion: ```python imp...
{'CVE-2022-21731'}
2022-02-11T17:05:51Z
2022-02-10T00:19:50Z
MODERATE
6.5
{'CWE-754', 'CWE-843'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d...
null
GHSA
GHSA-884p-74jh-xrg2
Command Injection in tree-kill
Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems. ## Recommendation Upgrade to versi...
null
2021-10-04T19:40:26Z
2020-09-04T16:57:20Z
HIGH
0
{'CWE-77'}
{'https://hackerone.com/reports/701183', 'https://github.com/advisories/GHSA-884p-74jh-xrg2', 'https://www.npmjs.com/advisories/1432'}
null
GHSA
GHSA-8h8p-x289-vvqr
Gitea displaying raw OpenID error in UI
Gitea is a project to help users set up a self-hosted Git service. Server Side Request Forgery (SSRF) vulnerability exists in Gitea before 1.7.0 using the OpenID URL. Gitea can leak sensitive information about the local network through the error provided by the UI.
{'CVE-2021-45325'}
2022-02-15T00:18:07Z
2022-02-09T00:00:29Z
MODERATE
5.3
{'CWE-918'}
{'https://github.com/go-gitea/gitea/pull/5712', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45325', 'https://github.com/go-gitea/gitea/pull/5705', 'https://blog.gitea.io/2019/01/gitea-1.7.0-is-released/', 'https://github.com/advisories/GHSA-8h8p-x289-vvqr', 'https://github.com/go-gitea/gitea/issues/4973'}
null
GHSA
GHSA-97m3-w2cp-4xx6
Embedded Malicious Code in node-ipc
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
{'CVE-2022-23812'}
2022-04-15T13:11:55Z
2022-03-16T23:54:32Z
CRITICAL
9.8
{'CWE-94', 'CWE-506'}
{'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580', 'https://github.com/RIAEvangelist/node-ipc/issues/236', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812', 'https://github.com/advisories/GHSA-97m3-w2cp-4xx6', 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab0835...
null
GHSA
GHSA-r9q4-w3fm-wrm2
Cross-Site Scripting in google-closure-library
Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting. ## Recommendation Upgrade to...
null
2021-09-27T21:01:49Z
2020-09-02T21:21:43Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-r9q4-w3fm-wrm2', 'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853', 'https://www.npmjs.com/advisories/878', 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519'}
null
GHSA
GHSA-jf9v-q8vh-3fmc
Cross-site scripting in ICEcoder
In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed.
{'CVE-2021-32106'}
2021-09-09T17:11:11Z
2021-09-09T17:11:11Z
MODERATE
5.4
{'CWE-79'}
{'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://github.com/icecoder/ICEcoder', 'https://github.com/advisories/GHSA-jf9v-q8vh-3fm...
null
GHSA
GHSA-2wqp-jmcc-mc77
Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17
Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://va...
{'CVE-2021-31405'}
2021-04-26T20:11:16Z
2021-04-19T14:47:34Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31405', 'https://vaadin.com/security/cve-2021-31405', 'https://github.com/advisories/GHSA-2wqp-jmcc-mc77', 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77', 'https://github.com/vaadin/flow-components/pull/442'}
null
GHSA
GHSA-p8q8-jfcv-g2h2
Directory Traversal in Archive_Tar
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
{'CVE-2021-32610'}
2021-09-27T18:46:37Z
2021-08-09T20:40:06Z
HIGH
7.1
{'CWE-59'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/', 'https://github.com/advisories/GHSA-p8q8-jfcv-g2h2', 'h...
null
GHSA
GHSA-hxwm-x553-x359
Arbitrary Command Injection due to Improper Command Sanitization
### Summary There exists a command injection vulnerability in `npmcli/git` versions <2.0.8 which may result in arbitrary shell command execution due to improper argument sanitization when `npmcli/git` is used to execute Git commands based on user controlled input. The impact of this issue is possible Arbitrary Comman...
null
2022-04-19T19:03:04Z
2021-08-05T17:07:39Z
MODERATE
0
{'CWE-78'}
{'https://github.com/advisories/GHSA-hxwm-x553-x359', 'https://github.com/npm/git/pull/29', 'https://github.com/npm/git/security/advisories/GHSA-hxwm-x553-x359'}
null
GHSA
GHSA-c427-hjc3-wrfw
Cross-site scripting in Swagger-UI
A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untr...
{'CVE-2019-17495'}
2022-02-08T22:07:50Z
2019-10-15T19:27:05Z
HIGH
9.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-c427-hjc3-wrfw', 'https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379...
null
GHSA
GHSA-9q69-g5gc-9fgf
Cross-Site Request Forgery in Vert.x-Web framework
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token ...
{'CVE-2020-35217'}
2021-04-22T16:16:18Z
2021-04-22T16:16:18Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-9q69-g5gc-9fgf', 'https://github.com/vert-x3/vertx-web/pull/1613', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35217'}
null
GHSA
GHSA-xc67-hjx6-cgg6
Installation information leak in Eclipse Jetty
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. Th...
{'CVE-2019-10247'}
2022-04-21T17:37:41Z
2019-04-23T16:07:12Z
MODERATE
5.3
{'CWE-200', 'CWE-213'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10247', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.debian.org/security/2021/dsa-4949', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e5...
null
GHSA
GHSA-m57c-4vvx-gjgq
Format string vulnerabilities in pancurses
An issue was discovered in the pancurses crate through 0.16.1 for Rust. printw and mvprintw have format string vulnerabilities.
{'CVE-2019-15546'}
2021-08-25T20:58:27Z
2021-08-25T20:58:27Z
HIGH
7.5
{'CWE-134'}
{'https://rustsec.org/advisories/RUSTSEC-2019-0005.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15546', 'https://github.com/advisories/GHSA-m57c-4vvx-gjgq', 'https://github.com/ihalila/pancurses/issues/66', 'https://github.com/RustSec/advisory-db/issues/106'}
null
GHSA
GHSA-894g-6j7q-2hx6
Cross site scripting in flask-admin
helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL.
{'CVE-2018-16516'}
2022-03-26T00:47:38Z
2018-12-19T19:23:52Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/', 'https://lists.fedoraproject.org/archives/...
null
GHSA
GHSA-c38m-7h53-g9v4
Path traversal in Apache James
Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacte...
{'CVE-2021-40525'}
2022-03-30T21:13:25Z
2022-01-21T23:36:47Z
CRITICAL
9.1
{'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/advisories/GHSA-c38m-7h53-g9v4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40525', 'https://www.openwall.com/lists/oss-security/2022/01/04/4', 'http://www.openwall.com/lists/oss-security/2022/01/04/4'}
null
GHSA
GHSA-whww-v56c-cgv2
Deserialization of Untrusted Data in Apache Dubbo
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
{'CVE-2020-1948'}
2022-02-10T22:39:17Z
2022-02-10T22:39:17Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1948', 'https://github.com/advisories/GHSA-whww-v56c-cgv2', 'https://nsfocusglobal.com/apache-dubbo-remote-code-execution-vulnerability-cve-2020-1948-threat-alert/', 'https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity....
null
GHSA
GHSA-6x45-86q6-rcmr
Gyazo allows local users to write arbitrary files
lib/gyazo/client.rb in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames.
{'CVE-2014-4994'}
2022-04-25T22:11:08Z
2018-01-22T23:17:39Z
MODERATE
5.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-4994', 'https://github.com/advisories/GHSA-6x45-86q6-rcmr', 'http://www.vapid.dhs.org/advisories/gyazo-1.0.0.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/13', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}
null
GHSA
GHSA-hvr8-466p-75rh
Integer overflow discovered in Pillow
Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
{'CVE-2016-4009'}
2022-04-26T18:16:33Z
2018-07-24T20:15:48Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e', 'https://github.com/python-pillow/Pillow/pull/1714', 'http://www.securityfocus.com/bid/86064', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4009', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-h...
null
GHSA
GHSA-hxhj-hp9m-qwc4
Moderate severity vulnerability that affects private_address_check
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.
{'CVE-2017-0904'}
2021-01-08T18:38:40Z
2017-11-29T23:21:05Z
MODERATE
0
{'CWE-242'}
{'https://edoverflow.com/2017/ruby-resolv-bug/', 'https://hackerone.com/reports/287835', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904', 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af', 'https://hackerone.com/reports/287245', 'https://github.com/advisories/GHSA-hxhj...
null
GHSA
GHSA-h65f-jvqw-m9fj
Infinite Loop in Apache Xerces Java
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.1...
{'CVE-2022-23437'}
2022-04-22T15:34:39Z
2022-01-27T16:13:07Z
MODERATE
6.5
{'CWE-91'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj', 'https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl', 'http://www.openwall.com/lists/oss-security/2022/01/24/3'}
null
GHSA
GHSA-hxhm-3vj9-6cqh
Downloads Resources over HTTP in apk-parser2
Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-p...
{'CVE-2016-10632'}
2021-01-08T18:38:53Z
2018-09-18T13:49:31Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/223', 'https://github.com/advisories/GHSA-hxhm-3vj9-6cqh', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10632', 'https://nodesecurity.io/advisories/223'}
null
GHSA
GHSA-6879-xr95-5gf4
Malicious Package in malicious-do-not-install
All versions of `malicious-do-not-install` contain malicious code. The package copies the contents of `/etc/passwd` and `/etc/shadow` to files in the local `/tmp/` folder. ## Recommendation Remove the package from your environment and rotate affected credentials.
null
2021-09-30T17:16:36Z
2020-09-03T17:20:15Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1040', 'https://github.com/advisories/GHSA-6879-xr95-5gf4'}
null
GHSA
GHSA-9w7h-3wwh-6m5q
Cross-site Scripting in Microweber
Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user.
{'CVE-2022-1439'}
2022-04-26T13:14:56Z
2022-04-23T00:03:02Z
MODERATE
6.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-9w7h-3wwh-6m5q', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439', 'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'}
null
GHSA
GHSA-5cf4-jqwp-584g
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop 2.9.0 to 2.9.1, 2.8.3 to 2.8.4, 2.7.5 to 2.7.6, KMS blocking users or granting access to users incorrectly, if the system uses non-default groups mapping mechanisms.
{'CVE-2018-11767'}
2021-09-01T21:35:01Z
2019-03-25T16:17:32Z
HIGH
7.4
{'CWE-269'}
{'https://lists.apache.org/thread.html/246cf223e7dc0c1dff90b78dccb6c3fe94e1a044dbf98e2333393302@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-5cf4-jqwp-584g', 'ht...
null
GHSA
GHSA-pvrc-hg3f-58r6
Heap OOB access in `Dilation2DBackpropInput`
### Impact An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`: ```python import tensorflow as tf input_tensor = tf.constant([1.1] * 81, shape=[3, 3, 3, 3], dtype=tf.float32) filter = tf.constant([], shape=[0, 0, 3], dtype=tf.float...
{'CVE-2021-29566'}
2021-05-21T14:25:13Z
2021-05-21T14:25:13Z
LOW
2.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/advisories/GHSA-pvrc-hg3f-58r6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29566', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}
null
GHSA
GHSA-w8xh-93qh-35vw
Unrestricted Upload of File with Dangerous Type in Payload
An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.
{'CVE-2022-27952'}
2022-04-22T20:29:01Z
2022-04-13T00:00:22Z
CRITICAL
9.8
{'CWE-434'}
{'https://www.youtube.com/watch?v=6CfhAxA3xdQ', 'https://github.com/payloadcms/payload', 'https://github.com/advisories/GHSA-w8xh-93qh-35vw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}
null
GHSA
GHSA-m8fm-mv5w-33pv
Command Injection in psnode
This affects all current versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23375'}
2021-05-06T15:52:59Z
2021-05-06T15:52:59Z
HIGH
7.3
{'CWE-77'}
{'https://www.npmjs.com/package/psnode', 'https://github.com/nrako/psnode/blob/076f623689e4506d3647505daca13b3f482e0c31/lib/index.js%23L59', 'https://github.com/advisories/GHSA-m8fm-mv5w-33pv', 'https://snyk.io/vuln/SNYK-JS-PSNODE-1078543', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23375'}
null
GHSA
GHSA-m8pw-h8qj-rgj9
Downloads Resources over HTTP in ipip-coffee
Affected versions of `ipip-coffee` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application. ## Re...
{'CVE-2016-10673'}
2021-01-08T18:29:04Z
2019-02-18T23:44:24Z
MODERATE
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10673', 'https://github.com/advisories/GHSA-m8pw-h8qj-rgj9', 'https://nodesecurity.io/advisories/279', 'https://www.npmjs.com/advisories/279'}
null
GHSA
GHSA-629c-j867-3v45
Malicious Package in bitcoisnj-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d...
null
2021-10-01T20:43:02Z
2020-09-04T16:41:04Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1367', 'https://github.com/advisories/GHSA-629c-j867-3v45'}
null
GHSA
GHSA-xpv2-8ppj-79hh
Expression injection in AviatorScript
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
{'CVE-2021-41862'}
2021-10-08T21:30:50Z
2021-10-04T20:14:31Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/advisories/GHSA-xpv2-8ppj-79hh', 'https://github.com/killme2008/aviatorscript/issues/421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41862'}
null
GHSA
GHSA-8rf6-w2mx-4xjh
TODO
** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other ...
{'CVE-2019-15149'}
2021-12-03T14:37:54Z
2019-08-19T23:45:47Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-8rf6-w2mx-4xjh', 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149', 'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18'}
null
GHSA
GHSA-gcvv-gq92-x94r
Authenticated server-side request forgery in file upload via URL.
### Impact Authenticated server-side request forgery in file upload via URL. ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For o...
{'CVE-2021-37711'}
2021-08-23T19:42:49Z
2021-08-23T19:42:49Z
HIGH
8.8
{'CWE-918'}
{'https://github.com/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'}
null
GHSA
GHSA-rggq-f2wf-m6cp
Malicious Package in jajajejejiji
All versions of `jajajejejiji` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as su...
null
2021-10-01T13:44:24Z
2020-09-02T18:31:08Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-rggq-f2wf-m6cp', 'https://www.npmjs.com/advisories/838'}
null
GHSA
GHSA-hv4w-jhcj-6wfw
Cross-Site Scripting in snekserve
All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternat...
null
2021-09-29T18:32:32Z
2020-09-03T20:34:23Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1167', 'https://github.com/advisories/GHSA-hv4w-jhcj-6wfw'}
null
GHSA
GHSA-4p24-vmcr-4gqj
XSS vulnerability that affects bootstrap
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041. See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.
{'CVE-2016-10735'}
2021-07-26T21:48:49Z
2019-01-17T13:57:27Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/twbs/bootstrap/pull/23679', 'https://github.com/twbs/bootstrap/pull/26460', 'https://github.com/advisories/GHSA-4p24-vmcr-4gqj', 'https://github.com/twbs/bootstrap/pull/23687', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://access.redh...
null
GHSA
GHSA-9x52-887g-fhc2
Out of bounds read in Tensorflow
### Impact The [TFG dialect of TensorFlow (MLIR)](https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport) makes several assumptions about the incoming `GraphDef` before converting it to the MLIR-based dialect. If an attacker changes the `SavedModel` forma...
{'CVE-2022-23594'}
2022-02-11T19:56:22Z
2022-02-09T23:32:41Z
HIGH
8.8
{'CWE-125'}
{'https://github.com/advisories/GHSA-9x52-887g-fhc2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23594', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9x52-887g-fhc2', 'https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport'}
null
GHSA
GHSA-qpxp-5j56-gg3x
Improper Input Validation in Zendesk Samlr
Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name.
{'CVE-2018-20857'}
2021-08-17T19:41:54Z
2019-07-31T04:22:03Z
HIGH
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20857', 'https://github.com/advisories/GHSA-qpxp-5j56-gg3x', 'https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2'}
null
GHSA
GHSA-qmgf-fp85-55gr
Malicious Package in bitcionjs
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d...
null
2021-10-01T20:39:29Z
2020-09-04T15:40:34Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1360', 'https://github.com/advisories/GHSA-qmgf-fp85-55gr'}
null
GHSA
GHSA-gw4j-4229-q4px
Server-Side Request Forgery in Apache Dubbo
In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.
{'CVE-2021-25640'}
2022-03-21T21:55:24Z
2022-03-18T17:56:45Z
MODERATE
6.1
{'CWE-918'}
{'https://github.com/advisories/GHSA-gw4j-4229-q4px', 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77%40%3Cdev.dubbo.apache.org%3E', 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77@%3Cdev.dubbo.apache.org%3E', 'https://nvd.n...
null
GHSA
GHSA-j28q-p8ww-cp87
Prototype Pollution in merge-deep2.
All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function.
{'CVE-2021-23700'}
2021-12-16T14:33:09Z
2021-12-16T14:33:09Z
MODERATE
6.5
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593', 'https://github.com/advisories/GHSA-j28q-p8ww-cp87', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700'}
null
GHSA
GHSA-3crr-9vmg-864v
Moderate severity vulnerability that affects activerecord
The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method.
{'CVE-2013-1854'}
2021-08-31T20:57:17Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-20'}
{'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1854', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2013-...
null
GHSA
GHSA-c383-q5vf-hx55
Integer Overflow or Wraparound in Microweber
Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound.
{'CVE-2022-0913'}
2022-03-23T15:35:30Z
2022-03-12T00:00:36Z
HIGH
7.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0913', 'https://github.com/advisories/GHSA-c383-q5vf-hx55', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f'}
null
GHSA
GHSA-vwcg-7xqw-qcxw
Heap Overflow in PyMiniRacer
A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption. More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/.
{'CVE-2020-25489'}
2021-01-07T22:56:19Z
2020-09-18T18:03:59Z
MODERATE
0
{'CWE-119'}
{'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw', 'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0', 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d', 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens...
null
GHSA
GHSA-8549-p68h-m9mc
Malicious Package in buffdr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:57:15Z
2020-09-03T21:46:21Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1237', 'https://github.com/advisories/GHSA-8549-p68h-m9mc'}
null
GHSA
GHSA-fh74-hm69-rqjw
procfs race condition with a shared volume mount
### Impact By crafting a malicious root filesystem (with `/proc` being a symlink to a directory which was inside a volume shared with another running container), an attacker in control of both containers can trick `runc` into not correctly configuring the container&amp;amp;amp;amp;#39;s security labels and not correctl...
{'CVE-2019-19921'}
2022-04-19T19:02:24Z
2021-05-27T18:41:17Z
MODERATE
5
{'CWE-362'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19921', 'https://github.com/opencontainers/runc/pull/2190', 'https://access.redhat.com/errata/RHSA-2020:0688', 'https://github.com/opencontainers/runc/issues/2197', 'https://github.com/advisories/GHSA-fh74-hm69-rqjw', 'https://github.com/opencontainers/runc/releases', 'https:...
null
GHSA
GHSA-xm28-fw2x-fqv2
Denial of Service in foreman
All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path. ## Recommendation Upgrade to version 3.0.1.
null
2021-08-04T21:20:47Z
2019-05-31T23:08:14Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30', 'https://snyk.io/vuln/npm:foreman:20180429', 'https://hackerone.com/reports/320586', 'https://github.com/advisories/GHSA-xm28-fw2x-fqv2', 'https://nodesecurity.io/advisories/645', 'https://www.npmjs.com/advisories/645'}
null
GHSA
GHSA-68wv-rjrm-576p
Low severity vulnerability that affects apache-airflow
In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.
{'CVE-2017-17835'}
2021-09-02T15:42:35Z
2019-01-25T16:19:14Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-17835', 'https://github.com/advisories/GHSA-68wv-rjrm-576p', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}
null
GHSA
GHSA-5ph6-qq5x-7jwc
ExternalName Services can be used to gain access to Envoy's admin interface
### Impact Josh Ferrell (@josh-ferrell) from VMware has reported that a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the...
{'CVE-2021-32783'}
2022-04-19T19:03:04Z
2021-08-30T17:22:10Z
HIGH
8.5
{'CWE-610'}
{'https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc', 'https://github.com/projectcontour/contour/releases/tag/v1.15.2', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e', 'https://github.com/projectcontour/contour/releases/tag/v1.16.1', 'https://...
null
GHSA
GHSA-w4v7-hwx7-9929
Cross-site Scripting in tempura
This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.
{'CVE-2021-23784'}
2021-11-08T17:50:10Z
2021-11-08T17:50:10Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633', 'https://github.com/advisories/GHSA-w4v7-hwx7-9929', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784', 'https://github.com/lukeed/tempura/releases/tag/v0.4.0', 'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'}
null
GHSA
GHSA-7xfq-xh6v-4mrm
Malicious Package in json-serializer
Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 2.0.10 of this module is found installed you will want ...
null
2021-10-01T13:10:42Z
2020-09-01T20:27:53Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-7xfq-xh6v-4mrm', 'https://www.npmjs.com/advisories/630'}
null
GHSA
GHSA-p9pc-299p-vxgp
Prototype Pollution in yargs-parser
Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a...
{'CVE-2020-7608'}
2021-07-28T21:26:25Z
2020-09-04T18:00:54Z
MODERATE
5.3
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608', 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2', 'https://www.npmjs.com/advisories/1500', 'https://github.com/advisories/GHSA-p9pc-299p-vxgp'}
null
GHSA
GHSA-84fv-prrc-5ggr
Route Validation Bypass in call
Affected versions of `call` do not validate empty parameters, which may result in a bypass of route validation rules. ## Proof of Concept Routing Scheme: ``` /api/{param}/{param2}/details ``` Triggering Request Path: ``` /api/// ``` ## Recommendation Update to version 3.0.2 or later.
{'CVE-2016-10543'}
2021-01-08T19:12:21Z
2019-02-18T23:40:04Z
MODERATE
0
{'CWE-20'}
{'https://www.npmjs.com/advisories/121', 'https://nodesecurity.io/advisories/121', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10543', 'https://github.com/hapijs/hapi/issues/3228', 'https://github.com/advisories/GHSA-84fv-prrc-5ggr'}
null
GHSA
GHSA-x7gm-rfgv-w973
Potential DoS with NumberFilter conversion to integer values.
### Impact Automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. ### Patches Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50...
{'CVE-2020-15225'}
2022-01-06T20:22:26Z
2020-09-28T19:05:29Z
HIGH
7.5
{'CWE-681'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAT2ZAEF6DM3VFSOHKB7X3ASSHGQHJAK/', 'https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D...
null
GHSA
GHSA-gpvr-g6gh-9mc2
No Charset in Content-Type Header in express
Vulnerable versions of express do not specify a charset field in the content-type header while displaying 400 level response messages. The lack of enforcing user's browser to set correct charset, could be leveraged by an attacker to perform a cross-site scripting attack, using non-standard encodings, like UTF-7. ## R...
{'CVE-2014-6393'}
2021-08-02T22:35:13Z
2018-10-23T17:22:54Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/8', 'https://github.com/advisories/GHSA-gpvr-g6gh-9mc2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1203190', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6393', 'https://nodesecurity.io/advisories/express-no-charset-in-content-type-header'}
null
GHSA
GHSA-3m93-m4q6-mc6v
Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
{'CVE-2019-14864'}
2022-04-25T23:34:51Z
2020-02-26T19:54:31Z
MODERATE
6.5
{'CWE-532'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://github.com/ansible/ansible/pull/64274', 'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/ansible/ansible/pull/64273', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864', 'https://bugzilla.redhat.com/show_bug.cgi?i...
null
GHSA
GHSA-6677-83pp-f862
Cross-Site Scripting in @nuxt/devalue
Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys. ## Recommendation Upgrade to version 1.2.3 or later.
{'CVE-2019-13506'}
2021-08-17T18:13:30Z
2019-07-16T00:42:02Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-13506', 'https://www.npmjs.com/advisories/814', 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2', 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be', 'https://github.com/nuxt/devalue/pull/8', 'https://github.com/Rich-Harris/devalue/issues/1...
null
GHSA
GHSA-9vc2-p34x-jhxh
Moderate severity vulnerability that affects rack
Withdrawn, accidental duplicate publish. lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
null
2021-12-03T14:23:29Z
2018-09-17T21:56:30Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-3225', 'https://github.com/advisories/GHSA-9vc2-p34x-jhxh'}
null
GHSA
GHSA-6f84-42vf-ppwp
Division by 0 in `QuantizedMul`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`: ```python import tensorflow as tf x = tf.zeros([4, 1], dtype=tf.quint8) y = tf.constant([], dtype=tf.quint8) min_x = tf.constant(0.0) max_x = tf.constant(0.0010000000474974513) min_y = tf.constant(0.0) max_y = tf.constant(0.0010000000474...
{'CVE-2021-29528'}
2021-05-21T17:06:47Z
2021-05-21T14:22:02Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29528', 'https://github.com/advisories/GHSA-6f84-42vf-ppwp'}
null
GHSA
GHSA-m4fq-xh7w-jhfm
Malicious Package in crytpo-js
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d...
null
2021-10-01T21:00:30Z
2020-09-03T19:39:46Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-m4fq-xh7w-jhfm', 'https://www.npmjs.com/advisories/1391'}
null
GHSA
GHSA-vjfr-p6hp-jqqw
Command Injection in ungit
Versions of `ungit` prior to 0.9.0 are affected by a command injection vulnerability in the `url` parameter. ## Recommendation Update version 0.9.0 or later.
{'CVE-2015-4130'}
2021-09-23T21:01:16Z
2020-08-31T23:00:10Z
CRITICAL
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-4130', 'https://github.com/advisories/GHSA-vjfr-p6hp-jqqw', 'https://github.com/FredrikNoren/ungit/issues/486', 'https://www.npmjs.com/advisories/40'}
null
GHSA
GHSA-gm25-fpmr-43fj
Moderate severity vulnerability that affects rails
Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values.
{'CVE-2007-3227'}
2021-09-13T12:35:51Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://dev.rubyonrails.org/ticket/8371', 'http://osvdb.org/36378', 'http://secunia.com/advisories/27756', 'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'https://nvd.nist.gov/vuln/detail/CVE-2007-3227', 'http://pastie.caboo.se/65550.txt', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'h...
null
GHSA
GHSA-chp4-rv79-68j3
Apache serialization mechanism does not have a list of classes allowed for serialization/deserialization
In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepar...
{'CVE-2018-1295'}
2022-04-26T19:14:40Z
2018-10-16T20:53:44Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-chp4-rv79-68j3', 'https://access.redhat.com/errata/RHSA-2018:2405', 'http://www.securityfocus.com/bid/103692', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1295', 'https://lists.apache.org/thread.html/45e7d5e2c6face85aab693f5ae0616563132ff757e5a558da80d0209@%3Cdev.ignite.apache.org%3E...
null
GHSA
GHSA-xfrc-7mj2-5xh9
Undefined Behavior in zencashjs
Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horize...
null
2020-09-03T17:14:51Z
2020-09-03T17:14:51Z
CRITICAL
0
null
{'https://github.com/ZencashOfficial/zencashjs/commit/db01bd94b9f8a956d7835e934500eaa643f8bd13#diff-42d8d2088a96641b563b25ad908b0c0fR146', 'https://www.npmjs.com/advisories/1035', 'https://github.com/advisories/GHSA-xfrc-7mj2-5xh9'}
null
GHSA
GHSA-8crv-49fr-2h6j
Moderate severity vulnerability that affects org.springframework.security:spring-security-core and org.springframework:spring-core
Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments,...
{'CVE-2016-5007'}
2021-09-07T16:38:25Z
2018-10-17T20:30:12Z
HIGH
7.5
{'CWE-285'}
{'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://pivotal.io/security/cve-2016-5007', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5007', 'https://github.com/advisories/GHSA-8crv-49fr-2h6j', 'http://www....
null
GHSA
GHSA-hg78-4f6x-99wq
Moderate severity vulnerability that affects rack
There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size.
{'CVE-2018-16470'}
2021-01-08T18:40:59Z
2018-11-15T15:58:58Z
MODERATE
0
{'CWE-400'}
{'https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ', 'https://github.com/advisories/GHSA-hg78-4f6x-99wq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16470', 'https://access.redhat.com/errata/RHSA-2019:3172'}
null
GHSA
GHSA-f5g8-5qq7-938w
Out-of-bounds Read
In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
{'CVE-2020-35653'}
2022-04-25T23:38:57Z
2021-03-18T19:55:41Z
HIGH
7.1
{'CWE-125'}
{'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://lists.fedoraproject.org/archives/list/pac...
null
GHSA
GHSA-fv3h-8x5j-pvgq
XSS in python-markdown2
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
{'CVE-2020-11888'}
2022-03-22T18:51:12Z
2020-04-22T20:59:50Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J/', 'http://lists.opensuse.org/opensuse-security-announce/2...
null
GHSA
GHSA-6gv9-7q4g-pmvm
Persistent XSS in customer module in Shopware
### Impact Persistent XSS in customer module ### Patches We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopw...
null
2020-11-13T15:47:36Z
2020-11-13T15:47:36Z
LOW
0
{'CWE-79'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020', 'https://github.com/shopware/shopware/security/advisories/GHSA-6gv9-7q4g-pmvm', 'https://github.com/advisories/GHSA-6gv9-7q4g-pmvm'}
null
GHSA
GHSA-mf6w-45cf-qhmp
Git-fastclone passes user modifiable strings directly to a shell command
git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
{'CVE-2015-8969'}
2022-04-26T18:21:55Z
2018-08-15T20:04:44Z
CRITICAL
9.8
{'CWE-77'}
{'https://github.com/square/git-fastclone/pull/5', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8969', 'https://hackerone.com/reports/105190', 'https://github.com/advisories/GHSA-mf6w-45cf-qhmp', 'http://www.securityfocus.com/bid/81433'}
null
GHSA
GHSA-q86f-fmqf-qrf6
Moderate severity vulnerability that affects mail
The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring.
{'CVE-2015-9097'}
2021-09-16T19:40:52Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-93'}
{'http://www.mbsd.jp/Whitepaper/smtpi.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097', 'http://openwall.com/lists/oss-security/2015/12/11/3', 'https://github.com/mikel/mail/pull/1097', 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83', 'https://hackerone.com/reports/137631', 'https:...
null
GHSA
GHSA-wgvj-6v57-wjh3
Malicious Package in bowee
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that comput...
null
2021-09-30T21:37:06Z
2020-09-02T21:30:14Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/897', 'https://github.com/advisories/GHSA-wgvj-6v57-wjh3'}
null
GHSA
GHSA-mw35-24gh-f82w
High severity vulnerability that affects keycloak-connect and keycloak-js
It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks.
{'CVE-2017-7474'}
2022-05-02T20:40:47Z
2017-11-15T20:41:51Z
HIGH
0
{'CWE-253'}
{'https://github.com/advisories/GHSA-mw35-24gh-f82w', 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271', 'http://rhn.redhat.com/errata/RHSA-2017-1203.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'}
null
GHSA
GHSA-4qw8-pgpr-p9mq
Bash command injection in Apache Zeppelin
bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
{'CVE-2019-10095'}
2021-09-29T17:59:50Z
2021-09-07T22:56:43Z
HIGH
9.8
{'CWE-77', 'CWE-78'}
{'https://github.com/advisories/GHSA-4qw8-pgpr-p9mq', 'http://www.openwall.com/lists/oss-security/2021/09/02/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10095', 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread...
null
GHSA
GHSA-3q55-66g3-p8xq
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0926'}
2022-03-22T19:36:42Z
2022-03-13T00:00:54Z
MODERATE
4.8
{'CWE-79'}
{'https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17', 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120', 'https://github.com/advisories/GHSA-3q55-66g3-p8xq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926'}
null
GHSA
GHSA-v726-3vg9-cp34
Missing Authorization in FastReport
An issue was discovered in FastReport before 2020.4.0. It lacks a ScriptSecurity feature and therefore may mishandle (for example) GetType, typeof, TypeOf, DllImport, LoadLibrary, and GetProcAddress.
{'CVE-2020-27998'}
2021-08-02T17:28:16Z
2021-08-02T17:28:16Z
CRITICAL
9.8
{'CWE-862'}
{'https://securitylab.github.com/advisories/GHSL-2020-143-FastReportsInc-FastReports', 'https://github.com/FastReports/FastReport/pull/206', 'https://opensource.fast-report.com/2020/09/report-script-security.html', 'https://github.com/advisories/GHSA-v726-3vg9-cp34', 'https://github.com/FastReports/FastReport/compare/v...
null
GHSA
GHSA-5p98-wpc9-g498
Server-Side Request Forgery in html-pdf-chrome
All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as `<iframe src="http://localhost" height="800px" width="800px"></iframe>`. This allows attackers to access resources through HTTP...
null
2022-03-24T22:16:51Z
2020-09-04T15:21:32Z
HIGH
0
{'CWE-918'}
{'https://github.com/westy92/html-pdf-chrome/issues/249', 'https://www.npmjs.com/advisories/1339', 'https://github.com/advisories/GHSA-5p98-wpc9-g498'}
null
GHSA
GHSA-w754-gq8r-pf5f
High severity vulnerability that affects mini_magick
lib/mini_magick.rb in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
{'CVE-2013-2616'}
2021-09-21T18:03:10Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2616', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://www.osvdb.org/91231', 'http://seclists.org/fulldisclosure/2013/Mar/123', 'https://github.com/advisories/GHSA-w754...
null
GHSA
GHSA-4mv7-cq75-3qjm
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
{'CVE-2015-7940'}
2021-09-01T15:25:17Z
2018-10-17T16:27:50Z
MODERATE
0
{'CWE-200'}
{'https://usn.ubuntu.com/3727-1/', 'http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://www.securitytracker.com/id/1037053', 'https://github.com/advisories/GHSA-4mv7-cq75-3qjm', 'https://www.oracle.com/t...
null
GHSA
GHSA-9f8c-f7h4-xghf
Remote code execution in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180.
{'CVE-2020-1057'}
2021-08-02T17:28:53Z
2021-08-02T17:28:53Z
HIGH
8.1
{'CWE-119', 'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/pull/6500', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1057', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057', 'https://github.com/advisories/GHSA-9f8c-f7h4-xghf'}
null