ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-9vpm-rcf4-9wqw
Division by 0 in `MaxPoolGradWithArgmax`
### Impact The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` is vulnerable to a division by 0: ```python import tensorflow as tf input = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) grad = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) argmax = tf.constant([], shape=[0], dtype=tf.int64) ksize = [1, 1, 1, 1] strides = [1, 1, 1, 1] tf.raw_ops.MaxPoolGradWithArgmax( input=input, grad=grad, argmax=argmax, ksize=ksize, strides=strides, padding='SAME', include_batch_in_index=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/279bab6efa22752a2827621b7edb56a730233bd8/tensorflow/core/kernels/maxpooling_op.cc#L1033-L1034) fails to validate that the batch dimension of the tensor is non-zero, before dividing by this quantity. ### Patches We have patched the issue in GitHub commit [376c352a37ce5a68b721406dc7e77ac4b6cf483d](https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29573'}
2021-05-21T14:26:07Z
2021-05-21T14:26:07Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-9vpm-rcf4-9wqw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29573', 'https://github.com/tensorflow/tensorflow/commit/376c352a37ce5a68b721406dc7e77ac4b6cf483d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vpm-rcf4-9wqw'}
null
GHSA
GHSA-vp77-fqqp-79j8
Prototype Pollution in decal
This affects all versions of package decal. The vulnerability is in the set function.
{'CVE-2020-28449'}
2021-04-13T15:20:27Z
2021-04-13T15:20:27Z
HIGH
8.6
{'CWE-400', 'CWE-1321'}
{'https://github.com/advisories/GHSA-vp77-fqqp-79j8', 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007', 'https://www.npmjs.com/package/decal', 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449'}
null
GHSA
GHSA-8jxj-9r5f-w3m2
Low severity vulnerability that affects puppet
lib/puppet/defaults.rb in Puppet 2.7.x before 2.7.18, and Puppet Enterprise before 2.5.2, uses 0644 permissions for last_run_report.yaml, which allows local users to obtain sensitive configuration information by leveraging access to the puppet master server to read this file.
{'CVE-2012-3866'}
2021-09-07T19:48:46Z
2017-10-24T18:33:37Z
LOW
0
null
{'http://www.debian.org/security/2012/dsa-2511', 'https://github.com/puppetlabs/puppet/commit/fd44bf5e6d0d360f6a493d663b653c121fa83c3f', 'https://github.com/advisories/GHSA-8jxj-9r5f-w3m2', 'http://lists.opensuse.org/opensuse-updates/2012-07/msg00036.html', 'http://www.ubuntu.com/usn/USN-1506-1', 'http://secunia.com/advisories/50014', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3866', 'http://puppetlabs.com/security/cve/cve-2012-3866/', 'https://bugzilla.redhat.com/show_bug.cgi?id=839135'}
null
GHSA
GHSA-hv53-vf5m-8q94
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2022-02-11T23:28:20Z
2022-02-11T23:28:20Z
LOW
0
null
{'https://github.com/personnummer/go/security/advisories/GHSA-hv53-vf5m-8q94', 'https://github.com/advisories/GHSA-hv53-vf5m-8q94'}
null
GHSA
GHSA-874w-m2v2-mj64
Double Free in Adplug
AdPlug 2.3.1 has a double free in the Cu6mPlayer class in u6m.h.
{'CVE-2019-15151'}
2021-03-29T20:48:45Z
2021-03-29T20:48:45Z
CRITICAL
9.8
{'CWE-415'}
{'https://github.com/adplug/adplug/issues/91', 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151', 'https://github.com/advisories/GHSA-874w-m2v2-mj64', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/', 'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'}
null
GHSA
GHSA-mgv2-57vj-99xc
Low severity vulnerability that affects eye.js
## Test breaking ### Impact In v1.2.0, tests are broken: all tests are always succeeding. If tests are looking for security vulnerabilities, these were compromised. ### Patches Users should upgrade to `v1.2.1` ### Workarounds Users who don't use eye.js for looking for vulnerabilities are safe. Upgrading will just fix some bugs. ### For more information If you have any questions or comments about this advisory: * Open an issue in [EyeJS](https://github.com/arguiot/EyeJS) * Email us at [arguiot@gmail.com](mailto:arguiot@gmail.com)
null
2021-12-03T14:39:45Z
2019-10-07T16:54:24Z
LOW
0
null
{'https://github.com/arguiot/EyeJS/security/advisories/GHSA-mgv2-57vj-99xc', 'https://github.com/advisories/GHSA-mgv2-57vj-99xc'}
null
GHSA
GHSA-5mj6-3cmq-fh34
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
{'CVE-2022-0079'}
2022-01-06T22:22:46Z
2022-01-06T22:22:46Z
MODERATE
5.3
{'CWE-209'}
{'https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee', 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0079', 'https://github.com/advisories/GHSA-5mj6-3cmq-fh34'}
null
GHSA
GHSA-2wpq-vvw6-67wr
Hijacked Environment Variables in nodecaffe
The `nodecaffe` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16070'}
2021-09-16T20:57:18Z
2018-08-29T23:38:35Z
CRITICAL
0
{'CWE-506', 'CWE-433'}
{'https://www.npmjs.com/advisories/509', 'https://nodesecurity.io/advisories/509', 'https://github.com/advisories/GHSA-2wpq-vvw6-67wr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16070'}
null
GHSA
GHSA-p7w2-mc6m-mfx2
Malicious Package in scroool
Version 0.1.7 of `scroool` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:22:25Z
2020-09-11T21:22:25Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/944', 'https://github.com/advisories/GHSA-p7w2-mc6m-mfx2'}
null
GHSA
GHSA-v84g-cf5j-xjqx
Path Traversal in Apache James Server
Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).
{'CVE-2022-22931'}
2022-02-10T22:46:45Z
2022-02-08T00:00:34Z
MODERATE
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22931', 'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7', 'https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr', 'https://github.com/apache/james-project/pull/877', 'https://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/advisories/GHSA-v84g-cf5j-xjqx'}
null
GHSA
GHSA-rmh2-65xw-9m6q
Infinite Loop in jsonparser
The Library API in buger jsonparser through 2019-12-04 allows attackers to cause a denial of service (infinite loop) via a Delete call.
{'CVE-2020-10675'}
2021-05-18T18:26:25Z
2021-05-18T18:26:25Z
MODERATE
7.5
{'CWE-835'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4C7PV6KEUUM76V4B2J5IFN2U6LEOWB67/', 'https://github.com/advisories/GHSA-rmh2-65xw-9m6q', 'https://github.com/buger/jsonparser/issues/188', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10675'}
null
GHSA
GHSA-g5rr-p69h-7v3g
Insufficient type validation in pocketmine/pocketmine-mp
When an inventory interaction is performed (e.g. moving an item around an inventory), the client sends a serialized version of the itemstack to the server, which the server then deserializes and compares against its own copy. If the copies don't match, the transaction is invalid. This involves deserializing item NBT from the client, which allows for bogus data to be provided. Usually, this is harmless, but in this particular case, it could result in crashes on certain types of bad data (e.g. incorrect ListTag type provided for the `CanDestroy` tag). This is fixed in 4.2.9 by commit 5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2. It's non-trivial to workaround this, but can be done by handling `InventoryTransactionPacket` and `PlayerAuthInputPacket` to scrub inbound transaction data of bogus NBT that would cause these crashes.
null
2022-04-26T20:57:10Z
2022-04-22T20:57:12Z
HIGH
7.5
{'CWE-20', 'CWE-1287'}
{'https://github.com/pmmp/PocketMine-MP/blob/4.2.9/changelogs/4.2.md#429', 'https://github.com/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2', 'https://github.com/pmmp/PocketMine-MP/releases/tag/4.2.9'}
null
GHSA
GHSA-m8h6-m9p5-p2f8
Moderate severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish. Active Record in Ruby on Rails 4.2.x before 4.2.7.1 does not properly consider differences in parameter handling between the Active Record component and the JSON implementation, which allows remote attackers to bypass intended database-query restrictions and perform NULL checks or trigger missing WHERE clauses via a crafted request, as demonstrated by certain "[nil]" values, a related issue to CVE-2012-2660, CVE-2012-2694, and CVE-2013-0155.
null
2021-12-02T23:15:04Z
2018-08-13T20:49:01Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-m8h6-m9p5-p2f8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6317'}
null
GHSA
GHSA-cr5j-953j-xw5p
Arbitrary execution of code in Nokogiri
A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.
{'CVE-2019-5477'}
2021-01-08T20:59:55Z
2019-08-19T19:27:23Z
HIGH
0
{'CWE-78'}
{'https://hackerone.com/reports/650835', 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc', 'https://github.com/sparklemotion/nokogiri/issues/1915', 'https://github.com/advisories/GHSA-cr5j-953j-xw5p', 'https://security.gentoo.org/glsa/202006-05', 'https://usn.ubuntu.com/4175-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477', 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html'}
null
GHSA
GHSA-f2c5-997w-7f5c
Cross-site Scripting in peertube
peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and with Javascript easily can be stolen by attackers.
{'CVE-2021-3780'}
2021-09-24T13:07:20Z
2021-09-20T20:42:41Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6', 'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65', 'https://github.com/advisories/GHSA-f2c5-997w-7f5c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780'}
null
GHSA
GHSA-qjf4-7642-c57p
Downloads Resources over HTTP in unicode
Affected versions of `unicode` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 9.0.0 or later.
{'CVE-2016-10578'}
2021-01-08T21:18:43Z
2019-02-18T23:51:52Z
HIGH
0
{'CWE-311'}
{'https://www.npmjs.com/advisories/161', 'https://nodesecurity.io/advisories/161', 'https://github.com/advisories/GHSA-qjf4-7642-c57p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'}
null
GHSA
GHSA-h6xx-pmxh-3wgp
Improper Authentication in etcd
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may authenticate as that user with any valid (trusted) client certificate in a REST API request to the gRPC-gateway.
{'CVE-2018-16886'}
2022-04-12T22:41:39Z
2022-02-15T01:57:18Z
HIGH
8.1
{'CWE-287', 'CWE-285'}
{'https://access.redhat.com/errata/RHSA-2019:0237', 'https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d', 'https://github.com/etcd-io/etcd/pull/10366', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPGYHMSKDPW5GAMI7BEP3XQRVRLLBJKS/', 'https://github.com/etcd-io/etcd/commit/bf9d0d8291dc71ecbfb2690612954e1a298154b2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JX7QTIT465BQGRGNCE74RATRQLKT2QE4/', 'http://www.securityfocus.com/bid/106540', 'https://github.com/advisories/GHSA-h6xx-pmxh-3wgp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16886', 'https://access.redhat.com/errata/RHSA-2019:1352', 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.3.md#security-authentication', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16886', 'https://github.com/etcd-io/etcd/blob/1eee465a43720d713bb69f7b7f5e120135fdb1ac/CHANGELOG-3.2.md#security-authentication'}
null
GHSA
GHSA-488m-6gh8-9j36
Moderate severity vulnerability that affects bracket-template
bracket-template suffers from reflected XSS possible when variable passed via GET parameter is used in template
{'CVE-2018-3735'}
2021-01-08T19:56:12Z
2018-07-27T17:05:06Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-488m-6gh8-9j36', 'https://hackerone.com/reports/317125', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3735'}
null
GHSA
GHSA-h9q8-5gv2-v6mg
Potential Session Hijacking
### Impact Potential session hijacking of store customers. ### Patches We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659 ### For more information https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021
null
2021-03-12T23:09:08Z
2021-03-12T23:09:08Z
LOW
0
{'CWE-613'}
{'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://github.com/advisories/GHSA-h9q8-5gv2-v6mg', 'https://packagist.org/packages/shopware/platform'}
null
GHSA
GHSA-mx3x-ghqm-r43h
Prototype pollution vulnerability in 'predefine'
Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28280'}
2021-10-12T16:27:18Z
2021-10-12T16:27:18Z
CRITICAL
9.8
null
{'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28280', 'https://github.com/advisories/GHSA-mx3x-ghqm-r43h', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280'}
null
GHSA
GHSA-95rw-fx8r-36v6
Cross-site Scripting in Django
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
{'CVE-2022-22818'}
2022-02-24T13:07:20Z
2022-02-04T00:00:33Z
MODERATE
6.1
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20220221-0003/', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22818', 'https://www.djangoproject.com/weblog/2022/feb/01/security-releases/', 'https://groups.google.com/forum/#!forum/django-announce', 'https://github.com/advisories/GHSA-95rw-fx8r-36v6'}
null
GHSA
GHSA-gx73-2498-r55c
Unsound casting in flatbuffers
An issue was discovered in the flatbuffers crate before 0.6.1 for Rust. Arbitrary bytes can be reinterpreted as a bool, defeating soundness.
{'CVE-2019-25004'}
2021-08-25T20:46:49Z
2021-08-25T20:46:49Z
CRITICAL
9.8
{'CWE-704'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-25004', 'https://github.com/google/flatbuffers/issues/5530', 'https://rustsec.org/advisories/RUSTSEC-2019-0028.html', 'https://github.com/advisories/GHSA-gx73-2498-r55c'}
null
GHSA
GHSA-2x7v-w2mv-f3rx
Improper Authentication in Atlassian Connect Spring Boot
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
{'CVE-2021-26077'}
2021-06-16T17:23:12Z
2021-06-16T17:23:12Z
HIGH
8.8
{'CWE-287'}
{'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26077', 'https://github.com/advisories/GHSA-2x7v-w2mv-f3rx'}
null
GHSA
GHSA-v569-g72v-q434
Low severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop 3.0.0-alpha1 to 3.0.0, 2.9.0, 2.8.0 to 2.8.3, and 2.5.0 to 2.7.5, HDFS exposes extended attribute key/value pairs during listXAttrs, verifying only path-level search access to the directory rather than path-level read permission to the referent.
{'CVE-2018-1296'}
2021-09-20T15:10:34Z
2019-02-12T17:26:12Z
HIGH
7.5
{'CWE-200'}
{'http://www.securityfocus.com/bid/106764', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1296', 'https://github.com/advisories/GHSA-v569-g72v-q434', 'https://lists.apache.org/thread.html/a5b15bc76fbdad2ee40761aacf954a13aeef67e305f86d483f267e8e@%3Cuser.hadoop.apache.org%3E'}
null
GHSA
GHSA-m22m-h4rf-pwq3
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3.
{'CVE-2021-32840'}
2022-02-08T19:45:31Z
2022-02-01T16:22:50Z
HIGH
7.3
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32840', 'https://github.com/advisories/GHSA-m22m-h4rf-pwq3', 'https://securitylab.github.com/advisories/GHSL-2021-125-sharpziplib/', 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3', 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'}
null
GHSA
GHSA-p82g-2xpp-m5r3
Cross-Site Scripting in dojo
Versions of `dojo` prior to 1.2.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize HTML code in user-controlled input, allowing attackers to execute arbitrary JavaScript in the victim's browser. ## Recommendation Upgrade to version 1.2.0 or later.
{'CVE-2015-5654'}
2021-09-28T16:55:58Z
2020-09-11T21:18:05Z
MODERATE
5.4
{'CWE-79'}
{'http://www-01.ibm.com/support/docview.wss?uid=swg21975256', 'https://www.npmjs.com/advisories/973', 'http://jvn.jp/en/jp/JVN13456571/index.html', 'http://www.securitytracker.com/id/1034848', 'https://snyk.io/vuln/SNYK-JS-DOJO-174933', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5654', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000153', 'https://github.com/advisories/GHSA-p82g-2xpp-m5r3', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5654', 'http://www.securityfocus.com/bid/77026'}
null
GHSA
GHSA-4gp3-p7ph-x2jr
OS Command Injection in devcert-sanscache
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
{'CVE-2019-10778'}
2021-08-23T15:12:52Z
2020-04-14T23:09:00Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-4gp3-p7ph-x2jr', 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926', 'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778'}
null
GHSA
GHSA-hvpr-9cr6-q5v7
High severity vulnerability that affects org.apache.camel:camel-snakeyaml
Apache Camel's camel-snakeyaml component is vulnerable to Java object de-serialization vulnerability. De-serializing untrusted data can lead to security flaws.
{'CVE-2017-3159'}
2021-09-14T17:30:28Z
2018-10-16T17:21:42Z
HIGH
9.8
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2017:0868', 'http://camel.apache.org/security-advisories.data/CVE-2017-3159.txt.asc?version=1&modificationDate=1486565167000&api=v2', 'http://www.openwall.com/lists/oss-security/2017/05/22/2', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3159', 'http://www.securityfocus.com/bid/96321', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-hvpr-9cr6-q5v7', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-33wf-4crm-2322
Improper Access Control in librenms
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0580'}
2022-02-24T12:12:44Z
2022-02-16T00:01:58Z
HIGH
7.1
{'CWE-284'}
{'https://github.com/advisories/GHSA-33wf-4crm-2322', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d264e3'}
null
GHSA
GHSA-7hjp-97g3-rq93
Moderate severity vulnerability that affects net.mingsoft:ms-mcms
An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter.
{'CVE-2018-18831'}
2021-09-03T19:20:00Z
2018-11-01T14:47:04Z
HIGH
7.5
{'CWE-22'}
{'https://gitee.com/mingSoft/MCMS/issues/IO0K0', 'https://github.com/advisories/GHSA-7hjp-97g3-rq93', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'}
null
GHSA
GHSA-3h5r-928v-mxhh
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message. - https://vaadin.com/security/cve-2018-25007
null
2021-10-08T21:24:02Z
2021-04-19T14:49:13Z
LOW
2.6
{'CWE-754'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh', 'https://vaadin.com/security/cve-2018-25007', 'https://github.com/advisories/GHSA-3h5r-928v-mxhh'}
null
GHSA
GHSA-3mpr-hq3p-49h9
Prototype Pollution in mixin-deep
Versions of `mixin-deep` before 1.3.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 1.3.1 or later.
{'CVE-2018-3719'}
2021-01-08T20:00:26Z
2018-07-26T15:10:54Z
LOW
0
{'CWE-471'}
{'https://hackerone.com/reports/311236', 'https://www.npmjs.com/advisories/578', 'https://github.com/advisories/GHSA-3mpr-hq3p-49h9', 'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3719'}
null
GHSA
GHSA-wph3-44rj-92pr
Multiple vulnerabilities leading to RCE
### Impact We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration. ### Patches The issues were addressed in our last release, 2.1.59. ### Workarounds If you can't update to 2.1.59, make sure your connector is not exposed without authentication. ### Reference Further technical details will be disclosed on https://blog.sonarsource.com/tag/security after some time. ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research@sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-32682'}
2022-04-19T19:02:59Z
2021-06-16T17:04:29Z
CRITICAL
9.8
{'CWE-918', 'CWE-22', 'CWE-78'}
{'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr', 'https://github.com/advisories/GHSA-wph3-44rj-92pr', 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682'}
null
GHSA
GHSA-636j-7x7r-gvw2
Old sessions not blocked by login enable function in Snipe-IT
Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions console command, clearing the contents of the storage/framework/sessions directory, or changing the cookie name, but all of those options logout ALL users, which could be kind of annoying. This issue is fixed in versions 6.0.0-RC-6 and 5.4.2.
{'CVE-2022-1155'}
2022-04-13T13:28:22Z
2022-03-31T00:00:22Z
HIGH
7.4
{'CWE-613'}
{'https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155', 'https://github.com/advisories/GHSA-636j-7x7r-gvw2', 'https://github.com/snipe/snipe-it/releases/tag/v6.0.0-RC-6', 'https://github.com/snipe/snipe-it/pull/10876', 'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d', 'https://github.com/snipe/snipe-it/releases/tag/v5.4.2'}
null
GHSA
GHSA-ww4j-c2rq-47q8
Command injection in ts-process-promises
This affects all versions of package ts-process-promises. The injection point is located in line 45 in main entry of package in lib/process-promises.js.
{'CVE-2020-7784'}
2021-01-20T19:19:17Z
2021-01-13T18:22:28Z
CRITICAL
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7784', 'https://github.com/advisories/GHSA-ww4j-c2rq-47q8', 'https://snyk.io/vuln/SNYK-JS-TSPROCESSPROMISES-1048334'}
null
GHSA
GHSA-ww4x-rwq6-qpgf
Cross-site Request Forgery in OmniAuth
The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account. There is currently no fixed version of this package, however there is a recommended remediation described [here](https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284).
{'CVE-2015-9284'}
2020-11-11T00:31:47Z
2019-05-29T19:11:31Z
HIGH
0
{'CWE-352'}
{'https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284', 'https://www.openwall.com/lists/oss-security/2015/05/26/11', 'https://github.com/omniauth/omniauth/pull/809', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284', 'https://github.com/advisories/GHSA-ww4x-rwq6-qpgf', 'https://github.com/omniauth/omniauth-rails/pull/1'}
null
GHSA
GHSA-xx68-jfcg-xmmf
High severity vulnerability that affects commons-fileupload:commons-fileupload
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
{'CVE-2014-0050'}
2021-07-19T16:42:07Z
2018-12-21T17:51:42Z
HIGH
0
{'CWE-20'}
{'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755', 'http://tomcat.apache.org/security-7.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676410', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676092', 'http://www-01.ibm.com/support/docview.wss?uid=swg21681214', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:084', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677724', 'http://secunia.com/advisories/59187', 'http://www.ubuntu.com/usn/USN-2130-1', 'http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html', 'http://rhn.redhat.com/errata/RHSA-2014-0253.html', 'http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm', 'http://www.securityfocus.com/archive/1/534161/100/0/threaded', 'http://secunia.com/advisories/57915', 'http://secunia.com/advisories/60753', 'http://www.vmware.com/security/advisories/VMSA-2014-0007.html', 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html', 'http://secunia.com/advisories/59399', 'http://svn.apache.org/r1565143', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676403', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050', 'http://secunia.com/advisories/58976', 'http://secunia.com/advisories/59039', 'http://secunia.com/advisories/59041', 'http://jvn.jp/en/jp/JVN14876762/index.html', 'https://github.com/advisories/GHSA-xx68-jfcg-xmmf', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676405', 'http://secunia.com/advisories/60475', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html', 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html', 'http://secunia.com/advisories/59500', 'http://www.securityfocus.com/bid/65400', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677691', 'http://www.debian.org/security/2014/dsa-2856', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676401', 'http://secunia.com/advisories/59725', 'http://secunia.com/advisories/59185', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://rhn.redhat.com/errata/RHSA-2014-0252.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html', 'http://marc.info/?l=bugtraq&m=143136844732487&w=2', 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017', 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html', 'http://secunia.com/advisories/59232', 'http://secunia.com/advisories/59492', 'http://secunia.com/advisories/58075', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675432', 'http://www.securityfocus.com/archive/1/532549/100/0/threaded', 'http://secunia.com/advisories/59183', 'http://secunia.com/advisories/59184', 'http://seclists.org/fulldisclosure/2014/Dec/23', 'http://tomcat.apache.org/security-8.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21669554', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676656', 'http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html', 'http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html', 'http://rhn.redhat.com/errata/RHSA-2014-0400.html', 'http://advisories.mageia.org/MGASA-2014-0110.html', 'http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337', 'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676853'}
null
GHSA
GHSA-4x25-f45x-grv5
Missing encryption in Apache Directory Studio
While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions.
{'CVE-2021-33900'}
2021-08-10T16:54:25Z
2021-08-09T20:40:53Z
HIGH
7.5
{'CWE-311'}
{'https://github.com/advisories/GHSA-4x25-f45x-grv5', 'https://lists.apache.org/thread.html/rb1dbcc43a5b406e45d335343a1704f4233de613140a01929d102fdc9%40%3Cusers.directory.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33900'}
null
GHSA
GHSA-5pv8-ppvj-4h68
Prevent user enumeration using Guard or the new Authenticator-based Security
Description ----------- The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authenticating a non-existing user. Resolution ---------- We now ensure that 403s are returned whether the user exists or not if the password is invalid or if the user does not exist. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011) for branch 3.4. Credits ------- I would like to thank James Isaac and Mathias Brodala for reporting the issue and Robin Chalas for fixing the issue.
{'CVE-2021-21424'}
2022-04-19T19:02:57Z
2021-05-13T20:23:02Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-5pv8-ppvj-4h68', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH7TMM5CHQYBFFGXWRPJDPB3SKCZXI2M/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UC7BND775DVZDQT3RMGD2HVB2PKLJDJW/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KENRNLB3FYXYGDWRBH2PDBOZZKOD7VY4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRUS2H2SSOQWNLBD35SKIWIDQEMV2PD3/', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21424', 'https://github.com/advisories/GHSA-5pv8-ppvj-4h68'}
null
GHSA
GHSA-7vq3-wcjw-3fxh
Directory Traversal in lab6.brit95
Affected versions of `lab6.brit95` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16140'}
2021-01-08T19:14:09Z
2018-07-23T20:48:53Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/475', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lab6.brit95', 'https://github.com/advisories/GHSA-7vq3-wcjw-3fxh', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16140', 'https://nodesecurity.io/advisories/475'}
null
GHSA
GHSA-4v37-24gm-h554
Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4
### Impact This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism. ### Patches Upgrade to v4.1.9 or later. ### Workarounds These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**. Otherwise, the CSRF protection may be bypassed. #### When Auto-Routing is Enabled 1. Check the request method in the controller method before processing. E.g.: ```php if (strtolower($this->request->getMethod()) !== 'post') { return $this->response->setStatusCode(405)->setBody('Method Not Allowed'); } ``` #### When Auto-Routing is Disabled Do one of the following: 1. Do not use `$routes->add()`, and [use HTTP verbs in routes](https://codeigniter4.github.io/userguide/incoming/routing.html#using-http-verbs-in-routes). 2. Check the request method in the controller method before processing. E.g.: ```php if (strtolower($this->request->getMethod()) !== 'post') { return $this->response->setStatusCode(405)->setBody('Method Not Allowed'); } ``` ### References - [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html#cross-site-request-forgery-csrf) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-24712'}
2022-03-01T22:50:08Z
2022-03-01T21:47:28Z
MODERATE
6.3
{'CWE-352'}
{'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_src/source/changelogs/v4.1.9.rst', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554', 'https://github.com/advisories/GHSA-4v37-24gm-h554', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712'}
null
GHSA
GHSA-83rx-c8cr-6j8q
Insecure Default Configuration in tesseract.js
Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations. ## Recommendation Upgrade to version 1.0.19 or later.
null
2021-08-04T21:33:59Z
2019-06-05T20:48:55Z
MODERATE
5.9
{'CWE-829'}
{'https://github.com/naptha/tesseract.js/pull/267', 'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28', 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085', 'https://www.npmjs.com/advisories/792', 'https://github.com/advisories/GHSA-83rx-c8cr-6j8q'}
null
GHSA
GHSA-27j5-4p9v-pp67
`std::abort` raised from `TensorListReserve`
### Impact Providing a negative element to `num_elements` list argument of `tf.raw_ops.TensorListReserve` causes the runtime to abort the process due to reallocating a `std::vector` to have a negative number of elements: ```python import tensorflow as tf tf.raw_ops.TensorListReserve( element_shape = tf.constant([1]), num_elements=tf.constant([-1]), element_dtype = tf.int32) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/list_kernels.cc#L312) calls `std::vector.resize()` with the new size controlled by input given by the user, without checking that this input is valid. ### Patches We have patched the issue in GitHub commit [8a6e874437670045e6c7dc6154c7412b4a2135e2](https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37644'}
2021-08-25T14:43:40Z
2021-08-25T14:43:40Z
MODERATE
5.5
{'CWE-617'}
{'https://github.com/advisories/GHSA-27j5-4p9v-pp67', 'https://github.com/tensorflow/tensorflow/commit/8a6e874437670045e6c7dc6154c7412b4a2135e2', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27j5-4p9v-pp67', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37644'}
null
GHSA
GHSA-37cf-r3w2-gjfw
django-nopassword stores secrets in cleartext
django-nopassword before 5.0.0 stores cleartext secrets in the database.
{'CVE-2019-10682'}
2021-07-28T21:27:01Z
2020-06-05T16:09:19Z
HIGH
7.5
{'CWE-312', 'CWE-522'}
{'https://github.com/relekang/django-nopassword/compare/v4.0.1...v5.0.0', 'https://github.com/relekang/django-nopassword/blob/8e8cfc765ee00adfed120c2c79bf71ef856e9022/nopassword/models.py#L14', 'https://github.com/advisories/GHSA-37cf-r3w2-gjfw', 'https://github.com/relekang/django-nopassword/commit/d8b4615f5fbfe3997d96cf4cb3e342406396193c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10682'}
null
GHSA
GHSA-rjqq-98f6-6j3r
Improper Input Validation in sanitize-html
Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
{'CVE-2021-26539'}
2022-04-27T19:14:13Z
2021-05-06T16:10:05Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/apostrophecms/sanitize-html/pull/458', 'https://advisory.checkmarx.net/advisory/CX-2021-4308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26539', 'https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22', 'https://github.com/advisories/GHSA-rjqq-98f6-6j3r'}
null
GHSA
GHSA-g2c4-4m64-vxm3
Malicious Package in buffer-yor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:25:12Z
2020-09-03T22:15:25Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1254', 'https://github.com/advisories/GHSA-g2c4-4m64-vxm3'}
null
GHSA
GHSA-pfj7-w373-gqch
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3900'}
2021-10-29T13:49:08Z
2021-10-28T23:14:21Z
MODERATE
6.5
{'CWE-352'}
{'https://github.com/advisories/GHSA-pfj7-w373-gqch', 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635', 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900'}
null
GHSA
GHSA-p2q9-9cq6-h3jw
Out of bounds read in Ozone
An issue was discovered in the ozone crate through 2020-07-04 for Rust. Memory safety is violated because of out-of-bounds access.
{'CVE-2020-35877'}
2021-08-25T20:47:46Z
2021-08-25T20:47:46Z
CRITICAL
9.8
{'CWE-119'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35877', 'https://github.com/advisories/GHSA-p2q9-9cq6-h3jw'}
null
GHSA
GHSA-8wx2-9q48-vm9r
RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
{'CVE-2020-5398'}
2021-10-21T21:15:16Z
2020-01-21T20:59:09Z
HIGH
7.5
{'CWE-79', 'CWE-494'}
{'https://lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210917-0006/', 'https://lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://github.com/advisories/GHSA-8wx2-9q48-vm9r', 'https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3E', 'https://pivotal.io/security/cve-2020-5398', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5398', 'https://lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-c27r-x354-4m68
HMAC-SHA1 signatures can bypass validation via key confusion
### Impact An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation. ### Patches Version 2.0.0 has the fix. ### Workarounds The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xmldsig#hmac-sha1' entry from SignedXml.SignatureAlgorithms.
null
2022-04-19T19:02:39Z
2020-10-27T20:39:46Z
HIGH
0
{'CWE-287'}
{'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68', 'https://github.com/advisories/GHSA-c27r-x354-4m68', 'https://www.npmjs.com/package/xml-crypto', 'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'}
null
GHSA
GHSA-8fqx-7pv4-3jwm
Moderate severity vulnerability that affects rails
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
{'CVE-2008-7248'}
2021-09-07T17:26:14Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-20'}
{'http://www.openwall.com/lists/oss-security/2009/11/28/1', 'http://www.vupen.com/english/advisories/2009/2544', 'http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en', 'http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html', 'https://github.com/advisories/GHSA-8fqx-7pv4-3jwm', 'http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html', 'http://secunia.com/advisories/36600', 'http://www.openwall.com/lists/oss-security/2009/12/02/2', 'http://secunia.com/advisories/38915', 'http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/', 'https://nvd.nist.gov/vuln/detail/CVE-2008-7248', 'http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1'}
null
GHSA
GHSA-wrx7-qgmj-mf2q
Server-Side Request Forgery in Apache Kylin
All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.
{'CVE-2021-27738'}
2022-01-08T00:43:04Z
2022-01-08T00:43:04Z
MODERATE
0
{'CWE-918'}
{'http://www.openwall.com/lists/oss-security/2022/01/06/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27738', 'https://github.com/advisories/GHSA-wrx7-qgmj-mf2q', 'https://github.com/apache/kylin/pull/1646', 'https://lists.apache.org/thread/vkohh0to2vzwymyb2x13fszs3cs3vd70'}
null
GHSA
GHSA-9fcp-vcq9-9h2h
Moderate severity vulnerability that affects org.craftercms:crafter-studio
A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page.
{'CVE-2018-19907'}
2021-09-07T21:26:46Z
2018-12-19T19:24:18Z
HIGH
8.8
{'CWE-78'}
{'https://github.com/advisories/GHSA-9fcp-vcq9-9h2h', 'https://github.com/craftercms/craftercms/issues/2677', 'https://medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19907'}
null
GHSA
GHSA-qmxf-fxq7-w59f
Malicious Package in angular-material-sidenav-rnd
Version 0.1.1 of `angular-material-sidenav-rnd` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.1.1 of this module is found installed you will want to replace it with a version before or after 0.1.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:46:01Z
2020-09-01T19:43:53Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/sovanna/angular-material-sidenav', 'https://snyk.io/vuln/SNYK-JS-ANGULARMATERIALSIDENAVRND-451015', 'https://github.com/advisories/GHSA-qmxf-fxq7-w59f', 'https://github.com/musabgosset/angular-material-sidenav', 'https://www.npmjs.com/advisories/615'}
null
GHSA
GHSA-x92h-wmg2-6hp7
Invalid HTTP method overrides allow possible XSS or other attacks in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.
{'CVE-2019-10913'}
2021-08-19T15:18:28Z
2019-12-02T18:10:24Z
CRITICAL
9.8
{'CWE-89', 'CWE-79'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml', 'https://github.com/advisories/GHSA-x92h-wmg2-6hp7', 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides', 'https://symfony.com/cve-2019-10913', 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'}
null
GHSA
GHSA-2f5v-8r3f-8pww
Improper access control allows admin privilege escalation in Argo CD
### Impact #### Impacts for versions starting with v1.0.0 All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. To perform the following exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repository or `sync` _and_ `override` access to an Application. Once a user has that access, different exploitation levels are possible depending on their other RBAC privileges: 1. If that user has `update` access to the Application, they can modify any resource on the Application's destination cluster. If the destination cluster is or can be made to be the same as the cluster hosting Argo CD, the user can escalate their Argo CD permissions to admin-level. 2. If the user has `delete` access to the Application, they can delete any resource on the Application's destination cluster. (This exploit is possible starting with v0.8.0.) 3. If the user has `get` access to the Application, they can view any resource on the Application's destination cluster (except for the contents of Secrets) and list [actions](https://argo-cd.readthedocs.io/en/stable/operator-manual/resource_actions/) available for that resource. 4. If the user has `get` access to the Application, they can view the logs of any Pods on the Application's destination cluster. 5. If the user has `action/{some action or *}` access on the Application, they can run an action for any resource (which supports the allowed action(s)) on the Application's destination cluster. (Some actions are available in Argo CD by default, and others may be configured by an Argo CD admin.) See the [Argo CD RBAC documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#rbac-resources-and-actions) for an explanation of the privileges available in Argo CD. ##### Events exploit A related exploit is possible for a user with `get` access to an Application **even if they do not have access to the Application's source git or Helm repository or `sync` and `override` access to the Application**. The user can access any Event in the Application's destination cluster if they know the involved object's name, UID, and namespace. #### Impacts for versions starting with v0.8.0 The same bug exists starting with v0.8.0, but only the following exploits were possible before v1.0.0: * The `delete` exploit (#⁠2 above). * The logs exploit (#⁠4 above). * The Events exploit described above. #### Impacts for versions starting with v0.5.0 The same bug exists starting with v0.5.0 (when RBAC was implemented), but only the Events exploit described above was possible before v0.8.0. ### Patches A patch for this vulnerability has been released in the following Argo CD versions: * v2.3.2 * v2.2.8 * v2.1.14 **Versions 2.0.x and earlier users:** See the [changelog](https://github.com/argoproj/argo-cd/blob/master/CHANGELOG.md) for links to upgrade instructions for your version. It is imperative to upgrade quickly, but some limited mitigations are described in the next section. **argo-helm chart users:** Argo CD users deploying v2.3.x with [argo-helm](https://github.com/argoproj/argo-helm) can upgrade the chart to version 4.2.2. Argo CD 2.2 and 2.1 users can set the `global.image.tag` value to the latest in your current release series (`v2.2.8`, or `v2.1.14`). Since charts for the 2.2 and 2.1 series are no longer maintained, you will need to either leave the value override in place or upgrade to the 4.x chart series (and therefore to Argo CD 2.3). ### Workarounds The only certain way to avoid the vulnerability is to upgrade. #### Mitigations * To avoid privilege escalation: * Limit who has push access to Application source repositories or `sync` + `override` access to Applications. * Limit which repositories are available in [projects](https://argo-cd.readthedocs.io/en/stable/user-guide/projects/) where users have `update` access to Applications. * To avoid unauthorized resource inspection/tampering: * Limit who has `delete`, `get`, or `action` access to Applications. These mitigations can help limit potential damage, but they are _not_ a substitute for upgrading. It is necessary to upgrade immediately. ### References * [Argo CD RBAC configuration documentation](https://argo-cd.readthedocs.io/en/stable/operator-manual/rbac/#) ### For more information Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions) Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel #argo-cd
{'CVE-2022-24768'}
2022-04-04T20:40:45Z
2022-03-24T00:18:54Z
CRITICAL
9.9
{'CWE-200', 'CWE-269'}
{'https://github.com/argoproj/argo-cd/releases/tag/v2.1.14', 'https://github.com/argoproj/argo-cd/releases/tag/v2.2.8', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww', 'https://github.com/argoproj/argo-cd/releases/tag/v2.3.2', 'https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf', 'https://github.com/advisories/GHSA-2f5v-8r3f-8pww', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24768'}
null
GHSA
GHSA-jrmq-rv9w-63rv
Umbraco ApplicationURL Overwrite
Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites users to the site. For Umbraco versions less than 9.2.0, if the Application URL is not specifically configured, the attacker can manipulate this value and store it persistently affecting all users for components where the "UmbracoApplicationUrl" is used. For example, the attacker is able to change the URL users receive when resetting their password so that it points to the attackers server, when the user follows this link the reset token can be intercepted by the attacker resulting in account takeover.
{'CVE-2022-22690'}
2022-01-27T18:25:58Z
2022-01-21T23:34:24Z
HIGH
8.6
{'CWE-444'}
{'https://github.com/advisories/GHSA-jrmq-rv9w-63rv', 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22690'}
null
GHSA
GHSA-27rq-4943-qcwp
Insertion of Sensitive Information into Log File in Hashicorp go-getter
The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile.
{'CVE-2022-29810'}
2022-05-03T20:19:27Z
2022-04-28T00:00:35Z
MODERATE
0
{'CWE-532'}
{'https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc', 'https://github.com/hashicorp/go-getter/releases/tag/v1.5.11', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29810', 'https://github.com/advisories/GHSA-27rq-4943-qcwp', 'https://github.com/hashicorp/go-getter/pull/348'}
null
GHSA
GHSA-2467-h365-j7hm
Improper Input Validation in Apache Solr
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access.
{'CVE-2020-13941'}
2022-02-10T00:31:31Z
2022-02-10T00:31:31Z
MODERATE
8.8
{'CWE-20'}
{'https://github.com/advisories/GHSA-2467-h365-j7hm', 'https://lists.apache.org/thread.html/rbcd9dff009ed19ffcc2b09784595fc1098fc802a5472f81795f893be@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13941', 'https://lists.apache.org/thread.html/rf54e7912b7d2b72c63ec54a7afa4adcbf16268dcc63253767dd67d60%40%3Cgeneral.lucene.apache.org%3E'}
null
GHSA
GHSA-h3cq-j957-vhxg
Cross-site Scripting in fullpage.js
using fullpage.js you can create a anchor tag . But when put href in anchor then it does not sanitize the url which allow for a break in the context of anchor element and can add our new element.
{'CVE-2022-1330'}
2022-04-22T20:26:50Z
2022-04-13T00:00:16Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/08d2a6d0-772f-4b05-834e-86343f263c35', 'https://github.com/advisories/GHSA-h3cq-j957-vhxg', 'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1330', 'https://github.com/alvarotrigo/fullPage.js/pull/4360'}
null
GHSA
GHSA-724c-6vrf-99rq
Sensitive Data Exposure in loopback
Versions of `loopback` prior to 3.26.0 (3.x) and 2.42.0 (2.x) are vulnerable to Sensitive Data Exposure. Invalid API requests to the login endpoint may return information about the first user in the database. This can be used alongside other attacks for credential theft. ## Recommendation If you're using `loopback` 3.x upgrade to version 3.26.0 or later. If you're using `loopback` 2.x upgrade to version 2.42.0 or later.
null
2021-09-27T22:31:27Z
2020-09-02T21:49:48Z
LOW
0
{'CWE-200'}
{'https://github.com/strongloop/loopback/issues/4195', 'https://www.npmjs.com/advisories/915', 'https://github.com/advisories/GHSA-724c-6vrf-99rq', 'https://loopback.io/doc/en/sec/Security-advisory-06-17-2019.html'}
null
GHSA
GHSA-x6ch-c6rv-f7wh
Malicious Package in asymc
All versions of `asymc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:46:50Z
2020-09-02T18:34:22Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/841', 'https://github.com/advisories/GHSA-x6ch-c6rv-f7wh'}
null
GHSA
GHSA-4pf7-579w-f4gm
Downloads Resources over HTTP in dwebp-bin
Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10633'}
2021-09-16T20:55:10Z
2019-02-18T23:57:04Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10633', 'https://www.npmjs.com/advisories/232', 'https://nodesecurity.io/advisories/232', 'https://github.com/advisories/GHSA-4pf7-579w-f4gm'}
null
GHSA
GHSA-f268-65qc-98vg
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
{'CVE-2020-13943'}
2022-02-09T23:04:16Z
2022-02-09T23:03:53Z
MODERATE
4.3
{'CWE-200'}
{'https://www.debian.org/security/2021/dsa-4835', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html', 'https://lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20201016-0007/', 'https://github.com/advisories/GHSA-f268-65qc-98vg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13943', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
GHSA
GHSA-c57f-4vp2-jqhm
Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19
Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. - https://vaadin.com/security/cve-2021-31411
null
2021-10-05T16:29:36Z
2021-05-06T15:27:04Z
MODERATE
6.3
{'CWE-379'}
{'https://github.com/vaadin/flow/security/advisories/GHSA-c57f-4vp2-jqhm', 'https://github.com/advisories/GHSA-c57f-4vp2-jqhm'}
null
GHSA
GHSA-mh7g-99w9-xpjm
Remote code execution occurs in Apache Solr
Remote code execution occurs in Apache Solr before versions 5.5.5, 6.6.2 and 7.1.0 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr
{'CVE-2017-12629'}
2022-04-27T15:06:44Z
2018-10-17T19:56:17Z
CRITICAL
9.8
{'CWE-611'}
{'https://access.redhat.com/errata/RHSA-2017:3452', 'https://s.apache.org/FJDl', 'https://access.redhat.com/errata/RHSA-2018:0004', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html', 'https://github.com/advisories/GHSA-mh7g-99w9-xpjm', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0005', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E', 'https://access.redhat.com/errata/RHSA-2018:0003', 'https://www.debian.org/security/2018/dsa-4124', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://access.redhat.com/errata/RHSA-2017:3123', 'https://access.redhat.com/errata/RHSA-2017:3451', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://www.exploit-db.com/exploits/43009/', 'https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0002', 'https://access.redhat.com/errata/RHSA-2017:3124', 'http://www.securityfocus.com/bid/101261', 'https://twitter.com/ApacheSolr/status/918731485611401216', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12629', 'https://twitter.com/searchtools_avi/status/918904813613543424', 'https://twitter.com/joshbressers/status/919258716297420802', 'http://openwall.com/lists/oss-security/2017/10/13/1', 'https://usn.ubuntu.com/4259-1/'}
null
GHSA
GHSA-wpvm-wqr4-p7cw
Inclusion of Functionality from Untrusted Control Sphere in CKEditor 4
It was possible to execute a ReDoS-type attack inside CKEditor 4 before 4.16 by persuading a victim to paste crafted URL-like text into the editor, and then press Enter or Space (in the Autolink plugin).
{'CVE-2021-26272'}
2022-02-08T21:39:05Z
2021-10-13T15:34:09Z
MODERATE
6.5
{'CWE-829'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26272', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-wpvm-wqr4-p7cw', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-416', 'https://ckeditor.com/blog/CKEditor-4.16-with-improved-image-pasting-High-Contrast-support-and-a-new-color-API/#security-comes-first', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-xpwp-rq3x-x6v7
Critical severity vulnerability that affects recurly-api-client
The Recurly Client .NET Library before 1.0.1, 1.1.10, 1.2.8, 1.3.2, 1.4.14, 1.5.3, 1.6.2, 1.7.1, 1.8.1 is vulnerable to a Server-Side Request Forgery vulnerability due to incorrect use of "Uri.EscapeUriString" that could result in compromise of API keys or other critical resources.
{'CVE-2017-0907'}
2021-01-08T00:00:08Z
2018-10-16T17:35:04Z
CRITICAL
0
{'CWE-918'}
{'https://github.com/advisories/GHSA-xpwp-rq3x-x6v7', 'https://github.com/recurly/recurly-client-net/commit/9eef460c0084afd5c24d66220c8b7a381cf9a1f1', 'https://hackerone.com/reports/288635', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0907', 'https://dev.recurly.com/page/net-updates'}
null
GHSA
GHSA-93q8-gq69-wqmw
Inefficient Regular Expression Complexity in chalk/ansi-regex
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3807'}
2022-05-02T21:01:45Z
2021-09-20T20:20:09Z
HIGH
7.5
{'CWE-1333'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-93q8-gq69-wqmw', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311', 'https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994', 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3807', 'https://app.snyk.io/vuln/SNYK-JS-ANSIREGEX-1583908', 'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'}
null
GHSA
GHSA-v3cg-h3f6-2242
Injection in MockServer
MockServer is open source software which enables easy mocking of any system you integrate with via HTTP or HTTPS. An attacker that can trick a victim into visiting a malicious site while running MockServer locally, will be able to run arbitrary code on the MockServer machine. With an overly broad default CORS configuration MockServer allows any site to send cross-site requests. Additionally, MockServer allows you to create dynamic expectations using Javascript or Velocity templates. Both engines may allow an attacker to execute arbitrary code on-behalf of MockServer. By combining these two issues (Overly broad CORS configuration + Script injection), an attacker could serve a malicious page so that if a developer running MockServer visits it, they will get compromised. For more details including a PoC see the referenced GHSL-2021-059.
{'CVE-2021-32827'}
2022-02-08T21:01:18Z
2021-08-30T16:24:38Z
MODERATE
6.1
{'CWE-74'}
{'https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/', 'https://github.com/advisories/GHSA-v3cg-h3f6-2242', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32827', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-rrfq-g5fq-fc9c
Moderate severity vulnerability that affects org.apache.hive:hive-exec
In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.
{'CVE-2018-11777'}
2021-09-17T20:40:09Z
2018-11-21T22:25:04Z
HIGH
8.1
null
{'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777', 'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E', 'http://www.securityfocus.com/bid/105886'}
null
GHSA
GHSA-p45v-v4pw-77jr
Division by 0 in `QuantizedBatchNormWithGlobalNormalization`
### Impact An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.QuantizedBatchNormWithGlobalNormalization`: ```python import tensorflow as tf t = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.quint8) t_min = tf.constant(-10.0, dtype=tf.float32) t_max = tf.constant(-10.0, dtype=tf.float32) m = tf.constant([], shape=[0], dtype=tf.quint8) m_min = tf.constant(-10.0, dtype=tf.float32) m_max = tf.constant(-10.0, dtype=tf.float32) v = tf.constant([], shape=[0], dtype=tf.quint8) v_min = tf.constant(-10.0, dtype=tf.float32) v_max = tf.constant(-10.0, dtype=tf.float32) beta = tf.constant([], shape=[0], dtype=tf.quint8) beta_min = tf.constant(-10.0, dtype=tf.float32) beta_max = tf.constant(-10.0, dtype=tf.float32) gamma = tf.constant([], shape=[0], dtype=tf.quint8) gamma_min = tf.constant(-10.0, dtype=tf.float32) gamma_max = tf.constant(-10.0, dtype=tf.float32) tf.raw_ops.QuantizedBatchNormWithGlobalNormalization( t=t, t_min=t_min, t_max=t_max, m=m, m_min=m_min, m_max=m_max, v=v, v_min=v_min, v_max=v_max, beta=beta, beta_min=beta_min, beta_max=beta_max, gamma=gamma, gamma_min=gamma_min, gamma_max=gamma_max, out_type=tf.qint32, variance_epsilon=0.1, scale_after_normalization=True) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/55a97caa9e99c7f37a0bbbeb414dc55553d3ae7f/tensorflow/core/kernels/quantized_batch_norm_op.cc) does not validate all constraints specified in the [op's contract](https://www.tensorflow.org/api_docs/python/tf/raw_ops/QuantizedBatchNormWithGlobalNormalization). ### Patches We have patched the issue in GitHub commit [d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b](https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team
{'CVE-2021-29548'}
2021-05-21T14:23:34Z
2021-05-21T14:23:34Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-p45v-v4pw-77jr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29548', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p45v-v4pw-77jr', 'https://github.com/tensorflow/tensorflow/commit/d6ed5bcfe1dcab9e85a4d39931bd18d99018e75b'}
null
GHSA
GHSA-r6rj-9ch6-g264
Prototype pollution in Merge-deep
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
{'CVE-2021-26707'}
2021-07-19T15:55:55Z
2021-06-07T22:09:26Z
CRITICAL
9.8
{'CWE-1321'}
{'https://security.netapp.com/advisory/ntap-20210716-0008/', 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/', 'https://www.npmjs.com/package/merge-deep', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26707', 'https://github.com/advisories/GHSA-r6rj-9ch6-g264', 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'}
null
GHSA
GHSA-6qj8-c27w-rp33
Cross-site scripting in Apache Syncome EndUser
It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
{'CVE-2019-17557'}
2022-01-06T19:38:07Z
2022-01-06T19:38:07Z
LOW
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17557', 'http://syncope.apache.org/security', 'https://github.com/advisories/GHSA-6qj8-c27w-rp33'}
null
GHSA
GHSA-6wqp-v4v6-c87c
Deserialization of Untrusted Data
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
{'CVE-2018-12023'}
2021-08-30T14:16:00Z
2020-06-15T18:44:51Z
HIGH
7.5
{'CWE-502'}
{'https://www.debian.org/security/2019/dsa-4452', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2019:3149', 'http://www.securityfocus.com/bid/105659', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/advisories/GHSA-6wqp-v4v6-c87c', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://github.com/FasterXML/jackson-databind/issues/2058', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://access.redhat.com/errata/RHSA-2019:1106'}
null
GHSA
GHSA-c94w-c95p-phf8
Integer overflow in Tensorflow
### Impact The [implementation of `OpLevelCostEstimator::CalculateTensorSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558) is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements: ```cc int64_t OpLevelCostEstimator::CalculateTensorSize( const OpInfo::TensorProperties& tensor, bool* found_unknown_shapes) { int64_t count = CalculateTensorElementCount(tensor, found_unknown_shapes); int size = DataTypeSize(BaseType(tensor.dtype())); VLOG(2) << "Count: " << count << " DataTypeSize: " << size; return count * size; } ``` Here, `count` and `size` can be large enough to cause `count * size` to overflow. ### Patches We have patched the issue in GitHub commit [fcd18ce3101f245b083b30655c27b239dc72221e](https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23575'}
2022-02-11T20:46:29Z
2022-02-10T00:32:59Z
MODERATE
6.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23575', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558', 'https://github.com/advisories/GHSA-c94w-c95p-phf8', 'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'}
null
GHSA
GHSA-34fr-fhqr-7235
Information Disclosure in User Authentication
> ### Meta > * CVSS: `AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9) ### Problem It has been discovered that user credentials have been logged as plaintext when explicitly using log level debug, which is not the _default_ configuration. ### Solution Update to TYPO3 versions 7.6.52 ELTS, 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described. ### Credits Thanks to Ingo Schmitt who reported this issue, and to TYPO3 core & security team member Benni Mack who fixed the issue. ### References * [TYPO3-CORE-SA-2021-012](https://typo3.org/security/advisory/typo3-core-sa-2021-012)
{'CVE-2021-32767'}
2022-04-19T19:03:03Z
2021-07-26T21:16:28Z
MODERATE
5.3
{'CWE-532'}
{'https://typo3.org/security/advisory/typo3-core-sa-2021-013', 'https://typo3.org/security/advisory/typo3-core-sa-2021-012', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235', 'https://github.com/advisories/GHSA-34fr-fhqr-7235', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32767', 'https://github.com/TYPO3/typo3/security/advisories/GHSA-34fr-fhqr-7235'}
null
GHSA
GHSA-cmgw-8vpc-rc59
Segfault on strings tensors with mistmatched dimensions, due to Go code
### Impact Under certain conditions, Go code can trigger a segfault in string deallocation. For string tensors, `C.TF_TString_Dealloc` is called during garbage collection within a finalizer function. However, tensor structure isn't checked until encoding to avoid a performance penalty. The current method for dealloc assumes that encoding succeeded, but segfaults when a string tensor is garbage collected whose encoding failed (e.g., due to mismatched dimensions). To fix this, the call to set the finalizer function is deferred until `NewTensor` returns and, if encoding failed for a string tensor, deallocs are determined based on bytes written. ### Patches We have patched the issue in GitHub commit [8721ba96e5760c229217b594f6d2ba332beedf22](https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22) (merging [#50508](https://github.com/tensorflow/tensorflow/pull/50508)). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, which is the other affected version. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [fixing PR](https://github.com/tensorflow/tensorflow/pull/50508).
{'CVE-2021-37692'}
2021-08-25T14:38:57Z
2021-08-25T14:38:57Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-cmgw-8vpc-rc59', 'https://github.com/tensorflow/tensorflow/pull/50508', 'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37692'}
null
GHSA
GHSA-c4qp-h3m6-785f
Downloads Resources over HTTP in ibm_db
Affected versions of `ibm_db` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2016-10577'}
2021-01-08T19:01:23Z
2019-02-18T23:51:59Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/163', 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94', 'https://www.npmjs.com/advisories/163', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577', 'https://github.com/advisories/GHSA-c4qp-h3m6-785f'}
null
GHSA
GHSA-5wqj-f379-6jh4
Command injection in kill-process-on-port
All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.
{'CVE-2020-28426'}
2021-03-19T21:19:47Z
2021-03-19T21:19:47Z
HIGH
7.3
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28426', 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458', 'https://github.com/advisories/GHSA-5wqj-f379-6jh4'}
null
GHSA
GHSA-wmpm-fq7r-jq56
Imporoper path validation in elFinder.NetCore
This affects all versions of package elFinder.NetCore. The ExtractAsync function within the FileSystem is vulnerable to arbitrary extraction due to insufficient validation.
{'CVE-2021-23427'}
2021-09-10T17:10:39Z
2021-09-02T22:05:17Z
HIGH
8.6
{'CWE-20'}
{'https://github.com/advisories/GHSA-wmpm-fq7r-jq56', 'https://snyk.io/vuln/SNYK-DOTNET-ELFINDERNETCORE-1567778', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs#L226', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23427', 'https://github.com/gordon-matt/elFinder.NetCore/blob/633da9a4d7d5c9baefd1730ee51bf7af54889600/elFinder.NetCore/Drivers/FileSystem/FileSystemDriver.cs%23L226'}
null
GHSA
GHSA-9h63-7qf6-mv6r
Improper Authorization in github.com/containers/libpod
A flaw was found in podman before 1.7.0. File permissions for non-root users running in a privileged container are not correctly checked. This flaw can be abused by a low-privileged user inside the container to access any other file in the container, even if owned by the root user inside the container. It does not allow to directly escape the container, though being a privileged container means that a lot of security features are disabled when running the container. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20188'}
2021-05-18T18:33:12Z
2021-05-18T18:33:12Z
HIGH
7
{'CWE-863'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1915734', 'https://github.com/containers/podman/commit/c8bd4746151e6ae37d49c4688f2f64e03db429fc', 'https://github.com/containers/podman/commit/dcf3c742b1ac4d641d66810113f3d17441a412f4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20188', 'https://github.com/advisories/GHSA-9h63-7qf6-mv6r', 'https://github.com/containers/podman/commit/2c7b579fe7328dc6db48bdaf60d0ddd9136b1e24'}
null
GHSA
GHSA-8q64-wrfr-q48c
Data races in model
`Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type. This allows safe Rust code to trigger a data race, which is undefined behavior in Rust. Users are advised to treat `Shared` as an unsafe type. It should not be used outside of the testing context, and care must be taken so that the testing code does not have a data race besides a race condition that is expected to be caught by the test. Check [the Rustonomicon](https://doc.rust-lang.org/nomicon/races.html) for the difference between a data race and a general race condition.
null
2021-08-25T20:59:24Z
2021-08-25T20:59:24Z
MODERATE
0
{'CWE-362'}
{'https://github.com/spacejam/model/issues/3', 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html', 'https://github.com/advisories/GHSA-8q64-wrfr-q48c'}
null
GHSA
GHSA-qx3f-p745-w4hr
Integer overflow in Tensorflow
### Impact The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. ### Patches We have patched the issue in GitHub commit [f0147751fd5d2ff23251149ebad9af9f03010732](https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/52676).
{'CVE-2022-23562'}
2022-02-11T15:07:30Z
2022-02-09T23:54:07Z
HIGH
7.6
{'CWE-190'}
{'https://github.com/advisories/GHSA-qx3f-p745-w4hr', 'https://github.com/tensorflow/tensorflow/pull/51733', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23562', 'https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr', 'https://github.com/tensorflow/tensorflow/issues/52676'}
null
GHSA
GHSA-vxp9-wv2f-wqmw
High severity vulnerability that affects superset
Versions of Superset prior to 0.23 used an unsafe load method from the pickle library to deserialize data leading to possible remote code execution. Note Superset 0.23 was released prior to any Superset release under the Apache Software Foundation.
{'CVE-2018-8021'}
2022-03-23T22:10:14Z
2018-11-09T17:40:56Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/apache/superset/pull/4243', 'https://github.com/advisories/GHSA-vxp9-wv2f-wqmw', 'https://github.com/apache/superset/commit/2c72a7ae4fc0a8bac1f037a79efa90e1c5549710', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8021', 'https://www.exploit-db.com/exploits/45933/'}
null
GHSA
GHSA-m85c-9mf8-m2m6
Critical severity vulnerability that affects confire
An exploitable vulnerability exists in the YAML parsing functionality in config.py in Confire 0.2.0. Due to the user-specific configuration being loaded from "~/.confire.yaml" using the yaml.load function, a YAML parser can execute arbitrary Python commands resulting in command execution. An attacker can insert Python into loaded YAML to trigger this vulnerability.
{'CVE-2017-16763'}
2021-09-15T18:38:46Z
2018-07-18T18:28:26Z
CRITICAL
9.8
null
{'https://github.com/bbengfort/confire/issues/24', 'https://github.com/advisories/GHSA-m85c-9mf8-m2m6', 'https://joel-malwarebenchmark.github.io/blog/2017/11/12/cve-2017-16763-configure-loaded-through-confire/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16763', 'https://github.com/bbengfort/confire/commit/8cc86a5ec2327e070f1d576d61bbaadf861597ea'}
null
GHSA
GHSA-cpf4-wx82-gxp6
Segfault due to negative splits in `SplitV`
### Impact The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/split_v_op.cc#L49-L205) of `SplitV` can trigger a segfault is an attacker supplies negative arguments: ```python import tensorflow as tf tf.raw_ops.SplitV( value=tf.constant([]), size_splits=[-1, -2] ,axis=0, num_split=2) ``` This occurs whenever `size_splits` contains more than one value and at least one value is negative. ### Patches We have patched the issue in GitHub commit [25d622ffc432acc736b14ca3904177579e733cc6](https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41222'}
2021-11-10T18:48:15Z
2021-11-10T18:48:15Z
MODERATE
5.5
{'CWE-682'}
{'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41222', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6', 'https://github.com/advisories/GHSA-cpf4-wx82-gxp6'}
null
GHSA
GHSA-8f93-rv4p-x4jw
SQL Injection in sql
All versions of `sql` are vulnerable to sql injection as it does not properly escape parameters when building SQL queries. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
null
2021-08-04T21:14:40Z
2019-06-12T16:36:52Z
MODERATE
0
{'CWE-89'}
{'https://www.npmjs.com/advisories/662', 'https://github.com/advisories/GHSA-8f93-rv4p-x4jw', 'https://hackerone.com/reports/319465', 'https://nodesecurity.io/advisories/662'}
null
GHSA
GHSA-v6wr-fch2-vm5w
Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
{'CVE-2015-2913'}
2021-09-20T15:49:27Z
2018-10-18T17:41:27Z
MODERATE
5.9
{'CWE-200'}
{'https://github.com/advisories/GHSA-v6wr-fch2-vm5w', 'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913'}
null
GHSA
GHSA-8gv3-3j7f-wg94
Potential Remote Code Execution vulnerability
Packages nette/application versions prior to 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette versions prior to 2.0.19 and 2.1.13 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Reported by Cyku Hong from DEVCORE (https://devco.re) ### Impact Code injection, possible remote code execution. ### Patches Fixed in nette/application 2.2.10, 2.3.14, 2.4.16, 3.0.6 and nette/nette 2.0.19 and 2.1.13
{'CVE-2020-15227'}
2021-11-19T15:12:41Z
2020-10-02T16:22:19Z
HIGH
8.7
{'CWE-94', 'CWE-74'}
{'https://github.com/advisories/GHSA-8gv3-3j7f-wg94', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00003.html', 'https://github.com/nette/application/security/advisories/GHSA-8gv3-3j7f-wg94', 'https://packagist.org/packages/nette/application', 'https://packagist.org/packages/nette/nette', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15227'}
null
GHSA
GHSA-m7j4-fhg6-xf5v
Prototype pollution in datatables.net
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
{'CVE-2020-28458'}
2021-07-28T20:34:50Z
2020-12-17T21:00:50Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/advisories/GHSA-m7j4-fhg6-xf5v', 'https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1051962', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28458', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1016402', 'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03'}
null
GHSA
GHSA-26v6-w6fw-rh94
Apache Camel can allow remote attackers to execute arbitrary commands
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
{'CVE-2015-5348'}
2022-04-26T19:23:29Z
2018-10-16T23:12:20Z
HIGH
8.1
null
{'https://nvd.nist.gov/vuln/detail/CVE-2015-5348', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://github.com/advisories/GHSA-26v6-w6fw-rh94', 'http://www.securityfocus.com/bid/80696', 'https://issues.apache.org/jira/browse/CAMEL-9309', 'http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc', 'http://www.securityfocus.com/archive/1/537147/100/0/threaded', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-785g-gx74-gr39
Malicious Package in js-wha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:35:21Z
2020-09-03T23:12:48Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-785g-gx74-gr39', 'https://www.npmjs.com/advisories/1294'}
null
GHSA
GHSA-65mj-7c86-79jf
Authentication Bypass in ADOdb/ADOdb
### Impact An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes. Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc. ### Patches The vulnerability is fixed in ADOdb versions 5.20.21 (952de6c4273d9b1e91c2b838044f8c2111150c29) and 5.21.4 or later (b4d5ce70034c5aac3a1d51d317d93c037a0938d2). The simplest patch is to delete line 29 in `drivers/adodb-postgres64.inc.php`: ```php diff --git a/drivers/adodb-postgres64.inc.php b/drivers/adodb-postgres64.inc.php index d04b7f67..729d7141 100644 --- a/drivers/adodb-postgres64.inc.php +++ b/drivers/adodb-postgres64.inc.php @@ -26,7 +26,6 @@ function adodb_addslashes($s) { $len = strlen($s); if ($len == 0) return "''"; - if (strncmp($s,"'",1) === 0 && substr($s,$len-1) == "'") return $s; // already quoted return "'".addslashes($s)."'"; } ``` ### Workarounds Ensure the parameters passed to *ADOConnection::connect()* or related functions (_nConnect()_, _pConnect()_) are not surrounded by single quotes. ### Credits Thanks to **Emmet Leahy** (@meme-lord) of Sorcery Ltd for reporting this vulnerability, and to the [huntr](https://huntr.dev/) team for their support. ### References - Original issue report https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c/ - ADOdb reference issue #793 ### For more information If you have any questions or comments about this advisory: * Add a note in issue #793 * Contact the maintainers on [Gitter](https://gitter.im/adodb/adodb)
{'CVE-2021-3850'}
2022-03-30T21:12:11Z
2022-01-27T15:23:19Z
CRITICAL
9.1
{'CWE-287', 'CWE-305'}
{'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://www.debian.org/security/2022/dsa-5101', 'https://github.com/ADOdb/ADOdb/issues/793', 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00006.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3850', 'https://github.com/advisories/GHSA-65mj-7c86-79jf', 'https://huntr.dev/bounties/bdf5f216-4499-4225-a737-b28bc6f5801c', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2'}
null
GHSA
GHSA-6c9x-mj3g-h47x
Spoofing attack in swagger-ui-dist
The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim.
{'CVE-2021-46708'}
2022-04-15T17:04:35Z
2022-03-12T00:00:36Z
MODERATE
6.1
{'CWE-1021'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46708', 'https://www.npmjs.com/package/swagger-ui-dist/v/4.1.3', 'https://security.netapp.com/advisory/ntap-20220407-0004/', 'https://github.com/advisories/GHSA-6c9x-mj3g-h47x', 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-2314884'}
null
GHSA
GHSA-qrg9-f472-qwfm
Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19
Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. - https://vaadin.com/security/cve-2021-31412
{'CVE-2021-31412'}
2021-07-01T21:47:23Z
2021-06-28T16:55:58Z
MODERATE
5.3
{'CWE-1295', 'CWE-668'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm', 'https://github.com/vaadin/flow/pull/11107', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412', 'https://vaadin.com/security/cve-2021-31412', 'https://github.com/advisories/GHSA-qrg9-f472-qwfm'}
null
GHSA
GHSA-4f68-49qq-h392
Improper certificate validation in em-map
em-imap 0.5 and earlier use the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
{'CVE-2020-13163'}
2021-05-24T18:12:20Z
2021-05-24T18:12:20Z
MODERATE
7.4
{'CWE-295'}
{'https://securitylab.github.com/advisories/GHSL-2020-095-conradirwin-em-imap', 'https://github.com/advisories/GHSA-4f68-49qq-h392', 'https://github.com/ConradIrwin/em-imap/issues/25', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13163'}
null
GHSA
GHSA-7rp2-fm2h-wchj
Cross-site Scripting in Django
An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.
{'CVE-2019-12308'}
2021-08-04T21:04:11Z
2019-06-10T18:43:25Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-7rp2-fm2h-wchj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12308', 'https://docs.djangoproject.com/en/dev/releases/security/', 'https://www.djangoproject.com/weblog/2019/jun/03/security-releases/', 'https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8', 'https://docs.djangoproject.com/en/dev/releases/2.1.9/', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://docs.djangoproject.com/en/dev/releases/1.11.21/', 'https://docs.djangoproject.com/en/dev/releases/2.2.2/'}
null
GHSA
GHSA-jqjj-r4qp-x2gh
Use of Uninitialized Resource in messagepack-rs.
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string_primitive may read from uninitialized memory locations.
{'CVE-2021-45693'}
2022-01-07T16:25:54Z
2022-01-06T22:12:42Z
CRITICAL
9.8
{'CWE-908'}
{'https://github.com/advisories/GHSA-jqjj-r4qp-x2gh', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45693'}
null
GHSA
GHSA-rrrm-qjm4-v8hf
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `block.def` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from "marked"; marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`); ``` _Who is impacted?_ Anyone who runs untrusted markdown through marked and does not use a worker with a time limit. ### Patches _Has the problem been patched?_ Yes _What versions should users upgrade to?_ 4.0.10 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Do not run untrusted markdown through marked or run marked on a [worker](https://marked.js.org/using_advanced#workers) thread and set a reasonable time limit to prevent draining resources. ### References _Are there any links users can visit to find out more?_ - https://marked.js.org/using_advanced#workers - https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS ### For more information If you have any questions or comments about this advisory: * Open an issue in [marked](https://github.com/markedjs/marked)
{'CVE-2022-21680'}
2022-04-19T19:03:20Z
2022-01-14T21:04:41Z
HIGH
7.5
{'CWE-1333'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21680', 'https://github.com/advisories/GHSA-rrrm-qjm4-v8hf', 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0', 'https://github.com/markedjs/marked/releases/tag/v4.0.10', 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf'}
null