ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-7x7c-qm48-pq9c
Cross-site Scripting in karma
karma prior to version 6.3.14 contains a cross-site scripting vulnerability.
{'CVE-2022-0437'}
2022-02-11T19:59:48Z
2022-02-06T00:00:54Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0437', 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a', 'https://github.com/advisories/GHSA-7x7c-qm48-pq9c', 'https://github.com/karma-runner/karma/releases/tag/v6.3.14', 'https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885'}
null
GHSA
GHSA-gf88-j2mg-cc82
Crash caused by integer conversion to unsigned
### Impact An attacker can cause a denial of service in `boosted_trees_create_quantile_stream_resource` by using negative arguments: ```python import tensorflow as tf from tensorflow.python.ops import gen_boosted_trees_ops import numpy as np v= tf.Variable([0.0, 0.0, 0.0, 0.0, 0.0]) gen_boosted_trees_ops.boosted_trees_create_quantile_stream_resource( quantile_stream_resource_handle = v.handle, epsilon = [74.82224], num_streams = [-49], max_elements = np.int32(586)) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantile_ops.cc#L96) does not validate that `num_streams` only contains non-negative numbers. In turn, [this results in using this value to allocate memory](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/boosted_trees/quantiles/quantile_stream_resource.h#L31-L40): ```cc class BoostedTreesQuantileStreamResource : public ResourceBase { public: BoostedTreesQuantileStreamResource(const float epsilon, const int64 max_elements, const int64 num_streams) : are_buckets_ready_(false), epsilon_(epsilon), num_streams_(num_streams), max_elements_(max_elements) { streams_.reserve(num_streams_); ... } } ``` However, `reserve` receives an unsigned integer so there is an implicit conversion from a negative value to a large positive unsigned. This results in a crash from the standard library. ### Patches We have patched the issue in GitHub commit [8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992](https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37661'}
2021-08-25T14:42:28Z
2021-08-25T14:42:28Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf88-j2mg-cc82', 'https://github.com/advisories/GHSA-gf88-j2mg-cc82', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37661', 'https://github.com/tensorflow/tensorflow/commit/8a84f7a2b5a2b27ecf88d25bad9ac777cd2f7992'}
null
GHSA
GHSA-82rr-mq4r-p4r3
SQL injection in francoisjacquet/rosariosis
An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
{'CVE-2021-44567'}
2022-03-04T21:39:01Z
2022-02-25T00:01:08Z
CRITICAL
9.8
{'CWE-89'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/issues/308', 'https://github.com/advisories/GHSA-82rr-mq4r-p4r3', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/519af055a4fdc1362657d75bca76f9c95a081eaa', 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567'}
null
GHSA
GHSA-q948-x8rf-888m
os_str_bytes relies on undefined behavior of `char::from_u32_unchecked`
An issue was discovered in the os_str_bytes crate before 2.0.0 for Rust. It has false expectations about char::from_u32_unchecked behavior.
{'CVE-2020-35865'}
2021-08-25T20:47:55Z
2021-08-25T20:47:55Z
HIGH
7.5
{'CWE-704'}
{'https://github.com/advisories/GHSA-q948-x8rf-888m', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35865', 'https://github.com/dylni/os_str_bytes/pull/1', 'https://rustsec.org/advisories/RUSTSEC-2020-0012.html'}
null
GHSA
GHSA-8hj4-w233-g35q
Downloads Resources over HTTP in react-native-baidu-voice-synthesizer
Affected versions of `react-native-baidu-voice-synthesizer` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `react-native-baidu-voice-synthesizer`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10697'}
2021-01-08T19:09:28Z
2018-07-31T22:47:16Z
HIGH
0
{'CWE-311'}
{'https://nodesecurity.io/advisories/302', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10697', 'https://www.npmjs.com/advisories/302', 'https://github.com/advisories/GHSA-8hj4-w233-g35q'}
null
GHSA
GHSA-chqj-j4fh-rw7m
Cross-Site Scripting in dompurify
Versions of `dompurify` prior to 2.0.3 are vulnerable to Cross-Site Scripting (XSS). The package has an XSS filter bypass due to Mutation XSS in both Chrome and Safari through a combination of `<svg>`/`<math>` elements and `</p>`/`</br>`. An example payload is: `<svg></p><style><a id="</style><img src=1 onerror=alert(1)>">`. This allows attackers to bypass the XSS protection and execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.0.3 or later. You may also disallow `<svg>` and `<math>` through `dompurify` configurations: ```DOMPurify.sanitize(input, { FORBID_TAGS: ['svg', 'math'] });```
{'CVE-2019-16728'}
2021-01-08T21:22:25Z
2020-08-28T21:25:11Z
CRITICAL
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16728', 'https://www.npmjs.com/advisories/1205', 'https://research.securitum.com/dompurify-bypass-using-mxss/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://github.com/advisories/GHSA-chqj-j4fh-rw7m'}
null
GHSA
GHSA-q77q-vx4q-xx6q
Cross-site Scripting in org.owasp.esapi:esapi
### Impact There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details. ### Patches Patched in ESAPI 2.3.0.0 and later. See important remediation details in the reference given below. ### Workarounds Manually edit your **antisamy-esapi.xml** configuration files to change the "onsiteURL" regular expression as per remediation instructions in the reference below. ### References [Security Bulletin 8](https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf) ### For more information If you have any questions or comments about this advisory: * Email one of the project co-leaders. See email addresses listed on the [OWASP ESAPI wiki](https://owasp.org/www-project-enterprise-security-api/) page, under "Leaders". * Send email to one of the two ESAPI related Google Groups listed under [Where to Find More Information on ESAPI](https://github.com/ESAPI/esapi-java-legacy#where-to-find-more-information-on-esapi) on our [README.md](https://github.com/ESAPI/esapi-java-legacy#readme) page.
{'CVE-2022-24891'}
2022-05-08T18:41:54Z
2022-04-27T21:09:46Z
MODERATE
0
{'CWE-79'}
{'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-release-notes.txt', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin8.pdf', 'https://github.com/advisories/GHSA-q77q-vx4q-xx6q', 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'}
null
GHSA
GHSA-c3x7-gjmx-r2ff
Open Redirect in serve-static
Versions of `serve-static` prior to 1.6.5 ( or 1.7.x prior to 1.7.2 ) are affected by an open redirect vulnerability on some browsers when configured to mount at the root directory. ## Proof of Concept A link to `http://example.com//www.google.com/%2e%2e` will redirect to `//www.google.com/%2e%2e` Some browsers will interpret this as `http://www.google.com/%2e%2e`, resulting in an external redirect. ## Recommendation Version 1.7.x: Update to version 1.7.2 or later. Version 1.6.x: Update to version 1.6.5 or later.
{'CVE-2015-1164'}
2021-09-23T20:59:31Z
2020-08-31T22:57:02Z
LOW
3.1
{'CWE-601'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1181917', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1164', 'https://www.npmjs.com/advisories/35', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99936', 'https://github.com/advisories/GHSA-c3x7-gjmx-r2ff', 'https://github.com/expressjs/serve-static/issues/26', 'http://www.securityfocus.com/bid/72064', 'https://snyk.io/vuln/npm:serve-static:20150113', 'http://nodesecurity.io/advisories/serve-static-open-redirect'}
null
GHSA
GHSA-r56q-vv3c-6g9c
Improper sanitization of delegated role names
### Impact The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system. AWS would like to thank https://github.com/jku for reporting this issue. ### Patches A fix is available in version 0.12.0. ### Workarounds No workarounds to this issue are known. ### References https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
{'CVE-2021-41150'}
2021-10-20T15:38:21Z
2021-10-19T20:16:26Z
HIGH
8.2
{'CWE-22'}
{'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr', 'https://github.com/awslabs/tough/security/advisories/GHSA-r56q-vv3c-6g9c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41150', 'https://github.com/advisories/GHSA-r56q-vv3c-6g9c', 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}
null
GHSA
GHSA-g27j-74fp-xfpr
Insecure default value for CORS configuration
### Impact The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed. ### Patches The default values for CORS have been changed in https://github.com/directus/directus/pull/12022 which is released under 9.7.0 ### Workarounds Configure the CORS environment variables to match your project's usage, rather than leaving them at the (permissive) defaults. ### For more information If you have any questions or comments about this advisory: * Open an issue in [directus/directus](https://github.com/directus/directus) * Email us at [security@directus.io](mailto:security@directus.io)
{'CVE-2022-26969'}
2022-04-06T18:48:15Z
2022-04-05T18:31:22Z
HIGH
8.3
null
{'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr', 'https://github.com/directus/directus/pull/12022', 'https://github.com/advisories/GHSA-g27j-74fp-xfpr'}
null
GHSA
GHSA-f366-4rvv-95x2
Buffer overflow in deprecated USB HALs and stack overflow in USB enumeration
### Impact 1) If an application is making use of the deprecated kit protocol HALs as the communication channel to the target device an attacker can masquerade as a device and return malformed packets of arbitrary length which the protocol stack will write to the stack. HALs intended for production use are unaffected (I2C, SWI, & SPI) as well as the hidapi HAL (hal_all_platforms_kit_hidapi.c). 2) The hidapi HAL can be made to overrun the application stack by attaching more than 10 (real or virtual) devices likely resulting in an application crash as this does not allow arbitrary data to be written to the stack. ### Patches USB kit enumeration has been patched in v3.2.3 for the hidapi HAL (hal_all_platforms_kit_hidapi.c). ### Removal of deprecated HALs Deprecated usb kit HALs have been removed in v3.2.3. ### Workarounds This vulnerability is limited to users of the kit protocol which is used with Microchip kits and kit firmware to bridge communication from USB-HID to I2C or SWI. It is not expected that kits would be used in an production environment. This is an optional component for users as well so they can always compile the library without the usb support option. ### Special python packaging notes The python package for cryptoauthlib uses date codes for identifying versions. The patched version for python packages is 20200912 ### References Please see [Microchip PSIRT](https://www.microchip.com/design-centers/embedded-security/how-to-report-potential-product-security-vulnerabilities) for Microchip's security policy and reporting procedures ### Credits Special thanks to Ruben Santamarta of [IOActive](https://blogs.ioactive.com/) for reporting
null
2021-10-04T21:23:53Z
2020-10-02T16:33:19Z
LOW
0
{'CWE-120'}
{'https://github.com/advisories/GHSA-f366-4rvv-95x2', 'https://github.com/MicrochipTech/cryptoauthlib/security/advisories/GHSA-f366-4rvv-95x2'}
null
GHSA
GHSA-ff2r-xpwq-6whj
Use of Uninitialized Resource in gfx-auxil
An issue was discovered in the gfx-auxil crate through 2021-01-07 for Rust. gfx_auxil::read_spirv may read from uninitialized memory locations.
{'CVE-2021-45689'}
2022-01-07T17:18:43Z
2022-01-06T22:12:14Z
CRITICAL
9.8
{'CWE-908'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0091.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/gfx-auxil/RUSTSEC-2021-0091.md', 'https://github.com/advisories/GHSA-ff2r-xpwq-6whj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45689'}
null
GHSA
GHSA-pfjj-m3jj-9jc9
Undefined behavior in `SparseTensorSliceDataset`
### Impact The [implementation of `SparseTensorSliceDataset`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292) has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value: ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseTensorSliceDataset( indices=[[]], values=[], dense_shape=[1,1]) ``` The 3 input arguments represent a sparse tensor. However, there are some preconditions that these arguments must satisfy but these are not validated in the implementation. ### Patches We have patched the issue in GitHub commit [965b97e4a9650495cda5a8c210ef6684b4b9eceb](https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-21736'}
2022-02-11T16:24:04Z
2022-02-09T23:43:27Z
HIGH
7.6
{'CWE-476'}
{'https://github.com/advisories/GHSA-pfjj-m3jj-9jc9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21736', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292', 'https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9'}
null
GHSA
GHSA-c2m4-w5hm-vqjw
Hijacked Environment Variables in crossenv
The `crossenv` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16074'}
2021-01-08T19:01:02Z
2018-08-29T23:05:46Z
MODERATE
0
{'CWE-506'}
{'https://www.npmjs.com/advisories/513', 'https://nodesecurity.io/advisories/513', 'https://github.com/advisories/GHSA-c2m4-w5hm-vqjw', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16074'}
null
GHSA
GHSA-7vph-p634-vrqf
Command Injection in RaspAP 2.6.6
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
{'CVE-2021-38556'}
2021-09-03T20:35:53Z
2021-09-02T17:11:00Z
HIGH
8.8
{'CWE-77'}
{'https://github.com/RaspAP/raspap-webgui', 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php', 'https://github.com/advisories/GHSA-7vph-p634-vrqf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38556', 'https://zerosecuritypenetrationtesting.com/?page_id=306'}
null
GHSA
GHSA-c722-pv5w-cfg2
Malicious Package in github-jquery-widgets
Version 0.1.2 of `github-jquery-widgets` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-09-11T21:20:14Z
2020-09-11T21:20:14Z
CRITICAL
0
null
{'https://github.com/advisories/GHSA-c722-pv5w-cfg2', 'https://www.npmjs.com/advisories/933'}
null
GHSA
GHSA-93p5-8fqw-wjx3
Authentication bypass by capture-replay in github.com/cosmos/ethermint
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
{'CVE-2021-25834'}
2022-04-12T22:56:36Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-287', 'CWE-294'}
{'https://github.com/cosmos/ethermint/issues/686', 'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72', 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1', 'https://github.com/advisories/GHSA-93p5-8fqw-wjx3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25834'}
null
GHSA
GHSA-ph3v-2hq5-5qfq
Code injection in RazorEngine
In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{'CVE-2021-46703'}
2022-04-19T19:03:27Z
2022-03-07T00:00:41Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-ph3v-2hq5-5qfq', 'https://github.com/Antaris/RazorEngine/issues/585', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'}
null
GHSA
GHSA-qhmp-h54x-38qr
CWE-730 Regex injection with IFTTT Plugin
### Impact Anyone _publicly_ hosting the Apprise library and granting them access to the IFTTT notification service. ### Patches Update to Apprise v0.9.5.1 ```bash # Install Apprise v0.9.5.1 from PyPI pip install apprise==0.9.5.1 ``` The patch to the problem was performed [here](https://github.com/caronc/apprise/pull/436/files). ### Workarounds Alternatively, if upgrading is not an option, you can safely remove the following file: - `apprise/plugins/NotifyIFTTT.py` The above will eliminate the ability to use IFTTT, but everything else will work smoothly. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Apprise](https://github.com/caronc/apprise/issues) * Email me at [lead2gold@gmail.com](mailto:lead2gold@gmail.com) ### Additional Credit Github would not allow me to additionally credit **Rasmus Petersen**, but I would like to put that here at the very least - thank you for finding and reporting this issue along with those already credited ## Additional Notes: - Github would not allow me to add/tag the 2 CWE's this issue is applicable to (only CWE-400). The other is: CWE-730 (placed in the title)
{'CVE-2021-39229'}
2022-04-19T19:03:09Z
2021-09-20T20:57:02Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/caronc/apprise/commit/e20fce630d55e4ca9b0a1e325a5fea6997489831', 'https://github.com/advisories/GHSA-qhmp-h54x-38qr', 'https://github.com/caronc/apprise/security/advisories/GHSA-qhmp-h54x-38qr', 'https://github.com/caronc/apprise/blob/0007eade20934ddef0aba38b8f1aad980cfff253/apprise/plugins/NotifyIFTTT.py#L356-L359', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39229', 'https://github.com/caronc/apprise/releases/tag/v0.9.5.1', 'https://github.com/caronc/apprise/pull/436'}
null
GHSA
GHSA-cjg2-2fjg-fph4
Integer underflow in Frontier
### Impact A bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. It is recommended that you apply the patch as soon as possible. If you do not use MODEXP precompile in your runtime, then you are not impacted. ### Patches Patches are applied in PR #549. ### Workarounds None. ### References Patch PR: #549 ### Credits Thanks to SR-Labs for discovering the security vulnerability, and thanks to PureStake team for the patches. ### For more information If you have any questions or comments about this advisory: * Open an issue in the [Frontier repo](https://github.com/paritytech/frontier)
{'CVE-2022-21685'}
2022-01-15T00:03:46Z
2022-01-14T21:03:36Z
MODERATE
0
{'CWE-191'}
{'https://github.com/paritytech/frontier/pull/549', 'https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4', 'https://github.com/paritytech/frontier/commit/8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664', 'https://github.com/advisories/GHSA-cjg2-2fjg-fph4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21685'}
null
GHSA
GHSA-qm28-7hqv-wg5j
OS Command Injection in ng-packagr
The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.
{'CVE-2020-7735'}
2021-10-05T16:28:06Z
2021-05-07T16:47:32Z
MODERATE
6.6
{'CWE-78'}
{'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735', 'https://github.com/advisories/GHSA-qm28-7hqv-wg5j', 'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427'}
null
GHSA
GHSA-352p-rhvq-7g78
Null pointer deference in av-data
An issue was discovered in the av-data crate before 0.3.0 for Rust. A raw pointer is dereferenced, leading to a read of an arbitrary memory address, sometimes causing a segfault.
{'CVE-2021-25904'}
2021-08-25T20:52:55Z
2021-08-25T20:52:55Z
HIGH
7.5
{'CWE-476'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0007.html', 'https://github.com/advisories/GHSA-352p-rhvq-7g78', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25904', 'https://github.com/rust-av/rust-av/issues/136'}
null
GHSA
GHSA-p5hj-xxfr-pwc3
Code Injection in microweber
Code Injection in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0282'}
2022-01-27T18:32:44Z
2022-01-21T18:02:39Z
HIGH
7.5
{'CWE-94'}
{'https://github.com/advisories/GHSA-p5hj-xxfr-pwc3', 'https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd', 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282'}
null
GHSA
GHSA-r496-7hgp-53wf
Vulnerability in dump function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36377'}
2022-05-05T13:47:47Z
2021-11-02T15:42:24Z
CRITICAL
9.8
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36377', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/advisories/GHSA-r496-7hgp-53wf'}
null
GHSA
GHSA-2r4h-2ghh-5hpx
Directory Traversal in weather.swlyons
Affected versions of `weather.swlyons` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16110'}
2021-01-14T15:50:49Z
2020-09-01T17:18:33Z
HIGH
0
{'CWE-22'}
{'https://github.com/advisories/GHSA-2r4h-2ghh-5hpx', 'https://www.npmjs.com/advisories/379', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16110', 'https://nodesecurity.io/advisories/379', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/weather.swlyons'}
null
GHSA
GHSA-3qp6-m7hp-jrwf
Cross-site Scripting in Apache Pluto
The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
{'CVE-2021-36739'}
2022-01-08T00:46:21Z
2022-01-08T00:46:21Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-3qp6-m7hp-jrwf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36739', 'https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p'}
null
GHSA
GHSA-jv64-2m3x-6v4q
Cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS
A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects".
{'CVE-2021-41948'}
2022-05-04T18:10:43Z
2022-04-30T00:00:36Z
MODERATE
0
{'CWE-79'}
{'https://github.com/intelliants/subrion-plugin-contact_us/issues/8', 'https://github.com/advisories/GHSA-jv64-2m3x-6v4q', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}
null
GHSA
GHSA-vwjj-2852-3765
Cross-Site Scripting in forms
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting. ## Recommendation Update to version 1.3.0 or later.
{'CVE-2017-16015'}
2021-01-08T01:57:11Z
2018-11-09T17:46:27Z
MODERATE
0
{'CWE-80'}
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d', 'https://github.com/advisories/GHSA-vwjj-2852-3765', 'https://nodesecurity.io/advisories/158', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015', 'https://www.npmjs.com/advisories/158'}
null
GHSA
GHSA-7vwg-39h8-8qp8
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer. If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc
null
2021-03-11T17:42:01Z
2021-03-11T17:42:01Z
HIGH
0
{'CWE-203'}
{'https://packagist.org/packages/ezsystems/ezplatform-rest', 'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933', 'https://github.com/advisories/GHSA-7vwg-39h8-8qp8', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'}
null
GHSA
GHSA-v633-x5vv-hqwc
Cross-Site Scripting in serve-index
Versions 1.6.2 and earlier of `serve-index` are affected by a cross-site scripting vulnerability. Because file and directory names are not escaped in the module's HTML output, a remote attacker that can influence file or directory names can launch a persistent cross-site scripting attack on the application. ## Recommendation Update to version 1.6.3 or later.
{'CVE-2015-8856'}
2021-09-20T15:12:26Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/expressjs/serve-index/issues/28', 'https://nodesecurity.io/advisories/34', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8856', 'https://github.com/advisories/GHSA-v633-x5vv-hqwc', 'https://www.npmjs.com/advisories/34', 'http://www.securityfocus.com/bid/96392', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
GHSA
GHSA-53mj-mc38-q894
Remote Memory Exposure in openwhisk
Versions of `openwhisk` before 3.3.1 are vulnerable to remote memory exposure. When a number is passed to `api_key`, affected versions of `openwhisk` allocate an uninitialized buffer and send that over network in Authorization header (base64-encoded). Proof of concept: ```js var openwhisk = require('openwhisk'); var options = { apihost: '127.0.0.1:1433', api_key: USERSUPPLIEDINPUT // number }; var ow = openwhisk(options); ow.actions.invoke({actionName: 'sample'}).then(result => console.log(result)) ``` ## Recommendation Update to version 3.3.1 or later.
null
2021-09-24T14:29:03Z
2020-09-01T19:40:41Z
MODERATE
0
null
{'https://github.com/openwhisk/openwhisk-client-js/pull/34', 'https://www.npmjs.com/advisories/600', 'https://github.com/advisories/GHSA-53mj-mc38-q894'}
null
GHSA
GHSA-g4rw-8m5q-6453
Out of bounds access in rgb
A safety violation was discovered in the rgb crate before 0.8.20 for Rust, leading to (for example) dereferencing of arbitrary pointers or disclosure of uninitialized memory. This occurs because structs can be treated as bytes for read and write operations.
{'CVE-2020-25016'}
2021-08-25T20:45:12Z
2021-08-25T20:45:12Z
CRITICAL
9.1
{'CWE-119', 'CWE-843'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0029.html', 'https://github.com/advisories/GHSA-g4rw-8m5q-6453', 'https://github.com/kornelski/rust-rgb/issues/35', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25016'}
null
GHSA
GHSA-gpqq-952q-5327
XSS in the `of` option of the `.position()` util in jquery-ui
### Impact Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code: ```js $( "#element" ).position( { my: "left top", at: "right bottom", of: "<img onerror='window.globalOf=true' src='/404' />", collision: "none" } ); ``` will call the `doEvilThing()` function. ### Patches The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector. ### Workarounds A workaround is to not accept the value of the `of` option from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
{'CVE-2021-41184'}
2022-04-22T15:40:38Z
2021-10-26T14:55:12Z
MODERATE
6.5
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-core-2022-001', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184', 'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://github.com/advisories/GHSA-gpqq-952q-5327', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}
null
GHSA
GHSA-ff6g-gm92-rf32
Malicious Package in coinstirng
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:58:20Z
2020-09-03T19:42:06Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-ff6g-gm92-rf32', 'https://www.npmjs.com/advisories/1383'}
null
GHSA
GHSA-w3j4-76qw-wwjm
Older releases of better_errors open to Cross-Site Request Forgery attack
### Impact better_errors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with better_errors enabled open to cross-origin attacks. _As a developer tool, better_errors documentation strongly recommends addition only to the `development` bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits better_errors to the `development` group (or the non-Rails equivalent)._ ### Patches Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3". ### Workarounds There are no known workarounds to mitigate the risk of using older releases of better_errors. ### References - Chris Moberly provided [an example attack that uses a now-patched vulnerability of webpack-dev-server in conjunction with Better Errors](https://about.gitlab.com/blog/2021/09/07/why-are-developers-vulnerable-to-driveby-attacks/) ### For more information If you have any questions or comments about this advisory, please - Add to the [discussion in better_errors](https://github.com/BetterErrors/better_errors/discussions/507) - Open an issue in [better_errors](https://github.com/BetterErrors/better_errors)
{'CVE-2021-39197'}
2022-04-19T19:03:07Z
2021-09-07T23:08:24Z
MODERATE
6.3
{'CWE-352'}
{'https://github.com/BetterErrors/better_errors/commit/8e8e796bfbde4aa088741823c8a3fc6df2089bb0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39197', 'https://github.com/BetterErrors/better_errors/discussions/507', 'https://github.com/BetterErrors/better_errors/security/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/advisories/GHSA-w3j4-76qw-wwjm', 'https://github.com/BetterErrors/better_errors/pull/474'}
null
GHSA
GHSA-6jm6-cmcp-fqjq
Nomad Spread Job Stanza May Trigger Panic in Servers
Nomad and Nomad Enterprise allows operators with job-submit capabilities to use the spread stanza in a way such that it can cause panic in Nomad servers. This vulnerability, CVE-2022-24684, was fixed in Nomad 1.0.18, 1.1.12, and 1.2.6.
{'CVE-2022-24684'}
2022-04-05T21:09:26Z
2022-02-16T00:01:42Z
MODERATE
6.5
{'CWE-400'}
{'https://security.netapp.com/advisory/ntap-20220318-0008/', 'https://github.com/advisories/GHSA-6jm6-cmcp-fqjq', 'https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/35562', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24684'}
null
GHSA
GHSA-xq5j-gw7f-jgj8
CSRF Vulnerability in rails-ujs
There is an vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains. Versions Affected: rails <= 6.0.3 Not affected: Applications which don't use rails-ujs. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ This is a regression of CVE-2015-1840. In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to a cross-origin URL, and the CSRF token will be sent. Workarounds ----------- To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters. For example, code like this: link_to params to code like this: link_to filtered_params def filtered_params # Filter just the parameters that you trust end
{'CVE-2020-8167'}
2021-10-22T13:57:54Z
2020-07-07T16:34:10Z
MODERATE
6.5
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8167', 'https://github.com/advisories/GHSA-xq5j-gw7f-jgj8', 'https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0', 'https://www.debian.org/security/2020/dsa-4766', 'https://groups.google.com/g/rubyonrails-security/c/x9DixQDG9a0', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml', 'https://hackerone.com/reports/189878'}
null
GHSA
GHSA-7ghq-fvr3-pj2x
Incomplete validation in `MaxPoolGrad`
### Impact An attacker can trigger a denial of service via a segmentation fault in `tf.raw_ops.MaxPoolGrad` caused by missing validation: ```python import tensorflow as tf tf.raw_ops.MaxPoolGrad( orig_input = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), orig_output = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), grad = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32), ksize = [1, 16, 16, 1], strides = [1, 16, 18, 1], padding = "EXPLICIT", explicit_paddings = [0, 0, 14, 3, 15, 5, 0, 0]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/maxpooling_op.cc) misses some validation for the `orig_input` and `orig_output` tensors. The fixes for [CVE-2021-29579](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md) were incomplete. ### Patches We have patched the issue in GitHub commit [136b51f10903e044308cf77117c0ed9871350475](https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37674'}
2021-08-25T14:41:33Z
2021-08-25T14:41:33Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475', 'https://github.com/advisories/GHSA-7ghq-fvr3-pj2x', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37674', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x'}
null
GHSA
GHSA-jwfh-j623-m97h
Use of Uninitialized Resource in messagepack-rs
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations.
{'CVE-2021-45691'}
2022-01-07T17:12:55Z
2022-01-06T22:12:35Z
CRITICAL
9.8
{'CWE-908'}
{'https://github.com/advisories/GHSA-jwfh-j623-m97h', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/messagepack-rs/RUSTSEC-2021-0092.md', 'https://rustsec.org/advisories/RUSTSEC-2021-0092.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45691'}
null
GHSA
GHSA-gfhx-jjwq-63gv
Cross-site Scripting in Apereo CAS
Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.
{'CVE-2021-42567'}
2021-12-10T20:24:11Z
2021-12-10T20:24:11Z
MODERATE
0
{'CWE-79'}
{'https://apereo.github.io/2021/10/18/restvuln/', 'https://github.com/apereo/cas/releases', 'https://github.com/advisories/GHSA-gfhx-jjwq-63gv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42567'}
null
GHSA
GHSA-xfxf-qw26-hr33
Arbitrary command execution in roar-pidusage
This affects all current versions of package roar-pidusage. If attacker-controlled user input is given to the stat function of this package on certain operating systems, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23380'}
2021-05-06T15:55:43Z
2021-05-06T15:55:43Z
MODERATE
5.6
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23380', 'https://github.com/advisories/GHSA-xfxf-qw26-hr33', 'https://snyk.io/vuln/SNYK-JS-ROARPIDUSAGE-1078528', 'https://github.com/Svjard/pidusage/blob/772cd2bd675ff7b1244b6fe3d7541692b1b9e42c/lib/stats.js%23L103'}
null
GHSA
GHSA-h3c2-x77c-7pvr
High severity vulnerability that affects git-dummy-commit
A command injection in git-dummy-commit v1.3.0 allows os level commands to be executed due to an unescaped parameter.
{'CVE-2018-3785'}
2021-01-08T18:43:49Z
2018-08-21T17:03:33Z
HIGH
0
{'CWE-78'}
{'https://hackerone.com/reports/341710', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3785', 'https://github.com/advisories/GHSA-h3c2-x77c-7pvr'}
null
GHSA
GHSA-79mg-4w23-4fqc
Unauthenticated SQL Injection in Cachet
### Impact In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. ### Patches The original repository of [https://github.com/CachetHQ/Cachet](https://github.com/CachetHQ/Cachet) is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected. Update to version 2.5 or later in the [https://github.com/fiveai/Cachet fork](https://github.com/fiveai/Cachet) to fix this vulnerability.
{'CVE-2021-39165'}
2022-04-19T19:03:05Z
2021-08-30T16:12:58Z
HIGH
8.1
{'CWE-89', 'CWE-287'}
{'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6', 'https://github.com/advisories/GHSA-79mg-4w23-4fqc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165', 'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc'}
null
GHSA
GHSA-6rrw-4fm9-rghv
Use of Hard-coded Cryptographic Key in Netmaker
Netmaker prior to versions 0.8.5, 0.9.4, 0.10.0, and 0.10.1 uses a hard-coded cryptographic key.
{'CVE-2022-0664'}
2022-02-26T01:51:36Z
2022-02-19T00:01:36Z
HIGH
8.8
{'CWE-321'}
{'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf', 'https://huntr.dev/bounties/29898a42-fd4f-4b5b-a8e3-ab573cb87eac', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0664', 'https://github.com/advisories/GHSA-6rrw-4fm9-rghv'}
null
GHSA
GHSA-mm33-5vfq-3mm3
XSS Vulnerability in Action Pack
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been assigned the CVE identifier CVE-2022-22577. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact CSP headers were only sent along with responses that Rails considered as "HTML" responses. This left API requests without CSP headers, which could possibly expose users to XSS attacks. ## Releases The FIXED releases are available at the normal locations. ## Workarounds Set a CSP for your API responses manually.
{'CVE-2022-22577'}
2022-04-27T23:00:14Z
2022-04-27T22:28:59Z
HIGH
0
{'CWE-79'}
{'https://groups.google.com/g/ruby-security-ann/c/NuFRKaN5swI', 'https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released', 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2022-22577.yml', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577', 'https://github.com/rails/rails/pull/44635', 'https://github.com/advisories/GHSA-mm33-5vfq-3mm3'}
null
GHSA
GHSA-9722-rr68-rfpg
Upload whitelisted files to any directory in OctoberCMS
### Impact An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8 to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1241" alt="Screen Shot 2020-03-31 at 12 21 10 PM" src="https://user-images.githubusercontent.com/7253840/78061230-255f5400-734a-11ea-92b4-1120f6960505.png">
{'CVE-2020-5297'}
2022-04-19T19:02:26Z
2020-06-03T21:58:27Z
LOW
3.4
{'CWE-73'}
{'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5297', 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/advisories/GHSA-9722-rr68-rfpg', 'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8'}
null
GHSA
GHSA-rrp4-2xx3-mv29
Command injection in gh-ost
Gh-ost version <= 1.1.2 allows users to inject DSN strings via the `-database` parameter. This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious `gh-ost` command on a host running `gh-ost`, plus network access from host running `gh-ost` to the attack's malicious MySQL server. ### Impact This issue may lead to arbitrary local file read. ### Patches Fixed in 1.1.3+. ### Workarounds None ### References - https://advisory.dw1.io/51 ### For more information If you have any questions or comments about this advisory: * Open an issue in [github/gh-ost](http://github.com/github/gh-ost)
{'CVE-2022-21687'}
2022-04-19T19:03:19Z
2022-02-01T00:47:33Z
MODERATE
6.8
{'CWE-74', 'CWE-20'}
{'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f', 'https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21687', 'https://github.com/advisories/GHSA-rrp4-2xx3-mv29'}
null
GHSA
GHSA-qmm9-x5gr-4gfm
Open Redirect in hekto
Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename. ## Recommendation Update to version 0.2.4 or later.
{'CVE-2018-3743'}
2021-01-08T01:58:33Z
2018-07-18T21:20:12Z
LOW
0
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3743', 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm', 'https://github.com/herber/hekto/pull/3', 'https://www.npmjs.com/advisories/669', 'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46', 'https://hackerone.com/reports/320693'}
null
GHSA
GHSA-5r76-cjf4-c9qx
Moderate severity vulnerability that affects mayan-edms
An issue was discovered in Mayan EDMS before 3.0.2. The Cabinets app has XSS via a crafted cabinet label.
{'CVE-2018-16406'}
2021-09-01T22:20:48Z
2018-09-06T03:24:57Z
MODERATE
6.1
{'CWE-79'}
{'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst', 'https://github.com/advisories/GHSA-5r76-cjf4-c9qx', 'https://gitlab.com/mayan-edms/mayan-edms/issues/495', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16406', 'https://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32'}
null
GHSA
GHSA-2pqj-h3vj-pqgw
Cross-Site Scripting in jquery
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain inputs, allowing for client side code execution. ## Proof of Concept ``` $("#log").html( $("element[attribute='<img src=\"x\" onerror=\"alert(1)\" />']").html() ); ``` ## Recommendation Update to version 1.9.0 or later.
{'CVE-2012-6708'}
2021-09-15T15:21:02Z
2020-09-01T16:41:46Z
HIGH
0
{'CWE-64', 'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2012-6708', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16011', 'https://bugs.jquery.com/ticket/6429', 'https://snyk.io/vuln/npm:jquery:20120206', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html', 'https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://bugs.jquery.com/ticket/12531', 'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'http://www.securityfocus.com/bid/102792', 'https://bugs.jquery.com/ticket/9521', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://www.npmjs.com/advisories/329', 'https://github.com/advisories/GHSA-2pqj-h3vj-pqgw', 'https://bugs.jquery.com/ticket/11290'}
null
GHSA
GHSA-5wmg-j84w-4jj4
Arbitrary File Write via Archive Extraction in mholt/archiver
mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002207'}
2022-04-12T22:36:10Z
2022-02-15T01:57:18Z
MODERATE
5.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1002207', 'https://snyk.io/research/zip-slip-vulnerability', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMMHOLTARCHIVERCMDARCHIVER-50071', 'https://github.com/mholt/archiver/pull/65', 'https://github.com/advisories/GHSA-5wmg-j84w-4jj4', 'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3', 'https://github.com/snyk/zip-slip-vulnerability'}
null
GHSA
GHSA-r92x-f52r-x54g
regular expression denial of service (ReDoS)
date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.
{'CVE-2020-26289'}
2021-01-07T22:33:13Z
2020-12-24T20:49:02Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/knowledgecode/date-and-time/security/advisories/GHSA-r92x-f52r-x54g', 'https://www.npmjs.com/package/date-and-time', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26289', 'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a', 'https://github.com/advisories/GHSA-r92x-f52r-x54g', 'https://www.npmjs.com/advisories/1592'}
null
GHSA
GHSA-cggj-fvv3-cqwv
FasterXML jackson-databind allows unauthenticated remote code execution
FasterXML jackson-databind before 2.8.11.1 and 2.9.x before 2.9.5 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 deserialization flaw. This is exploitable by sending maliciously crafted JSON input to the readValue method of the ObjectMapper, bypassing a blacklist that is ineffective if the c3p0 libraries are available in the classpath.
{'CVE-2018-7489'}
2022-04-26T18:57:07Z
2018-10-16T17:45:18Z
CRITICAL
9.8
{'CWE-184', 'CWE-502'}
{'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://access.redhat.com/errata/RHSA-2018:2938', 'https://access.redhat.com/errata/RHSA-2018:2090', 'http://www.securityfocus.com/bid/103203', 'https://access.redhat.com/errata/RHSA-2018:2089', 'http://www.securitytracker.com/id/1041890', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://security.netapp.com/advisory/ntap-20180328-0001/', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'http://www.securitytracker.com/id/1040693', 'https://github.com/advisories/GHSA-cggj-fvv3-cqwv', 'https://www.debian.org/security/2018/dsa-4190', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7489', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/1931', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1786', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2088', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}
null
GHSA
GHSA-jp9g-5x75-ccp8
Malicious Package in colro-name
Version 9.0.0 of `colro-name` contained malicious code as a preinstall script. The package downloaded a file from a remote server, executed it and opened a backdoor. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T21:48:25Z
2020-09-02T21:34:30Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/902', 'https://github.com/advisories/GHSA-jp9g-5x75-ccp8'}
null
GHSA
GHSA-m2w9-rm58-mhm9
Downloads Resources over HTTP in node-thulac
Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10640'}
2021-01-08T18:32:05Z
2019-02-18T23:47:06Z
HIGH
0
{'CWE-311'}
{'https://github.com/advisories/GHSA-m2w9-rm58-mhm9', 'https://nodesecurity.io/advisories/236', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10640', 'https://www.npmjs.com/advisories/236'}
null
GHSA
GHSA-vj62-g63v-f8mf
Validity check missing in Frontier
### Impact In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block. The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors. ### Patches The issue is patched in commit 146bb48849e5393004be5c88beefe76fdf009aba. ### References Patch PR: https://github.com/paritytech/frontier/pull/495 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues) ### Special thanks Special thanks to @librelois, @nanocryk and the Moonbeam team for reporting and fixing this security vulnerability.
{'CVE-2021-41138'}
2021-10-14T20:03:54Z
2021-10-13T18:53:38Z
MODERATE
5.3
{'CWE-20'}
{'https://github.com/paritytech/frontier/pull/497', 'https://github.com/paritytech/frontier/security/advisories/GHSA-vj62-g63v-f8mf', 'https://github.com/paritytech/frontier/pull/495', 'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41138', 'https://github.com/advisories/GHSA-vj62-g63v-f8mf'}
null
GHSA
GHSA-x3r5-q6mj-m485
Improper sanitization of target names
### Impact The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system. AWS would like to thank https://github.com/jku for reporting this issue. ### Patches A fix is available in version 0.12.0. ### Workarounds No workarounds to this issue are known.
{'CVE-2021-41149'}
2021-10-20T15:39:06Z
2021-10-19T20:16:15Z
HIGH
8.2
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41149', 'https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485', 'https://github.com/advisories/GHSA-x3r5-q6mj-m485', 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}
null
GHSA
GHSA-j756-f273-xhp4
Import token permissions checking not enforced
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>) ## Problem Description The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some Exports are public, such that anyone can import the relevant subjects, and some Exports are private, such that the Import requires a token JWT to prove permission. The JWT library's validation of the bindings in the Import Token incorrectly warned on mismatches, instead of outright rejecting the token. As a result, any account can take an Import token used by any other account and re-use it for themselves because the binding to the importing account is not rejected, and use it to import *any* Subject from the Exporting account, not just the Subject referenced in the Import Token. The NATS account-server system treats account JWTs as semi-public information, such that an attacker can easily enumerate all account JWTs and retrieve all Import Tokens from those account JWTs. The CVE identifier should cover the JWT library repair and the nats-server containing the fixed JWT library, and any other application depending upon the fixed JWT library. ## Affected versions #### JWT library * all versions prior to 2.0.1 * fixed after nats-io/jwt#149 landed (2021-03-14) #### NATS Server * Version 2 prior to 2.2.0 + 2.0.0 through and including 2.1.9 are vulnerable * fixed with nats-io/nats-server@423b79440c (2021-03-14) ## Impact In deployments with untrusted accounts able to update the Account Server with imports, a malicious account can access any Subject from an account which provides Exported Subjects. Abuse of this facility requires the malicious actor to upload their tampered Account JWT to the Account Server, providing the service operator with a data-store which can be scanned for signs of abuse. ## Workaround Deny access to clients to update their account JWT in the account server. ## Solution Upgrade the JWT dependency in any application using it. Upgrade the NATS server if using NATS Accounts (with private Exports; Account owners can create those at any time though). Audit all accounts JWTs to scan for exploit attempts; a Python script to audit the accounts can be found at <https://gist.github.com/philpennock/09d49524ad98043ff11d8a40c2bb0d5a>.
null
2021-05-21T16:22:20Z
2021-05-21T16:22:20Z
CRITICAL
7.5
{'CWE-863'}
{'https://github.com/advisories/GHSA-j756-f273-xhp4', 'https://github.com/nats-io/nats-server/security/advisories/GHSA-j756-f273-xhp4'}
null
GHSA
GHSA-j68r-23hj-xf9c
Hijacked Environment Variables in node-openssl
The `node-openssl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16064'}
2021-01-08T20:56:55Z
2018-10-10T17:28:14Z
MODERATE
0
{'CWE-506'}
{'https://nodesecurity.io/advisories/503', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16064', 'https://www.npmjs.com/advisories/503', 'https://github.com/advisories/GHSA-j68r-23hj-xf9c'}
null
GHSA
GHSA-8xjq-8fcg-g5hw
Out-of-bounds Write in Pillow
An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
{'CVE-2021-25290'}
2021-12-06T21:37:00Z
2021-03-29T16:35:36Z
HIGH
7.5
{'CWE-787'}
{'https://security.gentoo.org/glsa/202107-33', 'https://github.com/advisories/GHSA-8xjq-8fcg-g5hw', 'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25290'}
null
GHSA
GHSA-xgc3-m89p-vr3x
Heap buffer overflow in `Conv2DBackpropFilter`
### Impact An attacker can cause a heap buffer overflow to occur in `Conv2DBackpropFilter`: ```python import tensorflow as tf input_tensor = tf.constant([386.078431372549, 386.07843139643234], shape=[1, 1, 1, 2], dtype=tf.float32) filter_sizes = tf.constant([1, 1, 1, 1], shape=[4], dtype=tf.int32) out_backprop = tf.constant([386.078431372549], shape=[1, 1, 1, 1], dtype=tf.float32) tf.raw_ops.Conv2DBackpropFilter( input=input_tensor, filter_sizes=filter_sizes, out_backprop=out_backprop, strides=[1, 66, 49, 1], use_cudnn_on_gpu=True, padding='VALID', explicit_paddings=[], data_format='NHWC', dilations=[1, 1, 1, 1] ) ``` Alternatively, passing empty tensors also results in similar behavior: ```python import tensorflow as tf input_tensor = tf.constant([], shape=[0, 1, 1, 5], dtype=tf.float32) filter_sizes = tf.constant([3, 8, 1, 1], shape=[4], dtype=tf.int32) out_backprop = tf.constant([], shape=[0, 1, 1, 1], dtype=tf.float32) tf.raw_ops.Conv2DBackpropFilter( input=input_tensor, filter_sizes=filter_sizes, out_backprop=out_backprop, strides=[1, 66, 49, 1], use_cudnn_on_gpu=True, padding='VALID', explicit_paddings=[], data_format='NHWC', dilations=[1, 1, 1, 1] ) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/1b0296c3b8dd9bd948f924aa8cd62f87dbb7c3da/tensorflow/core/kernels/conv_grad_filter_ops.cc#L495-L497) computes the size of the filter tensor but does not validate that it matches the number of elements in `filter_sizes`. Later, when reading/writing to this buffer, code uses the value computed here, instead of the number of elements in the tensor. ### Patches We have patched the issue in GitHub commit [c570e2ecfc822941335ad48f6e10df4e21f11c96](https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29540'}
2021-05-21T14:23:09Z
2021-05-21T14:23:09Z
LOW
2.5
{'CWE-787', 'CWE-120'}
{'https://github.com/advisories/GHSA-xgc3-m89p-vr3x', 'https://github.com/tensorflow/tensorflow/commit/c570e2ecfc822941335ad48f6e10df4e21f11c96', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xgc3-m89p-vr3x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29540'}
null
GHSA
GHSA-cj6j-32rg-45r2
Cross-site Scripting in JSPWiki
A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
{'CVE-2019-10077'}
2021-08-04T19:54:09Z
2019-06-06T15:29:25Z
MODERATE
6.1
{'CWE-79'}
{'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10077', 'https://github.com/advisories/GHSA-cj6j-32rg-45r2'}
null
GHSA
GHSA-3c45-wgjp-7v9r
A single version of twisted does not respect the trustedRoot setting
Python Twisted 14.0 trustRoot is not respected in HTTP client
{'CVE-2014-7143'}
2021-08-19T16:07:48Z
2019-12-17T22:52:34Z
HIGH
7.5
{'CWE-295'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-7143', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96135', 'https://github.com/advisories/GHSA-3c45-wgjp-7v9r', 'https://nvd.nist.gov/vuln/detail/CVE-2014-7143', 'http://www.openwall.com/lists/oss-security/2014/09/22/2', 'https://security-tracker.debian.org/tracker/CVE-2014-7143', 'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33'}
null
GHSA
GHSA-pq3x-96c3-xgjg
Moderate severity vulnerability that affects Products.PlonePAS
The PlonePAS product 3.x before 3.9 and 3.2.x before 3.2.2, a product for Plone, does not properly handle the login form, which allows remote authenticated users to acquire the identity of an arbitrary user via unspecified vectors.
{'CVE-2009-0662'}
2021-09-16T18:18:34Z
2018-07-23T19:50:29Z
MODERATE
0
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2009-0662', 'http://osvdb.org/53975', 'http://plone.org/products/plone/security/advisories/cve-2009-0662', 'https://github.com/advisories/GHSA-pq3x-96c3-xgjg', 'http://secunia.com/advisories/34840', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50061', 'http://www.securityfocus.com/bid/34664'}
null
GHSA
GHSA-22jr-vc7j-g762
Potential buffer overflow in psd-tools
### Impact An issue was discovered in psd-tools before 1.9.4. The Cython implementation of RLE decoding did not check for malformed PSD input data during decoding to the PIL.Image or NumPy format, leading to a Buffer Overflow. ### Patches Users of psd-tools version v1.8.37 to v1.9.3 should upgrade to v1.9.4. ### Workarounds Without Cython present on installation, buffer overflow does not occur but IndexError will be thrown. However, already installed psd-tools with Cython extention should be upgraded. ### References https://github.com/psd-tools/psd-tools/pull/198 ### For more information If you have any questions or comments about this advisory: * Open an issue in [psd-tools](https://github.com/psd-tools/psd-tools/issues)
{'CVE-2020-10571'}
2022-03-23T18:07:57Z
2020-03-16T22:46:19Z
CRITICAL
9.8
{'CWE-754'}
{'https://github.com/advisories/GHSA-22jr-vc7j-g762', 'https://github.com/psd-tools/psd-tools/releases/tag/v1.9.4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10571', 'https://github.com/psd-tools/psd-tools/pull/198', 'https://github.com/psd-tools/psd-tools/security/advisories/GHSA-22jr-vc7j-g762'}
null
GHSA
GHSA-q62h-jw38-24vh
Uncaught Exception in zip4j
zip4j up to 2.9.1 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
{'CVE-2022-24615'}
2022-04-15T16:56:08Z
2022-02-25T00:01:04Z
MODERATE
5.5
{'CWE-248', 'CWE-755'}
{'https://github.com/advisories/GHSA-q62h-jw38-24vh', 'https://github.com/srikanth-lingala/zip4j/issues/377', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24615', 'https://github.com/srikanth-lingala/zip4j/issues/418'}
null
GHSA
GHSA-mr4x-c4v9-x729
Moderate severity vulnerability that affects aiohttp-session
aio-libs aiohttp-session version 2.6.0 and earlier contains a Other/Unknown vulnerability in EncryptedCookieStorage and NaClCookieStorage that can result in Non-expiring sessions / Infinite lifespan. This attack appear to be exploitable via Recreation of a cookie post-expiry with the same value.
{'CVE-2018-1000814'}
2021-09-15T20:56:20Z
2018-12-20T22:01:46Z
MODERATE
6.5
{'CWE-613'}
{'https://github.com/aio-libs/aiohttp-session/pull/331', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000814', 'https://github.com/advisories/GHSA-mr4x-c4v9-x729', 'https://github.com/aio-libs/aiohttp-session/issues/325'}
null
GHSA
GHSA-jwhm-9cjm-4493
Cross-site Scripting in Jenkins Dashboard View Plugin
Jenkins Dashboard View Plugin 2.15 and earlier does not escape URLs referenced in Image Dashboard Portlets, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
{'CVE-2021-21649'}
2021-06-16T17:24:41Z
2021-06-16T17:24:41Z
MODERATE
5.4
{'CWE-79'}
{'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2233', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21649', 'https://github.com/advisories/GHSA-jwhm-9cjm-4493'}
null
GHSA
GHSA-4cmx-hrq9-c23p
Improper Authorization in aedes
Versions of `aedes` before 0.35.1 does not respect its own authorization rules when a client sets a `Last Will`. ## Recommendation Update to version 0.35.1 or later.
{'CVE-2018-3778'}
2021-01-08T19:55:40Z
2018-08-15T20:03:22Z
MODERATE
0
{'CWE-285'}
{'https://www.npmjs.com/advisories/682', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/457.json', 'https://github.com/advisories/GHSA-4cmx-hrq9-c23p', 'https://github.com/mcollina/aedes/issues/211', 'https://github.com/mcollina/aedes/issues/212', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3778'}
null
GHSA
GHSA-77gc-v2xv-rvvh
Out-of-bounds Read in Pillow
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la.
{'CVE-2021-25287'}
2022-03-03T21:47:12Z
2021-06-08T18:49:02Z
CRITICAL
9.1
{'CWE-125'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL/', 'https://security.gentoo.org/glsa/202107-33', 'https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25287', 'https://github.com/advisories/GHSA-77gc-v2xv-rvvh', 'https://github.com/python-pillow/Pillow/commit/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode', 'https://github.com/python-pillow/Pillow/pull/5377/commits/3bf5eddb89afdf690eceaa52bc4d3546ba9a5f87'}
null
GHSA
GHSA-xh2p-7p87-fhgh
Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode
TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode. The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722). When calculating system's entire collateral, we should also exclude the liquidated trove's surplus collateral, since liquidation closes the trove and makes the surplus collateral claimable by the trove owner. This means, this line of code should look like this: ``` vars.entireSystemColl = vars.entireSystemColl.sub(singleLiquidation.collToSendToSP).sub(singleLiquidation.collSurplus); ``` ### Impact The miscalculated entire collateral is used only to calculate the TCR and check if the system has been able to exit Recovery Mode. The miscalulation only persists temporarily, and within the`batchLiquidateTroves` transaction. Once the transaction completes the TCR and Recovery Mode will be calculated properly again. However, the bug could negatively impact the liquidation throughput and the gas efficiency gains from batching multiple liquidations in a single transaction. In normal situations, the impact of the collateral surplus of a Trove on the global TCR would be tiny. For instance, we have calculated that liquidating a trove with a collateral representing 1% of the total system collateral (so in the order of at least $10M at current values), would lead to an extra 0.53% in the temporary miscalculation of TCR. So for this bug to be meaningful, in such a scenario, the resulting real TCR must be already be very close to the Recovery Mode boundary anyway - i.e. between 149.47% and 150%. The batch liquidation transaction should also be executed with a particular trove ordering to achieve the TCR distortion. When a different trove order for the liquidation transaction is selected, the bug has no impact. In summary, the bug only has a non-negligible impact in a very narrow, specific set of circumstances. The potential effects of the bug after it occurs are: - The next trove in the sequence is not liquidated because the `batchLiquidateTroves` function calculates a premature exit from Recovery Mode. It could be liquidated in a subsequent transaction if the price of Ether doesn’t recover. - The next trove in the sequence has an ICR below 100% and it’s offset against the Stability Pool instead of redistributed among other troves because the function calculates a premature exit from Recovery Mode. For this to happen, the Ether price must have instantly plummeted by more than 10% (otherwise, the trove would have been already liquidated before). - The next trove in the sequence is liquidated while its ICR is over the real TCR: the function calculates the TCR as being slightly too high, and thus can liquidate a trove that has ICR less than the calculated TCR, but greater than the true TCR. This is probably the worst outcome - however it is already possible to achieve the same effect, regardless of the bug. A liquidator can craft a `batchLiquidateTroves` transaction whereby they select troves for liquidation such that the TCR increases and makes a given trove liquidateable. To liquidate trove A, they can order troves such that they first liquidate troves which raise the TCR to between A's ICR and 150%. This is intended and expected behavior. As clearly stated in Liquity documentation, to be completely safe and guarantee immunity from liquidation in Recovery Mode, borrowers should keep their ICR above 150%. We don't believe this bug creates a profitable exploit. Theoretically, and only in a very narrow set of circumstances, a liquidator could try to send a batch liquidation during Recovery Mode that lets the system very temporarily return to Normal Mode earlier than it should. In that case - _and only if the Ether price also happens to suddenly plummet by more than 10%_ - stability providers might take the haircut that should be taken by the borrowers (through redistribution). ### Patches The problem has been patched in the source code but not on mainnet contracts. Liquity protocol is immutable, and this issue is not critical, so it doesn't merit a launch of a new version. ### Bug bounty A reward of $1,000 (the maximum for its category) was awarded to Xiahong (`gaoxh06`) for reporting this bug. ### For more information If you have any questions or comments about this advisory: * Open an issue in [our repo](https://github.com/liquity/dev) * Email us at [security@liquity.org](mailto:security@liquity.org)
null
2021-08-05T16:56:58Z
2021-08-05T16:56:58Z
LOW
3.1
{'CWE-682'}
{'https://github.com/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722', 'https://github.com/liquity/dev/security/advisories/GHSA-xh2p-7p87-fhgh', 'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905', 'https://www.npmjs.com/package/@liquity/contracts'}
null
GHSA
GHSA-43gc-mjxg-gvrq
XStream is vulnerable to an Arbitrary Code Execution attack
### Impact The vulnerability may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21350](https://x-stream.github.io/CVE-2021-21350.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21350'}
2022-04-19T19:02:48Z
2021-03-22T23:29:28Z
MODERATE
5.3
{'CWE-434', 'CWE-502'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq', 'https://x-stream.github.io/security.html#workaround', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-5004', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-43gc-mjxg-gvrq', 'http://x-stream.github.io/changes.html#1.4.16', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21350', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://x-stream.github.io/CVE-2021-21350.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-wg96-3933-j2w5
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` are vulnerable to cross-site scripting. ## Proof of Concept: `<IMG SRC= onmouseover="alert('XSS');">` produces the following: `<img src="onmouseover="alert('XSS');"" />` This is definitely invalid HTML, but would suggest that it's being interpreted incorrectly by the parser. ## Recommendation Update to version 1.2.3 or later.
{'CVE-2017-16017'}
2021-01-08T01:56:48Z
2018-11-09T17:45:55Z
MODERATE
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16017', 'https://github.com/punkave/sanitize-html/issues/19', 'https://nodesecurity.io/advisories/155', 'https://github.com/punkave/sanitize-html/pull/20', 'https://github.com/advisories/GHSA-wg96-3933-j2w5', 'https://www.npmjs.com/advisories/155'}
null
GHSA
GHSA-rp2c-jrgp-cvr8
Code injection in plupload
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
{'CVE-2021-23562'}
2021-12-16T15:32:31Z
2021-12-16T15:32:31Z
MODERATE
4.2
{'CWE-434', 'CWE-75'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-2306665', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664', 'https://github.com/moxiecode/plupload/blob/master/js/jquery.plupload.queue/jquery.plupload.queue.js%23L226', 'https://github.com/advisories/GHSA-rp2c-jrgp-cvr8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562', 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb', 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2306663'}
null
GHSA
GHSA-75p6-52g3-rqc8
Privilege escalation vulnerability on Token Exchange feature
A privilege escalation flaw was found in the token exchange feature of keycloak. Missing authorization allows a client application holding a valid access token to exchange tokens for any target client by passing the client_id of the target. This could allow a client to gain unauthorized access to additional services.
{'CVE-2022-1245'}
2022-05-02T19:51:27Z
2022-04-26T21:21:00Z
MODERATE
0
{'CWE-284'}
{'https://github.com/keycloak/keycloak/commit/76d83f46fad94ebcbedaa49e6daad458e2894e52', 'https://github.com/advisories/GHSA-75p6-52g3-rqc8', 'https://github.com/keycloak/keycloak/security/advisories/GHSA-75p6-52g3-rqc8'}
null
GHSA
GHSA-j438-45hc-vjhm
CSRF and DNS Rebinding in Oasis
### Impact _What kind of vulnerability is it? Who is impacted?_ If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_request_forgery) attacks to read/write to vulnerable applications. **There is no evidence that suggests that this has been used in the wild.** ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, 2.15.0. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No. ### References _Are there any links users can visit to find out more?_ No. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fraction/oasis](http://github.com/fraction/oasis) * Email me at [christianbundy@fraction.io](mailto:christianbundy@fraction.io)
{'CVE-2020-11003'}
2022-04-19T19:02:52Z
2020-04-16T03:14:39Z
MODERATE
4.8
{'CWE-352'}
{'https://github.com/fraction/oasis/security/advisories/GHSA-j438-45hc-vjhm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11003', 'https://github.com/advisories/GHSA-j438-45hc-vjhm'}
null
GHSA
GHSA-mg53-xr8m-86hw
Open Redirect in Liferay Portal
The redirect module in Liferay Portal before 7.3.3 does not limit the number of URLs resulting in a 404 error that is recorded, which allows remote attackers to perform a denial of service attack by making repeated requests for pages that do not exist.
{'CVE-2020-24554'}
2021-09-24T16:17:30Z
2021-05-07T15:54:54Z
HIGH
7.5
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-24554', 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784956', 'https://github.com/advisories/GHSA-mg53-xr8m-86hw', 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}
null
GHSA
GHSA-7627-mp87-jf6q
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-24440'}
2022-04-12T15:43:38Z
2022-04-02T00:00:13Z
HIGH
8.1
{'CWE-88', 'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24440', 'https://github.com/CocoaPods/cocoapods-downloader/pull/124', 'https://github.com/advisories/GHSA-7627-mp87-jf6q', 'https://snyk.io/vuln/SNYK-RUBY-COCOAPODSDOWNLOADER-2414278', 'https://github.com/CocoaPods/cocoapods-downloader/pull/128'}
null
GHSA
GHSA-3vg7-jw9m-pc3f
Broken Access Control in Form Framework
### Problem Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework. In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_. Besides that, attackers can persist those files in any writable directory of the corresponding TYPO3 installation. A valid backend user account with access to the form module is needed to exploit this vulnerability. ### Solution Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described. ### Credits Thanks to Richie Lee who reported this issue and to TYPO3 contributor Ralf Zimmermann who fixed the issue. ### References * [TYPO3-CORE-SA-2021-003](https://typo3.org/security/advisory/typo3-core-sa-2021-003)
{'CVE-2021-21357'}
2022-04-19T19:02:50Z
2021-03-23T01:53:57Z
HIGH
7.9
{'CWE-434', 'CWE-20', 'CWE-22'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21357', 'https://github.com/advisories/GHSA-3vg7-jw9m-pc3f', 'https://typo3.org/security/advisory/typo3-core-sa-2021-003', 'https://packagist.org/packages/typo3/cms-form'}
null
GHSA
GHSA-hv87-47h9-jcvq
Uncontrolled recursion in rust-yaml
An issue was discovered in the yaml-rust crate before 0.4.1 for Rust. There is uncontrolled recursion during deserialization.
{'CVE-2018-20993'}
2021-08-25T20:43:13Z
2021-08-25T20:43:13Z
HIGH
7.5
{'CWE-674'}
{'https://rustsec.org/advisories/RUSTSEC-2018-0006.html', 'https://github.com/advisories/GHSA-hv87-47h9-jcvq', 'https://github.com/chyh1990/yaml-rust/pull/109', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20993'}
null
GHSA
GHSA-fjr6-hm39-4cf9
Double free in basic_dsp_matrix
An issue was discovered in the basic_dsp_matrix crate before 0.9.2 for Rust. When a TransformContent panic occurs, a double drop can be performed.
{'CVE-2021-25906'}
2021-08-25T20:52:50Z
2021-08-25T20:52:50Z
HIGH
7.5
{'CWE-415'}
{'https://github.com/liebharc/basic_dsp/issues/47', 'https://github.com/advisories/GHSA-fjr6-hm39-4cf9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25906', 'https://rustsec.org/advisories/RUSTSEC-2021-0009.html'}
null
GHSA
GHSA-f8rj-4v7g-p5rj
Directory Traversal in jansenstuffpleasework
Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16176'}
2021-01-14T15:35:46Z
2020-09-01T18:53:29Z
HIGH
0
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/jansenstuffpleasework', 'https://www.npmjs.com/advisories/464', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16176', 'https://github.com/advisories/GHSA-f8rj-4v7g-p5rj', 'https://nodesecurity.io/advisories/464'}
null
GHSA
GHSA-378p-hrq3-x4p3
Cross-site scripting in Shopizer
A reflected cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via the ref parameter to a page about an arbitrary product, e.g., a product/insert-product-name-here.html/ref= URL.
{'CVE-2021-33562'}
2021-06-08T23:08:20Z
2021-06-08T23:08:20Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/advisories/GHSA-378p-hrq3-x4p3', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33562'}
null
GHSA
GHSA-hfj4-96f7-6r5g
Cross-Site Scripting in html-janitor
Versions of `html-janitor` prior to 2.0.2 (all current versions) are vulnerable to cross-site scripting (XSS). This is exploitable if user-controlled data is passed into the modules `clean()` function. ## Recommendation No fix is currently available for this vulnerability. It is recommended to use an alternative module for HTML sanitization.
{'CVE-2017-0931'}
2021-01-08T21:11:13Z
2018-11-09T17:49:11Z
HIGH
0
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-0931', 'https://github.com/guardian/html-janitor/issues/34', 'https://github.com/advisories/GHSA-hfj4-96f7-6r5g', 'https://hackerone.com/reports/308155', 'https://www.npmjs.com/advisories/576'}
null
GHSA
GHSA-g78p-g85h-q6ww
Data races in cache
An issue was discovered in the cache crate through 2020-11-24 for Rust. Affected versions of this crate unconditionally implement Send/Sync for `Cache<K>`. This allows users to insert `K` that is not Send or not Sync. This allows users to create data races by using non-Send types like `Arc<Cell<T>>` or `Rc<T>` as `K` in `Cache<K>`. It is also possible to create data races by using types like `Cell<T>` or `RefCell<T>` (types that are `Send` but not `Sync`). Such data races can lead to memory corruption.
{'CVE-2020-36448'}
2021-08-25T20:57:12Z
2021-08-25T20:57:12Z
HIGH
8.1
{'CWE-362', 'CWE-77'}
{'https://rustsec.org/advisories/RUSTSEC-2020-0128.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36448', 'https://github.com/krl/cache/issues/1', 'https://github.com/advisories/GHSA-g78p-g85h-q6ww'}
null
GHSA
GHSA-9vp3-7qwq-83r9
Server-Side Request Forgery in FUXA
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.
{'CVE-2021-45851'}
2022-03-29T21:34:47Z
2022-03-17T00:00:48Z
HIGH
7.5
{'CWE-918'}
{'https://github.com/advisories/GHSA-9vp3-7qwq-83r9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45851', 'https://www.youtube.com/watch?v=JE1Kcq3iJpc'}
null
GHSA
GHSA-333g-rpr4-7hxq
Backdoor / Malicious code
The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x. Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory. These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon.
{'CVE-2019-15224'}
2021-08-17T21:10:34Z
2019-08-20T14:29:03Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/rest-client/rest-client/issues/713', 'https://github.com/advisories/GHSA-333g-rpr4-7hxq', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15224', 'https://rubygems.org/gems/rest-client/versions/'}
null
GHSA
GHSA-r9cj-xj33-4q42
Malicious Package in buffgr-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:26:57Z
2020-09-03T22:21:54Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-r9cj-xj33-4q42', 'https://www.npmjs.com/advisories/1260'}
null
GHSA
GHSA-f248-v4qh-x2r6
Improper Certificate Validation in blackduck
Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.
{'CVE-2020-27589'}
2021-04-20T16:29:41Z
2021-04-20T16:29:41Z
HIGH
7.5
{'CWE-295'}
{'https://github.com/advisories/GHSA-f248-v4qh-x2r6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27589', 'https://github.com/blackducksoftware/hub-rest-api-python', 'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd', 'https://www.optiv.com/explore-optiv-insights/source-zero/certificate-validation-disabled-black-duck-api-wrapper', 'https://community.synopsys.com/s/question/0D52H00005JCZAXSA5/announcement-black-duck-defect-identified', 'https://pypi.org/project/blackduck/'}
null
GHSA
GHSA-qwvx-c8j7-5g75
Use of Uninitialized Resource in tectonic_xdv
An issue was discovered in the tectonic_xdv crate before 0.1.12 for Rust. XdvParser::<T>::process may read from uninitialized memory locations.
{'CVE-2021-45703'}
2022-01-07T17:40:43Z
2022-01-06T22:09:19Z
CRITICAL
9.8
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45703', 'https://rustsec.org/advisories/RUSTSEC-2021-0112.html', 'https://github.com/advisories/GHSA-qwvx-c8j7-5g75', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tectonic_xdv/RUSTSEC-2021-0112.md'}
null
GHSA
GHSA-2xvj-j3qh-x8c3
High severity vulnerability that affects private_address_check
private_address_check ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.
{'CVE-2018-3759'}
2021-01-08T20:05:48Z
2018-07-31T18:13:05Z
HIGH
0
{'CWE-362'}
{'https://github.com/advisories/GHSA-2xvj-j3qh-x8c3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3759', 'https://github.com/jtdowney/private_address_check/commit/4068228187db87fea7577f7020099399772bb147'}
null
GHSA
GHSA-gwpx-q2h9-wxgx
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
{'CVE-2021-3964'}
2021-12-03T20:43:25Z
2021-12-03T20:43:25Z
MODERATE
5.9
{'CWE-639'}
{'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744', 'https://github.com/advisories/GHSA-gwpx-q2h9-wxgx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3964', 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a'}
null
GHSA
GHSA-4xrw-wvmq-8jmh
OS Command Injection in node-key-sender
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.
{'CVE-2020-7627'}
2022-02-10T23:46:11Z
2022-02-10T23:46:11Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261', 'https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117,', 'https://github.com/advisories/GHSA-4xrw-wvmq-8jmh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7627'}
null
GHSA
GHSA-g37q-26qx-8v2m
Denial of service in Apache OpenMeetings
Attackers can use public NetTest web service of Apache OpenMeetings 4.0.0-5.0.0 to organize denial of service attack.
{'CVE-2020-13951'}
2022-02-10T20:36:59Z
2022-02-10T20:36:45Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13951', 'https://lists.apache.org/thread.html/re2aed827cd24ae73cbc320e5808020c8d12c7b687ee861b27d728bbc%40%3Cuser.openmeetings.apache.org%3E', 'https://github.com/advisories/GHSA-g37q-26qx-8v2m', 'http://packetstormsecurity.com/files/160186/Apache-OpenMeetings-5.0.0-Denial-Of-Service.html', 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}
null
GHSA
GHSA-35fg-hjcr-j65f
Information exposure in xwiki-platform
### Impact It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. ### Patches The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. ### Workarounds There's no easy workaround other than applying the upgrade. ### References https://jira.xwiki.org/browse/XWIKI-18787 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security Mailing list](mailto:security@xwiki.org)
{'CVE-2022-23619'}
2022-02-16T22:23:42Z
2022-02-09T21:51:19Z
MODERATE
5.3
{'CWE-200', 'CWE-640'}
{'https://jira.xwiki.org/browse/XWIKI-18787', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619', 'https://github.com/advisories/GHSA-35fg-hjcr-j65f', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f', 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}
null
GHSA
GHSA-x2w5-725j-gf2g
Prototype Pollution in convict
An attacker can inject attributes that are used in other components and override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely that an admin would deliberately sabotage their own server. Still a situation can happen where an admin not knowledgeable about JavaScript could be tricked by an attacker into writing the malicious JavaScript code into some config files. The problem is patched in `convict@6.2.2`. Users should upgrade to `convict@6.2.2`. There is no way for users to fix or remediate the vulnerability without upgrading.
{'CVE-2022-22143'}
2022-05-03T02:25:28Z
2022-04-20T16:21:03Z
HIGH
8.4
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143', 'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880', 'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569', 'https://github.com/mozilla/node-convict/pull/384', 'https://github.com/mozilla/node-convict/releases/tag/v6.2.2', 'https://github.com/advisories/GHSA-x2w5-725j-gf2g', 'https://www.huntr.dev/bounties/1-npm-convict/', 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g'}
null
GHSA
GHSA-hcq6-h8v2-r5wm
Server-Side Request Forgery in node-pdf-generator
This affects all versions of package node-pdf-generator up to and including 0.0.6. Due to lack of user input validation and sanitization done to the content given to node-pdf-generator, it is possible for an attacker to craft a url that will be passed to an external server allowing an SSRF attack.
{'CVE-2020-7740'}
2021-05-10T18:38:34Z
2021-05-10T18:38:34Z
HIGH
8.2
{'CWE-20', 'CWE-918'}
{'https://github.com/darrenhaken/node-pdf-generator/blob/master/index.js%23L29', 'https://github.com/advisories/GHSA-hcq6-h8v2-r5wm', 'https://snyk.io/vuln/SNYK-JS-NODEPDFGENERATOR-609636', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7740'}
null
GHSA
GHSA-fwvp-x5gj-773j
Malicious Package in react-server-native
Version 0.0.7 of `react-server-native` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.7 of this module is found installed you will want to replace it with a version before or after 0.0.7. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-09-01T20:33:10Z
2020-09-01T20:33:10Z
CRITICAL
0
null
{'https://www.npmjs.com/advisories/635', 'https://github.com/advisories/GHSA-fwvp-x5gj-773j'}
null
GHSA
GHSA-wjxj-f8rg-99wx
Moderate severity vulnerability that affects org.apache.thrift:libthrift
Apache Thrift Java client library versions 0.5.0 through 0.11.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.
{'CVE-2018-1320'}
2022-04-01T18:13:08Z
2019-01-17T13:56:40Z
HIGH
7.5
{'CWE-20', 'CWE-295'}
{'https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E', 'https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://support.f5.com/csp/article/K36361684', 'https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://github.com/advisories/GHSA-wjxj-f8rg-99wx', 'http://www.openwall.com/lists/oss-security/2019/07/24/3', 'https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html', 'https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://www.securityfocus.com/bid/106551', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E', 'https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E', 'https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2413', 'https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E'}
null
GHSA
GHSA-xj6q-9hx8-mm7f
Directory Traversal in liuyaserver
Affected versions of `liuyaserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16170'}
2021-01-14T16:03:47Z
2020-09-01T17:34:34Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/413', 'https://github.com/advisories/GHSA-xj6q-9hx8-mm7f', 'https://www.npmjs.com/advisories/413', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16170', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/liuyaserver'}
null