ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-cmc7-mfmr-xqrx | Logic error in authentication in proxy.py | before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or). | {'CVE-2021-3116'} | 2021-04-07T21:01:25Z | 2021-04-07T21:01:25Z | HIGH | 7.5 | {'CWE-287', 'CWE-480'} | {'https://github.com/advisories/GHSA-cmc7-mfmr-xqrx', 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46', 'https://pypi.org/project/proxy.py/2.3.1/#history', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116', 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/'} | null |
GHSA | GHSA-2xwq-h7r9-6w27 | Cross-site Scripting in kimai2 | Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs | {'CVE-2021-3957'} | 2021-11-23T17:59:40Z | 2021-11-23T17:59:40Z | MODERATE | 4.6 | {'CWE-352'} | {'https://github.com/advisories/GHSA-2xwq-h7r9-6w27', 'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3', 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'} | null |
GHSA | GHSA-q8qj-fc9q-cphr | Undefined behavior in Tensorflow | ### Impact
If a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition.
However, this `status` argument is not properly checked:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267
Hence, code following these methods will bind references to null pointers:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L279-L285
This is undefined behavior and reported as an error if compiling with `-fsanitize=null`.
### Patches
We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions.
We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v). | {'CVE-2020-15191'} | 2021-11-19T15:19:57Z | 2020-09-25T18:28:25Z | MODERATE | 5.3 | {'CWE-252', 'CWE-20', 'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15191', 'https://github.com/advisories/GHSA-q8qj-fc9q-cphr'} | null |
GHSA | GHSA-277p-xwpp-3jf7 | Malicious Package in rrgod | All versions of `rrgod` are considered malicious. The package is malware designed to run arbitrary scripts. When installed, the package downloads an arbitrary file and executes its contents as a pre, post and install scripts.
## Recommendation
This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
| null | 2021-10-01T13:42:10Z | 2020-09-02T15:49:22Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-277p-xwpp-3jf7', 'https://www.npmjs.com/advisories/764'} | null |
GHSA | GHSA-vrh8-27q8-fr8f | Low severity vulnerability that affects org.apache.solr:solr-core | Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL. | {'CVE-2017-3164'} | 2021-09-20T22:18:55Z | 2019-03-14T15:39:56Z | HIGH | 7.5 | {'CWE-918'} | {'https://lists.apache.org/thread.html/75dc651478f9d04505b46d44fe3ac739e7aaf3d7bf1257973685f8f7@%3Cdev.lucene.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN%3DwO5rYs6ktAX-5%3D-f5JDFwbbTSM2TTjEbGO5jKKA%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/43026507844ada1ac658ccf7bc939378c13e492fd6538416ce65df39@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/ca3105b6934ccd28e843dffe39724f6963ff49825e9b709837203649@%3Cdev.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/107026', 'https://lists.apache.org/thread.html/e0f9c652b57a91fdcc287efcead620af9f4d8e46b88f0b761aa265de@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3164', 'https://github.com/advisories/GHSA-vrh8-27q8-fr8f', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'} | null |
GHSA | GHSA-fqfj-cmh6-hj49 | Ruby OpenID | Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk. | {'CVE-2019-11027'} | 2021-09-21T16:25:53Z | 2019-06-13T16:15:56Z | CRITICAL | 9.8 | {'CWE-918'} | {'https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html', 'https://security.gentoo.org/glsa/202003-09', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11027', 'https://marc.info/?l=openid-security&m=155154717027534&w=2', 'https://github.com/openid/ruby-openid/issues/122', 'https://github.com/advisories/GHSA-fqfj-cmh6-hj49'} | null |
GHSA | GHSA-cvh5-p6r6-g2qc | Exposed phpinfo() leadked via documentation files | ### Impact
The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc).
### Patches
Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5.
Older versions such as v5, v4 are not longer supported and will **NOT** be patched.
### Workarounds
Protect the `/vendor` directory from public access.
### References
The first issue revealing this vulnerability is located here: https://github.com/flextype/flextype/issues/567
V6 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/815
V7 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/814
V8 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/813
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [our issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues)
* Email us at [[email protected]](mailto:[email protected])
| {'CVE-2021-37704'} | 2021-08-30T16:13:40Z | 2021-08-30T16:13:40Z | MODERATE | 5.4 | {'CWE-200', 'CWE-668'} | {'https://github.com/PHPSocialNetwork/phpfastcache/pull/813', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/815', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37704', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc', 'https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807', 'https://github.com/flextype/flextype/issues/567', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/814', 'https://packagist.org/packages/phpfastcache/phpfastcache', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51', 'https://github.com/advisories/GHSA-cvh5-p6r6-g2qc'} | null |
GHSA | GHSA-gcx2-gvj7-pxv3 | Insufficient Protection against HTTP Request Smuggling in mitmproxy | ### Impact
In mitmproxy 7.0.4 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization.
Unless you use mitmproxy to protect an HTTP/1 service, no action is required.
### Patches
The vulnerability has been fixed in mitmproxy 8.0.0 and above.
### Acknowledgements
We thank Zeyu Zhang (@zeyu2001) for responsibly disclosing this vulnerability to the mitmproxy team.
### Timeline
- **2022-03-15**: Received initial report.
- **2022-03-15**: Verified report and confirmed receipt.
- **2022-03-16**: Shared patch with researcher.
- **2022-03-16**: Received confirmation that patch is working.
- **2022-03-19**: Published patched release and advisory. | {'CVE-2022-24766'} | 2022-03-22T19:32:46Z | 2022-03-22T19:22:59Z | CRITICAL | 9.8 | {'CWE-444'} | {'https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24766', 'https://mitmproxy.org/posts/releases/mitmproxy8/', 'https://github.com/advisories/GHSA-gcx2-gvj7-pxv3', 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3'} | null |
GHSA | GHSA-3gqj-cmxr-p4x2 | Forced Browsing in Twisted | Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. | {'CVE-2016-1000111'} | 2021-08-12T17:02:19Z | 2021-04-30T17:32:28Z | MODERATE | 5.3 | {'CWE-425'} | {'https://twistedmatrix.com/trac/ticket/8623', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html', 'https://www.openwall.com/lists/oss-security/2016/07/18/6', 'https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000111', 'https://github.com/advisories/GHSA-3gqj-cmxr-p4x2'} | null |
GHSA | GHSA-2q95-593f-g7h7 | OS Command Injection in Centreon | /graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter. | {'CVE-2020-22345'} | 2021-09-02T17:16:06Z | 2021-09-02T17:16:06Z | HIGH | 8.8 | {'CWE-78'} | {'https://engindemirbilek.github.io/centreon-19.10-rce', 'https://github.com/advisories/GHSA-2q95-593f-g7h7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22345', 'https://github.com/centreon/centreon/pull/8467#event-3163627607'} | null |
GHSA | GHSA-74hh-4rcv-pp27 | Malicious Package in bitconijs-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-10-01T20:43:55Z | 2020-09-04T16:44:19Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-74hh-4rcv-pp27', 'https://www.npmjs.com/advisories/1370'} | null |
GHSA | GHSA-gcqq-w6gr-h9j9 | Directory traversal vulnerability in RubyZip | The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem. | {'CVE-2017-5946'} | 2022-04-25T16:33:03Z | 2017-10-24T18:33:35Z | CRITICAL | 9.8 | {'CWE-22'} | {'http://www.debian.org/security/2017/dsa-3801', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946', 'http://www.securityfocus.com/bid/96445', 'https://github.com/advisories/GHSA-gcqq-w6gr-h9j9', 'https://github.com/rubyzip/rubyzip/releases', 'https://github.com/rubyzip/rubyzip/issues/315'} | null |
GHSA | GHSA-q52j-4q2q-hcj6 | Authentication Bypass in console-io | Affected versions of the `console-io` package do not configure the underlying websocket library to require authentication, resulting in an authentication bypass vulnerability. As `console-io` allows terminal access on the server via a web page, an authentication bypass is essentially remote code execution.
## Recommendation
Update to version 2.3.0 or later. | {'CVE-2016-10532'} | 2021-09-16T19:31:29Z | 2019-02-18T23:39:39Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://github.com/advisories/GHSA-q52j-4q2q-hcj6', 'https://nodesecurity.io/advisories/90', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10532', 'https://www.npmjs.com/advisories/90'} | null |
GHSA | GHSA-j96p-r523-8r3w | HTTP Request Smuggling in github.com/hyperledger/fabric | A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric. | {'CVE-2021-43669'} | 2021-12-03T20:52:02Z | 2021-12-03T20:52:02Z | HIGH | 7.5 | {'CWE-444'} | {'https://github.com/advisories/GHSA-j96p-r523-8r3w', 'https://github.com/hyperledger/fabric/pull/2828', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43669', 'https://github.com/hyperledger/fabric/releases/tag/v2.4.0-beta', 'https://jira.hyperledger.org/browse/FAB-18528'} | null |
GHSA | GHSA-7p79-6x2v-5h88 | Server crash if running Python 3.10 w/ Sanic 20.12 | **!!! ONLY APPLIES TO VERSIONS PRIOR TO Sanic v20.12 WHEN USING Python 3.10 !!!**
Sanic v20.12 officially supports Python versions 3.6, 3.7, 3.8, and 3.9. However, if you accidentally run it with version 3.10 (**which is not supported by Sanic 20.12**), your server is prone to crashing on an incoming web request.
### Impact
Anyone running Sanic server between 0.1.7 and 20.12 **using Python 3.10**.
### Patches
[Sanic v20.12.6](https://github.com/sanic-org/sanic/releases/tag/v20.12.6)
### Workarounds
Use a supported version of Python (v3.6 - v3.9)
### References
> In [asyncio](https://docs.python.org/3/library/asyncio.html#module-asyncio), the explicit passing of a loop argument has been deprecated and will be removed in version 3.10 for the following: ... [asyncio.Event](https://docs.python.org/3/library/asyncio-sync.html#asyncio.Event)
[Python 3.8 Release Notes](https://docs.python.org/3/whatsnew/3.8.html#deprecated)
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the community forums](https://community.sanicframework.org/)
* Ping us on [the Discord server](https://discord.gg/FARQzAEMAA)
| null | 2022-04-19T19:03:23Z | 2022-02-16T22:57:57Z | HIGH | 0 | null | {'https://github.com/sanic-org/sanic/security/advisories/GHSA-7p79-6x2v-5h88', 'https://github.com/sanic-org/sanic/releases/tag/v20.12.6', 'https://github.com/advisories/GHSA-7p79-6x2v-5h88'} | null |
GHSA | GHSA-52qp-gwwh-qrg4 | Missing Handler in @scandipwa/magento-scripts | ### Impact
After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable.
### Patches
[Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above.
### Workarounds
Upgrade to patched or latest (recommended) version `npm i @scandipwa/[email protected]` or `npm i @scandipwa/magento-scripts@latest`.
### References
New releases always available here: https://github.com/scandipwa/create-magento-app/releases
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues)
| {'CVE-2021-32684'} | 2021-06-21T17:10:02Z | 2021-06-21T17:10:02Z | MODERATE | 6.2 | {'CWE-670'} | {'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4', 'https://github.com/advisories/GHSA-52qp-gwwh-qrg4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684', 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'} | null |
GHSA | GHSA-pfrg-w49c-8432 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0768'} | 2021-08-02T17:26:23Z | 2021-08-02T17:26:23Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0768', 'https://github.com/advisories/GHSA-pfrg-w49c-8432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0768'} | null |
GHSA | GHSA-v35c-49j6-q8hq | Security Constraint Bypass in Spring Security | Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed.
Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath() and getPathInfo() [1].
Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified.
Users of IBM WebSphere Application Server 8.5.x are known to be affected.
Users of other containers that implement the Servlet specification may be affected.
[1] https://issues.apache.org/bugzilla/show_bug.cgi?id=25015
## Affected Pivotal Products and Versions
Severity is high unless otherwise noted.
- Spring Security 3.2.0 - 3.2.9
- Spring Security 4.0.x - 4.1.3
- Spring Security 4.2.0
- Older unsupported versions are also affected
## Mitigation
Adopting one of the following mitigations will protect against this vulnerability.
- Use a Servlet container known not to include path parameters in the return values for getServletPath() and getPathInfo()
- Upgrading to Spring Security 3.2.10, 4.1.4 or 4.2.1 will reject the request with a RequestRejectedException if the presence of an encoded "/" is detected. Note: If you wish to disable this feature it can be disabled by setting the DefaultHttpFirewall.allowUrlEncodedSlash = true. However, disabling this feature will mean applications are vulnerable (in containers that return path parameters in getServletPath() or getPathInfo()).
## Credit
The issue was identified by Shumpei Asahara & Yuji Ito from NTT DATA Corporation and responsibly reported to Pivotal. | {'CVE-2016-9879'} | 2021-10-04T21:19:12Z | 2020-09-15T20:30:34Z | HIGH | 7.5 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-9879', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/advisories/GHSA-v35c-49j6-q8hq', 'https://pivotal.io/security/cve-2016-9879', 'http://www.securityfocus.com/bid/95142'} | null |
GHSA | GHSA-5qx5-vg5w-5mx3 | Stored XSS vulnerability in Jenkins Badge Plugin | Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-23108'} | 2022-04-29T04:37:49Z | 2022-01-13T00:00:54Z | MODERATE | 0 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://github.com/advisories/GHSA-5qx5-vg5w-5mx3', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108'} | null |
GHSA | GHSA-5v95-v8c8-3rh6 | Privilege escalation in rbac | ### Impact
Using a carefully crafted request or malicious proxy, a user with `UserWrite` permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set of permissions. The event would be captured in the Event Log.
### Patches
The issue has been fixed in 0.24.0 and 0.23.1.
### Workarounds
For users who are unable to upgrade, we recommend auditing users who have `UserWrite` permissions and regularly reviewing the Event Log for malicious activity.
### Kudos
Thank you to Michael Mazzolini (Ethical Hacker at WHO) for finding and disclosing this vulnerability. | {'CVE-2021-22538'} | 2021-05-21T14:32:55Z | 2021-05-21T14:32:55Z | HIGH | 8.8 | {'CWE-276'} | {'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0', 'https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95', 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1', 'https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6', 'https://github.com/advisories/GHSA-5v95-v8c8-3rh6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22538'} | null |
GHSA | GHSA-j6w4-pg6p-5mrv | Directory Traversal in tmock | `tmock` is a static file server.
`tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16106'} | 2021-01-08T18:36:36Z | 2018-07-23T23:51:04Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/375', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock', 'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv', 'https://nodesecurity.io/advisories/375', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106'} | null |
GHSA | GHSA-7cj4-gj8m-m2f7 | Authentication bypass in Apache Shiro | Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. | {'CVE-2020-17510'} | 2021-08-31T21:06:40Z | 2021-04-22T16:13:23Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-7cj4-gj8m-m2f7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E'} | null |
GHSA | GHSA-6584-gfwm-3vc3 | Malicious Package in budfer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T20:54:03Z | 2020-09-03T21:43:01Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-6584-gfwm-3vc3', 'https://www.npmjs.com/advisories/1233'} | null |
GHSA | GHSA-54qq-9chj-rxhv | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability. | {'CVE-2022-0395'} | 2022-02-10T22:25:23Z | 2022-01-29T00:00:33Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/36abbd6e-239e-4739-8c77-ba212b946a4a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395', 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb', 'https://github.com/advisories/GHSA-54qq-9chj-rxhv'} | null |
GHSA | GHSA-8phj-f9w2-cjcc | Arbitrary file reading vulnerability in Aim | ### Impact
A path traversal attack aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.
Vulnerable code: https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16
### Patches
The vulnerability issue is resolved in Aim v3.1.0.
### References
https://owasp.org/www-community/attacks/Path_Traversal
| {'CVE-2021-43775'} | 2022-04-19T19:03:15Z | 2021-11-23T22:03:23Z | HIGH | 8.6 | {'CWE-22'} | {'https://github.com/aimhubio/aim/pull/1003', 'https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc', 'https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16', 'https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738', 'https://github.com/advisories/GHSA-8phj-f9w2-cjcc', 'https://github.com/aimhubio/aim/issues/999', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43775'} | null |
GHSA | GHSA-x38q-xg2h-rxgx | Regular Expression Denial of Service in Leo Editor | Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py. | {'CVE-2020-23478'} | 2021-09-30T18:35:49Z | 2021-09-23T23:14:28Z | HIGH | 7.5 | {'CWE-697'} | {'https://github.com/leo-editor/leo-editor/issues/1597', 'https://github.com/advisories/GHSA-x38q-xg2h-rxgx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23478'} | null |
GHSA | GHSA-jjp3-m93h-5jm4 | Cross-site Scripting in microweber | Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12. | {'CVE-2022-0928'} | 2022-03-24T23:19:36Z | 2022-03-12T00:00:34Z | MODERATE | 6.8 | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928', 'https://github.com/advisories/GHSA-jjp3-m93h-5jm4', 'https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd'} | null |
GHSA | GHSA-g4xp-36c3-f7mr | Hidden Directories Always Served in inert | Versions 1.1.1 and earlier of `inert` are vulnerable to an information leakage vulnerability which causes files in hidden directories to be served, even when showHidden is false.
The inert directory handler always allows files in hidden directories to be served, even when `showHidden` is false.
## Recommendation
Update to version >= 1.1.1. | {'CVE-2014-10068'} | 2021-01-07T23:37:01Z | 2020-08-31T22:47:41Z | MODERATE | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/14', 'https://github.com/hapijs/inert/commit/e8f99f94da4cb08e8032eda984761c3f111e3e82', 'https://github.com/hapijs/inert/pull/15', 'https://github.com/advisories/GHSA-g4xp-36c3-f7mr', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10068', 'https://nodesecurity.io/advisories/14'} | null |
GHSA | GHSA-6j63-35hj-vmcg | Moderate severity vulnerability that affects mysql-binuuid-rails | mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default string escaping for affected database columns. | {'CVE-2018-18476'} | 2021-09-02T16:27:55Z | 2018-10-30T20:34:06Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://gist.github.com/viraptor/881276ea61e8d56bac6e28454c79f1e6', 'https://github.com/nedap/mysql-binuuid-rails/pull/18', 'https://github.com/advisories/GHSA-6j63-35hj-vmcg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18476'} | null |
GHSA | GHSA-43q8-3fv7-pr5x | Improper Validation of Integrity Check Value in TensorFlow | ### Impact
The implementation of [`tf.sparse.split`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_split_op.cc#L26-L102) does not fully validate the input arguments. Hence, a malicious user can trigger a denial of service via a segfault or a heap OOB read:
```python
import tensorflow as tf
data = tf.random.uniform([1, 32, 32], dtype=tf.float32)
axis = [1, 2]
x = tf.sparse.from_dense(data)
result = tf.sparse.split(x,3, axis=axis)
```
The code assumes `axis` is a scalar. This is another instance of [TFSA-2021-190](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-190.md) (CVE-2021-41206).
### Patches
We have patched the issue in GitHub commit [61bf91e768173b001d56923600b40d9a95a04ad5](https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5) (merging [#53695](https://github.com/tensorflow/tensorflow/pull/53695)).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/53660). | null | 2022-02-09T23:37:55Z | 2022-02-09T23:37:55Z | HIGH | 7 | {'CWE-354'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x', 'https://github.com/advisories/GHSA-43q8-3fv7-pr5x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5', 'https://github.com/tensorflow/tensorflow/pull/53695'} | null |
GHSA | GHSA-qc36-q22q-cjw3 | SMTP command injection in lettre | ### Impact
Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it.
### Fix
The flaw is fixed by correctly handling consecutive CRLF sequences.
### References
* [RUSTSEC-2021-0069](https://rustsec.org/advisories/RUSTSEC-2021-0069.html)
| {'CVE-2021-38189'} | 2022-04-19T19:02:58Z | 2021-07-12T17:03:27Z | CRITICAL | 9.8 | {'CWE-147'} | {'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce', 'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2', 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html', 'https://github.com/advisories/GHSA-qc36-q22q-cjw3'} | null |
GHSA | GHSA-mpjm-v997-c4h4 | Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API | ### Impact
This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.
All current stable versions of Electron are affected.
### Patches
This was fixed with #30728, and the following Electron versions contain the fix:
- 15.0.0-alpha.10
- 14.0.0
- 13.3.0
- 12.1.0
- 11.5.0
### Workarounds
If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit.
Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event:
```js
delete require('electron').nativeImage.createThumbnailFromPath
```
### For more information
If you have any questions or comments about this advisory, email us at [[email protected]](mailto:[email protected]). | {'CVE-2021-39184'} | 2022-04-19T19:03:06Z | 2021-10-12T21:59:13Z | MODERATE | 6.8 | {'CWE-668'} | {'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4', 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f', 'https://github.com/electron/electron/pull/30728', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39184', 'https://github.com/advisories/GHSA-mpjm-v997-c4h4'} | null |
GHSA | GHSA-9wrv-g75h-8ccc | Improper Access Control in Shopware | Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. | {'CVE-2022-24872'} | 2022-05-04T03:52:20Z | 2022-04-22T21:04:27Z | HIGH | 8.1 | {'CWE-732'} | {'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-9wrv-g75h-8ccc', 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc'} | null |
GHSA | GHSA-3h87-v52r-p9rg | Out of bounds write in reorder | An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index has an out-of-bounds write if an iterator returns a len() that is too small. | {'CVE-2021-29941'} | 2021-08-25T20:54:08Z | 2021-08-25T20:54:08Z | HIGH | 7.3 | {'CWE-787'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0050.html', 'https://github.com/tiby312/reorder/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29941', 'https://github.com/advisories/GHSA-3h87-v52r-p9rg'} | null |
GHSA | GHSA-j379-9jr9-w5cq | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437. | {'CVE-2018-1000844'} | 2021-09-14T18:15:57Z | 2018-12-21T17:48:26Z | CRITICAL | 9.1 | {'CWE-611'} | {'https://github.com/square/retrofit/pull/2735', 'https://github.com/advisories/GHSA-j379-9jr9-w5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'} | null |
GHSA | GHSA-4vhw-4rw7-jfpv | Path traversal in mozwire | An issue was discovered in the mozwire crate through 2020-08-18 for Rust. A ../ directory-traversal situation allows overwriting local files that have .conf at the end of the filename. | {'CVE-2020-35883'} | 2021-08-25T20:49:02Z | 2021-08-25T20:49:02Z | CRITICAL | 9.1 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35883', 'https://github.com/advisories/GHSA-4vhw-4rw7-jfpv', 'https://rustsec.org/advisories/RUSTSEC-2020-0030.html', 'https://github.com/NilsIrl/MozWire/issues/14'} | null |
GHSA | GHSA-rgh3-987h-wpmw | XML External Entity Injection in XStream | Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document. | {'CVE-2016-3674'} | 2021-09-22T18:47:03Z | 2020-06-30T22:48:14Z | HIGH | 7.5 | {'CWE-200'} | {'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183180.html', 'http://www.openwall.com/lists/oss-security/2016/03/25/8', 'http://www.openwall.com/lists/oss-security/2016/03/28/1', 'https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385', 'http://rhn.redhat.com/errata/RHSA-2016-2823.html', 'http://www.securitytracker.com/id/1036419', 'https://github.com/advisories/GHSA-rgh3-987h-wpmw', 'http://www.securityfocus.com/bid/85381', 'http://rhn.redhat.com/errata/RHSA-2016-2822.html', 'https://github.com/x-stream/xstream/issues/25', 'http://x-stream.github.io/changes.html#1.4.9', 'http://www.debian.org/security/2016/dsa-3575', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3674', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183208.html'} | null |
GHSA | GHSA-qrqm-fpv6-6r8g | Command Injection Vulnerability in Mechanize | This security advisory has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA).
### Impact
Mechanize `>= v2.0`, `< v2.7.7` allows for OS commands to be injected using several classes' methods which implicitly use Ruby's `Kernel.open` method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls:
- `Mechanize::CookieJar#load`: since v2.0 (see 208e3ed)
- `Mechanize::CookieJar#save_as`: since v2.0 (see 5b776a4)
- `Mechanize#download`: since v2.2 (see dc91667)
- `Mechanize::Download#save` and `#save!` since v2.1 (see 98b2f51, bd62ff0)
- `Mechanize::File#save` and `#save_as`: since v2.1 (see 2bf7519)
- `Mechanize::FileResponse#read_body`: since v2.0 (see 01039f5)
### Patches
These vulnerabilities are patched in Mechanize v2.7.7.
### Workarounds
No workarounds are available. We recommend upgrading to v2.7.7 or later.
### References
See https://docs.rubocop.org/rubocop/cops_security.html#securityopen for background on why `Kernel.open` should not be used with untrusted input.
### For more information
If you have any questions or comments about this advisory, please open an issue in [sparklemotion/mechanize](https://github.com/sparklemotion/mechanize/issues/new). | {'CVE-2021-21289'} | 2022-04-27T20:24:22Z | 2021-02-02T18:50:27Z | HIGH | 7.4 | {'CWE-78'} | {'https://security.gentoo.org/glsa/202107-17', 'https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21289', 'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0', 'https://github.com/sparklemotion/mechanize/security/advisories/GHSA-qrqm-fpv6-6r8g', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LBVVJUL4P4KCJH4IQTHFZ4ATXY7XXZPV/', 'https://rubygems.org/gems/mechanize/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YNFZ7ROYS6V4J5L5PRAJUG2AWC7VXR2V/', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00021.html', 'https://github.com/advisories/GHSA-qrqm-fpv6-6r8g'} | null |
GHSA | GHSA-w32p-76xr-88pc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052. | {'CVE-2019-1003'} | 2021-03-29T20:59:06Z | 2021-03-29T20:59:06Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-w32p-76xr-88pc', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4'} | null |
GHSA | GHSA-c6pw-q7f2-97hv | Privilege Escalation in cordova-plugin-inappbrowser | Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package.
## Recommendation
Upgrade to version 3.1.0 or later. | {'CVE-2019-0219'} | 2022-02-23T22:12:28Z | 2020-09-04T17:57:43Z | CRITICAL | 9.8 | {'CWE-79'} | {'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/11/28/1', 'https://www.npmjs.com/advisories/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219', 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj', 'https://github.com/advisories/GHSA-c6pw-q7f2-97hv', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'} | null |
GHSA | GHSA-wr5r-m8pc-85j9 | Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml | Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | {'CVE-2019-3772'} | 2021-01-08T21:17:22Z | 2019-01-25T16:18:49Z | LOW | 0 | {'CWE-611'} | {'http://www.securityfocus.com/bid/106749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://pivotal.io/security/cve-2019-3772', 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'} | null |
GHSA | GHSA-c6fg-99pr-25m9 | Uncapped length of skin data fields submitted by players | ### Impact
Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave.
This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an exception will be thrown during data saving, which will cause the server to crash.
Other fields (such as skinGeometryData) are also uncapped, but those have a much larger 2 GB length limit, so this is not a concern for those, particularly considering the decompressed packet size limit of 2 MB.
### Patches
PM3: 958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb
PM4: 6492cac5c10f9fa8443ceddd2191a7b65b73f601
### Workarounds
A plugin may check player skins during `PlayerLoginEvent` and `PlayerSkinChangeEvent` and ensure that the offending fields are not larger than 32767 bytes.
### For more information
If you have any questions or comments about this advisory:
* Email us at [[email protected]](mailto:[email protected])
| null | 2022-01-06T23:53:58Z | 2022-01-06T23:53:58Z | HIGH | 7.5 | null | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb', 'https://github.com/advisories/GHSA-c6fg-99pr-25m9'} | null |
GHSA | GHSA-g644-6fg4-hrh9 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848. | {'CVE-2020-0830'} | 2021-07-28T18:57:47Z | 2021-07-28T18:57:47Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830', 'https://github.com/advisories/GHSA-g644-6fg4-hrh9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0830'} | null |
GHSA | GHSA-54fx-gm74-q676 | Permissions bypass in SmallRye | A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2 | {'CVE-2020-1729'} | 2022-03-21T20:50:43Z | 2022-03-18T17:55:47Z | MODERATE | 4 | {'CWE-863'} | {'https://github.com/advisories/GHSA-54fx-gm74-q676', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729', 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444'} | null |
GHSA | GHSA-4r8q-gv9j-3xx6 | Open Redirect | ### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`)
### Patches
Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to.
### Workarounds
There is a simple way to work around the security issue
- Set the `force_https` to every tenant to `false`
### References
https://nvd.nist.gov/vuln/detail/CVE-2018-11784
### For more information
If you have any questions or comments about this advisory:
* Contact us in Discord: https://tenancy.dev/chat
| {'CVE-2021-32645'} | 2022-03-21T20:46:04Z | 2022-03-18T17:55:07Z | MODERATE | 4.3 | {'CWE-601'} | {'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/advisories/GHSA-4r8q-gv9j-3xx6', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'} | null |
GHSA | GHSA-pc5p-h8pf-mvwp | Machine-In-The-Middle in https-proxy-agent | Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials.
## Recommendation
Upgrade to version 3.0.0 or 2.2.3. | null | 2021-08-23T15:27:25Z | 2020-04-16T03:14:56Z | MODERATE | 6.1 | {'CWE-300'} | {'https://hackerone.com/reports/541502', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://www.npmjs.com/advisories/1184', 'https://github.com/advisories/GHSA-pc5p-h8pf-mvwp', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'} | null |
GHSA | GHSA-cvhw-2593-5j2q | Double Free in OpenCV | OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV-Python and and OpenCV-Contrib-Python 3.3.1.11). | {'CVE-2016-1516'} | 2021-11-18T15:34:34Z | 2021-10-12T22:00:08Z | HIGH | 8.8 | {'CWE-415'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1516', 'https://arxiv.org/pdf/1701.04739.pdf', 'https://github.com/opencv/opencv/issues/5956', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/advisories/GHSA-cvhw-2593-5j2q'} | null |
GHSA | GHSA-8jxq-75rw-fhj9 | Eve allows execution of arbitrary code via Code Injection in the where parameter | io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter. | {'CVE-2018-8097'} | 2022-04-26T18:10:00Z | 2018-07-12T20:29:35Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/advisories/GHSA-8jxq-75rw-fhj9', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8097'} | null |
GHSA | GHSA-j29f-m23h-3p8p | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0911'} | 2022-03-29T21:29:56Z | 2022-03-17T00:00:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0911', 'https://github.com/advisories/GHSA-j29f-m23h-3p8p', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447'} | null |
GHSA | GHSA-9988-f88m-mr42 | Exposure of Sensitive Information to an Unauthorized Actor in FreeTAKServer-UI | FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys. | {'CVE-2022-25512'} | 2022-03-28T22:34:41Z | 2022-03-12T00:00:37Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/FreeTAKTeam/UI/issues/26', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25512', 'https://github.com/advisories/GHSA-9988-f88m-mr42'} | null |
GHSA | GHSA-7xrj-f5rp-j55h | Uncontrolled Resource Consumption in transpile | All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function. | {'CVE-2021-23429'} | 2021-09-02T17:10:42Z | 2021-09-02T17:10:42Z | MODERATE | 6.5 | {'CWE-400', 'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23429', 'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774', 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53', 'https://github.com/advisories/GHSA-7xrj-f5rp-j55h'} | null |
GHSA | GHSA-3p3h-qghp-hvh2 | Open Redirect in werkzeug | Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | {'CVE-2020-28724'} | 2021-04-20T16:30:26Z | 2021-04-20T16:30:26Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/pallets/werkzeug/pull/890/files', 'https://github.com/advisories/GHSA-3p3h-qghp-hvh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28724', 'https://github.com/pallets/werkzeug/issues/822', 'https://github.com/pallets/flask/issues/1639'} | null |
GHSA | GHSA-4c7m-wxvm-r7gc | Improper parsing of octal bytes in netmask | Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended. | {'CVE-2021-28918'} | 2022-04-01T20:21:55Z | 2021-04-14T15:03:16Z | CRITICAL | 9.1 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-28918', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://github.com/advisories/GHSA-4c7m-wxvm-r7gc', 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/', 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/', 'https://security.netapp.com/advisory/ntap-20210528-0010/', 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md', 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021', 'https://www.npmjs.com/package/netmask'} | null |
GHSA | GHSA-779f-wgxg-qr8f | Prototype Pollution in lodash.mergewith | Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.2 or later. | null | 2021-09-29T14:58:42Z | 2020-09-03T18:10:22Z | HIGH | 0 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1071', 'https://github.com/advisories/GHSA-779f-wgxg-qr8f'} | null |
GHSA | GHSA-xqvg-xm9m-p2c4 | Moderate severity vulnerability that affects mailman | An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site. | {'CVE-2018-13796'} | 2021-09-22T16:31:46Z | 2018-09-11T18:57:16Z | MODERATE | 6.5 | {'CWE-20'} | {'https://bugs.launchpad.net/mailman/+bug/1780874', 'https://security.gentoo.org/glsa/201904-10', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13796', 'https://usn.ubuntu.com/4348-1/', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html', 'https://www.mail-archive.com/[email protected]/msg71003.html', 'https://github.com/advisories/GHSA-xqvg-xm9m-p2c4'} | null |
GHSA | GHSA-52p9-v744-mwjj | Remote code execution in Kramdown | Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated. | {'CVE-2021-28834'} | 2021-04-14T18:12:09Z | 2021-03-29T16:30:34Z | HIGH | 9.8 | {'CWE-94'} | {'https://github.com/gettalong/kramdown/pull/708', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834', 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://www.debian.org/security/2021/dsa-4890', 'https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/#remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SYOLQKFL6IJCQLBXV34Z4TI4O54GESPR/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/', 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1', 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NJCJVYHPY6LNUFM6LYZIAUIYOMVT5QGV/', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://github.com/advisories/GHSA-52p9-v744-mwjj'} | null |
GHSA | GHSA-28hp-fgcr-2r4h | Cross-Site Scripting via JSONP | JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors. | null | 2021-08-17T15:35:31Z | 2019-06-27T17:25:42Z | MODERATE | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1630', 'https://github.com/advisories/GHSA-28hp-fgcr-2r4h', 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'} | null |
GHSA | GHSA-3r8w-mphv-2f3f | Prototype Pollution | All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function. | {'CVE-2021-23396'} | 2021-06-21T17:12:25Z | 2021-06-21T17:12:25Z | MODERATE | 5.6 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396', 'https://github.com/advisories/GHSA-3r8w-mphv-2f3f'} | null |
GHSA | GHSA-mgr2-3mpv-43gc | Downloads Resources over HTTP in openframe-image | Affected versions of `openframe-image` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | {'CVE-2016-10616'} | 2021-09-16T20:55:30Z | 2019-02-18T23:47:37Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://nodesecurity.io/advisories/218', 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc', 'https://www.npmjs.com/advisories/218', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616'} | null |
GHSA | GHSA-rww7-2gpw-fv6j | Crash when type cannot be specialized in Tensorflow | ### Impact
Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174):
```cc
void InferenceContext::PreInputInit(
const OpDef& op_def, const std::vector<const Tensor*>& input_tensors,
const std::vector<ShapeHandle>& input_tensors_as_shapes) {
const auto ret = full_type::SpecializeType(attrs_, op_def);
DCHECK(ret.status().ok()) << "while instantiating types: " << ret.status();
ret_types_ = ret.ValueOrDie();
// ...
}
```
However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case we also get a crash due to the assertion failure.
### Patches
We have patched the issue in GitHub commit [cb164786dc891ea11d3a900e90367c339305dc7b](https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. | {'CVE-2022-23572'} | 2022-02-11T20:48:06Z | 2022-02-09T23:28:29Z | MODERATE | 6.5 | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j', 'https://github.com/advisories/GHSA-rww7-2gpw-fv6j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572', 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174'} | null |
GHSA | GHSA-pwwm-pwx2-2hw7 | Generation of Error Message Containing Sensitive Information in Snipe-IT | Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information. | {'CVE-2022-0622'} | 2022-02-26T01:13:46Z | 2022-02-18T00:00:37Z | MODERATE | 5.3 | {'CWE-209'} | {'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/advisories/GHSA-pwwm-pwx2-2hw7'} | null |
GHSA | GHSA-r659-8xfp-j327 | Prototype Pollution in objection.js | objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16. | {'CVE-2021-3766'} | 2021-10-08T20:12:34Z | 2021-09-07T23:09:43Z | CRITICAL | 9.8 | {'CWE-1321', 'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/advisories/GHSA-r659-8xfp-j327', 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc'} | null |
GHSA | GHSA-773h-w45w-f2f9 | Denial of service vulnerability exists in libxmljs | libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash. | {'CVE-2022-21144'} | 2022-05-04T14:48:04Z | 2022-05-03T00:00:46Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://github.com/libxmljs/libxmljs/pull/594', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/advisories/GHSA-773h-w45w-f2f9', 'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756'} | null |
GHSA | GHSA-6gww-qpm6-mc2g | Server-Side Request Forgery in ssrf-agent | The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private. | {'CVE-2021-23718'} | 2021-12-06T21:36:54Z | 2021-12-02T17:51:51Z | MODERATE | 6.5 | {'CWE-918'} | {'https://github.com/advisories/GHSA-6gww-qpm6-mc2g', 'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362', 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718', 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'} | null |
GHSA | GHSA-gfj6-p24g-6hpm | Malicious Package in jc-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-30T16:35:08Z | 2020-09-03T22:55:06Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-gfj6-p24g-6hpm', 'https://www.npmjs.com/advisories/1277'} | null |
GHSA | GHSA-h9v8-rm3m-5h5f | OS Command Injection in git-add-remote | git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument. | {'CVE-2020-7630'} | 2022-02-10T23:47:47Z | 2022-02-10T23:47:47Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7630', 'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269', 'https://github.com/advisories/GHSA-h9v8-rm3m-5h5f', 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,'} | null |
GHSA | GHSA-j4mv-2rv7-v2j9 | Improper Privilege Management in Concrete CMS | Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved. | {'CVE-2021-22966'} | 2021-11-23T18:18:07Z | 2021-11-23T18:18:07Z | MODERATE | 0 | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22966', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes', 'https://hackerone.com/reports/1362747', 'https://github.com/advisories/GHSA-j4mv-2rv7-v2j9'} | null |
GHSA | GHSA-hf4p-jm7r-vjjj | Deserialization of Untrusted Data in EthereumJ | An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server. | {'CVE-2018-15890'} | 2021-08-17T19:40:01Z | 2019-07-26T16:10:39Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/ethereum/ethereumj', 'https://github.com/advisories/GHSA-hf4p-jm7r-vjjj', 'https://github.com/ethereum/ethereumj/issues/1161', 'https://github.com/frohoff/ysoserial/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'} | null |
GHSA | GHSA-q67f-3jq4-mww2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0831'} | 2022-03-11T23:22:38Z | 2022-03-05T00:00:45Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-q67f-3jq4-mww2', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'} | null |
GHSA | GHSA-9423-6c93-gpp8 | Arbitrary File Write via Archive Extraction (Zip Slip) | The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released. | {'CVE-2020-7667'} | 2022-01-04T19:27:35Z | 2021-06-23T17:13:29Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667', 'https://github.com/advisories/GHSA-9423-6c93-gpp8', 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'} | null |
GHSA | GHSA-hfm2-fffh-v47v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197. | {'CVE-2019-1196'} | 2021-03-29T20:58:01Z | 2021-03-29T20:58:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://github.com/advisories/GHSA-hfm2-fffh-v47v', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'} | null |
GHSA | GHSA-96qc-ghj4-rq27 | Directory Traversal in yttivy | Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16219'} | 2021-01-14T15:40:24Z | 2020-09-01T18:24:56Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/441', 'https://github.com/advisories/GHSA-96qc-ghj4-rq27', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy', 'https://nodesecurity.io/advisories/441', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219'} | null |
GHSA | GHSA-wj36-v8j4-pc7c | Low severity vulnerability that affects express-cart | A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators. | {'CVE-2018-16483'} | 2021-09-21T21:12:02Z | 2019-02-07T18:16:03Z | HIGH | 8.8 | {'CWE-290'} | {'https://hackerone.com/reports/343626', 'https://github.com/advisories/GHSA-wj36-v8j4-pc7c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'} | null |
GHSA | GHSA-vqmr-957g-r7w3 | High severity vulnerability that affects rendertron | Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files. | {'CVE-2017-18355'} | 2021-09-20T22:15:16Z | 2019-02-12T15:36:39Z | HIGH | 7.5 | {'CWE-200'} | {'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355'} | null |
GHSA | GHSA-9h6g-6mxg-vvp4 | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadin.com/security/cve-2021-31406 | null | 2022-04-19T19:02:54Z | 2021-04-19T14:47:18Z | MODERATE | 4 | {'CWE-208'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4', 'https://github.com/advisories/GHSA-9h6g-6mxg-vvp4', 'https://vaadin.com/security/cve-2021-31406'} | null |
GHSA | GHSA-hh56-x62g-gvhc | Cross-site scripting in CLEditor | Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element. | {'CVE-2019-1010113'} | 2021-08-17T19:05:00Z | 2019-07-26T16:10:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113', 'https://github.com/advisories/GHSA-hh56-x62g-gvhc'} | null |
GHSA | GHSA-vm6v-w6q2-mrrq | Malicious Package in bb-builder | All versions of `bb-builder` contained malicious code. The package ran an executable targeting Windows and uploaded information to a remote server.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | null | 2021-09-30T20:09:25Z | 2020-09-03T19:20:05Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1119', 'https://github.com/advisories/GHSA-vm6v-w6q2-mrrq'} | null |
GHSA | GHSA-m362-87jc-f39v | Directory Traversal in uv-tj-demo | Affected versions of `uv-tj-demo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | {'CVE-2017-16200'} | 2021-01-14T15:41:37Z | 2020-09-01T18:16:24Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/428', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16200', 'https://www.npmjs.com/advisories/428', 'https://github.com/advisories/GHSA-m362-87jc-f39v', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo'} | null |
GHSA | GHSA-qmmc-jppf-32wv | Directory Traversal in Docker | Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." | {'CVE-2014-9358'} | 2022-02-15T00:41:14Z | 2022-02-15T00:41:14Z | MODERATE | 6.5 | {'CWE-59'} | {'http://www.securityfocus.com/archive/1/534215/100/0/threaded', 'https://github.com/advisories/GHSA-qmmc-jppf-32wv', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9358', 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9358', 'https://access.redhat.com/security/cve/cve-2014-9358', 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'} | null |
GHSA | GHSA-mxv6-q98x-h958 | Data races in model | `Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type.
This allows safe Rust code to trigger a data race, which is undefined behavior in Rust.
Users are advised to treat `Shared` as an unsafe type.
It should not be used outside of the testing context,
and care must be taken so that the testing code does not have a data race
besides a race condition that is expected to be caught by the test.
| {'CVE-2020-36460'} | 2021-08-25T20:56:07Z | 2021-08-25T20:56:07Z | HIGH | 8.1 | {'CWE-362', 'CWE-843'} | {'https://github.com/advisories/GHSA-mxv6-q98x-h958', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36460', 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html', 'https://github.com/spacejam/model/issues/3'} | null |
GHSA | GHSA-xjjg-vmw6-c2p9 | Open Redirect in httpie | All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control. | {'CVE-2019-10751'} | 2021-08-17T22:17:52Z | 2019-08-27T17:44:33Z | HIGH | 8.8 | {'CWE-601'} | {'https://github.com/advisories/GHSA-xjjg-vmw6-c2p9', 'https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10751'} | null |
GHSA | GHSA-82gw-pqf7-q3j2 | High severity vulnerability that affects pym.js | NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function.
https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 that can result in Arbitrary javascript code execution. This attack appear to be exploitable via Attacker gains full javascript access to pages with Pym.js embeds when user visits an attacker crafted page.. This vulnerability appears to have been fixed in versions 1.3.2 and later. | {'CVE-2018-1000086'} | 2021-09-03T21:50:02Z | 2018-03-13T20:38:51Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/advisories/GHSA-82gw-pqf7-q3j2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086', 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html', 'https://github.com/nprapps/pym.js', 'https://github.com/nprapps/pym.js/issues/170'} | null |
GHSA | GHSA-c8cc-p3j7-4c7f | Moderate severity vulnerability that affects org.apache.mesos:mesos | Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value. | {'CVE-2018-8023'} | 2021-09-08T21:43:34Z | 2018-10-17T19:54:14Z | MODERATE | 5.9 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8023', 'https://github.com/advisories/GHSA-c8cc-p3j7-4c7f', 'https://lists.apache.org/thread.html/r0dd7ff197b2e3bdd80a0326587ca3d0c22e10d1dba17c769d6da7d7a@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/9b9d3f6bd09f3ebd2284b82077033bdc71da550a1c4c010c2494acc3@%3Cdev.mesos.apache.org%3E'} | null |
GHSA | GHSA-g996-q5r8-w7g2 | Escape validation messages in the PHP templating engine | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle. | {'CVE-2019-10909'} | 2021-08-18T22:15:16Z | 2019-11-12T23:00:53Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://www.drupal.org/sa-core-2019-005', 'https://github.com/advisories/GHSA-g996-q5r8-w7g2', 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909', 'https://symfony.com/cve-2019-10909', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'} | null |
GHSA | GHSA-jjpq-gp5q-8q6w | Cross-site scripting in Apache Tomcat | The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. | {'CVE-2019-0221'} | 2021-07-14T19:43:47Z | 2019-05-30T03:30:42Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/[email protected]/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://usn.ubuntu.com/4128-2/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/', 'https://usn.ubuntu.com/4128-1/', 'http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html', 'http://seclists.org/fulldisclosure/2019/May/50', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html', 'https://security.gentoo.org/glsa/202003-43', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/108545', 'https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://github.com/advisories/GHSA-jjpq-gp5q-8q6w', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20190606-0001/', 'https://seclists.org/bugtraq/2019/Dec/43'} | null |
GHSA | GHSA-wcv5-qrj6-9pfm | Heap buffer overflow in `Conv3DBackprop*` | ### Impact
Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows:
```python
import tensorflow as tf
input_sizes = tf.constant([1, 1, 1, 1, 2], shape=[5], dtype=tf.int32)
filter_tensor = tf.constant([734.6274508233133, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0,
-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0,
-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[4, 1, 6, 1, 1], dtype=tf.float32)
out_backprop = tf.constant([-10.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32)
tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 89, 29, 89, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
```python
import tensorflow as tf
input_values = [-10.0] * (7 * 7 * 7 * 7 * 7)
input_values[0] = 429.6491056791816
input_sizes = tf.constant(input_values, shape=[7, 7, 7, 7, 7], dtype=tf.float32)
filter_tensor = tf.constant([7, 7, 7, 1, 1], shape=[5], dtype=tf.int32)
out_backprop = tf.constant([-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[7, 1, 1, 1, 1], dtype=tf.float32)
tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 37, 65, 93, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1])
```
This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel.
### Patches
We have patched the issue in GitHub commit [8f37b52e1320d8d72a9529b2468277791a261197](https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197).
The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
### For more information
Please consult [our securityguide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team. | {'CVE-2021-29520'} | 2022-04-26T18:10:21Z | 2021-05-21T14:21:12Z | LOW | 2.5 | {'CWE-787', 'CWE-120'} | {'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29520', 'https://github.com/advisories/GHSA-wcv5-qrj6-9pfm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm'} | null |
GHSA | GHSA-xv6v-72hh-g6g2 | Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | OWASP OWASP ANTISAMY version 1.5.7 and earlier contains a Cross Site Scripting (XSS) vulnerability in AntiSamy.scan() - for both SAX & DOM that can result in Cross Site Scripting. | {'CVE-2018-1000643'} | 2021-12-03T14:28:42Z | 2018-10-18T17:22:26Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-xv6v-72hh-g6g2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000643'} | null |
GHSA | GHSA-4c7h-f2j9-9c46 | Missing permission Phoenix AutoTest Plugin | A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | {'CVE-2022-28158'} | 2022-04-05T21:21:07Z | 2022-03-30T00:00:21Z | MODERATE | 6.5 | {'CWE-862'} | {'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685', 'https://github.com/advisories/GHSA-4c7h-f2j9-9c46', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'} | null |
GHSA | GHSA-m6f7-46hw-grcj | Critical severity vulnerability that affects cremefraiche | The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information. | {'CVE-2013-2090'} | 2021-09-14T22:13:34Z | 2017-10-24T18:33:37Z | CRITICAL | 0 | {'CWE-78'} | {'http://secunia.com/advisories/53391', 'http://osvdb.org/93395', 'https://github.com/advisories/GHSA-m6f7-46hw-grcj', 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html', 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2090', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84271'} | null |
GHSA | GHSA-gw5h-h6hj-f56g | Improper Authorization in Gogs | ### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
### Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.13.0+dev.
### Workarounds
In addition to marking PAM accounts as expired, also disable/lock them. Running `usermod -L <username>` will add an exclamation mark to the password hash and would result in wrong passwords responses when trying to login.
### References
https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62/
### For more information
If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6810.
| null | 2022-04-19T19:03:27Z | 2022-03-14T22:58:37Z | HIGH | 8.2 | {'CWE-285'} | {'https://github.com/advisories/GHSA-gw5h-h6hj-f56g', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g', 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62'} | null |
GHSA | GHSA-frqg-7g38-6gcf | Improper escaping of command arguments on Windows leading to command injection | ### Impact
Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
### Patches
1.10.23 and 2.1.9 fix the issue
### Workarounds
None
| {'CVE-2021-41116'} | 2022-04-22T15:41:33Z | 2021-10-05T20:23:18Z | HIGH | 8.2 | {'CWE-77'} | {'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-frqg-7g38-6gcf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'} | null |
GHSA | GHSA-rp63-jfmw-532w | High severity vulnerability that affects mail | The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. | {'CVE-2012-2140'} | 2021-09-17T19:22:25Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-20'} | {'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140', 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'http://secunia.com/advisories/48970', 'https://github.com/advisories/GHSA-rp63-jfmw-532w', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'http://www.openwall.com/lists/oss-security/2012/04/26/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=816352', 'http://www.openwall.com/lists/oss-security/2012/04/25/8', 'https://bugzilla.novell.com/show_bug.cgi?id=759092', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'} | null |
GHSA | GHSA-c5hm-xc74-pqrg | OS Command Injection in jscover | jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument. | {'CVE-2020-7623'} | 2022-02-10T23:37:22Z | 2022-02-10T23:37:22Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623', 'https://github.com/advisories/GHSA-c5hm-xc74-pqrg', 'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,'} | null |
GHSA | GHSA-hjgp-8ffr-hwwr | Downloads Resources over HTTP in closurecompiler | Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closurecompiler`.
## Recommendation
Update to version 1.6.1 or later. | {'CVE-2016-10582'} | 2021-01-08T18:40:46Z | 2019-02-18T23:51:19Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://www.npmjs.com/advisories/169', 'https://nodesecurity.io/advisories/169'} | null |
GHSA | GHSA-49qr-xh3w-h436 | Moderate severity vulnerability that affects notebook | Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this. | {'CVE-2018-19351'} | 2021-09-01T14:11:52Z | 2018-11-21T22:15:47Z | MODERATE | 6.1 | {'CWE-79'} | {'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/advisories/GHSA-49qr-xh3w-h436', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351', 'https://pypi.org/project/notebook/#history', 'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'} | null |
GHSA | GHSA-gr4c-5rq6-cgh3 | OPC UA applications can allow a remote attacker to determine a Server's private key | An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack. | {'CVE-2018-7559'} | 2022-04-26T19:12:43Z | 2018-10-16T19:58:42Z | MODERATE | 5.3 | null | {'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7559', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf', 'https://github.com/advisories/GHSA-gr4c-5rq6-cgh3', 'http://www.securityfocus.com/bid/108688', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150'} | null |
GHSA | GHSA-vjg4-v33c-ggc4 | Out of bounds read in Tensorflow | ### Impact
The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap:
```python
import tensorflow as tf
@tf.function
def test():
y = tf.raw_ops.FractionalAvgPoolGrad(
orig_input_tensor_shape=[2,2,2,2],
out_backprop=[[[[1,2], [3, 4], [5, 6]], [[7, 8], [9,10], [11,12]]]],
row_pooling_sequence=[-10,1,2,3],
col_pooling_sequence=[1,2,3,4],
overlapping=True)
return y
test()
```
### Patches
We have patched the issue in GitHub commit [002408c3696b173863228223d535f9de72a101a9](https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9).
The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
### For more information
Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
### Attribution
This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team. | {'CVE-2022-21730'} | 2022-02-10T00:19:29Z | 2022-02-09T18:29:45Z | HIGH | 8.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360', 'https://github.com/advisories/GHSA-vjg4-v33c-ggc4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21730', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4', 'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'} | null |
GHSA | GHSA-fvgf-6h6h-3322 | Improper Limitation of a Pathname to a Restricted Directory | In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. | {'CVE-2021-3281'} | 2021-09-28T20:55:35Z | 2021-03-18T20:29:49Z | MODERATE | 5.3 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3281', 'https://docs.djangoproject.com/en/3.1/releases/3.0.12/', 'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://security.netapp.com/advisory/ntap-20210226-0004/', 'https://github.com/advisories/GHSA-fvgf-6h6h-3322', 'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/', 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/', 'https://groups.google.com/forum/#!forum/django-announce'} | null |
GHSA | GHSA-8434-v7xw-8m9x | Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks | APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside application manifest.
### Impact
An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name.
### Patches
The problem is fixed in version v2.0.4 and above.
### Workarounds
```bash
> git fetch --tags; git checkout v2.0.6-dev
```
Or pull to the latest version:
```bash
> git pull origin master
```
### References
- a966e781499ff6fd4eea66876d7532301b13a382
### For more information
If you have any questions or comments about this advisory:
* Email me at [[email protected]](mailto:[email protected])
| {'CVE-2021-21386'} | 2022-04-19T19:02:50Z | 2022-01-21T23:03:39Z | CRITICAL | 9.3 | {'CWE-88', 'CWE-78'} | {'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386', 'https://github.com/advisories/GHSA-8434-v7xw-8m9x', 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'} | null |
GHSA | GHSA-v6wp-4m6f-gcjg | Open redirect vulnerability in `aiohttp` (`normalize_path_middleware` middleware) | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website.
It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
This security problem has been fixed in v3.7.4. Upgrade your dependency as follows:
[`pip install aiohttp >= 3.7.4`]
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications.
### References
_Are there any links users can visit to find out more?_
* [aiohttp @ PyPI]
* [GHSA-v6wp-4m6f-gcjg]
* [OWASP page on open redirects]
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [aiohttp repo](https://github.com/aio-libs/aiohttp/issues/new/choose)
* Email us at [email protected] and/or [email protected]
Credit: [Jelmer Vernooij] and [Beast Glatisant].
[aiohttp @ PyPI]: https://pypi.org/p/aiohttp
[`pip install aiohttp >= 3.7.4`]: https://pypi.org/project/aiohttp/3.7.4/
[GHSA-v6wp-4m6f-gcjg]: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg
[OWASP page on open redirects]:
https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
[Jelmer Vernooij]: https://jelmer.uk
[Beast Glatisant]: https://github.com/g147 | {'CVE-2021-21330'} | 2022-04-19T19:02:48Z | 2021-02-26T02:11:57Z | LOW | 3.1 | {'CWE-601'} | {'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b', 'https://github.com/aio-libs/aiohttp/blob/master/CHANGES.rst#374-2021-02-25', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/', 'https://www.debian.org/security/2021/dsa-4864', 'https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FU7ENI54JNEK3PHEFGCE46DGMFNTVU6L/', 'https://github.com/advisories/GHSA-v6wp-4m6f-gcjg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21330', 'https://pypi.org/project/aiohttp/'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.