ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-86f3-hf24-76q4 | Use of Hard-coded Cryptographic Key in Netmaker | ### Impact
There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients.
### Patches
This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.0. If you are running these versions, the fix is to perform the following:
1. docker-compose down
2. docker pull gravitl/netmaker:( version )
3. docker-compose up -d
#### Additional Information
If you are running **any other version**, you will need to upgrade to one of these three versions. If you have a special circumstance that requires running a different version, let us know and we may be able to build a custom patch.
### For more information
If you have any questions or comments about this advisory:
* Email us at [info@gravitl.com](mailto:info@gravitl.com)
| {'CVE-2022-23650'} | 2022-04-19T19:03:24Z | 2022-02-22T19:40:23Z | HIGH | 7.2 | {'CWE-798', 'CWE-321'} | {'https://github.com/advisories/GHSA-86f3-hf24-76q4', 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87', 'https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4', 'https://github.com/gravitl/netmaker/commit/e9bce264719f88c30e252ecc754d08f422f4c080', 'https://github.com/gravitl/netmaker/commit/3d4f44ecfe8be4ca38920556ba3b90502ffb4fee', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650'} | null |
GHSA | GHSA-cf3c-fffp-34qh | High severity vulnerability that affects conference-scheduler-cli | In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. | {'CVE-2018-14572'} | 2021-09-09T14:58:19Z | 2018-10-29T19:05:38Z | HIGH | 7.8 | {'CWE-502', 'CWE-78'} | {'https://github.com/advisories/GHSA-cf3c-fffp-34qh', 'https://joel-malwarebenchmark.github.io/blog/2020/04/25/cve-2018-14572-conference-scheduler-cli/', 'https://github.com/PyconUK/ConferenceScheduler-cli/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14572'} | null |
GHSA | GHSA-8864-rhmw-5m6f | Cross-Site Scripting in status-board | All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderDashboard()` function concatenates the `safeDashboard` variable to the printed error message with insufficient sanitization. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | {'CVE-2019-15479'} | 2021-08-17T22:31:17Z | 2019-09-23T18:32:42Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/jameswlane/status-board/pull/948', 'https://www.npmjs.com/advisories/1150', 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460295', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15479', 'https://github.com/advisories/GHSA-8864-rhmw-5m6f'} | null |
GHSA | GHSA-mx3x-rmrh-9wf6 | SQL injection in net.mingsoft:ms-mcms | Mingsoft MCMS v5.2.7 was discovered to contain a SQL injection vulnerability via /cms/content/list. | {'CVE-2022-26585'} | 2022-04-12T21:53:05Z | 2022-04-06T00:01:35Z | HIGH | 0 | null | {'https://github.com/advisories/GHSA-mx3x-rmrh-9wf6', 'https://gitee.com/mingSoft/MCMS/issues/I4W1S9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26585'} | null |
GHSA | GHSA-99cg-575x-774p | Improper Input Validation in AKPublic.Verify with attacker-controlled TPM Quote | ### Impact
An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication performed by quote verification, meaning a local attacker could couple this vulnerability with a maliciously-crafted TCG log in `Eventlog.Verify` to spoof events in the TCG log, hence defeating remotely-attested measured-boot.
### Patches
This issue is resolved in version 0.4.0. If your usage of this library verifies PCRs using multiple quotes, make sure to use the new method `AKPublic.VerifyAll()` instead of `AKPublic.Verify`. | {'CVE-2022-0317'} | 2022-04-19T19:03:20Z | 2022-02-01T00:43:17Z | MODERATE | 4 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0317', 'https://github.com/advisories/GHSA-99cg-575x-774p', 'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788', 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p'} | null |
GHSA | GHSA-gwj5-3vfq-q992 | Import loops in account imports, nats-server DoS | (This advisory is canonically <https://advisories.nats.io/CVE/CVE-2020-28466.txt>)
## Problem Description
An export/import cycle between accounts could crash the nats-server, after consuming CPU and memory.
This issue was fixed publicly in <https://github.com/nats-io/nats-server/pull/1731> in November 2020.
The need to call this out as a security issue was highlighted by `snyk.io` and we are grateful for their assistance in doing so.
Organizations which run a NATS service providing access to accounts run by untrusted third parties are affected.
See below for an important caveat if running such a service.
## Affected versions
#### NATS Server
* Version 2 prior to 2.2.0
+ 2.0.0 through and including 2.1.9 are vulnerable.
* fixed with nats-io/nats-server PR 1731, commit 2e3c226729
## Impact
The nats-server could be killed, after consuming resources.
## Workaround
The import cycle requires at least two accounts to work; if you have open account sign-up, then restricting new account sign-up might hinder an attacker.
## Solution
Upgrade the nats-server.
## Caveat on NATS with untrusted users
Running a NATS service which is exposed to untrusted users presents a heightened risk.
Any remote execution flaw or equivalent seriousness, or denial-of-service by unauthenticated users, will lead to prompt releases by the NATS maintainers.
Fixes for denial of service issues with no threat of remote execution, when limited to account holders, are likely to just be committed to the main development branch with no special attention.
Those who are running such services are encouraged to build regularly from git. | null | 2021-05-21T16:22:16Z | 2021-05-21T16:22:16Z | LOW | 7.5 | {'CWE-400'} | {'https://github.com/nats-io/nats-server/security/advisories/GHSA-gwj5-3vfq-q992', 'https://github.com/advisories/GHSA-gwj5-3vfq-q992'} | null |
GHSA | GHSA-jfq2-rj7f-9gvf | Null pointer dereference in TensorFlow leads to exploitation | Google TensorFlow 1.6.x and earlier is affected by: Null Pointer Dereference. The type of exploitation is: context-dependent. | {'CVE-2018-7576'} | 2021-08-03T19:06:32Z | 2019-04-24T16:11:27Z | MODERATE | 6.5 | {'CWE-476'} | {'https://github.com/advisories/GHSA-jfq2-rj7f-9gvf', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2018-002.md', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7576'} | null |
GHSA | GHSA-38hx-3542-8fh3 | Malicious code in `electorn` | npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:
- IP and IP-based geolocation
- home directory name
- local username
The malicious packages have been removed from the npm registry and the leaked content removed from GitHub. | null | 2021-10-04T21:21:44Z | 2020-10-01T17:09:56Z | CRITICAL | 0 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1562', 'https://github.com/advisories/GHSA-38hx-3542-8fh3'} | null |
GHSA | GHSA-g4c2-ghfg-g5rh | Cross-site Scripting and Open Redirect in Products.ATContentTypes | ### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Usually only anonymous users are affected, but this depends on your cache settings.
### Patches
A new version 3.0.6 of Products.ATContentTypes has been released with a fix.
This version works on Plone 5.2 (Python 2 only) and will be included in Plone 5.2.7.
Note that the Products.CMFPlone package has the same problem in the 4.3 series.
`plone.app.contenttypes` has the same problem in all versions, see [advisory](https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x).
For all unpatched versions of the three packages, you can use the following workaround.
### Workaround
Make sure the image_view_fullscreen page is not stored in the cache.
In Plone:
* Login as Manager and go to Site Setup.
* Go to the 'Caching' control panel. If this does not exist, or 'Enable caching' is not checked, you should normally not be vulnerable.
* Click on the tab 'Caching operations'.
* Under 'Legacy template mappings' locate the ruleset 'Content item view'.
* From the last column ('Templates') remove 'image_view_fullscreen'.
* Click on Save.
### Reporter
This vulnerability was responsibly disclosed to the Plone Security Team by Gustav Hansen, F-Secure Consulting. Thank you!
### For more information
If you have any questions or comments about this advisory, email us at [security@plone.org](mailto:security@plone.org)
This is also the correct address to use when you want to report a possible vulnerability.
See [our security report policy](https://plone.org/security/report). | {'CVE-2022-23599'} | 2022-02-07T21:16:59Z | 2022-01-28T23:10:37Z | MODERATE | 4.3 | {'CWE-79'} | {'https://github.com/advisories/GHSA-g4c2-ghfg-g5rh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23599', 'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8', 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'} | null |
GHSA | GHSA-pw59-4qgf-jxr8 | Cache Manipulation Attack in Apache Traffic Control | When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture. | {'CVE-2020-17522'} | 2022-04-12T22:17:55Z | 2021-12-16T19:20:21Z | MODERATE | 5.8 | {'CWE-732', 'CWE-525'} | {'https://lists.apache.org/thread.html/r3de212a3da73bcf98fa2db7eafb75b2eb8e131ff466e6efc4284df09%40%3Cdev.trafficcontrol.apache.org%3E', 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607dca4a96cb8@%3Ccommits.trafficcontrol.apache.org%3E', 'https://github.com/apache/trafficcontrol/commit/492290d810e9608afb5d265b98cd3f3e153e776b', 'https://github.com/advisories/GHSA-pw59-4qgf-jxr8', 'https://lists.apache.org/thread.html/rc8bfd7d4f71d61e9193efcd4699eccbab3c202ec1d75ed9d502f08bf@%3Ccommits.trafficcontrol.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17522'} | null |
GHSA | GHSA-fq77-7p7r-83rj | Directory Traversal in Next.js | ### Impact
- **Not affected**: Deployments on ZEIT Now v2 ([https://zeit.co](https://zeit.co/)) are not affected
- **Not affected**: Deployments using the `serverless` target
- **Not affected**: Deployments using `next export`
- **Affected**: Users of Next.js below 9.3.2
We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
### Patches
https://github.com/zeit/next.js/releases/tag/v9.3.2
### References
https://github.com/zeit/next.js/releases/tag/v9.3.2 | {'CVE-2020-5284'} | 2021-01-08T20:24:24Z | 2020-03-30T20:40:50Z | MODERATE | 4.4 | {'CWE-23'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5284', 'https://github.com/zeit/next.js/releases/tag/v9.3.2', 'https://github.com/zeit/next.js/security/advisories/GHSA-fq77-7p7r-83rj', 'https://www.npmjs.com/advisories/1503', 'https://github.com/advisories/GHSA-fq77-7p7r-83rj'} | null |
GHSA | GHSA-8v63-cqqc-6r2c | Prototype Pollution in object-path | object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3805'} | 2022-04-19T19:03:28Z | 2021-09-20T20:46:43Z | HIGH | 7.5 | {'CWE-1321', 'CWE-915'} | {'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://github.com/advisories/GHSA-8v63-cqqc-6r2c', 'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'} | null |
GHSA | GHSA-w7q9-p3jq-fmhm | Uncontrolled resource consumption in jpeg-js | Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image. | {'CVE-2020-8175'} | 2021-01-07T23:46:38Z | 2020-07-27T15:46:57Z | MODERATE | 0 | {'CWE-400'} | {'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://hackerone.com/reports/842462', 'https://github.com/advisories/GHSA-w7q9-p3jq-fmhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'} | null |
GHSA | GHSA-mxjj-953w-2c2v | Data corruption in tensorflow-lite | ### Impact
When determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/types.h#L437-L442
Since the function always returns the dimension of the first tensor, malicious attackers can craft cases where this is larger than that of the second tensor. In turn, this would result in reads/writes outside of bounds since the interpreter will wrongly assume that there is enough data in both tensors.
### Patches
We have patched the issue in 8ee24e7949a20 and will release patch releases for all versions between 1.15 and 2.3.
We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by members of the Aivul Team from Qihoo 360. | {'CVE-2020-15208'} | 2021-08-26T15:16:48Z | 2020-09-25T18:28:44Z | HIGH | 7.4 | {'CWE-787', 'CWE-125'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15208', 'https://github.com/advisories/GHSA-mxjj-953w-2c2v', 'https://github.com/tensorflow/tensorflow/commit/8ee24e7949a203d234489f9da2c5bf45a7d5157d'} | null |
GHSA | GHSA-579x-cjvr-cqj9 | Observable Response Discrepancy in Lost Password Service | ### Impact
It is possible to enumerate usernames via the forgot password functionality
### Patches
Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
| {'CVE-2021-39189'} | 2021-09-28T19:05:38Z | 2021-09-20T19:53:55Z | MODERATE | 5.3 | {'CWE-204', 'CWE-203'} | {'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://github.com/advisories/GHSA-579x-cjvr-cqj9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/'} | null |
GHSA | GHSA-h3q4-vmw4-cpr5 | Path Traversal in Gitea | The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL. | {'CVE-2021-29134'} | 2022-03-28T22:26:46Z | 2022-03-16T00:00:38Z | MODERATE | 5.3 | {'CWE-22'} | {'https://github.com/go-gitea/gitea/releases/tag/v1.13.6', 'https://github.com/advisories/GHSA-h3q4-vmw4-cpr5', 'https://github.com/go-gitea/gitea/pull/15125/files', 'https://github.com/go-gitea/gitea/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29134'} | null |
GHSA | GHSA-vqw6-72r7-fgw7 | OOB read in `MatrixTriangularSolve` | ### Impact
The implementation of [`MatrixTriangularSolve`](https://github.com/tensorflow/tensorflow/blob/8cae746d8449c7dda5298327353d68613f16e798/tensorflow/core/kernels/linalg/matrix_triangular_solve_op_impl.h#L160-L240) fails to terminate kernel execution if one validation condition fails:
```cc
void ValidateInputTensors(OpKernelContext* ctx, const Tensor& in0,
const Tensor& in1) override {
OP_REQUIRES(
ctx, in0.dims() >= 2,
errors::InvalidArgument("In[0] ndims must be >= 2: ", in0.dims()));
OP_REQUIRES(
ctx, in1.dims() >= 2,
errors::InvalidArgument("In[0] ndims must be >= 2: ", in1.dims()));
}
void Compute(OpKernelContext* ctx) override {
const Tensor& in0 = ctx->input(0);
const Tensor& in1 = ctx->input(1);
ValidateInputTensors(ctx, in0, in1);
MatMulBCast bcast(in0.shape().dim_sizes(), in1.shape().dim_sizes());
...
}
```
Since `OP_REQUIRES` only sets `ctx->status()` to a non-OK value and calls `return`, this allows malicious attackers to trigger an out of bounds read:
```python
import tensorflow as tf
import numpy as np
matrix_array = np.array([])
matrix_tensor = tf.convert_to_tensor(np.reshape(matrix_array,(1,0)),dtype=tf.float32)
rhs_array = np.array([])
rhs_tensor = tf.convert_to_tensor(np.reshape(rhs_array,(0,1)),dtype=tf.float32)
tf.raw_ops.MatrixTriangularSolve(matrix=matrix_tensor,rhs=rhs_tensor,lower=False,adjoint=False)
```
As the two input tensors are empty, the `OP_REQUIRES` in `ValidateInputTensors` should fire and interrupt execution. However, given the implementation of `OP_REQUIRES`, after the `in0.dims() >= 2` fails, execution moves to the initialization of the `bcast` object. This initialization is done with invalid data and results in heap OOB read.
### Patches
We have patched the issue in GitHub commit [480641e3599775a8895254ffbc0fc45621334f68](https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Ye Zhang and Yakun Zhang of Baidu X-Team. | {'CVE-2021-29551'} | 2021-05-21T14:23:44Z | 2021-05-21T14:23:44Z | LOW | 2.5 | {'CWE-125'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29551', 'https://github.com/tensorflow/tensorflow/commit/480641e3599775a8895254ffbc0fc45621334f68', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vqw6-72r7-fgw7', 'https://github.com/advisories/GHSA-vqw6-72r7-fgw7'} | null |
GHSA | GHSA-974j-wjxx-wggj | Incorrect Access Control vulnerability in api-platform/core | API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6. | {'CVE-2019-1000011'} | 2021-08-17T22:38:33Z | 2019-10-14T21:23:26Z | MODERATE | 6.5 | {'CWE-284'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2019-1000011.yaml', 'https://github.com/api-platform/core/issues/2364', 'https://github.com/advisories/GHSA-974j-wjxx-wggj', 'https://github.com/api-platform/core/pull/2441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000011'} | null |
GHSA | GHSA-h5vm-jhq7-w647 | Malicious Package in momen | All versions of `momen` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation. | null | 2021-10-01T14:01:28Z | 2020-09-02T20:17:13Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-h5vm-jhq7-w647', 'https://www.npmjs.com/advisories/849'} | null |
GHSA | GHSA-mmf6-6597-3v6m | Open Redirect in Spring Security OAuth | Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. | {'CVE-2019-11269'} | 2021-04-12T21:32:14Z | 2019-06-13T20:18:28Z | MODERATE | 5.4 | {'CWE-601'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11269', 'https://pivotal.io/security/cve-2019-11269', 'https://github.com/advisories/GHSA-mmf6-6597-3v6m', 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html'} | null |
GHSA | GHSA-h47j-hc6x-h3qq | Remote Code Execution Vulnerability in NPM mongo-express | ### Impact
Remote code execution on the host machine by any authenticated user.
### Proof Of Concept
Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator:
```javascript
this.constructor.constructor("return process")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator')
```
### Patches
Users should upgrade to version `0.54.0`
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
### References
[Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215)
[CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [example link to repo](http://example.com)
* Email us at [example email address](mailto:example@example.com)
#### Thanks
@JLLeitschuh for finding and reporting this vulnerability | {'CVE-2019-10758'} | 2022-04-19T19:02:23Z | 2019-12-30T19:30:31Z | HIGH | 0 | null | {'https://github.com/mongo-express/mongo-express/pull/522', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758', 'https://github.com/advisories/GHSA-h47j-hc6x-h3qq', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'} | null |
GHSA | GHSA-7c2r-3jqf-c9rw | Moderate severity vulnerability that affects com.fasterxml.jackson.dataformat:jackson-dataformat-xml | XmlMapper in the Jackson XML dataformat component (aka jackson-dataformat-xml) before 2.7.8 and 2.8.x before 2.8.4 allows remote attackers to conduct server-side request forgery (SSRF) attacks via vectors related to a DTD. | {'CVE-2016-7051'} | 2021-09-02T21:11:04Z | 2018-10-18T17:43:28Z | HIGH | 8.6 | {'CWE-611', 'CWE-918'} | {'https://github.com/FasterXML/jackson-dataformat-xml/issues/211', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7051', 'http://www.securityfocus.com/bid/97688', 'https://github.com/advisories/GHSA-7c2r-3jqf-c9rw', 'https://bugzilla.redhat.com/show_bug.cgi?id=1378673'} | null |
GHSA | GHSA-q9p8-33wc-h432 | Authenticated users can exploit an enumeration vulnerability in Harbor | ### **Impact**
Hidde Smit from Cyber Eagle has discovered an User Enumeration flaw in Harbor. The issue is present in the "/users" api endpoint. This endpoint is supposed to be restricted to administrators. This restriction is able to be bypassed and information can be obtained via the "search" functionality.
Non-administrator users (such as those created via self-registration) can list all usernames and user IDs by sending a GET request to /api/users/search with parameter "username" and value "_", as follows:
`curl -X GET "https://<host>/api/users/search?username=_" -H "accept: application/json" --user <user>:<password>`
The vulnerability was immediately fixed by the Harbor team and all supported versions were patched. With the patched versions of Harbor, the username is required for search and we have removed the support for querying by email.
### **Patches**
If your product uses the affected releases of Harbor, update to either version 2.1.0 or 2.0.3 to fix this issue immediately
https://github.com/goharbor/harbor/releases/tag/v2.1.0
https://github.com/goharbor/harbor/releases/tag/v2.0.3
### **Workarounds**
There is no workaround for this issue
### **For more information**
If you have any questions or comments about this advisory, contact cncf-harbor-security@lists.cncf.io
View our security policy at https://github.com/goharbor/harbor/security/policy
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13794 | {'CVE-2020-13794'} | 2021-08-02T14:53:11Z | 2021-05-24T16:58:06Z | MODERATE | 4.3 | {'CWE-862'} | {'https://www.cybereagle.io/blog/cve-2020-13794/', 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9p8-33wc-h432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13794', 'https://github.com/goharbor/harbor/releases', 'https://github.com/advisories/GHSA-q9p8-33wc-h432', 'https://github.com/goharbor/harbor/releases/tag/v2.0.3'} | null |
GHSA | GHSA-mjww-934m-h4jw | Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua | A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates. | {'CVE-2020-29457'} | 2021-11-19T20:19:53Z | 2021-11-19T20:19:53Z | MODERATE | 4.4 | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-29457', 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229', 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/', 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25', 'https://github.com/advisories/GHSA-mjww-934m-h4jw'} | null |
GHSA | GHSA-4g88-fppr-53pp | Prototype Pollution in set-value | Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
If you are using `set-value` 3.x, upgrade to version 3.0.1 or later.
If you are using `set-value` 2.x, upgrade to version 2.0.1 or later. | {'CVE-2019-10747'} | 2021-08-17T22:17:25Z | 2019-08-27T17:43:33Z | CRITICAL | 9.8 | {'CWE-400'} | {'https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-450213', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/', 'https://github.com/advisories/GHSA-4g88-fppr-53pp', 'https://www.npmjs.com/advisories/1012', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10747'} | null |
GHSA | GHSA-mr6r-82x4-f4jj | Timing attacks might allow practical recovery of the long-term private key | In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key. | {'CVE-2019-10764'} | 2021-08-18T22:40:49Z | 2019-11-20T01:34:50Z | HIGH | 7.4 | {'CWE-203'} | {'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576', 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://github.com/advisories/GHSA-mr6r-82x4-f4jj', 'https://minerva.crocs.fi.muni.cz/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764'} | null |
GHSA | GHSA-438g-fx34-4h9m | Out of bounds read in simple-slab | An issue was discovered in the simple-slab crate before 0.3.3 for Rust. index() allows an out-of-bounds read. | {'CVE-2020-35892'} | 2021-08-25T20:48:38Z | 2021-08-25T20:48:38Z | CRITICAL | 9.1 | {'CWE-125'} | {'https://github.com/advisories/GHSA-438g-fx34-4h9m', 'https://github.com/nathansizemore/simple-slab/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35892', 'https://rustsec.org/advisories/RUSTSEC-2020-0039.html'} | null |
GHSA | GHSA-4xc9-xhrj-v574 | Prototype Pollution in lodash | Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.17.11 or later. | {'CVE-2018-16487'} | 2021-01-08T19:52:26Z | 2019-02-07T18:16:48Z | HIGH | 0 | {'CWE-400'} | {'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16487', 'https://github.com/advisories/GHSA-4xc9-xhrj-v574', 'https://www.npmjs.com/advisories/782', 'https://hackerone.com/reports/380873'} | null |
GHSA | GHSA-vx9j-46rh-fqr8 | Moderate severity vulnerability that affects actionview | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752. | {'CVE-2016-2097'} | 2021-06-10T19:56:41Z | 2017-10-24T18:33:35Z | MODERATE | 5.3 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-2097', 'http://www.securitytracker.com/id/1035122', 'http://www.securityfocus.com/bid/83726', 'http://www.debian.org/security/2016/dsa-3509', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html', 'https://github.com/advisories/GHSA-vx9j-46rh-fqr8', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html', 'http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/', 'https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ', 'http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html'} | null |
GHSA | GHSA-r53w-g4xm-3gc6 | Cross-site scripting in Haml | In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code. | {'CVE-2017-1002201'} | 2022-01-04T19:39:12Z | 2019-10-21T21:59:13Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html', 'https://security.gentoo.org/glsa/202007-27', 'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html', 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362', 'https://github.com/advisories/GHSA-r53w-g4xm-3gc6', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201', 'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'} | null |
GHSA | GHSA-786j-5qwq-r36x | Segfault while copying constant resource tensor | ### Impact
During TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change.
### Patches
We have patched the issue in GitHub commit [7731e8dfbe4a56773be5dc94d631611211156659](https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659).
The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions | {'CVE-2021-41204'} | 2021-11-10T19:12:14Z | 2021-11-10T19:12:14Z | MODERATE | 5.5 | {'CWE-824'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41204', 'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659', 'https://github.com/advisories/GHSA-786j-5qwq-r36x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x'} | null |
GHSA | GHSA-fhj9-cjjh-27vm | Critical severity vulnerability that affects activerecord | ActiveRecord in Ruby on Rails before 2.3.17 and 3.x before 3.1.0 allows remote attackers to cause a denial of service or execute arbitrary code via crafted serialized attributes that cause the +serialize+ helper to deserialize arbitrary YAML. | {'CVE-2013-0277'} | 2021-12-02T22:36:52Z | 2017-10-24T18:33:37Z | CRITICAL | 0 | null | {'http://secunia.com/advisories/52112', 'https://nvd.nist.gov/vuln/detail/CVE-2013-0277', 'http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html', 'https://github.com/advisories/GHSA-fhj9-cjjh-27vm', 'http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/', 'http://securitytracker.com/id?1028109', 'http://www.debian.org/security/2013/dsa-2620', 'http://www.openwall.com/lists/oss-security/2013/02/11/6', 'http://support.apple.com/kb/HT5784', 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00048.html', 'http://www.osvdb.org/90073', 'https://groups.google.com/group/rubyonrails-security/msg/302ec7ce90f13837?dmode=source&output=gplain', 'https://puppet.com/security/cve/cve-2013-0277'} | null |
GHSA | GHSA-mxh3-2699-98g9 | Cross-site Scripting pimcore | pimcore version 10.3.0 and prior is vulnerable to cross-site scripting. | {'CVE-2022-0510'} | 2022-02-14T22:35:04Z | 2022-02-09T00:00:28Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce', 'https://github.com/advisories/GHSA-mxh3-2699-98g9', 'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510'} | null |
GHSA | GHSA-pjh3-jv7w-9jpr | Command Injection in gm | Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary.
## Recommendation
Update to version 1.21.1 or later. | {'CVE-2015-7982'} | 2021-09-23T21:23:49Z | 2020-09-01T15:18:55Z | CRITICAL | 0 | {'CWE-77'} | {'https://www.npmjs.com/advisories/54', 'https://github.com/advisories/GHSA-pjh3-jv7w-9jpr', 'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982'} | null |
GHSA | GHSA-86gv-xpwv-jprc | Malicious Package in diamond-clien | All versions of `diamond-clien` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T19:33:55Z | 2020-09-03T17:36:00Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1052', 'https://github.com/advisories/GHSA-86gv-xpwv-jprc'} | null |
GHSA | GHSA-fp82-2h99-3fpp | Prototype Pollution in async merge-object | The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects. | {'CVE-2018-3753'} | 2022-04-26T20:44:25Z | 2018-09-18T13:47:24Z | CRITICAL | 9.8 | {'CWE-20', 'CWE-1321'} | {'https://hackerone.com/reports/310706', 'https://github.com/advisories/GHSA-fp82-2h99-3fpp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3753'} | null |
GHSA | GHSA-xvch-r4wf-h8w9 | Moderate severity vulnerability that affects org.apache.qpid:proton-j | The Apache Qpid Proton-J transport includes an optional wrapper layer to perform TLS, enabled by use of the 'transport.ssl(...)' methods. Unless a verification mode was explicitly configured, client and server modes previously defaulted as documented to not verifying a peer certificate, with options to configure this explicitly or select a certificate verification mode with or without hostname verification being performed. The latter hostname verifying mode was not implemented in Apache Qpid Proton-J versions 0.3 to 0.29.0, with attempts to use it resulting in an exception. This left only the option to verify the certificate is trusted, leaving such a client vulnerable to Man In The Middle (MITM) attack. Uses of the Proton-J protocol engine which do not utilise the optional transport TLS wrapper are not impacted, e.g. usage within Qpid JMS. Uses of Proton-J utilising the optional transport TLS wrapper layer that wish to enable hostname verification must be upgraded to version 0.30.0 or later and utilise the VerifyMode#VERIFY_PEER_NAME configuration, which is now the default for client mode usage unless configured otherwise. | {'CVE-2018-17187'} | 2021-09-22T16:47:20Z | 2018-11-21T22:22:21Z | HIGH | 7.4 | {'CWE-295'} | {'https://issues.apache.org/jira/browse/PROTON-1962', 'https://mail-archives.apache.org/mod_mbox/qpid-users/201811.mbox/%3CCAFitrpQSV73Vz7rJYfLJK7gvEymZSCR5ooWUeU8j4jzRydk-eg%40mail.gmail.com%3E', 'https://github.com/advisories/GHSA-xvch-r4wf-h8w9', 'http://www.securityfocus.com/bid/105935', 'https://qpid.apache.org/cves/CVE-2018-17187.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17187'} | null |
GHSA | GHSA-3p22-ghq8-v749 | Renderers can obtain access to random bluetooth device without permission in Electron | ### Impact
This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the attacker would have no way of selecting a specific device.
All current stable versions of Electron are affected.
### Patches
This has been patched and the following Electron versions contain the fix:
* `17.0.0-alpha.6`
* `16.0.6`
* `15.3.5`
* `14.2.4`
* `13.6.6`
### Workarounds
Adding this code to your app can workaround the issue.
```js
app.on('web-contents-created', (event, webContents) => {
webContents.on('select-bluetooth-device', (event, devices, callback) => {
// Prevent default behavior
event.preventDefault();
// Cancel the request
callback('');
});
});
```
For more information
If you have any questions or comments about this advisory, email us at security@electronjs.org. | {'CVE-2022-21718'} | 2022-03-22T19:19:22Z | 2022-03-22T18:49:36Z | LOW | 3.4 | {'CWE-668'} | {'https://github.com/electron/electron/pull/32240', 'https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749', 'https://github.com/advisories/GHSA-3p22-ghq8-v749', 'https://github.com/electron/electron/pull/32178', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21718'} | null |
GHSA | GHSA-rpxm-vmr7-5f5f | Data races in convec | Affected versions of this crate unconditionally implement Send/Sync for `ConVec<T>`.
This allows users to insert `T` that is not Send or not Sync.
This allows users to create data races by using non-Send types like `Arc<Cell<_>>` or `Rc<_>` as `T` in `ConVec<T>`. It is also possible to create data races by using types like `Cell<_>` or `RefCell<_>` as `T` (types that are `Send` but not `Sync`).
Such data races can lead to memory corruption. | {'CVE-2020-36445'} | 2021-08-25T20:59:15Z | 2021-08-25T20:59:15Z | HIGH | 8.1 | {'CWE-119', 'CWE-362'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0125.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36445', 'https://github.com/advisories/GHSA-rpxm-vmr7-5f5f'} | null |
GHSA | GHSA-gj85-pvp5-mvf9 | Cross-site Scripting in Beanstalk console | Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting. | {'CVE-2022-0501'} | 2022-02-14T22:30:43Z | 2022-02-06T00:00:54Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/advisories/GHSA-gj85-pvp5-mvf9'} | null |
GHSA | GHSA-wpq7-q8j4-72jg | Moderate severity vulnerability that affects auth0-js | The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it's missing from the authorization response, leaving the client vulnerable to CSRF attacks. | {'CVE-2018-7307'} | 2021-09-21T21:52:07Z | 2018-03-07T22:22:24Z | HIGH | 8.8 | {'CWE-352'} | {'https://auth0.com/docs/security/bulletins/cve-2018-7307', 'https://github.com/advisories/GHSA-wpq7-q8j4-72jg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7307'} | null |
GHSA | GHSA-4x49-w62v-76q7 | Path Traversal in Spring Cloud Config | Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack. | {'CVE-2019-3799'} | 2022-04-21T18:14:50Z | 2019-05-23T08:39:23Z | MODERATE | 6.5 | {'CWE-22'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3799', 'https://pivotal.io/security/cve-2019-3799', 'https://github.com/mpgn/CVE-2019-3799', 'https://github.com/advisories/GHSA-4x49-w62v-76q7'} | null |
GHSA | GHSA-pr3h-jjhj-573x | High severity vulnerability that affects sprockets | Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production.
All users running an affected release should either upgrade or use one of the work arounds immediately.
Workaround:
In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets.
This work around will not be possible in all hosting environments and upgrading is advised. | {'CVE-2018-3760'} | 2021-12-02T20:12:00Z | 2018-06-20T22:18:58Z | HIGH | 7.5 | {'CWE-200', 'CWE-22'} | {'https://access.redhat.com/errata/RHSA-2018:2245', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3760', 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5fhttps://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5', 'https://access.redhat.com/errata/RHSA-2018:2745', 'https://access.redhat.com/errata/RHSA-2018:2561', 'https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ', 'https://access.redhat.com/errata/RHSA-2018:2244', 'https://github.com/advisories/GHSA-pr3h-jjhj-573x', 'https://www.debian.org/security/2018/dsa-4242'} | null |
GHSA | GHSA-4fc4-4p5g-6w89 | Cross-site Scripting in CKEditor4 | ### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.18.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.18.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank GHSL team member Kevin Backhouse ([@kevinbackhouse](https://github.com/kevinbackhouse)) for recognizing and reporting this vulnerability. | {'CVE-2022-24728'} | 2022-03-31T20:51:26Z | 2022-03-16T22:47:55Z | MODERATE | 5.4 | {'CWE-79'} | {'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89', 'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://github.com/advisories/GHSA-4fc4-4p5g-6w89', 'https://www.drupal.org/sa-core-2022-005'} | null |
GHSA | GHSA-74vq-h4q8-x6jv | Critical severity vulnerability that affects ansible | Ansible fetch module before versions 2.5.15, 2.6.14, 2.7.8 has a path traversal vulnerability which allows copying and overwriting files outside of the specified destination in the local ansible controller host, by not restricting an absolute path. | {'CVE-2019-3828'} | 2021-09-02T19:21:55Z | 2019-04-15T16:19:19Z | MODERATE | 4.2 | {'CWE-22'} | {'https://github.com/advisories/GHSA-74vq-h4q8-x6jv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3828'} | null |
GHSA | GHSA-5q2r-92f9-4m49 | Improper verification of signature threshold in tough | ## Impact
The tough library, prior to 0.7.1, does not properly verify the uniqueness of keys in the signatures provided to meet the threshold of cryptographic signatures. It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum threshold of unique keys before the metadata is considered valid.
AWS would like to thank Erick Tryzelaar of the Google Fuchsia Team for reporting this issue.
## Patches
A fix is available in version 0.7.1.
## Workarounds
No workarounds to this issue are known.
## References
CVE-2020-6174 is assigned to the same issue in the TUF reference implementation.
https://github.com/theupdateframework/tuf/pull/974
https://nvd.nist.gov/vuln/detail/CVE-2020-6174
## For more information
If you have any questions or comments about this advisory, [contact AWS Security](https://aws.amazon.com/security/vulnerability-reporting/) at [aws-security@amazon.com](mailto:aws-security@amazon.com). | {'CVE-2020-15093'} | 2022-04-19T19:02:29Z | 2021-08-25T20:56:55Z | HIGH | 8.6 | {'CWE-347'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0024.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15093', 'https://github.com/awslabs/tough/security/advisories/GHSA-5q2r-92f9-4m49', 'https://github.com/theupdateframework/tuf/pull/974', 'https://github.com/advisories/GHSA-5q2r-92f9-4m49', 'https://github.com/theupdateframework/tuf/commit/2977188139d065ff3356c3cb4aec60c582b57e0e'} | null |
GHSA | GHSA-428x-9xc2-m8mj | Division by zero in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero in [the implementation of depthwise convolutions](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96).
The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is stricly positive.
### Patches
We have patched the issue in GitHub commit [e5b0eec199c2d03de54fd6a7fd9275692218e2bc](https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team. | {'CVE-2022-21741'} | 2022-02-11T16:20:59Z | 2022-02-09T23:47:30Z | MODERATE | 6.5 | {'CWE-369'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj', 'https://github.com/advisories/GHSA-428x-9xc2-m8mj', 'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21741', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96'} | null |
GHSA | GHSA-3x9f-74h4-2fqr | Denial of Service in SheetJS Pro | SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2). | {'CVE-2021-32012'} | 2022-02-08T21:02:16Z | 2021-07-22T19:48:17Z | MODERATE | 5.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32012', 'https://sheetjs.com/pro', 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/', 'https://www.npmjs.com/package/xlsx/v/0.17.0', 'https://github.com/advisories/GHSA-3x9f-74h4-2fqr', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
GHSA | GHSA-h2j3-gg8w-4858 | Malicious Package in buffer-xos | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:12:40Z | 2020-09-03T22:12:09Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1251', 'https://github.com/advisories/GHSA-h2j3-gg8w-4858'} | null |
GHSA | GHSA-82mm-ffjr-h86c | Authorization bypass in Istio | "In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy." | {'CVE-2020-16844'} | 2022-04-20T21:05:23Z | 2022-02-15T01:57:18Z | MODERATE | 6.8 | {'CWE-284'} | {'https://istio.io/latest/news/releases/1.6.x/announcing-1.6.8/', 'https://github.com/istio/istio/releases', 'https://istio.io/latest/news/releases/1.5.x/announcing-1.5.9/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16844', 'https://github.com/istio/istio/releases/tag/1.5.9', 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace', 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c', 'https://istio.io/latest/news/security/istio-security-2020-009/', 'https://github.com/advisories/GHSA-82mm-ffjr-h86c', 'https://github.com/istio/istio/releases/tag/1.6.8'} | null |
GHSA | GHSA-49rv-g7w5-m8xx | Cross-Site Scripting in @novnc/novnc | Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `include/ui.js` and users of `vnc_auto.html` and `vnc.html`.
## Recommendation
Upgrade to version 0.6.2 or later. | {'CVE-2017-18635'} | 2022-01-04T19:37:09Z | 2020-08-28T21:24:59Z | MODERATE | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-18635', 'https://github.com/advisories/GHSA-49rv-g7w5-m8xx', 'https://github.com/novnc/noVNC/releases/tag/v0.6.2', 'https://bugs.launchpad.net/horizon/+bug/1656435', 'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://snyk.io/vuln/SNYK-JS-NOVNCNOVNC-469136', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://usn.ubuntu.com/4522-1/', 'https://github.com/novnc/noVNC/issues/748', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00004.html', 'https://www.npmjs.com/advisories/1204', 'https://github.com/ShielderSec/cve-2017-18635'} | null |
GHSA | GHSA-2jm5-2cqf-6vw9 | Malicious Package in baes-x | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:29:19Z | 2020-09-04T15:30:32Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-2jm5-2cqf-6vw9', 'https://www.npmjs.com/advisories/1351'} | null |
GHSA | GHSA-rv39-3qh7-9v7w | Improper Input Validation in Spring Framework | In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. | {'CVE-2020-5421'} | 2022-04-22T17:21:24Z | 2021-04-30T17:29:51Z | MODERATE | 6.5 | {'CWE-35'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc@%3Ccommits.pulsar.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210513-0009/', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865@%3Cissues.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-rv39-3qh7-9v7w', 'https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665@%3Cissues.hive.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d@%3Cuser.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb@%3Cuser.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d@%3Cissues.hive.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2020-5421', 'https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-5q99-f34m-67gc | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | When the default servlet in Apache Tomcat versions 9.0.0.M1 to 9.0.11, 8.5.0 to 8.5.33 and 7.0.23 to 7.0.90 returned a redirect to a directory (e.g. redirecting to '/foo/' when the user requested '/foo') a specially crafted URL could be used to cause the redirect to be generated to any URI of the attackers choice. | {'CVE-2018-11784'} | 2021-07-14T19:54:49Z | 2018-10-17T16:31:02Z | MODERATE | 4.3 | {'CWE-601'} | {'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZ4PX4B3QTKRM35VJAVIEOPZAF76RPBP/', 'https://github.com/advisories/GHSA-5q99-f34m-67gc', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0485', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11784', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0130', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00030.html', 'https://lists.apache.org/thread.html/23134c9b5a23892a205dc140cdd8c9c0add233600f76b313dda6bd75@%3Cannounce.tomcat.apache.org%3E', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0002/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://packetstormsecurity.com/files/163456/Apache-Tomcat-9.0.0M1-Open-Redirect.html', 'https://usn.ubuntu.com/3787-1/', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00005.html', 'https://www.debian.org/security/2019/dsa-4596', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/10/msg00006.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://access.redhat.com/errata/RHSA-2019:0131', 'http://www.securityfocus.com/bid/105524', 'https://seclists.org/bugtraq/2019/Dec/43'} | null |
GHSA | GHSA-fcjw-8rhj-gwwc | Authentication Bypass in Devise | An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.) | {'CVE-2019-16109'} | 2021-09-21T16:27:38Z | 2019-09-11T23:06:57Z | HIGH | 5.3 | {'CWE-284'} | {'https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1', 'https://github.com/advisories/GHSA-fcjw-8rhj-gwwc', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise/CVE-2019-16109.yml', 'https://github.com/plataformatec/devise/issues/5071', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16109', 'https://github.com/plataformatec/devise/pull/5132'} | null |
GHSA | GHSA-qhx9-7hx7-cp4r | HTTP Request smuggling in bottle | The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter. | {'CVE-2020-28473'} | 2021-04-07T21:05:21Z | 2021-04-07T21:05:21Z | MODERATE | 6.8 | {'CWE-444'} | {'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108', 'https://github.com/advisories/GHSA-qhx9-7hx7-cp4r', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473', 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/', 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html', 'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'} | null |
GHSA | GHSA-xmq3-hgjx-6997 | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0705'} | 2022-03-29T21:30:06Z | 2022-03-17T00:00:47Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-xmq3-hgjx-6997', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'} | null |
GHSA | GHSA-7qqv-r2q4-jxhm | High severity vulnerability that affects privacyIDEA | privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=<space>&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2. | {'CVE-2018-1000809'} | 2021-09-03T21:43:08Z | 2019-01-14T16:19:31Z | HIGH | 7.5 | {'CWE-20'} | {'https://github.com/privacyidea/privacyidea/issues/1227', 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809', 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'} | null |
GHSA | GHSA-2rmm-87v7-34rj | Improper Restriction of XML External Entity Reference in Any23 | An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows an attacker to view files on the application server filesystem, and to interact with any back-end or external systems that the application itself can access. This issue is fixed in Apache Any23 2.7. | {'CVE-2022-25312'} | 2022-03-15T21:34:09Z | 2022-03-06T00:00:17Z | CRITICAL | 9.1 | {'CWE-611'} | {'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtkyk23', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312', 'http://www.openwall.com/lists/oss-security/2022/03/04/2', 'https://github.com/advisories/GHSA-2rmm-87v7-34rj', 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md'} | null |
GHSA | GHSA-m5ch-gx8g-rg73 | Remote Code Execution in pomelo-monitor | All versions of `pomelo-monitor` are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | null | 2021-09-27T13:39:21Z | 2020-09-02T15:43:53Z | HIGH | 0 | {'CWE-20'} | {'https://github.com/advisories/GHSA-m5ch-gx8g-rg73', 'https://www.npmjs.com/advisories/756'} | null |
GHSA | GHSA-2m53-83f3-562j | Prototype pollution in min-dash < 3.8.1 | ### Impact
The `set` method is vulnerable to prototype pollution with specially crafted inputs.
```javascript
// insert the following into poc.js and run node poc,js (after installing the package)
let parser = require("min-dash");
parser.set({}, [["__proto__"], "polluted"], "success");
console.log(polluted);
```
### Patches
`min-dash>=3.8.1` fix the issue.
### Workarounds
No workarounds exist for the issue.
### References
Closed via https://github.com/bpmn-io/min-dash/pull/21.
### Credits
Credits to Cristian-Alexandru STAICU who found the vulnerability and to Idan Digmi from the Snyk Security Team who reported the vulnerability to us, responsibly. | null | 2022-04-19T19:03:20Z | 2022-02-01T00:44:35Z | HIGH | 0 | {'CWE-1321'} | {'https://github.com/advisories/GHSA-2m53-83f3-562j', 'https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j'} | null |
GHSA | GHSA-xmgj-5fh3-xjmm | Path traversal when MessageBus::Diagnostics is enabled | ### Impact
Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with `merge_slashes` enabled, the number of steps up the directories that can be read is limited to 3 levels.
### Patches
Patched in 3.3.7.
### Workarounds
Disable MessageBus::Diagnostics in production like environments.
| {'CVE-2021-43840'} | 2022-01-03T15:46:44Z | 2021-12-17T19:59:13Z | MODERATE | 4.2 | {'CWE-22'} | {'https://github.com/discourse/message_bus/commit/9b6deee01ed474c7e9b5ff65a06bb0447b4db2ba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43840', 'https://github.com/advisories/GHSA-xmgj-5fh3-xjmm', 'https://github.com/discourse/message_bus/security/advisories/GHSA-xmgj-5fh3-xjmm'} | null |
GHSA | GHSA-q89x-f52w-6hj2 | Headers containing newline characters can split messages in hyper | An issue was discovered in the hyper crate before 0.9.18 for Rust. It mishandles newlines in headers. | {'CVE-2017-18587'} | 2021-08-25T20:43:04Z | 2021-08-25T20:43:04Z | MODERATE | 5.3 | {'CWE-93'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-18587', 'https://github.com/advisories/GHSA-q89x-f52w-6hj2', 'https://rustsec.org/advisories/RUSTSEC-2017-0002.html'} | null |
GHSA | GHSA-xg68-chx2-253g | Prototype Pollution in jquery-deparam | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-deparam allows a malicious user to inject properties into Object.prototype. | {'CVE-2021-20087'} | 2021-05-24T19:53:01Z | 2021-05-24T19:53:01Z | HIGH | 8.8 | {'CWE-1321'} | {'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-deparam.md', 'https://github.com/advisories/GHSA-xg68-chx2-253g', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20087'} | null |
GHSA | GHSA-hfm8-2q22-h7hv | Cross-site Scripting in pegasus/google-for-jobs | An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | {'CVE-2021-43561'} | 2021-11-17T21:24:37Z | 2021-11-15T17:39:18Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-hfm8-2q22-h7hv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015'} | null |
GHSA | GHSA-jj4f-p7vv-j4v9 | Arbitrary code execution in Apache Druid | Apache Druid allows users to read data from other database systems using JDBC. This functionality is to allow trusted users with the proper permissions to set up lookups or submit ingestion tasks. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Druid server processes. This issue was addressed in Apache Druid 0.20.2 | {'CVE-2021-26919'} | 2021-06-16T17:51:58Z | 2021-06-16T17:51:58Z | HIGH | 0 | {'CWE-668'} | {'https://lists.apache.org/thread.html/r6bc68264170046448f823d12c17fd1fd875251d97d60869f58709872@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7a531ec123570cb7875ff991cf115f99e9ef99a48b3cf3fa4f9d9864@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re0910cf4c784897774427fecd95912fb565a6bd06d924a55e70bbbfc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/re4c5deb0aae4bace69844d15c9fd1699e907ebfee93bc3926474d110@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E', 'https://github.com/apache/druid/releases/tag/druid-0.20.2', 'https://github.com/apache/druid/commit/48953e3508967f5156c69676432b5d4dd25ea678', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26919', 'https://lists.apache.org/thread.html/r470f8c92eb5df45f41b3ae609b6315b6c5ff51b3ceb2f09f00ca620f@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf3ea2a4018e87e6c45d36cf8479af7727dcc276edabd2f7cf59e0c5f@%3Cdev.druid.apache.org%3E', 'https://github.com/advisories/GHSA-jj4f-p7vv-j4v9', 'https://lists.apache.org/thread.html/ra85fa7d31f9bec1148ffd2e4030934927caa8bff89bca9f61f75e697@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rd87451fce34df54796e66321c40d743a68fb4553d72e7f6f0bc62ebd%40%3Cdev.druid.apache.org%3E'} | null |
GHSA | GHSA-q4hm-fwc9-hmv6 | Insecure temporary file used in com.squareup:connect | This affects all versions of package com.squareup:connect. The method prepareDownloadFilecreates creates a temporary file with the permissions bits of -rw-r--r-- on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded by downloadFileFromResponse will be visible to all other users on the local system. A workaround fix for this issue is to set the system property java.io.tmpdir to a safe directory as remediation. Note: This version of the SDK is end of life and no longer maintained, please upgrade to the latest version. | {'CVE-2021-23331'} | 2022-04-18T21:55:55Z | 2021-06-16T17:53:20Z | LOW | 3.3 | {'CWE-377'} | {'https://snyk.io/vuln/SNYK-JAVA-COMSQUAREUP-1065988', 'https://github.com/advisories/GHSA-q4hm-fwc9-hmv6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23331', 'https://github.com/square/connect-java-sdk/blob/master/src/main/java/com/squareup/connect/ApiClient.java%23L613'} | null |
GHSA | GHSA-xvjm-fvxx-q3hv | CHECK-fail due to integer overflow | ### Impact
An attacker can trigger a denial of service via a `CHECK`-fail in caused by an integer overflow in constructing a new tensor shape:
```python
import tensorflow as tf
input_layer = 2**60-1
sparse_data = tf.raw_ops.SparseSplit(
split_dim=1,
indices=[(0, 0), (0, 1), (0, 2),
(4, 3), (5, 0), (5, 1)],
values=[1.0, 1.0, 1.0, 1.0, 1.0, 1.0],
shape=(input_layer, input_layer),
num_split=2,
name=None
)
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/0908c2f2397c099338b901b067f6495a5b96760b/tensorflow/core/kernels/sparse_split_op.cc#L66-L70) builds a dense shape without checking that the dimensions would not result in overflow:
```cc
sparse::SparseTensor sparse_tensor;
OP_REQUIRES_OK(context,
sparse::SparseTensor::Create(
input_indices, input_values,
TensorShape(input_shape.vec<int64>()), &sparse_tensor));
```
The [`TensorShape` constructor](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L183-L188) uses a `CHECK` operation which triggers when [`InitDims`](https://github.com/tensorflow/tensorflow/blob/6f9896890c4c703ae0a0845394086e2e1e523299/tensorflow/core/framework/tensor_shape.cc#L212-L296) returns a non-OK status.
```cc
template <class Shape>
TensorShapeBase<Shape>::TensorShapeBase(gtl::ArraySlice<int64> dim_sizes) {
set_tag(REP16);
set_data_type(DT_INVALID);
TF_CHECK_OK(InitDims(dim_sizes));
}
```
In our scenario, this occurs when adding a dimension from the argument results in overflow:
```cc
template <class Shape>
Status TensorShapeBase<Shape>::InitDims(gtl::ArraySlice<int64> dim_sizes) {
...
Status status = Status::OK();
for (int64 s : dim_sizes) {
status.Update(AddDimWithStatus(internal::SubtleMustCopy(s)));
if (!status.ok()) {
return status;
}
}
}
template <class Shape>
Status TensorShapeBase<Shape>::AddDimWithStatus(int64 size) {
...
int64 new_num_elements;
if (kIsPartial && (num_elements() < 0 || size < 0)) {
new_num_elements = -1;
} else {
new_num_elements = MultiplyWithoutOverflow(num_elements(), size);
if (TF_PREDICT_FALSE(new_num_elements < 0)) {
return errors::Internal("Encountered overflow when multiplying ",
num_elements(), " with ", size,
", result: ", new_num_elements);
}
}
...
}
```
This is a legacy implementation of the constructor and operations should use `BuildTensorShapeBase` or `AddDimWithStatus` to prevent `CHECK`-failures in the presence of overflows.
### Patches
We have patched the issue in GitHub commit [4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60](https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by researchers from University of Virginia and University of California, Santa Barbara. | {'CVE-2021-29584'} | 2021-05-21T14:26:38Z | 2021-05-21T14:26:38Z | LOW | 2.5 | {'CWE-190'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29584', 'https://github.com/tensorflow/tensorflow/commit/4c0ee937c0f61c4fc5f5d32d9bb4c67428012a60', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvjm-fvxx-q3hv', 'https://github.com/advisories/GHSA-xvjm-fvxx-q3hv'} | null |
GHSA | GHSA-pm44-7gw9-6g8p | Directory Traversal in uekw1511server | Affected versions of `uekw1511server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16185'} | 2021-01-14T15:42:05Z | 2020-09-01T18:28:08Z | HIGH | 0 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16185', 'https://www.npmjs.com/advisories/450', 'https://github.com/advisories/GHSA-pm44-7gw9-6g8p', 'https://nodesecurity.io/advisories/450', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uekw1511server'} | null |
GHSA | GHSA-g7r5-x7cr-vm3v | Buffer overflow and format vulnerabilities in ncurses | An issue was discovered in the ncurses crate for Rust. There are instr and mvwinstr buffer overflows because interaction with C functions is mishandled. | {'CVE-2019-15548'} | 2021-08-25T20:58:29Z | 2021-08-25T20:58:29Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://github.com/jeaye/ncurses-rs/issues/172', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15548', 'https://github.com/advisories/GHSA-g7r5-x7cr-vm3v', 'https://rustsec.org/advisories/RUSTSEC-2019-0006.html', 'https://github.com/RustSec/advisory-db/issues/106'} | null |
GHSA | GHSA-w6xj-45gv-fw35 | Malicious Package in stream-combine | Version 2.0.2 of `stream-combine` has malicious code design to steal credentials and credit card information. The code searches all form elements for passwords, credit card numbers and CVC codes. It then uploads the information to a remote server using HTML links embedded in the page or form actions. If your application has Content Security Policy set you are not affected by this issue.
## Recommendation
This package is not available on the npm Registry anymore. If you used this module and your application processed credentials or credit card information, it is possible that information was stolen. | null | 2020-09-02T15:57:06Z | 2020-09-02T15:57:06Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-w6xj-45gv-fw35', 'https://www.npmjs.com/advisories/774'} | null |
GHSA | GHSA-427g-2r83-3ccm | Information disclosure through processing of external XML entities | An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure. | {'CVE-2019-8126'} | 2021-07-28T15:37:48Z | 2019-11-12T22:59:24Z | MODERATE | 4.9 | {'CWE-776', 'CWE-611'} | {'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126', 'https://github.com/advisories/GHSA-427g-2r83-3ccm'} | null |
GHSA | GHSA-f6jp-j6w3-w9hm | Improper Authentication in Apache Shiro | Apache Shiro before 1.8.0, when using Apache Shiro with Spring Boot, a specially crafted HTTP request may cause an authentication bypass. Users should update to Apache Shiro 1.8.0. | {'CVE-2021-41303'} | 2021-09-30T18:37:25Z | 2021-09-20T20:18:11Z | MODERATE | 0 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41303', 'https://lists.apache.org/thread.html/raae98bb934e4bde304465896ea02d9798e257e486d04a42221e2c41b@%3Cuser.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re470be1ffea44bca28ccb0e67a4cf5d744e2d2b981d00fdbbf5abc13%40%3Cannounce.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-f6jp-j6w3-w9hm'} | null |
GHSA | GHSA-xwg4-93c6-3h42 | Directory Traversal in send | Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory.
For example, `static(_dirname + '/public')` would allow access to `_dirname + '/public-restricted'`.
## Recommendation
Update to version 0.8.4 or later. | {'CVE-2014-6394'} | 2021-09-22T17:58:57Z | 2017-10-24T18:33:36Z | LOW | 0 | {'CWE-22'} | {'https://support.apple.com/HT205217', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-September/139415.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21687263', 'http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html', 'http://www.openwall.com/lists/oss-security/2014/09/24/1', 'http://www.openwall.com/lists/oss-security/2014/09/30/10', 'http://secunia.com/advisories/62170', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96727', 'https://www.npmjs.com/advisories/32', 'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139938.html', 'https://nodesecurity.io/advisories/send-directory-traversal', 'https://nvd.nist.gov/vuln/detail/CVE-2014-6394', 'http://www.securityfocus.com/bid/70100', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'https://bugzilla.redhat.com/show_bug.cgi?id=1146063', 'https://github.com/visionmedia/send/pull/59'} | null |
GHSA | GHSA-vfqx-33qm-g869 | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.DriverManagerConnectionSource. | {'CVE-2020-36189'} | 2022-04-22T18:15:23Z | 2021-12-09T19:16:59Z | HIGH | 8.1 | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/2996', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36189', 'https://github.com/advisories/GHSA-vfqx-33qm-g869', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
GHSA | GHSA-v5vg-g7rq-363w | Prototype Pollution in json-pointer | This affects all versions of package `json-pointer`, up to and including `0.6.1`. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays. | {'CVE-2021-23820'} | 2021-11-08T17:40:49Z | 2021-11-08T17:40:49Z | MODERATE | 5.6 | {'CWE-843', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23820', 'https://github.com/advisories/GHSA-v5vg-g7rq-363w', 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287', 'https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78'} | null |
GHSA | GHSA-r5cq-9537-9rpf | Prototype Pollution in mixme | Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). | {'CVE-2021-28860'} | 2022-02-10T23:52:01Z | 2022-02-10T23:52:01Z | CRITICAL | 9.1 | {'CWE-1321'} | {'https://www.npmjs.com/~david', 'https://github.com/advisories/GHSA-r5cq-9537-9rpf', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'http://nodejs.com', 'https://security.netapp.com/advisory/ntap-20210618-0005/', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'https://github.com/adaltas/node-mixme/issues/1'} | null |
GHSA | GHSA-64gv-3pqv-299h | Exposure of Sensitive Information to an Unauthorized Actor in Apache Wicket | By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5 | {'CVE-2020-11976'} | 2021-06-30T17:55:18Z | 2021-05-07T15:54:15Z | HIGH | 7.5 | {'CWE-200'} | {'https://lists.apache.org/thread.html/reb7ea8141c713b5b19eaf34c00f43aaebf5a1c116130f763c42bdad1@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/re4af65851bf69605cfb68be215eba36d4cdc1a90b95fbc894799d923@%3Cdev.directory.apache.org%3E', 'https://github.com/advisories/GHSA-64gv-3pqv-299h', 'https://lists.apache.org/thread.html/r05340178680eb6b9d4d40d56b5621dd4ae9715e6f41f12ae2288ec49@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rdec0a43afdca59c10416889e07267f3d2fdf4ab929a6e22a2659b6ff@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rd26cae6e30b205e09e4b511d3d962d4f677c0c604f737997ce1b2f22@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/r104eeefeb1e9da51f7ef79cef0f9ff12e21ef8559b77801e86b21e16%40%3Cusers.wicket.apache.org%3E', 'https://lists.apache.org/thread.html/r982c626dbce5c995223c4a6ddd7685de3592f8d65ba8372da1f3ce19@%3Cdev.directory.apache.org%3E', 'https://lists.apache.org/thread.html/rd0f36b83cc9f28b016ec552f023fb5a59a9ea8db56f2b9dcc6a2f6b7@%3Ccommits.directory.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11976'} | null |
GHSA | GHSA-cpv8-6xgr-rmf6 | Cross-site Scripting in Dolibarr | In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation. | {'CVE-2021-25955'} | 2021-10-21T14:19:19Z | 2021-08-30T16:22:46Z | CRITICAL | 9 | {'CWE-79'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/advisories/GHSA-cpv8-6xgr-rmf6'} | null |
GHSA | GHSA-7r9x-hr76-jr96 | Command Injection in giting | All versions of `gitting` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to an `exec` call, which may allow attackers to execute arbitrary code in the system. The `pull` function is vulnerable through the `branch` variable.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-10-04T20:45:02Z | 2020-09-04T17:26:18Z | CRITICAL | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-7r9x-hr76-jr96', 'https://www.npmjs.com/advisories/1446'} | null |
GHSA | GHSA-x8xx-x82q-42q3 | Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel | When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible attack vectors are removed from the original file name.
The second issue is that direct access to the images is not access controlled. This is by design, for performance reasons, and documented as such. But it does mean that images not meant to be publicly accessible can be accessed, provided that the image path and filename is correctly deduced and/or guessed, through dictionary attacks and similar. | {'CVE-2022-25336'} | 2022-03-08T21:24:56Z | 2022-02-19T00:01:25Z | MODERATE | 0 | {'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25336', 'https://github.com/advisories/GHSA-x8xx-x82q-42q3', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'} | null |
GHSA | GHSA-gm29-35c7-8cfw | Cross-Site Scripting in buttle | All versions of `buttle` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | {'CVE-2019-5422'} | 2021-01-08T18:46:08Z | 2019-04-08T15:18:38Z | HIGH | 0 | {'CWE-79'} | {'https://hackerone.com/reports/331110', 'https://github.com/advisories/GHSA-gm29-35c7-8cfw', 'https://hackerone.com/reports/331032', 'https://www.npmjs.com/advisories/667', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5422', 'https://www.npmjs.com/advisories/1009'} | null |
GHSA | GHSA-qc4m-gc8r-mg8m | Double free in alpm-rs | An issue was discovered in the alpm-rs crate through 2020-08-20 for Rust. StrcCtx performs improper memory deallocation. | {'CVE-2020-35885'} | 2021-08-25T20:48:59Z | 2021-08-25T20:48:59Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://github.com/pigeonhands/rust-arch/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35885', 'https://github.com/advisories/GHSA-qc4m-gc8r-mg8m', 'https://rustsec.org/advisories/RUSTSEC-2020-0032.html'} | null |
GHSA | GHSA-2vgm-wxr3-6w2j | Authentication bypass in Apache Shiro | Apache Shiro before 1.6.0, when using Apache Shiro, a specially crafted HTTP request may cause an authentication bypass. | {'CVE-2020-13933'} | 2022-04-01T20:23:15Z | 2021-05-07T15:54:23Z | HIGH | 7.5 | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13933', 'https://lists.apache.org/thread.html/r4c1e1249e9e1acb868db0c80728c13f448d07333da06a0f1603c0a33@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r8097b81905f2a113ebdf925bcbc6d8c9d6863c807c9ee42e1e7c9293@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-2vgm-wxr3-6w2j', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://lists.apache.org/thread.html/r6ea0224c1971a91dc6ade1f22508119a9c3bd56cef656f0c44bbfabb@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r539f87706094e79c5da0826030384373f0041068936912876856835f%40%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r4506cedc401d6b8de83787f8436aac83956e411d66848c84785db46d@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb5edf49cd1451475dbcf53826ba6ef1bb7872dd6493d6112eb0c2bad@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r18b45d560d76c4260813c802771cc9678aa651fb8340e09366bfa198@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9ea6d8560d6354d41433ad006069904f0ed083527aa348b5999261a7@%3Cdev.geode.apache.org%3E'} | null |
GHSA | GHSA-7c7g-72q7-4xhm | Prototype pollution vulnerability in 'deepref' | Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28274'} | 2021-10-12T16:27:35Z | 2021-10-12T16:27:35Z | CRITICAL | 9.8 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2', 'https://github.com/advisories/GHSA-7c7g-72q7-4xhm'} | null |
GHSA | GHSA-w73w-5m7g-f7qc | Authorization bypass in github.com/dgrijalva/jwt-go | jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m["aud"] (which is allowed by the specification). Because the type assertion fails, "" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1 | {'CVE-2020-26160'} | 2021-08-02T15:09:03Z | 2021-05-18T21:08:21Z | HIGH | 7.5 | {'CWE-287', 'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26160', 'https://github.com/advisories/GHSA-w73w-5m7g-f7qc', 'https://github.com/dgrijalva/jwt-go/issues/422', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMDGRIJALVAJWTGO-596515', 'https://github.com/dgrijalva/jwt-go/issues/462', 'https://github.com/dgrijalva/jwt-go/pull/426'} | null |
GHSA | GHSA-xh9g-cp3v-p8q4 | Missing Authorization in Crater Invoice | Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability.. | {'CVE-2022-0203'} | 2022-02-10T22:25:36Z | 2022-01-27T00:01:17Z | MODERATE | 5.3 | {'CWE-862', 'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992', 'https://github.com/advisories/GHSA-xh9g-cp3v-p8q4'} | null |
GHSA | GHSA-xrx6-fmxq-rjj2 | Timing attacks in python-rsa | It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA. | {'CVE-2020-25658'} | 2021-09-27T18:38:48Z | 2021-04-30T17:35:15Z | MODERATE | 5.9 | {'CWE-327', 'CWE-385'} | {'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed', 'https://github.com/sybrenstuvel/python-rsa/issues/165', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25658', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QY4PJWTYSOV7ZEYZVMYIF6XRU73CY6O7/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2SAF67KDGSOHLVFTRDOHNEAFDRSSYIWA/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/APF364QJ2IYLPDNVFBOEJ24QP2WLVLJP/', 'https://github.com/advisories/GHSA-xrx6-fmxq-rjj2', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25658'} | null |
GHSA | GHSA-9534-h433-2rjf | Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify | utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype. | {'CVE-2019-10808'} | 2021-07-28T18:40:29Z | 2021-05-07T16:28:47Z | HIGH | 8.8 | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://github.com/advisories/GHSA-9534-h433-2rjf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'} | null |
GHSA | GHSA-85j6-f8j6-q26x | Unaligned references in Obstack | An issue was discovered in the obstack crate before 0.1.4 for Rust. Unaligned references can occur. | {'CVE-2020-35894'} | 2021-08-25T20:48:12Z | 2021-08-25T20:48:12Z | HIGH | 7.5 | {'CWE-706'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35894', 'https://github.com/advisories/GHSA-85j6-f8j6-q26x', 'https://github.com/petertodd/rust-obstack/issues/4', 'https://rustsec.org/advisories/RUSTSEC-2020-0040.html'} | null |
GHSA | GHSA-w8fh-pvq2-x8c4 | Malicious npm package: sonatype | The npm `sonatype` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-01-29T18:11:20Z | 2021-01-29T18:11:20Z | CRITICAL | 0 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1596', 'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755', 'https://github.com/advisories/GHSA-w8fh-pvq2-x8c4'} | null |
GHSA | GHSA-3329-pjwv-fjpg | Hostname spoofing via backslashes in URL | ### Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect.
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Example URL: `https://expected-example.com\@observed-example.com`
Escaped string: `https://expected-example.com\\@observed-example.com` (JavaScript strings must escape backslash)
Affected versions incorrectly return `observed-example.com`. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html).
### Patches
Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant.
### References
https://github.com/medialize/URI.js/releases/tag/v1.19.4 (complete fix for this bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.3 (partial fix for this bypass)
[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling)
### For more information
If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
### Reporter credit
[Alesandro Ortiz](https://AlesandroOrtiz.com) | {'CVE-2020-26291'} | 2022-04-19T19:02:43Z | 2020-12-30T23:40:48Z | MODERATE | 6.5 | {'CWE-20'} | {'https://www.npmjs.com/package/urijs', 'https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg', 'https://github.com/advisories/GHSA-3329-pjwv-fjpg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/advisories/1595', 'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'} | null |
GHSA | GHSA-x4cm-m36h-c6qj | Moderate severity vulnerability that affects ansible | An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed. | {'CVE-2016-8647'} | 2021-09-21T22:09:41Z | 2018-10-10T17:23:33Z | MODERATE | 4.9 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-8647', 'https://github.com/advisories/GHSA-x4cm-m36h-c6qj'} | null |
GHSA | GHSA-6p56-wp2h-9hxr | Buffer Overflow in NumPy | A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. | {'CVE-2021-33430'} | 2022-02-08T20:09:25Z | 2022-01-07T00:09:39Z | MODERATE | 5.3 | {'CWE-120'} | {'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e', 'https://github.com/numpy/numpy/issues/18939', 'https://github.com/advisories/GHSA-6p56-wp2h-9hxr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33430'} | null |
GHSA | GHSA-vgrx-w6rg-8fqf | Forgeable Public/Private Tokens in jwt-simple | Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authentication bypass with minimal effort.
## Recommendation
Update to version 0.3.1 or later.
Additionally, be sure to always specify an algorithm in calls to `.decode()`. | {'CVE-2016-10555'} | 2021-01-08T01:57:18Z | 2018-11-06T23:12:07Z | CRITICAL | 0 | {'CWE-20'} | {'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97', 'https://www.npmjs.com/advisories/87', 'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/hokaccha/node-jwt-simple/pull/14', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555', 'https://github.com/advisories/GHSA-vgrx-w6rg-8fqf', 'https://github.com/hokaccha/node-jwt-simple/pull/16', 'https://nodesecurity.io/advisories/87'} | null |
GHSA | GHSA-v6vv-hhqc-6hh2 | Malicious Package in pyramid-proportion | Version 1.0.5 of `pyramid-proportion` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. | null | 2020-09-03T19:15:37Z | 2020-09-03T19:15:37Z | CRITICAL | 0 | null | {'https://github.com/advisories/GHSA-v6vv-hhqc-6hh2', 'https://www.npmjs.com/advisories/1106'} | null |
GHSA | GHSA-qjvf-rmwg-64fr | Downloads Resources over HTTP in install-g-test | Affected versions of `install-g-test` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10630'} | 2021-01-08T01:58:34Z | 2019-02-18T23:47:20Z | HIGH | 0 | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-10630', 'https://www.npmjs.com/advisories/228', 'https://github.com/advisories/GHSA-qjvf-rmwg-64fr', 'https://nodesecurity.io/advisories/228'} | null |
GHSA | GHSA-fx5c-h9f6-rv7c | `CHECK`-fails due to attempting to build a reference tensor | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [Grappler optimizer would attempt to build a tensor using a reference `dtype`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402). This would result in a crash due to a `CHECK`-fail [in the `Tensor` constructor](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781) as reference types are not allowed.
### Patches
We have patched the issue in GitHub commit [6b5adc0877de832b2a7c189532dbbbc64622eeb6](https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23588'} | 2022-02-11T20:01:09Z | 2022-02-09T23:28:07Z | MODERATE | 6.5 | {'CWE-617'} | {'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1328-L1402', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/tensor.cc#L733-L781', 'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23588', 'https://github.com/advisories/GHSA-fx5c-h9f6-rv7c'} | null |
GHSA | GHSA-76xq-58hj-vwm2 | Malicious Package in test-module-a | All versions of `test-module-a` contain malicious code as a preinstall script. The package fetches all names of npm packages owned by the user and attempts to add another maintainer to every package as a means of package hijacking,
## Recommendation
Remove the package from your system. If you own any packages that were compromised please contact npm security immediately at security@npmjs.com. Also enable 2FA for publishing to further secure packages you maintain. | null | 2021-09-30T22:06:08Z | 2020-09-11T21:16:59Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/929', 'https://github.com/advisories/GHSA-76xq-58hj-vwm2'} | null |
GHSA | GHSA-f997-8gxg-r354 | Data races in lexer | lexer is a plugin based lexical reader.Affected versions of this crate implements Sync for ReaderResult<T, E> with the trait bound T: Send, E: Send. Since matching on the public enum ReaderResult<T, E> provides access to &T & &E, allowing data race to a non-Sync type T or E. This can result in a memory corruption when multiple threads concurrently access &T or &E. Suggested fix for the bug is change the trait bounds imposed on T & E to be T: Sync, E: Sync. | {'CVE-2020-36458'} | 2022-05-05T18:16:26Z | 2021-08-25T20:58:09Z | HIGH | 8.1 | {'CWE-362', 'CWE-77'} | {'https://github.com/advisories/GHSA-f997-8gxg-r354', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36458', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lexer/RUSTSEC-2020-0138.md', 'https://rustsec.org/advisories/RUSTSEC-2020-0138.html', 'https://gitlab.com/nathanfaucett/rs-lexer/-/issues/2'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.