ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-86f3-hf24-76q4
Use of Hard-coded Cryptographic Key in Netmaker
### Impact There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients. ### Patches This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. If you are running these versions, the fix is to perform the following: 1. docker-compose down 2. docker pull gravitl/netmaker:( version ) 3. docker-compose up -d #### Additional Information If you are running **any other version**, you will need to upgrade to one of these three versions. If you have a special circumstance that requires running a different version, let us know and we may be able to build a custom patch. ### For more information If you have any questions or comments about this advisory: * Email us at [info@gravitl.com](mailto:info@gravitl.com)
{'CVE-2022-23650'}
2022-04-19T19:03:24Z
2022-02-22T19:40:23Z
HIGH
7.2
{'CWE-798', 'CWE-321'}
{'https://github.com/advisories/GHSA-86f3-hf24-76q4', 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080', 'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650'}
null
GHSA
GHSA-cf3c-fffp-34qh
High severity vulnerability that affects conference-scheduler-cli
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
{'CVE-2018-14572'}
2021-09-09T14:58:19Z
2018-10-29T19:05:38Z
HIGH
7.8
{'CWE-502', 'CWE-78'}
{'https://github.com/advisories/GHSA-cf3c-fffp-34qh', 'https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/', 'https://github.com/PyconUK/ConferenceScheduler-cli/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14572'}
null
GHSA
GHSA-8864-rhmw-5m6f
Cross-Site Scripting in status-board
All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderDashboard()` function concatenates the `safeDashboard` variable to the printed error message with insufficient sanitization. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15479'}
2021-08-17T22:31:17Z
2019-09-23T18:32:42Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jameswlane/status-board/pull/948', 'https://www.npmjs.com/advisories/1150', 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460295', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15479', 'https://github.com/advisories/GHSA-8864-rhmw-5m6f'}
null
GHSA
GHSA-mx3x-rmrh-9wf6
SQL injection in net.mingsoft:ms-mcms
Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability via /cms/content/list.
{'CVE-2022-26585'}
2022-04-12T21:53:05Z
2022-04-06T00:01:35Z
HIGH
0
null
{'https://github.com/advisories/GHSA-mx3x-rmrh-9wf6', 'https://gitee.com/mingSoft/MCMS/issues/I4W1S9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26585'}
null
GHSA
GHSA-99cg-575x-774p
Improper Input Validation in AKPublic.Verify with attacker-controlled TPM Quote
### Impact An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in `Eventlog.Verify` to spoof events in the TCG log, hence defeating remotely-attested measured-boot. ### Patches This issue is resolved in version 0.4.0. If your usage of this library verifies PCRs using multiple quotes, make sure to use the new method `AKPublic.VerifyAll()` instead of `AKPublic.Verify`.
{'CVE-2022-0317'}
2022-04-19T19:03:20Z
2022-02-01T00:43:17Z
MODERATE
4
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0317', 'https://github.com/advisories/GHSA-99cg-575x-774p', 'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788', 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p'}
null
GHSA
GHSA-gwj5-3vfq-q992
Import loops in account imports, nats-server DoS
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2020-28466.txt>) ## Problem Description An export/import cycle between accounts could crash the nats-server, after consuming CPU and memory. This issue was fixed publicly in <https://github.com/nats-io/nats-server/pull/1731> in November 2020. The need to call this out as a security issue was highlighted by `snyk.io` and we are grateful for their assistance in doing so. Organizations which run a NATS service providing access to accounts run by untrusted third parties are affected. See below for an important caveat if running such a service. ## Affected versions #### NATS Server * Version 2 prior to 2.2.0 + 2.0.0 through and including 2.1.9 are vulnerable. * fixed with nats-io/nats-server PR 1731, commit 2e3c226729 ## Impact The nats-server could be killed, after consuming resources. ## Workaround The import cycle requires at least two accounts to work; if you have open account sign-up, then restricting new account sign-up might hinder an attacker. ## Solution Upgrade the nats-server. ## Caveat on NATS with untrusted users Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers. Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention. Those who are running such services are encouraged to build regularly from git.
null
2021-05-21T16:22:16Z
2021-05-21T16:22:16Z
LOW
7.5
{'CWE-400'}
{'https://github.com/nats-io/nats-server/security/advisories/GHSA-gwj5-3vfq-q992', 'https://github.com/advisories/GHSA-gwj5-3vfq-q992'}
null
GHSA
GHSA-jfq2-rj7f-9gvf
Null pointer dereference in TensorFlow leads to exploitation
Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent.
{'CVE-2018-7576'}
2021-08-03T19:06:32Z
2019-04-24T16:11:27Z
MODERATE
6.5
{'CWE-476'}
{'https://github.com/advisories/GHSA-jfq2-rj7f-9gvf', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7576'}
null
GHSA
GHSA-38hx-3542-8fh3
Malicious code in `electorn`
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information: - IP and IP-based geolocation - home directory name - local username The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
null
2021-10-04T21:21:44Z
2020-10-01T17:09:56Z
CRITICAL
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/1562', 'https://github.com/advisories/GHSA-38hx-3542-8fh3'}
null
GHSA
GHSA-g4c2-ghfg-g5rh
Cross-site Scripting and Open Redirect in Products.ATContentTypes
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on your cache settings. ### Patches A new version 3.0.6 of Products.ATContentTypes has been released with a fix. This version works on Plone 5.2 (Python 2 only) and will be included in Plone 5.2.7. Note that the Products.CMFPlone package has the same problem in the 4.3 series. `plone.app.contenttypes` has the same problem in all versions, see [advisory](https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x). For all unpatched versions of the three packages, you can use the following workaround. ### Workaround Make sure the image_view_fullscreen page is not stored in the cache. In Plone: * Login as Manager and go to Site Setup. * Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable. * Click on the tab 'Caching operations'. * Under 'Legacy template mappings' locate the ruleset 'Content item view'. * From the last column ('Templates') remove 'image_view_fullscreen'. * Click on Save. ### Reporter This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you! ### For more information If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org) This is also the correct address to use when you want to report a possible vulnerability. See [our security report policy](https://plone.org/security/report).
{'CVE-2022-23599'}
2022-02-07T21:16:59Z
2022-01-28T23:10:37Z
MODERATE
4.3
{'CWE-79'}
{'https://github.com/advisories/GHSA-g4c2-ghfg-g5rh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23599', 'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'}
null
GHSA
GHSA-pw59-4qgf-jxr8
Cache Manipulation Attack in Apache Traffic Control
When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture.
{'CVE-2020-17522'}
2022-04-12T22:17:55Z
2021-12-16T19:20:21Z
MODERATE
5.8
{'CWE-732', 'CWE-525'}
{'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E', 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E', 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b', 'https://github.com/advisories/GHSA-pw59-4qgf-jxr8', 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17522'}
null
GHSA
GHSA-fq77-7p7r-83rj
Directory Traversal in Next.js
### Impact - **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected - **Not affected**: Deployments using the `serverless` target - **Not affected**: Deployments using `next export` - **Affected**: Users of Next.js below 9.3.2 We recommend everyone to upgrade regardless of whether you can reproduce the issue or not. ### Patches https://github.com/zeit/next.js/releases/tag/v9.3.2 ### References https://github.com/zeit/next.js/releases/tag/v9.3.2
{'CVE-2020-5284'}
2021-01-08T20:24:24Z
2020-03-30T20:40:50Z
MODERATE
4.4
{'CWE-23'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5284', 'https://github.com/zeit/next.js/releases/tag/v9.3.2', 'https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj', 'https://www.npmjs.com/advisories/1503', 'https://github.com/advisories/GHSA-fq77-7p7r-83rj'}
null
GHSA
GHSA-8v63-cqqc-6r2c
Prototype Pollution in object-path
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3805'}
2022-04-19T19:03:28Z
2021-09-20T20:46:43Z
HIGH
7.5
{'CWE-1321', 'CWE-915'}
{'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://github.com/advisories/GHSA-8v63-cqqc-6r2c', 'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
null
GHSA
GHSA-w7q9-p3jq-fmhm
Uncontrolled resource consumption in jpeg-js
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
{'CVE-2020-8175'}
2021-01-07T23:46:38Z
2020-07-27T15:46:57Z
MODERATE
0
{'CWE-400'}
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://hackerone.com/reports/842462', 'https://github.com/advisories/GHSA-w7q9-p3jq-fmhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'}
null
GHSA
GHSA-mxjj-953w-2c2v
Data corruption in tensorflow-lite
### Impact When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442 Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors. ### Patches We have patched the issue in 8ee24e7949a20 and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15208'}
2021-08-26T15:16:48Z
2020-09-25T18:28:44Z
HIGH
7.4
{'CWE-787', 'CWE-125'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15208', 'https://github.com/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'}
null
GHSA
GHSA-579x-cjvr-cqj9
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
{'CVE-2021-39189'}
2021-09-28T19:05:38Z
2021-09-20T19:53:55Z
MODERATE
5.3
{'CWE-204', 'CWE-203'}
{'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://github.com/advisories/GHSA-579x-cjvr-cqj9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/'}
null
GHSA
GHSA-h3q4-vmw4-cpr5
Path Traversal in Gitea
The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL.
{'CVE-2021-29134'}
2022-03-28T22:26:46Z
2022-03-16T00:00:38Z
MODERATE
5.3
{'CWE-22'}
{'https://github.com/go-gitea/gitea/releases/tag/v1.13.6', 'https://github.com/advisories/GHSA-h3q4-vmw4-cpr5', 'https://github.com/go-gitea/gitea/pull/15125/files', 'https://github.com/go-gitea/gitea/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29134'}
null
GHSA
GHSA-vqw6-72r7-fgw7
OOB read in `MatrixTriangularSolve`
### Impact The implementation of [`MatrixTriangularSolve`](https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails: ```cc void ValidateInputTensors(OpKernelContext* ctx, const Tensor& in0, const Tensor& in1) override { OP_REQUIRES( ctx, in0.dims() >= 2, errors::InvalidArgument("In[0] ndims must be >= 2: ", in0.dims())); OP_REQUIRES( ctx, in1.dims() >= 2, errors::InvalidArgument("In[0] ndims must be >= 2: ", in1.dims())); } void Compute(OpKernelContext* ctx) override { const Tensor& in0 = ctx->input(0); const Tensor& in1 = ctx->input(1); ValidateInputTensors(ctx, in0, in1); MatMulBCast bcast(in0.shape().dim_sizes(), in1.shape().dim_sizes()); ... } ``` Since `OP_REQUIRES` only sets `ctx->status()` to a non-OK value and calls `return`, this allows malicious attackers to trigger an out of bounds read: ```python import tensorflow as tf import numpy as np matrix_array = np.array([]) matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(1,0)),dtype=tf.float32) rhs_array = np.array([]) rhs_tensor = tf.convert_to_tensor(np.reshape(rhs_array,(0,1)),dtype=tf.float32) tf.raw_ops.MatrixTriangularSolve(matrix=matrix_tensor,rhs=rhs_tensor,lower=False,adjoint=False) ``` As the two input tensors are empty, the `OP_REQUIRES` in `ValidateInputTensors` should fire and interrupt execution. However, given the implementation of `OP_REQUIRES`, after the `in0.dims() >= 2` fails, execution moves to the initialization of the `bcast` object. This initialization is done with invalid data and results in heap OOB read. ### Patches We have patched the issue in GitHub commit [480641e3599775a8895254ffbc0fc45621334f68](https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29551'}
2021-05-21T14:23:44Z
2021-05-21T14:23:44Z
LOW
2.5
{'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29551', 'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7', 'https://github.com/advisories/GHSA-vqw6-72r7-fgw7'}
null
GHSA
GHSA-974j-wjxx-wggj
Incorrect Access Control vulnerability in api-platform/core
API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6.
{'CVE-2019-1000011'}
2021-08-17T22:38:33Z
2019-10-14T21:23:26Z
MODERATE
6.5
{'CWE-284'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2019-1000011.yaml', 'https://github.com/api-platform/core/issues/2364', 'https://github.com/advisories/GHSA-974j-wjxx-wggj', 'https://github.com/api-platform/core/pull/2441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000011'}
null
GHSA
GHSA-h5vm-jhq7-w647
Malicious Package in momen
All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:01:28Z
2020-09-02T20:17:13Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-h5vm-jhq7-w647', 'https://www.npmjs.com/advisories/849'}
null
GHSA
GHSA-mmf6-6597-3v6m
Open Redirect in Spring Security OAuth
Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.
{'CVE-2019-11269'}
2021-04-12T21:32:14Z
2019-06-13T20:18:28Z
MODERATE
5.4
{'CWE-601'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11269', 'https://pivotal.io/security/cve-2019-11269', 'https://github.com/advisories/GHSA-mmf6-6597-3v6m', 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html'}
null
GHSA
GHSA-h47j-hc6x-h3qq
Remote Code Execution Vulnerability in NPM mongo-express
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') ``` ### Patches Users should upgrade to version `0.54.0` ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ ### References [Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215) [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758) ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) #### Thanks @JLLeitschuh for finding and reporting this vulnerability
{'CVE-2019-10758'}
2022-04-19T19:02:23Z
2019-12-30T19:30:31Z
HIGH
0
null
{'https://github.com/mongo-express/mongo-express/pull/522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758', 'https://github.com/advisories/GHSA-h47j-hc6x-h3qq', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'}
null
GHSA
GHSA-7c2r-3jqf-c9rw
Moderate severity vulnerability that affects com.fasterxml.jackson.dataformat:jackson-dataformat-xml
XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD.
{'CVE-2016-7051'}
2021-09-02T21:11:04Z
2018-10-18T17:43:28Z
HIGH
8.6
{'CWE-611', 'CWE-918'}
{'https://github.com/FasterXML/jackson-dataformat-xml/issues/211', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7051', 'http://www.securityfocus.com/bid/97688', 'https://github.com/advisories/GHSA-7c2r-3jqf-c9rw', 'https://bugzilla.redhat.com/show_bug.cgi?id=1378673'}
null
GHSA
GHSA-q9p8-33wc-h432
Authenticated users can exploit an enumeration vulnerability in Harbor
### **Impact** Hidde Smit from Cyber Eagle has discovered an User Enumeration flaw in Harbor. The issue is present in the "/users" api endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained via the "search" functionality. Non-administrator users (such as those created via self-registration) can list all usernames and user IDs by sending a GET request to /api/users/search with parameter "username" and value "_", as follows: `curl -X GET "https://<host>/api/users/search?username=_" -H "accept: application/json" --user <user>:<password>` The vulnerability was immediately fixed by the Harbor team and all supported versions were patched. With the patched versions of Harbor, the username is required for search and we have removed the support for querying by email. ### **Patches** If your product uses the affected releases of Harbor, update to either version 2.1.0 or 2.0.3 to fix this issue immediately https://github.com/goharbor/harbor/releases/tag/v2.1.0 https://github.com/goharbor/harbor/releases/tag/v2.0.3 ### **Workarounds** There is no workaround for this issue ### **For more information** If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io View our security policy at https://github.com/goharbor/harbor/security/policy https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13794
{'CVE-2020-13794'}
2021-08-02T14:53:11Z
2021-05-24T16:58:06Z
MODERATE
4.3
{'CWE-862'}
{'https://www.cybereagle.io/blog/cve-2020-13794/', 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9p8-33wc-h432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13794', 'https://github.com/goharbor/harbor/releases', 'https://github.com/advisories/GHSA-q9p8-33wc-h432', 'https://github.com/goharbor/harbor/releases/tag/v2.0.3'}
null
GHSA
GHSA-mjww-934m-h4jw
Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.
{'CVE-2020-29457'}
2021-11-19T20:19:53Z
2021-11-19T20:19:53Z
MODERATE
4.4
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-29457', 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/advisories/GHSA-mjww-934m-h4jw'}
null
GHSA
GHSA-4g88-fppr-53pp
Prototype Pollution in set-value
Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. ## Recommendation If you are using `set-value` 3.x, upgrade to version 3.0.1 or later. If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.
{'CVE-2019-10747'}
2021-08-17T22:17:25Z
2019-08-27T17:43:33Z
CRITICAL
9.8
{'CWE-400'}
{'https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-450213', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/', 'https://github.com/advisories/GHSA-4g88-fppr-53pp', 'https://www.npmjs.com/advisories/1012', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10747'}
null
GHSA
GHSA-mr6r-82x4-f4jj
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key.
{'CVE-2019-10764'}
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
HIGH
7.4
{'CWE-203'}
{'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576', 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://github.com/advisories/GHSA-mr6r-82x4-f4jj', 'https://minerva.crocs.fi.muni.cz/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764'}
null
GHSA
GHSA-438g-fx34-4h9m
Out of bounds read in simple-slab
An issue was discovered in the simple-slab crate before 0.3.3 for Rust. index() allows an out-of-bounds read.
{'CVE-2020-35892'}
2021-08-25T20:48:38Z
2021-08-25T20:48:38Z
CRITICAL
9.1
{'CWE-125'}
{'https://github.com/advisories/GHSA-438g-fx34-4h9m', 'https://github.com/nathansizemore/simple-slab/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35892', 'https://rustsec.org/advisories/RUSTSEC-2020-0039.html'}
null
GHSA
GHSA-4xc9-xhrj-v574
Prototype Pollution in lodash
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.17.11 or later.
{'CVE-2018-16487'}
2021-01-08T19:52:26Z
2019-02-07T18:16:48Z
HIGH
0
{'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16487', 'https://github.com/advisories/GHSA-4xc9-xhrj-v574', 'https://www.npmjs.com/advisories/782', 'https://hackerone.com/reports/380873'}
null
GHSA
GHSA-vx9j-46rh-fqr8
Moderate severity vulnerability that affects actionview
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
{'CVE-2016-2097'}
2021-06-10T19:56:41Z
2017-10-24T18:33:35Z
MODERATE
5.3
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-2097', 'http://www.securitytracker.com/id/1035122', 'http://www.securityfocus.com/bid/83726', 'http://www.debian.org/security/2016/dsa-3509', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'https://github.com/advisories/GHSA-vx9j-46rh-fqr8', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'}
null
GHSA
GHSA-r53w-g4xm-3gc6
Cross-site scripting in Haml
In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.
{'CVE-2017-1002201'}
2022-01-04T19:39:12Z
2019-10-21T21:59:13Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html', 'https://security.gentoo.org/glsa/202007-27', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://github.com/advisories/GHSA-r53w-g4xm-3gc6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'}
null
GHSA
GHSA-786j-5qwq-r36x
Segfault while copying constant resource tensor
### Impact During TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change. ### Patches We have patched the issue in GitHub commit [7731e8dfbe4a56773be5dc94d631611211156659](https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659). The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions
{'CVE-2021-41204'}
2021-11-10T19:12:14Z
2021-11-10T19:12:14Z
MODERATE
5.5
{'CWE-824'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41204', 'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659', 'https://github.com/advisories/GHSA-786j-5qwq-r36x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x'}
null
GHSA
GHSA-fhj9-cjjh-27vm
Critical severity vulnerability that affects activerecord
ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML.
{'CVE-2013-0277'}
2021-12-02T22:36:52Z
2017-10-24T18:33:37Z
CRITICAL
0
null
{'http://secunia.com/advisories/52112', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://github.com/advisories/GHSA-fhj9-cjjh-27vm', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'http://securitytracker.com/id?1028109', 'http://www.debian.org/security/2013/dsa-2620', 'http://www.openwall.com/lists/oss-security/2013/02/11/6', 'http://support.apple.com/kb/HT5784', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://www.osvdb.org/90073', 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain', 'https://puppet.com/security/cve/cve-2013-0277'}
null
GHSA
GHSA-mxh3-2699-98g9
Cross-site Scripting pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0510'}
2022-02-14T22:35:04Z
2022-02-09T00:00:28Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce', 'https://github.com/advisories/GHSA-mxh3-2699-98g9', 'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510'}
null
GHSA
GHSA-pjh3-jv7w-9jpr
Command Injection in gm
Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary. ## Recommendation Update to version 1.21.1 or later.
{'CVE-2015-7982'}
2021-09-23T21:23:49Z
2020-09-01T15:18:55Z
CRITICAL
0
{'CWE-77'}
{'https://www.npmjs.com/advisories/54', 'https://github.com/advisories/GHSA-pjh3-jv7w-9jpr', 'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982'}
null
GHSA
GHSA-86gv-xpwv-jprc
Malicious Package in diamond-clien
All versions of `diamond-clien` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T19:33:55Z
2020-09-03T17:36:00Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1052', 'https://github.com/advisories/GHSA-86gv-xpwv-jprc'}
null
GHSA
GHSA-fp82-2h99-3fpp
Prototype Pollution in async merge-object
The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.
{'CVE-2018-3753'}
2022-04-26T20:44:25Z
2018-09-18T13:47:24Z
CRITICAL
9.8
{'CWE-20', 'CWE-1321'}
{'https://hackerone.com/reports/310706', 'https://github.com/advisories/GHSA-fp82-2h99-3fpp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3753'}
null
GHSA
GHSA-xvch-r4wf-h8w9
Moderate severity vulnerability that affects org.apache.qpid:proton-j
The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise.
{'CVE-2018-17187'}
2021-09-22T16:47:20Z
2018-11-21T22:22:21Z
HIGH
7.4
{'CWE-295'}
{'https://issues.apache.org/jira/browse/PROTON-1962', 'https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E', 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9', 'http://www.securityfocus.com/bid/105935', 'https://qpid.apache.org/cves/CVE-2018-17187.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187'}
null
GHSA
GHSA-3p22-ghq8-v749
Renderers can obtain access to random bluetooth device without permission in Electron
### Impact This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the attacker would have no way of selecting a specific device. All current stable versions of Electron are affected. ### Patches This has been patched and the following Electron versions contain the fix: * `17.0.0-alpha.6` * `16.0.6` * `15.3.5` * `14.2.4` * `13.6.6` ### Workarounds Adding this code to your app can workaround the issue. ```js app.on('web-contents-created', (event, webContents) => { webContents.on('select-bluetooth-device', (event, devices, callback) => { // Prevent default behavior event.preventDefault(); // Cancel the request callback(''); }); }); ``` For more information If you have any questions or comments about this advisory, email us at security@electronjs.org.
{'CVE-2022-21718'}
2022-03-22T19:19:22Z
2022-03-22T18:49:36Z
LOW
3.4
{'CWE-668'}
{'https://github.com/electron/electron/pull/32240', 'https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749', 'https://github.com/advisories/GHSA-3p22-ghq8-v749', 'https://github.com/electron/electron/pull/32178', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21718'}
null
GHSA
GHSA-rpxm-vmr7-5f5f
Data races in convec
Affected versions of this crate unconditionally implement Send/Sync for `ConVec<T>`. This allows users to insert `T` that is not Send or not Sync. This allows users to create data races by using non-Send types like `Arc<Cell<_>>` or `Rc<_>` as `T` in `ConVec<T>`. It is also possible to create data races by using types like `Cell<_>` or `RefCell<_>` as `T` (types that are `Send` but not `Sync`). Such data races can lead to memory corruption.
{'CVE-2020-36445'}
2021-08-25T20:59:15Z
2021-08-25T20:59:15Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0125.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36445', 'https://github.com/advisories/GHSA-rpxm-vmr7-5f5f'}
null
GHSA
GHSA-gj85-pvp5-mvf9
Cross-site Scripting in Beanstalk console
Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting.
{'CVE-2022-0501'}
2022-02-14T22:30:43Z
2022-02-06T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/advisories/GHSA-gj85-pvp5-mvf9'}
null
GHSA
GHSA-wpq7-q8j4-72jg
Moderate severity vulnerability that affects auth0-js
The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it's missing from the authorization response, leaving the client vulnerable to CSRF attacks.
{'CVE-2018-7307'}
2021-09-21T21:52:07Z
2018-03-07T22:22:24Z
HIGH
8.8
{'CWE-352'}
{'https://auth0.com/docs/security/bulletins/cve-2018-7307', 'https://github.com/advisories/GHSA-wpq7-q8j4-72jg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7307'}
null
GHSA
GHSA-4x49-w62v-76q7
Path Traversal in Spring Cloud Config
Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
{'CVE-2019-3799'}
2022-04-21T18:14:50Z
2019-05-23T08:39:23Z
MODERATE
6.5
{'CWE-22'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3799', 'https://pivotal.io/security/cve-2019-3799', 'https://github.com/mpgn/CVE-2019-3799', 'https://github.com/advisories/GHSA-4x49-w62v-76q7'}
null
GHSA
GHSA-pr3h-jjhj-573x
High severity vulnerability that affects sprockets
Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately. Workaround: In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets. This work around will not be possible in all hosting environments and upgrading is advised.
{'CVE-2018-3760'}
2021-12-02T20:12:00Z
2018-06-20T22:18:58Z
HIGH
7.5
{'CWE-200', 'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2018:2245', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3760', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5fhttps://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://access.redhat.com/errata/RHSA-2018:2745', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://github.com/advisories/GHSA-pr3h-jjhj-573x', 'https://www.debian.org/security/2018/dsa-4242'}
null
GHSA
GHSA-4fc4-4p5g-6w89
Cross-site Scripting in CKEditor4
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.18.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse ([@kevinbackhouse](https://github.com/kevinbackhouse)) for recognizing and reporting this vulnerability.
{'CVE-2022-24728'}
2022-03-31T20:51:26Z
2022-03-16T22:47:55Z
MODERATE
5.4
{'CWE-79'}
{'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89', 'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://github.com/advisories/GHSA-4fc4-4p5g-6w89', 'https://www.drupal.org/sa-core-2022-005'}
null
GHSA
GHSA-74vq-h4q8-x6jv
Critical severity vulnerability that affects ansible
Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path.
{'CVE-2019-3828'}
2021-09-02T19:21:55Z
2019-04-15T16:19:19Z
MODERATE
4.2
{'CWE-22'}
{'https://github.com/advisories/GHSA-74vq-h4q8-x6jv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3828'}
null
GHSA
GHSA-5q2r-92f9-4m49
Improper verification of signature threshold in tough
## Impact The tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of unique keys before the metadata is considered valid. AWS would like to thank Erick Tryzelaar of the Google Fuchsia Team for reporting this issue. ## Patches A fix is available in version 0.7.1. ## Workarounds No workarounds to this issue are known. ## References CVE-2020-6174 is assigned to the same issue in the TUF reference implementation. https://github.com/theupdateframework/tuf/pull/974 https://nvd.nist.gov/vuln/detail/CVE-2020-6174 ## For more information If you have any questions or comments about this advisory, [contact AWS Security](https://aws.amazon.com/security/vulnerability-reporting/) at [aws-security@amazon.com](mailto:aws-security@amazon.com).
{'CVE-2020-15093'}
2022-04-19T19:02:29Z
2021-08-25T20:56:55Z
HIGH
8.6
{'CWE-347'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15093', 'https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49', 'https://github.com/theupdateframework/tuf/pull/974', 'https://github.com/advisories/GHSA-5q2r-92f9-4m49', 'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'}
null
GHSA
GHSA-428x-9xc2-m8mj
Division by zero in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero in [the implementation of depthwise convolutions](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96). The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is stricly positive. ### Patches We have patched the issue in GitHub commit [e5b0eec199c2d03de54fd6a7fd9275692218e2bc](https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-21741'}
2022-02-11T16:20:59Z
2022-02-09T23:47:30Z
MODERATE
6.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj', 'https://github.com/advisories/GHSA-428x-9xc2-m8mj', 'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21741', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96'}
null
GHSA
GHSA-3x9f-74h4-2fqr
Denial of Service in SheetJS Pro
SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).
{'CVE-2021-32012'}
2022-02-08T21:02:16Z
2021-07-22T19:48:17Z
MODERATE
5.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32012', 'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://github.com/advisories/GHSA-3x9f-74h4-2fqr', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
GHSA
GHSA-h2j3-gg8w-4858
Malicious Package in buffer-xos
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:12:40Z
2020-09-03T22:12:09Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1251', 'https://github.com/advisories/GHSA-h2j3-gg8w-4858'}
null
GHSA
GHSA-82mm-ffjr-h86c
Authorization bypass in Istio
"In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy."
{'CVE-2020-16844'}
2022-04-20T21:05:23Z
2022-02-15T01:57:18Z
MODERATE
6.8
{'CWE-284'}
{'https://istio.io/latest/news/releases/1.6.x/announcing-1.6.8/', 'https://github.com/istio/istio/releases', 'https://istio.io/latest/news/releases/1.5.x/announcing-1.5.9/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16844', 'https://github.com/istio/istio/releases/tag/1.5.9', 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'https://istio.io/latest/news/security/istio-security-2020-009/', 'https://github.com/advisories/GHSA-82mm-ffjr-h86c', 'https://github.com/istio/istio/releases/tag/1.6.8'}
null
GHSA
GHSA-49rv-g7w5-m8xx
Cross-Site Scripting in @novnc/novnc
Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`. ## Recommendation Upgrade to version 0.6.2 or later.
{'CVE-2017-18635'}
2022-01-04T19:37:09Z
2020-08-28T21:24:59Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18635', 'https://github.com/advisories/GHSA-49rv-g7w5-m8xx', 'https://github.com/novnc/noVNC/releases/tag/v0.6.2', 'https://bugs.launchpad.net/horizon/+bug/1656435', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://usn.ubuntu.com/4522-1/', 'https://github.com/novnc/noVNC/issues/748', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html', 'https://www.npmjs.com/advisories/1204', 'https://github.com/ShielderSec/cve-2017-18635'}
null
GHSA
GHSA-2jm5-2cqf-6vw9
Malicious Package in baes-x
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:29:19Z
2020-09-04T15:30:32Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-2jm5-2cqf-6vw9', 'https://www.npmjs.com/advisories/1351'}
null
GHSA
GHSA-rv39-3qh7-9v7w
Improper Input Validation in Spring Framework
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
{'CVE-2020-5421'}
2022-04-22T17:21:24Z
2021-04-30T17:29:51Z
MODERATE
6.5
{'CWE-35'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210513-0009/', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-rv39-3qh7-9v7w', 'https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d@%3Cuser.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d@%3Cissues.hive.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2020-5421', 'https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-5q99-f34m-67gc
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice.
{'CVE-2018-11784'}
2021-07-14T19:54:49Z
2018-10-17T16:31:02Z
MODERATE
4.3
{'CWE-601'}
{'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/', 'https://github.com/advisories/GHSA-5q99-f34m-67gc', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0485', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11784', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0130', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html', 'https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0002/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html', 'https://usn.ubuntu.com/3787-1/', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:0131', 'http://www.securityfocus.com/bid/105524', 'https://seclists.org/bugtraq/2019/Dec/43'}
null
GHSA
GHSA-fcjw-8rhj-gwwc
Authentication Bypass in Devise
An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.)
{'CVE-2019-16109'}
2021-09-21T16:27:38Z
2019-09-11T23:06:57Z
HIGH
5.3
{'CWE-284'}
{'https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1', 'https://github.com/advisories/GHSA-fcjw-8rhj-gwwc', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise/CVE-2019-16109.yml', 'https://github.com/plataformatec/devise/issues/5071', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16109', 'https://github.com/plataformatec/devise/pull/5132'}
null
GHSA
GHSA-qhx9-7hx7-cp4r
HTTP Request smuggling in bottle
The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.
{'CVE-2020-28473'}
2021-04-07T21:05:21Z
2021-04-07T21:05:21Z
MODERATE
6.8
{'CWE-444'}
{'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108', 'https://github.com/advisories/GHSA-qhx9-7hx7-cp4r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473', 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html', 'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'}
null
GHSA
GHSA-xmq3-hgjx-6997
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0705'}
2022-03-29T21:30:06Z
2022-03-17T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-xmq3-hgjx-6997', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'}
null
GHSA
GHSA-7qqv-r2q4-jxhm
High severity vulnerability that affects privacyIDEA
privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2.
{'CVE-2018-1000809'}
2021-09-03T21:43:08Z
2019-01-14T16:19:31Z
HIGH
7.5
{'CWE-20'}
{'https://github.com/privacyidea/privacyidea/issues/1227', 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809', 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}
null
GHSA
GHSA-2rmm-87v7-34rj
Improper Restriction of XML External Entity Reference in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7.
{'CVE-2022-25312'}
2022-03-15T21:34:09Z
2022-03-06T00:00:17Z
CRITICAL
9.1
{'CWE-611'}
{'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312', 'http://www.openwall.com/lists/oss-security/2022/03/04/2', 'https://github.com/advisories/GHSA-2rmm-87v7-34rj', 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md'}
null
GHSA
GHSA-m5ch-gx8g-rg73
Remote Code Execution in pomelo-monitor
All versions of `pomelo-monitor` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-27T13:39:21Z
2020-09-02T15:43:53Z
HIGH
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-m5ch-gx8g-rg73', 'https://www.npmjs.com/advisories/756'}
null
GHSA
GHSA-2m53-83f3-562j
Prototype pollution in min-dash < 3.8.1
### Impact The `set` method is vulnerable to prototype pollution with specially crafted inputs. ```javascript // insert the following into poc.js and run node poc,js (after installing the package) let parser = require("min-dash"); parser.set({}, [["__proto__"], "polluted"], "success"); console.log(polluted); ``` ### Patches `min-dash>=3.8.1` fix the issue. ### Workarounds No workarounds exist for the issue. ### References Closed via https://github.com/bpmn-io/min-dash/pull/21. ### Credits Credits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly.
null
2022-04-19T19:03:20Z
2022-02-01T00:44:35Z
HIGH
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-2m53-83f3-562j', 'https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j'}
null
GHSA
GHSA-xmgj-5fh3-xjmm
Path traversal when MessageBus::Diagnostics is enabled
### Impact Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels. ### Patches Patched in 3.3.7. ### Workarounds Disable MessageBus::Diagnostics in production like environments.
{'CVE-2021-43840'}
2022-01-03T15:46:44Z
2021-12-17T19:59:13Z
MODERATE
4.2
{'CWE-22'}
{'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840', 'https://github.com/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm'}
null
GHSA
GHSA-q89x-f52w-6hj2
Headers containing newline characters can split messages in hyper
An issue was discovered in the hyper crate before 0.9.18 for Rust. It mishandles newlines in headers.
{'CVE-2017-18587'}
2021-08-25T20:43:04Z
2021-08-25T20:43:04Z
MODERATE
5.3
{'CWE-93'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-18587', 'https://github.com/advisories/GHSA-q89x-f52w-6hj2', 'https://rustsec.org/advisories/RUSTSEC-2017-0002.html'}
null
GHSA
GHSA-xg68-chx2-253g
Prototype Pollution in jquery-deparam
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam allows a malicious user to inject properties into Object.prototype.
{'CVE-2021-20087'}
2021-05-24T19:53:01Z
2021-05-24T19:53:01Z
HIGH
8.8
{'CWE-1321'}
{'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md', 'https://github.com/advisories/GHSA-xg68-chx2-253g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20087'}
null
GHSA
GHSA-hfm8-2q22-h7hv
Cross-site Scripting in pegasus/google-for-jobs
An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
{'CVE-2021-43561'}
2021-11-17T21:24:37Z
2021-11-15T17:39:18Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-hfm8-2q22-h7hv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015'}
null
GHSA
GHSA-jj4f-p7vv-j4v9
Arbitrary code execution in Apache Druid
Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2
{'CVE-2021-26919'}
2021-06-16T17:51:58Z
2021-06-16T17:51:58Z
HIGH
0
{'CWE-668'}
{'https://lists.apache.org/thread.html/r6bc68264170046448f823d12c17fd1fd875251d97d60869f58709872@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re0910cf4c784897774427fecd95912fb565a6bd06d924a55e70bbbfc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E', 'https://github.com/apache/druid/releases/tag/druid-0.20.2', 'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/r470f8c92eb5df45f41b3ae609b6315b6c5ff51b3ceb2f09f00ca620f@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf3ea2a4018e87e6c45d36cf8479af7727dcc276edabd2f7cf59e0c5f@%3Cdev.druid.apache.org%3E', 'https://github.com/advisories/GHSA-jj4f-p7vv-j4v9', 'https://lists.apache.org/thread.html/ra85fa7d31f9bec1148ffd2e4030934927caa8bff89bca9f61f75e697@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E'}
null
GHSA
GHSA-q4hm-fwc9-hmv6
Insecure temporary file used in com.squareup:connect
This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version.
{'CVE-2021-23331'}
2022-04-18T21:55:55Z
2021-06-16T17:53:20Z
LOW
3.3
{'CWE-377'}
{'https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988', 'https://github.com/advisories/GHSA-q4hm-fwc9-hmv6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23331', 'https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613'}
null
GHSA
GHSA-xvjm-fvxx-q3hv
CHECK-fail due to integer overflow
### Impact An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape: ```python import tensorflow as tf input_layer = 2**60-1 sparse_data = tf.raw_ops.SparseSplit( split_dim=1, indices=[(0, 0), (0, 1), (0, 2), (4, 3), (5, 0), (5, 1)], values=[1.0, 1.0, 1.0, 1.0, 1.0, 1.0], shape=(input_layer, input_layer), num_split=2, name=None ) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/0908c2f2397c099338b901b067f6495a5b96760b/tensorflow/core/kernels/sparse_split_op.cc#L66-L70) builds a dense shape without checking that the dimensions would not result in overflow: ```cc sparse::SparseTensor sparse_tensor; OP_REQUIRES_OK(context, sparse::SparseTensor::Create( input_indices, input_values, TensorShape(input_shape.vec<int64>()), &sparse_tensor)); ``` The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status. ```cc template <class Shape> TensorShapeBase<Shape>::TensorShapeBase(gtl::ArraySlice<int64> dim_sizes) { set_tag(REP16); set_data_type(DT_INVALID); TF_CHECK_OK(InitDims(dim_sizes)); } ``` In our scenario, this occurs when adding a dimension from the argument results in overflow: ```cc template <class Shape> Status TensorShapeBase<Shape>::InitDims(gtl::ArraySlice<int64> dim_sizes) { ... Status status = Status::OK(); for (int64 s : dim_sizes) { status.Update(AddDimWithStatus(internal::SubtleMustCopy(s))); if (!status.ok()) { return status; } } } template <class Shape> Status TensorShapeBase<Shape>::AddDimWithStatus(int64 size) { ... int64 new_num_elements; if (kIsPartial && (num_elements() < 0 || size < 0)) { new_num_elements = -1; } else { new_num_elements = MultiplyWithoutOverflow(num_elements(), size); if (TF_PREDICT_FALSE(new_num_elements < 0)) { return errors::Internal("Encountered overflow when multiplying ", num_elements(), " with ", size, ", result: ", new_num_elements); } } ... } ``` This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows. ### Patches We have patched the issue in GitHub commit [4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60](https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by researchers from University of Virginia and University of California, Santa Barbara.
{'CVE-2021-29584'}
2021-05-21T14:26:38Z
2021-05-21T14:26:38Z
LOW
2.5
{'CWE-190'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29584', 'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv', 'https://github.com/advisories/GHSA-xvjm-fvxx-q3hv'}
null
GHSA
GHSA-pm44-7gw9-6g8p
Directory Traversal in uekw1511server
Affected versions of `uekw1511server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16185'}
2021-01-14T15:42:05Z
2020-09-01T18:28:08Z
HIGH
0
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16185', 'https://www.npmjs.com/advisories/450', 'https://github.com/advisories/GHSA-pm44-7gw9-6g8p', 'https://nodesecurity.io/advisories/450', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server'}
null
GHSA
GHSA-g7r5-x7cr-vm3v
Buffer overflow and format vulnerabilities in ncurses
An issue was discovered in the ncurses crate for Rust. There are instr and mvwinstr buffer overflows because interaction with C functions is mishandled.
{'CVE-2019-15548'}
2021-08-25T20:58:29Z
2021-08-25T20:58:29Z
CRITICAL
9.8
{'CWE-119'}
{'https://github.com/jeaye/ncurses-rs/issues/172', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15548', 'https://github.com/advisories/GHSA-g7r5-x7cr-vm3v', 'https://rustsec.org/advisories/RUSTSEC-2019-0006.html', 'https://github.com/RustSec/advisory-db/issues/106'}
null
GHSA
GHSA-w6xj-45gv-fw35
Malicious Package in stream-combine
Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue. ## Recommendation This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen.
null
2020-09-02T15:57:06Z
2020-09-02T15:57:06Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-w6xj-45gv-fw35', 'https://www.npmjs.com/advisories/774'}
null
GHSA
GHSA-427g-2r83-3ccm
Information disclosure through processing of external XML entities
An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure.
{'CVE-2019-8126'}
2021-07-28T15:37:48Z
2019-11-12T22:59:24Z
MODERATE
4.9
{'CWE-776', 'CWE-611'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126', 'https://github.com/advisories/GHSA-427g-2r83-3ccm'}
null
GHSA
GHSA-f6jp-j6w3-w9hm
Improper Authentication in Apache Shiro
Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0.
{'CVE-2021-41303'}
2021-09-30T18:37:25Z
2021-09-20T20:18:11Z
MODERATE
0
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41303', 'https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-f6jp-j6w3-w9hm'}
null
GHSA
GHSA-xwg4-93c6-3h42
Directory Traversal in send
Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`. ## Recommendation Update to version 0.8.4 or later.
{'CVE-2014-6394'}
2021-09-22T17:58:57Z
2017-10-24T18:33:36Z
LOW
0
{'CWE-22'}
{'https://support.apple.com/HT205217', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263', 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html', 'http://www.openwall.com/lists/oss-security/2014/09/24/1', 'http://www.openwall.com/lists/oss-security/2014/09/30/10', 'http://secunia.com/advisories/62170', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727', 'https://www.npmjs.com/advisories/32', 'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html', 'https://nodesecurity.io/advisories/send-directory-traversal', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394', 'http://www.securityfocus.com/bid/70100', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063', 'https://github.com/visionmedia/send/pull/59'}
null
GHSA
GHSA-vfqx-33qm-g869
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource.
{'CVE-2020-36189'}
2022-04-22T18:15:23Z
2021-12-09T19:16:59Z
HIGH
8.1
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/2996', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36189', 'https://github.com/advisories/GHSA-vfqx-33qm-g869', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
GHSA
GHSA-v5vg-g7rq-363w
Prototype Pollution in json-pointer
This affects all versions of package `json-pointer`, up to and including `0.6.1`. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.
{'CVE-2021-23820'}
2021-11-08T17:40:49Z
2021-11-08T17:40:49Z
MODERATE
5.6
{'CWE-843', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23820', 'https://github.com/advisories/GHSA-v5vg-g7rq-363w', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287', 'https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78'}
null
GHSA
GHSA-r5cq-9537-9rpf
Prototype Pollution in mixme
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
{'CVE-2021-28860'}
2022-02-10T23:52:01Z
2022-02-10T23:52:01Z
CRITICAL
9.1
{'CWE-1321'}
{'https://www.npmjs.com/~david', 'https://github.com/advisories/GHSA-r5cq-9537-9rpf', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'http://nodejs.com', 'https://security.netapp.com/advisory/ntap-20210618-0005/', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'https://github.com/adaltas/node-mixme/issues/1'}
null
GHSA
GHSA-64gv-3pqv-299h
Exposure of Sensitive Information to an Unauthorized Actor in Apache Wicket
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
{'CVE-2020-11976'}
2021-06-30T17:55:18Z
2021-05-07T15:54:15Z
HIGH
7.5
{'CWE-200'}
{'https://lists.apache.org/thread.html/reb7ea8141c713b5b19eaf34c00f43aaebf5a1c116130f763c42bdad1@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/re4af65851bf69605cfb68be215eba36d4cdc1a90b95fbc894799d923@%3Cdev.directory.apache.org%3E', 'https://github.com/advisories/GHSA-64gv-3pqv-299h', 'https://lists.apache.org/thread.html/r05340178680eb6b9d4d40d56b5621dd4ae9715e6f41f12ae2288ec49@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rdec0a43afdca59c10416889e07267f3d2fdf4ab929a6e22a2659b6ff@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rd26cae6e30b205e09e4b511d3d962d4f677c0c604f737997ce1b2f22@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r104eeefeb1e9da51f7ef79cef0f9ff12e21ef8559b77801e86b21e16%40%3Cusers.wicket.apache.org%3E', 'https://lists.apache.org/thread.html/r982c626dbce5c995223c4a6ddd7685de3592f8d65ba8372da1f3ce19@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rd0f36b83cc9f28b016ec552f023fb5a59a9ea8db56f2b9dcc6a2f6b7@%3Ccommits.directory.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11976'}
null
GHSA
GHSA-cpv8-6xgr-rmf6
Cross-site Scripting in Dolibarr
In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation.
{'CVE-2021-25955'}
2021-10-21T14:19:19Z
2021-08-30T16:22:46Z
CRITICAL
9
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/advisories/GHSA-cpv8-6xgr-rmf6'}
null
GHSA
GHSA-7r9x-hr76-jr96
Command Injection in giting
All versions of `gitting` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `pull` function is vulnerable through the `branch` variable. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-10-04T20:45:02Z
2020-09-04T17:26:18Z
CRITICAL
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-7r9x-hr76-jr96', 'https://www.npmjs.com/advisories/1446'}
null
GHSA
GHSA-x8xx-x82q-42q3
Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible attack vectors are removed from the original file name. The second issue is that direct access to the images is not access controlled. This is by design, for performance reasons, and documented as such. But it does mean that images not meant to be publicly accessible can be accessed, provided that the image path and filename is correctly deduced and/or guessed, through dictionary attacks and similar.
{'CVE-2022-25336'}
2022-03-08T21:24:56Z
2022-02-19T00:01:25Z
MODERATE
0
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25336', 'https://github.com/advisories/GHSA-x8xx-x82q-42q3', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
null
GHSA
GHSA-gm29-35c7-8cfw
Cross-Site Scripting in buttle
All versions of `buttle` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5422'}
2021-01-08T18:46:08Z
2019-04-08T15:18:38Z
HIGH
0
{'CWE-79'}
{'https://hackerone.com/reports/331110', 'https://github.com/advisories/GHSA-gm29-35c7-8cfw', 'https://hackerone.com/reports/331032', 'https://www.npmjs.com/advisories/667', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5422', 'https://www.npmjs.com/advisories/1009'}
null
GHSA
GHSA-qc4m-gc8r-mg8m
Double free in alpm-rs
An issue was discovered in the alpm-rs crate through 2020-08-20 for Rust. StrcCtx performs improper memory deallocation.
{'CVE-2020-35885'}
2021-08-25T20:48:59Z
2021-08-25T20:48:59Z
CRITICAL
9.8
{'CWE-415'}
{'https://github.com/pigeonhands/rust-arch/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35885', 'https://github.com/advisories/GHSA-qc4m-gc8r-mg8m', 'https://rustsec.org/advisories/RUSTSEC-2020-0032.html'}
null
GHSA
GHSA-2vgm-wxr3-6w2j
Authentication bypass in Apache Shiro
Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass.
{'CVE-2020-13933'}
2022-04-01T20:23:15Z
2021-05-07T15:54:23Z
HIGH
7.5
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13933', 'https://lists.apache.org/thread.html/r4c1e1249e9e1acb868db0c80728c13f448d07333da06a0f1603c0a33@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r8097b81905f2a113ebdf925bcbc6d8c9d6863c807c9ee42e1e7c9293@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-2vgm-wxr3-6w2j', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://lists.apache.org/thread.html/r6ea0224c1971a91dc6ade1f22508119a9c3bd56cef656f0c44bbfabb@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r4506cedc401d6b8de83787f8436aac83956e411d66848c84785db46d@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb5edf49cd1451475dbcf53826ba6ef1bb7872dd6493d6112eb0c2bad@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r18b45d560d76c4260813c802771cc9678aa651fb8340e09366bfa198@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9ea6d8560d6354d41433ad006069904f0ed083527aa348b5999261a7@%3Cdev.geode.apache.org%3E'}
null
GHSA
GHSA-7c7g-72q7-4xhm
Prototype pollution vulnerability in 'deepref'
Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28274'}
2021-10-12T16:27:35Z
2021-10-12T16:27:35Z
CRITICAL
9.8
null
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2', 'https://github.com/advisories/GHSA-7c7g-72q7-4xhm'}
null
GHSA
GHSA-w73w-5m7g-f7qc
Authorization bypass in github.com/dgrijalva/jwt-go
jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1
{'CVE-2020-26160'}
2021-08-02T15:09:03Z
2021-05-18T21:08:21Z
HIGH
7.5
{'CWE-287', 'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26160', 'https://github.com/advisories/GHSA-w73w-5m7g-f7qc', 'https://github.com/dgrijalva/jwt-go/issues/422', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515', 'https://github.com/dgrijalva/jwt-go/issues/462', 'https://github.com/dgrijalva/jwt-go/pull/426'}
null
GHSA
GHSA-xh9g-cp3v-p8q4
Missing Authorization in Crater Invoice
Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability..
{'CVE-2022-0203'}
2022-02-10T22:25:36Z
2022-01-27T00:01:17Z
MODERATE
5.3
{'CWE-862', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992', 'https://github.com/advisories/GHSA-xh9g-cp3v-p8q4'}
null
GHSA
GHSA-xrx6-fmxq-rjj2
Timing attacks in python-rsa
It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA.
{'CVE-2020-25658'}
2021-09-27T18:38:48Z
2021-04-30T17:35:15Z
MODERATE
5.9
{'CWE-327', 'CWE-385'}
{'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed', 'https://github.com/sybrenstuvel/python-rsa/issues/165', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25658', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/', 'https://github.com/advisories/GHSA-xrx6-fmxq-rjj2', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658'}
null
GHSA
GHSA-9534-h433-2rjf
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify
utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10808'}
2021-07-28T18:40:29Z
2021-05-07T16:28:47Z
HIGH
8.8
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://github.com/advisories/GHSA-9534-h433-2rjf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
null
GHSA
GHSA-85j6-f8j6-q26x
Unaligned references in Obstack
An issue was discovered in the obstack crate before 0.1.4 for Rust. Unaligned references can occur.
{'CVE-2020-35894'}
2021-08-25T20:48:12Z
2021-08-25T20:48:12Z
HIGH
7.5
{'CWE-706'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35894', 'https://github.com/advisories/GHSA-85j6-f8j6-q26x', 'https://github.com/petertodd/rust-obstack/issues/4', 'https://rustsec.org/advisories/RUSTSEC-2020-0040.html'}
null
GHSA
GHSA-w8fh-pvq2-x8c4
Malicious npm package: sonatype
The npm `sonatype` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-01-29T18:11:20Z
2021-01-29T18:11:20Z
CRITICAL
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/1596', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755', 'https://github.com/advisories/GHSA-w8fh-pvq2-x8c4'}
null
GHSA
GHSA-3329-pjwv-fjpg
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. Example URL: `https://expected-example.com\@observed-example.com` Escaped string: `https://expected-example.com\\@observed-example.com` (JavaScript strings must escape backslash) Affected versions incorrectly return `observed-example.com`. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html). ### Patches Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant. ### References https://github.com/medialize/URI.js/releases/tag/v1.19.4 (complete fix for this bypass) https://github.com/medialize/URI.js/releases/tag/v1.19.3 (partial fix for this bypass) [PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling) ### For more information If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js ### Reporter credit [Alesandro Ortiz](https://AlesandroOrtiz.com)
{'CVE-2020-26291'}
2022-04-19T19:02:43Z
2020-12-30T23:40:48Z
MODERATE
6.5
{'CWE-20'}
{'https://www.npmjs.com/package/urijs', 'https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg', 'https://github.com/advisories/GHSA-3329-pjwv-fjpg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/advisories/1595', 'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'}
null
GHSA
GHSA-x4cm-m36h-c6qj
Moderate severity vulnerability that affects ansible
An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.
{'CVE-2016-8647'}
2021-09-21T22:09:41Z
2018-10-10T17:23:33Z
MODERATE
4.9
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8647', 'https://github.com/advisories/GHSA-x4cm-m36h-c6qj'}
null
GHSA
GHSA-6p56-wp2h-9hxr
Buffer Overflow in NumPy
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
{'CVE-2021-33430'}
2022-02-08T20:09:25Z
2022-01-07T00:09:39Z
MODERATE
5.3
{'CWE-120'}
{'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e', 'https://github.com/numpy/numpy/issues/18939', 'https://github.com/advisories/GHSA-6p56-wp2h-9hxr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33430'}
null
GHSA
GHSA-vgrx-w6rg-8fqf
Forgeable Public/Private Tokens in jwt-simple
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort. ## Recommendation Update to version 0.3.1 or later. Additionally, be sure to always specify an algorithm in calls to `.decode()`.
{'CVE-2016-10555'}
2021-01-08T01:57:18Z
2018-11-06T23:12:07Z
CRITICAL
0
{'CWE-20'}
{'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97', 'https://www.npmjs.com/advisories/87', 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/hokaccha/node-jwt-simple/pull/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555', 'https://github.com/advisories/GHSA-vgrx-w6rg-8fqf', 'https://github.com/hokaccha/node-jwt-simple/pull/16', 'https://nodesecurity.io/advisories/87'}
null
GHSA
GHSA-v6vv-hhqc-6hh2
Malicious Package in pyramid-proportion
Version 1.0.5 of `pyramid-proportion` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-09-03T19:15:37Z
2020-09-03T19:15:37Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-v6vv-hhqc-6hh2', 'https://www.npmjs.com/advisories/1106'}
null
GHSA
GHSA-qjvf-rmwg-64fr
Downloads Resources over HTTP in install-g-test
Affected versions of `install-g-test` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10630'}
2021-01-08T01:58:34Z
2019-02-18T23:47:20Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10630', 'https://www.npmjs.com/advisories/228', 'https://github.com/advisories/GHSA-qjvf-rmwg-64fr', 'https://nodesecurity.io/advisories/228'}
null
GHSA
GHSA-fx5c-h9f6-rv7c
`CHECK`-fails due to attempting to build a reference tensor
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [Grappler optimizer would attempt to build a tensor using a reference `dtype`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402). This would result in a crash due to a `CHECK`-fail [in the `Tensor` constructor](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781) as reference types are not allowed. ### Patches We have patched the issue in GitHub commit [6b5adc0877de832b2a7c189532dbbbc64622eeb6](https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23588'}
2022-02-11T20:01:09Z
2022-02-09T23:28:07Z
MODERATE
6.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781', 'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23588', 'https://github.com/advisories/GHSA-fx5c-h9f6-rv7c'}
null
GHSA
GHSA-76xq-58hj-vwm2
Malicious Package in test-module-a
All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking, ## Recommendation Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain.
null
2021-09-30T22:06:08Z
2020-09-11T21:16:59Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/929', 'https://github.com/advisories/GHSA-76xq-58hj-vwm2'}
null
GHSA
GHSA-f997-8gxg-r354
Data races in lexer
lexer is a plugin based lexical reader.Affected versions of this crate implements Sync for ReaderResult<T, E> with the trait bound T: Send, E: Send. Since matching on the public enum ReaderResult<T, E> provides access to &T & &E, allowing data race to a non-Sync type T or E. This can result in a memory corruption when multiple threads concurrently access &T or &E. Suggested fix for the bug is change the trait bounds imposed on T & E to be T: Sync, E: Sync.
{'CVE-2020-36458'}
2022-05-05T18:16:26Z
2021-08-25T20:58:09Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://github.com/advisories/GHSA-f997-8gxg-r354', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36458', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lexer/RUSTSEC-2020-0138.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0138.html', 'https://gitlab.com/nathanfaucett/rs-lexer/-/issues/2'}
null