ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-6hpv-v2rx-c5g6
FPE in convolutions with zero size filters
### Impact The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments. ### Patches We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-41209'}
2021-11-10T19:02:17Z
2021-11-10T19:02:17Z
MODERATE
5.5
{'CWE-369'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41209', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/advisories/GHSA-6hpv-v2rx-c5g6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6'}
null
GHSA
GHSA-whgm-jr23-g3j9
Uncontrolled Resource Consumption in ansi-html
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
{'CVE-2021-23424'}
2022-04-19T19:03:26Z
2021-09-02T17:15:24Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://github.com/advisories/GHSA-whgm-jr23-g3j9', 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849', 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69'}
null
GHSA
GHSA-8m9g-647g-5pxw
Infinite loop in Yubico yubihsm-connector
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this.
{'CVE-2021-28484'}
2022-04-12T22:00:38Z
2022-02-15T01:57:18Z
HIGH
5.4
{'CWE-835'}
{'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed', 'https://github.com/advisories/GHSA-8m9g-647g-5pxw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28484', 'https://www.yubico.com/support/security-advisories/ysa-2021-02/', 'https://github.com/Yubico/yubihsm-connector/releases'}
null
GHSA
GHSA-j7rm-8ww4-xx2g
Division by zero in TFLite's implementation of `SpaceToDepth`
### Impact The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67). ```cc const int block_size = params->block_size; const int input_height = input->dims->data[1]; const int input_width = input->dims->data[2]; int output_height = input_height / block_size; int output_width = input_width / block_size; ``` An attacker can craft a model such that `params->block_size` would be zero. ### Patches We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29587'}
2021-05-21T14:26:45Z
2021-05-21T14:26:45Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-j7rm-8ww4-xx2g', 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587'}
null
GHSA
GHSA-7qcx-jmrc-h2rr
Cross-Site Scripting in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser. ## Recommendation Update to version 4.0.0 or later.
{'CVE-2017-15878'}
2021-09-03T21:41:16Z
2017-11-15T19:44:16Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr', 'https://www.npmjs.com/advisories/980', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://www.exploit-db.com/exploits/43054/', 'http://www.securityfocus.com/bid/101541', 'https://github.com/keystonejs/keystone/pull/4478', 'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878'}
null
GHSA
GHSA-9gwx-9cwp-5c2m
Billion laughs attack (XML bomb)
### Impact Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. Consider an XML file (`createMediaPackage.xml`) like this: ```xml <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <!DOCTYPE lolz [ <!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. "> <!ELEMENT title (#PCDATA)> <!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;"> <!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;"> <!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;"> <!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;"> <!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;"> ]> <mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z"> <title>&lol5;</title> <media/> <metadata/> <attachments/> <publications/> </mediapackage> ``` Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory: ```sh curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \ -F 'mediapackage=<createMediaPackage.xml' \ -F sourceFlavors="" \ -F sourceTags="" \ -F deleteExternal="" \ -F tagsAndFlavor='' \ -o out.xml ``` Additional notes: - You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text. - Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system. - To exploit this, users need to have ingest privileges, limiting the group of potential attackers ### Patches The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch. ### Workarounds There is no known workaround for this issue. ### References - [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack) - For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________ ### For more information If you have any questions or comments about this advisory: - Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues) - Email us at [security@opencast.org](mailto:security@opencast.org)
{'CVE-2021-32623'}
2022-04-19T19:02:58Z
2021-06-17T20:11:35Z
HIGH
8.1
{'CWE-776'}
{'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m', 'https://github.com/advisories/GHSA-9gwx-9cwp-5c2m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623'}
null
GHSA
GHSA-2q8x-2p7f-574v
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html). ### Credits Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-39153'}
2022-04-22T15:42:36Z
2021-08-25T14:46:49Z
HIGH
8.5
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-2q8x-2p7f-574v', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-39153.html', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39153', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-m553-9wmx-533h
Cross-site scripting in Dolibarr
In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.
{'CVE-2019-16197'}
2021-08-18T19:24:27Z
2019-11-08T20:05:31Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964', 'https://github.com/advisories/GHSA-m553-9wmx-533h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html'}
null
GHSA
GHSA-2v2v-fx7r-f2fh
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
pimcore is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4082'}
2021-12-16T14:28:10Z
2021-12-16T14:28:10Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-2v2v-fx7r-f2fh', 'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'}
null
GHSA
GHSA-wv67-9jq7-8r69
Improper Input Validation and Buffer Over-read in mqtt-packet
A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.
{'CVE-2019-5432'}
2021-11-04T17:08:34Z
2019-05-14T04:02:45Z
HIGH
7.5
{'CWE-126', 'CWE-125'}
{'https://hackerone.com/reports/541354', 'https://github.com/advisories/GHSA-wv67-9jq7-8r69', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'}
null
GHSA
GHSA-xgx2-332h-9x6q
SQL Injection in Yeswiki
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0.
{'CVE-2021-43091'}
2022-04-05T20:54:58Z
2022-03-26T00:00:32Z
HIGH
7.5
{'CWE-89'}
{'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://github.com/advisories/GHSA-xgx2-332h-9x6q'}
null
GHSA
GHSA-689x-x68p-fph3
Cross-site Scripting in vditor
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
{'CVE-2022-0350'}
2022-04-12T21:57:07Z
2022-04-01T00:00:41Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c', 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://github.com/advisories/GHSA-689x-x68p-fph3'}
null
GHSA
GHSA-jfvx-7wrx-43fh
XStream vulnerable to an Arbitrary File Deletion on the local host when unmarshalling
### Impact The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15. ### Workarounds The reported vulnerability does only exist with a JAX-WS runtime on the classpath. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use. Users of XStream 1.4.14 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString") || type == java.lang.Void.class || void.class || Proxy.isProxy(type)) || type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream")); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26259'}
2021-11-18T15:24:50Z
2020-12-21T16:28:26Z
MODERATE
6.8
{'CWE-78'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2020-26259.html', 'https://github.com/advisories/GHSA-jfvx-7wrx-43fh', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26259', 'https://www.debian.org/security/2021/dsa-4828', 'https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E'}
null
GHSA
GHSA-73qw-ww62-m54x
Critical severity vulnerability that affects colorscore
The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable.
{'CVE-2015-7541'}
2021-09-02T19:21:06Z
2017-10-24T18:33:36Z
CRITICAL
10
{'CWE-77'}
{'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'http://rubysec.com/advisories/CVE-2015-7541/', 'http://www.openwall.com/lists/oss-security/2016/01/05/2', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'}
null
GHSA
GHSA-hm3x-jwwf-jpr9
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1.
{'CVE-2021-4180'}
2022-04-05T20:53:00Z
2022-03-24T00:00:17Z
MODERATE
4.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-hm3x-jwwf-jpr9', 'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793'}
null
GHSA
GHSA-7w4p-72j7-v7c2
Phar object injection in PHPMailer
PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing phar:// paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr. ### Impact Object injection, possible remote code execution ### Patches Fixed in 6.0.6 and 5.2.27 ### Workarounds Validate and sanitise user input before using. ### References https://nvd.nist.gov/vuln/detail/CVE-2018-19296 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2018-19296'}
2021-08-19T19:57:59Z
2020-03-05T22:08:55Z
HIGH
8.8
{'CWE-502', 'CWE-915'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7w4p-72j7-v7c2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19296', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6', 'https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27', 'https://www.debian.org/security/2018/dsa-4351', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2018-19296.yaml', 'https://github.com/advisories/GHSA-7w4p-72j7-v7c2'}
null
GHSA
GHSA-3w9q-c44j-37jj
High severity vulnerability that affects Microsoft.ChakraCore
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783.
{'CVE-2019-0773'}
2021-08-31T21:35:33Z
2019-04-09T19:43:32Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-3w9q-c44j-37jj', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0773'}
null
GHSA
GHSA-wgpj-7c2j-vfjm
Tampering with links (e.g. password reset) in emails sent by Indico
### Impact An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account. - If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide) - If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though) ### Patches You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible. See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update. ### Workarounds You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config. ### For more information If you have any questions or comments about this advisory: - Open a thread in [our forum](https://talk.getindico.io/) - Email us privately at indico-team@cern.ch
{'CVE-2021-30185'}
2021-04-16T23:11:42Z
2021-04-08T16:33:38Z
HIGH
0
{'CWE-640'}
{'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm', 'https://github.com/indico/indico/releases/tag/v2.3.4', 'https://www.shorebreaksecurity.com/blog/', 'https://github.com/advisories/GHSA-wgpj-7c2j-vfjm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30185'}
null
GHSA
GHSA-4jj4-m52p-8rx3
Prototype pollution in set-object-value
Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28281'}
2021-04-13T15:24:08Z
2021-04-13T15:24:08Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/advisories/GHSA-4jj4-m52p-8rx3', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281', 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28281'}
null
GHSA
GHSA-h59f-p56g-g75v
SQL Injection in librenms
A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint.
{'CVE-2020-35700'}
2021-05-06T18:53:02Z
2021-05-06T18:53:02Z
HIGH
8.8
{'CWE-89'}
{'https://github.com/librenms/librenms/releases/tag/21.1.0', 'https://www.horizon3.ai/disclosures/librenms-second-order-sqli', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35700', 'https://github.com/librenms/librenms/issues/12405', 'https://github.com/advisories/GHSA-h59f-p56g-g75v', 'https://github.com/librenms/librenms/pull/12422', 'https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php'}
null
GHSA
GHSA-j87c-cj65-vmh5
High severity vulnerability that affects rendertron
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
{'CVE-2017-18354'}
2021-09-14T19:19:11Z
2019-01-04T17:41:51Z
HIGH
7.5
{'CWE-22'}
{'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'}
null
GHSA
GHSA-m8xh-cqc2-5q6f
Type Confusion in ImpressCMS
ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==).
{'CVE-2021-26600'}
2022-04-05T21:19:47Z
2022-03-29T00:01:16Z
CRITICAL
9.8
{'CWE-843'}
{'http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html', 'https://hackerone.com/reports/1081986', 'https://github.com/advisories/GHSA-m8xh-cqc2-5q6f', 'http://seclists.org/fulldisclosure/2022/Mar/43', 'http://karmainsecurity.com/KIS-2022-01', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26600', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3'}
null
GHSA
GHSA-78p3-96hc-3j47
Malicious Package in jquery-airload
Version 0.2.5 of `jquery-airload` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:11:17Z
2020-09-03T19:11:17Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-78p3-96hc-3j47', 'https://www.npmjs.com/advisories/1102'}
null
GHSA
GHSA-jmm9-2p29-vh2w
High severity vulnerability that affects activerecord
Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument.
{'CVE-2011-0448'}
2021-09-14T19:49:45Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-89'}
{'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-jmm9-2p29-vh2w', 'http://www.vupen.com/english/advisories/2011/0877', 'http://securitytracker.com/id?1025063', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448', 'http://secunia.com/advisories/43278', 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'}
null
GHSA
GHSA-hp5x-rqf7-43vf
Improper Handling of Exceptional Conditions and Improper Input Validation in Reactor Netty
Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response.
{'CVE-2020-5403'}
2022-02-10T20:24:21Z
2022-02-10T20:24:21Z
MODERATE
7.5
{'CWE-20', 'CWE-755'}
{'https://pivotal.io/security/cve-2020-5403', 'https://github.com/advisories/GHSA-hp5x-rqf7-43vf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5403'}
null
GHSA
GHSA-vx5c-87qx-cv6c
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2017-1001002'}
2021-06-10T20:06:13Z
2017-12-18T22:27:45Z
CRITICAL
9.8
{'CWE-94'}
{'https://www.npmjs.com/advisories/552', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90', 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'}
null
GHSA
GHSA-gvqv-779r-4jgp
Use after free in CefSharp
CVE-2020-16017: Use after free in site isolation - https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017 Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild. There is currently little to no public information on the issue other than it has been flagged as `High` severity.
{'CVE-2020-16017'}
2021-01-12T18:00:23Z
2020-11-27T20:13:05Z
HIGH
0
{'CWE-416'}
{'https://github.com/advisories/GHSA-gvqv-779r-4jgp', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp', 'https://crbug.com/1146709', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16017', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'}
null
GHSA
GHSA-xw5p-hw6r-2j98
Denial of service in fastify
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
{'CVE-2020-8192'}
2021-01-07T23:42:12Z
2020-08-05T14:53:22Z
MODERATE
0
{'CWE-400'}
{'https://hackerone.com/reports/903521', 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192', 'https://github.com/advisories/GHSA-xw5p-hw6r-2j98'}
null
GHSA
GHSA-x3j8-g4v9-67jq
Downloads Resources over HTTP in pennyworth
Affected versions of `pennyworth` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10619'}
2021-01-08T00:47:49Z
2019-02-18T23:56:51Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-x3j8-g4v9-67jq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10619', 'https://nodesecurity.io/advisories/213', 'https://www.npmjs.com/advisories/213'}
null
GHSA
GHSA-hrmm-f4j8-8vxc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0922'}
2021-03-29T21:00:11Z
2021-03-29T21:00:11Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://github.com/advisories/GHSA-hrmm-f4j8-8vxc', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922'}
null
GHSA
GHSA-59jw-jqf4-3wq3
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html). ### Credits 钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21344'}
2022-02-10T11:35:18Z
2021-03-22T23:28:23Z
MODERATE
5.3
{'CWE-434', 'CWE-502'}
{'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://github.com/advisories/GHSA-59jw-jqf4-3wq3', 'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/CVE-2021-21344.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-x3rm-644h-67m8
Out-of-bounds Read in OpenCV
OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp.
{'CVE-2019-16249'}
2021-10-12T22:22:05Z
2021-10-12T22:22:05Z
MODERATE
5.3
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16249', 'https://github.com/opencv/opencv/pull/15531', 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702', 'https://github.com/opencv/opencv/issues/15481', 'https://github.com/opencv/opencv-python/releases/tag/30', 'https://github.com/advisories/GHSA-x3rm-644h-67m8'}
null
GHSA
GHSA-5888-ffcr-r425
Prototype Pollution leading to Remote Code Execution in superjson
### Impact This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. In the case of Blitz.js, it would be at least one RPC call. ### Patches This has been patched in superjson 1.8.1 and Blitz.js 0.45.3. If you are unable to upgrade to Blitz.js 0.45.3 in a timely manner, you can instead upgrade only superjson to version 1.8.1 using yarn resolutions are similar. Blitz versions < 0.45.3 are only affected because they used superjson versions < 1.8.1. ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/blitz-js/superjson * Email us at b@bayer.ws
{'CVE-2022-23631'}
2022-04-19T19:03:22Z
2022-02-09T22:20:49Z
CRITICAL
9
{'CWE-94', 'CWE-1321'}
{'https://github.com/advisories/GHSA-5888-ffcr-r425', 'https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23631'}
null
GHSA
GHSA-v45m-2wcp-gg98
Global node_modules Binary Overwrite in bin-links
Versions of `bin-links` prior to 1.1.6 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent globally-installed binaries to be overwritten by other package installs. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This behavior is still allowed in local installations. ## Recommendation Upgrade to version 1.1.6 or later.
null
2020-09-04T17:18:44Z
2020-09-04T17:18:44Z
LOW
0
null
{'https://github.com/advisories/GHSA-v45m-2wcp-gg98', 'https://www.npmjs.com/advisories/1438'}
null
GHSA
GHSA-m3fm-h5jp-q79p
Authorization bypass in Openshift
Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed.
{'CVE-2016-1906'}
2021-12-20T16:58:14Z
2021-12-20T16:58:14Z
CRITICAL
9.8
{'CWE-285'}
{'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406', 'https://access.redhat.com/errata/RHSA-2016:0070', 'https://github.com/openshift/origin/issues/6556', 'https://github.com/advisories/GHSA-m3fm-h5jp-q79p', 'https://access.redhat.com/errata/RHSA-2016:0351', 'https://github.com/openshift/origin/pull/6576', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906'}
null
GHSA
GHSA-2cfc-865j-gm4w
XML External Entity Reference in detekt
Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.
{'CVE-2022-0272'}
2022-04-26T13:03:17Z
2022-04-22T00:00:36Z
HIGH
7.3
{'CWE-611'}
{'https://github.com/advisories/GHSA-2cfc-865j-gm4w', 'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'}
null
GHSA
GHSA-m539-j985-hcr8
Crash in `max_pool3d` when size argument is 0 or negative
### Impact The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative: ```python import tensorflow as tf pool_size = [2, 2, 0] layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size) input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32) res = layer(input_tensor) ``` This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. ### Patches We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
{'CVE-2021-41196'}
2021-11-10T19:36:21Z
2021-11-10T19:36:21Z
MODERATE
5.5
{'CWE-191'}
{'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41196', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8', 'https://github.com/advisories/GHSA-m539-j985-hcr8'}
null
GHSA
GHSA-cg75-6938-wx58
python-docutils allows insecure usage of temporary files
python-docutils allows insecure usage of temporary files
{'CVE-2009-5042'}
2022-03-21T21:52:59Z
2020-03-13T20:04:51Z
CRITICAL
9.1
{'CWE-668'}
{'https://security-tracker.debian.org/tracker/CVE-2009-5042', 'https://github.com/advisories/GHSA-cg75-6938-wx58', 'https://nvd.nist.gov/vuln/detail/CVE-2009-5042', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560755'}
null
GHSA
GHSA-42xw-2xvc-qx8m
Denial of Service in axios
Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service. ## Recommendation Upgrade to 0.18.1 or later.
{'CVE-2019-10742'}
2021-07-27T20:36:19Z
2019-05-29T18:04:45Z
HIGH
7.5
{'CWE-20', 'CWE-755'}
{'https://github.com/axios/axios/issues/1098', 'https://github.com/advisories/GHSA-42xw-2xvc-qx8m', 'https://github.com/axios/axios/pull/1485', 'https://snyk.io/vuln/SNYK-JS-AXIOS-174505', 'https://www.npmjs.com/advisories/880', 'https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10742'}
null
GHSA
GHSA-7fm6-2qw4-g3x3
High severity vulnerability that affects ro.pippo:pippo-core
An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution.
{'CVE-2018-18628'}
2021-09-02T21:16:22Z
2018-10-24T19:46:20Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/advisories/GHSA-7fm6-2qw4-g3x3', 'https://github.com/pippo-java/pippo/issues/458', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18628'}
null
GHSA
GHSA-44vc-fpcg-5cc5
Moderate severity vulnerability that affects safemode
Withdrawn, accidental duplicate publish. The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
null
2021-12-02T23:15:01Z
2018-08-08T22:29:49Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-44vc-fpcg-5cc5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'}
null
GHSA
GHSA-7j93-5m2h-rvjx
Malicious Package in bconi
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:37:33Z
2020-09-04T15:32:46Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1353', 'https://github.com/advisories/GHSA-7j93-5m2h-rvjx'}
null
GHSA
GHSA-rqjh-jp2r-59cj
nltk is vulnerable to Inefficient Regular Expression Complexity
nltk is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3842'}
2022-01-06T22:24:14Z
2022-01-06T22:24:14Z
HIGH
7.5
{'CWE-1333'}
{'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d', 'https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3842', 'https://github.com/advisories/GHSA-rqjh-jp2r-59cj'}
null
GHSA
GHSA-r587-7jh2-4qr3
Server secret was included in static assets and served to clients
### Impact Server JWT signing secret was included in static assets and served to clients. This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**. ### Background Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`. Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood. ### Patches Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components. Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend). ### Workarounds Users shall upgrade if they use Flood's builtin authentication system. While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments. > Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication. Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions. ### References [Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions) [Introduction to JSON Web Tokens](https://jwt.io/introduction/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [issue tracker](https://github.com/jesec/flood/issues) * Email us at [jc@linux.com](mailto:jc@linux.com)
null
2022-04-19T19:02:33Z
2020-08-26T19:32:50Z
CRITICAL
0
null
{'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}
null
GHSA
GHSA-63qc-p2x4-9fgf
Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library
In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.
{'CVE-2019-11777'}
2021-04-27T19:46:41Z
2019-09-17T22:47:11Z
MODERATE
7.5
{'CWE-346', 'CWE-755'}
{'https://github.com/advisories/GHSA-63qc-p2x4-9fgf', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11777'}
null
GHSA
GHSA-2xjj-5x6h-8vmf
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements.
{'CVE-2012-1099'}
2021-08-31T20:19:51Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf', 'http://www.openwall.com/lists/oss-security/2012/03/02/6', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain', 'https://bugzilla.redhat.com/show_bug.cgi?id=799276', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099', 'http://www.debian.org/security/2012/dsa-2466', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'}
null
GHSA
GHSA-5qcg-w2cc-xffw
Uncontrolled resource consumption in validators Python package
The validators package 0.12.2 through 0.12.5 for Python enters an infinite loop when validators.domain is called with a crafted domain string. This is fixed in 0.12.6.
{'CVE-2019-19588'}
2021-08-19T16:28:23Z
2020-01-21T20:32:09Z
HIGH
7.5
{'CWE-835'}
{'https://github.com/advisories/GHSA-5qcg-w2cc-xffw', 'https://github.com/kvesteri/validators/issues/86', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19588'}
null
GHSA
GHSA-cwh5-3cw7-4286
Moderate severity vulnerability that affects tlslite-ng
tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e241305233 contains a CWE-354: Improper Validation of Integrity Check Value vulnerability in TLS implementation, tlslite/utils/constanttime.py: ct_check_cbc_mac_and_pad(); line "end_pos = data_len - 1 - mac.digest_size" that can result in an attacker manipulating the TLS ciphertext which will not be detected by receiving tlslite-ng. This attack appears to be exploitable via man in the middle on a network connection. This vulnerability appears to have been fixed after commit 3674815d1b0f7484454995e2737a352e0a6a93d8.
{'CVE-2018-1000159'}
2021-09-09T21:22:07Z
2018-07-12T20:30:44Z
MODERATE
5.9
{'CWE-354'}
{'https://github.com/advisories/GHSA-cwh5-3cw7-4286', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000159', 'https://github.com/tomato42/tlslite-ng/pull/234'}
null
GHSA
GHSA-4r5x-qjqc-p579
Tracking Module in botbait
The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem. `botbait` is known to record and track user information. The module tracks the following information. - Source IP - process.versions - process.platform - How the module was invoked (test, require, pre-install) ## Recommendation This package has no functional value, and should be removed from your environment if discovered.
{'CVE-2017-16126'}
2021-09-23T21:47:46Z
2020-09-01T18:57:44Z
MODERATE
5.3
{'CWE-200'}
{'https://www.npmjs.com/advisories/483', 'https://github.com/advisories/GHSA-4r5x-qjqc-p579', 'https://nodesecurity.io/advisories/483', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126'}
null
GHSA
GHSA-9h9c-f287-c6vp
High severity vulnerability that affects org.apache.syncope:syncope-core
A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed.
{'CVE-2018-17184'}
2021-09-07T21:42:12Z
2018-11-06T23:16:18Z
MODERATE
5.4
{'CWE-799'}
{'https://github.com/advisories/GHSA-9h9c-f287-c6vp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184', 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS'}
null
GHSA
GHSA-pchc-949f-53m5
High severity vulnerability that affects multi_xml
multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-0175'}
2021-09-16T16:30:50Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-20'}
{'https://gist.github.com/nate/d7f6d9f4925f413621aa', 'https://github.com/sferik/multi_xml/pull/34', 'https://github.com/advisories/GHSA-pchc-949f-53m5', 'https://news.ycombinator.com/item?id=5040457', 'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0', 'http://www.openwall.com/lists/oss-security/2013/01/11/9', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175'}
null
GHSA
GHSA-5mwx-f6w6-7w5r
Cross-site Scripting in GeniXCMS
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
{'CVE-2022-24563'}
2022-03-11T23:26:55Z
2022-03-04T00:00:19Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/truonghuuphuc/CVE', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563', 'https://github.com/advisories/GHSA-5mwx-f6w6-7w5r', 'https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdf', 'https://genix.me/'}
null
GHSA
GHSA-q75g-2496-mxpp
Regular Expression Denial of Service in parsejson
Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input. ## Recommendation The `parsejson` package has not been functionally updated since it was initially released. Additionally, it provides functionality which is natively included in Node.js, and therefore the native `JSON.parse()` should be used, for both performance and security reasons.
{'CVE-2017-16113'}
2021-01-08T18:16:16Z
2018-07-24T20:11:13Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/528', 'https://github.com/get/parsejson/issues/4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16113', 'https://github.com/advisories/GHSA-q75g-2496-mxpp', 'https://www.npmjs.com/advisories/528'}
null
GHSA
GHSA-652h-xwhf-q4h6
OS Command Injection in ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0.
{'CVE-2020-26301'}
2021-09-21T16:50:46Z
2021-09-21T16:50:46Z
HIGH
7.5
{'CWE-78'}
{'https://www.npmjs.com/package/ssh2', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21', 'https://github.com/advisories/GHSA-652h-xwhf-q4h6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/'}
null
GHSA
GHSA-6jmm-mp6w-4rrg
OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser
### Impact NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0. ### For more information If you have any questions or comments about this advisory: * Open an issue in [https://github.com/HtmlUnit/htmlunit-neko](https://github.com/HtmlUnit/htmlunit-neko) * Email us at [rbri at rbri.de]
{'CVE-2022-29546'}
2022-05-02T19:49:44Z
2022-04-26T21:14:57Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-6jmm-mp6w-4rrg', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546', 'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'}
null
GHSA
GHSA-273r-mgr4-v34f
Uncaught Exception in engine.io
### Impact A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. > RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear > at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14) > at Receiver.startLoop (/.../node_modules/ws/lib/receiver.js:136:22) > at Receiver._write (/.../node_modules/ws/lib/receiver.js:83:10) > at writeOrBuffer (internal/streams/writable.js:358:12) This impacts all the users of the [`engine.io`](https://www.npmjs.com/package/engine.io) package starting from version `4.0.0`, including those who uses depending packages like [`socket.io`](https://www.npmjs.com/package/socket.io). ### Patches A fix has been released for each major branch: | Version range | Fixed version | | --- | --- | | `engine.io@4.x.x` | `4.1.2` | | `engine.io@5.x.x` | `5.2.1` | | `engine.io@6.x.x` | `6.1.1` | Previous versions (`< 4.0.0`) are not impacted. For `socket.io` users: | Version range | `engine.io` version | Needs minor update? | | --- | --- | --- | | `socket.io@4.4.x` | `~6.1.0` | - | `socket.io@4.3.x` | `~6.0.0` | Please upgrade to `socket.io@4.4.x` | `socket.io@4.2.x` | `~5.2.0` | - | `socket.io@4.1.x` | `~5.1.1` | Please upgrade to `socket.io@4.4.x` | `socket.io@4.0.x` | `~5.0.0` | Please upgrade to `socket.io@4.4.x` | `socket.io@3.1.x` | `~4.1.0` | - | `socket.io@3.0.x` | `~4.0.0` | Please upgrade to `socket.io@3.1.x` or `socket.io@4.4.x` (see [here](https://socket.io/docs/v4/migrating-from-3-x-to-4-0/)) In most cases, running `npm audit fix` should be sufficient. You can also use `npm update engine.io --depth=9999`. ### Workarounds There is no known workaround except upgrading to a safe version. ### For more information If you have any questions or comments about this advisory: * Open an issue in [`engine.io`](https://github.com/socketio/engine.io) Thanks to Marcus Wejderot from Mevisio for the responsible disclosure.
{'CVE-2022-21676'}
2022-04-19T19:03:20Z
2022-01-13T16:14:17Z
HIGH
7.5
{'CWE-754'}
{'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/releases/tag/5.2.1', 'https://github.com/socketio/engine.io/releases/tag/6.1.1', 'https://github.com/advisories/GHSA-273r-mgr4-v34f', 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab', 'https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f', 'https://github.com/socketio/engine.io/releases/tag/4.1.2', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21676'}
null
GHSA
GHSA-v9wp-8r97-v6xg
Cross-Site Scripting in jquery.json-viewer
Versions of `jquery.json-viewer` prior to 1.3.0 are vulnerable to Cross-Site Scripting (XSS). The package insufficiently sanitizes user input when creating links, and concatenates the user input in an `<a>` tag. This allows attackers to create malicious links with JSON payloads such as: ``` { "foo": "https://bar.com\" onmouseover=alert('xss') \"" } ``` This may lead to arbitrary JavaScript execution in a victim's browser. ## Recommendation Upgrade to version 1.3.0 or later.
null
2021-09-28T21:55:46Z
2020-09-03T17:17:00Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1036', 'https://github.com/advisories/GHSA-v9wp-8r97-v6xg'}
null
GHSA
GHSA-xgp2-cc4r-7vf6
Denial of Service in http-live-simulator
Versions of `http-live-simulator` prior to 1.0.8 are vulnerable to Denial of Service. The package fails to catch an exception that causes the Node process to crash, effectively shutting down the server. This allows an attacker to send an HTTP request that crashes the server. ## Recommendation Upgrade to version 1.0.8 or later.
null
2020-09-03T20:44:21Z
2020-09-03T20:44:21Z
MODERATE
0
null
{'https://www.npmjs.com/advisories/1189', 'https://github.com/advisories/GHSA-xgp2-cc4r-7vf6', 'https://hackerone.com/reports/627376'}
null
GHSA
GHSA-j8qc-5fqr-52fp
Division by zero in `Conv2DBackpropFilter`
### Impact An attacker can cause a division by zero to occur in `Conv2DBackpropFilter`: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) filter_sizes = tf.constant([0, 0, 0, 0], shape=[4], dtype=tf.int32) out_backprop = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32) tf.raw_ops.Conv2DBackpropFilter( input=input_tensor, filter_sizes=filter_sizes, out_backprop=out_backprop, strides=[1, 1, 1, 1], use_cudnn_on_gpu=False, padding='SAME', explicit_paddings=[], data_format='NHWC', dilations=[1, 1, 1, 1] ) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L513-L522) computes a divisor based on user provided data (i.e., the shape of the tensors given as arguments): ```cc const size_t size_A = output_image_size * filter_total_size; const size_t size_B = output_image_size * dims.out_depth; const size_t size_C = filter_total_size * dims.out_depth; const size_t work_unit_size = size_A + size_B + size_C; const size_t shard_size = (target_working_set_size + work_unit_size - 1) / work_unit_size; ``` If all shapes are empty then `work_unit_size` is 0. Since there is no check for this case before division, this results in a runtime exception, with potential to be abused for a denial of service. ### Patches We have patched the issue in GitHub commit [c570e2ecfc822941335ad48f6e10df4e21f11c96](https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29538'}
2021-05-21T14:22:38Z
2021-05-21T14:22:38Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29538', 'https://github.com/advisories/GHSA-j8qc-5fqr-52fp'}
null
GHSA
GHSA-cxm3-284p-qc4v
Prototype Pollution in sds
Affected versions of `sds` are vulnerable to prototype pollution. The `set` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 4.0.0 or later
{'CVE-2020-7618'}
2021-07-29T15:56:43Z
2020-09-03T15:53:12Z
MODERATE
5.3
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-SDS-564123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7618', 'https://github.com/monsterkodi/sds/blob/master/js/set.js#L31', 'https://github.com/advisories/GHSA-cxm3-284p-qc4v', 'https://www.npmjs.com/advisories/1506'}
null
GHSA
GHSA-qj3g-wfr7-3cv7
Malicious Package in require-ports
Version 10.4.0 of `require-ports` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:56:12Z
2020-09-02T21:41:53Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-qj3g-wfr7-3cv7', 'https://www.npmjs.com/advisories/909'}
null
GHSA
GHSA-wxgw-qj99-44c2
Prototype Pollution in node-forge util.setPath API
### Impact `forge.util.setPath` had a potential prototype pollution issue if called with untrusted keys. This API was not used by forge itself. ### Patches The `forge.util.setPath` API and related functions were removed in 0.10.0. ### Workarounds Don't call `forge.util.setPath` directly or indirectly with untrusted keys. ### References - https://security.snyk.io/vuln/SNYK-JS-NODEFORGE-598677 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7720 ### For more information If you have any questions or comments about this advisory: * Open an issue in [forge](https://github.com/digitalbazaar/forge). * Email us at support@digitalbazaar.com.
null
2022-01-08T00:22:40Z
2022-01-08T00:22:40Z
LOW
0
null
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2', 'https://github.com/advisories/GHSA-wxgw-qj99-44c2'}
null
GHSA
GHSA-jhgp-hvj6-x2p2
Stored Cross-Site Scripting in tianma-static
All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static` ## Recommendation As no fix is available for this vulnerability at this time it is our recommendation to use another static file server.
{'CVE-2018-16474'}
2021-01-08T18:34:29Z
2018-11-06T23:12:01Z
CRITICAL
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/741', 'https://hackerone.com/reports/403692', 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474'}
null
GHSA
GHSA-ch22-x2v3-v6vq
OTF-001: Improper Input Sanitation: The path parameter of the requested URL is not sanitized before being passed to the QT frontend
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerability ID: OTF-001 - Vulnerability type: Improper Input Sanitization - Threat level: Elevated ## Description: The `path` parameter of the requested URL is not sanitized before being passed to the QT frontend. ## Technical description: The `path` parameter is not sanitized before being passed to the constructor of the `QLabel`. https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/__init__.py#L499-L509 https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/history.py#L456-L483 https://doc.qt.io/qt-5/qlabel.html#details > Warning: When passing a QString to the constructor or calling setText(), make sure to sanitize your input, as QLabel tries to guess whether it displays the text as plain text or as rich text, a subset of HTML 4 markup. You may want to call setTextFormat() explicitly, e.g. in case you expect the text to be in plain format but cannot control the text source (for instance when displaying data loaded from the Web). This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend. In the following example an adversary injects a crafted image file into an Onionshare instance with receive mode and renders it in the history component of the Onionshare application. The only requirement is another visit to the shared site with the following parameter attached to the path of the URL: ``` <img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAoAAAAKCAIAAAACUFjqAAAAFElEQVQY02Nk+M+ABzAxMIxKYwIAQC0BEwZFOw4AAAAASUVORK5CYII=' /> ``` This will be rendered as a green square in the history tab where the path value is supposed to be (the value itself is shown at the bottom of the page). ![otf-001](https://user-images.githubusercontent.com/156128/140665358-ab9e5990-3e13-4e50-85fd-b8a6e323d299.png) Possible scenarios where this could lead to remote code execution would be a 0-day in libpng or other internal image rendering (OTF-014 (page 12)) of the QT framework. The QT documentation indicates that external files could be rendered, but we were unable to find a QT code path allowing for it. ## Impact: An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can render arbitrary HTML (QT-HTML4 Subset) in the server desktop application. This requires the desktop application with rendered history, therefore the impact is only elevated. ## Recommendation: - Manually define the text format of the QLabel via `setTextFormat()`
{'CVE-2022-21690'}
2022-01-21T23:20:25Z
2022-01-21T23:20:25Z
HIGH
8.7
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21690', 'https://github.com/advisories/GHSA-ch22-x2v3-v6vq', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq'}
null
GHSA
GHSA-vj72-mwrj-m2xq
Prototype Pollution in deepmergefn
All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
{'CVE-2021-23417'}
2021-08-31T21:21:46Z
2021-08-10T16:09:25Z
MODERATE
5.6
{'CWE-1321', 'CWE-915'}
{'https://github.com/jesusgm/deepmergefn/blob/master/index.js#23L6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23417', 'https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984', 'https://github.com/advisories/GHSA-vj72-mwrj-m2xq'}
null
GHSA
GHSA-8hfj-xrj2-pm22
Certificate check bypass in openssl-src
The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j).
{'CVE-2021-3450'}
2022-04-22T16:50:55Z
2021-08-25T20:54:00Z
HIGH
7.4
{'CWE-295'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b', 'https://www.tenable.com/security/tns-2021-08', 'http://www.openwall.com/lists/oss-security/2021/03/28/4', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3450', 'https://www.tenable.com/security/tns-2021-05', 'https://security.netapp.com/advisory/ntap-20210326-0006/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.openwall.com/lists/oss-security/2021/03/27/2', 'https://github.com/advisories/GHSA-8hfj-xrj2-pm22', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013', 'https://www.openssl.org/news/secadv/20210325.txt', 'https://security.gentoo.org/glsa/202103-03', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/', 'http://www.openwall.com/lists/oss-security/2021/03/27/1', 'https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html', 'https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10356', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd', 'https://www.tenable.com/security/tns-2021-09', 'http://www.openwall.com/lists/oss-security/2021/03/28/3', 'https://rustsec.org/advisories/RUSTSEC-2021-0056.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-9p49-cwh3-4qhf
Malicious Package in grunt-radic
Version 0.1.1 of `grunt-radic` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:21:19Z
2020-09-11T21:21:19Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-9p49-cwh3-4qhf', 'https://www.npmjs.com/advisories/934'}
null
GHSA
GHSA-vxvp-4xwc-jpp6
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding.
{'CVE-2015-3226'}
2021-06-11T14:45:06Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'http://www.securityfocus.com/bid/75231', 'https://github.com/advisories/GHSA-vxvp-4xwc-jpp6', 'http://www.debian.org/security/2016/dsa-3464', 'http://openwall.com/lists/oss-security/2015/06/16/17', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ', 'http://www.securitytracker.com/id/1033755', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'}
null
GHSA
GHSA-jq65-29v4-4x35
Null pointer deference in openssl-src
Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f).
{'CVE-2020-1967'}
2021-10-21T21:10:47Z
2021-08-25T20:45:15Z
HIGH
7.5
{'CWE-476'}
{'https://github.com/irsl/CVE-2020-1967', 'https://security.netapp.com/advisory/ntap-20200717-0004/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://rustsec.org/advisories/RUSTSEC-2020-0015.html', 'https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL', 'https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E', 'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1967', 'https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E', 'https://www.openssl.org/news/secadv/20200421.txt', 'https://www.tenable.com/security/tns-2020-04', 'https://www.debian.org/security/2020/dsa-4661', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html', 'https://www.tenable.com/security/tns-2021-10', 'http://www.openwall.com/lists/oss-security/2020/04/22/2', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html', 'https://github.com/advisories/GHSA-jq65-29v4-4x35', 'https://www.synology.com/security/advisory/Synology_SA_20_05', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/', 'https://security.gentoo.org/glsa/202004-10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/', 'https://www.tenable.com/security/tns-2020-11', 'http://seclists.org/fulldisclosure/2020/May/5', 'https://www.tenable.com/security/tns-2020-03', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/', 'https://security.netapp.com/advisory/ntap-20200424-0003/', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-cx3w-xqmc-84g5
Git LFS can execute a Git binary from the current directory on Windows
### Impact On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, [Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator](https://github.com/golang/go/issues/38736). ### Patches This version should be patched in v2.13.2, which will be released in coordination with this security advisory. ### Workarounds Other than avoiding untrusted repositories or using a different operating system, there is no workaround. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: - Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions). - If you cannot open a discussion, please email the core team using their usernames at `github.com`.
{'CVE-2021-21237'}
2022-04-20T16:24:42Z
2022-02-15T00:30:37Z
HIGH
7.2
{'CWE-94', 'CWE-426'}
{'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5', 'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a', 'https://github.com/advisories/GHSA-cx3w-xqmc-84g5', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21237', 'https://github.com/git-lfs/git-lfs/releases/tag/v2.13.2'}
null
GHSA
GHSA-h92m-42h4-82f6
High severity vulnerability that affects postfix-mta-sts-resolver
## Incorrect query parsing ### Impact All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy. ### Patches Problem has been patched in version 0.5.1 ### Workarounds Users may remediate this vulnerability without upgrading by applying [these patches](https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b) to older suppoorted versions. ### For more information If you have any questions or comments about this advisory: * Open an issue in [postfix-mta-sts-resolver repo](https://github.com/Snawoot/postfix-mta-sts-resolver) * Email me at [vladislav at vm-0 dot com](mailto:vladislav-ex-gh-advisory@vm-0.com)
{'CVE-2019-16791'}
2021-01-08T21:22:28Z
2019-07-05T21:06:58Z
HIGH
6.9
{'CWE-757'}
{'https://github.com/advisories/GHSA-h92m-42h4-82f6', 'https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b', 'https://github.com/Snawoot/postfix-mta-sts-resolver/security/advisories/GHSA-h92m-42h4-82f6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16791'}
null
GHSA
GHSA-jp6r-xcjj-5h7r
Cross-Site Scripting in cyberchef
Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 8.31.3 or later.
{'CVE-2019-15532'}
2021-08-17T22:11:12Z
2019-08-27T17:36:32Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296', 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2', 'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf', 'https://www.npmjs.com/advisories/1149', 'https://github.com/gchq/CyberChef/issues/544', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532', 'https://github.com/advisories/GHSA-jp6r-xcjj-5h7r', 'https://github.com/gchq/CyberChef/issues/539'}
null
GHSA
GHSA-gprm-xqrc-c2j3
Command Injection in Kylin
Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
{'CVE-2020-1956'}
2021-09-22T21:56:35Z
2020-07-27T22:51:44Z
HIGH
8.8
{'CWE-78'}
{'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956', 'https://github.com/advisories/GHSA-gprm-xqrc-c2j3', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E', 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706', 'http://www.openwall.com/lists/oss-security/2020/07/14/1', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-mp6r-fgw2-rxfx
Multiple soundness issues
An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because bytes from an X server can be interpreted as any data type returned by xcb::xproto::GetPropertyReply::value.
{'CVE-2021-26956'}
2021-08-25T20:53:27Z
2021-08-25T20:53:27Z
CRITICAL
9.8
{'CWE-657'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26956', 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html', 'https://github.com/advisories/GHSA-mp6r-fgw2-rxfx', 'https://github.com/RustSec/advisory-db/issues/653'}
null
GHSA
GHSA-wmcq-3wfx-qjx5
Directory Traversal in nodeload-nmickuli
Affected versions of `nodeload-nmickuli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2021-09-23T21:46:51Z
2020-09-01T17:33:30Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-wmcq-3wfx-qjx5', 'https://www.npmjs.com/advisories/410', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeload-nmickuli'}
null
GHSA
GHSA-4g52-pqcj-phvh
BLS Signature "Malleability"
### Impact 1. BLS signature validation in lotus uses blst library method VerifyCompressed. This method accepts signatures in 2 forms - "serialized", and "compressed", meaning that BLS signatures can be provided as either of 2 unique byte arrays. 2. Lotus block validation functions perform a uniqueness check on provided blocks. Two blocks are considered distinct if the CIDs of their blockheader do not match. The CID method for blockheader includes the BlockSig of the block. The result of these issues is that it would be possible to punish miners for valid blocks, as there are two different valid block CIDs available for each block, even though this must be unique. ### Patches By switching from the go based `blst` bindings over to the bindings in `filecoin-ffi`, the code paths now ensure that all signatures are compressed by size and the way they are deserialized. This happened in https://github.com/filecoin-project/lotus/pull/5393 ### References - Original POC: https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754
{'CVE-2021-21405'}
2021-05-21T16:23:43Z
2021-05-21T16:23:43Z
MODERATE
5.9
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21405', 'https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754', 'https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh', 'https://github.com/filecoin-project/lotus/pull/5393', 'https://github.com/advisories/GHSA-4g52-pqcj-phvh'}
null
GHSA
GHSA-g8r4-p96j-xfxc
Twig allowing dangerous PHP functions by default in getgrav/grav
### Impact Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. ### Patches The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`). Futures major versions of Grav may disable this functionality by default. ### Workarounds Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation. ### References - https://portswigger.net/research/server-side-template-injection - https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities ### For more information If you have any questions or comments about this advisory, you can contact: - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com; - The maintainers, by opening an issue on this repository.
{'CVE-2021-29440'}
2022-04-19T19:02:53Z
2021-04-16T19:53:12Z
HIGH
8.4
{'CWE-94'}
{'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440', 'https://packagist.org/packages/getgrav/grav', 'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html', 'https://github.com/advisories/GHSA-g8r4-p96j-xfxc'}
null
GHSA
GHSA-hx5g-8hq2-8x4w
SQL Injection in Kylin
Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0.
{'CVE-2020-13926'}
2021-09-22T21:51:24Z
2020-07-27T22:51:40Z
CRITICAL
9.8
{'CWE-89'}
{'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13926', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584374', 'https://github.com/advisories/GHSA-hx5g-8hq2-8x4w', 'https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E'}
null
GHSA
GHSA-369h-pjr2-6wrh
Uncontrolled recursion in trust-dns-proto
An issue was discovered in the trust-dns-proto crate before 0.5.0-alpha.3 for Rust. There is infinite recursion because DNS message compression is mishandled.
{'CVE-2018-20994'}
2021-08-25T20:43:16Z
2021-08-25T20:43:16Z
HIGH
7.5
{'CWE-674'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20994', 'https://github.com/advisories/GHSA-369h-pjr2-6wrh', 'https://rustsec.org/advisories/RUSTSEC-2018-0007.html'}
null
GHSA
GHSA-gf2v-9hp6-44qg
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through.
{'CVE-2016-3083'}
2021-09-10T20:48:34Z
2019-03-14T15:40:32Z
HIGH
7.5
{'CWE-295'}
{'http://www.securityfocus.com/bid/98669', 'https://github.com/advisories/GHSA-gf2v-9hp6-44qg', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3083', 'https://lists.apache.org/thread.html/0851bcf85635385f94cdaa008053802d92b4aab0a3075e30ed171192@%3Cdev.hive.apache.org%3E'}
null
GHSA
GHSA-cx8m-8xmx-q8v3
Denial of Service in memjs
Versions of `memjs` prior to 1.2.2 are vulnerable to Denial of Service (DoS). The package fails to sanitize the `value` option passed to the Buffer constructor, which may allow attackers to pass large values exhausting system resources. ## Recommendation Upgrade to version 1.2.2 or later.
{'CVE-2018-3767'}
2021-01-08T18:55:31Z
2018-10-10T17:25:12Z
MODERATE
0
{'CWE-400'}
{'https://hackerone.com/reports/319809', 'https://www.npmjs.com/advisories/970', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3767', 'https://github.com/advisories/GHSA-cx8m-8xmx-q8v3'}
null
GHSA
GHSA-5h6m-9mvx-m6c5
Moderate severity vulnerability that affects mayan-edms
An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag label values are mishandled.
{'CVE-2018-16407'}
2021-09-01T22:13:59Z
2018-09-06T03:25:03Z
MODERATE
6.1
{'CWE-79'}
{'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst', 'https://gitlab.com/mayan-edms/mayan-edms/issues/496', 'https://github.com/advisories/GHSA-5h6m-9mvx-m6c5', 'https://gitlab.com/mayan-edms/mayan-edms/commit/076468a9225e4630a463c0bbceb8e5b805fe380c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16407'}
null
GHSA
GHSA-cq94-qf6q-mf2h
Moderate severity vulnerability that affects pysaml2
Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data.
{'CVE-2017-1000246'}
2021-09-09T20:21:11Z
2018-07-16T16:50:30Z
MODERATE
5.3
{'CWE-330'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000246', 'https://github.com/advisories/GHSA-cq94-qf6q-mf2h', 'https://github.com/rohe/pysaml2/issues/417'}
null
GHSA
GHSA-xr3g-4gg5-w3wq
Malicious Package in degbu
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T21:00:58Z
2020-09-03T17:06:14Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1393', 'https://github.com/advisories/GHSA-xr3g-4gg5-w3wq'}
null
GHSA
GHSA-6j9c-grc6-5m6g
CHECK-fail in SparseConcat
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`: ```python import tensorflow as tf import numpy as np indices_1 = tf.constant([[514, 514], [514, 514]], dtype=tf.int64) indices_2 = tf.constant([[514, 530], [599, 877]], dtype=tf.int64) indices = [indices_1, indices_2] values_1 = tf.zeros([0], dtype=tf.int64) values_2 = tf.zeros([0], dtype=tf.int64) values = [values_1, values_2] shape_1 = tf.constant([442, 514, 514, 515, 606, 347, 943, 61, 2], dtype=tf.int64) shape_2 = tf.zeros([9], dtype=tf.int64) shapes = [shape_1, shape_2] tf.raw_ops.SparseConcat(indices=indices, values=values, shapes=shapes, concat_dim=2) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape: ```cc TensorShape input_shape(shapes[0].vec<int64>()); ``` The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. ```cc template <class Shape> TensorShapeBase<Shape>::TensorShapeBase(gtl::ArraySlice<int64> dim_sizes) { set_tag(REP16); set_data_type(DT_INVALID); TF_CHECK_OK(InitDims(dim_sizes)); } ``` In our scenario, this occurs when adding a dimension from the argument results in overflow: ```cc template <class Shape> Status TensorShapeBase<Shape>::InitDims(gtl::ArraySlice<int64> dim_sizes) { ... Status status = Status::OK(); for (int64 s : dim_sizes) { status.Update(AddDimWithStatus(internal::SubtleMustCopy(s))); if (!status.ok()) { return status; } } } template <class Shape> Status TensorShapeBase<Shape>::AddDimWithStatus(int64 size) { ... int64 new_num_elements; if (kIsPartial && (num_elements() < 0 || size < 0)) { new_num_elements = -1; } else { new_num_elements = MultiplyWithoutOverflow(num_elements(), size); if (TF_PREDICT_FALSE(new_num_elements < 0)) { return errors::Internal("Encountered overflow when multiplying ", num_elements(), " with ", size, ", result: ", new_num_elements); } } ... } ``` This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. ### Patches We have patched the issue in GitHub commit [69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c](https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29534'}
2021-05-21T14:22:24Z
2021-05-21T14:22:24Z
LOW
2.5
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g', 'https://github.com/advisories/GHSA-6j9c-grc6-5m6g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29534'}
null
GHSA
GHSA-5f7m-mmpc-qhh4
Remote Memory Exposure in mysql
Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure. Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password. Only `mysql` running on Node.js versions below 6.0.0 is affected due to a throw added in newer node.js versions. Proof of Concept: ``` require('mysql').createConnection({ host: 'localhost', user: 'user', password : USERPROVIDEDINPUT, // number database : 'my_db' }).connect(); ``` ## Recommendation Update to version 2.14.0 or later.
null
2021-08-04T15:50:29Z
2019-05-23T09:27:00Z
MODERATE
0
{'CWE-201'}
{'https://github.com/advisories/GHSA-5f7m-mmpc-qhh4', 'https://nodesecurity.io/advisories/602', 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52', 'https://www.npmjs.com/advisories/602'}
null
GHSA
GHSA-rrfc-g2gh-xvjm
Directory Traversal in 22lixian
Affected versions of `22lixian` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16162'}
2021-01-08T01:57:48Z
2018-07-23T20:46:07Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-rrfc-g2gh-xvjm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16162', 'https://www.npmjs.com/advisories/390', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian', 'https://nodesecurity.io/advisories/390'}
null
GHSA
GHSA-jv35-xqg7-f92r
Prototype Pollution
Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25949'}
2021-10-21T13:11:55Z
2021-06-21T17:16:09Z
CRITICAL
9.8
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25949', 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949', 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56', 'https://github.com/advisories/GHSA-jv35-xqg7-f92r'}
null
GHSA
GHSA-32gv-6cf3-wcmq
HTTP/2 DoS Attacks: Ping, Reset, and Settings Floods
### Impact Twisted web servers that utilize the optional HTTP/2 support suffer from the following flow-control related vulnerabilities: Ping flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512 Reset flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514 Settings flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515 A Twisted web server supports HTTP/2 requests if you've installed the [`http2` optional dependency set](https://twistedmatrix.com/documents/19.2.0/installation/howto/optional.html). ### Workarounds There are no workarounds. ### References https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md ### For more information If you have any questions or comments about this advisory: * Open an issue in [Twisted's Trac](https://twistedmatrix.com/trac/)
null
2022-04-19T19:03:22Z
2022-03-14T22:45:11Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-32gv-6cf3-wcmq', 'https://github.com/twisted/twisted/security/advisories/GHSA-32gv-6cf3-wcmq'}
null
GHSA
GHSA-ghhp-997w-qr28
.NET Core Remote Code Execution Vulnerability
.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112. ### Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed. ### Discussion Discussion for this issue can be found at dotnet/runtime#49377 ### Mitigation factors Microsoft has not identified any mitigating factors for this vulnerability. ### Affected software The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability. Vulnerable package versions: Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below. Package Name | Vulnerable Versions | Secure Versions -|-|- System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1 System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2 System.Text.Encodings.Web | 5.0.0 | 5.0.1 Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.
{'CVE-2021-26701'}
2021-04-21T19:38:01Z
2021-04-21T19:38:01Z
CRITICAL
9.8
null
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/', 'https://github.com/advisories/GHSA-ghhp-997w-qr28', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/', 'https://github.com/dotnet/announcements/issues/178', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/'}
null
GHSA
GHSA-ccq6-3qx5-vmqx
Moderate severity vulnerability that affects is-my-json-valid
Withdrawn, accidental duplicate publish. The is-my-json-valid package before 2.12.4 for Node.js has an incorrect exports['utc-millisec'] regular expression, which allows remote attackers to cause a denial of service (blocked event loop) via a crafted string.
null
2021-12-02T23:07:38Z
2018-07-31T22:54:14Z
MODERATE
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://github.com/advisories/GHSA-ccq6-3qx5-vmqx'}
null
GHSA
GHSA-fh39-v733-mxfr
Moderate severity vulnerability that affects activerecord
The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695.
{'CVE-2012-2661'}
2021-09-10T18:17:39Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-89'}
{'https://github.com/advisories/GHSA-fh39-v733-mxfr', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2661', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'}
null
GHSA
GHSA-92x2-jw7w-xvvx
Cookie and header exposure in twisted
### Impact Cookie and Authorization headers are leaked when following cross-origin redirects in `twited.web.client.RedirectAgent` and `twisted.web.client.BrowserLikeRedirectAgent`.
{'CVE-2022-21712'}
2022-04-25T07:14:43Z
2022-02-07T22:36:00Z
HIGH
7.5
{'CWE-200', 'CWE-346'}
{'https://github.com/twisted/twisted/releases/tag/twisted-22.1.0', 'https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2', 'https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21712', 'https://github.com/advisories/GHSA-92x2-jw7w-xvvx', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html'}
null
GHSA
GHSA-8j4w-5fw4-rm27
Prototype Pollution in deeply
Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation Upgrade to version 3.1.0 or later.
{'CVE-2019-10750'}
2021-08-17T22:18:26Z
2019-08-27T17:45:33Z
CRITICAL
9.8
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-DEEPLY-451026', 'https://github.com/advisories/GHSA-8j4w-5fw4-rm27', 'https://www.npmjs.com/advisories/1030', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10750'}
null
GHSA
GHSA-px4w-rcv2-6x8x
Arbitrary code execution in Apache ServiceComb java-chassis
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
{'CVE-2020-17532'}
2022-02-09T22:19:00Z
2022-02-09T22:19:00Z
HIGH
8.8
{'CWE-502'}
{'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532', 'https://github.com/advisories/GHSA-px4w-rcv2-6x8x', 'https://seclists.org/oss-sec/2021/q1/60', 'https://issues.apache.org/jira/browse/SCB-2145', 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c'}
null
GHSA
GHSA-mq6c-fh97-4gwv
Denial of Service vulnerability with large JSON payloads in fastify
Affected versions of `fastify` are vulnerable to a denial of service when processing a request with `Content-Type` set to `application/json` and a very large payload. ## Recommendation Update to version 0.38.0 or later.
{'CVE-2018-3711'}
2022-04-19T19:03:25Z
2018-07-18T21:20:34Z
HIGH
0
{'CWE-770'}
{'https://github.com/advisories/GHSA-mq6c-fh97-4gwv', 'https://hackerone.com/reports/303632', 'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76', 'https://www.npmjs.com/advisories/564', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3711', 'https://github.com/fastify/fastify/pull/627'}
null
GHSA
GHSA-vpj4-89q8-rh38
Cross-Site Scripting in bpmn-js-properties-panel
Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website. ## Recommendation Upgrade to version 0.31.0 or later.
null
2021-09-29T15:17:34Z
2020-09-03T18:16:59Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-vpj4-89q8-rh38', 'https://www.npmjs.com/advisories/1079'}
null
GHSA
GHSA-c582-c96p-r5cq
Memory exhaustion in Tensorflow
### Impact The [implementation of `ThreadPoolHandle`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135) can be used to trigger a denial of service attack by allocating too much memory: ```python import tensorflow as tf y = tf.raw_ops.ThreadPoolHandle(num_threads=0x60000000,display_name='tf') ``` This is because the `num_threads` argument is only checked to not be negative, but there is no upper bound on its value. ### Patches We have patched the issue in GitHub commit [e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e](https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21732'}
2022-02-11T17:05:43Z
2022-02-10T00:20:29Z
MODERATE
4.3
{'CWE-400', 'CWE-770'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq', 'https://github.com/advisories/GHSA-c582-c96p-r5cq', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21732', 'https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e'}
null
GHSA
GHSA-74fj-2j2h-c42q
Exposure of sensitive information in follow-redirects
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
{'CVE-2022-0155'}
2022-01-20T15:34:49Z
2022-01-12T22:46:26Z
HIGH
8
{'CWE-359'}
{'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22', 'https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155', 'https://github.com/advisories/GHSA-74fj-2j2h-c42q'}
null
GHSA
GHSA-9p77-mmrw-69c7
Null-dereference in Tensorflow
### Impact When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is [guarded by a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106): ```cc const auto* attr = attrs.Find(arg->s()); DCHECK(attr != nullptr); if (attr->value_case() == AttrValue::kList) { // ... } ``` However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it results in a crash due to the assertion failure. ### Patches We have patched the issue in GitHub commit [8a513cec4bec15961fbfdedcaa5376522980455c](https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23570'}
2022-02-11T20:48:51Z
2022-02-09T23:33:35Z
MODERATE
6.5
{'CWE-476'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23570', 'https://github.com/advisories/GHSA-9p77-mmrw-69c7', 'https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7'}
null