ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-49rx-x2rw-pc6f
Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops
### Impact The [shape inference functions for the `QuantizeAndDequantizeV*` operations](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc) can trigger a read outside of bounds of heap allocated array as illustrated in the following sets of PoCs: ```python import tensorflow as tf @tf.function def test(): data=tf.raw_ops.QuantizeAndDequantizeV4Grad( gradients=[1.0,1.0], input=[1.0,1.0], input_min=[1.0,10.0], input_max=[1.0,10.0], axis=-100) return data test() ``` ```python import tensorflow as tf @tf.function def test(): data=tf.raw_ops.QuantizeAndDequantizeV4( input=[1.0,1.0], input_min=[1.0,10.0], input_max=[1.0,10.0], signed_input=False, num_bits=10, range_given=False, round_mode='HALF_TO_EVEN', narrow_range=False, axis=-100) return data test() ``` ```python import tensorflow as tf @tf.function def test(): data=tf.raw_ops.QuantizeAndDequantizeV3( input=[1.0,1.0], input_min=[1.0,10.0], input_max=[1.0,10.0], signed_input=False, num_bits=10, range_given=False, narrow_range=False, axis=-100) return data test() ``` ```python import tensorflow as tf @tf.function def test(): data=tf.raw_ops.QuantizeAndDequantizeV2( input=[1.0,1.0], input_min=[1.0,10.0], input_max=[1.0,10.0], signed_input=False, num_bits=10, range_given=False, round_mode='HALF_TO_EVEN', narrow_range=False, axis=-100) return data test() ``` In all of these cases, `axis` is a negative value different than the special value used for optional/unknown dimensions (i.e., -1). However, the code ignores the occurences of these values: ```cc ... if (axis != -1) { ... c->Dim(input, axis); ... } ``` ### Patches We have patched the issue in GitHub commit [7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d](https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41205'}
2021-11-10T19:04:25Z
2021-11-10T19:04:25Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-49rx-x2rw-pc6f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f', 'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41205'}
null
GHSA
GHSA-5xwc-mrhx-5g3m
Reference binding to nullptr in `MatrixDiagV*` ops
### Impact An attacker can cause undefined behavior via binding a reference to null pointer in all operations of type `tf.raw_ops.MatrixDiagV*`: ```python import tensorflow as tf tf.raw_ops.MatrixDiagV3( diagonal=[1,0], k=[], num_rows=[1,2,3], num_cols=[4,5], padding_value=[], align='RIGHT_RIGHT') ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/linalg/matrix_diag_op.cc) has incomplete validation that the value of `k` is a valid tensor. We have check that this value is either a scalar or a vector, but there is no check for the number of elements. If this is an empty tensor, then code that accesses the first element of the tensor is wrong: ```cc auto& diag_index = context->input(1); ... lower_diag_index = diag_index.flat<int32>()(0); ``` ### Patches We have patched the issue in GitHub commit [f2a673bd34f0d64b8e40a551ac78989d16daad09](https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37657'}
2021-08-25T14:42:52Z
2021-08-25T14:42:52Z
HIGH
7.1
{'CWE-824'}
{'https://github.com/advisories/GHSA-5xwc-mrhx-5g3m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37657', 'https://github.com/tensorflow/tensorflow/commit/f2a673bd34f0d64b8e40a551ac78989d16daad09', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5xwc-mrhx-5g3m'}
null
GHSA
GHSA-p7w9-8mxw-p3g7
Improper Certificate Validation in Hutool
Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.
{'CVE-2022-22885'}
2022-03-01T18:36:45Z
2022-02-17T00:00:26Z
CRITICAL
9.8
{'CWE-295'}
{'https://github.com/advisories/GHSA-p7w9-8mxw-p3g7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22885', 'https://github.com/dromara/hutool/issues/2042', 'https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html'}
null
GHSA
GHSA-hrf4-hcpc-3345
Denial of service in microweber
Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or max 1000 characters as a workaround.
{'CVE-2022-0961'}
2022-03-25T17:09:25Z
2022-03-16T00:00:48Z
HIGH
7.1
{'CWE-190'}
{'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc', 'https://github.com/advisories/GHSA-hrf4-hcpc-3345', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961', 'https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436'}
null
GHSA
GHSA-84px-q68r-2fc9
Privilege escalation in the Sulu Admin panel
### Impact Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction. ### Patches The versions have been patched in 2.2.18, 2.3.8 and 2.4.0. ### Workarounds Patching the ProfileController of affected sulu versions yourself by overwriting it. ### References _Are there any links users can visit to find out more?_ Currently not. ### For more information If you have any questions or comments about this advisory: * Open an issue in [sulu/sulu repo](https://github.com/sulu/sulu/issues) * Email us at [security@sulu.io](mailto:security@sulu.io)
{'CVE-2021-43835'}
2021-12-16T14:08:57Z
2021-12-15T22:55:16Z
HIGH
7.2
{'CWE-269'}
{'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9', 'https://github.com/advisories/GHSA-84px-q68r-2fc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835', 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'}
null
GHSA
GHSA-5684-g483-2249
Signature Validation Bypass
### Impact Given a valid SAML Response, an attacker can potentially modify the document, bypassing signature validation in order to pass off the altered document as a signed one. This enables a variety of attacks, including users accessing accounts other than the one to which they authenticated in the identity provider, or full authentication bypass if an external attacker can obtain an expired, signed SAML Response. ### Patches A patch is available, users of gosaml2 should upgrade to v0.5.0 or higher. ### References See the [underlying advisory on goxmldsig](https://github.com/russellhaering/goxmldsig/security/advisories/GHSA-q547-gmf8-8jr7) for more details.
null
2022-04-19T19:02:35Z
2021-05-24T16:59:47Z
CRITICAL
0
{'CWE-347'}
{'https://github.com/advisories/GHSA-5684-g483-2249', 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-5684-g483-2249'}
null
GHSA
GHSA-97pv-4338-r5vp
Cross-site Scripting in file-upload-with-preview
This affects the package file-upload-with-preview before 4.2.0. A file containing malicious JavaScript code in the name can be uploaded (a user needs to be tricked into uploading such a file).
{'CVE-2021-23439'}
2021-09-07T23:08:54Z
2021-09-07T23:08:54Z
MODERATE
4.2
{'CWE-79'}
{'https://github.com/johndatserakis/file-upload-with-preview/pull/40/files?file-filters%5B%5D=.js&hide-deleted-files=true%23diff-fe47b243de17419c0daa22cd785cd754baed60cf3679d3da1d6fe006f9f4a7f0R174', 'https://github.com/johndatserakis/file-upload-with-preview/blob/develop/src/file-upload-with-preview.js%23L168', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23439', 'https://snyk.io/vuln/SNYK-JS-FILEUPLOADWITHPREVIEW-1579492', 'https://github.com/advisories/GHSA-97pv-4338-r5vp'}
null
GHSA
GHSA-cqh2-vc2f-q4fh
Arbitrary filepath traversal via URI injection
OctoRPKI does not escape a URI with a filename containing "..", this allows a repository to create a file, (ex. `rsync://example.org/repo/../../etc/cron.daily/evil.roa`), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on. ## Patches ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3907'}
2022-01-13T18:25:56Z
2021-11-10T20:08:29Z
HIGH
7.4
{'CWE-20', 'CWE-22'}
{'https://github.com/advisories/GHSA-cqh2-vc2f-q4fh', 'https://www.debian.org/security/2022/dsa-5041', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh', 'https://www.debian.org/security/2021/dsa-5033', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}
null
GHSA
GHSA-mj4x-wcxf-hm8x
Json-jwt (RubyGems) did not verify, or incorrectly verifies, the cryptographic signature for data
The json-jwt rubygem version >= 0.5.0 && < 1.9.4 contains a CWE-347: Improper Verification of Cryptographic Signature vulnerability in Decryption of AES-GCM encrypted JSON Web Tokens that can result in Attacker can forge a authentication tag. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 1.9.4 and later.
{'CVE-2018-1000539'}
2022-04-26T18:20:02Z
2018-07-31T18:13:51Z
MODERATE
5.3
{'CWE-347'}
{'https://github.com/nov/json-jwt/pull/62', 'https://www.debian.org/security/2018/dsa-4283', 'https://github.com/advisories/GHSA-mj4x-wcxf-hm8x', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000539'}
null
GHSA
GHSA-qpwf-4fx5-crqq
Directory Traversal in earlybird
Affected versions of `earlybird` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16154'}
2021-01-14T15:50:11Z
2020-09-01T17:19:36Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16154', 'https://github.com/advisories/GHSA-qpwf-4fx5-crqq', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/earlybird', 'https://nodesecurity.io/advisories/380', 'https://www.npmjs.com/advisories/380'}
null
GHSA
GHSA-w3f3-4j22-2v3p
Malicious Package in destroyer-of-worlds
The package `destroyer-of-worlds` contained malicious code. The package contained a bash script that was run as a postinstall script. The script deleted system files and attempted to exhaust resources by creating a large file, a fork bomb and an endless loop. The script targeted UNIX systems. ## Recommendation Remove the package from your environment and perform additional incident response on your system's files and processes.
null
2021-09-30T21:25:21Z
2020-09-02T21:27:02Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/890', 'https://github.com/advisories/GHSA-w3f3-4j22-2v3p'}
null
GHSA
GHSA-3944-787c-f852
Persistent Cross-Site scripting in Nexus Repository Manager
Sonatype Nexus Repository before 3.21.2 allows XSS.
{'CVE-2020-10203'}
2021-08-23T15:11:56Z
2020-04-14T15:27:21Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-3944-787c-f852', 'https://support.sonatype.com/hc/en-us/articles/360044361594', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10203', 'https://securitylab.github.com/advisories/GHSL-2020-016-nxrm-sonatype'}
null
GHSA
GHSA-vw2g-5827-m9fp
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.
{'CVE-2019-1308'}
2021-03-29T20:55:52Z
2021-03-29T20:55:52Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/advisories/GHSA-vw2g-5827-m9fp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1308'}
null
GHSA
GHSA-vc29-rj92-gc7j
Out-of-bounds Write in OpenCV
OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread.
{'CVE-2017-12606'}
2021-11-18T15:33:38Z
2021-10-12T22:02:12Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-vc29-rj92-gc7j', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/opencv/opencv/issues/9309', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}
null
GHSA
GHSA-2h3x-95c6-885r
Malicious Package in river-mock
All versions of `river-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:01:19Z
2020-09-03T17:46:46Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-2h3x-95c6-885r', 'https://www.npmjs.com/advisories/1062'}
null
GHSA
GHSA-3269-x4pw-vffg
OS Command Injection in diskusage-ng
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
{'CVE-2020-7631'}
2022-01-07T00:21:08Z
2022-01-07T00:21:08Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/iximiuz/node-diskusage-ng/blob/master/lib/posix.js#L11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7631', 'https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425', 'https://github.com/advisories/GHSA-3269-x4pw-vffg'}
null
GHSA
GHSA-68vr-8f46-vc9f
Username spoofing in OnionShare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-005 - Vulnerability type: Improper Input Sanitization - Threat level: Low ## Description: It is possible to change the username to that of another chat participant with an additional space character at the end of the name string. ## Technical description: Assumed users in Chat: - Alice - Bob - Mallory 1. Mallory renames to `Alice `. 2. Mallory sends message as `Alice `. 3. Alice and Bob receive a message from Mallory disguised as `Alice `, which is hard to distinguish from the `Alice` in the web interface. ![otf-005-a](https://user-images.githubusercontent.com/156128/140666112-8febd4d8-6761-41aa-955c-48be76f3c657.png) ![otf-005-b](https://user-images.githubusercontent.com/156128/140666113-1713ddf7-cef6-4dac-b718-9af1dc4ffdcd.png) Other (invisible) whitespace characters were found to be working as well. ## Impact: An adversary with access to the chat environment can use the rename feature to impersonate other participants by adding whitespace characters at the end of the username. ## Recommendation: - Remove non-visible characters from the username
{'CVE-2022-21696'}
2022-01-21T23:20:14Z
2022-01-21T23:20:14Z
MODERATE
4.3
{'CWE-20'}
{'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/advisories/GHSA-68vr-8f46-vc9f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21696'}
null
GHSA
GHSA-vcr5-xr9h-mvc5
Moderate severity vulnerability that affects python-gnupg
python-gnupg 0.3.5 and 0.3.6 allows context-dependent attackers to have an unspecified impact via vectors related to "option injection through positional arguments." NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7323.
{'CVE-2014-1929'}
2021-09-20T21:42:12Z
2018-11-06T23:12:48Z
MODERATE
0
{'CWE-20'}
{'http://seclists.org/oss-sec/2014/q1/245', 'https://github.com/advisories/GHSA-vcr5-xr9h-mvc5', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1929', 'http://seclists.org/oss-sec/2014/q1/335', 'http://www.debian.org/security/2014/dsa-2946', 'http://secunia.com/advisories/59031'}
null
GHSA
GHSA-2ggq-vfcp-gwhj
Cross-Site Scripting in @hapi/boom
Versions of `@hapi/boom` prior t 0.3.8 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly escape error messages, which may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 0.3.8 or later.
null
2021-10-04T20:48:51Z
2020-09-04T17:33:53Z
MODERATE
6.5
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-HAPIBOOM-541183', 'https://www.npmjs.com/advisories/1459', 'https://github.com/advisories/GHSA-2ggq-vfcp-gwhj', 'https://github.com/hapijs/boom'}
null
GHSA
GHSA-6m53-c78q-7qmg
Mitmweb in mitmproxy allows DNS Rebinding attacks
mitmweb in mitmproxy before v4.0.4 allows DNS Rebinding attacks, related to tools/web/app.py.
{'CVE-2018-14505'}
2022-04-26T18:21:25Z
2018-07-31T18:18:19Z
HIGH
8.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-6m53-c78q-7qmg', 'https://github.com/mitmproxy/mitmproxy/issues/3234', 'https://github.com/mitmproxy/mitmproxy/pull/3243', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14505'}
null
GHSA
GHSA-5q88-cjfq-g2mh
codecov NPM module allows remote attackers to execute arbitrary commands
codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596.
{'CVE-2020-7597'}
2021-08-19T17:22:07Z
2020-02-19T17:29:39Z
HIGH
8.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-CODECOV-548879', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597', 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh', 'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'}
null
GHSA
GHSA-9qvw-46gf-4fv8
Use After Free in tremor-script
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free.
{'CVE-2021-45702'}
2022-01-07T17:41:13Z
2022-01-06T22:09:07Z
HIGH
7.5
{'CWE-416'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0111.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md', 'https://github.com/advisories/GHSA-9qvw-46gf-4fv8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45702'}
null
GHSA
GHSA-75c5-f4gw-38r9
Multiple vulnerabilities through filename manipulation in Archive_Tar
Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33
{'CVE-2020-28949'}
2021-09-27T18:45:51Z
2021-04-22T16:20:59Z
HIGH
7.8
{'CWE-74'}
{'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/pear/archive_tar/CVE-2020-28949.yaml', 'https://www.debian.org/security/2020/dsa-4817', 'https://github.com/pear/Archive_Tar/issues/33', 'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html', 'https://security.gentoo.org/glsa/202101-23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da', 'https://github.com/advisories/GHSA-75c5-f4gw-38r9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949'}
null
GHSA
GHSA-vcgf-vmpc-ph79
Improper Access Control in microweber
Improper Access Control in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0277'}
2022-01-27T18:30:42Z
2022-01-21T18:06:16Z
MODERATE
6.5
{'CWE-284', 'CWE-269'}
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277', 'https://github.com/advisories/GHSA-vcgf-vmpc-ph79'}
null
GHSA
GHSA-wg37-7mrv-cfwm
Low severity vulnerability that affects org.apache.jmeter:ApacheJMeter
Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.
{'CVE-2019-0187'}
2021-09-21T19:37:42Z
2019-03-07T18:47:57Z
CRITICAL
9.8
{'CWE-327', 'CWE-502'}
{'https://github.com/advisories/GHSA-wg37-7mrv-cfwm', 'http://mail-archives.apache.org/mod_mbox/jmeter-user/201903.mbox/%3CCAH9fUpaUQaFbgY1Zh4OvKSL4wdvGAmVt%2Bn4fegibDoAxK5XARw%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0187', 'http://www.securityfocus.com/bid/107219'}
null
GHSA
GHSA-2cjf-w7c4-fhf6
Cross-site Scripting in Beanstalk console
Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting.
{'CVE-2022-0539'}
2022-02-11T21:08:35Z
2022-02-10T00:00:30Z
MODERATE
6.3
{'CWE-79'}
{'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694', 'https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539', 'https://github.com/advisories/GHSA-2cjf-w7c4-fhf6'}
null
GHSA
GHSA-gh8h-7j2j-qv4f
Incomplete validation in `tf.summary.create_file_writer`
### Impact If `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. ```python import tensorflow as tf import numpy as np tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2))) ``` ### Patches We have patched the issue in GitHub commit [874bda09e6702cd50bac90b453b50bcc65b2769e](https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e) (merging [#51715](https://github.com/tensorflow/tensorflow/pull/51715)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46909).
{'CVE-2021-41200'}
2021-11-10T19:31:16Z
2021-11-10T19:31:16Z
MODERATE
5.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41200', 'https://github.com/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/issues/46909', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f', 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e'}
null
GHSA
GHSA-98mf-8f57-64qf
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_tag_helper.rb in Ruby on Rails 3.x before 3.0.17, 3.1.x before 3.1.8, and 3.2.x before 3.2.8 allows remote attackers to inject arbitrary web script or HTML via the prompt field to the select_tag helper.
{'CVE-2012-3463'}
2021-09-07T21:12:11Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-98mf-8f57-64qf', 'http://weblog.rubyonrails.org/2012/8/9/ann-rails-3-2-8-has-been-released/', 'https://groups.google.com/group/rubyonrails-security/msg/961e18e514527078?dmode=source&output=gplain', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3463'}
null
GHSA
GHSA-g753-jx37-7xwh
ECDSA signature vulnerability of Minerva timing attack in jsrsasign
### Impact ECDSA side-channel attack named [Minerava](https://minerva.crocs.fi.muni.cz/) have been found and it was found that it affects to jsrsasign. Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication time depends on bits of scalar. In jsrsasign 8.0.13 or later, execution time of EC point and scalar multiplication is almost constant and fixed for the issue. - Minerva is one of timing attack or side channel attack for EC. - If you don't use ECDSA class, you are not affected the vulnerability. - The vulnerability is that attacker may guess private key by checking processing time of EC key generation or ECDSA signing. - The cause issue is that point multiplication processing time in ECDSA signing is depends on private key value. - After 8.0.13, processing time of point multiplication in ECDSA signing have become constant for key value in theory. ### Patches Users using ECDSA signature generation should upgrade to 8.0.13 or later. ### Workarounds There is no workarounds in jsrsasign. Update jsrsasign or use other ECDSA library. ### ACKNOWLEDGEMENT Thanks to Jan Jancar @J08nY, Petr Svenda and Vladimir Sedlacek of Masaryk University in Czech Republic to find and report this vulnerability. ### References https://minerva.crocs.fi.muni.cz/ https://www.npmjs.com/advisories/1505 https://github.com/kjur/jsrsasign/issues/411
null
2021-09-22T18:43:42Z
2020-06-30T16:05:08Z
MODERATE
5.9
{'CWE-362'}
{'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-561755', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.13', 'https://github.com/kjur/jsrsasign/issues/411', 'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh', 'https://github.com/advisories/GHSA-g753-jx37-7xwh', 'https://minerva.crocs.fi.muni.cz/', 'https://www.npmjs.com/advisories/1505'}
null
GHSA
GHSA-x3rq-r3cm-5vc4
Business Logic Errors in Publify
Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors.
{'CVE-2022-0524'}
2022-02-14T22:34:47Z
2022-02-09T00:00:27Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-x3rq-r3cm-5vc4', 'https://huntr.dev/bounties/bfffae58-b3cd-4e0e-b1f2-3db387a22c3d', 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5', 'https://github.com/publify/publify/releases/tag/v9.2.7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524'}
null
GHSA
GHSA-rvg5-f5fj-mxvg
Cross-site Scripting in Jenkins Credentials Plugin
Jenkins Credentials Plugin 1111.v35a_307992395 and earlier, except 1087.1089.v2f1b_9a_b_040e4, 1074.1076.v39c30cecb_0e2, and 2.6.1.1, does not escape the name and description of Credentials parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-29036'}
2022-04-22T21:06:55Z
2022-04-13T00:00:18Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29036', 'https://github.com/advisories/GHSA-rvg5-f5fj-mxvg', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}
null
GHSA
GHSA-7cv6-gvx3-m54m
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to properly encode rendered HTML on admin-created blog posts. This allows attackers to execute arbitrary JavaScript in the victim's browser. Exploiting this vulnerability requires having access to an admin account. ## Recommendation Update to version 4.0.0 or later.
{'CVE-2017-15881'}
2021-06-11T13:54:41Z
2017-11-16T01:47:02Z
MODERATE
4.8
{'CWE-79'}
{'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/advisories/GHSA-7cv6-gvx3-m54m', 'https://github.com/keystonejs/keystone/pull/4478', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15881', 'https://github.com/keystonejs/keystone/issues/4437', 'http://www.securityfocus.com/bid/101541', 'https://www.npmjs.com/advisories/981'}
null
GHSA
GHSA-2m8v-572m-ff2v
Command Injection Vulnerability
### Impact command injection vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
{'CVE-2021-21315'}
2021-03-19T17:54:20Z
2021-02-16T16:51:04Z
MODERATE
0
{'CWE-78'}
{'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21315', 'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525', 'https://github.com/advisories/GHSA-2m8v-572m-ff2v', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-2m8v-572m-ff2v', 'https://security.netapp.com/advisory/ntap-20210312-0007/', 'https://www.npmjs.com/package/systeminformation'}
null
GHSA
GHSA-4wch-fwmx-cf47
Directory Traversal in augustine
Affected versions of `augustine` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. ## Proof of Concept ``` GET //etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No direct patch is available at this time. Currently, the best mitigation for this flaw is to use a different, functionally equivalent static file server package.
{'CVE-2017-0930'}
2021-01-08T19:53:19Z
2018-09-18T13:50:25Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-4wch-fwmx-cf47', 'https://www.npmjs.com/advisories/559', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0930', 'https://hackerone.com/reports/296282'}
null
GHSA
GHSA-x446-3xhq-5xfp
Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon
SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option.
{'CVE-2022-27814'}
2022-04-26T13:03:53Z
2022-04-15T00:00:40Z
LOW
3.3
{'CWE-668'}
{'https://github.com/advisories/GHSA-x446-3xhq-5xfp', 'https://github.com/waycrate/swhkd/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27814', 'https://www.openwall.com/lists/oss-security/2022/04/14/1'}
null
GHSA
GHSA-458v-4hrf-g3m4
socket2 invalidly assumes the memory layout of std::net::SocketAddr
The socket2 crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation. The standard library does not say anything about the memory layout, and this will cause invalid memory access if the standard library changes the implementation. No warnings or errors will be emitted once the change happens.
{'CVE-2020-35920'}
2021-08-25T20:50:37Z
2021-08-25T20:50:37Z
MODERATE
5.5
{'CWE-188'}
{'https://github.com/rust-lang/socket2-rs/issues/119', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35920', 'https://github.com/advisories/GHSA-458v-4hrf-g3m4', 'https://rustsec.org/advisories/RUSTSEC-2020-0079.html'}
null
GHSA
GHSA-w248-xr37-jx8m
High severity vulnerability that affects fastreader
lib/entry_controller.rb in the fastreader Gem 1.0.8 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL.
{'CVE-2013-2615'}
2021-09-20T22:26:13Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-94'}
{'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2615', 'http://packetstormsecurity.com/files/120845/Ruby-Gem-Fastreader-1.0.8-Code-Execution.html', 'https://github.com/advisories/GHSA-w248-xr37-jx8m', 'http://www.osvdb.org/91232', 'http://packetstormsecurity.com/files/120776/Ruby-Gem-Fastreader-1.0.8-Command-Execution.html', 'http://seclists.org/fulldisclosure/2013/Mar/122'}
null
GHSA
GHSA-h7j7-pw3v-3v3x
Moderate severity vulnerability that affects org.keycloak:keycloak-core
keycloak before version 4.0.0.final is vulnerable to a infinite loop in session replacement. A Keycloak cluster with multiple nodes could mishandle an expired session replacement and lead to an infinite loop. A malicious authenticated user could use this flaw to achieve Denial of Service on the server.
{'CVE-2018-10912'}
2021-09-14T15:43:06Z
2018-10-18T16:49:54Z
MODERATE
4.9
{'CWE-835'}
{'https://github.com/advisories/GHSA-h7j7-pw3v-3v3x', 'https://nvd.nist.gov/vuln/detail/CVE-2018-10912'}
null
GHSA
GHSA-537h-rv9q-vvph
Access Restriction Bypass
Python-RSA 4.0 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).
{'CVE-2020-13757'}
2021-03-24T18:24:39Z
2021-03-24T18:24:39Z
HIGH
7.5
{'CWE-327'}
{'https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667', 'https://usn.ubuntu.com/4478-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13757', 'https://github.com/sybrenstuvel/python-rsa/issues/146', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/', 'https://github.com/advisories/GHSA-537h-rv9q-vvph'}
null
GHSA
GHSA-mvw8-v767-qhjm
Moderate severity vulnerability that affects radiant
Radiant CMS 1.1.4 has XSS via crafted Markdown input in the part_body_content parameter to an admin/pages/*/edit resource.
{'CVE-2018-5216'}
2021-09-15T21:03:11Z
2018-01-06T01:11:52Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-mvw8-v767-qhjm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5216', 'https://github.com/imsebao/404team/blob/master/radiantcms.md'}
null
GHSA
GHSA-7mg7-m5c3-3hqj
Data races in unicycle
Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab<T>` & `Unordered<T, S>`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads. This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab<T>` or `Unordered<T, S>` and accessed concurrently from multiple threads. The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab<T>` & `Unordered<T, S>` and adding `T: Sync` to `Sync` impls for `PinSlab<T>` & `Unordered<T, S>`.
null
2021-08-25T21:00:39Z
2021-08-25T21:00:39Z
MODERATE
0
{'CWE-362'}
{'https://github.com/udoprog/unicycle/issues/8', 'https://github.com/advisories/GHSA-7mg7-m5c3-3hqj', 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194', 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5', 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}
null
GHSA
GHSA-vfrc-ggmc-5jwv
Cross-site Scripting in django-helpdesk
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3950'}
2021-11-24T19:43:03Z
2021-11-23T17:55:46Z
HIGH
8.8
{'CWE-79'}
{'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60', 'https://github.com/advisories/GHSA-vfrc-ggmc-5jwv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3950', 'https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e', 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}
null
GHSA
GHSA-xpqw-fqpw-35fc
Directory Traversal in wangguojing123
Affected versions of `wangguojing123` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16150'}
2021-01-14T15:53:37Z
2020-09-01T16:57:54Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/374', 'https://www.npmjs.com/advisories/374', 'https://github.com/advisories/GHSA-xpqw-fqpw-35fc', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/wangguojing123', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16150'}
null
GHSA
GHSA-jrpg-35hw-m4p9
Capture-replay in Gitea
Gitea is a project to help users set up a self-hosted Git service. Gitea before 1.11.2 is affected by Trusting HTTP Permission Methods on the Server Side when referencing the vulnerable admin or user API. This could allow a remote malicious user to execute arbitrary code.
{'CVE-2021-45327'}
2022-02-15T00:17:58Z
2022-02-09T00:00:29Z
CRITICAL
9.8
{'CWE-294'}
{'https://github.com/go-gitea/gitea/pull/10465', 'https://blog.gitea.io/2020/03/gitea-1.11.2-is-released/', 'https://github.com/go-gitea/gitea/pull/10462', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45327', 'https://github.com/go-gitea/gitea/pull/10582', 'https://github.com/advisories/GHSA-jrpg-35hw-m4p9'}
null
GHSA
GHSA-xwhf-g6j5-j5gc
Float cast overflow undefined behavior
### Impact When the `boxes` argument of `tf.image.crop_and_resize` has a very large value, the CPU kernel implementation receives it as a C++ `nan` floating point value. Attempting to operate on this is undefined behavior which later produces a segmentation fault. ### Patches We have patched the issue in c0319231333f0f16e1cc75ec83660b01fedd4182 and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported in #42129
{'CVE-2020-15266'}
2021-08-26T15:20:48Z
2020-11-13T17:18:29Z
LOW
3.7
{'CWE-119'}
{'https://github.com/tensorflow/tensorflow/pull/42143/commits/3ade2efec2e90c6237de32a19680caaa3ebc2845', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xwhf-g6j5-j5gc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15266', 'https://github.com/tensorflow/tensorflow/issues/42129', 'https://github.com/advisories/GHSA-xwhf-g6j5-j5gc'}
null
GHSA
GHSA-cwv3-863g-39vx
Stack overflow due to looping TFLite subgraph
### Impact TFlite graphs must not have loops between nodes. However, this condition was not checked and an attacker could craft models that would result in infinite loop during evaluation. In certain cases, the infinite loop would be replaced by stack overflow due to too many recursive calls. For example, the [`While` implementation](https://github.com/tensorflow/tensorflow/blob/106d8f4fb89335a2c52d7c895b7a7485465ca8d9/tensorflow/lite/kernels/while.cc) could be tricked into a scneario where both the body and the loop subgraphs are the same. Evaluating one of the subgraphs means calling the `Eval` function for the other and this quickly exhaust all stack space. ### Patches We have patched the issue in GitHub commit [9c1dc920d8ffb4893d6c9d27d1f039607b326743](https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743) (for the `While` operator) and in GitHub commit [c6173f5fe66cdbab74f4f869311fe6aae2ba35f4](https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4) (in general). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29591'}
2022-04-26T18:09:15Z
2021-05-21T14:26:56Z
HIGH
7.3
{'CWE-835', 'CWE-674'}
{'https://github.com/advisories/GHSA-cwv3-863g-39vx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwv3-863g-39vx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29591', 'https://github.com/tensorflow/tensorflow/commit/c6173f5fe66cdbab74f4f869311fe6aae2ba35f4', 'https://github.com/tensorflow/tensorflow/commit/9c1dc920d8ffb4893d6c9d27d1f039607b326743'}
null
GHSA
GHSA-8fxc-qm65-vpxg
Temporary urls leaked via logging
In OpenStack Swift prior to 2.15.2, the proxy-server logs full tempurl paths, potentially leaking reusable tempurl signatures to anyone with read access to these logs. All Swift deployments using the tempurl middleware are affected.
{'CVE-2017-8761'}
2021-06-14T21:44:11Z
2021-06-08T19:23:22Z
LOW
0
{'CWE-200', 'CWE-117'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-8761', 'https://bugs.launchpad.net/swift/+bug/1685798/comments/18', 'https://github.com/advisories/GHSA-8fxc-qm65-vpxg', 'https://launchpad.net/bugs/1685798'}
null
GHSA
GHSA-77q4-m83q-w76v
Missing Origin Validation in browserify-hmr
Versions of `browserify-hmr` prior to 0.4.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Upgrade to version 0.4.0 or later.
{'CVE-2018-14730'}
2021-09-24T20:59:16Z
2020-09-01T21:18:20Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-77q4-m83q-w76v', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages)', 'https://www.npmjs.com/advisories/726', 'https://github.com/AgentME/browserify-hmr/issues/41', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14730', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages'}
null
GHSA
GHSA-4hvv-7x94-7vq8
Null dereference in Grappler's `TrySimplify`
### Impact The implementation of [`TrySimplify`](https://github.com/tensorflow/tensorflow/blob/c22d88d6ff33031aa113e48aa3fc9aa74ed79595/tensorflow/core/grappler/optimizers/arithmetic_optimizer.cc#L390-L401) has undefined behavior due to dereferencing a null pointer in corner cases that result in optimizing a node with no inputs. ### Patches We have patched the issue in GitHub commit [e6340f0665d53716ef3197ada88936c2a5f7a2d3](https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-29616'}
2021-05-21T14:28:47Z
2021-05-21T14:28:47Z
LOW
2.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/commit/e6340f0665d53716ef3197ada88936c2a5f7a2d3', 'https://github.com/advisories/GHSA-4hvv-7x94-7vq8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvv-7x94-7vq8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29616'}
null
GHSA
GHSA-vc5p-j8vw-mc6x
Permissions bypass in pleaser
Failure to normalize the umask in pleaser before 0.4 allows a local attacker to gain full root privileges if they are allowed to execute at least one command.
{'CVE-2021-31155'}
2021-08-25T21:01:47Z
2021-08-25T21:01:47Z
HIGH
7.8
{'CWE-279', 'CWE-269'}
{'https://www.openwall.com/lists/oss-security/2021/05/18/1', 'https://github.com/advisories/GHSA-vc5p-j8vw-mc6x', 'https://gitlab.com/edneville/please/-/tree/master/src/bin', 'https://gitlab.com/edneville/please', 'https://crates.io/crates/pleaser', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31155'}
null
GHSA
GHSA-rpq8-mmwh-q9hm
Directory traversal in Eclipse Mojarra
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
{'CVE-2020-6950'}
2022-04-22T15:47:12Z
2021-09-01T18:23:58Z
HIGH
7.5
{'CWE-22'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943', 'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741', 'https://github.com/eclipse-ee4j/mojarra/issues/4571', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6950', 'https://github.com/advisories/GHSA-rpq8-mmwh-q9hm', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-97x5-cc53-cv4v
Cross site scripting in froala-editor
A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML.
{'CVE-2020-22864'}
2021-10-29T13:50:49Z
2021-10-28T23:14:06Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/418sec/wysiwyg-editor/pull/1', 'https://www.youtube.com/watch?v=WE3b1iSnWJY', 'https://github.com/froala/wysiwyg-editor/issues/3880', 'https://github.com/advisories/GHSA-97x5-cc53-cv4v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22864', 'https://github.com/froala/wysiwyg-editor/pull/3911'}
null
GHSA
GHSA-4859-gpc7-4j66
Command Injection in dot
All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.
null
2021-08-04T20:55:57Z
2019-06-05T21:24:29Z
MODERATE
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-4859-gpc7-4j66', 'https://hackerone.com/reports/390929', 'https://www.npmjs.com/advisories/798'}
null
GHSA
GHSA-x79j-wgqv-g8h2
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form
### Problem It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue. ### References * [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)
{'CVE-2021-21358'}
2022-04-19T19:02:50Z
2021-03-23T01:54:06Z
MODERATE
5
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21358', 'https://typo3.org/security/advisory/typo3-core-sa-2021-004', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2', 'https://github.com/advisories/GHSA-x79j-wgqv-g8h2', 'https://packagist.org/packages/typo3/cms-form'}
null
GHSA
GHSA-876r-hj45-fw7g
Sandbox Breakout / Arbitrary Code Execution in safer-eval
All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system. ## Recommendation The package is not suited to receive arbitrary user input. Consider using an alternative package.
null
2020-09-03T21:18:41Z
2020-09-03T21:18:41Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1221', 'https://github.com/advisories/GHSA-876r-hj45-fw7g', 'https://gist.github.com/JLLeitschuh/609bb2efaff22ed84fe182cf574c023a'}
null
GHSA
GHSA-2f2w-349x-vrqm
Cross-site scripting (XSS) from field and configuration text displayed in the Panel
On Saturday, @hdodov reported that the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks. We used his report as an opportunity to find and fix XSS issues related to dynamic site content throughout the Panel codebase. ### Impact Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Such vulnerabilities are critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. Visitors without Panel access can only use this attack vector if your site allows changing site data from a frontend form (for example user self-registration or the creation of pages from a contact or other frontend form). If you validate or sanitize the provided form data, you are already protected against such attacks by external visitors. ### Patches [Kirby 3.5.7](https://github.com/getkirby/kirby/releases/tag/3.5.7) contains patches for the following issues we found during our investigation: - Some translated error and info messages contain placeholders to dynamically insert information like page titles or filenames. While the translation strings are allowed to contain HTML formatting, the dynamic data needs to be protected against XSS attacks. Kirby 3.5.7 now escapes the dynamic data. - Our `Box` component used to display information for the user supports HTML output for specific use-cases. We found out that the dialogs used in the `files`, `pages` and `users` fields as well as the `fields` section used it to display raw exception or error messages. These messages are now escaped. - The users and settings views display user and language data using the `ListItem` component that supports HTML. We now escape the dynamic data before it is passed to the `ListItem` component. - Some of our sections and fields support HTML for their `text`, `help` and/or `info` properties. This allows custom formatting from the blueprint, but also caused the original issue reported to us that allowed to inject HTML code from the content itself. Kirby 3.5.7 now escapes the default `text` displayed by the `files` and `pages` sections (filename/page title), the `files`, `pages` and `users` fields (filename/page title/username) and by query-based `checkboxes`, `radio`, `tags` and `multiselect` fields (default text depending on the used query). **Note:** Custom `text`, `help` and `info` queries in blueprints are *not* escaped in 3.5.7. We support HTML in these properties because there are valid use-cases for custom formatting. However there can still be XSS vulnerabilities depending on your use of these properties. In Kirby 3.6 we will provide a new feature that will make it much easier to control whether you want to allow HTML from query placeholders.
{'CVE-2021-32735'}
2022-04-19T19:03:01Z
2021-07-02T19:18:43Z
HIGH
7.1
{'CWE-80'}
{'https://github.com/advisories/GHSA-2f2w-349x-vrqm', 'https://github.com/getkirby/kirby/releases/tag/3.5.7', 'https://github.com/getkirby/kirby/security/advisories/GHSA-2f2w-349x-vrqm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32735'}
null
GHSA
GHSA-6phf-73q6-gh87
Insecure Deserialization in Apache Commons Beanutils
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
{'CVE-2019-10086'}
2022-04-21T17:53:38Z
2020-06-15T20:36:17Z
HIGH
7.3
{'CWE-502'}
{'https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/', 'https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10086', 'https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0194', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4317', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://github.com/advisories/GHSA-6phf-73q6-gh87', 'https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html', 'http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e', 'https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/', 'https://access.redhat.com/errata/RHSA-2020:0057', 'https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-g89m-3wjw-h857
Low severity vulnerability that affects puppet
Directory traversal vulnerability in lib/puppet/reports/store.rb in Puppet before 2.6.17 and 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, when Delete is enabled in auth.conf, allows remote authenticated users to delete arbitrary files on the puppet master server via a .. (dot dot) in a node name.
{'CVE-2012-3865'}
2021-09-10T20:29:08Z
2017-10-24T18:33:37Z
LOW
0
{'CWE-22'}
{'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00006.html', 'https://github.com/advisories/GHSA-g89m-3wjw-h857', 'https://bugzilla.redhat.com/show_bug.cgi?id=839131', 'https://github.com/puppetlabs/puppet/commit/554eefc55f57ed2b76e5ee04d8f194d36f6ee67f', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3865', 'https://github.com/puppetlabs/puppet/commit/d80478208d79a3e6d6cb1fbc525e24817fe8c4c6', 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://secunia.com/advisories/50014', 'http://puppetlabs.com/security/cve/cve-2012-3865/', 'http://www.debian.org/security/2012/dsa-2511'}
null
GHSA
GHSA-35m5-8cvj-8783
Improper hashing in enrocrypt
### Impact The vulnerability is we used MD5 hashing Algorithm In our hashing file. If anyone who is a beginner(and doesn't know about hashes) can face problems as MD5 is considered a Insecure Hashing Algorithm. ### Patches The vulnerability is patched in v1.1.4 of the product, the users can upgrade to version 1.1.4. ### Workarounds If u specifically want a version and don't want to upgrade, you can remove the `MD5` hashing function from the file `hashing.py` and this vulnerability will be gone ### References https://www.cybersecurity-help.cz/vdb/cwe/916/ https://www.cybersecurity-help.cz/vdb/cwe/327/ https://www.cybersecurity-help.cz/vdb/cwe/328/ https://www.section.io/engineering-education/what-is-md5/ https://www.johndcook.com/blog/2019/01/24/reversing-an-md5-hash/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt) * Create a Discussion in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
{'CVE-2021-39182'}
2021-11-10T16:28:46Z
2021-11-10T16:28:46Z
HIGH
7.5
{'CWE-327', 'CWE-916', 'CWE-328'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39182', 'https://github.com/advisories/GHSA-35m5-8cvj-8783', 'https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce', 'https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783'}
null
GHSA
GHSA-3gpc-w23c-w59w
Sandbox Breakout / Arbitrary Code Execution in pitboss-ng
All versions of `pitboss-ng` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `this.constructor.constructor` . This may allow attackers to execute arbitrary code in the system. Evaluating the payload `this.constructor.constructor('return process.env')()` prints the contents of `process.env`. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-04-21T19:45:42Z
2020-09-04T15:02:06Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-3gpc-w23c-w59w', 'https://www.npmjs.com/advisories/1319'}
null
GHSA
GHSA-qfhg-m6r8-xxpj
Incorrect Authorization in Drupal core
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
{'CVE-2020-13676'}
2022-02-26T00:24:46Z
2022-02-12T00:00:46Z
MODERATE
6.5
{'CWE-863', 'CWE-284'}
{'https://www.drupal.org/sa-core-2021-009', 'https://github.com/advisories/GHSA-qfhg-m6r8-xxpj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13676'}
null
GHSA
GHSA-mrhj-2g4v-39qx
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
null
2021-12-03T14:25:08Z
2018-09-17T21:58:19Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-mrhj-2g4v-39qx', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}
null
GHSA
GHSA-fxqh-cfjm-fp93
Division by 0 in `Reverse`
### Impact An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.Reverse`: ```python import tensorflow as tf tensor_input = tf.constant([], shape=[0, 1, 1], dtype=tf.int32) dims = tf.constant([False, True, False], shape=[3], dtype=tf.bool) tf.raw_ops.Reverse(tensor=tensor_input, dims=dims) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/36229ea9e9451dac14a8b1f4711c435a1d84a594/tensorflow/core/kernels/reverse_op.cc#L75-L76) performs a division based on the first dimension of the tensor argument: ```cc const int64 N = input.dim_size(0); const int64 cost_per_unit = input.NumElements() / N; ``` Since this is controlled by the user, an attacker can trigger a denial of service. ### Patches We have patched the issue in GitHub commit [4071d8e2f6c45c1955a811fee757ca2adbe462c1](https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29556'}
2021-05-21T14:24:39Z
2021-05-21T14:24:39Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fxqh-cfjm-fp93', 'https://github.com/tensorflow/tensorflow/commit/4071d8e2f6c45c1955a811fee757ca2adbe462c1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29556', 'https://github.com/advisories/GHSA-fxqh-cfjm-fp93'}
null
GHSA
GHSA-94hh-pjjg-rwmr
Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. Users should upgrade to `^3.11.4`. ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29444'}
2021-04-19T18:30:21Z
2021-04-19T14:58:49Z
MODERATE
5.9
{'CWE-203'}
{'https://github.com/advisories/GHSA-94hh-pjjg-rwmr', 'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444', 'https://www.npmjs.com/package/jose-browser-runtime'}
null
GHSA
GHSA-xc3p-ff3m-f46v
Insecure input handling in Flask-Cors
An issue was discovered in Flask-CORS (aka CORS Middleware for Flask) before 3.0.9. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
{'CVE-2020-25032'}
2022-04-29T20:27:29Z
2021-05-06T18:51:48Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-xc3p-ff3m-f46v', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00032.html', 'https://github.com/corydolphin/flask-cors/releases/tag/3.0.9', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00039.html', 'https://github.com/corydolphin/flask-cors/commit/67c4b2cc98ae87cf1fa7df4f97fd81b40c79b895', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25032', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00048.html', 'https://www.debian.org/security/2020/dsa-4775', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00028.html'}
null
GHSA
GHSA-pp75-xfpw-37g9
Prototype pollution in grpc and @grpc/grpc-js
"The package grpc before 1.24.4 and the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition."
{'CVE-2020-7768'}
2021-07-29T20:41:45Z
2021-05-10T19:16:14Z
HIGH
7.5
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7768', 'https://github.com/grpc/grpc-node/pull/1606', 'https://github.com/grpc/grpc-node/pull/1605', 'https://github.com/grpc/grpc-node/releases/tag/grpc%401.24.4', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038819', 'https://www.npmjs.com/package/grpc', 'https://www.npmjs.com/package/@grpc/grpc-js', 'https://snyk.io/vuln/SNYK-JS-GRPCGRPCJS-1038818', 'https://snyk.io/vuln/SNYK-JS-GRPC-598671', 'https://github.com/advisories/GHSA-pp75-xfpw-37g9'}
null
GHSA
GHSA-f599-5m7p-hcpf
Moderate severity vulnerability that affects grape
The grape rubygem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter.
{'CVE-2018-3769'}
2021-01-08T18:54:26Z
2018-08-13T20:45:32Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-f599-5m7p-hcpf', 'https://github.com/ruby-grape/grape/issues/1762', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3769', 'https://github.com/ruby-grape/grape/pull/1763', 'https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af'}
null
GHSA
GHSA-vqcm-7f7f-r539
brbackup exposes database password to unauthorized users
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.
{'CVE-2014-5004'}
2022-04-25T22:09:41Z
2018-03-05T19:32:06Z
HIGH
7.8
{'CWE-200'}
{'http://www.securityfocus.com/bid/68506', 'https://github.com/advisories/GHSA-vqcm-7f7f-r539', 'http://www.openwall.com/lists/oss-security/2014/07/10/6', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5004', 'http://www.openwall.com/lists/oss-security/2014/07/17/5', 'http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html'}
null
GHSA
GHSA-vmp5-c5hp-6c65
Woodpecker allows cross-site scripting (XSS) via build logs
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
{'CVE-2022-29947'}
2022-05-03T20:18:09Z
2022-04-30T00:00:33Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29947', 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v0.15.1', 'https://github.com/advisories/GHSA-vmp5-c5hp-6c65', 'https://github.com/woodpecker-ci/woodpecker/pull/879'}
null
GHSA
GHSA-f7qw-5pvg-mmwp
Prototype Pollution in lutils-merge
All versions of `lutils-merge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. ## Recommendation The package is deprecated and no fixes are available. Consider using an alternative package.
null
2021-08-16T15:30:52Z
2019-06-13T18:58:44Z
MODERATE
7.3
{'CWE-400'}
{'https://github.com/nfour/lutils-merge/issues/1', 'https://hackerone.com/reports/439107', 'https://snyk.io/vuln/SNYK-JS-LUTILSMERGE-174783', 'https://www.npmjs.com/advisories/893', 'https://github.com/advisories/GHSA-f7qw-5pvg-mmwp'}
null
GHSA
GHSA-wqvq-5m8c-6g24
CRLF injection
urllib3 before 1.25.9 allows CRLF injection if the attacker controls the HTTP request method, as demonstrated by inserting CR and LF control characters in the first argument of putrequest(). NOTE: this is similar to CVE-2020-26116.
{'CVE-2020-26137'}
2021-10-21T20:49:58Z
2021-06-18T18:46:43Z
MODERATE
6.5
{'CWE-74'}
{'https://github.com/urllib3/urllib3/commit/1dd69c5c5982fae7c87a620d487c2ebf7a6b436b', 'https://bugs.python.org/issue39603', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://usn.ubuntu.com/4570-1/', 'https://github.com/advisories/GHSA-wqvq-5m8c-6g24', 'https://github.com/urllib3/urllib3/pull/1800', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26137'}
null
GHSA
GHSA-r4x2-3cq5-hqvp
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins
The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
{'CVE-2018-8014'}
2022-04-27T13:38:43Z
2018-10-17T16:32:32Z
CRITICAL
9.8
{'CWE-1188'}
{'http://www.securityfocus.com/bid/104203', 'http://tomcat.apache.org/security-7.html', 'http://www.securitytracker.com/id/1041888', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0451', 'https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.securitytracker.com/id/1040998', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0450', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-r4x2-3cq5-hqvp', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2469', 'http://tomcat.apache.org/security-8.html', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2018:2470', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8014', 'https://usn.ubuntu.com/3665-1/', 'http://tomcat.apache.org/security-9.html'}
null
GHSA
GHSA-f6f2-3w33-54r9
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_aggregate_function has a use-after-free.
{'CVE-2021-45714'}
2022-01-07T16:14:06Z
2022-01-06T22:02:36Z
HIGH
7.5
{'CWE-416'}
{'https://github.com/advisories/GHSA-f6f2-3w33-54r9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45714', 'https://rustsec.org/advisories/RUSTSEC-2021-0128.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusqlite/RUSTSEC-2021-0128.md'}
null
GHSA
GHSA-f865-m6cq-j9vx
ReDOS in Mpmath
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Mpmath v1.0.0 when the mpmathify function is called.
{'CVE-2021-29063'}
2021-11-18T15:17:54Z
2021-08-09T20:44:51Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/fredrik-johansson/mpmath/commit/c811b37c65a4372a7ce613111d2a508c204f9833', 'https://github.com/fredrik-johansson/mpmath/issues/548', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUX3XWY2K3MSO7QXMZXQQYAURARSPC5/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29063', 'https://github.com/npm/hosted-git-info/pull/76', 'https://www.npmjs.com/package/hosted-git-info', 'https://github.com/advisories/GHSA-f865-m6cq-j9vx', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29063/Mpmath.md', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3M5O55E7VUDMXCPQR6MQTOIFDKHP36AA/', 'https://github.com/yetingli/SaveResults/blob/main/js/hosted-git-info.js', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MS2U6GLXQSRZJE2HVUAUMVFR2DWQLCZG/'}
null
GHSA
GHSA-26gr-cvq3-qxgf
Improper Authentication in Apache Shiro
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
{'CVE-2020-1957'}
2022-04-01T20:23:53Z
2021-05-07T15:53:18Z
CRITICAL
9.8
{'CWE-287'}
{'https://lists.debian.org/debian-lts-announce/2020/04/msg00014.html', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-26gr-cvq3-qxgf', 'https://lists.apache.org/thread.html/r17f371fc89d34df2d0c8131473fbc68154290e1be238895648f5a1e6%40%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb3982edf8bc8fcaa7a308e25a12d294fb4aac1f1e9d4e14fda639e77@%3Cdev.geode.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1957', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rc64fb2336683feff3580c3c3a8b28e80525077621089641f2f386b63@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-f768-8pvq-mm6r
Business Logic Errors in dolibarr/dolibarr
Dolibarr 14.0.5 and prior versions are vulnerable to Business Logic Errors.
{'CVE-2022-0414'}
2022-02-07T21:10:24Z
2022-02-01T22:01:47Z
MODERATE
4.3
null
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0414', 'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684', 'https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f', 'https://github.com/advisories/GHSA-f768-8pvq-mm6r'}
null
GHSA
GHSA-562c-5r94-xh97
The Pallets Project in flask that can result in large amount of memory usage
The Pallets Project flask version Before 0.12.3 contains a CWE-20: Improper Input Validation vulnerability in flask that can result in Large amount of memory usage possibly leading to denial of service. This attack appear to be exploitable via Attacker provides JSON data in incorrect encoding. This vulnerability appears to have been fixed in 0.12.3.
{'CVE-2018-1000656'}
2022-04-26T18:25:42Z
2018-08-23T19:10:40Z
HIGH
7.5
{'CWE-20'}
{'https://usn.ubuntu.com/4378-1/', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00025.html', 'https://github.com/pallets/flask/pull/2691', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000656', 'https://github.com/advisories/GHSA-562c-5r94-xh97', 'https://github.com/pallets/flask/releases/tag/0.12.3', 'https://security.netapp.com/advisory/ntap-20190221-0001/'}
null
GHSA
GHSA-362x-34h3-h6h6
Downloads Resources over HTTP in box2d-native
Affected versions of `box2d-native` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `box2d-native`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10617'}
2021-01-08T20:04:04Z
2019-02-18T23:56:48Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10617', 'https://www.npmjs.com/advisories/219', 'https://nodesecurity.io/advisories/219', 'https://github.com/advisories/GHSA-362x-34h3-h6h6'}
null
GHSA
GHSA-h6mq-3cj6-h738
Reverse Tabnabbing in showdown
Versions of `showdown` prior to 1.9.1 are vulnerable to [Reverse Tabnabbing](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page when opening links. This is commonly used for phishing attacks. ## Recommendation Upgrade to version 1.9.1 or later.
null
2021-10-01T16:12:37Z
2020-09-03T23:21:16Z
LOW
3.1
{'CWE-1022'}
{'https://www.npmjs.com/advisories/1302', 'https://snyk.io/vuln/SNYK-JS-SHOWDOWN-469487', 'https://github.com/showdownjs/showdown/pull/670/files', 'https://github.com/advisories/GHSA-h6mq-3cj6-h738'}
null
GHSA
GHSA-4cch-wxpw-8p28
Server-Side Forgery Request can be activated unmarshalling with XStream
### Impact The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15. ### Workarounds The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use. Users of XStream 1.4.14 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString") || type == java.lang.Void.class || void.class || Proxy.isProxy(type)) || type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream")); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26258'}
2021-11-18T15:25:26Z
2020-12-21T16:28:42Z
HIGH
7.7
{'CWE-918'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2020-26258.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26258', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://github.com/advisories/GHSA-4cch-wxpw-8p28', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://www.debian.org/security/2021/dsa-4828', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E'}
null
GHSA
GHSA-7qm6-9v49-38m9
Prototype Pollution in record-like-deep-assign
All versions of package record-like-deep-assign are vulnerable to Prototype Pollution via the main functionality.
{'CVE-2021-23402'}
2021-12-10T18:55:39Z
2021-12-10T18:55:39Z
HIGH
7.3
{'CWE-1321', 'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23402', 'https://snyk.io/vuln/SNYK-JS-RECORDLIKEDEEPASSIGN-1311024', 'https://github.com/advisories/GHSA-7qm6-9v49-38m9', 'https://github.com/kripod/record-like-deep-assign/blob/v1.0.1/src/mod.ts%23L17-L35'}
null
GHSA
GHSA-hgjr-632x-qpp3
Cross-site scripting vulnerability in file upload
There is a cross-site scripting vulnerability in file upload on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. ### Target baserCMS 4.5.1 and earlier versions ### Vulnerability Execution of malicious JavaScript code may alter the display of the page or leak cookie information. ### Countermeasures Update to the latest version of baserCMS Please refer to the next page for details. https://basercms.net/security/JVN_14134801
{'CVE-2021-39136'}
2021-08-30T16:18:59Z
2021-08-30T16:18:59Z
HIGH
8.7
{'CWE-79'}
{'https://basercms.net/security/JVN_14134801', 'http://jvn.jp/en/jp/JVN14134801/index.html', 'https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39136'}
null
GHSA
GHSA-jm35-h8q2-73mp
Improper one time password handling in devise-two-factor
### Impact As a result of an incomplete fix for CVE-2015-7225, in versions of devise-two-factor prior to 4.0.2 it is possible to reuse a One-Time-Password (OTP) for one (and only one) immediately trailing interval. ### Patches This vulnerability has been patched in version 4.0.2 which was released on March 24th, 2022. Individuals using this package are strongly encouraged to upgrade as soon as possible. ### Credit for discovery Benoit Côté-Jodoin Michael Nipper - https://github.com/tinfoil/devise-two-factor/issues/106
{'CVE-2021-43177'}
2022-04-18T22:18:24Z
2022-04-07T22:09:03Z
MODERATE
5.3
null
{'https://github.com/tinfoil/devise-two-factor/security/advisories/GHSA-jm35-h8q2-73mp', 'https://github.com/tinfoil/devise-two-factor/issues/106', 'https://github.com/advisories/GHSA-jm35-h8q2-73mp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43177'}
null
GHSA
GHSA-2473-9hgq-j7xw
Cross-Site Scripting in Wagtail
### Impact When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)), any HTML tags used within a form field's help text will be rendered unescaped in the page. Allowing HTML within help text is [an intentional design decision](https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text) by Django; however, as a matter of policy Wagtail does not allow editors to insert arbitrary HTML by default, as this could potentially be used to carry out cross-site scripting attacks, including privilege escalation. This functionality should therefore not have been made available to editor-level users. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin. ### Patches Patched versions have been released as Wagtail 2.7.4 (for the LTS 2.7 branch) and Wagtail 2.9.3 (for the current 2.9 branch). In these versions, help text will be escaped to prevent the inclusion of HTML tags. Site owners who wish to re-enable the use of HTML within help text (and are willing to accept the risk of this being exploited by editors) may set `WAGTAILFORMS_HELP_TEXT_ALLOW_HTML = True` in their configuration settings. ### Workarounds Site owners who are unable to upgrade to the new versions can secure their form page templates by [rendering forms field-by-field as per Django's documentation](https://docs.djangoproject.com/en/3.0/topics/forms/#looping-over-the-form-s-fields), but omitting the `|safe` filter when outputting the help text. ### Acknowledgements Many thanks to Timothy Bautista for reporting this issue. ### For more information If you have any questions or comments about this advisory: * Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html) * Email us at [security@wagtail.io](mailto:security@wagtail.io) (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)
{'CVE-2020-15118'}
2022-04-19T19:02:30Z
2020-07-20T17:50:30Z
MODERATE
5.7
{'CWE-79'}
{'https://github.com/wagtail/wagtail/blob/master/docs/releases/2.9.3.rst', 'https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15118', 'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw', 'https://github.com/advisories/GHSA-2473-9hgq-j7xw', 'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34', 'https://docs.djangoproject.com/en/3.0/ref/models/fields/#django.db.models.Field.help_text'}
null
GHSA
GHSA-9j9m-8wjc-ff96
Insufficient Session Expiration in apostrophe
Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions.
{'CVE-2021-25979'}
2021-11-19T13:29:28Z
2021-11-10T17:02:44Z
CRITICAL
9.8
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25979', 'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c', 'https://github.com/advisories/GHSA-9j9m-8wjc-ff96'}
null
GHSA
GHSA-x9j7-x98r-r4w2
Segmentation fault in tensorflow-lite
### Impact If a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. ### Patches We have patched the issue in d58c96946b and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### Workarounds A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that no operator reuses tensors as both inputs and outputs. Care should be taken to check all types of inputs (i.e., constant or variable tensors as well as optional tensors). ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been discovered from a variant analysis of [GHSA-cvpc-8phh-8f45](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvpc-8phh-8f45).
{'CVE-2020-15210'}
2021-11-19T15:11:28Z
2020-09-25T18:28:51Z
MODERATE
6.5
{'CWE-20', 'CWE-787'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15210', 'https://github.com/tensorflow/tensorflow/commit/d58c96946b2880991d63d1dacacb32f0a4dfa453', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/advisories/GHSA-x9j7-x98r-r4w2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x9j7-x98r-r4w2'}
null
GHSA
GHSA-8vh8-vc28-m2hf
Potential to access user credentials from the log files when debug logging enabled
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
{'CVE-2019-10212'}
2022-02-11T21:13:00Z
2019-11-20T01:33:54Z
CRITICAL
9.8
{'CWE-532'}
{'https://access.redhat.com/errata/RHSA-2019:2998', 'https://github.com/advisories/GHSA-8vh8-vc28-m2hf', 'https://security.netapp.com/advisory/ntap-20220210-0017/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10212', 'https://access.redhat.com/errata/RHSA-2020:0727'}
null
GHSA
GHSA-rcv7-4w2m-gj9v
Malicious Package in sj-tw-test-security
All versions of `sj-tw-test-security` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:15:10Z
2020-09-03T23:24:26Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-rcv7-4w2m-gj9v', 'https://www.npmjs.com/advisories/1308'}
null
GHSA
GHSA-4pm3-f52j-8ggh
Improper Input Validation in GeoServer
### Impact The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism. In order to perform any of the above changes, the attack needs to have obtained admin rights and use either the GeoServer GUI, or its REST API. ### Patches The lookups are going to be restricted in GeoServer 2.21.0, 2.20.4, 2.19.6. ### Workarounds Protection can be achieved by making the GUI (``geoserver/web``), the REST configuration (``geoserver/rest``) and the embedded GeoWebCache configuration (``geoserver/gwc/rest``) unreachable from remote hosts, in addition to protecting access to the file system where the GeoServer configuration is stored.
{'CVE-2022-24847'}
2022-04-28T20:51:26Z
2022-04-22T20:39:10Z
HIGH
7.2
{'CWE-20'}
{'https://github.com/geoserver/geoserver/security/advisories/GHSA-4pm3-f52j-8ggh', 'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24847', 'https://github.com/advisories/GHSA-4pm3-f52j-8ggh'}
null
GHSA
GHSA-8f4m-hccc-8qph
Insertion of Sensitive Information into Log File in ansible
A flaw was found in ansible. Credentials, such as secrets, are being disclosed in console log by default and not protected by no_log feature when using those modules. An attacker can take advantage of this information to steal those credentials. The highest threat from this vulnerability is to data confidentiality.
{'CVE-2021-20191'}
2021-06-04T18:56:17Z
2021-06-01T21:38:33Z
MODERATE
5.5
{'CWE-532'}
{'https://github.com/advisories/GHSA-8f4m-hccc-8qph', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916813', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20191', 'https://access.redhat.com/security/cve/cve-2021-20191'}
null
GHSA
GHSA-jgmr-wrwx-mgfj
Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
{'CVE-2019-3797'}
2021-08-03T21:46:37Z
2019-05-14T04:02:35Z
MODERATE
5.3
{'CWE-89', 'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3797', 'https://github.com/advisories/GHSA-jgmr-wrwx-mgfj', 'https://pivotal.io/security/cve-2019-3797'}
null
GHSA
GHSA-97mg-3cr6-3x4c
Remote Code Execution in mongodb-query-parser
Versions of `mongodb-query-parser` prior to 2.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize queries, allowing attackers to execute arbitrary code in the system. Parsing the following payload executes `touch test-file`: ```'(function () { return (clearImmediate.constructor("return process;")()).mainModule.require("child_process").execSync("touch test-file").toString()})()'``` ## Recommendation Upgrade to version 2.0.0 or later.
null
2020-09-04T17:27:23Z
2020-09-04T17:27:23Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-97mg-3cr6-3x4c', 'https://www.npmjs.com/advisories/1448'}
null
GHSA
GHSA-jf55-rgpx-p6rx
Malicious Package in iie-viz
Version 1.0.4 of `iie-viz` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:12:22Z
2020-09-03T19:12:22Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/1103', 'https://github.com/advisories/GHSA-jf55-rgpx-p6rx'}
null
GHSA
GHSA-mc84-pj99-q6hh
Improper Handling of Length Parameter Inconsistency in Compress
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
{'CVE-2021-36090'}
2022-04-22T15:45:11Z
2021-08-02T16:55:53Z
HIGH
7.5
{'CWE-130'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/6', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36090', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E', 'https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E', 'https://github.com/advisories/GHSA-mc84-pj99-q6hh', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/4', 'https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
null
GHSA
GHSA-qwwr-qc2p-6283
Out-of-bounds write in libpng
An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.
{'CVE-2018-14550'}
2021-10-21T21:19:33Z
2021-03-22T16:57:07Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-qwwr-qc2p-6283', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612', 'https://github.com/glennrp/libpng/issues/246', 'https://security.gentoo.org/glsa/201908-02', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14550'}
null
GHSA
GHSA-hfmf-q43v-2ffj
Improper Key Verification in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version. ## Recommendation Upgrade to version 4.2.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9154'}
2021-08-17T22:08:26Z
2019-08-23T21:42:18Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0', 'https://www.npmjs.com/advisories/1161', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://github.com/openpgpjs/openpgpjs/pull/797', 'https://github.com/advisories/GHSA-hfmf-q43v-2ffj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}
null
GHSA
GHSA-mc9x-v9xg-25pm
Exfiltrates data on installation in coffescript
The `coffescript` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `coffescript` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16205'}
2021-01-08T18:29:34Z
2018-08-06T20:12:54Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/542', 'https://nodesecurity.io/advisories/542', 'https://github.com/advisories/GHSA-mc9x-v9xg-25pm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16205'}
null
GHSA
GHSA-3j7m-hmh3-9jmp
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript. ## Recommendation Update to version 1.4.3 or later.
{'CVE-2016-1000237'}
2021-08-23T15:18:04Z
2020-04-16T03:14:47Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/punkave/sanitize-html/issues/29', 'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf', 'https://www.npmjs.com/advisories/135', 'https://nodesecurity.io/advisories/135', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237', 'https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json', 'https://github.com/apostrophecms/sanitize-html/issues/29', 'https://github.com/advisories/GHSA-3j7m-hmh3-9jmp'}
null
GHSA
GHSA-3358-4f7f-p4j4
Use after free in generic-array
An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.
{'CVE-2020-36465'}
2021-08-25T20:56:12Z
2021-08-25T20:56:12Z
HIGH
7.5
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36465', 'https://github.com/fizyk20/generic-array/issues/98', 'https://rustsec.org/advisories/RUSTSEC-2020-0146.html', 'https://github.com/advisories/GHSA-3358-4f7f-p4j4'}
null
GHSA
GHSA-9cq5-xgg4-x477
SQL Injection in showdoc
Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository.
{'CVE-2022-0362'}
2022-02-10T22:30:55Z
2022-01-27T00:01:15Z
MODERATE
6.7
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0362', 'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb', 'https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091', 'https://github.com/advisories/GHSA-9cq5-xgg4-x477'}
null