ecosystem stringclasses 14
values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 988
values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-j229-2h63-rvh9 | Improper Authentication for Keycloak | A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application. | {'CVE-2020-1718'} | 2022-02-09T00:59:32Z | 2022-02-09T00:59:32Z | MODERATE | 8.8 | {'CWE-287'} | {'https://github.com/advisories/GHSA-j229-2h63-rvh9', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1718', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1718'} | null |
GHSA | GHSA-4873-36h9-wv49 | Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime | ### Impact
There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime.
To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm... | {'CVE-2021-39218'} | 2022-04-19T19:03:08Z | 2021-09-20T19:54:16Z | MODERATE | 6.3 | {'CWE-590', 'CWE-787', 'CWE-125'} | {'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c', 'https://github.com/advisories/GHSA-4873-36h9-wv49', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', 'https://crates.io/crates/wasmtime', '... | null |
GHSA | GHSA-3q6f-8grx-pr4v | Cross-site scripting in jspdf | "It's possible to use nested script tags in order to bypass the filtering regex." | {'CVE-2020-7691'} | 2021-05-11T16:43:52Z | 2021-05-11T16:43:52Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7691', 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-575254', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575252', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255', 'https://git... | null |
GHSA | GHSA-qf2g-q4mc-w7rr | Cross-site Scripting in Fork CMS | Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page. | {'CVE-2022-0145'} | 2022-03-30T21:04:26Z | 2022-03-25T00:00:34Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/advisories/GHSA-qf2g-q4mc-w7rr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'} | null |
GHSA | GHSA-j899-348x-h3rq | Malicious Package in serializes | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | null | 2021-09-30T20:27:54Z | 2020-09-03T19:57:54Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1139', 'https://github.com/advisories/GHSA-j899-348x-h3rq'} | null |
GHSA | GHSA-32w7-9whp-cjp9 | High severity vulnerability that affects tryton | The client in Tryton 5.x before 5.0.1 tries to make a connection to the bus in cleartext instead of encrypted under certain circumstances in bus.py and jsonrpc.py. This connection attempt fails, but it contains in the header the current session of the user. This session could then be stolen by a man-in-the-middle. | {'CVE-2018-19443'} | 2021-08-31T20:33:25Z | 2018-11-29T21:30:56Z | MODERATE | 5.9 | {'CWE-384'} | {'https://github.com/advisories/GHSA-32w7-9whp-cjp9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19443', 'https://bugs.tryton.org/issue7792', 'https://discuss.tryton.org/t/security-release-for-issue7792/830'} | null |
GHSA | GHSA-pjmx-9xr3-82qr | ReDoS via long UserAgent header in useragent | Affected versions of `useragent` are vulnerable to regular expression denial of service when an arbitrarily long `User-Agent` header is parsed.
## Proof of Concept
```
var useragent = require('useragent');
var badUserAgent = 'MSIE 0.0'+Array(900000).join('0')+'XBLWP';
var request = 'GET / HTTP/1.1\r\nUser-Agent: ' +... | {'CVE-2017-16030'} | 2021-01-08T21:18:50Z | 2018-07-24T19:59:13Z | HIGH | 0 | {'CWE-400'} | {'https://nodesecurity.io/advisories/312', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16030', 'https://www.npmjs.com/advisories/312', 'https://github.com/advisories/GHSA-pjmx-9xr3-82qr'} | null |
GHSA | GHSA-9p2w-rmx4-9mw7 | Command Injection in strapi | Versions of `strapi` before 3.0.0-beta.17.8 are vulnerable to Command Injection. The package fails to sanitize plugin names in the `/admin/plugins/install/` route. This may allow an authenticated attacker with admin privileges to run arbitrary commands in the server.
## Recommendation
Upgrade to version 3.0.0-beta.1... | null | 2021-10-04T19:12:13Z | 2020-09-04T16:54:02Z | HIGH | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-9p2w-rmx4-9mw7', 'https://www.npmjs.com/advisories/1424'} | null |
GHSA | GHSA-m5p4-7wf9-6w99 | Malicious Package in regenrator | All versions of `regenrator` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was publi... | null | 2021-10-01T13:29:07Z | 2020-09-01T21:10:53Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/685', 'https://github.com/advisories/GHSA-m5p4-7wf9-6w99'} | null |
GHSA | GHSA-43jj-2rwc-2m3f | Broken access control on files | In SilverStripe assets 4.0, there is broken access control on files. | {'CVE-2019-14273'} | 2021-09-22T21:03:47Z | 2020-07-15T17:38:04Z | MODERATE | 5.3 | {'CWE-552'} | {'https://www.silverstripe.org/blog/tag/release', 'https://forum.silverstripe.org/c/releases', 'https://www.silverstripe.org/download/security-releases/', 'https://github.com/advisories/GHSA-43jj-2rwc-2m3f', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2019-14273.yaml', 'h... | null |
GHSA | GHSA-8jjf-w7j6-323c | Authentication Bypass in samlify | Versions of `samlify` prior to 2.4.0 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allo... | {'CVE-2017-1000452'} | 2021-09-07T19:47:56Z | 2018-01-04T21:03:33Z | HIGH | 7.5 | {'CWE-91'} | {'https://www.whitehats.nl/blog/xml-signature-wrapping-samlify', 'https://github.com/advisories/GHSA-8jjf-w7j6-323c', 'https://www.npmjs.com/advisories/969', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000452', 'https://hackerone.com/reports/356284', 'https://github.com/tngan/samlify/releases/tag/v2.3.0'} | null |
GHSA | GHSA-49q3-8867-5wmp | Remote Command Execution in reg-keygen-git-hash-plugin | ### Impact
`reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands.
### Patches
Upgrade to version 0.10.16 or later.
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-... | {'CVE-2021-32673'} | 2022-04-19T19:02:59Z | 2021-06-08T18:47:06Z | HIGH | 8.8 | {'CWE-94', 'CWE-78'} | {'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87', 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32673', 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin', 'https://github.com/reg-viz/reg-suit/relea... | null |
GHSA | GHSA-qj5r-f9mv-rffh | `CHECK`-fails when building invalid tensor shapes in Tensorflow | ### Impact
Multiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes.
### Patch... | {'CVE-2022-23569'} | 2022-02-11T16:23:32Z | 2022-02-09T23:38:56Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23569', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md', 'https://github.com/advisories/GHSA-qj5r-f9mv-rffh'} | null |
GHSA | GHSA-4jh2-3c85-q67h | Improper Privilege Management in apache-airflow | In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for. | {'CVE-2021-45230'} | 2022-01-28T21:55:34Z | 2022-01-28T21:55:34Z | MODERATE | 6.5 | {'CWE-269'} | {'https://lists.apache.org/thread/m778ojn0k595rwco4ht9wjql89mjoxnl', 'https://github.com/advisories/GHSA-4jh2-3c85-q67h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45230'} | null |
GHSA | GHSA-rm4w-6696-r77p | nb-connect invalidly assumes the memory layout of std::net::SocketAddr | An issue was discovered in the nb-connect crate before 1.0.3 for Rust. It may have invalid memory access for certain versions of the standard library because it relies on a direct cast of std::net::SocketAddrV4 and std::net::SocketAddrV6 data structures. | {'CVE-2021-27376'} | 2021-08-25T20:52:14Z | 2021-08-25T20:52:14Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://github.com/advisories/GHSA-rm4w-6696-r77p', 'https://rustsec.org/advisories/RUSTSEC-2021-0021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27376', 'https://github.com/smol-rs/nb-connect/issues/1'} | null |
GHSA | GHSA-8pmx-p244-g88h | Interpreter crash from `tf.io.decode_raw` | ### Impact
The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes.
```python
import tensorflow as tf
tf.io.decode_raw(tf.constant(["1","2","3","4"]), tf.uint16, fixed_length=4)
```
The... | {'CVE-2021-29614'} | 2022-04-26T18:09:06Z | 2021-05-21T14:28:42Z | HIGH | 7.1 | {'CWE-665', 'CWE-787'} | {'https://github.com/advisories/GHSA-8pmx-p244-g88h', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29614', 'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'} | null |
GHSA | GHSA-8q2v-67v7-6vc6 | Data races in rocket | An issue was discovered in the rocket crate before 0.4.5 for Rust. LocalRequest::clone creates more than one mutable references to the same object, possibly causing a data race. | {'CVE-2020-35882'} | 2021-08-25T20:48:07Z | 2021-08-25T20:48:07Z | HIGH | 8.1 | {'CWE-362'} | {'https://github.com/advisories/GHSA-8q2v-67v7-6vc6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35882', 'https://rustsec.org/advisories/RUSTSEC-2020-0028.html', 'https://github.com/SergioBenitez/Rocket/issues/1312'} | null |
GHSA | GHSA-9783-42pm-x5jq | Use of Uninitialized Resource in csv-sniffer. | An issue was discovered in the csv-sniffer crate through 2021-01-05 for Rust. preamble_skipcount may read from uninitialized memory locations. | {'CVE-2021-45686'} | 2022-01-07T17:33:34Z | 2022-01-06T22:13:58Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0088.html', 'https://github.com/advisories/GHSA-9783-42pm-x5jq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45686', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/csv-sniffer/RUSTSEC-2021-0088.md'} | null |
GHSA | GHSA-x3v2-fgr6-3wmm | Double free in fil-ocl | An issue was discovered in the fil-ocl crate through 2021-01-04 for Rust. From<EventList> can lead to a double free. | {'CVE-2021-25908'} | 2021-08-25T20:53:03Z | 2021-08-25T20:53:03Z | HIGH | 7.5 | {'CWE-415'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25908', 'https://github.com/cogciprocate/ocl/issues/194', 'https://rustsec.org/advisories/RUSTSEC-2021-0011.html', 'https://github.com/advisories/GHSA-x3v2-fgr6-3wmm'} | null |
GHSA | GHSA-fxmx-pfm2-85m2 | Cross-site Scripting in Ericsson CodeChecker | In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API. | {'CVE-2021-44217'} | 2022-01-21T23:32:32Z | 2022-01-21T23:32:32Z | MODERATE | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44217', 'https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png', 'https://github.com/Ericsson/codechecker/releases/tag/v6.18.2', 'https://github.com/Ericsson/codechecker/pull/3549', 'https://github.com/Ericsson/codechecker/commit... | null |
GHSA | GHSA-wh69-wc6q-7888 | Command injection in node-dns-sync | dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. | {'CVE-2020-11079'} | 2021-11-04T17:08:10Z | 2020-05-28T18:42:59Z | HIGH | 8.6 | {'CWE-94', 'CWE-77'} | {'https://github.com/advisories/GHSA-wh69-wc6q-7888', 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079', 'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888'} | null |
GHSA | GHSA-m4hf-j54p-p353 | Type confusion leading to segfault in Tensorflow | ### Impact
The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion:
```python
imp... | {'CVE-2022-21731'} | 2022-02-11T17:05:51Z | 2022-02-10T00:19:50Z | MODERATE | 6.5 | {'CWE-754', 'CWE-843'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d... | null |
GHSA | GHSA-884p-74jh-xrg2 | Command Injection in tree-kill | Versions of `tree-kill` prior to 1.2.2 are vulnerable to Command Injection. The package fails to sanitize values passed to the `kill` function. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. The issue only affects Windows systems.
## Recommendation
Upgrade to versi... | null | 2021-10-04T19:40:26Z | 2020-09-04T16:57:20Z | HIGH | 0 | {'CWE-77'} | {'https://hackerone.com/reports/701183', 'https://github.com/advisories/GHSA-884p-74jh-xrg2', 'https://www.npmjs.com/advisories/1432'} | null |
GHSA | GHSA-8h8p-x289-vvqr | Gitea displaying raw OpenID error in UI | Gitea is a project to help users set up a self-hosted Git service. Server Side Request Forgery (SSRF) vulnerability exists in Gitea before 1.7.0 using the OpenID URL. Gitea can leak sensitive information about the local network through the error provided by the UI. | {'CVE-2021-45325'} | 2022-02-15T00:18:07Z | 2022-02-09T00:00:29Z | MODERATE | 5.3 | {'CWE-918'} | {'https://github.com/go-gitea/gitea/pull/5712', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45325', 'https://github.com/go-gitea/gitea/pull/5705', 'https://blog.gitea.io/2019/01/gitea-1.7.0-is-released/', 'https://github.com/advisories/GHSA-8h8p-x289-vvqr', 'https://github.com/go-gitea/gitea/issues/4973'} | null |
GHSA | GHSA-97m3-w2cp-4xx6 | Embedded Malicious Code in node-ipc | The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3. | {'CVE-2022-23812'} | 2022-04-15T13:11:55Z | 2022-03-16T23:54:32Z | CRITICAL | 9.8 | {'CWE-94', 'CWE-506'} | {'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580', 'https://github.com/RIAEvangelist/node-ipc/issues/236', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812', 'https://github.com/advisories/GHSA-97m3-w2cp-4xx6', 'https://github.com/RIAEvangelist/node-ipc/blob/847047cf7f81ab0835... | null |
GHSA | GHSA-r9q4-w3fm-wrm2 | Cross-Site Scripting in google-closure-library | Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting.
## Recommendation
Upgrade to... | null | 2021-09-27T21:01:49Z | 2020-09-02T21:21:43Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-r9q4-w3fm-wrm2', 'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853', 'https://www.npmjs.com/advisories/878', 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519'} | null |
GHSA | GHSA-jf9v-q8vh-3fmc | Cross-site scripting in ICEcoder | In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed. | {'CVE-2021-32106'} | 2021-09-09T17:11:11Z | 2021-09-09T17:11:11Z | MODERATE | 5.4 | {'CWE-79'} | {'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://github.com/icecoder/ICEcoder', 'https://github.com/advisories/GHSA-jf9v-q8vh-3fm... | null |
GHSA | GHSA-2wqp-jmcc-mc77 | Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17 | Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://va... | {'CVE-2021-31405'} | 2021-04-26T20:11:16Z | 2021-04-19T14:47:34Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-31405', 'https://vaadin.com/security/cve-2021-31405', 'https://github.com/advisories/GHSA-2wqp-jmcc-mc77', 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77', 'https://github.com/vaadin/flow-components/pull/442'} | null |
GHSA | GHSA-p8q8-jfcv-g2h2 | Directory Traversal in Archive_Tar | In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193. | {'CVE-2021-32610'} | 2021-09-27T18:46:37Z | 2021-08-09T20:40:06Z | HIGH | 7.1 | {'CWE-59'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G5LTY6COQYNMMHQJ3QIOJHEWCKD4XDFH/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CAODVMHGL5MHQWQAQTXQ7G7OE3VQZ7LS/', 'https://github.com/advisories/GHSA-p8q8-jfcv-g2h2', 'h... | null |
GHSA | GHSA-hxwm-x553-x359 | Arbitrary Command Injection due to Improper Command Sanitization | ### Summary
There exists a command injection vulnerability in `npmcli/git` versions <2.0.8 which may result in arbitrary shell command execution due to improper argument sanitization when `npmcli/git` is used to execute Git commands based on user controlled input.
The impact of this issue is possible Arbitrary Comman... | null | 2022-04-19T19:03:04Z | 2021-08-05T17:07:39Z | MODERATE | 0 | {'CWE-78'} | {'https://github.com/advisories/GHSA-hxwm-x553-x359', 'https://github.com/npm/git/pull/29', 'https://github.com/npm/git/security/advisories/GHSA-hxwm-x553-x359'} | null |
GHSA | GHSA-c427-hjc3-wrfw | Cross-site scripting in Swagger-UI | A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untr... | {'CVE-2019-17495'} | 2022-02-08T22:07:50Z | 2019-10-15T19:27:05Z | HIGH | 9.8 | {'CWE-79'} | {'https://github.com/advisories/GHSA-c427-hjc3-wrfw', 'https://lists.apache.org/thread.html/r103579b01da2d0aa0f672b88f811224bbf8ef493aaad845895955e91@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r853ffeb915a400f899de78124d4e0d77a19379... | null |
GHSA | GHSA-9q69-g5gc-9fgf | Cross-Site Request Forgery in Vert.x-Web framework | Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token ... | {'CVE-2020-35217'} | 2021-04-22T16:16:18Z | 2021-04-22T16:16:18Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/advisories/GHSA-9q69-g5gc-9fgf', 'https://github.com/vert-x3/vertx-web/pull/1613', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35217'} | null |
GHSA | GHSA-xc67-hjx6-cgg6 | Installation information leak in Eclipse Jetty | In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. Th... | {'CVE-2019-10247'} | 2022-04-21T17:37:41Z | 2019-04-23T16:07:12Z | MODERATE | 5.3 | {'CWE-200', 'CWE-213'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10247', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.debian.org/security/2021/dsa-4949', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/f9bc3e5... | null |
GHSA | GHSA-m57c-4vvx-gjgq | Format string vulnerabilities in pancurses | An issue was discovered in the pancurses crate through 0.16.1 for Rust. printw and mvprintw have format string vulnerabilities. | {'CVE-2019-15546'} | 2021-08-25T20:58:27Z | 2021-08-25T20:58:27Z | HIGH | 7.5 | {'CWE-134'} | {'https://rustsec.org/advisories/RUSTSEC-2019-0005.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15546', 'https://github.com/advisories/GHSA-m57c-4vvx-gjgq', 'https://github.com/ihalila/pancurses/issues/66', 'https://github.com/RustSec/advisory-db/issues/106'} | null |
GHSA | GHSA-894g-6j7q-2hx6 | Cross site scripting in flask-admin | helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL. | {'CVE-2018-16516'} | 2022-03-26T00:47:38Z | 2018-12-19T19:23:52Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZU2VKULURVXEU4YFTLMBQGYMPSXQ4MBN/', 'https://lists.fedoraproject.org/archives/... | null |
GHSA | GHSA-c38m-7h53-g9v4 | Path traversal in Apache James | Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacte... | {'CVE-2021-40525'} | 2022-03-30T21:13:25Z | 2022-01-21T23:36:47Z | CRITICAL | 9.1 | {'CWE-22'} | {'http://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/advisories/GHSA-c38m-7h53-g9v4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40525', 'https://www.openwall.com/lists/oss-security/2022/01/04/4', 'http://www.openwall.com/lists/oss-security/2022/01/04/4'} | null |
GHSA | GHSA-whww-v56c-cgv2 | Deserialization of Untrusted Data in Apache Dubbo | This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below. | {'CVE-2020-1948'} | 2022-02-10T22:39:17Z | 2022-02-10T22:39:17Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1948', 'https://github.com/advisories/GHSA-whww-v56c-cgv2', 'https://nsfocusglobal.com/apache-dubbo-remote-code-execution-vulnerability-cve-2020-1948-threat-alert/', 'https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity.... | null |
GHSA | GHSA-6x45-86q6-rcmr | Gyazo allows local users to write arbitrary files | lib/gyazo/client.rb in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames. | {'CVE-2014-4994'} | 2022-04-25T22:11:08Z | 2018-01-22T23:17:39Z | MODERATE | 5.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-4994', 'https://github.com/advisories/GHSA-6x45-86q6-rcmr', 'http://www.vapid.dhs.org/advisories/gyazo-1.0.0.html', 'http://www.openwall.com/lists/oss-security/2014/07/07/13', 'http://www.openwall.com/lists/oss-security/2014/07/17/5'} | null |
GHSA | GHSA-hvr8-466p-75rh | Integer overflow discovered in Pillow | Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow. | {'CVE-2016-4009'} | 2022-04-26T18:16:33Z | 2018-07-24T20:15:48Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e', 'https://github.com/python-pillow/Pillow/pull/1714', 'http://www.securityfocus.com/bid/86064', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4009', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-h... | null |
GHSA | GHSA-hxhj-hp9m-qwc4 | Moderate severity vulnerability that affects private_address_check | The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery. | {'CVE-2017-0904'} | 2021-01-08T18:38:40Z | 2017-11-29T23:21:05Z | MODERATE | 0 | {'CWE-242'} | {'https://edoverflow.com/2017/ruby-resolv-bug/', 'https://hackerone.com/reports/287835', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904', 'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af', 'https://hackerone.com/reports/287245', 'https://github.com/advisories/GHSA-hxhj... | null |
GHSA | GHSA-h65f-jvqw-m9fj | Infinite Loop in Apache Xerces Java | There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.1... | {'CVE-2022-23437'} | 2022-04-22T15:34:39Z | 2022-01-27T16:13:07Z | MODERATE | 6.5 | {'CWE-91'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj', 'https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl', 'http://www.openwall.com/lists/oss-security/2022/01/24/3'} | null |
GHSA | GHSA-hxhm-3vj9-6cqh | Downloads Resources over HTTP in apk-parser2 | Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-p... | {'CVE-2016-10632'} | 2021-01-08T18:38:53Z | 2018-09-18T13:49:31Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/223', 'https://github.com/advisories/GHSA-hxhm-3vj9-6cqh', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10632', 'https://nodesecurity.io/advisories/223'} | null |
GHSA | GHSA-6879-xr95-5gf4 | Malicious Package in malicious-do-not-install | All versions of `malicious-do-not-install` contain malicious code. The package copies the contents of `/etc/passwd` and `/etc/shadow` to files in the local `/tmp/` folder.
## Recommendation
Remove the package from your environment and rotate affected credentials. | null | 2021-09-30T17:16:36Z | 2020-09-03T17:20:15Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1040', 'https://github.com/advisories/GHSA-6879-xr95-5gf4'} | null |
GHSA | GHSA-9w7h-3wwh-6m5q | Cross-site Scripting in Microweber | Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user. | {'CVE-2022-1439'} | 2022-04-26T13:14:56Z | 2022-04-23T00:03:02Z | MODERATE | 6.3 | {'CWE-79'} | {'https://github.com/advisories/GHSA-9w7h-3wwh-6m5q', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439', 'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'} | null |
GHSA | GHSA-5cf4-jqwp-584g | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop 2.9.0 to 2.9.1, 2.8.3 to 2.8.4, 2.7.5 to 2.7.6, KMS blocking users or granting access to users incorrectly, if the system uses non-default groups mapping mechanisms. | {'CVE-2018-11767'} | 2021-09-01T21:35:01Z | 2019-03-25T16:17:32Z | HIGH | 7.4 | {'CWE-269'} | {'https://lists.apache.org/thread.html/246cf223e7dc0c1dff90b78dccb6c3fe94e1a044dbf98e2333393302@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-5cf4-jqwp-584g', 'ht... | null |
GHSA | GHSA-pvrc-hg3f-58r6 | Heap OOB access in `Dilation2DBackpropInput` | ### Impact
An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`:
```python
import tensorflow as tf
input_tensor = tf.constant([1.1] * 81, shape=[3, 3, 3, 3], dtype=tf.float32)
filter = tf.constant([], shape=[0, 0, 3], dtype=tf.float... | {'CVE-2021-29566'} | 2021-05-21T14:25:13Z | 2021-05-21T14:25:13Z | LOW | 2.5 | {'CWE-787'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/advisories/GHSA-pvrc-hg3f-58r6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29566', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'} | null |
GHSA | GHSA-w8xh-93qh-35vw | Unrestricted Upload of File with Dangerous Type in Payload | An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file. | {'CVE-2022-27952'} | 2022-04-22T20:29:01Z | 2022-04-13T00:00:22Z | CRITICAL | 9.8 | {'CWE-434'} | {'https://www.youtube.com/watch?v=6CfhAxA3xdQ', 'https://github.com/payloadcms/payload', 'https://github.com/advisories/GHSA-w8xh-93qh-35vw', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'} | null |
GHSA | GHSA-m8fm-mv5w-33pv | Command Injection in psnode | This affects all current versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. | {'CVE-2021-23375'} | 2021-05-06T15:52:59Z | 2021-05-06T15:52:59Z | HIGH | 7.3 | {'CWE-77'} | {'https://www.npmjs.com/package/psnode', 'https://github.com/nrako/psnode/blob/076f623689e4506d3647505daca13b3f482e0c31/lib/index.js%23L59', 'https://github.com/advisories/GHSA-m8fm-mv5w-33pv', 'https://snyk.io/vuln/SNYK-JS-PSNODE-1078543', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23375'} | null |
GHSA | GHSA-m8pw-h8qj-rgj9 | Downloads Resources over HTTP in ipip-coffee | Affected versions of `ipip-coffee` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application.
## Re... | {'CVE-2016-10673'} | 2021-01-08T18:29:04Z | 2019-02-18T23:44:24Z | MODERATE | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10673', 'https://github.com/advisories/GHSA-m8pw-h8qj-rgj9', 'https://nodesecurity.io/advisories/279', 'https://www.npmjs.com/advisories/279'} | null |
GHSA | GHSA-629c-j867-3v45 | Malicious Package in bitcoisnj-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d... | null | 2021-10-01T20:43:02Z | 2020-09-04T16:41:04Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1367', 'https://github.com/advisories/GHSA-629c-j867-3v45'} | null |
GHSA | GHSA-xpv2-8ppj-79hh | Expression injection in AviatorScript | AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL). | {'CVE-2021-41862'} | 2021-10-08T21:30:50Z | 2021-10-04T20:14:31Z | CRITICAL | 9.8 | {'CWE-74'} | {'https://github.com/advisories/GHSA-xpv2-8ppj-79hh', 'https://github.com/killme2008/aviatorscript/issues/421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41862'} | null |
GHSA | GHSA-8rf6-w2mx-4xjh | TODO | ** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other ... | {'CVE-2019-15149'} | 2021-12-03T14:37:54Z | 2019-08-19T23:45:47Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-8rf6-w2mx-4xjh', 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149', 'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18'} | null |
GHSA | GHSA-gcvv-gq92-x94r | Authenticated server-side request forgery in file upload via URL. | ### Impact
Authenticated server-side request forgery in file upload via URL.
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For o... | {'CVE-2021-37711'} | 2021-08-23T19:42:49Z | 2021-08-23T19:42:49Z | HIGH | 8.8 | {'CWE-918'} | {'https://github.com/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'} | null |
GHSA | GHSA-rggq-f2wf-m6cp | Malicious Package in jajajejejiji | All versions of `jajajejejiji` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as su... | null | 2021-10-01T13:44:24Z | 2020-09-02T18:31:08Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-rggq-f2wf-m6cp', 'https://www.npmjs.com/advisories/838'} | null |
GHSA | GHSA-hv4w-jhcj-6wfw | Cross-Site Scripting in snekserve | All versions of `snekserve` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternat... | null | 2021-09-29T18:32:32Z | 2020-09-03T20:34:23Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1167', 'https://github.com/advisories/GHSA-hv4w-jhcj-6wfw'} | null |
GHSA | GHSA-4p24-vmcr-4gqj | XSS vulnerability that affects bootstrap | In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041.
See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info. | {'CVE-2016-10735'} | 2021-07-26T21:48:49Z | 2019-01-17T13:57:27Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/twbs/bootstrap/pull/23679', 'https://github.com/twbs/bootstrap/pull/26460', 'https://github.com/advisories/GHSA-4p24-vmcr-4gqj', 'https://github.com/twbs/bootstrap/pull/23687', 'https://access.redhat.com/errata/RHSA-2020:0132', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://access.redh... | null |
GHSA | GHSA-9x52-887g-fhc2 | Out of bounds read in Tensorflow | ### Impact
The [TFG dialect of TensorFlow (MLIR)](https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport) makes several assumptions about the incoming `GraphDef` before converting it to the MLIR-based dialect.
If an attacker changes the `SavedModel` forma... | {'CVE-2022-23594'} | 2022-02-11T19:56:22Z | 2022-02-09T23:32:41Z | HIGH | 8.8 | {'CWE-125'} | {'https://github.com/advisories/GHSA-9x52-887g-fhc2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23594', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9x52-887g-fhc2', 'https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport'} | null |
GHSA | GHSA-qpxp-5j56-gg3x | Improper Input Validation in Zendesk Samlr | Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by <!---->. and then the attacker's domain name. | {'CVE-2018-20857'} | 2021-08-17T19:41:54Z | 2019-07-31T04:22:03Z | HIGH | 7.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20857', 'https://github.com/advisories/GHSA-qpxp-5j56-gg3x', 'https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2'} | null |
GHSA | GHSA-qmgf-fp85-55gr | Malicious Package in bitcionjs | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d... | null | 2021-10-01T20:39:29Z | 2020-09-04T15:40:34Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1360', 'https://github.com/advisories/GHSA-qmgf-fp85-55gr'} | null |
GHSA | GHSA-gw4j-4229-q4px | Server-Side Request Forgery in Apache Dubbo | In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability. | {'CVE-2021-25640'} | 2022-03-21T21:55:24Z | 2022-03-18T17:56:45Z | MODERATE | 6.1 | {'CWE-918'} | {'https://github.com/advisories/GHSA-gw4j-4229-q4px', 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77%40%3Cdev.dubbo.apache.org%3E', 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77@%3Cdev.dubbo.apache.org%3E', 'https://nvd.n... | null |
GHSA | GHSA-j28q-p8ww-cp87 | Prototype Pollution in merge-deep2. | All versions of package merge-deep2 are vulnerable to Prototype Pollution via the mergeDeep() function. | {'CVE-2021-23700'} | 2021-12-16T14:33:09Z | 2021-12-16T14:33:09Z | MODERATE | 6.5 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-MERGEDEEP2-1727593', 'https://github.com/advisories/GHSA-j28q-p8ww-cp87', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23700'} | null |
GHSA | GHSA-3crr-9vmg-864v | Moderate severity vulnerability that affects activerecord | The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method. | {'CVE-2013-1854'} | 2021-08-31T20:57:17Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-20'} | {'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1854', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00079.html', 'http://lists.opensuse.org/opensuse-updates/2013-... | null |
GHSA | GHSA-c383-q5vf-hx55 | Integer Overflow or Wraparound in Microweber | Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound. | {'CVE-2022-0913'} | 2022-03-23T15:35:30Z | 2022-03-12T00:00:36Z | HIGH | 7.5 | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0913', 'https://github.com/advisories/GHSA-c383-q5vf-hx55', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f'} | null |
GHSA | GHSA-vwcg-7xqw-qcxw | Heap Overflow in PyMiniRacer | A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption.
More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/. | {'CVE-2020-25489'} | 2021-01-07T22:56:19Z | 2020-09-18T18:03:59Z | MODERATE | 0 | {'CWE-119'} | {'https://github.com/sqreen/PyMiniRacer/security/advisories/GHSA-vwcg-7xqw-qcxw', 'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0', 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d', 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens... | null |
GHSA | GHSA-8549-p68h-m9mc | Malicious Package in buffdr-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T20:57:15Z | 2020-09-03T21:46:21Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1237', 'https://github.com/advisories/GHSA-8549-p68h-m9mc'} | null |
GHSA | GHSA-fh74-hm69-rqjw | procfs race condition with a shared volume mount | ### Impact
By crafting a malicious root filesystem (with `/proc` being a symlink to a directory which was inside a volume shared with another running container), an attacker in control of both containers can trick `runc` into not correctly configuring the container&amp;amp;amp;#39;s security labels and not correctl... | {'CVE-2019-19921'} | 2022-04-19T19:02:24Z | 2021-05-27T18:41:17Z | MODERATE | 5 | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-19921', 'https://github.com/opencontainers/runc/pull/2190', 'https://access.redhat.com/errata/RHSA-2020:0688', 'https://github.com/opencontainers/runc/issues/2197', 'https://github.com/advisories/GHSA-fh74-hm69-rqjw', 'https://github.com/opencontainers/runc/releases', 'https:... | null |
GHSA | GHSA-xm28-fw2x-fqv2 | Denial of Service in foreman | All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path.
## Recommendation
Upgrade to version 3.0.1. | null | 2021-08-04T21:20:47Z | 2019-05-31T23:08:14Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30', 'https://snyk.io/vuln/npm:foreman:20180429', 'https://hackerone.com/reports/320586', 'https://github.com/advisories/GHSA-xm28-fw2x-fqv2', 'https://nodesecurity.io/advisories/645', 'https://www.npmjs.com/advisories/645'} | null |
GHSA | GHSA-68wv-rjrm-576p | Low severity vulnerability that affects apache-airflow | In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow. | {'CVE-2017-17835'} | 2021-09-02T15:42:35Z | 2019-01-25T16:19:14Z | HIGH | 8.8 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-17835', 'https://github.com/advisories/GHSA-68wv-rjrm-576p', 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'} | null |
GHSA | GHSA-5ph6-qq5x-7jwc | ExternalName Services can be used to gain access to Envoy's admin interface | ### Impact
Josh Ferrell (@josh-ferrell) from VMware has reported that a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the... | {'CVE-2021-32783'} | 2022-04-19T19:03:04Z | 2021-08-30T17:22:10Z | HIGH | 8.5 | {'CWE-610'} | {'https://github.com/projectcontour/contour/security/advisories/GHSA-5ph6-qq5x-7jwc', 'https://github.com/projectcontour/contour/releases/tag/v1.15.2', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e', 'https://github.com/projectcontour/contour/releases/tag/v1.16.1', 'https://... | null |
GHSA | GHSA-w4v7-hwx7-9929 | Cross-site Scripting in tempura | This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability. | {'CVE-2021-23784'} | 2021-11-08T17:50:10Z | 2021-11-08T17:50:10Z | MODERATE | 6.1 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633', 'https://github.com/advisories/GHSA-w4v7-hwx7-9929', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784', 'https://github.com/lukeed/tempura/releases/tag/v0.4.0', 'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'} | null |
GHSA | GHSA-7xfq-xh6v-4mrm | Malicious Package in json-serializer | Version 2.0.10 of `json-serializer` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 2.0.10 of this module is found installed you will want ... | null | 2021-10-01T13:10:42Z | 2020-09-01T20:27:53Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-7xfq-xh6v-4mrm', 'https://www.npmjs.com/advisories/630'} | null |
GHSA | GHSA-p9pc-299p-vxgp | Prototype Pollution in yargs-parser | Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--foo.__proto__.bar baz'` adds a... | {'CVE-2020-7608'} | 2021-07-28T21:26:25Z | 2020-09-04T18:00:54Z | MODERATE | 5.3 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608', 'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2', 'https://www.npmjs.com/advisories/1500', 'https://github.com/advisories/GHSA-p9pc-299p-vxgp'} | null |
GHSA | GHSA-84fv-prrc-5ggr | Route Validation Bypass in call | Affected versions of `call` do not validate empty parameters, which may result in a bypass of route validation rules.
## Proof of Concept
Routing Scheme:
```
/api/{param}/{param2}/details
```
Triggering Request Path:
```
/api///
```
## Recommendation
Update to version 3.0.2 or later. | {'CVE-2016-10543'} | 2021-01-08T19:12:21Z | 2019-02-18T23:40:04Z | MODERATE | 0 | {'CWE-20'} | {'https://www.npmjs.com/advisories/121', 'https://nodesecurity.io/advisories/121', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10543', 'https://github.com/hapijs/hapi/issues/3228', 'https://github.com/advisories/GHSA-84fv-prrc-5ggr'} | null |
GHSA | GHSA-x7gm-rfgv-w973 | Potential DoS with NumberFilter conversion to integer values. | ### Impact
Automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents.
### Patches
Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50... | {'CVE-2020-15225'} | 2022-01-06T20:22:26Z | 2020-09-28T19:05:29Z | HIGH | 7.5 | {'CWE-681'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAT2ZAEF6DM3VFSOHKB7X3ASSHGQHJAK/', 'https://github.com/carltongibson/django-filter/security/advisories/GHSA-x7gm-rfgv-w973', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D... | null |
GHSA | GHSA-gpvr-g6gh-9mc2 | No Charset in Content-Type Header in express | Vulnerable versions of express do not specify a charset field in the content-type header while displaying 400 level response messages. The lack of enforcing user's browser to set correct charset, could be leveraged by an attacker to perform a cross-site scripting attack, using non-standard encodings, like UTF-7.
## R... | {'CVE-2014-6393'} | 2021-08-02T22:35:13Z | 2018-10-23T17:22:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.npmjs.com/advisories/8', 'https://github.com/advisories/GHSA-gpvr-g6gh-9mc2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1203190', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6393', 'https://nodesecurity.io/advisories/express-no-charset-in-content-type-header'} | null |
GHSA | GHSA-3m93-m4q6-mc6v | Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible | Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data. | {'CVE-2019-14864'} | 2022-04-25T23:34:51Z | 2020-02-26T19:54:31Z | MODERATE | 6.5 | {'CWE-532'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html', 'https://github.com/ansible/ansible/pull/64274', 'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/ansible/ansible/pull/64273', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14864', 'https://bugzilla.redhat.com/show_bug.cgi?i... | null |
GHSA | GHSA-6677-83pp-f862 | Cross-Site Scripting in @nuxt/devalue | Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys.
## Recommendation
Upgrade to version 1.2.3 or later. | {'CVE-2019-13506'} | 2021-08-17T18:13:30Z | 2019-07-16T00:42:02Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-13506', 'https://www.npmjs.com/advisories/814', 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2', 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be', 'https://github.com/nuxt/devalue/pull/8', 'https://github.com/Rich-Harris/devalue/issues/1... | null |
GHSA | GHSA-9vc2-p34x-jhxh | Moderate severity vulnerability that affects rack | Withdrawn, accidental duplicate publish.
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth. | null | 2021-12-03T14:23:29Z | 2018-09-17T21:56:30Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2015-3225', 'https://github.com/advisories/GHSA-9vc2-p34x-jhxh'} | null |
GHSA | GHSA-6f84-42vf-ppwp | Division by 0 in `QuantizedMul` | ### Impact
An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`:
```python
import tensorflow as tf
x = tf.zeros([4, 1], dtype=tf.quint8)
y = tf.constant([], dtype=tf.quint8)
min_x = tf.constant(0.0)
max_x = tf.constant(0.0010000000474974513)
min_y = tf.constant(0.0)
max_y = tf.constant(0.0010000000474... | {'CVE-2021-29528'} | 2021-05-21T17:06:47Z | 2021-05-21T14:22:02Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29528', 'https://github.com/advisories/GHSA-6f84-42vf-ppwp'} | null |
GHSA | GHSA-m4fq-xh7w-jhfm | Malicious Package in crytpo-js | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d... | null | 2021-10-01T21:00:30Z | 2020-09-03T19:39:46Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-m4fq-xh7w-jhfm', 'https://www.npmjs.com/advisories/1391'} | null |
GHSA | GHSA-vjfr-p6hp-jqqw | Command Injection in ungit | Versions of `ungit` prior to 0.9.0 are affected by a command injection vulnerability in the `url` parameter.
## Recommendation
Update version 0.9.0 or later. | {'CVE-2015-4130'} | 2021-09-23T21:01:16Z | 2020-08-31T23:00:10Z | CRITICAL | 0 | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-4130', 'https://github.com/advisories/GHSA-vjfr-p6hp-jqqw', 'https://github.com/FredrikNoren/ungit/issues/486', 'https://www.npmjs.com/advisories/40'} | null |
GHSA | GHSA-gm25-fpmr-43fj | Moderate severity vulnerability that affects rails | Cross-site scripting (XSS) vulnerability in the to_json (ActiveRecord::Base#to_json) function in Ruby on Rails before edge 9606 allows remote attackers to inject arbitrary web script via the input values. | {'CVE-2007-3227'} | 2021-09-13T12:35:51Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'http://dev.rubyonrails.org/ticket/8371', 'http://osvdb.org/36378', 'http://secunia.com/advisories/27756', 'http://bugs.gentoo.org/show_bug.cgi?id=195315', 'https://nvd.nist.gov/vuln/detail/CVE-2007-3227', 'http://pastie.caboo.se/65550.txt', 'http://weblog.rubyonrails.org/2007/10/5/rails-1-2-4-maintenance-release', 'h... | null |
GHSA | GHSA-chp4-rv79-68j3 | Apache serialization mechanism does not have a list of classes allowed for serialization/deserialization | In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepar... | {'CVE-2018-1295'} | 2022-04-26T19:14:40Z | 2018-10-16T20:53:44Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/advisories/GHSA-chp4-rv79-68j3', 'https://access.redhat.com/errata/RHSA-2018:2405', 'http://www.securityfocus.com/bid/103692', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1295', 'https://lists.apache.org/thread.html/45e7d5e2c6face85aab693f5ae0616563132ff757e5a558da80d0209@%3Cdev.ignite.apache.org%3E... | null |
GHSA | GHSA-xfrc-7mj2-5xh9 | Undefined Behavior in zencashjs | Versions of `zencashjs` prior to 1.2.0 may cause loss of funds when used with cryptocurrency wallets. The package relies on a string comparison of the first two characters of a Horizen address to determine the destination address type of a transaction (P2PKH or P2SH). Due to the base58 address prefixes chosen in Horize... | null | 2020-09-03T17:14:51Z | 2020-09-03T17:14:51Z | CRITICAL | 0 | null | {'https://github.com/ZencashOfficial/zencashjs/commit/db01bd94b9f8a956d7835e934500eaa643f8bd13#diff-42d8d2088a96641b563b25ad908b0c0fR146', 'https://www.npmjs.com/advisories/1035', 'https://github.com/advisories/GHSA-xfrc-7mj2-5xh9'} | null |
GHSA | GHSA-8crv-49fr-2h6j | Moderate severity vulnerability that affects org.springframework.security:spring-security-core and org.springframework:spring-core | Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments,... | {'CVE-2016-5007'} | 2021-09-07T16:38:25Z | 2018-10-17T20:30:12Z | HIGH | 7.5 | {'CWE-285'} | {'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://pivotal.io/security/cve-2016-5007', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5007', 'https://github.com/advisories/GHSA-8crv-49fr-2h6j', 'http://www.... | null |
GHSA | GHSA-hg78-4f6x-99wq | Moderate severity vulnerability that affects rack | There is a possible DoS vulnerability in the multipart parser in Rack before 2.0.6. Specially crafted requests can cause the multipart parser to enter a pathological state, causing the parser to use CPU resources disproportionate to the request size. | {'CVE-2018-16470'} | 2021-01-08T18:40:59Z | 2018-11-15T15:58:58Z | MODERATE | 0 | {'CWE-400'} | {'https://groups.google.com/forum/#!msg/rubyonrails-security/U_x-YkfuVTg/xhvYAmp6AAAJ', 'https://github.com/advisories/GHSA-hg78-4f6x-99wq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16470', 'https://access.redhat.com/errata/RHSA-2019:3172'} | null |
GHSA | GHSA-f5g8-5qq7-938w | Out-of-bounds Read | In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations. | {'CVE-2020-35653'} | 2022-04-25T23:38:57Z | 2021-03-18T19:55:41Z | HIGH | 7.1 | {'CWE-125'} | {'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://lists.fedoraproject.org/archives/list/pac... | null |
GHSA | GHSA-fv3h-8x5j-pvgq | XSS in python-markdown2 | python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute. | {'CVE-2020-11888'} | 2022-03-22T18:51:12Z | 2020-04-22T20:59:50Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PN6QSHRFZXRQAYZJQ4MOW5MKIXBYOMED/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XOAIRJJCZNJUALXDHSIGH5PS2H63A3J/', 'http://lists.opensuse.org/opensuse-security-announce/2... | null |
GHSA | GHSA-6gv9-7q4g-pmvm | Persistent XSS in customer module in Shopware | ### Impact
Persistent XSS in customer module
### Patches
We recommend updating to the current version 5.6.9. You can get the update to 5.6.9 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopw... | null | 2020-11-13T15:47:36Z | 2020-11-13T15:47:36Z | LOW | 0 | {'CWE-79'} | {'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-11-2020', 'https://github.com/shopware/shopware/security/advisories/GHSA-6gv9-7q4g-pmvm', 'https://github.com/advisories/GHSA-6gv9-7q4g-pmvm'} | null |
GHSA | GHSA-mf6w-45cf-qhmp | Git-fastclone passes user modifiable strings directly to a shell command | git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library. | {'CVE-2015-8969'} | 2022-04-26T18:21:55Z | 2018-08-15T20:04:44Z | CRITICAL | 9.8 | {'CWE-77'} | {'https://github.com/square/git-fastclone/pull/5', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8969', 'https://hackerone.com/reports/105190', 'https://github.com/advisories/GHSA-mf6w-45cf-qhmp', 'http://www.securityfocus.com/bid/81433'} | null |
GHSA | GHSA-q86f-fmqf-qrf6 | Moderate severity vulnerability that affects mail | The mail gem before 2.5.5 for Ruby (aka A Really Ruby Mail Library) is vulnerable to SMTP command injection via CRLF sequences in a RCPT TO or MAIL FROM command, as demonstrated by CRLF sequences immediately before and after a DATA substring. | {'CVE-2015-9097'} | 2021-09-16T19:40:52Z | 2017-10-24T18:33:36Z | MODERATE | 6.1 | {'CWE-93'} | {'http://www.mbsd.jp/Whitepaper/smtpi.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9097', 'http://openwall.com/lists/oss-security/2015/12/11/3', 'https://github.com/mikel/mail/pull/1097', 'https://github.com/mikel/mail/commit/72befdc4dab3e6e288ce226a7da2aa474cf5be83', 'https://hackerone.com/reports/137631', 'https:... | null |
GHSA | GHSA-wgvj-6v57-wjh3 | Malicious Package in bowee | Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that comput... | null | 2021-09-30T21:37:06Z | 2020-09-02T21:30:14Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/897', 'https://github.com/advisories/GHSA-wgvj-6v57-wjh3'} | null |
GHSA | GHSA-mw35-24gh-f82w | High severity vulnerability that affects keycloak-connect and keycloak-js | It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks. | {'CVE-2017-7474'} | 2022-05-02T20:40:47Z | 2017-11-15T20:41:51Z | HIGH | 0 | {'CWE-253'} | {'https://github.com/advisories/GHSA-mw35-24gh-f82w', 'https://bugzilla.redhat.com/show_bug.cgi?id=1445271', 'http://rhn.redhat.com/errata/RHSA-2017-1203.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7474'} | null |
GHSA | GHSA-4qw8-pgpr-p9mq | Bash command injection in Apache Zeppelin | bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions. | {'CVE-2019-10095'} | 2021-09-29T17:59:50Z | 2021-09-07T22:56:43Z | HIGH | 9.8 | {'CWE-77', 'CWE-78'} | {'https://github.com/advisories/GHSA-4qw8-pgpr-p9mq', 'http://www.openwall.com/lists/oss-security/2021/09/02/1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10095', 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread... | null |
GHSA | GHSA-3q55-66g3-p8xq | Cross-site Scripting in microweber | File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12. | {'CVE-2022-0926'} | 2022-03-22T19:36:42Z | 2022-03-13T00:00:54Z | MODERATE | 4.8 | {'CWE-79'} | {'https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17', 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120', 'https://github.com/advisories/GHSA-3q55-66g3-p8xq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926'} | null |
GHSA | GHSA-v726-3vg9-cp34 | Missing Authorization in FastReport | An issue was discovered in FastReport before 2020.4.0. It lacks a ScriptSecurity feature and therefore may mishandle (for example) GetType, typeof, TypeOf, DllImport, LoadLibrary, and GetProcAddress. | {'CVE-2020-27998'} | 2021-08-02T17:28:16Z | 2021-08-02T17:28:16Z | CRITICAL | 9.8 | {'CWE-862'} | {'https://securitylab.github.com/advisories/GHSL-2020-143-FastReportsInc-FastReports', 'https://github.com/FastReports/FastReport/pull/206', 'https://opensource.fast-report.com/2020/09/report-script-security.html', 'https://github.com/advisories/GHSA-v726-3vg9-cp34', 'https://github.com/FastReports/FastReport/compare/v... | null |
GHSA | GHSA-5p98-wpc9-g498 | Server-Side Request Forgery in html-pdf-chrome | All versions of `html-pdf-chrome` are vulnerable to Server-Side Request Forgery (SSRF). The package executes HTTP requests if the parsed HTML contains external references to resources, such as `<iframe src="http://localhost" height="800px" width="800px"></iframe>`. This allows attackers to access resources through HTTP... | null | 2022-03-24T22:16:51Z | 2020-09-04T15:21:32Z | HIGH | 0 | {'CWE-918'} | {'https://github.com/westy92/html-pdf-chrome/issues/249', 'https://www.npmjs.com/advisories/1339', 'https://github.com/advisories/GHSA-5p98-wpc9-g498'} | null |
GHSA | GHSA-w754-gq8r-pf5f | High severity vulnerability that affects mini_magick | lib/mini_magick.rb in the MiniMagick Gem 1.3.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | {'CVE-2013-2616'} | 2021-09-21T18:03:10Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-94'} | {'http://packetstormsecurity.com/files/120777/Ruby-Gem-Minimagic-Command-Execution.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2616', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://www.osvdb.org/91231', 'http://seclists.org/fulldisclosure/2013/Mar/123', 'https://github.com/advisories/GHSA-w754... | null |
GHSA | GHSA-4mv7-cq75-3qjm | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack." | {'CVE-2015-7940'} | 2021-09-01T15:25:17Z | 2018-10-17T16:27:50Z | MODERATE | 0 | {'CWE-200'} | {'https://usn.ubuntu.com/3727-1/', 'http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://www.securitytracker.com/id/1037053', 'https://github.com/advisories/GHSA-4mv7-cq75-3qjm', 'https://www.oracle.com/t... | null |
GHSA | GHSA-9f8c-f7h4-xghf | Remote code execution in ChakraCore | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180. | {'CVE-2020-1057'} | 2021-08-02T17:28:53Z | 2021-08-02T17:28:53Z | HIGH | 8.1 | {'CWE-119', 'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/pull/6500', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1057', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057', 'https://github.com/advisories/GHSA-9f8c-f7h4-xghf'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.