ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-jh5g-9m4v-9vv9 | Insecure Java Deserialization in Apache Karaf | Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are available within the targets class path. Generally speaking, deserialization of untrusted data does always represent a high security risk and should be prevented. The risk is low as, by default, Karaf uses a limited set of classes in the JMX server class path. It depends of system scoped classes (e.g. jar in the lib folder). | {'CVE-2021-41766'} | 2022-02-04T13:50:57Z | 2022-01-28T22:24:48Z | HIGH | 8.1 | {'CWE-502'} | {'https://github.com/advisories/GHSA-jh5g-9m4v-9vv9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41766', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=b42c82c', 'https://karaf.apache.org/security/cve-2021-41766.txt', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=93a019c', 'https://issues.apache.org/jira/browse/KARAF-7312'} | null |
GHSA | GHSA-v2ch-fc8f-qm33 | Use of Uninitialized Resource in bite. | An issue was discovered in the bite crate through 2020-12-31 for Rust. read::BiteReadExpandedExt::read_framed_max may read from uninitialized memory locations. | {'CVE-2020-36511'} | 2022-01-07T16:24:38Z | 2022-01-06T22:16:57Z | HIGH | 7.5 | {'CWE-908'} | {'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bite/RUSTSEC-2020-0153.md', 'https://github.com/advisories/GHSA-v2ch-fc8f-qm33', 'https://rustsec.org/advisories/RUSTSEC-2020-0153.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36511'} | null |
GHSA | GHSA-435c-qcpm-wjw5 | Malicious Package in fs-extar | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T21:02:03Z | 2020-09-03T17:05:43Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1397', 'https://github.com/advisories/GHSA-435c-qcpm-wjw5'} | null |
GHSA | GHSA-735v-wx75-xmmm | Cross-site Scripting in grav | In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering. | {'CVE-2022-0268'} | 2022-01-31T21:45:05Z | 2022-01-27T18:27:56Z | MODERATE | 5.7 | {'CWE-79'} | {'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/advisories/GHSA-735v-wx75-xmmm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | null |
GHSA | GHSA-hxwc-5vw9-2w4w | NoSQL Injection in loopback-connector-mongodb | Versions of `loopback-connector-mongodb` prior to 3.6.0 are vulnerable to NoSQL Injection. Filters passed to the database query are not properly sanitized which leads to execution of code on the database driver and data leak.
## Recommendation
Upgrade to version 3.6.0 or later. | null | 2021-09-27T15:13:27Z | 2020-09-02T15:52:39Z | HIGH | 0 | {'CWE-89'} | {'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html', 'https://github.com/loopbackio/loopback-connector-mongodb', 'https://www.npmjs.com/advisories/767', 'https://github.com/advisories/GHSA-hxwc-5vw9-2w4w'} | null |
GHSA | GHSA-2xpg-3hx4-fm9r | Out of bounds read in xcb | An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server. | {'CVE-2021-26957'} | 2021-08-25T20:53:20Z | 2021-08-25T20:53:20Z | CRITICAL | 9.8 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26957', 'https://github.com/advisories/GHSA-2xpg-3hx4-fm9r', 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html', 'https://github.com/RustSec/advisory-db/issues/653'} | null |
GHSA | GHSA-q35p-chc6-7x57 | Moderate severity vulnerability that affects org.apache.storm:storm-core | Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons. | {'CVE-2018-1332'} | 2021-09-16T19:20:04Z | 2018-10-17T19:48:18Z | MODERATE | 6.5 | {'CWE-200'} | {'http://www.securityfocus.com/bid/104399', 'https://github.com/advisories/GHSA-q35p-chc6-7x57', 'https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4@%3Cdev.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1332'} | null |
GHSA | GHSA-hwcx-9p4j-7hwj | XML Entity Expansion in Pippo | XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted and will affect other processes on the system. | {'CVE-2019-5442'} | 2021-08-16T15:20:04Z | 2019-06-13T20:22:30Z | HIGH | 7.5 | {'CWE-776'} | {'https://github.com/advisories/GHSA-hwcx-9p4j-7hwj', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5442', 'https://hackerone.com/reports/506791'} | null |
GHSA | GHSA-xhcq-fv7x-grr2 | Critical severity vulnerability that affects org.apache.solr:solr-core | In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side. | {'CVE-2019-0192'} | 2021-09-21T22:33:16Z | 2019-03-14T15:39:45Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0192', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E', 'https://access.redhat.com/errata/RHSA-2019:2413', 'https://lists.apache.org/thread.html/53e4744b14fb7f1810405f8ff5531ab0953a23dd09ce8071ce87e00d@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/ec9c572fb803b26ba0318777977ee6d6a2fb3a2c50d9b4224e541d5d@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978ce4a@%3Cdev.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/107318', 'https://lists.apache.org/thread.html/42c5682f4acd1d03bd963e4f47ae448d7cff66c16b19142773818892@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://github.com/advisories/GHSA-xhcq-fv7x-grr2', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/d0e608c681dfbb16b4da68d99d43fa0ddbd366bb3bcf5bc0d43c56d7@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'} | null |
GHSA | GHSA-4fqx-74rv-638w | SQL Injection | Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data. | {'CVE-2019-3792'} | 2022-04-12T22:10:26Z | 2022-02-15T01:57:18Z | HIGH | 5.6 | {'CWE-89'} | {'https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1', 'https://github.com/advisories/GHSA-4fqx-74rv-638w', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3792', 'https://pivotal.io/security/cve-2019-3792', 'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'} | null |
GHSA | GHSA-45j8-pm75-5v8x | Path Traversal in simplehttpserver | Versions of `simplehttpserver` prior to 0.2.1 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 0.2.1 or later. | {'CVE-2018-16493'} | 2021-01-08T19:57:26Z | 2019-02-07T18:18:04Z | HIGH | 0 | {'CWE-548'} | {'https://github.com/advisories/GHSA-45j8-pm75-5v8x', 'https://hackerone.com/reports/357109', 'https://hackerone.com/reports/432600', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16493', 'https://www.npmjs.com/advisories/968', 'https://www.npmjs.com/advisories/967'} | null |
GHSA | GHSA-v2r2-7qm7-jj6v | Moderate severity vulnerability that affects org.springframework.security:spring-security-core | Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection. | {'CVE-2019-3795'} | 2021-11-03T15:00:51Z | 2019-04-16T15:10:59Z | MODERATE | 3.8 | {'CWE-330', 'CWE-332'} | {'https://github.com/advisories/GHSA-v2r2-7qm7-jj6v', 'http://www.securityfocus.com/bid/107802', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3795', 'https://pivotal.io/security/cve-2019-3795'} | null |
GHSA | GHSA-4p9g-qgx9-397p | Denial of Service in Page Error Handling | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5)
> * CWE-405, CWE-674
> * Status: **DRAFT**
### Problem
Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.
### Solution
Update to TYPO3 versions 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
### Credits
Thanks to Paul Keller, Mathias Bolt Lesniak and Kay Strobach who reported this issue and to TYPO3 framework merger Frank Nägler and to TYPO3 security team member Torben Hansen who fixed the issue.
### References
* [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005) | {'CVE-2021-21359'} | 2022-04-19T19:02:49Z | 2021-03-23T01:54:09Z | MODERATE | 5.5 | {'CWE-674', 'CWE-405'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21359', 'https://github.com/advisories/GHSA-4p9g-qgx9-397p', 'https://packagist.org/packages/typo3/cms-core', 'https://typo3.org/security/advisory/typo3-core-sa-2021-005', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p'} | null |
GHSA | GHSA-w69w-jvc7-wjgv | Missing Authorization in undertow | undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api. | {'CVE-2019-10184'} | 2022-02-11T21:13:25Z | 2019-08-01T19:18:16Z | HIGH | 7.5 | {'CWE-862'} | {'https://access.redhat.com/errata/RHSA-2019:2998', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://security.netapp.com/advisory/ntap-20220210-0016/', 'https://access.redhat.com/errata/RHSA-2019:2936', 'https://access.redhat.com/errata/RHSA-2019:2937', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://github.com/advisories/GHSA-w69w-jvc7-wjgv', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10184', 'https://github.com/undertow-io/undertow/pull/794', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2020:0727'} | null |
GHSA | GHSA-65hp-4vxr-c356 | Arbitrary code execution in Magnolia CMS | An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file. | {'CVE-2021-46363'} | 2022-02-23T21:53:30Z | 2022-02-12T00:00:37Z | HIGH | 7.8 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46363', 'https://github.com/advisories/GHSA-65hp-4vxr-c356', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS'} | null |
GHSA | GHSA-8c56-cpmw-89x7 | Out-of-bounds read in nokogiri | libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839. GitHub is notifying on nokogiri as uses libxml2. | {'CVE-2017-9050'} | 2021-06-30T18:05:24Z | 2017-12-13T21:38:24Z | HIGH | 7.5 | {'CWE-125'} | {'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9050', 'https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E', 'http://www.securityfocus.com/bid/98568', 'http://www.debian.org/security/2017/dsa-3952', 'https://security.gentoo.org/glsa/201711-01', 'http://www.openwall.com/lists/oss-security/2017/05/15/1', 'https://github.com/advisories/GHSA-8c56-cpmw-89x7'} | null |
GHSA | GHSA-4r64-wf76-c53p | In blynk-server a Directory Traversal exists | In blynk-server in Blynk before 0.39.7, Directory Traversal exists via a ../ in a URI that has /static or /static/js at the beginning, as demonstrated by reading the /etc/passwd file. | {'CVE-2018-17785'} | 2022-04-27T14:26:23Z | 2018-10-17T19:52:52Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-17785', 'https://github.com/blynkkk/blynk-server/releases/tag/v0.39.7', 'https://github.com/blynkkk/blynk-server/issues/1256', 'https://github.com/advisories/GHSA-4r64-wf76-c53p'} | null |
GHSA | GHSA-68hw-vfh7-xvg8 | Forced Logout in keycloak-connect | Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely.
## Recommendation
Upgrade to version 4.4.0 or later. | {'CVE-2019-10157'} | 2021-08-16T15:25:09Z | 2019-06-13T20:38:09Z | MODERATE | 5.5 | {'CWE-287', 'CWE-345'} | {'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6', 'https://github.com/advisories/GHSA-68hw-vfh7-xvg8', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'http://www.securityfocus.com/bid/108734', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157', 'https://www.npmjs.com/advisories/978'} | null |
GHSA | GHSA-2452-3rwv-x89c | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300. | {'CVE-2019-1298'} | 2021-03-29T20:56:01Z | 2021-03-29T20:56:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298', 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782', 'https://github.com/advisories/GHSA-2452-3rwv-x89c', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298'} | null |
GHSA | GHSA-4v4g-726h-xvfv | Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime | ### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory. | {'CVE-2021-29445'} | 2021-04-19T18:28:33Z | 2021-04-19T14:59:06Z | MODERATE | 5.9 | {'CWE-208', 'CWE-696', 'CWE-203'} | {'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv', 'https://www.npmjs.com/package/jose-node-esm-runtime', 'https://github.com/advisories/GHSA-4v4g-726h-xvfv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445'} | null |
GHSA | GHSA-q5vh-6whw-x745 | Improper Authorization and Origin Validation Error in OneFuzz | ## Impact
Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance.
To be vulnerable, a OneFuzz deployment must be:
* Version 2.12.0 or greater
* Deployed with the non-default [`--multi_tenant_domain`](https://github.com/microsoft/onefuzz/blob/2.30.0/src/deployment/deploy.py#L1021) option
This can result in read/write access to private data such as:
* Software vulnerability and crash information
* Security testing tools
* Proprietary code and symbols
Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources.
## Patches
This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist.
## Workarounds
Users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option.
## References
You can find an overview of the Microsoft Identity Platform [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview). This vulnerability applies to the multi-tenant application pattern, as described [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant).
## For more information
If you have any questions or comments about this advisory:
* Open an issue in [OneFuzz](https://github.com/microsoft/onefuzz)
* Email us at [fuzzing@microsoft.com](mailto:fuzzing@microsoft.com) | {'CVE-2021-37705'} | 2021-08-26T21:15:35Z | 2021-08-13T20:16:32Z | CRITICAL | 10 | {'CWE-346', 'CWE-285'} | {'https://github.com/microsoft/onefuzz/pull/1153', 'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37705', 'https://github.com/advisories/GHSA-q5vh-6whw-x745', 'https://pypi.org/project/onefuzz/', 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0', 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745'} | null |
GHSA | GHSA-4j54-mxf6-wxx2 | OS Command Injection in pomelo-monitor | pomelo-monitor through 0.3.7 is vulnerable to Command Injection.It allows injection of arbitrary commands as part of 'pomelo-monitor' params. | {'CVE-2020-7620'} | 2021-07-28T21:52:52Z | 2021-05-10T18:37:16Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-POMELOMONITOR-173695', 'https://github.com/advisories/GHSA-4j54-mxf6-wxx2', 'https://github.com/halfblood369/monitor/blob/900b5cadf59edcccac4754e5706a22719925ddb9/lib/processMonitor.js,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7620'} | null |
GHSA | GHSA-33pp-3763-mrfp | Moderate severity vulnerability that affects sprockets | Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding. | {'CVE-2014-7819'} | 2021-08-31T20:36:53Z | 2017-10-24T18:33:36Z | MODERATE | 0 | {'CWE-22'} | {'http://lists.opensuse.org/opensuse-updates/2014-11/msg00105.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7819', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00110.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/wQBeGXqGs3E/JqUMB6fhh3gJ', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00103.html', 'http://lists.opensuse.org/opensuse-updates/2014-11/msg00111.html', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/doAVp0YaTqY/aHFngBqNBoAJ', 'https://github.com/advisories/GHSA-33pp-3763-mrfp'} | null |
GHSA | GHSA-w6rc-q387-vpgq | Moderate severity vulnerability that affects passenger | ext/common/ServerInstanceDir.h in Phusion Passenger gem before 4.0.6 for Ruby allows local users to gain privileges or possibly change the ownership of arbitrary directories via a symlink attack on a directory with a predictable name in /tmp/. | {'CVE-2013-4136'} | 2021-08-30T14:56:55Z | 2017-10-24T18:33:37Z | MODERATE | 0 | {'CWE-59'} | {'https://code.google.com/p/phusion-passenger/issues/detail?id=910', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4136', 'https://github.com/advisories/GHSA-w6rc-q387-vpgq', 'http://rhn.redhat.com/errata/RHSA-2013-1136.html', 'https://github.com/phusion/passenger/blob/release-4.0.6/NEWS', 'https://github.com/phusion/passenger/commit/5483b3292cc2af1c83033eaaadec20dba4dcfd9b', 'http://www.openwall.com/lists/oss-security/2013/07/16/6'} | null |
GHSA | GHSA-mr8h-j9cv-4m8h | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- https://vaadin.com/security/cve-2021-31408 | {'CVE-2021-31408'} | 2021-05-05T13:52:02Z | 2021-04-22T16:11:17Z | MODERATE | 6.3 | {'CWE-287', 'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-31408', 'https://github.com/vaadin/platform/security/advisories/GHSA-mr8h-j9cv-4m8h', 'https://github.com/advisories/GHSA-mr8h-j9cv-4m8h', 'https://vaadin.com/security/cve-2021-31408', 'https://github.com/vaadin/flow/pull/10577'} | null |
GHSA | GHSA-mm7m-xg4h-6m52 | Allocation of Resources Without Limits or Throttling in Apache Tika | A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later. | {'CVE-2019-10094'} | 2021-05-05T22:59:42Z | 2019-08-06T01:43:35Z | HIGH | 7.8 | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10094', 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://github.com/advisories/GHSA-mm7m-xg4h-6m52', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/fe876a649d9d36525dd097fe87ff4dcb3b82bb0fbb3a3d71fb72ef61@%3Cdev.tika.apache.org%3E'} | null |
GHSA | GHSA-99px-7724-484v | Remote Code Execution in Any23 | A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities. | {'CVE-2021-40146'} | 2021-09-24T13:10:32Z | 2021-09-13T20:06:38Z | CRITICAL | 9.8 | null | {'https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40146', 'https://github.com/advisories/GHSA-99px-7724-484v', 'http://www.openwall.com/lists/oss-security/2021/09/11/2'} | null |
GHSA | GHSA-wcv5-vrvr-3rx2 | Integer Overflow or Wraparound in TensorFlow | ### Impact
The Grappler component of TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) in [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L963-L1035):
```cc
for (const auto& output_prop : output_props) {
const PartialTensorShape output_shape(output_prop.shape());
// ...
}
```
The `output_prop` tensor has a shape that is controlled by user input and this can result in triggering one of the `CHECK`s in the `PartialTensorShape` constructor. This is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197).
### Patches
We have patched the issue in GitHub commit [be7b286d40bc68cb0b56f702186cc4837d508058](https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | null | 2022-02-09T23:34:06Z | 2022-02-09T23:34:06Z | MODERATE | 5.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/advisories/GHSA-wcv5-vrvr-3rx2', 'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc4837d508058', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'} | null |
GHSA | GHSA-878w-7gxp-mc63 | SQL Injection in Spring Cloud Task | In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer. | {'CVE-2020-5428'} | 2022-02-09T22:16:53Z | 2022-02-09T22:16:53Z | MODERATE | 6 | {'CWE-89'} | {'https://github.com/advisories/GHSA-878w-7gxp-mc63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5428', 'https://tanzu.vmware.com/security/cve-2020-5428'} | null |
GHSA | GHSA-6x9x-8qw9-9pp6 | High severity vulnerability that affects org.eclipse.jetty:jetty-server | In Eclipse Jetty Server versions 9.2.x and older, 9.3.x (all non HTTP/1.x configurations), and 9.4.x (all HTTP/1.x configurations), when presented with two content-lengths headers, Jetty ignored the second. When presented with a content-length and a chunked encoding header, the content-length was ignored (as per RFC 2616). If an intermediary decided on the shorter length, but still passed on the longer body, then body content could be interpreted by Jetty as a pipelined request. If the intermediary was imposing authorization, the fake pipelined request would bypass that authorization. | {'CVE-2017-7658'} | 2021-07-22T22:29:47Z | 2018-10-19T16:16:38Z | CRITICAL | 9.8 | {'CWE-444'} | {'https://github.com/advisories/GHSA-6x9x-8qw9-9pp6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7658', 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/106566', 'https://www.debian.org/security/2018/dsa-4278', 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535669'} | null |
GHSA | GHSA-48vv-2pmq-9fvv | Moderate severity vulnerability that affects Plone and Zope2 | Zope before 2.13.19, as used in Plone before 4.2.3 and 4.3 before beta 1, does not reseed the pseudo-random number generator (PRNG), which makes it easier for remote attackers to guess the value via unspecified vectors. NOTE: this issue was SPLIT from CVE-2012-5508 due to different vulnerability types (ADT2). | {'CVE-2012-6661'} | 2021-08-31T21:48:50Z | 2018-07-23T19:51:14Z | MODERATE | 0 | {'CWE-336'} | {'http://www.openwall.com/lists/oss-security/2012/11/10/1', 'https://bugs.launchpad.net/zope2/+bug/1071067', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6661', 'https://plone.org/products/plone-hotfix/releases/20121124', 'https://github.com/advisories/GHSA-48vv-2pmq-9fvv', 'https://plone.org/products/plone/security/advisories/20121106/24', 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'} | null |
GHSA | GHSA-cchx-mfrc-fwqr | Improper authentication in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security. | {'CVE-2019-10911'} | 2021-09-30T18:40:16Z | 2020-02-12T18:45:08Z | HIGH | 7.5 | {'CWE-200', 'CWE-287'} | {'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-cookie-hash', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-10911.yaml', 'https://symfony.com/cve-2019-10911', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10911.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/advisories/GHSA-cchx-mfrc-fwqr'} | null |
GHSA | GHSA-h39q-95q5-9jfp | OS Command Injection in ansible | A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts. | {'CVE-2020-1734'} | 2022-02-09T00:11:19Z | 2022-02-09T00:11:19Z | MODERATE | 7.4 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1734', 'https://github.com/advisories/GHSA-h39q-95q5-9jfp', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1734', 'https://github.com/ansible/ansible/issues/67792'} | null |
GHSA | GHSA-p6rw-44q7-3fw4 | Stored XSS in Jupyter nbdime | ### Impact
Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected.
### Patches
Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package.
#### Python
- nbdime 1.x: Patched in v. 1.1.1
- nbdime 2.x: Patched in v. 2.1.1
- nbdime 3.x: Patched in v. 3.1.1
#### npm
- nbdime 6.x version: Patched in 6.1.2
- nbdime 5.x version: Patched in 5.0.2
- nbdime-jupyterlab 1.x version: Patched in 1.0.1
- nbdime-jupyterlab 2.x version: Patched in 2.1.1
### For more information
If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
| {'CVE-2021-41134'} | 2022-04-19T19:03:10Z | 2021-11-08T18:09:27Z | HIGH | 8.7 | {'CWE-79'} | {'https://github.com/advisories/GHSA-p6rw-44q7-3fw4', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea', 'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'} | null |
GHSA | GHSA-36qh-35cm-5w2w | Authentication Bypass by Alternate Name in Apache Tomcat | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. | {'CVE-2021-30640'} | 2022-02-08T21:08:59Z | 2021-08-13T15:21:24Z | MODERATE | 6.5 | {'CWE-287', 'CWE-289'} | {'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30640', 'https://www.debian.org/security/2021/dsa-4986', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-36qh-35cm-5w2w', 'https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4952', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-vhrp-8qx4-vr6c | Incorrect Access Control in Ignition | The Ignition component before 1.16.15, and 2.0.x before 2.0.6, for Laravel has a "fix variable names" feature that can lead to incorrect access control. | {'CVE-2021-43996'} | 2021-11-19T20:18:20Z | 2021-11-19T20:18:20Z | HIGH | 9.8 | {'CWE-284'} | {'https://github.com/facade/ignition/compare/1.16.14...1.16.15', 'https://github.com/facade/ignition/pull/285', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43996', 'https://github.com/facade/ignition/compare/2.0.5...2.0.6', 'https://github.com/advisories/GHSA-vhrp-8qx4-vr6c'} | null |
GHSA | GHSA-fx95-883v-4q4h | Path traversal in github.com/valyala/fasthttp | The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only. | {'CVE-2022-21221'} | 2022-03-29T22:03:10Z | 2022-03-18T00:01:11Z | HIGH | 7.5 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-21221', 'https://github.com/valyala/fasthttp/commit/6b5bc7bb304975147b4af68df54ac214ed2554c1', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMVALYALAFASTHTTP-2407866', 'https://github.com/advisories/GHSA-fx95-883v-4q4h', 'https://github.com/valyala/fasthttp/releases/tag/v1.34.0', 'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8', 'https://github.com/valyala/fasthttp/issues/1226'} | null |
GHSA | GHSA-82x2-g7vr-39wq | Moderate severity vulnerability that affects web-console | Withdrawn, accidental duplicate publish.
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request. | null | 2021-12-02T23:13:09Z | 2018-08-13T20:48:09Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-82x2-g7vr-39wq', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3224'} | null |
GHSA | GHSA-m4hg-5p2m-fm5m | Arbitrary code execution in Magnolia CMS | An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload. | {'CVE-2021-46361'} | 2022-02-23T22:13:18Z | 2022-02-12T00:00:37Z | CRITICAL | 9.8 | null | {'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46361', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS', 'https://github.com/advisories/GHSA-m4hg-5p2m-fm5m'} | null |
GHSA | GHSA-hgpg-593r-hhvp | Cross-site Scripting in Keycloak | A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks. | {'CVE-2020-10748'} | 2022-02-09T00:56:37Z | 2022-02-09T00:56:37Z | MODERATE | 6.1 | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1836786', 'https://github.com/advisories/GHSA-hgpg-593r-hhvp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10748'} | null |
GHSA | GHSA-5rwj-j5m3-3chj | Missing Release of Memory after Effective Lifetime in detect-character-encoding | ### Impact
In detect-character-encoding v0.3.0 and earlier, allocated memory is not released.
### Patches
The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/RC:C)
Base Score: 7.5 (High)
Temporal Score: 7.2 (High)
Since detect-character-encoding is a library, the scoring is based on the “[reasonable worst-case implementation scenario](https://www.first.org/cvss/v3.1/user-guide#3-7-Scoring-Vulnerabilities-in-Software-Libraries-and-Similar)”, namely, using detect-character-encoding in a program accessible over the internet which becomes unavailable when running out of memory. Depending on your specific implementation, the vulnerability’s severity in your program may be different.
### Proof of concept
```js
const express = require("express");
const detectCharacterEncoding = require("detect-character-encoding");
const app = express();
app.get("/", (req, res) => {
detectCharacterEncoding(Buffer.from("foo"));
res.end();
});
app.listen(3000);
```
`hey -n 1000000 http://localhost:3000` ([`hey`](https://github.com/rakyll/hey)) causes the Node.js process to consume more and more memory.
### References
- https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588
- https://github.com/sonicdoe/detect-character-encoding/pull/6 | {'CVE-2021-39176'} | 2022-04-19T19:03:06Z | 2021-09-01T18:25:16Z | HIGH | 7.5 | {'CWE-401'} | {'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39176', 'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/advisories/GHSA-5rwj-j5m3-3chj', 'https://github.com/sonicdoe/detect-character-encoding/security/advisories/GHSA-5rwj-j5m3-3chj'} | null |
GHSA | GHSA-h3wv-47xm-4mg6 | Moderate severity vulnerability that affects com.kitfox.svg:svg-salamander | The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file. | {'CVE-2017-5617'} | 2021-09-13T14:56:02Z | 2018-10-19T16:51:25Z | HIGH | 7.4 | {'CWE-918'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/', 'http://www.securityfocus.com/bid/95871', 'http://www.debian.org/security/2017/dsa-3781', 'https://github.com/blackears/svgSalamander/issues/11', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/', 'https://github.com/advisories/GHSA-h3wv-47xm-4mg6', 'http://www.openwall.com/lists/oss-security/2017/01/29/2', 'http://www.openwall.com/lists/oss-security/2017/01/27/3', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5617', 'https://security.gentoo.org/glsa/202003-11'} | null |
GHSA | GHSA-xw37-57qp-9mm4 | Consensus flaw during block processing in github.com/ethereum/go-ethereum | ### Impact
A consensus-vulnerability in Geth could cause a chain split, where vulnerable versions refuse to accept the canonical chain.
### Description
A flaw was repoted at 2020-08-11 by John Youngseok Yang (Software Platform Lab), where a particular sequence of transactions could cause a consensus failure.
- Tx 1:
- `sender` invokes `caller`.
- `caller` invokes `0xaa`. `0xaa` has 3 wei, does a self-destruct-to-self
- `caller` does a `1 wei` -call to `0xaa`, who thereby has 1 wei (the code in `0xaa` still executed, since the tx is still ongoing, but doesn't redo the selfdestruct, it takes a different path if callvalue is non-zero)
- Tx 2:
- `sender` does a 5-wei call to 0xaa. No exec (since no code).
In geth, the result would be that `0xaa` had `6 wei`, whereas OE reported (correctly) `5` wei. Furthermore, in geth, if the second tx was not executed, the `0xaa` would be destructed, resulting in `0 wei`. Thus obviously wrong.
It was determined that the root cause was this [commit](https://github.com/ethereum/go-ethereum/commit/223b950944f494a5b4e0957fd9f92c48b09037ad) from [this PR](https://github.com/ethereum/go-ethereum/pull/19953). The semantics of `createObject` was subtly changd, into returning a non-nil object (with `deleted=true`) where it previously did not if the account had been destructed. This return value caused the new object to inherit the old `balance`:
```golang
func (s *StateDB) CreateAccount(addr common.Address) {
newObj, prev := s.createObject(addr)
if prev != nil {
newObj.setBalance(prev.data.Balance)
}
}
```
It was determined that the minimal possible correct fix was
```diff
+++ b/core/state/statedb.go
@@ -589,7 +589,10 @@ func (s *StateDB) createObject(addr common.Address) (newobj, prev *stateObject)
s.journal.append(resetObjectChange{prev: prev, prevdestruct: prevdestruct})
}
s.setStateObject(newobj)
- return newobj, prev
+ if prev != nil && !prev.deleted {
+ return newobj, prev
+ }
+ return newobj, nil
```
### Patches
See above. The fix was included in Geth `v1.9.20` "Paragade".
### Credits
The bug was found by @johnyangk and reported via bounty@ethereum.org.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum)
* Email us at [security@ethereum.org](mailto:security@ethereum.org) | {'CVE-2020-26265'} | 2022-04-19T19:02:42Z | 2021-06-29T21:14:16Z | MODERATE | 5.3 | {'CWE-682'} | {'https://github.com/advisories/GHSA-xw37-57qp-9mm4', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-xw37-57qp-9mm4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26265', 'https://github.com/ethereum/go-ethereum/pull/21409', 'https://github.com/ethereum/go-ethereum/releases/tag/v1.9.20'} | null |
GHSA | GHSA-62hc-f8qj-5xc3 | Path traversal in Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server. | {'CVE-2022-28157'} | 2022-04-05T21:21:24Z | 2022-03-30T00:00:22Z | MODERATE | 6.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-62hc-f8qj-5xc3', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28157', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684'} | null |
GHSA | GHSA-36hf-6hp2-9g4c | Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms | In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp. | {'CVE-2019-13237'} | 2022-04-19T20:07:03Z | 2019-11-12T22:58:14Z | MODERATE | 4.3 | {'CWE-200', 'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-13237', 'https://aetsu.github.io/OpenCms', 'https://github.com/advisories/GHSA-36hf-6hp2-9g4c', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html'} | null |
GHSA | GHSA-3gg7-9q2x-79fc | Improper Restriction of Rendered UI Layers or Frames in Keycloak | A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws unnecessarily make the servers more prone to Clickjacking, channel downgrade attacks and other similar client-based attack vectors. | {'CVE-2020-1728'} | 2021-01-20T19:21:17Z | 2020-04-15T21:09:40Z | MODERATE | 0 | {'CWE-1021'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1728', 'https://github.com/advisories/GHSA-3gg7-9q2x-79fc', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1728', 'https://issues.redhat.com/browse/KEYCLOAK-12264'} | null |
GHSA | GHSA-ggq8-j54v-54x8 | Directory Traversal in sspa | Affected versions of `sspa` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16145'} | 2021-01-08T18:47:10Z | 2018-07-23T20:47:02Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16145', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sspa', 'https://www.npmjs.com/advisories/463', 'https://github.com/advisories/GHSA-ggq8-j54v-54x8', 'https://nodesecurity.io/advisories/463'} | null |
GHSA | GHSA-2h3j-m7gr-25xj | Excessive Iteration Denial of Service in Apache PDFBox | A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions. | {'CVE-2021-27807'} | 2022-04-22T18:28:01Z | 2021-06-16T17:56:46Z | MODERATE | 5.5 | {'CWE-834'} | {'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://github.com/advisories/GHSA-2h3j-m7gr-25xj', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-4892', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807', 'https://svn.apache.org/viewvc?view=revision&revision=1886911', 'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E'} | null |
GHSA | GHSA-h73g-8g27-xxcx | Command injection in corenlp-js-prefab | This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.' | {'CVE-2020-28439'} | 2021-07-28T21:34:04Z | 2021-04-13T15:22:58Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28439', 'https://github.com/advisories/GHSA-h73g-8g27-xxcx'} | null |
GHSA | GHSA-h6jh-7gv5-28vg | Bad alloc in `StringNGrams` caused by integer conversion | ### Impact
The implementation of `tf.raw_ops.StringNGrams` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value.
```python
import tensorflow as tf
tf.raw_ops.StringNGrams(
data=['',''],
data_splits=[0,2],
separator=' '*100,
ngram_widths=[-80,0,0,-60],
left_pad=' ',
right_pad=' ',
pad_width=100,
preserve_short_sequences=False)
```
The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/string_ngrams_op.cc#L184) calls `reserve` on a `tstring` with a value that sometimes can be negative if user supplies negative `ngram_widths`. The `reserve` method calls `TF_TString_Reserve` which has an `unsigned long` argument for the size of the buffer. Hence, the implicit conversion transforms the negative value to a large integer.
### Patches
We have patched the issue in GitHub commit [c283e542a3f422420cfdb332414543b62fc4e4a5](https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5).
The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2021-37646'} | 2021-08-25T14:43:34Z | 2021-08-25T14:43:34Z | MODERATE | 5.5 | {'CWE-681'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37646', 'https://github.com/tensorflow/tensorflow/commit/c283e542a3f422420cfdb332414543b62fc4e4a5', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6jh-7gv5-28vg', 'https://github.com/advisories/GHSA-h6jh-7gv5-28vg'} | null |
GHSA | GHSA-49r3-2549-3633 | omniauth-apple allows attacker to fake their email address during authentication | ### Impact
This vulnerability impacts applications using the [omniauth-apple](https://github.com/nhosoya/omniauth-apple) strategy of OmniAuth and using the `info.email` field of OmniAuth's [Auth Hash Schema](https://github.com/omniauth/omniauth/wiki/Auth-Hash-Schema) for any kind of identification. The value of this field may be set to any value of the attacker's choice including email addresses of other users.
For example, an application using omniauth-apple with the following code will be impacted:
```ruby
def omniauth_callback
auth_hash = request.env['omniauth.auth']
@authenticated_user = User.find_by(email: auth_hash.info.email)
end
```
Applications not using `info.email` for identification but are instead using the `uid` field are not impacted in the same manner. Note, these applications may still be negatively affected if the value of `info.email` is being used for other purposes.
### Patches
Applications using affected versions of omniauth-apple are advised to upgrade to omniauth-apple version 1.0.1 or later.
### Workarounds
If unable to upgrade to a patched version, monkey patching `OmniAuth::Strategies::Apple#email` as follows is advised as a workaround:
```ruby
module OmniAuth
module Strategies
class Apple
def email
id_info['email']
end
end
end
end
``` | {'CVE-2020-26254'} | 2022-04-19T19:02:41Z | 2020-12-08T14:18:19Z | LOW | 7.7 | {'CWE-290'} | {'https://github.com/nhosoya/omniauth-apple/blob/master/CHANGELOG.md#101---2020-12-03', 'https://github.com/nhosoya/omniauth-apple/security/advisories/GHSA-49r3-2549-3633', 'https://github.com/advisories/GHSA-49r3-2549-3633', 'https://github.com/nhosoya/omniauth-apple/commit/b37d5409213adae2ca06a67fec14c8d3d07d9016', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26254'} | null |
GHSA | GHSA-22gq-x6pg-752j | Hijacked Environment Variables in openssl.js | The `openssl.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | {'CVE-2017-16065'} | 2021-09-16T20:57:55Z | 2018-08-29T23:45:41Z | CRITICAL | 0 | {'CWE-506', 'CWE-433'} | {'https://www.npmjs.com/advisories/504', 'https://github.com/advisories/GHSA-22gq-x6pg-752j', 'https://nodesecurity.io/advisories/504', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16065'} | null |
GHSA | GHSA-j346-h5wc-rw2m | Incorrect Authorization in Apache Solr | In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin). | {'CVE-2018-11802'} | 2022-02-10T11:35:24Z | 2022-02-09T23:19:26Z | MODERATE | 4.3 | {'CWE-863'} | {'https://github.com/advisories/GHSA-j346-h5wc-rw2m', 'https://www.openwall.com/lists/oss-security/2019/04/24/1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11802'} | null |
GHSA | GHSA-c2gp-86p4-5935 | Use-After-Free in puppeteer | Versions of `puppeteer` prior to 1.13.0 are vulnerable to the Use-After-Free vulnerability in Chromium (CVE-2019-5786). The Chromium FileReader API is vulnerable to Use-After-Free which may lead to Remote Code Execution.
## Recommendation
Upgrade to version 1.13.0 or later. | {'CVE-2019-5786'} | 2021-09-27T16:20:34Z | 2020-09-02T18:25:43Z | MODERATE | 6.5 | {'CWE-416'} | {'https://blog.exodusintel.com/2019/03/20/cve-2019-5786-analysis-and-exploitation/', 'https://crbug.com/936448', 'https://chromereleases.googleblog.com/2019/03/stable-channel-update-for-desktop.html', 'https://www.npmjs.com/advisories/824', 'https://github.com/GoogleChrome/puppeteer/issues/4141', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5786', 'https://github.com/advisories/GHSA-c2gp-86p4-5935', 'https://snyk.io/vuln/SNYK-JS-PUPPETEER-174321'} | null |
GHSA | GHSA-p7c9-jqhq-vr3v | Remote Code Execution in markdown-pdf | Versions of `markdown-pdf` prior to 9.0.0 are vulnerable to Remote Code Execution. The package fails to sanitize HTML code in markdown files. If markdown files with malicious HTML are converted to PDF, the resulting PDF file will execute any JavaScript code in the original markdown file. This may allow attackers to execute Remote Code.
## Recommendation
Upgrade to version 9.0.0 or later. | {'CVE-2018-3770'} | 2021-01-08T18:23:07Z | 2018-07-27T17:03:46Z | HIGH | 0 | {'CWE-22'} | {'https://hackerone.com/reports/360727', 'https://www.npmjs.com/advisories/991', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3770', 'https://github.com/advisories/GHSA-p7c9-jqhq-vr3v'} | null |
GHSA | GHSA-rw4r-h883-8pf9 | Malicious Package in reequest | All versions of `reequest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:06:54Z | 2020-09-02T20:30:02Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-rw4r-h883-8pf9', 'https://www.npmjs.com/advisories/861'} | null |
GHSA | GHSA-4cxw-hq44-r344 | Off-by-one Error in v2fly/v2ray-core | v2fly/v2ray-core prior to 4.44.0 is vulnerable to an off-by-one error. Indexing operations on arrays, slices, or strings should use an index at most one less than the length. If the index is checked for being less than or equal to the length (`<=`), instead of less than the length (`<`), the index could be out of bounds. | {'CVE-2021-4070'} | 2022-03-03T19:17:50Z | 2022-02-24T00:00:52Z | CRITICAL | 9.1 | {'CWE-193'} | {'https://github.com/advisories/GHSA-4cxw-hq44-r344', 'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c', 'https://huntr.dev/bounties/8da19456-4d89-41ef-9781-a41efd6a1877', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4070'} | null |
GHSA | GHSA-gfjr-3jmm-4g9v | Symlink Arbitrary File Overwrite in tar | Versions of `tar` prior to 2.0.0 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `tar` does not verify that extracted symbolic links to not resolve to targets outside of the extraction root directory.
## Recommendation
Update to version 2.0.0 or later | {'CVE-2015-8860'} | 2021-09-10T20:53:23Z | 2017-10-24T18:33:36Z | HIGH | 7.5 | {'CWE-59'} | {'https://www.npmjs.com/advisories/57', 'https://nodesecurity.io/advisories/57', 'https://github.com/npm/npm/releases/tag/v2.7.5', 'https://github.com/advisories/GHSA-gfjr-3jmm-4g9v', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8860', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'} | null |
GHSA | GHSA-x7jh-595q-wq82 | Incorrect Permission Assignment for Critical Resource in Ansible | A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This could lead to the disclosure of sensitive data. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. | {'CVE-2020-1736'} | 2022-02-09T21:59:46Z | 2022-02-09T21:59:46Z | LOW | 3.3 | {'CWE-732'} | {'https://github.com/ansible/ansible/issues/67794', 'https://security.gentoo.org/glsa/202006-11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1736', 'https://github.com/advisories/GHSA-x7jh-595q-wq82', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NYYQP2XJB2TTRP6AKWVMBSPB2DFJNKD/', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPNZWBAUP4ZHUR6PO7U6ZXEKNCX62KZ7/'} | null |
GHSA | GHSA-899g-6q6w-7v94 | Low severity vulnerability that affects m-server | Path Traversal vulnerability in module m-server <1.4.1 allows malicious user to access unauthorized content of any file in the directory tree e.g. /etc/passwd by appending slashes to the URL request. | {'CVE-2018-16485'} | 2021-01-08T19:10:40Z | 2019-02-18T23:58:00Z | LOW | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-16485', 'https://hackerone.com/reports/319795', 'https://github.com/advisories/GHSA-899g-6q6w-7v94'} | null |
GHSA | GHSA-prcg-wp5q-rv7p | Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes | ### Impact
TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary.
For example [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408) calls should be replaced by [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440).
This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs).
### Patches
We have patched the issue in GitHub commits [7c1692bd417eb4f9b33ead749a41166d6080af85](https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85) (merging [#51732](https://github.com/tensorflow/tensorflow/pull/51732)), [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51717](https://github.com/tensorflow/tensorflow/pull/51717)), [a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf](https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf) (merging [#51658](https://github.com/tensorflow/tensorflow/pull/51658)), and [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51973](https://github.com/tensorflow/tensorflow/pull/51973)). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered.
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46890), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51618) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51908). | {'CVE-2021-41197'} | 2021-11-10T19:35:35Z | 2021-11-10T19:35:35Z | MODERATE | 5.5 | {'CWE-190'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/issues/51908', 'https://github.com/advisories/GHSA-prcg-wp5q-rv7p', 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85', 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41197', 'https://github.com/tensorflow/tensorflow/issues/46890', 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'} | null |
GHSA | GHSA-hr32-mgpm-qf2f | Generation of Error Message Containing Sensitive Information in RESTEasy client | A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. | {'CVE-2020-25633'} | 2022-04-19T19:03:26Z | 2021-06-03T23:41:34Z | MODERATE | 5.3 | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://issues.redhat.com/browse/RESTEASY-2820', 'https://github.com/advisories/GHSA-hr32-mgpm-qf2f', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'} | null |
GHSA | GHSA-688c-3x49-6rqj | Moderate severity vulnerability that affects rack-protection | Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0. | {'CVE-2018-1000119'} | 2021-09-02T15:42:02Z | 2018-03-07T22:22:22Z | MODERATE | 5.9 | {'CWE-203'} | {'https://github.com/advisories/GHSA-688c-3x49-6rqj', 'https://github.com/sinatra/rack-protection/pull/98', 'https://www.debian.org/security/2018/dsa-4247', 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109', 'https://access.redhat.com/errata/RHSA-2018:1060', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119'} | null |
GHSA | GHSA-rw6j-rhw7-q94c | Directory Traversal in sly07 | Affected versions of `sly07` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16189'} | 2021-01-08T01:57:46Z | 2018-07-23T20:40:34Z | HIGH | 0 | {'CWE-22'} | {'https://github.com/advisories/GHSA-rw6j-rhw7-q94c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16189', 'https://nodesecurity.io/advisories/442', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sly07', 'https://www.npmjs.com/advisories/442'} | null |
GHSA | GHSA-q69p-5h74-w36f | Content Injection via TileJSON Name in mapbox.js | Versions 1.x prior to 1.6.6 and 2.x prior to 2.2.4 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
If `L.mapbox.map` or `L.mapbox.shareControl` are used in a manner that gives users control of the TileJSON content, it is possible to inject script content into the name value of the TileJSON. After clicking on the share control, the malicious code will execute in the context of the page using Mapbox.js.
## Recommendation
Version 1.x: Update to version 1.6.6 or later.
Version 2.x: Update to version 2.2.4 or later. | {'CVE-2017-1000043'} | 2021-09-16T19:35:51Z | 2018-11-09T17:48:34Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nodesecurity.io/advisories/74', 'https://www.npmjs.com/advisories/74', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000043', 'https://github.com/advisories/GHSA-q69p-5h74-w36f', 'https://hackerone.com/reports/99245'} | null |
GHSA | GHSA-wg5w-vv93-3f7w | Moderate severity vulnerability that affects org.apache.oozie:oozie-core | Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name. | {'CVE-2018-11799'} | 2021-09-21T19:44:14Z | 2018-12-20T22:01:18Z | MODERATE | 6.5 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-11799', 'http://www.securityfocus.com/bid/106266', 'https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E', 'https://github.com/advisories/GHSA-wg5w-vv93-3f7w'} | null |
GHSA | GHSA-pjc4-3w99-j7v4 | Open redirect in Flask-Unchained | This affects the package Flask-Unchained before 0.9.0. When using the the _validate_redirect_url function, it is possible to bypass URL validation and redirect a user to an arbitrary URL by providing multiple back slashes such as \\\evil.com/path. This vulnerability is only exploitable if an alternative WSGI server other than Werkzeug is used, or the default behaviour of Werkzeug is modified using 'autocorrect_location_header=False. | {'CVE-2021-23393'} | 2022-01-10T21:33:31Z | 2021-06-15T15:56:59Z | MODERATE | 5.4 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23393', 'https://snyk.io/vuln/SNYK-PYTHON-FLASKUNCHAINED-1293189', 'https://github.com/advisories/GHSA-pjc4-3w99-j7v4', 'https://github.com/briancappello/flask-unchained/commit/71e36b28166f9ffbe0a991f51127f0984f7e6a40', 'https://github.com/briancappello/flask-unchained/commit/2bfeedf1bc31df851cab8c66df0c432b10406aad'} | null |
GHSA | GHSA-h592-38cm-4ggp | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. | {'CVE-2017-15095'} | 2021-06-09T23:24:12Z | 2018-10-18T17:42:34Z | CRITICAL | 9.8 | {'CWE-184', 'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/issues/1737', 'https://access.redhat.com/errata/RHSA-2018:0481', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://github.com/FasterXML/jackson-databind/issues/1680', 'https://access.redhat.com/errata/RHSA-2018:0478', 'https://access.redhat.com/errata/RHSA-2018:0577', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://access.redhat.com/errata/RHSA-2017:3189', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15095', 'https://security.netapp.com/advisory/ntap-20171214-0003/', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-h592-38cm-4ggp', 'http://www.securityfocus.com/bid/103880', 'https://access.redhat.com/errata/RHSA-2018:0576', 'http://www.securitytracker.com/id/1039769', 'https://access.redhat.com/errata/RHSA-2017:3190', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.debian.org/security/2017/dsa-4037', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://access.redhat.com/errata/RHSA-2018:0480', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2927'} | null |
GHSA | GHSA-465w-gg5p-85c9 | Insufficient Session Expiration in Kiali | An insufficient JWT validation vulnerability was found in Kiali versions 0.4.0 to 1.15.0 and was fixed in Kiali version 1.15.1, wherein a remote attacker could abuse this flaw by stealing a valid JWT cookie and using that to spoof a user session, possibly gaining privileges to view and alter the Istio configuration. | {'CVE-2020-1762'} | 2021-05-18T21:09:01Z | 2021-05-18T21:09:01Z | HIGH | 8.6 | {'CWE-384', 'CWE-613', 'CWE-295'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762', 'https://github.com/kiali/kiali/commit/93f5cd0b6698e8fe8772afb8f35816f6c086aef1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1810387', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1762', 'https://github.com/kiali/kiali/commit/c91a0949683976f621cca213c1193831d63b381c', 'https://kiali.io/news/security-bulletins/kiali-security-001/', 'https://github.com/advisories/GHSA-465w-gg5p-85c9'} | null |
GHSA | GHSA-f9p3-h6cg-2cjr | Improper neutralization of formula elements in yii-helpers | Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. | {'CVE-2022-1544'} | 2022-05-04T03:01:04Z | 2022-05-03T00:00:46Z | HIGH | 0 | {'CWE-1236'} | {'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://github.com/advisories/GHSA-f9p3-h6cg-2cjr'} | null |
GHSA | GHSA-3v44-382q-55f4 | Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main | Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host. | {'CVE-2017-15713'} | 2021-08-31T21:30:37Z | 2018-12-21T17:50:13Z | MODERATE | 6.5 | {'CWE-200'} | {'https://github.com/advisories/GHSA-3v44-382q-55f4', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15713', 'https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E'} | null |
GHSA | GHSA-jf5r-8hm2-f872 | Incorrect hostname / protocol due to unstripped leading control characters. | Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.
If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.
This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:
`````
const parse = require('url-parse')
const express = require('express')
const app = express()
const port = 3000
url = parse(\"\\bjavascript:alert(1)\")
console.log(url)
app.get('/', (req, res) => {
if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")}
})
app.listen(port, () => {
console.log(`Example app listening on port ${port}`)
})
````` | {'CVE-2022-0691'} | 2022-03-29T22:16:44Z | 2022-02-22T00:00:30Z | MODERATE | 6.5 | {'CWE-639'} | {'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691', 'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://github.com/advisories/GHSA-jf5r-8hm2-f872'} | null |
GHSA | GHSA-4r65-35qq-ch8j | Ansible discloses sensitive information in traceback error message | Ansible is an IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. A flaw was found in Ansible Engine's ansible-connection module where sensitive information, such as the Ansible user credentials, is disclosed by default in the traceback error message when Ansible receives an unexpected response from `set_options`. The highest threat from this vulnerability is confidentiality. | {'CVE-2021-3620'} | 2022-04-05T19:53:27Z | 2022-03-04T00:00:17Z | MODERATE | 5.5 | {'CWE-209'} | {'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3620', 'https://bugzilla.redhat.com/show_bug.cgi?id=1975767', 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes', 'https://github.com/pypa/advisory-database/tree/main/vulns/ansible/PYSEC-2022-164.yaml', 'https://github.com/advisories/GHSA-4r65-35qq-ch8j'} | null |
GHSA | GHSA-x45v-pvpg-hcrh | Malicious Package in mysql-koa | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | null | 2021-09-30T20:27:05Z | 2020-09-03T19:54:36Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1136', 'https://github.com/advisories/GHSA-x45v-pvpg-hcrh'} | null |
GHSA | GHSA-63qx-x74g-jcr7 | Path traversal and dereference of symlinks in Argo CD | ### Impact
All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts.
Additionally, it is possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the repository's root directory.
If an attacker with permissions to create or update Applications knows or can guess the full path to a file containing valid YAML, they can create a malicious Helm chart to consume that YAML as values files, thereby gaining access to data they would otherwise have no access to.
The impact can especially become critical in environments that make use of encrypted value files (e.g. using plugins with git-crypt or SOPS) containing sensitive or confidential data, and decrypt these secrets to disk before rendering the Helm chart.
Also, because any error message from `helm template` is passed back to the user, and these error messages are quite verbose, enumeration of files on the repository server's file system is possible.
### Patches
A patch for this vulnerability has been released in the following Argo CD versions:
* v2.3.0
* v2.2.4
* v2.1.9
We urge users of Argo CD to update their installation to one of the fixed versions as listed above.
### Workarounds
No workaround for this issue.
### References
* https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24348
### For more information
* Open an issue in [the Argo CD issue tracker](https://github.com/argoproj/argo-cd/issues) or [discussions](https://github.com/argoproj/argo-cd/discussions)
* Join us on [Slack](https://argoproj.github.io/community/join-slack) in channel `#argo-cd`
### Credits
The path traversal vulnerability was discovered and reported by Moshe Zioni, VP Security Research, [Apiiro](https://www.apiiro.com).
During the development of a fix for the path traversal vulnerability, the Argo CD team discovered the related issue with symbolic links.
The Argo CD team would like to thank Moshe Zioni for the responsible disclosure, and the constructive discussions during handling this issue!
| {'CVE-2022-24348'} | 2022-02-11T22:52:24Z | 2022-02-07T19:06:18Z | HIGH | 7.7 | {'CWE-200', 'CWE-22'} | {'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88', 'https://github.com/argoproj/argo-cd/releases/tag/v2.2.4', 'https://github.com/advisories/GHSA-63qx-x74g-jcr7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24348', 'https://apiiro.com/blog/malicious-kubernetes-helm-charts-can-be-used-to-steal-sensitive-information-from-argo-cd-deployments/', 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-63qx-x74g-jcr7', 'https://github.com/argoproj/argo-cd/releases/tag/v2.1.9'} | null |
GHSA | GHSA-mh83-jcw5-rjh8 | XML External Entity Reference in edu.stanford.nlp:stanford-corenlp | The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | {'CVE-2022-0198'} | 2022-01-20T15:33:36Z | 2022-01-14T21:07:23Z | MODERATE | 6.1 | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0198', 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://github.com/advisories/GHSA-mh83-jcw5-rjh8', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763'} | null |
GHSA | GHSA-7x2h-3v2v-24p9 | Cross-Site Request Forgery in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site request forgery. | {'CVE-2022-0505'} | 2022-02-15T00:17:23Z | 2022-02-09T00:00:31Z | MODERATE | 6.5 | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0505', 'https://github.com/advisories/GHSA-7x2h-3v2v-24p9', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968'} | null |
GHSA | GHSA-g3fq-3v3g-mh32 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs | ### Impact
The Nextcloud dialogs library before 3.1.2 did insufficiently escape text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability.
_Note_: Nextcloud Server employs a strict Content Security Policy that mitigates the risk of these XSS vulnerabilities.
### Patches
The vulnerability has been patched in version 3.1.2. If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.
### Workarounds
Make sure no user-supplied input flows into toasts. | {'CVE-2021-29438'} | 2022-04-15T09:19:28Z | 2021-04-16T19:52:58Z | MODERATE | 4.6 | {'CWE-79', 'CWE-80'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29438', 'https://www.npmjs.com/package/@nextcloud/dialogs', 'https://github.com/nextcloud/nextcloud-dialogs/security/advisories/GHSA-g3fq-3v3g-mh32', 'https://github.com/advisories/GHSA-g3fq-3v3g-mh32'} | null |
GHSA | GHSA-9x9j-836w-8f55 | Incorrect Calculation in the MSR JavaScript Cryptography Library | A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library's Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server's private ECC key (a key leakage attack) or craft an invalid ECDSA signature that nevertheless passes as valid.The security update addresses the vulnerability by fixing the bugs disclosed in the ECC implementation, aka `MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability`. | {'CVE-2020-1026'} | 2022-01-06T19:44:01Z | 2022-01-06T19:44:01Z | HIGH | 9.8 | {'CWE-682'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1026', 'https://github.com/advisories/GHSA-9x9j-836w-8f55', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1026'} | null |
GHSA | GHSA-56r9-v65c-34jm | Malicious Package in radicjs | Version 0.2.1 of `radicjs` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised. | null | 2020-09-03T02:33:37Z | 2020-09-03T02:33:37Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-56r9-v65c-34jm', 'https://www.npmjs.com/advisories/943'} | null |
GHSA | GHSA-8mmf-qp7j-2w24 | Malicious Package in colour-string | Version 1.5.3 of `colour-string` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T21:53:42Z | 2020-09-02T21:35:33Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-8mmf-qp7j-2w24', 'https://www.npmjs.com/advisories/903'} | null |
GHSA | GHSA-9953-fmrw-v4vm | Cross-site Scripting in Apache JSPWiki | A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later. | {'CVE-2022-24948'} | 2022-03-07T13:41:55Z | 2022-02-26T00:00:44Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-9953-fmrw-v4vm', 'http://www.openwall.com/lists/oss-security/2022/02/25/2', 'https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24948'} | null |
GHSA | GHSA-hxf9-7h4c-f5jv | Django-Anymail prone to a timing attack | webhooks/base.py in Anymail (aka django-anymail) before 1.2.1 is prone to a timing attack vulnerability on the WEBHOOK_AUTHORIZATION secret, which allows remote attackers to post arbitrary e-mail tracking events. | {'CVE-2018-6596'} | 2022-04-26T18:07:14Z | 2018-07-12T20:30:40Z | CRITICAL | 9.1 | {'CWE-200'} | {'https://www.debian.org/security/2018/dsa-4107', 'https://bugs.debian.org/889450', 'https://github.com/anymail/django-anymail/commit/c07998304b4a31df4c61deddcb03d3607a04691b', 'https://github.com/anymail/django-anymail/releases/tag/v1.2.1', 'https://github.com/anymail/django-anymail/commit/db586ede1fbb41dce21310ea28ae15a1cf1286c5', 'https://github.com/advisories/GHSA-hxf9-7h4c-f5jv', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6596', 'https://github.com/anymail/django-anymail/releases/tag/v1.3'} | null |
GHSA | GHSA-66gw-ch5v-74v8 | Cross-site scripting (XSS) in Apache ActiveMQ | An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. | {'CVE-2020-13947'} | 2022-02-09T22:01:32Z | 2022-02-09T22:01:32Z | MODERATE | 6.1 | {'CWE-79'} | {'http://activemq.apache.org/security-advisories.data/CVE-2020-13947-announcement.txt', 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cusers.activemq.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13947', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-66gw-ch5v-74v8', 'https://lists.apache.org/thread.html/r021c490028f61c8b6f7e38efb98e61693b0cbb6b99b02238c6fc7d66@%3Ccommits.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cdev.activemq.apache.org%3E'} | null |
GHSA | GHSA-897m-rjf5-jp39 | Prototype Pollution in copy-props | The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality. | {'CVE-2020-28503'} | 2022-01-06T20:35:05Z | 2022-01-06T20:35:05Z | HIGH | 7.3 | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://github.com/gulpjs/copy-props/pull/7', 'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870', 'https://github.com/advisories/GHSA-897m-rjf5-jp39', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047'} | null |
GHSA | GHSA-9qmh-276g-x5pj | Prototype Pollution in immer | ## Overview
Affected versions of immer are vulnerable to Prototype Pollution.
## Proof of exploit
```
const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
// applyPatches({}, [ { op: 'replace', path: [ "__proto__", "polluted" ], value: "yes" } ]);
console.log("After : " + obj.polluted);
```
## Remediation
Version 8.0.1 contains a [fix](https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5) for this vulnerability, updating is recommended. | {'CVE-2020-28477'} | 2021-01-20T21:27:56Z | 2021-01-20T21:27:56Z | HIGH | 0 | {'CWE-471'} | {'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28477', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213', 'https://www.npmjs.com/package/immer', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1061986', 'https://github.com/advisories/GHSA-9qmh-276g-x5pj', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://github.com/immerjs/immer/issues/738'} | null |
GHSA | GHSA-p4jg-pccf-h82c | Insecure Temporary File in SWHKD | SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the repository. | {'CVE-2022-27815'} | 2022-04-19T18:21:49Z | 2022-03-31T00:00:24Z | CRITICAL | 9.1 | {'CWE-377'} | {'https://github.com/waycrate/swhkd/releases', 'https://github.com/advisories/GHSA-p4jg-pccf-h82c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815', 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa', 'http://www.openwall.com/lists/oss-security/2022/04/14/1'} | null |
GHSA | GHSA-35jh-r3h4-6jhm | Command Injection in lodash | `lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function. | {'CVE-2021-23337'} | 2022-04-19T19:03:27Z | 2021-05-06T16:05:51Z | HIGH | 7.2 | {'CWE-77'} | {'https://github.com/advisories/GHSA-35jh-r3h4-6jhm', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931', 'https://snyk.io/vuln/SNYK-JS-LODASH-1040724', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-jq4p-mq33-w375 | Cross-site Scripting when rendering error messages in laminas-form | ### Impact
When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Site Scripting (XSS) attack.
### Patches
The following versions were issued to mitigate the vulnerability:
- 2.17.1
- 3.0.2
- 3.1.1
### Workarounds
At the top of a view script where you call the `formElementErrors()` view helper, place the following code:
```php
use Laminas\Form\ElementInterface;
use Laminas\View\PhpRenderer;
$escapeMessages = function (ElementInterface $formOrElement, PhpRenderer $renderer): void {
$messages = $element->getMessages();
if (! $messages) {
return;
}
$escaped = [];
array_walk_recursive(
$messages,
static function (string $item) use (&$escaped, $renderer): void {
$escaped[] = $renderer->escapeHtml($item);
}
};
$element->setMessages($escaped);
};
```
Before calling `formElementErrors()` with a form, fieldset, or element, call the above closure as follows
```php
// Usage with a form
// $this is the view renderer
$escapeMessages($form, $this);
// Usage with a fieldset
// $this is the view renderer
$escapeMessages($fieldset, $this);
// Usage with a form element
// $this is the view renderer
$escapeMessages($element, $this);
```
### For more information
If you have any questions or comments about this advisory:
* [Open an issue](https://github.com/laminas/laminas-form/issues/new)
* Email us at [security@getlaminas.org](mailto:security@getlaminas.org) | {'CVE-2022-23598'} | 2022-02-11T21:08:54Z | 2022-01-28T23:08:29Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CFF6WJ5I7PSEBRF6I753WKE2BXFBGQXE/', 'https://getlaminas.org/security/advisory/LP-2022-01', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLNABVK26CE4PFL57VLY242FW3QY4CPC/', 'https://github.com/advisories/GHSA-jq4p-mq33-w375', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598'} | null |
GHSA | GHSA-g4xg-fxmg-vcg5 | OS command injection in ripgrep | ripgrep before 13 on Windows allows attackers to trigger execution of arbitrary programs from the current working directory via the -z/--search-zip or --pre flag. | {'CVE-2021-3013'} | 2021-09-07T21:16:11Z | 2021-08-05T19:31:55Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0071.html', 'https://github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md', 'https://github.com/BurntSushi/ripgrep/blob/e48a17e1891e1ea9dd06ba0e48d5fb140ca7c0c4/CHANGELOG.md', 'https://github.com/BurntSushi/ripgrep/blob/master/CHANGELOG.md#1300-2021-06-12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3013', 'https://github.com/advisories/GHSA-g4xg-fxmg-vcg5'} | null |
GHSA | GHSA-hc94-2wfr-4pwf | Downloads Resources over HTTP in appium-chromedriver | Affected versions of `appium-chromedriver` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read items send over HTTP at will. In this case, that includes the chromedriver binary, which may result in remote code execution if overwritten with a malicious binary.
## Recommendation
Update to version 2.9.4 or later. | {'CVE-2016-10557'} | 2021-01-08T18:42:03Z | 2019-02-18T23:40:19Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10557', 'https://github.com/advisories/GHSA-hc94-2wfr-4pwf', 'https://nodesecurity.io/advisories/162', 'https://www.npmjs.com/advisories/162'} | null |
GHSA | GHSA-2457-2263-mm9f | Memory leak in micronaut-core | ### Impact
Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state.
### Patches
The problem is patched in Micronaut 3.2.7 and above.
### Workarounds
The default content type binder can be replaced in an existing Micronaut application to mitigate the issue:
```java
package example;
import java.util.List;
import io.micronaut.context.annotation.Replaces;
import io.micronaut.core.convert.ConversionService;
import io.micronaut.http.MediaType;
import io.micronaut.http.bind.DefaultRequestBinderRegistry;
import io.micronaut.http.bind.binders.RequestArgumentBinder;
import jakarta.inject.Singleton;
@Singleton
@Replaces(DefaultRequestBinderRegistry.class)
class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry {
public FixedRequestBinderRegistry(ConversionService conversionService,
List<RequestArgumentBinder> binders) {
super(conversionService, binders);
}
@Override
protected void registerDefaultConverters(ConversionService<?> conversionService) {
super.registerDefaultConverters(conversionService);
conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> {
try {
return MediaType.of(charSequence);
} catch (IllegalArgumentException e) {
return null;
}
});
}
}
```
### References
Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues)
* Email us at [info@micronaut.io](mailto:info@micronaut.io)
| {'CVE-2022-21700'} | 2022-04-19T19:03:20Z | 2022-01-21T23:19:36Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3', 'https://github.com/advisories/GHSA-2457-2263-mm9f', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21700'} | null |
GHSA | GHSA-96w3-p368-4h8c | Use after free in internment | An issue was discovered in the internment crate through 2020-05-28 for Rust. ArcIntern::drop has a race condition and resultant use-after-free. | {'CVE-2020-35874'} | 2021-08-25T20:46:51Z | 2021-08-25T20:46:51Z | HIGH | 8.1 | {'CWE-362'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35874', 'https://rustsec.org/advisories/RUSTSEC-2020-0017.html', 'https://github.com/advisories/GHSA-96w3-p368-4h8c', 'https://github.com/droundy/internment/issues/11'} | null |
GHSA | GHSA-2mq8-99q7-55wx | Code injection in keycloak | A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-20222'} | 2021-05-13T22:29:51Z | 2021-05-13T22:29:51Z | HIGH | 8.3 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-20222', 'https://github.com/advisories/GHSA-2mq8-99q7-55wx', 'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://access.redhat.com/security/cve/cve-2021-20222', 'https://bugzilla.redhat.com/show_bug.cgi?id=1924606'} | null |
GHSA | GHSA-x48m-gp6r-gp4v | Malicious Package in rate-map | Version 1.0.3 of `rate-map` contains malicious code. The malware breaks functionality of the `purescript-installer` package by rewriting code of the `dl-tar` dependency.
## Recommendation
Upgrade to version 1.0.5 or later. There is no indication of further compromise. | null | 2021-09-30T20:04:54Z | 2020-09-03T18:21:26Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1083', 'https://github.com/advisories/GHSA-x48m-gp6r-gp4v'} | null |
GHSA | GHSA-75p7-527p-w8wp | Server-Side Request Forgery and Open Redirect in AllTube Download | ### Impact
On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured).
The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.)
### Patches
3.0.3 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
The fix requires applying [a patch](https://github.com/Rudloff/alltube/blob/3d092891044f2685ed66c73c870a021bee319c37/patches/youtube-dl-disable-generic.diff) to youtube-dl to disable its generic extractor. If you are using the version of youtube-dl bundled with 3.0.3, it is already patched.
However, if you are using your own unpatched version of youtube-dl **you might still be vulnerable**.
### References
* https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a
* https://github.com/ytdl-org/youtube-dl/issues/30691
| {'CVE-2022-24739'} | 2022-04-19T19:03:26Z | 2022-03-09T15:17:31Z | HIGH | 7.3 | {'CWE-601', 'CWE-918'} | {'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp', 'https://github.com/advisories/GHSA-75p7-527p-w8wp', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | null |
GHSA | GHSA-wqgq-mfvj-6qxp | Malicious Package in koa-body-parse | This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise. | null | 2021-09-30T20:19:48Z | 2020-09-03T19:49:03Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-wqgq-mfvj-6qxp', 'https://www.npmjs.com/advisories/1131'} | null |
GHSA | GHSA-w7x8-cq7r-g5g9 | Cross Site Scripting in Microweber | Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form. | {'CVE-2021-33988'} | 2021-10-25T19:43:39Z | 2021-10-25T19:43:39Z | MODERATE | 0 | {'CWE-79'} | {'https://github.com/advisories/GHSA-w7x8-cq7r-g5g9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33988', 'https://github.com/nck0099/osTicket/issues/2'} | null |
GHSA | GHSA-c52f-pq47-2r9j | plugin.yaml file allows for duplicate entries in helm | ### Impact
During a security audit of Helm's code base, Helm maintainers identified a bug in which a Helm plugin can contain duplicates of the same entry, with the last one always used. If a plugin is compromised, this lowers the level of access that an attacker needs to modify a plugin's install hooks, causing a local execution attack.
To perform this attack, an attacker must have write access to the git repository or plugin archive (.tgz) while being downloaded (which can occur during a MITM attack on a non-SSL connection).
### Patches
This issue has been patched in Helm 2.16.11 and Helm 3.3.2.
### Workarounds
Make sure to install plugins using a secure connection protocol like SSL. | {'CVE-2020-15187'} | 2021-11-19T15:21:03Z | 2021-05-24T16:57:21Z | LOW | 3 | {'CWE-74', 'CWE-694'} | {'https://github.com/helm/helm/security/advisories/GHSA-c52f-pq47-2r9j', 'https://github.com/helm/helm/commit/6aab63765f99050b115f0aec3d6350c85e8da946', 'https://github.com/helm/helm/commit/d9ef5ce8bad512e325390c0011be1244b8380e4b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15187', 'https://github.com/advisories/GHSA-c52f-pq47-2r9j'} | null |
GHSA | GHSA-gfh2-7jg5-653p | Denial of Service in docker2aci | docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain. | {'CVE-2016-8579'} | 2022-04-12T22:38:28Z | 2022-02-15T01:57:18Z | MODERATE | 4 | {'CWE-835'} | {'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f', 'https://github.com/advisories/GHSA-gfh2-7jg5-653p', 'https://www.securityfocus.com/bid/93560', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8579', 'https://github.com/appc/docker2aci/releases/tag/v0.13.0', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8579', 'https://github.com/appc/docker2aci/issues/203'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.