ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA
|
GHSA-fmj2-7wx8-qj4v
|
Server-side request forgery (SSRF) in Apache XmlGraphics Commons
|
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
|
{'CVE-2020-11988'}
|
2022-02-09T00:45:56Z
|
2022-02-09T00:45:56Z
|
HIGH
| 8.2
|
{'CWE-20', 'CWE-918'}
|
{'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https://github.com/advisories/GHSA-fmj2-7wx8-qj4v', 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11988', 'https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/XGC-122', 'https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33/', 'https://xmlgraphics.apache.org/security.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-58c7-px5v-82hh
|
Potential sensitive information disclosed in error reports
|
django-registration is a user-registration application for Django.
### Impact
The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django.
Triggering this requires the following conditions:
* A site is using django-registration < 3.1.2
* The site has detailed error reports (such as Django's [emailed error reports to site staff/developers](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#email-reports)) enabled
* A server-side error (HTTP 5xx) occurs during an attempt by a user to register an account
Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password).
### Patches
As of version 3.1.2, django-registration properly applies Django's `sensitive_post_parameters()` decorator to the base user-registration view, which will cause all data from the HTTP request body to be filtered from detailed error reports in the event of a server-side crash during user account registration.
Note that as applied, this filters *all* HTTP request data from error reports. To selectively allow some fields but not others, see Django's own documentation (in references) and the notes below for how to apply `sensitive_post_parameters()` manually to a particular codebase's `RegistrationView` subclass(es).
### Workarounds
Users who cannot upgrade quickly can apply the `django.views.decorators.debug.sensitive_post_parameters()` decorator to their own registration views. The decorator should be applied on the `dispatch()` method of the appropriate `RegistrationView` class, using Django's `method_decorator()` helper. For example:
```python
from django.utils.decorators import method_decorator
from django.views.decorators.debug import sensitive_post_parameters
from django_registration.views import RegistrationView
class MyRegistrationView(RegistrationView):
"""
A RegistrationView subclass manually protected against sensitive information disclosure
in error reports.
"""
@method_decorator(sensitive_post_parameters())
def dispatch(self, *args, **kwargs):
return super().dispatch(*args, **kwargs)
```
### References
* Django's documentation on [error reporting in production](https://docs.djangoproject.com/en/3.1/howto/error-reporting/)
* [How Django's sensitive-data filters work](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#filtering-error-reports)
|
{'CVE-2021-21416'}
|
2022-04-19T19:02:50Z
|
2021-04-06T17:28:59Z
|
LOW
| 3.7
|
{'CWE-209', 'CWE-201'}
|
{'https://github.com/advisories/GHSA-58c7-px5v-82hh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21416', 'https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh'}
| null |
GHSA
|
GHSA-r4c4-5fpq-56wg
|
Heap OOB in boosted trees
|
### Impact
An attacker can read from outside of bounds of heap allocated data by sending specially crafted illegal arguments to `BoostedTreesSparseCalculateBestFeatureSplit`:
```python
import tensorflow as tf
tf.raw_ops.BoostedTreesSparseCalculateBestFeatureSplit(
node_id_range=[0,10],
stats_summary_indices=[[1, 2, 3, 0x1000000]],
stats_summary_values=[1.0],
stats_summary_shape=[1,1,1,1],
l1=l2=[1.0],
tree_complexity=[0.5],
min_node_weight=[1.0],
logits_dimension=3,
split_type='inequality')
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/stats_ops.cc) needs to validate that each value in `stats_summary_indices` is in range.
### Patches
We have patched the issue in GitHub commit [e84c975313e8e8e38bb2ea118196369c45c51378](https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37664'}
|
2021-08-25T14:42:20Z
|
2021-08-25T14:42:20Z
|
HIGH
| 7.3
|
{'CWE-125'}
|
{'https://github.com/advisories/GHSA-r4c4-5fpq-56wg', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r4c4-5fpq-56wg', 'https://github.com/tensorflow/tensorflow/commit/e84c975313e8e8e38bb2ea118196369c45c51378', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37664'}
| null |
GHSA
|
GHSA-4pc7-vqv5-5r3v
|
ECP SAML binding bypasses authentication flows
|
### Description
A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
|
{'CVE-2021-3827'}
|
2022-04-27T21:26:00Z
|
2022-04-27T21:25:59Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-4pc7-vqv5-5r3v', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v'}
| null |
GHSA
|
GHSA-hc6c-75p4-hmq4
|
Reference binding to null pointer in `MatrixDiag*` ops
|
### Impact
The implementation of [`MatrixDiag*` operations](https://github.com/tensorflow/tensorflow/blob/4c4f420e68f1cfaf8f4b6e8e3eb857e9e4c3ff33/tensorflow/core/kernels/linalg/matrix_diag_op.cc#L195-L197) does not validate that the tensor arguments are non-empty:
```cc
num_rows = context->input(2).flat<int32>()(0);
num_cols = context->input(3).flat<int32>()(0);
padding_value = context->input(4).flat<T>()(0);
```
Thus, users can trigger null pointer dereferences if any of the above tensors are null:
```python
import tensorflow as tf
d = tf.convert_to_tensor([],dtype=tf.float32)
p = tf.convert_to_tensor([],dtype=tf.float32)
tf.raw_ops.MatrixDiagV2(diagonal=d, k=0, num_rows=0, num_cols=0, padding_value=p)
```
Changing from `tf.raw_ops.MatrixDiagV2` to `tf.raw_ops.MatrixDiagV3` still reproduces the issue.
### Patches
We have patched the issue in GitHub commit [a7116dd3913c4a4afd2a3a938573aa7c785fdfc6](https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.
|
{'CVE-2021-29515'}
|
2021-05-21T14:20:54Z
|
2021-05-21T14:20:54Z
|
LOW
| 2.5
|
{'CWE-476'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29515', 'https://github.com/advisories/GHSA-hc6c-75p4-hmq4', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hc6c-75p4-hmq4', 'https://github.com/tensorflow/tensorflow/commit/a7116dd3913c4a4afd2a3a938573aa7c785fdfc6'}
| null |
GHSA
|
GHSA-wrw9-m778-g6mc
|
Memory Exposure in bl
|
Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure.
`bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory
## Recommendation
Update to version 0.9.5, 1.0.1 or later.
| null |
2021-08-04T20:29:11Z
|
2019-06-03T17:27:57Z
|
MODERATE
| 0
|
{'CWE-200'}
|
{'https://github.com/rvagg/bl/pull/22', 'https://www.npmjs.com/advisories/596', 'https://github.com/advisories/GHSA-wrw9-m778-g6mc'}
| null |
GHSA
|
GHSA-h39x-m55c-v55h
|
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location
|
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
|
{'CVE-2018-12542'}
|
2022-04-26T21:50:01Z
|
2018-10-17T16:20:45Z
|
CRITICAL
| 9.8
|
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-h39x-m55c-v55h', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12542', 'https://github.com/vert-x3/vertx-web/issues/1025', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171'}
| null |
GHSA
|
GHSA-894f-rw44-qrw5
|
Hijacked Environment Variables in mongose
|
The `mongose` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16077'}
|
2021-01-08T19:10:56Z
|
2018-10-10T17:28:21Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/516', 'https://github.com/advisories/GHSA-894f-rw44-qrw5', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16077', 'https://nodesecurity.io/advisories/516'}
| null |
GHSA
|
GHSA-v82p-hv3v-p6qp
|
Incomplete validation in MKL requantization
|
### Impact
Due to incomplete validation in MKL implementation of requantization, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays:
```python
import tensorflow as tf
tf.raw_ops.RequantizationRangePerChannel(
input=[],
input_min=[0,0,0,0,0],
input_max=[1,1,1,1,1],
clip_value_max=1)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantization_range_per_channel_op.cc) does not validate the dimensions of the `input` tensor.
A similar issue occurs in `MklRequantizePerChannelOp`:
```python
import tensorflow as tf
from tensorflow.python.ops import gen_math_ops
gen_math_ops.requantize_per_channel(
input=[],
input_min=[-100,-100,-100,-100,-100],
input_max=[-100,-100,-100],
requested_output_min=[-100,-100,-100,-100,-100],
requested_output_max=[],
out_type=tf.int)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/mkl/mkl_requantize_per_channel_op.cc) does not perform full validation for all the input arguments.
### Patches
We have patched the issue in GitHub commit [9e62869465573cb2d9b5053f1fa02a81fce21d69](https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69) and in the Github commit [203214568f5bc237603dbab6e1fd389f1572f5c9](https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-37665'}
|
2021-08-25T14:42:16Z
|
2021-08-25T14:42:16Z
|
HIGH
| 7.8
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-v82p-hv3v-p6qp', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v82p-hv3v-p6qp', 'https://github.com/tensorflow/tensorflow/commit/203214568f5bc237603dbab6e1fd389f1572f5c9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37665', 'https://github.com/tensorflow/tensorflow/commit/9e62869465573cb2d9b5053f1fa02a81fce21d69'}
| null |
GHSA
|
GHSA-pf3p-x6qj-6j7q
|
mio invalidly assumes the memory layout of std::net::SocketAddr
|
An issue was discovered in the mio crate before 0.7.6 for Rust. It has false expectations about the std::net::SocketAddr memory representation.
|
{'CVE-2020-35922'}
|
2021-08-25T20:50:33Z
|
2021-08-25T20:50:33Z
|
MODERATE
| 5.5
|
{'CWE-188'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35922', 'https://github.com/tokio-rs/mio/issues/1386', 'https://rustsec.org/advisories/RUSTSEC-2020-0081.html', 'https://github.com/advisories/GHSA-pf3p-x6qj-6j7q'}
| null |
GHSA
|
GHSA-hm45-mgqm-gjm4
|
Remote Code Execution (RCE) Exploit on Cross Site Scripting (XSS) Vulnerability
|
### Impact
A RCE exploit has been discovered in the Red Discord Bot - Dashboard Webserver: this exploit allows Discord users with specially crafted Server names and Usernames/Nicknames to inject code into the webserver front-end code. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information.
### Patches
This high severity exploit has been fixed on version `0.1.7a`.
### Workarounds
There are no workarounds, bot owners must upgrade their relevant packages (Dashboard module and Dashboard webserver) in order to patch this issue
### References
- 99d88b8
- a6b9785
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Cog-Creators/Red-Dashboard](https://github.com/Cog-Creators/Red-Dashboard/issues/new/choose)
* Over on the official [Red Server](https://discord.gg/red) or at the Third Party Server [Toxic Layer](https://discord.gg/vQZTdB9)
|
{'CVE-2020-26249'}
|
2022-04-19T19:02:41Z
|
2020-12-08T23:55:54Z
|
HIGH
| 7.7
|
{'CWE-79'}
|
{'https://github.com/Cog-Creators/Red-Dashboard/security/advisories/GHSA-hm45-mgqm-gjm4', 'https://pypi.org/project/Red-Dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26249', 'https://github.com/Cog-Creators/Red-Dashboard/commit/99d88b840674674166ce005b784ae8e31e955ab1', 'https://github.com/Cog-Creators/Red-Dashboard/commit/a6b9785338003ec87fb75305e7d1cc2d40c7ab91', 'https://github.com/advisories/GHSA-hm45-mgqm-gjm4'}
| null |
GHSA
|
GHSA-29qj-rvv6-qrmv
|
Cross-site scripting in RESTEasy
|
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
|
{'CVE-2020-10688'}
|
2021-06-15T16:05:22Z
|
2021-06-15T16:05:22Z
|
MODERATE
| 5.4
|
{'CWE-79'}
|
{'https://github.com/quarkusio/quarkus/issues/7248', 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974', 'https://issues.redhat.com/browse/RESTEASY-2519', 'https://github.com/advisories/GHSA-29qj-rvv6-qrmv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688'}
| null |
GHSA
|
GHSA-xgc9-9w4v-h33h
|
High severity vulnerability that affects org.apache.syncope:syncope-core
|
An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
|
{'CVE-2018-1321'}
|
2021-09-21T22:31:16Z
|
2018-11-06T23:17:27Z
|
HIGH
| 7.2
|
{'CWE-20'}
|
{'https://www.exploit-db.com/exploits/45400/', 'http://www.securityfocus.com/bid/103508', 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321', 'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements'}
| null |
GHSA
|
GHSA-4v2c-g2xc-47fv
|
Downloads Resources over HTTP in massif
|
Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10682'}
|
2021-01-08T19:53:44Z
|
2019-02-18T23:54:38Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/290', 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv', 'https://www.npmjs.com/advisories/290', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}
| null |
GHSA
|
GHSA-3448-vrgh-85xr
|
NULL Pointer Dereference in OpenCV.
|
An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.
|
{'CVE-2019-14493'}
|
2021-11-18T15:27:31Z
|
2021-10-12T22:21:43Z
|
HIGH
| 7.5
|
{'CWE-476'}
|
{'https://github.com/opencv/opencv/issues/15127', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14493', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c', 'https://github.com/advisories/GHSA-3448-vrgh-85xr'}
| null |
GHSA
|
GHSA-cr6m-62pq-hmqh
|
OS Command injection in npm-lockfile
|
npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5.
|
{'CVE-2022-0841'}
|
2022-04-04T21:37:39Z
|
2022-03-04T00:00:18Z
|
CRITICAL
| 9.8
|
{'CWE-78'}
|
{'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8', 'https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1', 'https://github.com/advisories/GHSA-cr6m-62pq-hmqh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0841'}
| null |
GHSA
|
GHSA-f6vf-pq8c-69m4
|
Improper Check for Unusual or Exceptional Conditions in Connect2id Nimbus JOSE+JWT
|
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
|
{'CVE-2019-17195'}
|
2022-04-22T17:26:38Z
|
2019-10-16T18:31:17Z
|
CRITICAL
| 9.8
|
{'CWE-754', 'CWE-755'}
|
{'https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6106a1dc1f9ac98@%3Cdev.avro.apache.org%3E', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17195', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-f6vf-pq8c-69m4', 'https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b494d15a3b66efe6a@%3Cdev.avro.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9dc2a7fc44e80d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e81971908caf41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://connect2id.com/blog/nimbus-jose-jwt-7-9'}
| null |
GHSA
|
GHSA-vm37-j55j-8655
|
OS Command Injection in Microweber
|
Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection.
|
{'CVE-2022-0557'}
|
2022-03-28T15:23:38Z
|
2022-02-12T00:00:49Z
|
HIGH
| 7.8
|
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0557', 'http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html', 'https://github.com/advisories/GHSA-vm37-j55j-8655', 'https://huntr.dev/bounties/660c89af-2de5-41bc-aada-9e4e78142db8', 'https://www.exploit-db.com/exploits/50768', 'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'}
| null |
GHSA
|
GHSA-wh4h-v3f2-r2pp
|
Moderate severity vulnerability that affects django
|
Django 1.11.x before 1.11.19, 2.0.x before 2.0.11, and 2.1.x before 2.1.6 allows Uncontrolled Memory Consumption via a malicious attacker-supplied value to the django.utils.numberformat.format() function.
|
{'CVE-2019-6975'}
|
2021-09-21T20:42:56Z
|
2019-02-12T15:36:37Z
|
HIGH
| 7.5
|
{'CWE-770'}
|
{'https://docs.djangoproject.com/en/dev/releases/security/', 'https://groups.google.com/forum/#!topic/django-announce/WTwEAprR0IQ', 'https://github.com/advisories/GHSA-wh4h-v3f2-r2pp', 'https://www.openwall.com/lists/oss-security/2019/02/11/1', 'https://www.debian.org/security/2019/dsa-4476', 'https://usn.ubuntu.com/3890-1/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/66WMXHGBXD7GSM3PEXVCMCAGLMQYHZCU/', 'https://www.djangoproject.com/weblog/2019/feb/11/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-6975', 'http://www.securityfocus.com/bid/106964', 'https://seclists.org/bugtraq/2019/Jul/10'}
| null |
GHSA
|
GHSA-7wph-fc4w-wqp2
|
Moderate severity vulnerability that affects django
|
The password reset functionality in django.contrib.auth in Django before 1.1.3, 1.2.x before 1.2.4, and 1.3.x before 1.3 beta 1 does not validate the length of a string representing a base36 timestamp, which allows remote attackers to cause a denial of service (resource consumption) via a URL that specifies a large base36 integer.
|
{'CVE-2010-4535'}
|
2021-09-03T21:46:39Z
|
2018-07-23T19:51:59Z
|
MODERATE
| 0
|
{'CWE-20'}
|
{'http://www.securityfocus.com/bid/45563', 'http://secunia.com/advisories/42715', 'http://www.openwall.com/lists/oss-security/2010/12/23/4', 'http://www.ubuntu.com/usn/USN-1040-1', 'http://www.vupen.com/english/advisories/2011/0098', 'https://github.com/advisories/GHSA-7wph-fc4w-wqp2', 'http://www.openwall.com/lists/oss-security/2011/01/03/5', 'http://www.djangoproject.com/weblog/2010/dec/22/security/', 'https://bugzilla.redhat.com/show_bug.cgi?id=665373', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053041.html', 'http://secunia.com/advisories/42913', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053072.html', 'http://www.vupen.com/english/advisories/2011/0048', 'http://secunia.com/advisories/42827', 'https://nvd.nist.gov/vuln/detail/CVE-2010-4535', 'http://code.djangoproject.com/changeset/15032'}
| null |
GHSA
|
GHSA-hxvf-35w8-f5mw
|
Cross-Site Request Forgery in Magnolia CMS
|
An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.
|
{'CVE-2021-46366'}
|
2022-03-01T18:40:11Z
|
2022-02-12T00:00:37Z
|
HIGH
| 8.8
|
{'CWE-352'}
|
{'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46366', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://github.com/advisories/GHSA-hxvf-35w8-f5mw'}
| null |
GHSA
|
GHSA-rrvx-pwf8-p59p
|
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
|
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
|
{'CVE-2016-1000343'}
|
2022-04-27T13:29:12Z
|
2018-10-17T16:24:22Z
|
HIGH
| 7.5
| null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000343', 'https://usn.ubuntu.com/3727-1/', 'https://github.com/advisories/GHSA-rrvx-pwf8-p59p', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927'}
| null |
GHSA
|
GHSA-72j4-94rx-cr6w
|
Incorrect Permission Assignment for Critical Resource and Permissive List of Allowed Inputs in Keycloak
|
A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions.
|
{'CVE-2020-1694'}
|
2022-02-09T00:57:02Z
|
2022-02-09T00:57:02Z
|
MODERATE
| 4.9
|
{'CWE-732', 'CWE-183'}
|
{'https://github.com/advisories/GHSA-72j4-94rx-cr6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1694', 'https://bugzilla.redhat.com/show_bug.cgi?id=1790759'}
| null |
GHSA
|
GHSA-mvmf-cvfx-qg55
|
Regular Expression Denial of Service in bleach
|
All versions of the `bleach` package are vulnerable to a regular expression denial of service attack when certain types of input are passed into the sanitize function.
## Recommendation
The `bleach` package is not currently maintained, and has not seen an update since 2014.
To mitigate this issue, it is necessary to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=html%20sanitizer&page=1&ranking=optimal).
|
{'CVE-2014-8881'}
|
2021-09-23T21:06:11Z
|
2020-09-01T15:16:43Z
|
MODERATE
| 5.3
|
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-8881', 'https://github.com/advisories/GHSA-mvmf-cvfx-qg55', 'https://snyk.io/vuln/npm:bleach:20151024', 'https://www.npmjs.com/advisories/47'}
| null |
GHSA
|
GHSA-3cjv-4phw-gvvv
|
Malicious Package in getcookies
|
The `getcookies` module contained a backdoor that would allow for a remote attacker to execute arbitrary commands on the system running the malicious module.
## Recommendation
This module should be uninstalled if found used within an application. In addition to removing the installed module, you will also want to evaluate your application to determine whether or not user data or systems were compromised.
| null |
2021-10-01T13:25:16Z
|
2020-09-01T20:39:33Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-3cjv-4phw-gvvv', 'https://www.npmjs.com/advisories/649'}
| null |
GHSA
|
GHSA-8f64-q7jc-ccgp
|
Cross-Site Scripting in metascraper
|
Versions of `metascraper` prior to 5.3.0 are vulnerable to stored cross-site scripting (XSS).
## Recommendation
Upgrade to version 5.3.0 or later.
|
{'CVE-2018-3773'}
|
2021-01-08T19:10:26Z
|
2018-08-08T22:25:57Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://hackerone.com/reports/309367', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3773', 'https://github.com/advisories/GHSA-8f64-q7jc-ccgp', 'https://www.npmjs.com/advisories/603'}
| null |
GHSA
|
GHSA-36h2-95gj-w488
|
Open redirect in Gitea
|
Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs.
|
{'CVE-2021-45328'}
|
2022-02-15T00:18:11Z
|
2022-02-09T00:00:28Z
|
MODERATE
| 6.1
|
{'CWE-601'}
|
{'https://github.com/go-gitea/gitea/issues/4332', 'https://blog.gitea.io/2018/06/release-of-1.4.3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45328', 'https://github.com/advisories/GHSA-36h2-95gj-w488'}
| null |
GHSA
|
GHSA-c6rq-rjc2-86v2
|
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
|
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
|
{'CVE-2017-18869'}
|
2022-02-10T23:33:39Z
|
2022-02-10T23:33:39Z
|
LOW
| 2.5
|
{'CWE-367'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18869', 'https://snyk.io/vuln/npm:chownr:20180731', 'https://github.com/isaacs/chownr/issues/14', 'https://github.com/advisories/GHSA-c6rq-rjc2-86v2', 'https://bugzilla.redhat.com/show_bug.cgi?id=1611614', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863985'}
| null |
GHSA
|
GHSA-76qr-mmh8-cp8f
|
Moderate severity vulnerability that affects com.sparkjava:spark-core
|
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
|
{'CVE-2018-9159'}
|
2021-09-02T19:24:33Z
|
2018-10-19T16:56:00Z
|
MODERATE
| 5.3
|
{'CWE-22'}
|
{'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc', 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9159', 'https://github.com/perwendel/spark/issues/981', 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f', 'http://sparkjava.com/news#spark-272-released', 'https://access.redhat.com/errata/RHSA-2018:2020', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668'}
| null |
GHSA
|
GHSA-qh2g-7h5p-mxf4
|
Credentials bypass in Apache Druid
|
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
|
{'CVE-2020-1958'}
|
2022-02-09T22:05:39Z
|
2022-02-09T22:05:39Z
|
MODERATE
| 6.5
|
{'CWE-200', 'CWE-74'}
|
{'https://github.com/advisories/GHSA-qh2g-7h5p-mxf4', 'https://lists.apache.org/thread.html/r9d437371793b410f8a8e18f556d52d4bb68e18c537962f6a97f4945e%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rffabc9e83cc2831bbee5db32b3965b84b09346a26ebc1012db63d28c@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1526dbce98a138629a41daa06c13393146ddcaf8f9d273cc49d57681@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1958', 'https://github.com/apache/druid/pull/9600#issuecomment-607497875', 'https://lists.apache.org/thread.html/r026540c617d334007810cd8f0068f617b5c78444be00a31fc1b03390@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r47c90a378efdb3fd07ff7f74095b8eb63b3ca93b8ada5c2661c5e371@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf70876ecafb45b314eff9d040c5281c4adb0cb7771eb029448cfb79b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r1c32c95543d44559b8d7fd89b0a85f728c80e8b715685bbf788a15a4@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e', 'https://lists.apache.org/thread.html/r75e74d39c41c1b95a658b6a9f75fc6fd02b1d1922566a0ee4ee2fdfc@%3Ccommits.druid.apache.org%3E'}
| null |
GHSA
|
GHSA-2777-2vq8-c4v4
|
SQL Injection in sequelize
|
Versions of `sequelize` prior to 5.3.0 (excluding v3 and v4) are vulnerable to SQL Injection. PostgreSQL option`standard_conforming_strings` is not set to `on` by default, which may allow attackers to inject SQL statements due to poor handling of backslashes in string literals.
## Recommendation
Upgrade to version 5.3.0 or later.
|
{'CVE-2019-11069'}
|
2021-08-30T16:08:58Z
|
2019-04-11T16:33:17Z
|
HIGH
| 7.5
|
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-2777-2vq8-c4v4', 'https://www.npmjs.com/advisories/821', 'https://github.com/sequelize/sequelize/pull/10746', 'https://github.com/sequelize/sequelize/pull/10746/files', 'https://github.com/sequelize/sequelize/releases/tag/v5.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11069', 'https://github.com/sequelize/sequelize/blob/98cb17c17f73e2aa1792aa5a1d31216ba984b456/lib/dialects/postgres/connection-manager.js#L158-L160', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174167'}
| null |
GHSA
|
GHSA-qjw2-hr98-qgfh
|
Unsafe Deserialization in jackson-databind
|
FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
|
{'CVE-2020-24750'}
|
2022-04-26T20:58:39Z
|
2021-12-09T19:15:36Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750', 'https://github.com/advisories/GHSA-qjw2-hr98-qgfh', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b', 'https://security.netapp.com/advisory/ntap-20201009-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2798', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
| null |
GHSA
|
GHSA-7xcx-6wjh-7xp2
|
Command Injection in standard-version
|
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111`
The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version).
## Summary
The `standardVersion` function has a command injection vulnerability. Clients of the `standard-version` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
## Product
Standard Version
## Tested Version
Commit [2f04ac8](https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9/)
## Details
### Issue 1: Command injection in `standardVersion`
The following proof-of-concept illustrates the vulnerability. First install Standard Version and create an empty git repo to run the PoC in:
```
npm install standard-version
git init
echo "foo" > foo.txt # the git repo has to be non-empty
git add foo.txt
git commit -am "initial commit"
```
Now create a file with the following contents:
```
var fs = require("fs");
// setting up a bit of environment
fs.writeFileSync("package.json", '{"name": "foo", "version": "1.0.0"}');
const standardVersion = require('standard-version')
standardVersion({
noVerify: true,
infile: 'foo.txt',
releaseCommitMessageFormat: "bla `touch exploit`"
})
```
and run it:
```
node test.js
```
Notice that a file named `exploit` has been created.
This vulnerability is similar to command injection vulnerabilities that have been found in other Javascript libraries. Here are some examples:
[CVE-2020-7646](https://github.com/advisories/GHSA-m8xj-5v73-3hh8),
[CVE-2020-7614](https://github.com/advisories/GHSA-426h-24vj-qwxf),
[CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh),
[CVE-2019-10778](https://github.com/advisories/GHSA-4gp3-p7ph-x2jr),
[CVE-2019-10776](https://github.com/advisories/GHSA-84cm-v6jp-gjmr),
[CVE-2018-16462](https://github.com/advisories/GHSA-9jm3-5835-537m),
[CVE-2018-16461](https://github.com/advisories/GHSA-7g2w-6r25-2j7p),
[CVE-2018-16460](https://github.com/advisories/GHSA-cfhg-9x44-78h2),
[CVE-2018-13797](https://github.com/advisories/GHSA-pp57-mqmh-44h7),
[CVE-2018-3786](https://github.com/advisories/GHSA-c9j3-wqph-5xx9),
[CVE-2018-3772](https://github.com/advisories/GHSA-wjr4-2jgw-hmv8),
[CVE-2018-3746](https://github.com/advisories/GHSA-3pxp-6963-46r9),
[CVE-2017-16100](https://github.com/advisories/GHSA-jcw8-r9xm-32c6),
[CVE-2017-16042](https://github.com/advisories/GHSA-qh2h-chj9-jffq).
We have written a [CodeQL](https://codeql.com) query, which automatically detects this vulnerability. You can see the results of the query on the `standard-version` project [here](https://lgtm.com/query/237522640229151035/).
#### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
#### Remediation
We recommend not using an API that can interpret a string as a shell command. For example, use [`child_process.execFile`](https://nodejs.org/api/child_process.html#child_process_child_process_execfile_file_args_options_callback) instead of [`child_process.exec`](https://nodejs.org/api/child_process.html#child_process_child_process_exec_command_options_callback).
## Credit
This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
## Contact
You can contact the GHSL team at `securitylab@github.com`, please include `GHSL-2020-111` in any communication regarding this issue.
## Disclosure Policy
This report is subject to our [coordinated disclosure policy](https://securitylab.github.com/disclosures#policy).
| null |
2021-09-22T21:03:04Z
|
2020-07-13T21:34:59Z
|
MODERATE
| 0
|
{'CWE-77'}
|
{'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2', 'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a1981c23a093d4eece77d0bbb9', 'https://github.com/advisories/GHSA-7xcx-6wjh-7xp2'}
| null |
GHSA
|
GHSA-xgjc-49cw-529m
|
Moderate severity vulnerability that affects org.b3log:symphony
|
An issue was discovered in b3log Symphony (aka Sym) before v3.4.7. XSS exists via the userIntro and userNickname fields to processor/SettingsProcessor.java.
|
{'CVE-2019-9142'}
|
2021-09-21T22:32:35Z
|
2019-03-06T17:35:49Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-xgjc-49cw-529m', 'https://github.com/b3log/symphony/issues/860', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9142'}
| null |
GHSA
|
GHSA-hxmp-pqch-c8mm
|
Denial of service attack via incorrect parameters in Matrix Synapse
|
### Impact
A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request.
This can lead to a denial of service in which future events will not be correctly sent to other servers over federation.
This affects any server which accepts federation requests from untrusted servers.
### Patches
Issue is resolved by https://github.com/matrix-org/synapse/pull/8776.
### Workarounds
Homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).
|
{'CVE-2020-26257'}
|
2021-01-07T22:37:52Z
|
2020-12-09T18:21:29Z
|
LOW
| 6.5
|
{'CWE-74', 'CWE-79', 'CWE-400'}
|
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-hxmp-pqch-c8mm', 'https://github.com/matrix-org/synapse/pull/8776', 'https://github.com/advisories/GHSA-hxmp-pqch-c8mm', 'https://github.com/matrix-org/synapse/commit/3ce2f303f15f6ac3dc352298972dc6e04d9b7a8b', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DBTIU3ZNBFWZ56V4X7JIAD33V5H2GOMC/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26257', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QR4MMYZKX5N5GYGH4H5LBUUC5TLAFHI7/', 'https://github.com/matrix-org/synapse/blob/develop/CHANGES.md#synapse-1231-2020-12-09'}
| null |
GHSA
|
GHSA-pr5m-4w22-8483
|
XXS in NanoHTTPD
|
An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.
|
{'CVE-2020-13697'}
|
2021-11-29T21:04:48Z
|
2021-02-25T16:32:34Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://www.vdoo.com/advisories/#CVE-2020-13697', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13697', 'https://github.com/advisories/GHSA-pr5m-4w22-8483'}
| null |
GHSA
|
GHSA-57q7-rxqq-7vgp
|
On Windows, `git-sizer` might run a `git` executable within the repository being analyzed
|
### Impact
On Windows, if `git-sizer` is run against a non-bare repository, and that repository has an executable called `git.exe`, `git.bat`, etc., then that executable might be run by `git-sizer` rather than the system `git` executable. An attacker could try to use social engineering to get a victim to run `git-sizer` against a hostile repository and thereby get the victim to run arbitrary code.
On Linux or other Unix-derived platforms, a similar problem could occur if the user's `PATH` has the current directory before the path to the standard `git` executable, but this is would be a very unusual configuration that has been known for decades to lead to all kinds of security problems.
### Patches
Users should update to git-sizer v1.4.0
### Workarounds
If you are on Windows, then either
* Don't run `git-sizer` against a repository that might contain hostile code, or, if you must…
* Run `git-sizer` against a bare clone of the hostile repository, or, if that is not possible…
* Make sure that the hostile repository doesn't have an executable in its top-level directory before running `git-sizer`.
If you are on Linux or other Unix-based system, then (for myriad reasons!) don't add the current directory to your `PATH`.
### References
* [Command PATH security in Go](https://blog.golang.org/path-security)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the `git-sizer` project](https://github.com/github/git-sizer).
* Email us at [GitHub support](mailto:support@github.com).
| null |
2022-04-12T22:48:44Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 0
| null |
{'https://github.com/advisories/GHSA-57q7-rxqq-7vgp', 'https://github.com/github/git-sizer/commit/38400d6ddd79325e956b00ff584cfcc8dd96d536', 'https://github.com/github/git-sizer/security/advisories/GHSA-57q7-rxqq-7vgp'}
| null |
GHSA
|
GHSA-5f38-9jw2-6r6h
|
Cross-site Scripting in teddy
|
Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).
|
{'CVE-2021-23447'}
|
2022-05-05T13:48:52Z
|
2021-10-12T16:22:04Z
|
MODERATE
| 5.4
|
{'CWE-79', 'CWE-843'}
|
{'https://github.com/rooseveltframework/teddy/pull/518', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447', 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557', 'https://github.com/advisories/GHSA-5f38-9jw2-6r6h', 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9', 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}
| null |
GHSA
|
GHSA-78vq-9j56-wrfr
|
Cross-site Scripting in gon
|
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
|
{'CVE-2020-25739'}
|
2021-04-30T17:29:15Z
|
2021-04-30T17:29:15Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25739', 'https://github.com/advisories/GHSA-78vq-9j56-wrfr', 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7', 'https://usn.ubuntu.com/4560-1/', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html'}
| null |
GHSA
|
GHSA-xh56-3f5w-9h25
|
Hijacked Environment Variables in nodemailer-js
|
The `nodemailer-js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16071'}
|
2021-01-08T21:10:59Z
|
2018-08-29T23:40:01Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nodesecurity.io/advisories/510', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16071', 'https://github.com/advisories/GHSA-xh56-3f5w-9h25', 'https://www.npmjs.com/advisories/510'}
| null |
GHSA
|
GHSA-cjj8-wfrx-jqcf
|
Cross-Site Scripting (XSS) in pivottable
|
Affected versions of `pivottable` are vulnerable to cross-site scripting, due to a new mechanism used to render JSON elements.
## Recommendation
Update to version 2.0.0 or later.
|
{'CVE-2016-1000241'}
|
2021-09-23T21:36:35Z
|
2020-09-01T16:00:18Z
|
HIGH
| 0
|
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/139', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000241', 'https://github.com/nicolaskruchten/pivottable/pull/401', 'https://github.com/advisories/GHSA-cjj8-wfrx-jqcf'}
| null |
GHSA
|
GHSA-r4gv-vj59-cccm
|
Control character injection in console output in github.com/ipfs/go-ipfs
|
### Impact
Control characters are not escaped from console output. This can result in hiding input from the user which could result in the user taking an unknown, malicious action.
### Patches
<!-- _Has the problem been patched? What versions should users upgrade to?_ -->
- Patched via https://github.com/ipfs/go-ipfs/pull/7831 in v0.8.0
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ipfs](http://github.com/ipfs/go-ipfs)
* Email us at [security@ipfs.io](mailto:security@ipfs.io)
|
{'CVE-2020-26283'}
|
2022-04-19T19:02:51Z
|
2021-06-23T17:27:27Z
|
MODERATE
| 6.8
|
{'CWE-116', 'CWE-150'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26283', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-r4gv-vj59-cccm', 'https://github.com/ipfs/go-ipfs/pull/7831', 'https://github.com/ipfs/go-ipfs/commit/fb0a9acd2d8288bd1028c3219a420de62a09683a', 'https://github.com/advisories/GHSA-r4gv-vj59-cccm'}
| null |
GHSA
|
GHSA-4q69-q4q7-x82c
|
High severity vulnerability that affects rendertron
|
Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
|
{'CVE-2017-18353'}
|
2021-09-01T17:52:46Z
|
2019-01-04T17:41:46Z
|
HIGH
| 7.5
| null |
{'https://github.com/GoogleChrome/rendertron/pull/88', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://github.com/advisories/GHSA-4q69-q4q7-x82c'}
| null |
GHSA
|
GHSA-83rh-hx5x-q9p5
|
Out-of-bounds Read in OpenCV
|
In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer over-read exists in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp.
|
{'CVE-2017-18009'}
|
2021-10-12T22:03:23Z
|
2021-10-12T22:03:23Z
|
HIGH
| 7.5
|
{'CWE-125'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18009', 'http://www.securityfocus.com/bid/106945', 'https://github.com/opencv/opencv/issues/10479', 'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837', 'https://github.com/advisories/GHSA-83rh-hx5x-q9p5'}
| null |
GHSA
|
GHSA-33xh-xch9-p6hj
|
Incorrect Authorization in Apache Ozone
|
In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.
|
{'CVE-2021-39233'}
|
2021-11-23T18:17:59Z
|
2021-11-23T18:17:59Z
|
CRITICAL
| 9.1
|
{'CWE-863'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39233', 'http://www.openwall.com/lists/oss-security/2021/11/19/4', 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E', 'https://github.com/advisories/GHSA-33xh-xch9-p6hj'}
| null |
GHSA
|
GHSA-g6f4-j6c2-w3p3
|
High severity vulnerability that affects uglify-js
|
Withdrawn, accidental duplicate publish.
The uglify-js package before 2.4.24 for Node.js does not properly account for non-boolean values when rewriting boolean expressions, which might allow attackers to bypass security mechanisms or possibly have unspecified other impact by leveraging improperly rewritten Javascript.
| null |
2021-12-03T14:25:51Z
|
2018-10-09T00:39:43Z
|
HIGH
| 0
| null |
{'https://github.com/advisories/GHSA-g6f4-j6c2-w3p3', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8857'}
| null |
GHSA
|
GHSA-75f6-78jr-4656
|
Null pointer dereference in `EditDistance`
|
### Impact
An attacker can trigger a null pointer dereference in the implementation of `tf.raw_ops.EditDistance`:
```python
import tensorflow as tf
hypothesis_indices = tf.constant([247, 247, 247], shape=[1, 3], dtype=tf.int64)
hypothesis_values = tf.constant([-9.9999], shape=[1], dtype=tf.float32)
hypothesis_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64)
truth_indices = tf.constant([], shape=[0, 3], dtype=tf.int64)
truth_values = tf.constant([], shape=[0], dtype=tf.float32)
truth_shape = tf.constant([0, 0, 0], shape=[3], dtype=tf.int64)
tf.raw_ops.EditDistance(
hypothesis_indices=hypothesis_indices, hypothesis_values=hypothesis_values,
hypothesis_shape=hypothesis_shape, truth_indices=truth_indices,
truth_values=truth_values, truth_shape=truth_shape, normalize=True)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/79865b542f9ffdc9caeb255631f7c56f1d4b6517/tensorflow/core/kernels/edit_distance_op.cc#L103-L159) has incomplete validation of the input parameters.
In the above scenario, an attacker causes an allocation of an empty tensor for the output:
```cc
OP_REQUIRES_OK(ctx, ctx->allocate_output("output", output_shape, &output));
auto output_t = output->flat<float>();
output_t.setZero();
```
Because `output_shape` has 0 elements, the result of `output->flat<T>()` has an empty buffer, so calling `setZero` would result in a null dereference.
### Patches
We have patched the issue in GitHub commit [f4c364a5d6880557f6f5b6eb5cee2c407f0186b3](https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
|
{'CVE-2021-29564'}
|
2021-05-21T14:25:08Z
|
2021-05-21T14:25:08Z
|
LOW
| 2.5
|
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-75f6-78jr-4656', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29564', 'https://github.com/tensorflow/tensorflow/commit/f4c364a5d6880557f6f5b6eb5cee2c407f0186b3', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-75f6-78jr-4656'}
| null |
GHSA
|
GHSA-jv2c-mhcq-6wp4
|
Out-of-bounds write in ChakraCore
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
|
{'CVE-2020-0829'}
|
2021-07-28T18:57:39Z
|
2021-07-28T18:57:39Z
|
HIGH
| 7.5
|
{'CWE-787'}
|
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0829', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0829', 'https://github.com/advisories/GHSA-jv2c-mhcq-6wp4'}
| null |
GHSA
|
GHSA-c2w9-48qc-qpj4
|
High severity vulnerability that affects ansible
|
An exploitable vulnerability exists in the yaml loading functionality of ansible-vault before 1.0.5. A specially crafted vault can execute arbitrary python commands resulting in command execution. An attacker can insert python into the vault to trigger this vulnerability.
|
{'CVE-2017-2809'}
|
2021-09-08T21:28:07Z
|
2018-07-13T15:16:54Z
|
HIGH
| 7.8
|
{'CWE-94'}
|
{'https://github.com/tomoh1r/ansible-vault/issues/4', 'https://github.com/tomoh1r/ansible-vault/blob/v1.0.5/CHANGES.txt', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0305', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2809', 'http://www.securityfocus.com/bid/100824', 'https://github.com/advisories/GHSA-c2w9-48qc-qpj4', 'https://github.com/tomoh1r/ansible-vault/commit/3f8f659ef443ab870bb19f95d43543470168ae04'}
| null |
GHSA
|
GHSA-f4hq-453j-p95f
|
Open redirect in Slashify
|
The package is an Express middleware that normalises routes by stripping any final slash, redirecting, for example, `bookings/latest/` to `bookings/latest`. However, it does not validate the path it redirects to in any way. In particular, if the path starts with two slashes (or two backslashes, or a slash and a backslash, etc.) it may redirect to a different domain.
Consider the [example from the docs](https://www.npmjs.com/package/slashify#usage). Assume we have run it and started a server on `localhost:3000`, then visiting `localhost:3000///github.com/` redirects you to https://github.com.
## Recommendation
This vulnerability is currently un-patched in the `slashify` package so there is no known safe version of this package. Discontinuing use of `slashify` is recommended.
|
{'CVE-2021-3189'}
|
2021-04-02T13:58:31Z
|
2021-02-05T20:43:34Z
|
HIGH
| 6.1
|
{'CWE-601'}
|
{'https://github.com/divshot/slashify', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3189', 'https://security.netapp.com/advisory/ntap-20210401-0004/', 'https://github.com/advisories/GHSA-f4hq-453j-p95f', 'https://www.npmjs.com/package/slashify', 'https://securitylab.github.com/advisories/GHSL-2020-199-open-redirect-slashify'}
| null |
GHSA
|
GHSA-fv9m-f7w4-889c
|
Exfiltrates Discord login tokens to pastebin in discordi.js
|
The `discordi.js` package is malware that attempts to discover and exfiltrate a user's [Discord](https://discordapp.com/) credentials, sending them to pastebin.
All versions have been unpublished from the npm registry.
## Recommendation
Do not install / use this module. It has been unpublished from the npm registry but may exist in some caches. Any users that logged into Discord using this library will need to change their credentials.
|
{'CVE-2017-16207'}
|
2021-01-08T18:51:20Z
|
2018-08-06T21:43:03Z
|
MODERATE
| 0
|
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16207', 'https://www.npmjs.com/advisories/545', 'https://github.com/advisories/GHSA-fv9m-f7w4-889c', 'https://nodesecurity.io/advisories/545'}
| null |
GHSA
|
GHSA-8h56-v53h-5hhj
|
Remote Code Execution - JavaEL Injection (low privileged accounts) in Nexus Repository Manager
|
Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
|
{'CVE-2020-10204'}
|
2022-01-04T19:34:55Z
|
2020-04-14T15:27:14Z
|
HIGH
| 8.8
|
{'CWE-20'}
|
{'https://support.sonatype.com/hc/en-us/articles/360044882533', 'https://securitylab.github.com/advisories/GHSL-2020-012-nxrm-sonatype', 'https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype', 'https://github.com/advisories/GHSA-8h56-v53h-5hhj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10204', 'https://support.sonatype.com/hc/en-us/articles/360044356194'}
| null |
GHSA
|
GHSA-qcc9-q247-3m2m
|
Malicious Package in js-regular
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:17:12Z
|
2020-09-03T19:46:49Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-qcc9-q247-3m2m', 'https://www.npmjs.com/advisories/1129'}
| null |
GHSA
|
GHSA-5r2p-j47h-mhpg
|
Moderate severity vulnerability that affects rack
|
There is a possible XSS vulnerability in Rack before 2.0.6 and 1.6.11. Carefully crafted requests can impact the data returned by the `scheme` method on `Rack::Request`. Applications that expect the scheme to be limited to 'http' or 'https' and do not escape the return value could be vulnerable to an XSS attack. Note that applications using the normal escaping mechanisms provided by Rails may not impacted, but applications that bypass the escaping mechanisms, or do not use them may be vulnerable.
|
{'CVE-2018-16471'}
|
2021-01-08T19:49:07Z
|
2018-11-15T15:59:08Z
|
MODERATE
| 0
|
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16471', 'https://groups.google.com/forum/#!topic/rubyonrails-security/GKsAFT924Ag', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00032.html', 'https://github.com/advisories/GHSA-5r2p-j47h-mhpg', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html', 'https://usn.ubuntu.com/4089-1/', 'https://lists.debian.org/debian-lts-announce/2018/11/msg00022.html'}
| null |
GHSA
|
GHSA-j5hj-fhc9-g24m
|
Moderate severity vulnerability that affects rack-mini-profiler
|
The rack-mini-profiler gem before 0.10.1 for Ruby allows remote attackers to obtain sensitive information about allocated strings and objects by leveraging incorrect ordering of security checks.
|
{'CVE-2016-4442'}
|
2021-09-14T18:19:21Z
|
2017-10-24T18:33:35Z
|
MODERATE
| 5.3
|
{'CWE-200'}
|
{'https://github.com/MiniProfiler/rack-mini-profiler/blob/v0.10.1/CHANGELOG.md', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4442', 'https://github.com/MiniProfiler/rack-mini-profiler/commit/4273771d65f1a7411e3ef5843329308d0e2d257c', 'https://github.com/advisories/GHSA-j5hj-fhc9-g24m', 'http://www.openwall.com/lists/oss-security/2016/06/10/2'}
| null |
GHSA
|
GHSA-4xj5-vv9x-63jp
|
Data races in concread
|
An issue was discovered in the concread crate before 0.2.6 for Rust. Attackers can cause an ARCache<K,V> data race by sending types that do not implement Send/Sync.
|
{'CVE-2020-35928'}
|
2021-08-25T20:50:22Z
|
2021-08-25T20:50:22Z
|
MODERATE
| 4.7
|
{'CWE-362'}
|
{'https://rustsec.org/advisories/RUSTSEC-2020-0092.html', 'https://github.com/kanidm/concread/issues/48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35928', 'https://github.com/advisories/GHSA-4xj5-vv9x-63jp'}
| null |
GHSA
|
GHSA-83vp-6jqg-6cmr
|
Incorrect Authentication in shopware
|
### Impact
Modify Customers, create Orders without App Permission
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
|
{'CVE-2022-24748'}
|
2022-03-18T20:15:33Z
|
2022-03-10T18:02:14Z
|
MODERATE
| 6.8
|
{'CWE-287'}
|
{'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748', 'https://github.com/advisories/GHSA-83vp-6jqg-6cmr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022', 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr'}
| null |
GHSA
|
GHSA-32wr-8wxm-852c
|
Deserialization of Untrusted Data in NukeViet
|
includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk).
|
{'CVE-2019-7725'}
|
2021-06-22T15:24:59Z
|
2021-06-22T15:24:59Z
|
CRITICAL
| 9.8
|
{'CWE-502'}
|
{'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7725', 'https://github.com/advisories/GHSA-32wr-8wxm-852c', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt'}
| null |
GHSA
|
GHSA-qx4v-6gc5-f2vv
|
Regular Expression Denial of Service
|
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
| null |
2021-02-25T17:21:01Z
|
2019-06-20T14:32:56Z
|
MODERATE
| 0
|
{'CWE-400'}
|
{'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b', 'https://github.com/standard-things/esm/issues/694', 'https://github.com/advisories/GHSA-qx4v-6gc5-f2vv'}
| null |
GHSA
|
GHSA-58g2-9fqr-36q2
|
Prototype Pollution in Proto
|
This affects all versions of package Proto. It is possible to inject pollute the object property of an application using Proto by leveraging the merge function.
|
{'CVE-2021-23426'}
|
2021-09-10T17:08:40Z
|
2021-09-02T22:01:01Z
|
HIGH
| 7.5
|
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-PROTO-1316301', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23426', 'https://www.npmjs.com/package/Proto', 'https://github.com/advisories/GHSA-58g2-9fqr-36q2'}
| null |
GHSA
|
GHSA-5crj-c72x-m7gq
|
Null pointer exception when `Exit` node is not preceded by `Enter` op
|
### Impact
The [process of building the control flow graph](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/common_runtime/immutable_executor_state.cc#L284-L346) for a TensorFlow model is vulnerable to a null pointer exception when nodes that should be paired are not:
```python
import tensorflow as tf
@tf.function
def func():
return tf.raw_ops.Exit(data=[False,False])
func()
```
This occurs because the code assumes that the first node in the pairing (e.g., an `Enter` node) always exists when encountering the second node (e.g., an `Exit` node):
```cc
...
} else if (IsExit(curr_node)) {
// Exit to the parent frame.
parent = parent_nodes[curr_id];
frame_name = cf_info->frame_names[parent->id()];
...
```
When this is not the case, `parent` is `nullptr` so dereferencing it causes a crash.
### Patches
We have patched the issue in GitHub commit [05cbebd3c6bb8f517a158b0155debb8df79017ff](https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41217'}
|
2021-11-10T18:55:11Z
|
2021-11-10T18:55:11Z
|
MODERATE
| 5.5
|
{'CWE-476'}
|
{'https://github.com/advisories/GHSA-5crj-c72x-m7gq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41217', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq', 'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff'}
| null |
GHSA
|
GHSA-wc6f-cjcp-cc33
|
Improper Certificate Validation in Apache IoTDB
|
An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely.
|
{'CVE-2020-1952'}
|
2022-01-06T19:45:30Z
|
2022-01-06T19:45:30Z
|
HIGH
| 9.8
|
{'CWE-295'}
|
{'https://lists.apache.org/thread.html/r3d2ff899ead64d2952fdc1fbb1f520ca42011ed2b4c7f786e921f6b9%40%3Cdev.iotdb.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1952', 'https://github.com/advisories/GHSA-wc6f-cjcp-cc33'}
| null |
GHSA
|
GHSA-g8jj-899q-8x3j
|
Cross-site scripting in json-sanitizer
|
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
|
{'CVE-2020-13973'}
|
2022-02-10T23:04:13Z
|
2022-02-10T23:04:13Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/OWASP/json-sanitizer/pull/20', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13973', 'https://github.com/advisories/GHSA-g8jj-899q-8x3j'}
| null |
GHSA
|
GHSA-cfqj-9g2g-w7q6
|
Cross-site Scripting in Apache JSPWiki
|
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.
|
{'CVE-2021-40369'}
|
2021-12-02T17:49:14Z
|
2021-12-02T17:49:14Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-cfqj-9g2g-w7q6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369', 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh'}
| null |
GHSA
|
GHSA-pgf8-28gg-vpr6
|
Path traversal
|
### Impact
A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API.
This vulnerability is mitigated by the fact that an attacker would need access to modify the `mkdocs.yml` in the documentation source code, and would also need access to the TechDocs backend API.
### Patches
The vulnerability is patched in the `0.6.3` release of `@backstage/techdocs-common`.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)
|
{'CVE-2021-32662'}
|
2021-06-07T18:55:30Z
|
2021-06-04T19:09:20Z
|
MODERATE
| 6.5
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32662', 'https://github.com/advisories/GHSA-pgf8-28gg-vpr6', 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6', 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208', 'https://github.com/backstage/backstage/releases/tag/release-2021-05-27'}
| null |
GHSA
|
GHSA-rgp5-m2pq-3fmg
|
Cross-site Scripting in microweber
|
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
|
{'CVE-2022-0690'}
|
2022-02-26T01:15:28Z
|
2022-02-20T00:00:31Z
|
HIGH
| 8.8
|
{'CWE-79'}
|
{'https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690', 'https://github.com/advisories/GHSA-rgp5-m2pq-3fmg', 'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'}
| null |
GHSA
|
GHSA-j665-rvj7-2jv9
|
Code Injection in mosc
|
mosc through 1.0.0 is vulnerable to Arbitrary Code Execution. User input provided to `properties` argument is executed by the `eval` function, resulting in code execution.
|
{'CVE-2020-7672'}
|
2021-07-29T18:11:52Z
|
2021-05-17T21:00:17Z
|
HIGH
| 8.6
|
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-MOSC-571492', 'https://github.com/advisories/GHSA-j665-rvj7-2jv9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7672'}
| null |
GHSA
|
GHSA-cqv6-3phm-hcwx
|
Access to invalid memory during shape inference in `Cudnn*` ops
|
### Impact
The [shape inference code](https://github.com/tensorflow/tensorflow/blob/9ff27787893f76d6971dcd1552eb5270d254f31b/tensorflow/core/ops/cudnn_rnn_ops.cc) for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow:
```python
import tensorflow as tf
@tf.function
def func():
return tf.raw_ops.CudnnRNNV3(
input=[0.1, 0.1],
input_h=[0.5],
input_c=[0.1, 0.1, 0.1],
params=[0.5, 0.5],
sequence_lengths=[-1, 0, 1])
func()
```
This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values:
```cc
auto input_shape = c->input(0);
auto input_h_shape = c->input(1);
auto seq_length = c->Dim(input_shape, 0);
auto batch_size = c->Dim(input_shape, 1); // assumes rank >= 2
auto num_units = c->Dim(input_h_shape, 2); // assumes rank >= 3
```
### Patches
We have patched the issue in GitHub commit [af5fcebb37c8b5d71c237f4e59c6477015c78ce6](https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
{'CVE-2021-41221'}
|
2021-11-10T18:50:17Z
|
2021-11-10T18:50:17Z
|
HIGH
| 7.8
|
{'CWE-787', 'CWE-120'}
|
{'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6', 'https://github.com/advisories/GHSA-cqv6-3phm-hcwx', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41221'}
| null |
GHSA
|
GHSA-q42c-rrp3-r3xm
|
Malicious Package in commmander
|
All versions of `commmander` contain malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-30T22:02:15Z
|
2020-09-11T21:13:44Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/923', 'https://github.com/advisories/GHSA-q42c-rrp3-r3xm'}
| null |
GHSA
|
GHSA-hgwp-4vp4-qmm2
|
Local Privilege Escalation in cloudflared
|
In `cloudflared` versions < 2020.8.1 on Windows, if an administrator has started `cloudflared` and set it to read configuration files from a certain directory, an unprivileged user can exploit a misconfiguration in order to escalate privileges and execute system-level commands. The misconfiguration was due to the way that `cloudflared` reads its configuration file. One of the locations that `cloudflared` reads from (C:\etc\) is not a secure by default directory due to the fact that Windows does not enforce access controls on this directory without further controls applied. A malformed config.yaml file can be written by any user. Upon reading this config, `cloudflared` would output an error message to a log file defined in the malformed config. The user-controlled log file location could be set to a specific location that Windows will execute when any user logs in.
|
{'CVE-2020-24356'}
|
2022-04-19T19:02:35Z
|
2021-05-24T16:56:35Z
|
HIGH
| 7.8
|
{'CWE-427'}
|
{'https://github.com/advisories/GHSA-hgwp-4vp4-qmm2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24356', 'https://github.com/cloudflare/cloudflared/security/advisories/GHSA-hgwp-4vp4-qmm2'}
| null |
GHSA
|
GHSA-rj38-87f3-93p6
|
Downloads Resources over HTTP in limbus-buildgen
|
Affected versions of `limbus-buildgen` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `limbus-buildgen`.
## Recommendation
Update to version 0.1.1 or later.
|
{'CVE-2016-10674'}
|
2021-01-07T22:31:55Z
|
2019-02-18T23:42:27Z
|
HIGH
| 0
|
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/276', 'https://www.npmjs.com/advisories/276', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10674', 'https://github.com/advisories/GHSA-rj38-87f3-93p6'}
| null |
GHSA
|
GHSA-gq67-pp9w-43gp
|
Cryptographically weak CSRF tokens in Apache MyFaces
|
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.
Mitigation:
Existing web.xml configuration parameters can be used to direct
MyFaces to use SecureRandom for CSRF token generation:
org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom
org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom
org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom
|
{'CVE-2021-26296'}
|
2021-06-16T17:31:39Z
|
2021-06-16T17:31:39Z
|
HIGH
| 0
|
{'CWE-352', 'CWE-330'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26296', 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2', 'https://security.netapp.com/advisory/ntap-20210528-0007/', 'https://issues.apache.org/jira/browse/MYFACES-4373', 'http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html', 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-gq67-pp9w-43gp', 'http://seclists.org/fulldisclosure/2021/Feb/66'}
| null |
GHSA
|
GHSA-46hv-7769-j7rx
|
Unauthorized File Access in harp
|
Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file.
## Recommendation
Upgrade to version `0.40.2` or later.
|
{'CVE-2019-5437'}
|
2021-06-03T17:09:41Z
|
2019-06-13T16:12:22Z
|
MODERATE
| 0
|
{'CWE-548'}
|
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210', 'https://hackerone.com/reports/453820', 'https://www.npmjs.com/advisories/807', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437', 'https://github.com/advisories/GHSA-46hv-7769-j7rx'}
| null |
GHSA
|
GHSA-8c4j-34r4-xr8g
|
Unsafe Deserialization in jackson-databind
|
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.
|
{'CVE-2020-36180'}
|
2022-04-22T18:16:40Z
|
2021-12-09T19:16:18Z
|
HIGH
| 8.1
|
{'CWE-502'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-8c4j-34r4-xr8g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36180', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
| null |
GHSA
|
GHSA-5vx5-9q73-wgp4
|
High severity vulnerability that affects safemode
|
rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.
|
{'CVE-2017-7540'}
|
2021-01-08T19:48:21Z
|
2017-10-24T18:33:35Z
|
HIGH
| 0
|
{'CWE-184'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7540', 'https://github.com/svenfuchs/safemode/pull/23', 'https://github.com/advisories/GHSA-5vx5-9q73-wgp4'}
| null |
GHSA
|
GHSA-f4g9-h89h-jgv9
|
SAML XML Signature wrapping in PySAML2
|
### Impact
All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not validate the SAML document against an XML schema. This allows invalid XML documents to trick the verification process, by presenting elements with a valid signature inside elements whose content has been malformed. The verification is offloaded to `xmlsec1` and `xmlsec1` will not validate every signature in the given document, but only the first it finds in the given scope.
### Patches
Users should upgrade to pysaml2 `v6.5.0`.
### Workarounds
No workaround provided at this point.
### References
No references provided at this point.
### Credits
- Victor Schönfelder Garcia (isits AG International School of IT Security)
- Juraj Somorovsky (Paderborn University)
- Vladislav Mladenov (Ruhr University Bochum)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2)
* Email us at [the incident-response address](mailto:incident-response@idpy.org)
|
{'CVE-2021-21238'}
|
2022-04-19T19:02:44Z
|
2021-01-21T14:12:16Z
|
LOW
| 6.5
|
{'CWE-347'}
|
{'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-f4g9-h89h-jgv9', 'https://pypi.org/project/pysaml2', 'https://github.com/advisories/GHSA-f4g9-h89h-jgv9', 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21238', 'https://github.com/IdentityPython/pysaml2/commit/1d8fd268f5bf887480a403a7a5ef8f048157cc14'}
| null |
GHSA
|
GHSA-6343-m2qr-66gf
|
Malicious Package in js-sja3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:14:57Z
|
2020-09-03T23:10:41Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-6343-m2qr-66gf', 'https://www.npmjs.com/advisories/1291'}
| null |
GHSA
|
GHSA-g44j-7vp3-68cv
|
Arbitrary File Write in Libcontainer
|
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
|
{'CVE-2015-3629'}
|
2022-04-12T22:13:08Z
|
2022-02-15T01:57:18Z
|
HIGH
| 8.4
|
{'CWE-59'}
|
{'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://seclists.org/fulldisclosure/2015/May/28', 'https://github.com/advisories/GHSA-g44j-7vp3-68cv', 'https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ', 'http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html', 'http://www.securityfocus.com/bid/74558', 'http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3629', 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3629'}
| null |
GHSA
|
GHSA-xqfj-vm6h-2x34
|
Improper Handling of Length Parameter Inconsistency in Compress
|
When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.
|
{'CVE-2021-35517'}
|
2022-04-22T15:46:13Z
|
2021-08-02T16:55:39Z
|
HIGH
| 7.5
|
{'CWE-130', 'CWE-770'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-xqfj-vm6h-2x34', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/3', 'https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35517', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'http://www.openwall.com/lists/oss-security/2021/07/13/5', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}
| null |
GHSA
|
GHSA-q9p4-qfc8-fvpp
|
SQL Injection in medoo
|
columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.
|
{'CVE-2019-10762'}
|
2021-10-12T16:32:38Z
|
2021-10-12T16:32:38Z
|
CRITICAL
| 9.8
|
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-q9p4-qfc8-fvpp', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762', 'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562', 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}
| null |
GHSA
|
GHSA-w457-6q6x-cgp9
|
Prototype Pollution in handlebars
|
Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads.
## Recommendation
Upgrade to version 3.0.8, 4.3.0 or later.
|
{'CVE-2019-19919'}
|
2021-07-26T21:51:07Z
|
2019-12-26T17:58:13Z
|
CRITICAL
| 9.8
|
{'CWE-74'}
|
{'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919', 'https://www.npmjs.com/advisories/1164', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19919', 'https://github.com/wycats/handlebars.js/issues/1558', 'https://github.com/advisories/GHSA-w457-6q6x-cgp9'}
| null |
GHSA
|
GHSA-jv9c-w74q-6762
|
Insecure permissions on build temporary rootfs in Singularity
|
### Impact
Insecure permissions on temporary directories used in explicit and implicit container build operations.
When a Singularity command that results in a container build operation is executed, it is possible for a user with access to the system to read the contents of the image during the build. Additionally, if the image contains a world-writable file or directory, it is possible for a user to inject arbitrary content into the running build, which in certain circumstances may enable arbitrary code execution during the build and/or when the built container is run.
### Patches
This issue is addressed in Singularity 3.6.3.
All users are advised to upgrade to 3.6.3.
### Workarounds
The issue is mitigated if `TMPDIR` is set to a location that is only accessible to the user, as any subdirectories directly under `TMPDIR` cannot then be accessed by others. However, this is difficult to enforce so it is not recommended to rely on this as a mitigation.
### For more information
General questions about the impact of the advisory / changes made in the 3.6.0 release can be asked in the:
* [Singularity Slack Channel](https://bit.ly/2m0g3lX)
* [Singularity Mailing List](https://groups.google.com/a/lbl.gov/forum/??sdf%7Csort:date#!forum/singularity)
Any sensitive security concerns should be directed to: security@sylabs.io
See our Security Policy here: https://sylabs.io/security-policy
|
{'CVE-2020-25040'}
|
2022-04-19T19:02:34Z
|
2021-05-24T16:56:23Z
|
HIGH
| 8.8
|
{'CWE-668', 'CWE-732'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00070.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25040', 'https://github.com/hpcng/singularity/security/advisories/GHSA-jv9c-w74q-6762', 'https://github.com/advisories/GHSA-jv9c-w74q-6762', 'http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00088.html', 'https://medium.com/sylabs'}
| null |
GHSA
|
GHSA-g37j-v5gh-g25c
|
Malicious Package in js-shi3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:14:08Z
|
2020-09-03T23:06:48Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1288', 'https://github.com/advisories/GHSA-g37j-v5gh-g25c'}
| null |
GHSA
|
GHSA-vj9x-w7ch-f46p
|
pimcore is vulnerable to SQL Injection
|
pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
|
{'CVE-2022-0258'}
|
2022-01-21T23:50:08Z
|
2022-01-21T23:50:08Z
|
HIGH
| 8.3
|
{'CWE-89'}
|
{'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd', 'https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258', 'https://github.com/advisories/GHSA-vj9x-w7ch-f46p'}
| null |
GHSA
|
GHSA-49c6-3wr4-8jr4
|
Malicious Package in malicious-npm-package
|
All versions of `malicious-npm-package` contain malicious code. The malware targets Windows systems. It runs a powershell command that downloads an executable file from a remote server and runs it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:07:49Z
|
2020-09-04T15:05:26Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-49c6-3wr4-8jr4', 'https://www.npmjs.com/advisories/1323'}
| null |
GHSA
|
GHSA-4w2q-9hp2-vxj5
|
Path Traversal in Caucho Resin
|
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
|
{'CVE-2021-44138'}
|
2022-04-22T20:22:28Z
|
2022-04-05T00:00:28Z
|
HIGH
| 7.5
|
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44138', 'https://github.com/maybe-why-not/reponame/issues/2', 'https://github.com/advisories/GHSA-4w2q-9hp2-vxj5'}
| null |
GHSA
|
GHSA-hxxf-q3w9-4xgw
|
Malicious Package in eslint-scope
|
Version 3.7.2 of `eslint-scope` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to 2 remote servers.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| null |
2021-09-14T17:35:41Z
|
2018-07-12T19:52:02Z
|
CRITICAL
| 9.1
|
{'CWE-506'}
|
{'https://github.com/eslint/eslint-scope/issues/39', 'https://eslint.org/blog/2018/07/postmortem-for-malicious-package-publishes', 'https://www.npmjs.com/advisories/673', 'https://github.com/advisories/GHSA-hxxf-q3w9-4xgw', 'https://snyk.io/vuln/SNYK-JS-ESLINTSCOPE-11120'}
| null |
GHSA
|
GHSA-xjp4-6w75-qrj7
|
Remote CLI Command Execution Vulnerability in CodeIgniter4
|
### Impact
This vulnerability allows attackers to execute CLI routes via HTTP request.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues)
* Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
|
{'CVE-2022-24711'}
|
2022-04-19T19:03:22Z
|
2022-03-01T21:44:13Z
|
CRITICAL
| 9.4
|
{'CWE-94', 'CWE-20'}
|
{'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7', 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781', 'https://github.com/advisories/GHSA-xjp4-6w75-qrj7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24711'}
| null |
GHSA
|
GHSA-8g4m-cjm2-96wq
|
Sandbox escape in notevil and argencoders-notevil
|
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878). This package has been deprecated.
|
{'CVE-2021-23771'}
|
2022-03-25T16:47:43Z
|
2022-03-18T00:01:11Z
|
MODERATE
| 6.5
|
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23771', 'https://github.com/advisories/GHSA-8g4m-cjm2-96wq', 'https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587', 'https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946'}
| null |
GHSA
|
GHSA-6jmr-jfh7-xg3h
|
False-positive validity for NFT1 genesis transactions
|
### Impact
In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token type as is required by the NFT1 specification.
### Patches
npm package "slp-validate" has been patched and is published and tagged as version 1.2.2.
### Workarounds
Upgrade to slp-validate 1.2.2.
### References
* Package location: https://www.npmjs.com/package/slp-validate
* SLP NFT1 spec: https://slp.dev/specs/slp-nft-1/#nft1-protocol-requirements
* Git commit hash fixing this issue: https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c
* Unit tests have been added to assist validator implementations in avoiding this bug: https://github.com/simpleledger/slp-unit-test-data/commit/8c942eacfae12686dcf1f3366321445a4fba73e7
### For more information
If you have any questions or comments about this advisory please open an issue in the [slp-validate](https://github.com/simpleledger/slp-validate.js/issues) repository.
|
{'CVE-2020-15131'}
|
2021-01-08T21:00:18Z
|
2020-07-30T14:58:53Z
|
CRITICAL
| 7.5
|
{'CWE-697'}
|
{'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c', 'https://github.com/advisories/GHSA-6jmr-jfh7-xg3h', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131'}
| null |
GHSA
|
GHSA-j59f-6m4q-62h6
|
Improper Key Verification in ipns
|
Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid.
## Recommendation
Update to version 0.1.3 or later.
| null |
2021-08-04T21:17:51Z
|
2019-05-30T17:28:48Z
|
HIGH
| 7.5
|
{'CWE-287'}
|
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0', 'https://github.com/advisories/GHSA-j59f-6m4q-62h6', 'https://www.npmjs.com/advisories/693'}
| null |
GHSA
|
GHSA-w6gv-3r3v-gwgj
|
Moderate severity vulnerability that affects org.keycloak:keycloak-core
|
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
|
{'CVE-2017-2585'}
|
2021-09-21T17:59:57Z
|
2018-10-18T16:47:41Z
|
MODERATE
| 5.9
|
{'CWE-200'}
|
{'https://access.redhat.com/errata/RHSA-2017:0872', 'http://rhn.redhat.com/errata/RHSA-2017-0876.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2585', 'https://github.com/advisories/GHSA-w6gv-3r3v-gwgj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1412376', 'https://access.redhat.com/errata/RHSA-2017:0873', 'http://www.securityfocus.com/bid/97393', 'http://www.securitytracker.com/id/1038180'}
| null |
GHSA
|
GHSA-x6fg-f45m-jf5q
|
Regular Expression Denial of Service in semver
|
Versions 4.3.1 and earlier of `semver` are affected by a regular expression denial of service vulnerability when extremely long version strings are parsed.
## Recommendation
Update to version 4.3.2 or later
|
{'CVE-2015-8855'}
|
2021-09-21T22:15:37Z
|
2017-10-24T18:33:36Z
|
HIGH
| 7.5
| null |
{'https://github.com/advisories/GHSA-x6fg-f45m-jf5q', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8855', 'https://www.npmjs.com/advisories/31', 'http://www.securityfocus.com/bid/86957', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS', 'https://nodesecurity.io/advisories/31'}
| null |
GHSA
|
GHSA-c3xq-cj8f-7829
|
Inadequate Encryption Strength in python-keystoneclient
|
python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass
|
{'CVE-2013-2166'}
|
2022-03-23T19:45:18Z
|
2021-10-12T16:31:43Z
|
CRITICAL
| 9.8
|
{'CWE-326'}
|
{'https://security-tracker.debian.org/tracker/CVE-2013-2166', 'http://www.securityfocus.com/bid/60684', 'http://rhn.redhat.com/errata/RHSA-2013-0992.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166', 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166', 'http://www.openwall.com/lists/oss-security/2013/06/19/5', 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e', 'https://access.redhat.com/security/cve/cve-2013-2166', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2166', 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html', 'https://github.com/advisories/GHSA-c3xq-cj8f-7829'}
| null |
GHSA
|
GHSA-p33q-w45h-2hcj
|
Malicious Package in 4equest
|
All versions of `4equest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:44:09Z
|
2020-09-02T18:30:03Z
|
CRITICAL
| 9.8
|
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-p33q-w45h-2hcj', 'https://www.npmjs.com/advisories/837'}
| null |
GHSA
|
GHSA-55r9-7mf8-m382
|
Cross-site Scripting in edge.js
|
Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
|
{'CVE-2021-23443'}
|
2022-05-05T13:50:00Z
|
2021-09-22T20:36:46Z
|
MODERATE
| 5.4
|
{'CWE-79', 'CWE-843'}
|
{'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23443', 'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556', 'https://github.com/advisories/GHSA-55r9-7mf8-m382'}
| null |
GHSA
|
GHSA-pfr3-87q3-65rc
|
Cross-site Scripting in vmd
|
vmd through 1.34.0 allows 'div class="markdown-body"' XSS, as demonstrated by Electron remote code execution via require('child_process').execSync('calc.exe') on Windows and a similar attack on macOS.
|
{'CVE-2021-33041'}
|
2022-02-10T23:46:28Z
|
2022-02-10T23:46:28Z
|
MODERATE
| 6.1
|
{'CWE-79'}
|
{'https://www.npmjs.com/package/vmd', 'https://github.com/yoshuawuyts/vmd/issues/137', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33041', 'https://github.com/advisories/GHSA-pfr3-87q3-65rc'}
| null |
GHSA
|
GHSA-8w94-cf6g-c8mg
|
Man-in-the-Middle (MitM)
|
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
|
{'CVE-2014-5277'}
|
2022-04-12T22:53:42Z
|
2022-02-15T01:57:18Z
|
MODERATE
| 5.3
| null |
{'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-5277', 'https://github.com/docker/docker/commit/8caacb18f8019dfda30d79c327397e5f5783c068', 'https://github.com/advisories/GHSA-8w94-cf6g-c8mg', 'https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00048.html', 'https://groups.google.com/forum/#!topic/docker-user/oYm0i3xShJU', 'https://nvd.nist.gov/vuln/detail/CVE-2014-5277'}
| null |
GHSA
|
GHSA-rv6r-3f5q-9rgx
|
Twisted SSH client and server deny of service during SSH handshake.
|
### Impact
The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier.
A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as `nc -rv localhost 22 < /dev/zero`.
### Patches
The issue was fix in GitHub commit https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1
A fix is available in Twisted 22.2.0.
### Workarounds
* Limit access to the SSH server only to trusted source IP addresses.
* Connect over SSH only to trusted destination IP addresses.
### References
Reported at https://twistedmatrix.com/trac/ticket/10284
Discussions at https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx
### For more information
Found by vin01
|
{'CVE-2022-21716'}
|
2022-04-22T15:33:58Z
|
2022-03-03T19:02:08Z
|
HIGH
| 7.5
|
{'CWE-120'}
|
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://twistedmatrix.com/trac/ticket/10284', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21716', 'https://github.com/twisted/twisted/releases/tag/twisted-22.2.0', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00009.html', 'https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx', 'https://github.com/twisted/twisted/commit/89c395ee794e85a9657b112c4351417850330ef9', 'https://github.com/advisories/GHSA-rv6r-3f5q-9rgx', 'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1'}
| null |
GHSA
|
GHSA-g8rg-7rpr-cwr2
|
Information Disclosure in TYPO3 extension sf_event_mgt
|
A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure.
Another missing access check in the backend module allows an authenticated backend user to send emails to event participants for events which the user does not have access to, resulting in Broken Access Control.
External reference: [https://typo3.org/security/advisory/typo3-ext-sa-2020-017](https://typo3.org/security/advisory/typo3-ext-sa-2020-017)
|
{'CVE-2020-25026'}
|
2022-04-19T19:02:33Z
|
2020-09-02T18:03:26Z
|
MODERATE
| 4.3
|
{'CWE-863'}
|
{'https://typo3.org/help/security-advisories', 'https://github.com/advisories/GHSA-g8rg-7rpr-cwr2', 'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2', 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-017', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026', 'https://packagist.org/packages/derhansen/sf_event_mgt'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.