ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-xxq4-3742-3h28
Generation of Error Message Containing Sensitive Information in microweber
microweber version 1.2.10 and prior may generate an error message containing sensitive information.
{'CVE-2022-0504'}
2022-02-10T22:12:48Z
2022-02-09T00:00:31Z
MODERATE
6.5
{'CWE-209'}
{'https://github.com/advisories/GHSA-xxq4-3742-3h28', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
null
GHSA
GHSA-h6qv-f5gf-8gcf
Missing Authorization in Jenkins P4 plugin
Jenkins P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.
{'CVE-2021-21654'}
2021-06-16T17:29:35Z
2021-06-16T17:29:35Z
MODERATE
4.3
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21654', 'https://github.com/advisories/GHSA-h6qv-f5gf-8gcf', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}
null
GHSA
GHSA-v899-28g4-qmh8
XML External Entity vulnerability in Easy-XML
The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input.
{'CVE-2020-26705'}
2022-03-21T22:23:04Z
2021-11-01T19:19:54Z
CRITICAL
9.1
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26705', 'https://github.com/darkfoxprime/python-easy_xml/issues/1', 'https://github.com/advisories/GHSA-v899-28g4-qmh8'}
null
GHSA
GHSA-p3hc-fv2j-rp68
Prototype Pollution in swiper
Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.
{'CVE-2021-23370'}
2021-05-10T15:36:30Z
2021-05-10T15:36:30Z
CRITICAL
9.8
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBNOLIMITS4WEB-1244697', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696', 'https://github.com/advisories/GHSA-p3hc-fv2j-rp68', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1244699', 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062', 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad', 'https://github.com/nolimits4web/swiper/blob/master/CHANGELOG.md#651-2021-03-29', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698'}
null
GHSA
GHSA-44cg-qcpr-fwjh
Cross site scripting in francoisjacquet/rosariosis
A Cross Site Scripting (XSS) vulnerabilty exits in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JaveScript of HTML.An example of affected components are all Markdown input fields.
{'CVE-2021-44565'}
2022-03-04T21:38:29Z
2022-02-25T00:01:07Z
MODERATE
5.4
{'CWE-79'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/issues/307', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/0f5d1f1d193bc6b711d1644f172579d498ec1636', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44565', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761', 'https://github.com/advisories/GHSA-44cg-qcpr-fwjh'}
null
GHSA
GHSA-mr7p-25v2-35wr
Path Traversal in nltk
NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a ../ (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.
{'CVE-2019-14751'}
2021-08-17T22:10:30Z
2019-08-23T21:53:51Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/mssalvatore/CVE-2019-14751_PoC', 'https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html', 'https://github.com/advisories/GHSA-mr7p-25v2-35wr', 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14751', 'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10', 'https://github.com/nltk/nltk/blob/3.4.5/ChangeLog', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE/'}
null
GHSA
GHSA-r5fx-8r73-v86c
Cross-Site Scripting in angular
Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled. ## Recommendation Upgrade to version 1.5.0-beta.1 or later.
{'CVE-2019-14863'}
2021-08-19T17:14:00Z
2020-02-14T23:08:49Z
MODERATE
6.1
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14863', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://snyk.io/vuln/npm:angular:20150807', 'https://www.npmjs.com/advisories/1453', 'https://github.com/advisories/GHSA-r5fx-8r73-v86c', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://github.com/angular/angular.js/pull/12524'}
null
GHSA
GHSA-7mqr-2v3q-v2wm
Ignored errors on token revokation in github.com/ory/fosite
### Impact The `TokenRevocationHandler` ignores errors coming from the storage. This can lead to unexpected 200 status codes indicating successful revocation while the token is still valid. Whether an attacker can use this for her advantage depends on the ability to trigger errors in the store. ### References [RFC 7009](https://tools.ietf.org/html/rfc7009#section-2.2.1) states that a 503 HTTP code must be returned when the server has a problem.
{'CVE-2020-15223'}
2022-04-19T19:02:34Z
2021-05-24T16:57:39Z
HIGH
8
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15223', 'https://github.com/ory/fosite/commit/03dd55813f5521985f7dd64277b7ba0cf1441319', 'https://tools.ietf.org/html/rfc7009#section-2.2.1', 'https://github.com/ory/fosite/security/advisories/GHSA-7mqr-2v3q-v2wm', 'https://github.com/advisories/GHSA-7mqr-2v3q-v2wm'}
null
GHSA
GHSA-6m8p-x4qw-gh5j
Insufficient Session Expiration in OpenStack Keystone
An issue was discovered in OpenStack Keystone before 15.0.1, and 16.0.0. The list of roles provided for an OAuth1 access token is silently ignored. Thus, when an access token is used to request a keystone token, the keystone token contains every role assignment the creator had for the project. This results in the provided keystone token having more role assignments than the creator intended, possibly giving unintended escalated access.
{'CVE-2020-12690'}
2021-07-14T19:43:23Z
2021-06-09T17:34:09Z
HIGH
8.8
{'CWE-613'}
{'https://www.openwall.com/lists/oss-security/2020/05/06/6', 'https://github.com/advisories/GHSA-6m8p-x4qw-gh5j', 'https://usn.ubuntu.com/4480-1/', 'https://security.openstack.org/ossa/OSSA-2020-005.html', 'https://bugs.launchpad.net/keystone/+bug/1873290', 'http://www.openwall.com/lists/oss-security/2020/05/07/3', 'https://lists.apache.org/thread.html/re4ffc55cd2f1b55a26e07c83b3c22c3fe4bae6054d000a57fb48d8c2@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12690'}
null
GHSA
GHSA-468q-v4jj-485h
Inefficient Regular Expression Complexity in taro
taro is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3804'}
2021-09-20T20:09:59Z
2021-09-20T20:09:59Z
HIGH
7.5
{'CWE-1333'}
{'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5', 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804', 'https://github.com/advisories/GHSA-468q-v4jj-485h'}
null
GHSA
GHSA-rjmf-p882-645m
Improper Certificate Validation
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption.
{'CVE-2021-20327'}
2021-04-12T18:51:17Z
2021-04-12T18:51:17Z
MODERATE
6.8
{'CWE-295'}
{'https://github.com/advisories/GHSA-rjmf-p882-645m', 'https://jira.mongodb.org/browse/NODE-3125', 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b', 'https://www.npmjs.com/advisories/1660', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}
null
GHSA
GHSA-862g-9h5m-m3qv
coreos-installer < 0.10.0 writes world-readable Ignition config to installed system
### Impact On systems installed with coreos-installer before 0.10.0, the user-provided Ignition config was written to `/boot/ignition/config.ign` with world-readable permissions, granting unprivileged users access to any secrets included in the config. Default configurations of Fedora CoreOS and RHEL CoreOS do not include any unprivileged user accounts. In addition, instances launched from a cloud image, and systems provisioned with the `ignition.config.url` kernel argument, do not use the `config.ign` file and are unaffected. ### Patches coreos-installer 0.10.0 and later [writes](https://github.com/coreos/coreos-installer/pull/571) the Ignition config with restricted permissions. ### Workarounds On Fedora CoreOS systems installed from version 34.20210711.3.0 (stable), 34.20210711.2.0 (testing), 34.20210711.1.1 (next) and later, the `/boot/ignition` directory and its contents are removed after provisioning is complete. All Fedora CoreOS systems that have updated to these versions or later have automatically removed the `/boot/ignition` directory and no action is required. On other systems, `/boot/ignition/config.ign` can be removed manually, as it is not used after provisioning is complete: ``` sudo mount -o remount,rw /boot sudo rm -rf /boot/ignition ``` ### References For more information, see https://github.com/coreos/fedora-coreos-tracker/issues/889. ### For more information If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).
{'CVE-2021-3917'}
2022-04-19T19:03:13Z
2021-11-08T18:01:13Z
LOW
0
null
{'https://github.com/advisories/GHSA-862g-9h5m-m3qv', 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-862g-9h5m-m3qv', 'https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c', 'https://github.com/coreos/coreos-installer/releases/tag/v0.10.0'}
null
GHSA
GHSA-m6vm-8g8v-xfjh
Out-of-bounds Write in OpenCV
An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0 (corresponds with OpenCV-Python 4.1.0.25). A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability.
{'CVE-2019-5063'}
2022-04-20T19:15:09Z
2021-10-12T22:23:13Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/advisories/GHSA-m6vm-8g8v-xfjh', 'https://github.com/opencv/opencv-python/releases/tag/25', 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5063', 'https://github.com/opencv/opencv/issues/16951', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-g8j6-m4p7-5rfq
High severity vulnerability that affects DotNetNuke.Core
DNN (aka DotNetNuke) before 9.2.0 suffers from a Server-Side Request Forgery (SSRF) vulnerability in the DnnImageHandler class. Attackers may be able to access information about internal network resources.
{'CVE-2017-0929'}
2021-09-10T20:29:40Z
2018-10-16T17:18:12Z
HIGH
7.5
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0929', 'https://github.com/advisories/GHSA-g8j6-m4p7-5rfq', 'https://github.com/dnnsoftware/Dnn.Platform/commit/d3953db85fee77bb5e6383747692c507ef8b94c3'}
null
GHSA
GHSA-3rhm-67j6-42jq
Moderate severity vulnerability that affects com.jason-goodwin:authentikat-jwt_2.12
A time-sensitive equality check on the JWT signature in the JsonWebToken.validate method in main/scala/authentikat/jwt/JsonWebToken.scala in authentikat-jwt (aka com.jason-goodwin/authentikat-jwt) version 0.4.5 and earlier allows the supplier of a JWT token to guess bit after bit of the signature by repeating validation requests.
{'CVE-2017-18239'}
2021-08-31T21:23:38Z
2018-11-09T17:50:40Z
CRITICAL
9.8
null
{'https://github.com/jasongoodwin/authentikat-jwt/issues/12', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18239', 'https://github.com/advisories/GHSA-3rhm-67j6-42jq', 'https://github.com/jasongoodwin/authentikat-jwt/pull/36', 'https://github.com/jasongoodwin/authentikat-jwt/commit/2d2fa0d40ac8f2f7aa7e9b070fa1a25eee082cb0'}
null
GHSA
GHSA-rh4p-g7x6-8pqg
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1062'}
2021-03-29T20:59:09Z
2021-03-29T20:59:09Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1062', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8', 'https://github.com/advisories/GHSA-rh4p-g7x6-8pqg', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'}
null
GHSA
GHSA-4cj8-g9cp-v5wr
High severity vulnerability that affects blueimp-file-upload
Unauthenticated arbitrary file upload vulnerability in Blueimp jQuery-File-Upload <= v9.22.0
{'CVE-2018-9206'}
2021-09-01T14:43:45Z
2018-10-22T18:53:56Z
CRITICAL
9.8
{'CWE-434'}
{'https://www.exploit-db.com/exploits/45790/', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.securityfocus.com/bid/105679', 'http://www.securityfocus.com/bid/106629', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9206', 'http://www.vapidlabs.com/advisory.php?v=204', 'https://www.exploit-db.com/exploits/46182/', 'https://github.com/advisories/GHSA-4cj8-g9cp-v5wr', 'https://wpvulndb.com/vulnerabilities/9136'}
null
GHSA
GHSA-x3mh-jvjw-3xwx
Infinite loop in `BN_mod_sqrt()` reachable when parsing certificates
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
{'CVE-2022-0778'}
2022-05-03T20:40:35Z
2022-03-16T00:00:45Z
HIGH
7.5
{'CWE-835'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65', 'https://rustsec.org/advisories/RUSTSEC-2022-0014.html', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html', 'https://www.debian.org/security/2022/dsa-5103', 'https://www.tenable.com/security/tns-2022-09', 'https://security.netapp.com/advisory/ntap-20220321-0002/', 'https://www.tenable.com/security/tns-2022-06', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/', 'https://www.tenable.com/security/tns-2022-07', 'https://github.com/advisories/GHSA-x3mh-jvjw-3xwx', 'https://www.openssl.org/news/secadv/20220315.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0778', 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83', 'https://www.tenable.com/security/tns-2022-08', 'https://security.netapp.com/advisory/ntap-20220429-0005/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/'}
null
GHSA
GHSA-wpfr-6297-9v57
User object created with invalid provider data in GoTrue
### Impact _What kind of vulnerability is it? Who is impacted?_ Under certain circumstances a valid user object would have been created with invalid provider metadata. This vulnerability affects everyone running an instance of GoTrue as a service. We advise you to update especially if you are using the provider metadata from the user object to secure other resources. ### Patches _Has the problem been patched? What versions should users upgrade to?_ A patch is available with the release of version [1.0.1 on Github](https://github.com/netlify/gotrue/releases/tag/v1.0.1). ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ If you don't rely on the provider metadata in the user object, you might not be affected. We still strongly recommend upgrading. ### References _Are there any links users can visit to find out more?_ This problem was initially found and reported by the team at Supabase: https://github.com/supabase/gotrue/security/advisories/GHSA-5hvv-9cqv-894r. We want to thank them for the cooperation around this report. In contrast to their advisory, we decided to set the severity to "Moderate" since the provider metadata is not an inherent security feature of this GoTrue codebase or the Netlify ecosystem. ### For more information If you have any questions or comments about this advisory: * Email us at [security@netlify.com](mailto:security@netlify.com)
null
2022-02-11T21:52:12Z
2022-02-09T22:29:01Z
MODERATE
0
null
{'https://github.com/netlify/gotrue/pull/313', 'https://github.com/advisories/GHSA-wpfr-6297-9v57', 'https://github.com/netlify/gotrue/releases/tag/v1.0.1', 'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83', 'https://github.com/netlify/gotrue/security/advisories/GHSA-wpfr-6297-9v57'}
null
GHSA
GHSA-656c-6cxf-hvcv
Deserialization of Untrusted Data in Flask-Caching
Flask-Cache adds easy cache support to Flask. The Flask-Caching extension through 1.10.1 for Flask relies on Pickle for serialization, which may lead to remote code execution or local privilege escalation. If an attacker gains access to cache storage (e.g., filesystem, Memcached, Redis, etc.), they can construct a crafted payload, poison the cache, and execute Python code.
{'CVE-2021-33026'}
2022-05-05T13:53:57Z
2021-06-18T18:33:40Z
CRITICAL
9.8
{'CWE-502', 'CWE-269'}
{'https://github.com/sh4nks/flask-caching/pull/209', 'https://github.com/advisories/GHSA-656c-6cxf-hvcv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33026'}
null
GHSA
GHSA-3c33-3465-fhx2
Exposure of Resource to Wrong Sphere in LibreNMS
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
{'CVE-2020-15877'}
2021-09-08T17:27:17Z
2021-09-08T17:27:16Z
HIGH
8.8
{'CWE-668'}
{'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://shielder.it/blog', 'https://github.com/advisories/GHSA-3c33-3465-fhx2', 'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://community.librenms.org/c/announcements', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15877'}
null
GHSA
GHSA-xmq7-7fxm-rr79
Denial of Service in Tensorflow
### Impact By controlling the `fill` argument of [`tf.strings.as_string`](https://www.tensorflow.org/api_docs/python/tf/strings/as_string), a malicious attacker is able to trigger a format string vulnerability due to the way the internal format use in a `printf` call is constructed: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/as_string_op.cc#L68-L74 This can result in unexpected output: ```python In [1]: tf.strings.as_string(input=[1234], width=6, fill='-') Out[1]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['1234 '], dtype=object)> In [2]: tf.strings.as_string(input=[1234], width=6, fill='+') Out[2]: <tf.Tensor: shape=(1,), dtype=string, numpy=array([' +1234'], dtype=object)> In [3]: tf.strings.as_string(input=[1234], width=6, fill="h") Out[3]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['%6d'], dtype=object)> In [4]: tf.strings.as_string(input=[1234], width=6, fill="d") Out[4]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['12346d'], dtype=object)> In [5]: tf.strings.as_string(input=[1234], width=6, fill="o") Out[5]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['23226d'], dtype=object)> In [6]: tf.strings.as_string(input=[1234], width=6, fill="x") Out[6]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['4d26d'], dtype=object)> In [7]: tf.strings.as_string(input=[1234], width=6, fill="g") Out[7]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['8.67458e-3116d'], dtype=object)> In [8]: tf.strings.as_string(input=[1234], width=6, fill="a") Out[8]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['0x0.00ff7eebb4d4p-10226d'], dtype=object)> In [9]: tf.strings.as_string(input=[1234], width=6, fill="c") Out[9]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['\xd26d'], dtype=object)> In [10]: tf.strings.as_string(input=[1234], width=6, fill="p") Out[10]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['0x4d26d'], dtype=object)> In [11]: tf.strings.as_string(input=[1234], width=6, fill='m') Out[11]: <tf.Tensor: shape=(1,), dtype=string, numpy=array(['Success6d'], dtype=object)> ``` However, passing in `n` or `s` results in segmentation fault. ### Patches We have patched the issue in 33be22c65d86256e6826666662e40dbdfe70ee83 and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15203'}
2021-11-19T15:18:24Z
2020-09-25T18:28:37Z
HIGH
7.5
{'CWE-20', 'CWE-134'}
{'https://github.com/advisories/GHSA-xmq7-7fxm-rr79', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xmq7-7fxm-rr79', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15203', 'https://github.com/tensorflow/tensorflow/commit/33be22c65d86256e6826666662e40dbdfe70ee83'}
null
GHSA
GHSA-455w-gv5p-wgg3
Cross-site Scripting in pimcore
pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules.
{'CVE-2022-0260'}
2022-01-26T22:10:48Z
2022-01-26T22:10:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/pimcore/pimcore/pull/11205', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://github.com/advisories/GHSA-455w-gv5p-wgg3'}
null
GHSA
GHSA-m7xv-7p93-g6q8
Malicious Package in libubx
Version 1.0.3 of `libubx` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T00:35:35Z
2020-09-03T00:35:35Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-m7xv-7p93-g6q8', 'https://www.npmjs.com/advisories/938'}
null
GHSA
GHSA-qj2g-642f-4jrv
Malicious Package in carloprojectlesang
All versions of `carloprojectlesang` contain obfuscated malware that uploads Discord user tokens to a remote server. This allows attackers to make purchases on behalf of users if they have credit cards linked to their Discord accounts. ## Recommendation Remove the package from your environment. Review your Discord account access and rotate tokens if possible. If a credit card was linked to a compromised account contact your credit card company.
null
2021-09-30T21:15:22Z
2020-09-02T21:17:30Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-qj2g-642f-4jrv', 'https://www.npmjs.com/advisories/872'}
null
GHSA
GHSA-m59c-jpc8-m2x4
In Apache Tomcat there is an improper handing of overflow in the UTF-8 decoder
An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86.
{'CVE-2018-1336'}
2022-04-27T13:38:07Z
2018-10-17T16:32:18Z
HIGH
7.5
{'CWE-835'}
{'http://www.securitytracker.com/id/1041375', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2921', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/09/msg00001.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-m59c-jpc8-m2x4', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201807.mbox/%3C20180722090435.GA60759%40minotaur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1336', 'https://access.redhat.com/errata/RHSA-2018:2701', 'https://access.redhat.com/errata/RHSA-2018:2700', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://security.netapp.com/advisory/ntap-20180817-0001/', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://access.redhat.com/errata/RHSA-2018:2945', 'https://usn.ubuntu.com/3723-1/', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/104898', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHEA-2018:2188', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://support.f5.com/csp/article/K73008537?utm_source=f5support&amp;utm_medium=RSS', 'https://www.debian.org/security/2018/dsa-4281', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHEA-2018:2189', 'https://access.redhat.com/errata/RHSA-2018:2930'}
null
GHSA
GHSA-4574-qv3w-fcmg
Deserialization of Untrusted Data in codeception/codeception
This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
{'CVE-2021-23420'}
2021-09-01T18:36:15Z
2021-09-01T18:36:15Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/advisories/GHSA-4574-qv3w-fcmg', 'https://snyk.io/vuln/SNYK-PHP-CODECEPTIONCODECEPTION-1324585', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/JinYiTong/poc', 'https://github.com/Codeception/Codeception/blob/4.1/CHANGELOG-4.x.md#4122', 'https://github.com/Codeception/Codeception/pull/6241', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420'}
null
GHSA
GHSA-hh7m-rx4f-4vpv
CSRF can expose users authentication token
### Issue The /login and /change endpoints can return the authenticated user's authentication token in response to a GET request. Since GET requests aren't protected with a CSRF token, this could lead to a malicious 3rd party site acquiring the authentication token. ### Patches Version 3.4.5 and soon to be released 4.0.0 are patched. ### Workarounds If you aren't using authentication tokens - you can set the SECURITY_TOKEN_MAX_AGE to "0" (seconds) which should make the token unusable. ### References None
{'CVE-2021-21241'}
2021-01-13T19:29:09Z
2021-01-11T20:38:28Z
HIGH
0
{'CWE-352'}
{'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-hh7m-rx4f-4vpv', 'https://github.com/Flask-Middleware/flask-security/commit/61d313150b5f620d0b800896c4f2199005e84b1f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21241', 'https://github.com/Flask-Middleware/flask-security/pull/422', 'https://github.com/advisories/GHSA-hh7m-rx4f-4vpv', 'https://github.com/Flask-Middleware/flask-security/commit/6d50ee9169acf813257c37b75babe9c28e83542a', 'https://github.com/Flask-Middleware/flask-security/releases/tag/3.4.5', 'https://pypi.org/project/Flask-Security-Too'}
null
GHSA
GHSA-jcq3-cprp-m333
Privilege escalation in mysql-connector-jav
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
{'CVE-2019-2692'}
2021-09-22T18:47:46Z
2020-07-01T17:12:20Z
MODERATE
6.3
{'CWE-843'}
{'https://github.com/advisories/GHSA-jcq3-cprp-m333', 'https://security.netapp.com/advisory/ntap-20190423-0002/', 'http://www.securityfocus.com/bid/107925', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692', 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}
null
GHSA
GHSA-f68h-hfqp-8rmv
Path Traversal in Crafter CMS Crafter Studio
Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system.
{'CVE-2017-15684'}
2022-02-09T23:08:03Z
2022-02-09T23:08:03Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-f68h-hfqp-8rmv', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15684', 'http://crafter.com', 'https://docs.craftercms.org/en/3.0/security/advisory.html'}
null
GHSA
GHSA-32rp-q37p-jg6w
Insecure plugin handling in Mattermost
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.
{'CVE-2022-1384'}
2022-04-28T21:12:16Z
2022-04-20T00:00:30Z
HIGH
8.8
{'CWE-862'}
{'https://github.com/advisories/GHSA-32rp-q37p-jg6w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1384', 'https://mattermost.com/security-updates/'}
null
GHSA
GHSA-xmmp-hrmx-x5g7
Malicious Package in bowe
Version 1.8.4 of `bowee` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:37:38Z
2020-09-02T21:32:22Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/899', 'https://github.com/advisories/GHSA-xmmp-hrmx-x5g7'}
null
GHSA
GHSA-4gfq-6m28-m5mg
Improper neutralization of arguments in freediskspace
This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js.
{'CVE-2020-7775'}
2021-04-13T15:16:11Z
2021-04-13T15:16:11Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7775', 'https://github.com/advisories/GHSA-4gfq-6m28-m5mg'}
null
GHSA
GHSA-g9rq-x4fj-f5hx
Remote Code Execution Through Image Uploads in BookStack
### Impact A user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process. This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application. ### Patches The issue was addressed in a series of patches: v0.25.3, v0.25.4 and v0.25.5. Users should upgrade to at least v0.25.5 to avoid this patch but ideally the latest BookStack version as previous versions are un-supported. ### Workarounds Depending on BookStack version, you could use the [local_secure](https://www.bookstackapp.com/docs/admin/upload-config/#local-secure) image storage option, or use s3 or a similar compatible service. Preventing direct execution of any `php` files, apart from the `public/index.php` file, though web-server configuration would also prevent this. ### References [BookStack Beta v0.25.3](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3) [BookStack Beta v0.25.4](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4) [BookStack Beta v0.25.5](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues). * Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2). * Follow the [BookStack Security advise](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.
{'CVE-2020-5256'}
2022-04-19T19:02:24Z
2020-03-13T20:21:27Z
HIGH
7.9
{'CWE-95'}
{'https://github.com/advisories/GHSA-g9rq-x4fj-f5hx', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5', 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-g9rq-x4fj-f5hx', 'https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5256'}
null
GHSA
GHSA-v5jg-558j-q67c
Moderate severity vulnerability that affects actionpack
Cross-site scripting (XSS) vulnerability in the strip_tags helper in actionpack/lib/action_controller/vendor/html-scanner/html/node.rb in Ruby on Rails before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a tag with an invalid name.
{'CVE-2011-2931'}
2021-09-20T15:11:54Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://secunia.com/advisories/45921', 'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065137.html', 'http://www.debian.org/security/2011/dsa-2301', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'http://groups.google.com/group/rubyonrails-security/msg/fd41ab62966e0fd1?dmode=source&output=gplain', 'https://github.com/advisories/GHSA-v5jg-558j-q67c', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=731436', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'https://github.com/rails/rails/commit/586a944ddd4d03e66dea1093306147594748037a', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2931'}
null
GHSA
GHSA-3hrc-f439-727g
Moderate severity vulnerability that affects org.apache.camel:camel-core
XML external entity (XXE) vulnerability in the XML converter setup in converter/jaxp/XmlConverter.java in Apache Camel before 2.13.4 and 2.14.x before 2.14.2 allows remote attackers to read arbitrary files via an external entity in an SAXSource.
{'CVE-2015-0263'}
2021-08-31T21:06:58Z
2018-10-16T23:08:43Z
MODERATE
0
{'CWE-611'}
{'http://www.securitytracker.com/id/1032442', 'http://rhn.redhat.com/errata/RHSA-2015-1539.html', 'https://camel.apache.org/security-advisories.data/CVE-2015-0263.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0263', 'https://git-wip-us.apache.org/repos/asf?p=camel.git;a=commitdiff;h=7d19340bcdb42f7aae584d9c5003ac4f7ddaee36', 'http://rhn.redhat.com/errata/RHSA-2015-1538.html', 'http://rhn.redhat.com/errata/RHSA-2015-1041.html', 'https://github.com/advisories/GHSA-3hrc-f439-727g', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E'}
null
GHSA
GHSA-j6v9-xgvh-f796
Command Injection in wxchangba
All versions of `wxchangba` are vulnerable to Command Injection. The package does not validate user input on the `reqPostMaterial` function, passing contents of the `file` parameter to an exec call. This may allow attackers to run arbitrary commands in the system. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-28T16:02:03Z
2020-09-11T21:11:34Z
MODERATE
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/960', 'https://github.com/advisories/GHSA-j6v9-xgvh-f796'}
null
GHSA
GHSA-jmgf-p46x-982h
Moderate severity vulnerability that affects rails
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
{'CVE-2008-5189'}
2021-09-14T19:47:41Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-352'}
{'http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html', 'http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d', 'http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk', 'http://www.securityfocus.com/bid/32359', 'https://nvd.nist.gov/vuln/detail/CVE-2008-5189', 'https://github.com/advisories/GHSA-jmgf-p46x-982h', 'http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing'}
null
GHSA
GHSA-r6h7-5pq2-j77h
Insufficiently random values in Ansible
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
{'CVE-2020-10729'}
2021-12-13T14:30:45Z
2021-06-15T16:10:11Z
MODERATE
5
{'CWE-330'}
{'https://www.debian.org/security/2021/dsa-4950', 'https://bugzilla.redhat.com/show_bug.cgi?id=1831089', 'https://github.com/advisories/GHSA-r6h7-5pq2-j77h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10729', 'https://github.com/ansible/ansible/blob/v2.9.6/changelogs/CHANGELOG-v2.9.rst', 'https://github.com/ansible/ansible/pull/67429/', 'https://github.com/ansible/ansible/issues/34144'}
null
GHSA
GHSA-jfx5-7mr2-g8hg
Malicious Package in alico
All versions of `alico` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T18:35:27Z
2020-09-03T17:31:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1047', 'https://github.com/advisories/GHSA-jfx5-7mr2-g8hg'}
null
GHSA
GHSA-pxr8-w3jq-rcwj
Moderate severity vulnerability that affects rails_admin
An exploitable cross site scripting (XSS) vulnerability exists in the add filter functionality of the rails_admin rails gem version 1.2.0. A specially crafted URL can cause an XSS flaw resulting in an attacker being able to execute arbitrary javascript on the victim's browser. An attacker can phish an authenticated user to trigger this vulnerability.
{'CVE-2017-12098'}
2021-09-16T19:15:47Z
2018-03-05T19:37:23Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-pxr8-w3jq-rcwj', 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0450', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12098', 'http://www.securityfocus.com/bid/102486'}
null
GHSA
GHSA-9fh3-vh3h-q4g3
Moderate severity vulnerability that affects activesupport
Cross-site scripting (XSS) vulnerability in activesupport/lib/active_support/core_ext/string/output_safety.rb in Ruby on Rails 2.x before 2.3.13, 3.0.x before 3.0.10, and 3.1.x before 3.1.0.rc5 allows remote attackers to inject arbitrary web script or HTML via a malformed Unicode string, related to a "UTF-8 escaping vulnerability."
{'CVE-2011-2932'}
2021-09-07T21:32:10Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2011/08/22/13', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065114.html', 'http://www.openwall.com/lists/oss-security/2011/08/22/14', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065189.html', 'http://www.openwall.com/lists/oss-security/2011/08/19/11', 'http://www.openwall.com/lists/oss-security/2011/08/20/1', 'https://nvd.nist.gov/vuln/detail/CVE-2011-2932', 'http://lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html', 'http://www.openwall.com/lists/oss-security/2011/08/17/1', 'http://groups.google.com/group/rubyonrails-security/msg/f1d2749773db9f21?dmode=source&output=gplain', 'http://www.openwall.com/lists/oss-security/2011/08/22/5', 'https://github.com/advisories/GHSA-9fh3-vh3h-q4g3', 'http://secunia.com/advisories/45917', 'http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6', 'https://github.com/rails/rails/commit/bfc432574d0b141fd7fe759edfe9b6771dd306bd', 'https://bugzilla.redhat.com/show_bug.cgi?id=731435'}
null
GHSA
GHSA-27qf-jwm8-g7f3
FPE in LSH in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero error in LSH [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/lsh_projection.cc#L118). ```cc int RunningSignBit(const TfLiteTensor* input, const TfLiteTensor* weight, float seed) { int input_item_bytes = input->bytes / SizeOfDimension(input, 0); // ... } ``` There is no check that the first dimension of the input is non zero. ### Patches We have patched the issue in GitHub commit [0575b640091680cfb70f4dd93e70658de43b94f9](https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9). The fix will be included in TensorFlow 2.6.0. We will also cherrypick thiscommit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37691'}
2021-08-25T14:39:17Z
2021-08-25T14:39:17Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27qf-jwm8-g7f3', 'https://github.com/tensorflow/tensorflow/commit/0575b640091680cfb70f4dd93e70658de43b94f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37691', 'https://github.com/advisories/GHSA-27qf-jwm8-g7f3'}
null
GHSA
GHSA-2q4g-w47c-4674
Unpreventable top-level navigation
### Impact The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites. ### Patches * `11.0.0-beta.1` * `10.0.1` * `9.3.0` * `8.5.1` ### Workarounds Sandbox all your iframes using the [`sandbox` attribute](https://developer.mozilla.org/en-US/docs/Web/HTML/Element/iframe#attr-sandbox). This will prevent them creating top-frame navigations and is good practice anyway. ### For more information If you have any questions or comments about this advisory: * Email us at security@electronjs.org
{'CVE-2020-15174'}
2022-04-19T19:02:34Z
2020-10-06T14:24:04Z
HIGH
7.5
{'CWE-20', 'CWE-693'}
{'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15174', 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674', 'https://github.com/advisories/GHSA-2q4g-w47c-4674'}
null
GHSA
GHSA-5hg3-6c2f-f3wr
Moderate severity vulnerability that affects django
django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.
{'CVE-2018-14574'}
2021-09-01T22:14:28Z
2018-10-04T21:58:46Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/advisories/GHSA-5hg3-6c2f-f3wr', 'https://access.redhat.com/errata/RHSA-2019:0265', 'http://www.securityfocus.com/bid/104970', 'https://www.djangoproject.com/weblog/2018/aug/01/security-releases/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14574', 'http://www.securitytracker.com/id/1041403', 'https://usn.ubuntu.com/3726-1/', 'https://www.debian.org/security/2018/dsa-4264'}
null
GHSA
GHSA-wxc4-f4m6-wwqv
Excessive Platform Resource Consumption within a Loop in Kubernetes
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
{'CVE-2019-11254'}
2021-12-20T16:55:06Z
2021-12-20T16:55:06Z
MODERATE
6.5
{'CWE-1050'}
{'https://github.com/kubernetes/kubernetes/pull/87467/commits/b86df2bec4f377afc0ca03482ffad2f0a49a83b8', 'https://github.com/advisories/GHSA-wxc4-f4m6-wwqv', 'https://github.com/kubernetes/kubernetes/issues/89535', 'https://security.netapp.com/advisory/ntap-20200413-0003/', 'https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ', 'https://github.com/go-yaml/yaml/commit/53403b58ad1b561927d19068c655246f2db79d48', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11254'}
null
GHSA
GHSA-jq42-hfch-42f3
Action Commands (run/shell/exec) Against Library URIs Ignore Configured Remote Endpoint
# Impact Due to incorrect use of a default URL, `singularity` action commands (`run`/`shell`/`exec`) specifying a container using a `library://` URI will always attempt to retrieve the container from the default remote endpoint (`cloud.sylabs.io`) rather than the configured remote endpoint. An attacker may be able to push a malicious container to the default remote endpoint with a URI that is identical to the URI used by a victim with a non-default remote endpoint, thus executing the malicious container. Only action commands (`run`/`shell`/`exec`) against `library://` URIs are affected. Other commands such as `pull` / `push` respect the configured remote endpoint. # Patches All users should upgrade to Singularity 3.7.4 or later. # Workarounds Users who only interact with the default remote endpoint or do not use the library:// url are not affected. Installations with an execution control list configured to restrict execution to containers signed with specific secure keys are not affected. # Acknowledgements This issue was found by Mike Frisch and brought to our attention by Sylabs. Sylabs is making a [coordinated disclosure](https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394). # For more information General questions about the impact of the advisory can be asked in the: [Singularity Slack Channel](https://join.slack.com/t/hpcng/shared_invite/zt-qda4h1ls-OP0Uouq6sSmVE6i_0NrWdw) [Singularity Mailing List](https://groups.google.com/a/lbl.gov/g/singularity) Any sensitive security concerns should be directed to: [singularity-security@hpcng.org](mailto:singularity-security@hpcng.org)
null
2022-04-19T19:02:58Z
2021-06-01T21:20:53Z
MODERATE
6.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-jq42-hfch-42f3', 'https://github.com/hpcng/singularity/security/advisories/GHSA-jq42-hfch-42f3', 'https://github.com/sylabs/singularity/security/advisories/GHSA-5mv9-q7fq-9394'}
null
GHSA
GHSA-gwg9-rgvj-4h5j
Code Injection in morgan
Verisons of `morgan` before 1.9.1 are vulnerable to code injection when user input is allowed into the filter or combined with a prototype pollution attack. ## Recommendation Update to version 1.9.1 or later.
{'CVE-2019-5413'}
2021-01-08T18:45:38Z
2019-03-25T18:03:23Z
MODERATE
0
{'CWE-94'}
{'https://github.com/advisories/GHSA-gwg9-rgvj-4h5j', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5413', 'https://www.npmjs.com/advisories/736', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/473.json', 'https://hackerone.com/reports/390881'}
null
GHSA
GHSA-x7rp-74x2-mjf3
Segfault in Tensorflow
### Impact The `RaggedCountSparseOutput` implementation does not validate that the input arguments form a valid ragged tensor. In particular, there is no validation that the values in the `splits` tensor generate a valid partitioning of the `values` tensor. Thus, the [following code](https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L248-L265 ) sets up conditions to cause a heap buffer overflow: ```cc auto per_batch_counts = BatchedMap<W>(num_batches); int batch_idx = 0; for (int idx = 0; idx < num_values; ++idx) { while (idx >= splits_values(batch_idx)) { batch_idx++; } const auto& value = values_values(idx); if (value >= 0 && (maxlength_ <= 0 || value < maxlength_)) { per_batch_counts[batch_idx - 1][value] = 1; } } ``` A `BatchedMap` is equivalent to a vector where each element is a hashmap. However, if the first element of `splits_values` is not 0, `batch_idx` will never be 1, hence there will be no hashmap at index 0 in `per_batch_counts`. Trying to access that in the user code results in a segmentation fault. ### Patches We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release. We recommend users to upgrade to TensorFlow 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)
{'CVE-2020-15200'}
2021-11-19T15:19:14Z
2020-09-25T18:28:32Z
MODERATE
5.9
{'CWE-20', 'CWE-787', 'CWE-122'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15200', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x7rp-74x2-mjf3', 'https://github.com/advisories/GHSA-x7rp-74x2-mjf3', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
GHSA
GHSA-3cqr-58rm-57f8
Arbitrary Code Execution in Handlebars
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's browser (effectively serving as XSS).
{'CVE-2019-20920'}
2022-02-10T20:38:19Z
2022-02-10T20:38:19Z
HIGH
8.1
{'CWE-94'}
{'https://www.npmjs.com/package/handlebars', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920', 'https://www.npmjs.com/advisories/1316', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478', 'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e', 'https://github.com/advisories/GHSA-3cqr-58rm-57f8', 'https://www.npmjs.com/advisories/1324'}
null
GHSA
GHSA-cg57-p69r-3m7p
Improper file handling in matrix-react-sdk
Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users. This vulnerability is patched in version 3.21.0.
{'CVE-2021-32622'}
2022-02-10T23:46:51Z
2022-02-10T23:46:51Z
MODERATE
4.2
{'CWE-434', 'CWE-74'}
{'https://github.com/matrix-org/matrix-react-sdk/pull/5981', 'https://github.com/advisories/GHSA-cg57-p69r-3m7p', 'https://www.npmjs.com/package/matrix-react-sdk', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32622'}
null
GHSA
GHSA-wq4r-8342-jmc9
SQL injection in vhs (aka VHS: Fluid ViewHelpers)
The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper.
{'CVE-2021-28381'}
2021-03-29T20:24:44Z
2021-03-29T20:24:44Z
CRITICAL
5
{'CWE-89'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-001', 'https://github.com/advisories/GHSA-wq4r-8342-jmc9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28381'}
null
GHSA
GHSA-cv7x-6rc6-pq5v
Double free in containers
An issue was discovered in the containers crate before 0.9.11 for Rust. When a panic occurs, a util::{mutate,mutate2} double drop can be performed.
{'CVE-2021-25907'}
2021-08-25T20:53:05Z
2021-08-25T20:53:05Z
CRITICAL
9.8
{'CWE-415'}
{'https://github.com/advisories/GHSA-cv7x-6rc6-pq5v', 'https://rustsec.org/advisories/RUSTSEC-2021-0010.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25907', 'https://github.com/strake/containers.rs/issues/2'}
null
GHSA
GHSA-9qw8-ccq9-ffj9
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.
{'CVE-2019-1139'}
2021-03-29T20:57:53Z
2021-03-29T20:57:53Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-9qw8-ccq9-ffj9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
GHSA
GHSA-hggx-3h72-49ww
Moderate severity vulnerability that affects Pillow
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
{'CVE-2016-0740'}
2021-09-14T17:17:46Z
2018-07-24T20:03:51Z
MODERATE
6.5
{'CWE-119'}
{'http://www.debian.org/security/2016/dsa-3499', 'https://security.gentoo.org/glsa/201612-52', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0740', 'https://github.com/advisories/GHSA-hggx-3h72-49ww', 'https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst'}
null
GHSA
GHSA-hx2x-85gr-wrpq
Out of bounds access in tensorflow-lite
### Impact In TensorFlow Lite models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reference_ops.h#L2625-L2631 Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `output_data` buffer. This might result in a segmentation fault but it can also be used to further corrupt the memory and can be chained with other vulnerabilities to create more advanced exploits. ### Patches We have patched the issue in 204945b and will release patch releases for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1, or 2.3.1. ### Workarounds A potential workaround would be to add a custom `Verifier` to the model loading code to ensure that the segment ids are all positive, although this only handles the case when the segment ids are stored statically in the model. A similar validation could be done if the segment ids are generated at runtime between inference steps. If the segment ids are generated as outputs of a tensor during inference steps, then there are no possible workaround and users are advised to upgrade to patched code. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been discovered from a variant analysis of [GHSA-p2cq-cprg-frvm](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2cq-cprg-frvm).
{'CVE-2020-15212'}
2021-08-26T15:20:18Z
2020-09-25T18:29:00Z
HIGH
8.1
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/advisories/GHSA-hx2x-85gr-wrpq', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15212', 'https://github.com/tensorflow/tensorflow/commit/204945b19e44b57906c9344c0d00120eeeae178a'}
null
GHSA
GHSA-xr2c-5w89-63pv
Untrusted Search Path in Poetry
Poetry prior to v1.1.9 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
{'CVE-2022-26184'}
2022-03-30T21:05:22Z
2022-03-23T00:00:24Z
CRITICAL
9.8
{'CWE-426'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26184', 'https://github.com/python-poetry/poetry/releases/tag/1.1.9', 'https://github.com/advisories/GHSA-xr2c-5w89-63pv', 'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'}
null
GHSA
GHSA-mp6f-p9gp-vpj9
Array size is not checked in sized-chunks
An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().
{'CVE-2020-25792'}
2021-08-25T20:46:06Z
2021-08-25T20:46:06Z
HIGH
0
{'CWE-129'}
{'https://github.com/bodil/sized-chunks/issues/11', 'https://rustsec.org/advisories/RUSTSEC-2020-0041.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25792', 'https://github.com/advisories/GHSA-mp6f-p9gp-vpj9'}
null
GHSA
GHSA-2xm2-xj2q-qgpj
receiving subscription objects with deleted session
Original Message: Hi, I create objects with one client with an ACL of all users with a specific column value. Thats working so far. Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them. The client with the deleted session cant create new objects, which Parse restricts right. The LiveQueryServer doesnt detect deleted sessions after the websocket connection was established. There should be a mechanism that checks in an specific interval if the session exists. I dont know if its true with expired sessions. Any solutions? Parse version: 4.3.0 Parse js SDK version: 2.17 Solution: Hi guys. I've found and fixed the problem. It happens because there are two caches in place for the session token: - at Parse Server level, which, according with the docs, should be changed via cacheTTL option and defaults to 5 seconds; - at Parse Live Query level, which, according with the docs, should be changed via liveQueryServerOptions.cacheTimeout and defaults to 30 days. But there are three problems: - cacheTTL has currently no effect over Live Query Server; - cacheTimeout also has currently no effect over Live Query Server; - cacheTimeout actually defaults to 1h. So, currently, if you wait 1 hour after the session token was invalidated, the clients using the old session token are not able to receive the events. What I did: - Added a test case for the problem; - Fixed cacheTTL for Live Query Server; - Fixed cacheTimeout for Live Query Server; - Changed the cacheTimeout to default 5s; - Changed the docs to reflect the actual 5s default for cacheTimeout.
{'CVE-2020-15270'}
2022-04-19T19:02:40Z
2020-10-27T19:15:19Z
MODERATE
4.3
{'CWE-672'}
{'https://github.com/advisories/GHSA-2xm2-xj2q-qgpj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15270', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj', 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'}
null
GHSA
GHSA-g99m-3m46-4gm9
Infinite Loop in Apache Sanselan
Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.
{'CVE-2018-17202'}
2021-08-03T21:31:14Z
2019-05-14T04:00:47Z
HIGH
7.5
{'CWE-835'}
{'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202', 'https://github.com/advisories/GHSA-g99m-3m46-4gm9'}
null
GHSA
GHSA-3mgp-fx93-9xv5
XSS vulnerability that affects bootstrap
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
{'CVE-2018-20676'}
2021-07-26T21:50:30Z
2019-01-17T13:57:34Z
MODERATE
6.1
{'CWE-79'}
{'https://access.redhat.com/errata/RHSA-2020:0132', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0133', 'https://github.com/twbs/bootstrap/issues/27044', 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://access.redhat.com/errata/RHSA-2019:1456', 'https://github.com/advisories/GHSA-3mgp-fx93-9xv5', 'https://access.redhat.com/errata/RHBA-2019:1076', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://github.com/twbs/bootstrap/pull/27047', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676', 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}
null
GHSA
GHSA-43fq-w8qq-v88h
Out-of-bounds read in Pillow
In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311.
{'CVE-2020-11538'}
2021-09-22T21:32:48Z
2020-07-27T21:52:36Z
HIGH
8.1
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://github.com/advisories/GHSA-43fq-w8qq-v88h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11538', 'https://usn.ubuntu.com/4430-2/', 'https://usn.ubuntu.com/4430-1/', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574574', 'https://github.com/python-pillow/Pillow/pull/4504', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756bc512ab3f2ad15ac45665b303d', 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security'}
null
GHSA
GHSA-77g4-36jp-5v3m
Remote Memory Disclosure in bittorrent-dht
Versions of `bittorrent-dht` prior to 5.1.3 are affected by a remote memory disclosure vulnerability. This vulnerability allows an attacker to send a specific series of of messages to a listening peer and get it to reveal internal memory. There are two mitigating factors here, that slightly reduce the impact of this vulnerability: 1. Any modern kernel will zero out new memory pages before handing them off to a process. This means that only memory previously used and deallocated by the node process can be leaked. 1. Node.js manages Buffers by creating a few large internal SlowBuffers, and slicing them up into smaller Buffers which are made accessible in JS. They are not stored on V8's heap, because garbage collection would interfere. The result is that only memory that has been previously allocated as a Buffer can be leaked. ## Recommendation Update to version 5.1.3 or later.
{'CVE-2016-10519'}
2021-01-07T23:35:17Z
2020-09-01T15:22:12Z
MODERATE
0
{'CWE-201'}
{'https://nodesecurity.io/advisories/68', 'https://www.npmjs.com/advisories/68', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10519', 'https://github.com/advisories/GHSA-77g4-36jp-5v3m', 'https://github.com/feross/bittorrent-dht/issues/87'}
null
GHSA
GHSA-mcgw-5fhw-3fq8
Incorrect Authorization in saleor
Incorrect Authorization in saleor prior to 3.1.2.
{'CVE-2022-0932'}
2022-03-29T21:09:08Z
2022-03-12T00:00:34Z
MODERATE
6.5
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0932', 'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d', 'https://huntr.dev/bounties/88ae4cbc-c697-401b-8b04-7dc4e03ad8eb', 'https://github.com/advisories/GHSA-mcgw-5fhw-3fq8'}
null
GHSA
GHSA-3gx9-37ww-9qw6
Code injection in Spring Cloud Gateway
In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host.
{'CVE-2022-22947'}
2022-04-26T20:56:54Z
2022-03-04T00:00:15Z
CRITICAL
10
{'CWE-94'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22947', 'http://packetstormsecurity.com/files/166219/Spring-Cloud-Gateway-3.1.0-Remote-Code-Execution.html', 'https://github.com/advisories/GHSA-3gx9-37ww-9qw6', 'https://tanzu.vmware.com/security/cve-2022-22947'}
null
GHSA
GHSA-6jqp-j69q-pm62
AWS Lambda parser is vulnerable to Regular Expression Denial of Service
index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string.
{'CVE-2018-7560'}
2022-04-25T22:28:18Z
2018-03-05T19:16:56Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560', 'https://github.com/advisories/GHSA-6jqp-j69q-pm62'}
null
GHSA
GHSA-7vm7-j8p7-h346
Code injection in blamer
Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker.
{'CVE-2020-8137'}
2021-05-06T18:27:55Z
2021-05-06T18:27:55Z
HIGH
9.8
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8137', 'https://github.com/advisories/GHSA-7vm7-j8p7-h346', 'https://hackerone.com/reports/772448'}
null
GHSA
GHSA-x457-cw4h-hq5f
High severity vulnerability that affects json
The JSON gem before 1.5.5, 1.6.x before 1.6.8, and 1.7.x before 1.7.7 for Ruby allows remote attackers to cause a denial of service (resource consumption) or bypass the mass assignment protection mechanism via a crafted JSON document that triggers the creation of arbitrary Ruby symbols or certain internal objects, as demonstrated by conducting a SQL injection attack against Ruby on Rails, aka "Unsafe Object Creation Vulnerability."
{'CVE-2013-0269'}
2021-09-21T22:07:56Z
2017-10-24T18:33:37Z
HIGH
0
{'CWE-20'}
{'http://www.osvdb.org/90074', 'http://www.zweitag.de/en/blog/ruby-on-rails-vulnerable-to-mass-assignment-and-sql-injection', 'http://www.ubuntu.com/usn/USN-1733-1', 'http://lists.apple.com/archives/security-announce/2013/Oct/msg00006.html', 'https://groups.google.com/group/rubyonrails-security/msg/d8e0db6e08c81428?dmode=source&output=gplain', 'http://secunia.com/advisories/52075', 'http://www.openwall.com/lists/oss-security/2013/02/11/8', 'http://www.securityfocus.com/bid/57899', 'http://secunia.com/advisories/52774', 'http://rhn.redhat.com/errata/RHSA-2013-1147.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0269', 'http://www.openwall.com/lists/oss-security/2013/02/11/7', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00015.html', 'https://github.com/advisories/GHSA-x457-cw4h-hq5f', 'http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.426862', 'http://spreecommerce.com/blog/multiple-security-vulnerabilities-fixed', 'http://rhn.redhat.com/errata/RHSA-2013-1028.html', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00001.html', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82010', 'https://puppet.com/security/cve/cve-2013-0269', 'http://secunia.com/advisories/52902', 'http://rhn.redhat.com/errata/RHSA-2013-0701.html', 'http://lists.opensuse.org/opensuse-updates/2013-04/msg00034.html', 'http://rhn.redhat.com/errata/RHSA-2013-0686.html'}
null
GHSA
GHSA-5mf7-26mw-3rqr
Moderate severity vulnerability that affects org.apache.tika:tika-core
A carefully crafted (or fuzzed) file can trigger an infinite loop in Apache Tika's BPGParser in versions of Apache Tika before 1.18.
{'CVE-2018-1338'}
2021-09-01T22:17:58Z
2018-10-17T15:50:45Z
MODERATE
5.5
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1338', 'https://lists.apache.org/thread.html/4d20c5748fb9f836653bc78a1bad991ba8485d82a1e821f70b641932@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-5mf7-26mw-3rqr', 'https://access.redhat.com/errata/RHSA-2018:2669'}
null
GHSA
GHSA-hj5v-574p-mj7c
Regular expression denial of service in py
A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.
{'CVE-2020-29651'}
2021-04-21T20:27:10Z
2021-04-20T16:39:57Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144', 'https://github.com/pytest-dev/py/pull/257', 'https://github.com/advisories/GHSA-hj5v-574p-mj7c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/', 'https://github.com/pytest-dev/py/issues/256'}
null
GHSA
GHSA-r8fh-hq2p-7qhq
High severity vulnerability that affects activerecord
SQL injection vulnerability in activerecord/lib/active_record/connection_adapters/postgresql/quoting.rb in the PostgreSQL adapter for Active Record in Ruby on Rails 4.x before 4.0.7 and 4.1.x before 4.1.3 allows remote attackers to execute arbitrary SQL commands by leveraging improper range quoting.
{'CVE-2014-3483'}
2021-09-17T14:42:50Z
2017-10-24T18:33:36Z
HIGH
0
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3483', 'http://rhn.redhat.com/errata/RHSA-2014-0877.html', 'http://www.debian.org/security/2014/dsa-2982', 'http://secunia.com/advisories/60214', 'https://github.com/advisories/GHSA-r8fh-hq2p-7qhq', 'http://secunia.com/advisories/59971', 'http://www.securityfocus.com/bid/68341', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wDxePLJGZdI/WP7EasCJTA4J', 'http://openwall.com/lists/oss-security/2014/07/02/5'}
null
GHSA
GHSA-xrr9-rh8p-433v
Request smuggling is possible when both chunked TE and content length specified
### Impact Request smuggling is possible when running behind a proxy that doesn't handle Content-Length and Transfer-Encoding properly or doesn't handle alone \n as a headers separator. ### Patches https://github.com/ktorio/ktor/pull/1547 ### Workarounds None except migrating to a better proxy. ### References https://portswigger.net/web-security/request-smuggling https://tools.ietf.org/html/rfc7230#section-9.5
{'CVE-2020-5207'}
2021-01-08T20:32:37Z
2020-01-27T19:28:40Z
LOW
5.4
{'CWE-444'}
{'https://github.com/ktorio/ktor/security/advisories/GHSA-xrr9-rh8p-433v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5207', 'https://github.com/advisories/GHSA-xrr9-rh8p-433v', 'https://github.com/ktorio/ktor/pull/1547'}
null
GHSA
GHSA-g8m7-qhv7-9h5x
Path Traversal in serve-here.js
Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-09-22T18:35:24Z
2019-07-05T21:07:14Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-g8m7-qhv7-9h5x', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/pull/17', 'https://www.npmjs.com/advisories/554', 'https://hackerone.com/reports/569966', 'https://nodesecurity.io/advisories/554', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}
null
GHSA
GHSA-3h99-v4qw-p2h5
Malicious Package in coinpayment
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:57:42Z
2020-09-03T19:41:56Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1382', 'https://github.com/advisories/GHSA-3h99-v4qw-p2h5'}
null
GHSA
GHSA-6c7m-qwxj-mvhp
Broken encryption in EdgeX Foundry
### Summary Broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors. ### Detailed Description The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation in https://github.com/edgexfoundry/app-functions-sdk-go/blob/v1.0.0/pkg/transforms/encryption.go Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation. ### Impact As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new "aes256" transform. #### Vulnerable go modules - github.com/edgexfoundry/app-functions-sdk-go < v2.1.0 - github.com/edgexfoundry/app-functions-sdk-go/v2 < v2.1.0 - github.com/edgexfoundry/app-service-configurable < v2.1.0 #### Vulnerable containers - https://hub.docker.com/r/edgexfoundry/app-service-configurable >= 2.0.0 < v2.1.0 - https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64 >= 2.0.0 < 2.1.0 - https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable < 2.0.0 - https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable-arm64 < 2.0.0 #### Vulnerable Snaps - https://snapcraft.io/edgex-app-service-configurable >= 2.0.0 < 2.1.0 ### Patches Upgrade to 2.1.0 version of app-functions-sdk-go/v2, app-service-configurable, and related docker containers shown below and modify user scripts to use the new "aes256" transform in place of the existing "aes" transform. #### Patched go modules - github.com/edgexfoundry/app-functions-sdk-go/v2 v2.1.0 - github.com/edgexfoundry/app-service-configurable v2.1.0 Modification of user scripts is necessary for full remediation. #### Patched containers - https://hub.docker.com/r/edgexfoundry/app-service-configurable:>=2.1.0 - https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64:>=2.1.0 Modification of user scripts is necessary for full remediation. #### Patched Snaps - https://snapcraft.io/edgex-app-service-configurable >= 2.1.0 Modification of user scripts is necessary for full remediation. ### Workarounds If unable to upgrade, change the processing pipeline to use an HTTPS (TLS 1.3) endpoint to export and skip encryption. ### References * [2.0 documentation](https://docs.edgexfoundry.org/2.0/microservices/application/BuiltIn/#aes) * [2.1 documentation](https://docs.edgexfoundry.org/2.1/microservices/application/BuiltIn/#encryption-deprecated) * [GitHub issue](https://github.com/edgexfoundry/app-functions-sdk-go/issues/968) ### For more information If you have any questions or comments about this advisory: * Contact us in the [Slack #security channel](https://slack.edgexfoundry.org/) * Open an issue in [edgex-go](https://github.com/edgexfoundry/edgex-go) * Email us at [EdgeX-TSC-Security@lists.edgexfoundry.org](mailto:EdgeX-TSC-Security@lists.edgexfoundry.org)
{'CVE-2021-41278'}
2022-04-19T19:03:14Z
2021-11-19T20:55:16Z
MODERATE
5.4
{'CWE-327'}
{'https://github.com/edgexfoundry/app-functions-sdk-go/security/advisories/GHSA-6c7m-qwxj-mvhp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41278', 'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165', 'https://github.com/advisories/GHSA-6c7m-qwxj-mvhp'}
null
GHSA
GHSA-m6j4-8r7p-wpp3
BuddyPress privilege escalation via REST API
### Impact It's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the BuddyPress REST API members endpoint. ### Patches The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue. ### References https://buddypress.org/2021/03/buddypress-7-2-1-security-release/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [HackerOne](https://hackerone.com/wordpress)
{'CVE-2021-21389'}
2021-10-06T17:46:55Z
2021-10-06T17:46:55Z
HIGH
8.1
{'CWE-863'}
{'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3', 'https://codex.buddypress.org/releases/version-7-2-1/', 'https://github.com/advisories/GHSA-m6j4-8r7p-wpp3', 'https://buddypress.org/2021/03/buddypress-7-2-1-security-release/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21389'}
null
GHSA
GHSA-2gfx-95x2-5v3x
Heap buffer overflow in `QuantizedReshape`
### Impact An attacker can cause a heap buffer overflow in `QuantizedReshape` by passing in invalid thresholds for the quantization: ```python import tensorflow as tf tensor = tf.constant([], dtype=tf.qint32) shape = tf.constant([], dtype=tf.int32) input_min = tf.constant([], dtype=tf.float32) input_max = tf.constant([], dtype=tf.float32) tf.raw_ops.QuantizedReshape(tensor=tensor, shape=shape, input_min=input_min, input_max=input_max) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a324ac84e573fba362a5e53d4e74d5de6729933e/tensorflow/core/kernels/quantized_reshape_op.cc#L38-L55) assumes that the 2 arguments are always valid scalars and tries to access the numeric value directly: ```cc const auto& input_min_float_tensor = ctx->input(2); ... const float input_min_float = input_min_float_tensor.flat<float>()(0); const auto& input_max_float_tensor = ctx->input(3); ... const float input_max_float = input_max_float_tensor.flat<float>()(0); ``` However, if any of these tensors is empty, then `.flat<T>()` is an empty buffer and accessing the element at position 0 results in overflow. ### Patches We have patched the issue in GitHub commit [a324ac84e573fba362a5e53d4e74d5de6729933e](https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29536'}
2021-05-21T14:22:32Z
2021-05-21T14:22:32Z
LOW
2.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2gfx-95x2-5v3x', 'https://github.com/tensorflow/tensorflow/commit/a324ac84e573fba362a5e53d4e74d5de6729933e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29536', 'https://github.com/advisories/GHSA-2gfx-95x2-5v3x'}
null
GHSA
GHSA-f8rq-m28h-8hxj
Cross-Site Scripting in htmr
Versions of `htmr` prior to 0.8.7 are vulnerable to Cross-Site Scripting (XSS). The package uses `innerHTML` to unescape HTML entities. This may lead to [DOM-based XSS](https://owasp.org/www-community/attacks/DOM_Based_XSS) through HTML-encoded XSS payloads. This may allow an attacker to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 0.8.7 or later.
null
2021-10-04T21:07:39Z
2020-09-03T15:50:29Z
HIGH
0
{'CWE-79'}
{'https://hackerone.com/reports/753971', 'https://github.com/advisories/GHSA-f8rq-m28h-8hxj', 'https://www.npmjs.com/advisories/1496'}
null
GHSA
GHSA-338v-3958-8v8r
Information disclosure in JBoss Weld
Race condition in JBoss Weld before 2.2.8 and 3.x before 3.0.0 Alpha3 allows remote attackers to obtain information from a previous conversation via vectors related to a stale thread state.
{'CVE-2014-8122'}
2021-08-30T13:39:37Z
2020-06-10T20:54:15Z
MODERATE
0
{'CWE-362'}
{'https://github.com/weld/core/commit/8e413202fa1af08c09c580f444e4fd16874f9c65', 'http://rhn.redhat.com/errata/RHSA-2015-0850.html', 'http://rhn.redhat.com/errata/RHSA-2015-0217.html', 'http://rhn.redhat.com/errata/RHSA-2015-0773.html', 'http://rhn.redhat.com/errata/RHSA-2015-0216.html', 'http://rhn.redhat.com/errata/RHSA-2015-0851.html', 'https://github.com/advisories/GHSA-338v-3958-8v8r', 'https://github.com/weld/core/commit/29fd1107fd30579ad9bb23fae4dc3ba464205745', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100892', 'https://github.com/victims/victims-cve-db/blob/master/database/java/2014/8122.yaml', 'http://www.securityfocus.com/bid/74252', 'http://www.securitytracker.com/id/1031741', 'http://rhn.redhat.com/errata/RHSA-2015-0675.html', 'http://rhn.redhat.com/errata/RHSA-2015-0920.html', 'http://rhn.redhat.com/errata/RHSA-2015-0218.html', 'http://rhn.redhat.com/errata/RHSA-2015-0215.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-8122', 'https://github.com/weld/core/commit/6808b11cd6d97c71a2eed754ed4f955acd789086'}
null
GHSA
GHSA-76qm-4f93-fg6f
Improper Input Validation in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStorage.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
{'CVE-2015-9545'}
2022-04-19T19:03:27Z
2021-12-09T19:30:29Z
MODERATE
7.1
{'CWE-20'}
{'https://github.com/advisories/GHSA-76qm-4f93-fg6f', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Client', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9545', 'https://github.com/ofirdagan/cross-domain-local-storage/issues/17'}
null
GHSA
GHSA-55m5-whcv-c49c
Use of Uninitialized Resource in smallvec
An issue was discovered in the smallvec crate before 0.6.13 for Rust. It can create an uninitialized value of any type, including a reference type.
{'CVE-2018-25023'}
2022-01-06T22:20:28Z
2022-01-06T22:20:28Z
HIGH
7.5
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2018-0018.html', 'https://github.com/advisories/GHSA-55m5-whcv-c49c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25023', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/smallvec/RUSTSEC-2018-0018.md'}
null
GHSA
GHSA-7qmg-qg53-mrp8
Cross-site scripting in Apache JSPWiki
On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to InfoContent.jsp, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.
{'CVE-2019-12404'}
2021-08-17T22:37:43Z
2019-10-11T18:41:59Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12404', 'https://github.com/advisories/GHSA-7qmg-qg53-mrp8', 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-12404'}
null
GHSA
GHSA-vhx6-cp8w-295m
Directory Traversal in serverliujiayi1
Affected versions of `serverliujiayi1` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16095'}
2021-01-14T15:51:21Z
2020-09-01T16:55:45Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-vhx6-cp8w-295m', 'https://nodesecurity.io/advisories/367', 'https://www.npmjs.com/advisories/367', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16095', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverliujiayi1'}
null
GHSA
GHSA-9q3g-m353-cp4p
Denial of Service in Packetbeat
Packetbeat versions prior to 5.6.4 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other PostgreSQL traffic.
{'CVE-2017-11480'}
2022-04-12T22:39:26Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-404'}
{'https://discuss.elastic.co/t/beats-5-6-4-security-update/106739', 'https://github.com/elastic/beats/pull/5457', 'https://nvd.nist.gov/vuln/detail/CVE-2017-11480', 'https://github.com/advisories/GHSA-9q3g-m353-cp4p'}
null
GHSA
GHSA-pc22-3g76-gm6j
Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory
### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. #### Java Code The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability. https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 ### Patches Fix has been applied to the master branch with: * https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89 included in release: 2.4.19 ### References * [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) * [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ### For more information If you have any questions or comments about this advisory: * Email us at [security@swagger.io](mailto:security@swagger.io) #### Original vulnerability report > I'm performing OSS security research under the GitHub Security Lab Bug Bounty program. > I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries. > > - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f > - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac > - https://github.com/github/codeql/pull/4473 > > The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users. > > --- > > This vulnerability exists in the maven plugin. > > This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability. > > https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185 > > This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project. > > https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 > > This is due to a race condition between the call to `delete` and the call to `mkdirs`. > > ```java > // ensure file will always be unique by appending random digits > File outputFolder = File.createTempFile("codegen-", "-tmp"); // Attacker knows the full path of the file that will be generated > // delete the file that was created > outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator. > // and make a directory of the same name > // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory > outputFolder.mkdirs(); > ``` > > This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled. > > The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions. >
{'CVE-2021-21363'}
2022-04-19T19:02:48Z
2021-03-11T03:09:16Z
LOW
9.3
{'CWE-379', 'CWE-378'}
{'https://github.com/advisories/GHSA-pc22-3g76-gm6j', 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89', 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363'}
null
GHSA
GHSA-f523-2f5j-gfcg
Regular Expression Denial of Service in timespan
Affected versions of `timespan` are vulnerable to a regular expression denial of service when parsing dates. The amplification for this vulnerability is significant, with 50,000 characters resulting in the event loop being blocked for around 10 seconds. ## Recommendation No direct patch is available for this vulnerability. Currently, the best available solution is to use a functionally equivalent alternative package. It is also sufficient to ensure that user input is not being passed into `timespan`, or that the maximum length of such user input is drastically reduced. Limiting the input length to 150 characters should be sufficient in most cases.
{'CVE-2017-16115'}
2021-01-08T18:54:54Z
2018-08-29T23:04:14Z
LOW
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16115', 'https://www.npmjs.com/advisories/533', 'https://github.com/indexzero/TimeSpan.js/issues/10', 'https://nodesecurity.io/advisories/533', 'https://github.com/advisories/GHSA-f523-2f5j-gfcg'}
null
GHSA
GHSA-j977-g5vj-j27g
Cross-Site Scripting in scratch-svg-renderer
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.
{'CVE-2020-7750'}
2021-01-07T22:49:02Z
2020-11-09T14:21:17Z
HIGH
9.6
{'CWE-79'}
{'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90', 'https://github.com/advisories/GHSA-j977-g5vj-j27g', 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750'}
null
GHSA
GHSA-pm9p-9926-w68m
Denial of Service in ecstatic
`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory. [Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/) ``` A payload of 22kB caused a lag of 1 second, A payload of 35kB caused a lag of 3 seconds, A payload of 86kB caused the server to crash ``` ## Recommendation Update to version 2.0.0 or later.
{'CVE-2016-10703'}
2021-09-16T18:15:10Z
2017-12-28T22:52:47Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/advisories/GHSA-pm9p-9926-w68m', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01', 'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/', 'https://advisory.checkmarx.net/advisory/CX-2016-4450', 'https://www.npmjs.com/advisories/553', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703'}
null
GHSA
GHSA-jppv-gw3r-w3q8
OS Command Injection in Rake
There is an OS command injection vulnerability in Ruby Rake before 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
{'CVE-2020-8130'}
2021-01-08T20:28:46Z
2020-02-28T16:54:36Z
MODERATE
0
{'CWE-78'}
{'https://github.com/advisories/GHSA-jppv-gw3r-w3q8', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/523CLQ62VRN3VVC52KMPTROCCKY4Z36B/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8130', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXMX4ARNX2JLRJMSH4N3J3UBMUT5CI44/', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00026.html', 'https://usn.ubuntu.com/4295-1/', 'https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee', 'https://hackerone.com/reports/651518'}
null
GHSA
GHSA-q4p3-qw5c-mhpc
Multiple stored XSS in RBAC Admin screens in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks.
{'CVE-2020-11983'}
2021-09-22T21:22:14Z
2020-07-27T16:57:25Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11983', 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E', 'https://github.com/advisories/GHSA-q4p3-qw5c-mhpc'}
null
GHSA
GHSA-2vqq-jgxx-fxjc
Malicious Package in motiv.scss
Version 0.4.20 of `motiv.scss` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T22:07:26Z
2020-09-11T21:24:33Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-2vqq-jgxx-fxjc', 'https://www.npmjs.com/advisories/939'}
null
GHSA
GHSA-mgx3-27hr-mfgp
High severity vulnerability that affects httparty
The httparty gem 0.9.0 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for YAML type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1801'}
2021-09-15T19:00:25Z
2017-10-24T18:33:37Z
HIGH
0
null
{'http://www.securityfocus.com/bid/58260', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1801', 'https://bugzilla.redhat.com/show_bug.cgi?id=917229', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'https://github.com/jnunemaker/httparty/commit/53a812426dd32108d6cba4272b493aa03bc8c031', 'https://github.com/advisories/GHSA-mgx3-27hr-mfgp'}
null
GHSA
GHSA-73jp-3c67-hjfv
Authentication Bypass in passport-azure-ad
Affected versions of `passport-azure-ad` do not recognize the `validateIssuer` setting, which allows remote attackers to bypass authentication via a crafted token. ## Recommendation Version 1.x: Update to version 1.4.6 or later. Version 2.x: Update to version 2.0.1 or later.
{'CVE-2016-7191'}
2021-09-02T19:18:47Z
2018-07-26T15:53:31Z
HIGH
8.1
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-7191', 'https://github.com/advisories/GHSA-73jp-3c67-hjfv', 'https://github.com/AzureAD/passport-azure-ad/blob/master/SECURITY-NOTICE.MD', 'https://support.microsoft.com/kb/3187742', 'https://www.npmjs.com/advisories/151', 'http://www.securityfocus.com/bid/93213', 'https://support.microsoft.com/en-us/kb/3187742', 'http://www.securitytracker.com/id/1036996'}
null
GHSA
GHSA-vwrf-r5r4-7775
Incorrect handling of CORS preflight request headers in hapi
Versions of `hapi` prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden. If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route. ## Recommendation Update to version 11.0.0 or later.
{'CVE-2015-9236'}
2021-01-08T01:57:13Z
2018-06-07T19:43:25Z
MODERATE
0
{'CWE-284'}
{'https://github.com/hapijs/hapi/issues/2840', 'https://github.com/advisories/GHSA-vwrf-r5r4-7775', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9236', 'https://nodesecurity.io/advisories/45', 'https://github.com/hapijs/hapi/issues/2850', 'https://www.npmjs.com/advisories/45'}
null
GHSA
GHSA-558x-2xjg-6232
Allocation of Resources Without Limits or Throttling in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0 - 5.2.19, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
{'CVE-2022-22950'}
2022-04-12T15:23:53Z
2022-04-03T00:01:00Z
MODERATE
6.5
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-22950', 'https://tanzu.vmware.com/security/cve-2022-22950', 'https://github.com/advisories/GHSA-558x-2xjg-6232'}
null
GHSA
GHSA-xgh6-85xh-479p
Regular Expression Denial of Service in npm-user-validate
`npm-user-validate` before version `1.0.1` is vulnerable to a Regular Expression Denial of Service (REDos). The regex that validates user emails took exponentially longer to process long input strings beginning with `@` characters. ### Impact The issue affects the `email` function. If you use this function to process arbitrary user input with no character limit the application may be susceptible to Denial of Service. ### Patches The issue is patched in version 1.0.1 by improving the regular expression used and also enforcing a 254 character limit. ### Workarounds Restrict the character length to a reasonable degree before passing a value to `.emal()`; Also, consider doing a more rigorous sanitizing/validation beforehand.
null
2020-10-16T18:56:26Z
2020-10-16T18:56:26Z
LOW
0
null
{'https://github.com/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p'}
null
GHSA
GHSA-6r86-2jm9-9mh4
File upload restriction bypass in Zenario CMS
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
{'CVE-2022-23043'}
2022-03-04T21:39:12Z
2022-02-25T00:01:07Z
HIGH
7.2
{'CWE-434'}
{'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19', 'https://github.com/advisories/GHSA-6r86-2jm9-9mh4', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043', 'https://fluidattacks.com/advisories/simone/'}
null
GHSA
GHSA-38vq-cjh5-vw7x
Malicious Package in nodes.js
All versions of `nodes.js ` contain malicious code. The package searches and installs globally thousands of packages based on keywords `node`, `react`, `react-native`, `vue`, `angular` and `babel` to fill the system's memory. ## Recommendation Remove the package from your environment and validate what packages are installed.
null
2021-09-30T20:04:09Z
2020-09-03T18:13:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-38vq-cjh5-vw7x', 'https://www.npmjs.com/advisories/1074'}
null
GHSA
GHSA-pc32-x737-74cv
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0704'}
2022-03-29T21:32:26Z
2022-03-17T00:00:48Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://github.com/advisories/GHSA-pc32-x737-74cv', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6'}
null
GHSA
GHSA-gjhx-gxwx-jx9j
Cross-Site Scripting in jqtree
Affected versions of `jqtree` are vulnerable to cross-site scripting in the drag and drop functionality for modifying tree data. When a user attempts to drag a node to a different position in the hierarchy, script content existing within the node will be executed. ## Recommendation Update to 1.3.4 or later.
{'CVE-2016-1000234'}
2021-09-23T21:33:50Z
2020-09-01T15:35:22Z
HIGH
0
{'CWE-79'}
{'https://github.com/mbraak/jqTree/issues/437', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000234', 'https://github.com/advisories/GHSA-gjhx-gxwx-jx9j', 'https://www.npmjs.com/advisories/132'}
null