ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
GHSA
GHSA-cmc7-mfmr-xqrx
Logic error in authentication in proxy.py
before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or).
{'CVE-2021-3116'}
2021-04-07T21:01:25Z
2021-04-07T21:01:25Z
HIGH
7.5
{'CWE-287', 'CWE-480'}
{'https://github.com/advisories/GHSA-cmc7-mfmr-xqrx', 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46', 'https://pypi.org/project/proxy.py/2.3.1/#history', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116', 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-broken-basic-authentication/'}
null
GHSA
GHSA-2xwq-h7r9-6w27
Cross-site Scripting in kimai2
Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs
{'CVE-2021-3957'}
2021-11-23T17:59:40Z
2021-11-23T17:59:40Z
MODERATE
4.6
{'CWE-352'}
{'https://github.com/advisories/GHSA-2xwq-h7r9-6w27', 'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3', 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'}
null
GHSA
GHSA-q8qj-fc9q-cphr
Undefined behavior in Tensorflow
### Impact If a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition. However, this `status` argument is not properly checked: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L265-L267 Hence, code following these methods will bind references to null pointers: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/c/eager/dlpack.cc#L279-L285 This is undefined behavior and reported as an error if compiling with `-fsanitize=null`. ### Patches We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been discovered during variant analysis of [GHSA-rjjg-hgv6-h69v](https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v).
{'CVE-2020-15191'}
2021-11-19T15:19:57Z
2020-09-25T18:28:25Z
MODERATE
5.3
{'CWE-252', 'CWE-20', 'CWE-476'}
{'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15191', 'https://github.com/advisories/GHSA-q8qj-fc9q-cphr'}
null
GHSA
GHSA-277p-xwpp-3jf7
Malicious Package in rrgod
All versions of `rrgod` are considered malicious. The package is malware designed to run arbitrary scripts. When installed, the package downloads an arbitrary file and executes its contents as a pre, post and install scripts. ## Recommendation This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
null
2021-10-01T13:42:10Z
2020-09-02T15:49:22Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-277p-xwpp-3jf7', 'https://www.npmjs.com/advisories/764'}
null
GHSA
GHSA-vrh8-27q8-fr8f
Low severity vulnerability that affects org.apache.solr:solr-core
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.
{'CVE-2017-3164'}
2021-09-20T22:18:55Z
2019-03-14T15:39:56Z
HIGH
7.5
{'CWE-918'}
{'https://lists.apache.org/thread.html/75dc651478f9d04505b46d44fe3ac739e7aaf3d7bf1257973685f8f7@%3Cdev.lucene.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN%3DwO5rYs6ktAX-5%3D-f5JDFwbbTSM2TTjEbGO5jKKA%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/43026507844ada1ac658ccf7bc939378c13e492fd6538416ce65df39@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/ca3105b6934ccd28e843dffe39724f6963ff49825e9b709837203649@%3Cdev.lucene.apache.org%3E', 'http://www.securityfocus.com/bid/107026', 'https://lists.apache.org/thread.html/e0f9c652b57a91fdcc287efcead620af9f4d8e46b88f0b761aa265de@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3164', 'https://github.com/advisories/GHSA-vrh8-27q8-fr8f', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}
null
GHSA
GHSA-fqfj-cmh6-hj49
Ruby OpenID
Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk.
{'CVE-2019-11027'}
2021-09-21T16:25:53Z
2019-06-13T16:15:56Z
CRITICAL
9.8
{'CWE-918'}
{'https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html', 'https://security.gentoo.org/glsa/202003-09', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11027', 'https://marc.info/?l=openid-security&m=155154717027534&w=2', 'https://github.com/openid/ruby-openid/issues/122', 'https://github.com/advisories/GHSA-fqfj-cmh6-hj49'}
null
GHSA
GHSA-cvh5-p6r6-g2qc
Exposed phpinfo() leadked via documentation files
### Impact The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). ### Patches Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. ### Workarounds Protect the `/vendor` directory from public access. ### References The first issue revealing this vulnerability is located here: https://github.com/flextype/flextype/issues/567 V6 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/815 V7 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/814 V8 fix: https://github.com/PHPSocialNetwork/phpfastcache/pull/813 ### For more information If you have any questions or comments about this advisory: * Open an issue in [our issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues) * Email us at [[email protected]](mailto:[email protected])
{'CVE-2021-37704'}
2021-08-30T16:13:40Z
2021-08-30T16:13:40Z
MODERATE
5.4
{'CWE-200', 'CWE-668'}
{'https://github.com/PHPSocialNetwork/phpfastcache/pull/813', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/815', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37704', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc', 'https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807', 'https://github.com/flextype/flextype/issues/567', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/814', 'https://packagist.org/packages/phpfastcache/phpfastcache', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51', 'https://github.com/advisories/GHSA-cvh5-p6r6-g2qc'}
null
GHSA
GHSA-gcx2-gvj7-pxv3
Insufficient Protection against HTTP Request Smuggling in mitmproxy
### Impact In mitmproxy 7.0.4 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless you use mitmproxy to protect an HTTP/1 service, no action is required. ### Patches The vulnerability has been fixed in mitmproxy 8.0.0 and above. ### Acknowledgements We thank Zeyu Zhang (@zeyu2001) for responsibly disclosing this vulnerability to the mitmproxy team. ### Timeline - **2022-03-15**: Received initial report. - **2022-03-15**: Verified report and confirmed receipt. - **2022-03-16**: Shared patch with researcher. - **2022-03-16**: Received confirmation that patch is working. - **2022-03-19**: Published patched release and advisory.
{'CVE-2022-24766'}
2022-03-22T19:32:46Z
2022-03-22T19:22:59Z
CRITICAL
9.8
{'CWE-444'}
{'https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24766', 'https://mitmproxy.org/posts/releases/mitmproxy8/', 'https://github.com/advisories/GHSA-gcx2-gvj7-pxv3', 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3'}
null
GHSA
GHSA-3gqj-cmxr-p4x2
Forced Browsing in Twisted
Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
{'CVE-2016-1000111'}
2021-08-12T17:02:19Z
2021-04-30T17:32:28Z
MODERATE
5.3
{'CWE-425'}
{'https://twistedmatrix.com/trac/ticket/8623', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html', 'https://www.openwall.com/lists/oss-security/2016/07/18/6', 'https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000111', 'https://github.com/advisories/GHSA-3gqj-cmxr-p4x2'}
null
GHSA
GHSA-2q95-593f-g7h7
OS Command Injection in Centreon
/graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter.
{'CVE-2020-22345'}
2021-09-02T17:16:06Z
2021-09-02T17:16:06Z
HIGH
8.8
{'CWE-78'}
{'https://engindemirbilek.github.io/centreon-19.10-rce', 'https://github.com/advisories/GHSA-2q95-593f-g7h7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22345', 'https://github.com/centreon/centreon/pull/8467#event-3163627607'}
null
GHSA
GHSA-74hh-4rcv-pp27
Malicious Package in bitconijs-lib
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:43:55Z
2020-09-04T16:44:19Z
CRITICAL
9.1
{'CWE-506'}
{'https://github.com/advisories/GHSA-74hh-4rcv-pp27', 'https://www.npmjs.com/advisories/1370'}
null
GHSA
GHSA-gcqq-w6gr-h9j9
Directory traversal vulnerability in RubyZip
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem.
{'CVE-2017-5946'}
2022-04-25T16:33:03Z
2017-10-24T18:33:35Z
CRITICAL
9.8
{'CWE-22'}
{'http://www.debian.org/security/2017/dsa-3801', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946', 'http://www.securityfocus.com/bid/96445', 'https://github.com/advisories/GHSA-gcqq-w6gr-h9j9', 'https://github.com/rubyzip/rubyzip/releases', 'https://github.com/rubyzip/rubyzip/issues/315'}
null
GHSA
GHSA-q52j-4q2q-hcj6
Authentication Bypass in console-io
Affected versions of the `console-io` package do not configure the underlying websocket library to require authentication, resulting in an authentication bypass vulnerability. As `console-io` allows terminal access on the server via a web page, an authentication bypass is essentially remote code execution. ## Recommendation Update to version 2.3.0 or later.
{'CVE-2016-10532'}
2021-09-16T19:31:29Z
2019-02-18T23:39:39Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-q52j-4q2q-hcj6', 'https://nodesecurity.io/advisories/90', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10532', 'https://www.npmjs.com/advisories/90'}
null
GHSA
GHSA-j96p-r523-8r3w
HTTP Request Smuggling in github.com/hyperledger/fabric
A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric.
{'CVE-2021-43669'}
2021-12-03T20:52:02Z
2021-12-03T20:52:02Z
HIGH
7.5
{'CWE-444'}
{'https://github.com/advisories/GHSA-j96p-r523-8r3w', 'https://github.com/hyperledger/fabric/pull/2828', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43669', 'https://github.com/hyperledger/fabric/releases/tag/v2.4.0-beta', 'https://jira.hyperledger.org/browse/FAB-18528'}
null
GHSA
GHSA-7p79-6x2v-5h88
Server crash if running Python 3.10 w/ Sanic 20.12
**!!! ONLY APPLIES TO VERSIONS PRIOR TO Sanic v20.12 WHEN USING Python 3.10 !!!** Sanic v20.12 officially supports Python versions 3.6, 3.7, 3.8, and 3.9. However, if you accidentally run it with version 3.10 (**which is not supported by Sanic 20.12**), your server is prone to crashing on an incoming web request. ### Impact Anyone running Sanic server between 0.1.7 and 20.12 **using Python 3.10**. ### Patches [Sanic v20.12.6](https://github.com/sanic-org/sanic/releases/tag/v20.12.6) ### Workarounds Use a supported version of Python (v3.6 - v3.9) ### References > In [asyncio](https://docs.python.org/3/library/asyncio.html#module-asyncio), the explicit passing of a loop argument has been deprecated and will be removed in version 3.10 for the following: ... [asyncio.Event](https://docs.python.org/3/library/asyncio-sync.html#asyncio.Event) [Python 3.8 Release Notes](https://docs.python.org/3/whatsnew/3.8.html#deprecated) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the community forums](https://community.sanicframework.org/) * Ping us on [the Discord server](https://discord.gg/FARQzAEMAA)
null
2022-04-19T19:03:23Z
2022-02-16T22:57:57Z
HIGH
0
null
{'https://github.com/sanic-org/sanic/security/advisories/GHSA-7p79-6x2v-5h88', 'https://github.com/sanic-org/sanic/releases/tag/v20.12.6', 'https://github.com/advisories/GHSA-7p79-6x2v-5h88'}
null
GHSA
GHSA-52qp-gwwh-qrg4
Missing Handler in @scandipwa/magento-scripts
### Impact After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable. ### Patches [Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above. ### Workarounds Upgrade to patched or latest (recommended) version `npm i @scandipwa/[email protected]` or `npm i @scandipwa/magento-scripts@latest`. ### References New releases always available here: https://github.com/scandipwa/create-magento-app/releases ### For more information If you have any questions or comments about this advisory: * Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues)
{'CVE-2021-32684'}
2021-06-21T17:10:02Z
2021-06-21T17:10:02Z
MODERATE
6.2
{'CWE-670'}
{'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4', 'https://github.com/advisories/GHSA-52qp-gwwh-qrg4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684', 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'}
null
GHSA
GHSA-pfrg-w49c-8432
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0768'}
2021-08-02T17:26:23Z
2021-08-02T17:26:23Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0768', 'https://github.com/advisories/GHSA-pfrg-w49c-8432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0768'}
null
GHSA
GHSA-v35c-49j6-q8hq
Security Constraint Bypass in Spring Security
Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed. Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath() and getPathInfo() [1]. Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified. Users of IBM WebSphere Application Server 8.5.x are known to be affected. Users of other containers that implement the Servlet specification may be affected. [1] https://issues.apache.org/bugzilla/show_bug.cgi?id=25015 ## Affected Pivotal Products and Versions Severity is high unless otherwise noted. - Spring Security 3.2.0 - 3.2.9 - Spring Security 4.0.x - 4.1.3 - Spring Security 4.2.0 - Older unsupported versions are also affected ## Mitigation Adopting one of the following mitigations will protect against this vulnerability. - Use a Servlet container known not to include path parameters in the return values for getServletPath() and getPathInfo() - Upgrading to Spring Security 3.2.10, 4.1.4 or 4.2.1 will reject the request with a RequestRejectedException if the presence of an encoded "/" is detected. Note: If you wish to disable this feature it can be disabled by setting the DefaultHttpFirewall.allowUrlEncodedSlash = true. However, disabling this feature will mean applications are vulnerable (in containers that return path parameters in getServletPath() or getPathInfo()). ## Credit The issue was identified by Shumpei Asahara & Yuji Ito from NTT DATA Corporation and responsibly reported to Pivotal.
{'CVE-2016-9879'}
2021-10-04T21:19:12Z
2020-09-15T20:30:34Z
HIGH
7.5
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-9879', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/advisories/GHSA-v35c-49j6-q8hq', 'https://pivotal.io/security/cve-2016-9879', 'http://www.securityfocus.com/bid/95142'}
null
GHSA
GHSA-5qx5-vg5w-5mx3
Stored XSS vulnerability in Jenkins Badge Plugin
Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-23108'}
2022-04-29T04:37:49Z
2022-01-13T00:00:54Z
MODERATE
0
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://github.com/advisories/GHSA-5qx5-vg5w-5mx3', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108'}
null
GHSA
GHSA-5v95-v8c8-3rh6
Privilege escalation in rbac
### Impact Using a carefully crafted request or malicious proxy, a user with `UserWrite` permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set of permissions. The event would be captured in the Event Log. ### Patches The issue has been fixed in 0.24.0 and 0.23.1. ### Workarounds For users who are unable to upgrade, we recommend auditing users who have `UserWrite` permissions and regularly reviewing the Event Log for malicious activity. ### Kudos Thank you to Michael Mazzolini (Ethical Hacker at WHO) for finding and disclosing this vulnerability.
{'CVE-2021-22538'}
2021-05-21T14:32:55Z
2021-05-21T14:32:55Z
HIGH
8.8
{'CWE-276'}
{'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0', 'https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95', 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1', 'https://github.com/google/exposure-notifications-verification-server/security/advisories/GHSA-5v95-v8c8-3rh6', 'https://github.com/advisories/GHSA-5v95-v8c8-3rh6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22538'}
null
GHSA
GHSA-j6w4-pg6p-5mrv
Directory Traversal in tmock
`tmock` is a static file server. `tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. Example Request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host: localhost ``` and server Response: ``` HTTP/1.1 200 OK Date: Thu, 04 May 2017 23:59:18 GMT Connection: keep-alive Transfer-Encoding: chunked {contents of /etc/passwd} ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16106'}
2021-01-08T18:36:36Z
2018-07-23T23:51:04Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/375', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock', 'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv', 'https://nodesecurity.io/advisories/375', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106'}
null
GHSA
GHSA-7cj4-gj8m-m2f7
Authentication bypass in Apache Shiro
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
{'CVE-2020-17510'}
2021-08-31T21:06:40Z
2021-04-22T16:13:23Z
CRITICAL
9.8
{'CWE-287'}
{'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://github.com/advisories/GHSA-7cj4-gj8m-m2f7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E'}
null
GHSA
GHSA-6584-gfwm-3vc3
Malicious Package in budfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:54:03Z
2020-09-03T21:43:01Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-6584-gfwm-3vc3', 'https://www.npmjs.com/advisories/1233'}
null
GHSA
GHSA-54qq-9chj-rxhv
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability.
{'CVE-2022-0395'}
2022-02-10T22:25:23Z
2022-01-29T00:00:33Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/36abbd6e-239e-4739-8c77-ba212b946a4a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395', 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb', 'https://github.com/advisories/GHSA-54qq-9chj-rxhv'}
null
GHSA
GHSA-8phj-f9w2-cjcc
Arbitrary file reading vulnerability in Aim
### Impact A path traversal attack aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. Vulnerable code: https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16 ### Patches The vulnerability issue is resolved in Aim v3.1.0. ### References https://owasp.org/www-community/attacks/Path_Traversal
{'CVE-2021-43775'}
2022-04-19T19:03:15Z
2021-11-23T22:03:23Z
HIGH
8.6
{'CWE-22'}
{'https://github.com/aimhubio/aim/pull/1003', 'https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc', 'https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16', 'https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738', 'https://github.com/advisories/GHSA-8phj-f9w2-cjcc', 'https://github.com/aimhubio/aim/issues/999', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43775'}
null
GHSA
GHSA-x38q-xg2h-rxgx
Regular Expression Denial of Service in Leo Editor
Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
{'CVE-2020-23478'}
2021-09-30T18:35:49Z
2021-09-23T23:14:28Z
HIGH
7.5
{'CWE-697'}
{'https://github.com/leo-editor/leo-editor/issues/1597', 'https://github.com/advisories/GHSA-x38q-xg2h-rxgx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23478'}
null
GHSA
GHSA-jjp3-m93h-5jm4
Cross-site Scripting in microweber
Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12.
{'CVE-2022-0928'}
2022-03-24T23:19:36Z
2022-03-12T00:00:34Z
MODERATE
6.8
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928', 'https://github.com/advisories/GHSA-jjp3-m93h-5jm4', 'https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd'}
null
GHSA
GHSA-g4xp-36c3-f7mr
Hidden Directories Always Served in inert
Versions 1.1.1 and earlier of `inert` are vulnerable to an information leakage vulnerability which causes files in hidden directories to be served, even when showHidden is false. The inert directory handler always allows files in hidden directories to be served, even when `showHidden` is false. ## Recommendation Update to version >= 1.1.1.
{'CVE-2014-10068'}
2021-01-07T23:37:01Z
2020-08-31T22:47:41Z
MODERATE
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/14', 'https://github.com/hapijs/inert/commit/e8f99f94da4cb08e8032eda984761c3f111e3e82', 'https://github.com/hapijs/inert/pull/15', 'https://github.com/advisories/GHSA-g4xp-36c3-f7mr', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10068', 'https://nodesecurity.io/advisories/14'}
null
GHSA
GHSA-6j63-35hj-vmcg
Moderate severity vulnerability that affects mysql-binuuid-rails
mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default string escaping for affected database columns.
{'CVE-2018-18476'}
2021-09-02T16:27:55Z
2018-10-30T20:34:06Z
CRITICAL
9.8
{'CWE-89'}
{'https://gist.github.com/viraptor/881276ea61e8d56bac6e28454c79f1e6', 'https://github.com/nedap/mysql-binuuid-rails/pull/18', 'https://github.com/advisories/GHSA-6j63-35hj-vmcg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18476'}
null
GHSA
GHSA-43q8-3fv7-pr5x
Improper Validation of Integrity Check Value in TensorFlow
### Impact The implementation of [`tf.sparse.split`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_split_op.cc#L26-L102) does not fully validate the input arguments. Hence, a malicious user can trigger a denial of service via a segfault or a heap OOB read: ```python import tensorflow as tf data = tf.random.uniform([1, 32, 32], dtype=tf.float32) axis = [1, 2] x = tf.sparse.from_dense(data) result = tf.sparse.split(x,3, axis=axis) ``` The code assumes `axis` is a scalar. This is another instance of [TFSA-2021-190](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-190.md) (CVE-2021-41206). ### Patches We have patched the issue in GitHub commit [61bf91e768173b001d56923600b40d9a95a04ad5](https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5) (merging [#53695](https://github.com/tensorflow/tensorflow/pull/53695)). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported externally via a [GitHub issue](https://github.com/tensorflow/tensorflow/issues/53660).
null
2022-02-09T23:37:55Z
2022-02-09T23:37:55Z
HIGH
7
{'CWE-354'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x', 'https://github.com/advisories/GHSA-43q8-3fv7-pr5x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5', 'https://github.com/tensorflow/tensorflow/pull/53695'}
null
GHSA
GHSA-qc36-q22q-cjw3
SMTP command injection in lettre
### Impact Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP commands after it. ### Fix The flaw is fixed by correctly handling consecutive CRLF sequences. ### References * [RUSTSEC-2021-0069](https://rustsec.org/advisories/RUSTSEC-2021-0069.html)
{'CVE-2021-38189'}
2022-04-19T19:02:58Z
2021-07-12T17:03:27Z
CRITICAL
9.8
{'CWE-147'}
{'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce', 'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2', 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html', 'https://github.com/advisories/GHSA-qc36-q22q-cjw3'}
null
GHSA
GHSA-mpjm-v997-c4h4
Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API
### Impact This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases. All current stable versions of Electron are affected. ### Patches This was fixed with #30728, and the following Electron versions contain the fix: - 15.0.0-alpha.10 - 14.0.0 - 13.3.0 - 12.1.0 - 11.5.0 ### Workarounds If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit. Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event: ```js delete require('electron').nativeImage.createThumbnailFromPath ``` ### For more information If you have any questions or comments about this advisory, email us at [[email protected]](mailto:[email protected]).
{'CVE-2021-39184'}
2022-04-19T19:03:06Z
2021-10-12T21:59:13Z
MODERATE
6.8
{'CWE-668'}
{'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4', 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f', 'https://github.com/electron/electron/pull/30728', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39184', 'https://github.com/advisories/GHSA-mpjm-v997-c4h4'}
null
GHSA
GHSA-9wrv-g75h-8ccc
Improper Access Control in Shopware
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.
{'CVE-2022-24872'}
2022-05-04T03:52:20Z
2022-04-22T21:04:27Z
HIGH
8.1
{'CWE-732'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-9wrv-g75h-8ccc', 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc'}
null
GHSA
GHSA-3h87-v52r-p9rg
Out of bounds write in reorder
An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index has an out-of-bounds write if an iterator returns a len() that is too small.
{'CVE-2021-29941'}
2021-08-25T20:54:08Z
2021-08-25T20:54:08Z
HIGH
7.3
{'CWE-787'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0050.html', 'https://github.com/tiby312/reorder/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29941', 'https://github.com/advisories/GHSA-3h87-v52r-p9rg'}
null
GHSA
GHSA-j379-9jr9-w5cq
Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit
Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437.
{'CVE-2018-1000844'}
2021-09-14T18:15:57Z
2018-12-21T17:48:26Z
CRITICAL
9.1
{'CWE-611'}
{'https://github.com/square/retrofit/pull/2735', 'https://github.com/advisories/GHSA-j379-9jr9-w5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'}
null
GHSA
GHSA-4vhw-4rw7-jfpv
Path traversal in mozwire
An issue was discovered in the mozwire crate through 2020-08-18 for Rust. A ../ directory-traversal situation allows overwriting local files that have .conf at the end of the filename.
{'CVE-2020-35883'}
2021-08-25T20:49:02Z
2021-08-25T20:49:02Z
CRITICAL
9.1
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35883', 'https://github.com/advisories/GHSA-4vhw-4rw7-jfpv', 'https://rustsec.org/advisories/RUSTSEC-2020-0030.html', 'https://github.com/NilsIrl/MozWire/issues/14'}
null
GHSA
GHSA-rgh3-987h-wpmw
XML External Entity Injection in XStream
Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document.
{'CVE-2016-3674'}
2021-09-22T18:47:03Z
2020-06-30T22:48:14Z
HIGH
7.5
{'CWE-200'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183180.html', 'http://www.openwall.com/lists/oss-security/2016/03/25/8', 'http://www.openwall.com/lists/oss-security/2016/03/28/1', 'https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385', 'http://rhn.redhat.com/errata/RHSA-2016-2823.html', 'http://www.securitytracker.com/id/1036419', 'https://github.com/advisories/GHSA-rgh3-987h-wpmw', 'http://www.securityfocus.com/bid/85381', 'http://rhn.redhat.com/errata/RHSA-2016-2822.html', 'https://github.com/x-stream/xstream/issues/25', 'http://x-stream.github.io/changes.html#1.4.9', 'http://www.debian.org/security/2016/dsa-3575', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3674', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183208.html'}
null
GHSA
GHSA-qrqm-fpv6-6r8g
Command Injection Vulnerability in Mechanize
This security advisory has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA). ### Impact Mechanize `>= v2.0`, `< v2.7.7` allows for OS commands to be injected using several classes' methods which implicitly use Ruby's `Kernel.open` method. Exploitation is possible only if untrusted input is used as a local filename and passed to any of these calls: - `Mechanize::CookieJar#load`: since v2.0 (see 208e3ed) - `Mechanize::CookieJar#save_as`: since v2.0 (see 5b776a4) - `Mechanize#download`: since v2.2 (see dc91667) - `Mechanize::Download#save` and `#save!` since v2.1 (see 98b2f51, bd62ff0) - `Mechanize::File#save` and `#save_as`: since v2.1 (see 2bf7519) - `Mechanize::FileResponse#read_body`: since v2.0 (see 01039f5) ### Patches These vulnerabilities are patched in Mechanize v2.7.7. ### Workarounds No workarounds are available. We recommend upgrading to v2.7.7 or later. ### References See https://docs.rubocop.org/rubocop/cops_security.html#securityopen for background on why `Kernel.open` should not be used with untrusted input. ### For more information If you have any questions or comments about this advisory, please open an issue in [sparklemotion/mechanize](https://github.com/sparklemotion/mechanize/issues/new).
{'CVE-2021-21289'}
2022-04-27T20:24:22Z
2021-02-02T18:50:27Z
HIGH
7.4
{'CWE-78'}
{'https://security.gentoo.org/glsa/202107-17', 'https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21289', 'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0', 'https://github.com/sparklemotion/mechanize/security/advisories/GHSA-qrqm-fpv6-6r8g', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/LBVVJUL4P4KCJH4IQTHFZ4ATXY7XXZPV/', 'https://rubygems.org/gems/mechanize/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YNFZ7ROYS6V4J5L5PRAJUG2AWC7VXR2V/', 'https://lists.debian.org/debian-lts-announce/2021/02/msg00021.html', 'https://github.com/advisories/GHSA-qrqm-fpv6-6r8g'}
null
GHSA
GHSA-w32p-76xr-88pc
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-2019-1051, CVE-2019-1052.
{'CVE-2019-1003'}
2021-03-29T20:59:06Z
2021-03-29T20:59:06Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-w32p-76xr-88pc', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraCore/commit/90f67afac6362828c750f3bccbcc1c360caf29e4'}
null
GHSA
GHSA-c6pw-q7f2-97hv
Privilege Escalation in cordova-plugin-inappbrowser
Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package. ## Recommendation Upgrade to version 3.1.0 or later.
{'CVE-2019-0219'}
2022-02-23T22:12:28Z
2020-09-04T17:57:43Z
CRITICAL
9.8
{'CWE-79'}
{'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/11/28/1', 'https://www.npmjs.com/advisories/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219', 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj', 'https://github.com/advisories/GHSA-c6pw-q7f2-97hv', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
GHSA
GHSA-wr5r-m8pc-85j9
Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml
Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
{'CVE-2019-3772'}
2021-01-08T21:17:22Z
2019-01-25T16:18:49Z
LOW
0
{'CWE-611'}
{'http://www.securityfocus.com/bid/106749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://pivotal.io/security/cve-2019-3772', 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'}
null
GHSA
GHSA-c6fg-99pr-25m9
Uncapped length of skin data fields submitted by players
### Impact Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave. This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an exception will be thrown during data saving, which will cause the server to crash. Other fields (such as skinGeometryData) are also uncapped, but those have a much larger 2 GB length limit, so this is not a concern for those, particularly considering the decompressed packet size limit of 2 MB. ### Patches PM3: 958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb PM4: 6492cac5c10f9fa8443ceddd2191a7b65b73f601 ### Workarounds A plugin may check player skins during `PlayerLoginEvent` and `PlayerSkinChangeEvent` and ensure that the offending fields are not larger than 32767 bytes. ### For more information If you have any questions or comments about this advisory: * Email us at [[email protected]](mailto:[email protected])
null
2022-01-06T23:53:58Z
2022-01-06T23:53:58Z
HIGH
7.5
null
{'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb', 'https://github.com/advisories/GHSA-c6fg-99pr-25m9'}
null
GHSA
GHSA-g644-6fg4-hrh9
Out-of-bounds write in ChakraCore
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
{'CVE-2020-0830'}
2021-07-28T18:57:47Z
2021-07-28T18:57:47Z
HIGH
7.5
{'CWE-787'}
{'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830', 'https://github.com/advisories/GHSA-g644-6fg4-hrh9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0830'}
null
GHSA
GHSA-54fx-gm74-q676
Permissions bypass in SmallRye
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2
{'CVE-2020-1729'}
2022-03-21T20:50:43Z
2022-03-18T17:55:47Z
MODERATE
4
{'CWE-863'}
{'https://github.com/advisories/GHSA-54fx-gm74-q676', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729', 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444'}
null
GHSA
GHSA-4r8q-gv9j-3xx6
Open Redirect
### Impact In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL. This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `true` (default: `false`) ### Patches Version 5.7.2 contains the relevant patches to fix this bug. Stripping the URL from special characters to prevent specially crafted URL's from being redirected to. ### Workarounds There is a simple way to work around the security issue - Set the `force_https` to every tenant to `false` ### References https://nvd.nist.gov/vuln/detail/CVE-2018-11784 ### For more information If you have any questions or comments about this advisory: * Contact us in Discord: https://tenancy.dev/chat
{'CVE-2021-32645'}
2022-03-21T20:46:04Z
2022-03-18T17:55:07Z
MODERATE
4.3
{'CWE-601'}
{'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/advisories/GHSA-4r8q-gv9j-3xx6', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}
null
GHSA
GHSA-pc5p-h8pf-mvwp
Machine-In-The-Middle in https-proxy-agent
Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials. ## Recommendation Upgrade to version 3.0.0 or 2.2.3.
null
2021-08-23T15:27:25Z
2020-04-16T03:14:56Z
MODERATE
6.1
{'CWE-300'}
{'https://hackerone.com/reports/541502', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://www.npmjs.com/advisories/1184', 'https://github.com/advisories/GHSA-pc5p-h8pf-mvwp', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'}
null
GHSA
GHSA-cvhw-2593-5j2q
Double Free in OpenCV
OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV-Python and and OpenCV-Contrib-Python 3.3.1.11).
{'CVE-2016-1516'}
2021-11-18T15:34:34Z
2021-10-12T22:00:08Z
HIGH
8.8
{'CWE-415'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1516', 'https://arxiv.org/pdf/1701.04739.pdf', 'https://github.com/opencv/opencv/issues/5956', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.html', 'https://github.com/advisories/GHSA-cvhw-2593-5j2q'}
null
GHSA
GHSA-8jxq-75rw-fhj9
Eve allows execution of arbitrary code via Code Injection in the where parameter
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
{'CVE-2018-8097'}
2022-04-26T18:10:00Z
2018-07-12T20:29:35Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/advisories/GHSA-8jxq-75rw-fhj9', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8097'}
null
GHSA
GHSA-j29f-m23h-3p8p
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0911'}
2022-03-29T21:29:56Z
2022-03-17T00:00:48Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0911', 'https://github.com/advisories/GHSA-j29f-m23h-3p8p', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447'}
null
GHSA
GHSA-9988-f88m-mr42
Exposure of Sensitive Information to an Unauthorized Actor in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys.
{'CVE-2022-25512'}
2022-03-28T22:34:41Z
2022-03-12T00:00:37Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/FreeTAKTeam/UI/issues/26', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25512', 'https://github.com/advisories/GHSA-9988-f88m-mr42'}
null
GHSA
GHSA-7xrj-f5rp-j55h
Uncontrolled Resource Consumption in transpile
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
{'CVE-2021-23429'}
2021-09-02T17:10:42Z
2021-09-02T17:10:42Z
MODERATE
6.5
{'CWE-400', 'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23429', 'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774', 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53', 'https://github.com/advisories/GHSA-7xrj-f5rp-j55h'}
null
GHSA
GHSA-3p3h-qghp-hvh2
Open Redirect in werkzeug
Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL.
{'CVE-2020-28724'}
2021-04-20T16:30:26Z
2021-04-20T16:30:26Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/pallets/werkzeug/pull/890/files', 'https://github.com/advisories/GHSA-3p3h-qghp-hvh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28724', 'https://github.com/pallets/werkzeug/issues/822', 'https://github.com/pallets/flask/issues/1639'}
null
GHSA
GHSA-4c7m-wxvm-r7gc
Improper parsing of octal bytes in netmask
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts. :exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.
{'CVE-2021-28918'}
2022-04-01T20:21:55Z
2021-04-14T15:03:16Z
CRITICAL
9.1
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28918', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://github.com/advisories/GHSA-4c7m-wxvm-r7gc', 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/', 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/', 'https://security.netapp.com/advisory/ntap-20210528-0010/', 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md', 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021', 'https://www.npmjs.com/package/netmask'}
null
GHSA
GHSA-779f-wgxg-qr8f
Prototype Pollution in lodash.mergewith
Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.2 or later.
null
2021-09-29T14:58:42Z
2020-09-03T18:10:22Z
HIGH
0
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1071', 'https://github.com/advisories/GHSA-779f-wgxg-qr8f'}
null
GHSA
GHSA-xqvg-xm9m-p2c4
Moderate severity vulnerability that affects mailman
An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.
{'CVE-2018-13796'}
2021-09-22T16:31:46Z
2018-09-11T18:57:16Z
MODERATE
6.5
{'CWE-20'}
{'https://bugs.launchpad.net/mailman/+bug/1780874', 'https://security.gentoo.org/glsa/201904-10', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13796', 'https://usn.ubuntu.com/4348-1/', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html', 'https://www.mail-archive.com/[email protected]/msg71003.html', 'https://github.com/advisories/GHSA-xqvg-xm9m-p2c4'}
null
GHSA
GHSA-52p9-v744-mwjj
Remote code execution in Kramdown
Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.
{'CVE-2021-28834'}
2021-04-14T18:12:09Z
2021-03-29T16:30:34Z
HIGH
9.8
{'CWE-94'}
{'https://github.com/gettalong/kramdown/pull/708', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834', 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://www.debian.org/security/2021/dsa-4890', 'https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-released/#remote-code-execution-via-unsafe-user-controlled-markdown-rendering-options', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SYOLQKFL6IJCQLBXV34Z4TI4O54GESPR/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/S3BBLUIDCUUR3NEE4NJLOCCAV3ALQ3O6/', 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1', 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/NJCJVYHPY6LNUFM6LYZIAUIYOMVT5QGV/', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://github.com/advisories/GHSA-52p9-v744-mwjj'}
null
GHSA
GHSA-28hp-fgcr-2r4h
Cross-Site Scripting via JSONP
JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.
null
2021-08-17T15:35:31Z
2019-06-27T17:25:42Z
MODERATE
0
{'CWE-79'}
{'https://www.npmjs.com/advisories/1630', 'https://github.com/advisories/GHSA-28hp-fgcr-2r4h', 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'}
null
GHSA
GHSA-3r8w-mphv-2f3f
Prototype Pollution
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
{'CVE-2021-23396'}
2021-06-21T17:12:25Z
2021-06-21T17:12:25Z
MODERATE
5.6
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396', 'https://github.com/advisories/GHSA-3r8w-mphv-2f3f'}
null
GHSA
GHSA-mgr2-3mpv-43gc
Downloads Resources over HTTP in openframe-image
Affected versions of `openframe-image` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10616'}
2021-09-16T20:55:30Z
2019-02-18T23:47:37Z
HIGH
0
{'CWE-311', 'CWE-269'}
{'https://nodesecurity.io/advisories/218', 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc', 'https://www.npmjs.com/advisories/218', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616'}
null
GHSA
GHSA-rww7-2gpw-fv6j
Crash when type cannot be specialized in Tensorflow
### Impact Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174): ```cc void InferenceContext::PreInputInit( const OpDef& op_def, const std::vector<const Tensor*>& input_tensors, const std::vector<ShapeHandle>& input_tensors_as_shapes) { const auto ret = full_type::SpecializeType(attrs_, op_def); DCHECK(ret.status().ok()) << "while instantiating types: " << ret.status(); ret_types_ = ret.ValueOrDie(); // ... } ``` However, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case we also get a crash due to the assertion failure. ### Patches We have patched the issue in GitHub commit [cb164786dc891ea11d3a900e90367c339305dc7b](https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, and TensorFlow 2.6.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23572'}
2022-02-11T20:48:06Z
2022-02-09T23:28:29Z
MODERATE
6.5
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j', 'https://github.com/advisories/GHSA-rww7-2gpw-fv6j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572', 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174'}
null
GHSA
GHSA-pwwm-pwx2-2hw7
Generation of Error Message Containing Sensitive Information in Snipe-IT
Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information.
{'CVE-2022-0622'}
2022-02-26T01:13:46Z
2022-02-18T00:00:37Z
MODERATE
5.3
{'CWE-209'}
{'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/advisories/GHSA-pwwm-pwx2-2hw7'}
null
GHSA
GHSA-r659-8xfp-j327
Prototype Pollution in objection.js
objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16.
{'CVE-2021-3766'}
2021-10-08T20:12:34Z
2021-09-07T23:09:43Z
CRITICAL
9.8
{'CWE-1321', 'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/advisories/GHSA-r659-8xfp-j327', 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc'}
null
GHSA
GHSA-773h-w45w-f2f9
Denial of service vulnerability exists in libxmljs
libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash.
{'CVE-2022-21144'}
2022-05-04T14:48:04Z
2022-05-03T00:00:46Z
HIGH
0
{'CWE-400'}
{'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://github.com/libxmljs/libxmljs/pull/594', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/advisories/GHSA-773h-w45w-f2f9', 'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756'}
null
GHSA
GHSA-6gww-qpm6-mc2g
Server-Side Request Forgery in ssrf-agent
The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.
{'CVE-2021-23718'}
2021-12-06T21:36:54Z
2021-12-02T17:51:51Z
MODERATE
6.5
{'CWE-918'}
{'https://github.com/advisories/GHSA-6gww-qpm6-mc2g', 'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362', 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718', 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'}
null
GHSA
GHSA-gfj6-p24g-6hpm
Malicious Package in jc-sha3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-30T16:35:08Z
2020-09-03T22:55:06Z
CRITICAL
9.8
{'CWE-506'}
{'https://github.com/advisories/GHSA-gfj6-p24g-6hpm', 'https://www.npmjs.com/advisories/1277'}
null
GHSA
GHSA-h9v8-rm3m-5h5f
OS Command Injection in git-add-remote
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.
{'CVE-2020-7630'}
2022-02-10T23:47:47Z
2022-02-10T23:47:47Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7630', 'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269', 'https://github.com/advisories/GHSA-h9v8-rm3m-5h5f', 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,'}
null
GHSA
GHSA-j4mv-2rv7-v2j9
Improper Privilege Management in Concrete CMS
Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a group to be moved.
{'CVE-2021-22966'}
2021-11-23T18:18:07Z
2021-11-23T18:18:07Z
MODERATE
0
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22966', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes', 'https://hackerone.com/reports/1362747', 'https://github.com/advisories/GHSA-j4mv-2rv7-v2j9'}
null
GHSA
GHSA-hf4p-jm7r-vjjj
Deserialization of Untrusted Data in EthereumJ
An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.
{'CVE-2018-15890'}
2021-08-17T19:40:01Z
2019-07-26T16:10:39Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/ethereum/ethereumj', 'https://github.com/advisories/GHSA-hf4p-jm7r-vjjj', 'https://github.com/ethereum/ethereumj/issues/1161', 'https://github.com/frohoff/ysoserial/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'}
null
GHSA
GHSA-q67f-3jq4-mww2
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
{'CVE-2022-0831'}
2022-03-11T23:22:38Z
2022-03-05T00:00:45Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-q67f-3jq4-mww2', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'}
null
GHSA
GHSA-9423-6c93-gpp8
Arbitrary File Write via Archive Extraction (Zip Slip)
The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released.
{'CVE-2020-7667'}
2022-01-04T19:27:35Z
2021-06-23T17:13:29Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667', 'https://github.com/advisories/GHSA-9423-6c93-gpp8', 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'}
null
GHSA
GHSA-hfm2-fffh-v47v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197.
{'CVE-2019-1196'}
2021-03-29T20:58:01Z
2021-03-29T20:58:01Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://github.com/advisories/GHSA-hfm2-fffh-v47v', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
null
GHSA
GHSA-96qc-ghj4-rq27
Directory Traversal in yttivy
Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16219'}
2021-01-14T15:40:24Z
2020-09-01T18:24:56Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/441', 'https://github.com/advisories/GHSA-96qc-ghj4-rq27', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy', 'https://nodesecurity.io/advisories/441', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219'}
null
GHSA
GHSA-wj36-v8j4-pc7c
Low severity vulnerability that affects express-cart
A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators.
{'CVE-2018-16483'}
2021-09-21T21:12:02Z
2019-02-07T18:16:03Z
HIGH
8.8
{'CWE-290'}
{'https://hackerone.com/reports/343626', 'https://github.com/advisories/GHSA-wj36-v8j4-pc7c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'}
null
GHSA
GHSA-vqmr-957g-r7w3
High severity vulnerability that affects rendertron
Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files.
{'CVE-2017-18355'}
2021-09-20T22:15:16Z
2019-02-12T15:36:39Z
HIGH
7.5
{'CWE-200'}
{'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355'}
null
GHSA
GHSA-9h6g-6mxg-vvp4
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. - https://vaadin.com/security/cve-2021-31406
null
2022-04-19T19:02:54Z
2021-04-19T14:47:18Z
MODERATE
4
{'CWE-208'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4', 'https://github.com/advisories/GHSA-9h6g-6mxg-vvp4', 'https://vaadin.com/security/cve-2021-31406'}
null
GHSA
GHSA-hh56-x62g-gvhc
Cross-site scripting in CLEditor
Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element.
{'CVE-2019-1010113'}
2021-08-17T19:05:00Z
2019-07-26T16:10:06Z
MODERATE
6.1
{'CWE-79'}
{'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113', 'https://github.com/advisories/GHSA-hh56-x62g-gvhc'}
null
GHSA
GHSA-vm6v-w6q2-mrrq
Malicious Package in bb-builder
All versions of `bb-builder` contained malicious code. The package ran an executable targeting Windows and uploaded information to a remote server. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T20:09:25Z
2020-09-03T19:20:05Z
CRITICAL
9.8
{'CWE-506'}
{'https://www.npmjs.com/advisories/1119', 'https://github.com/advisories/GHSA-vm6v-w6q2-mrrq'}
null
GHSA
GHSA-m362-87jc-f39v
Directory Traversal in uv-tj-demo
Affected versions of `uv-tj-demo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16200'}
2021-01-14T15:41:37Z
2020-09-01T18:16:24Z
HIGH
0
{'CWE-22'}
{'https://nodesecurity.io/advisories/428', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16200', 'https://www.npmjs.com/advisories/428', 'https://github.com/advisories/GHSA-m362-87jc-f39v', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo'}
null
GHSA
GHSA-qmmc-jppf-32wv
Directory Traversal in Docker
Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
{'CVE-2014-9358'}
2022-02-15T00:41:14Z
2022-02-15T00:41:14Z
MODERATE
6.5
{'CWE-59'}
{'http://www.securityfocus.com/archive/1/534215/100/0/threaded', 'https://github.com/advisories/GHSA-qmmc-jppf-32wv', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9358', 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9358', 'https://access.redhat.com/security/cve/cve-2014-9358', 'https://groups.google.com/forum/#%21msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'}
null
GHSA
GHSA-mxv6-q98x-h958
Data races in model
`Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type. This allows safe Rust code to trigger a data race, which is undefined behavior in Rust. Users are advised to treat `Shared` as an unsafe type. It should not be used outside of the testing context, and care must be taken so that the testing code does not have a data race besides a race condition that is expected to be caught by the test.
{'CVE-2020-36460'}
2021-08-25T20:56:07Z
2021-08-25T20:56:07Z
HIGH
8.1
{'CWE-362', 'CWE-843'}
{'https://github.com/advisories/GHSA-mxv6-q98x-h958', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36460', 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html', 'https://github.com/spacejam/model/issues/3'}
null
GHSA
GHSA-xjjg-vmw6-c2p9
Open Redirect in httpie
All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.
{'CVE-2019-10751'}
2021-08-17T22:17:52Z
2019-08-27T17:44:33Z
HIGH
8.8
{'CWE-601'}
{'https://github.com/advisories/GHSA-xjjg-vmw6-c2p9', 'https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10751'}
null
GHSA
GHSA-82gw-pqf7-q3j2
High severity vulnerability that affects pym.js
NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function. https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 that can result in Arbitrary javascript code execution. This attack appear to be exploitable via Attacker gains full javascript access to pages with Pym.js embeds when user visits an attacker crafted page.. This vulnerability appears to have been fixed in versions 1.3.2 and later.
{'CVE-2018-1000086'}
2021-09-03T21:50:02Z
2018-03-13T20:38:51Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/advisories/GHSA-82gw-pqf7-q3j2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086', 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html', 'https://github.com/nprapps/pym.js', 'https://github.com/nprapps/pym.js/issues/170'}
null
GHSA
GHSA-c8cc-p3j7-4c7f
Moderate severity vulnerability that affects org.apache.mesos:mesos
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.
{'CVE-2018-8023'}
2021-09-08T21:43:34Z
2018-10-17T19:54:14Z
MODERATE
5.9
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-8023', 'https://github.com/advisories/GHSA-c8cc-p3j7-4c7f', 'https://lists.apache.org/thread.html/r0dd7ff197b2e3bdd80a0326587ca3d0c22e10d1dba17c769d6da7d7a@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/9b9d3f6bd09f3ebd2284b82077033bdc71da550a1c4c010c2494acc3@%3Cdev.mesos.apache.org%3E'}
null
GHSA
GHSA-g996-q5r8-w7g2
Escape validation messages in the PHP templating engine
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.
{'CVE-2019-10909'}
2021-08-18T22:15:16Z
2019-11-12T23:00:53Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://www.drupal.org/sa-core-2019-005', 'https://github.com/advisories/GHSA-g996-q5r8-w7g2', 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909', 'https://symfony.com/cve-2019-10909', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}
null
GHSA
GHSA-jjpq-gp5q-8q6w
Cross-site scripting in Apache Tomcat
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
{'CVE-2019-0221'}
2021-07-14T19:43:47Z
2019-05-30T03:30:42Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/[email protected]/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://usn.ubuntu.com/4128-2/', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/', 'https://usn.ubuntu.com/4128-1/', 'http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html', 'http://seclists.org/fulldisclosure/2019/May/50', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html', 'https://security.gentoo.org/glsa/202003-43', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/108545', 'https://support.f5.com/csp/article/K13184144?utm_source=f5support&amp;utm_medium=RSS', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://github.com/advisories/GHSA-jjpq-gp5q-8q6w', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://security.netapp.com/advisory/ntap-20190606-0001/', 'https://seclists.org/bugtraq/2019/Dec/43'}
null
GHSA
GHSA-wcv5-qrj6-9pfm
Heap buffer overflow in `Conv3DBackprop*`
### Impact Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows: ```python import tensorflow as tf input_sizes = tf.constant([1, 1, 1, 1, 2], shape=[5], dtype=tf.int32) filter_tensor = tf.constant([734.6274508233133, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[4, 1, 6, 1, 1], dtype=tf.float32) out_backprop = tf.constant([-10.0], shape=[1, 1, 1, 1, 1], dtype=tf.float32) tf.raw_ops.Conv3DBackpropInputV2(input_sizes=input_sizes, filter=filter_tensor, out_backprop=out_backprop, strides=[1, 89, 29, 89, 1], padding='SAME', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` ```python import tensorflow as tf input_values = [-10.0] * (7 * 7 * 7 * 7 * 7) input_values[0] = 429.6491056791816 input_sizes = tf.constant(input_values, shape=[7, 7, 7, 7, 7], dtype=tf.float32) filter_tensor = tf.constant([7, 7, 7, 1, 1], shape=[5], dtype=tf.int32) out_backprop = tf.constant([-10.0, -10.0, -10.0, -10.0, -10.0, -10.0, -10.0], shape=[7, 1, 1, 1, 1], dtype=tf.float32) tf.raw_ops.Conv3DBackpropFilterV2(input=input_sizes, filter_sizes=filter_tensor, out_backprop=out_backprop, strides=[1, 37, 65, 93, 1], padding='VALID', data_format='NDHWC', dilations=[1, 1, 1, 1, 1]) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/4814fafb0ca6b5ab58a09411523b2193fed23fed/tensorflow/core/kernels/conv_grad_shape_utils.cc#L94-L153) assumes that the `input`, `filter_sizes` and `out_backprop` tensors have the same shape, as they are accessed in parallel. ### Patches We have patched the issue in GitHub commit [8f37b52e1320d8d72a9529b2468277791a261197](https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our securityguide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29520'}
2022-04-26T18:10:21Z
2021-05-21T14:21:12Z
LOW
2.5
{'CWE-787', 'CWE-120'}
{'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29520', 'https://github.com/advisories/GHSA-wcv5-qrj6-9pfm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm'}
null
GHSA
GHSA-xv6v-72hh-g6g2
Moderate severity vulnerability that affects org.owasp.antisamy:antisamy
OWASP OWASP ANTISAMY version 1.5.7 and earlier contains a Cross Site Scripting (XSS) vulnerability in AntiSamy.scan() - for both SAX & DOM that can result in Cross Site Scripting.
{'CVE-2018-1000643'}
2021-12-03T14:28:42Z
2018-10-18T17:22:26Z
MODERATE
0
null
{'https://github.com/advisories/GHSA-xv6v-72hh-g6g2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000643'}
null
GHSA
GHSA-4c7h-f2j9-9c46
Missing permission Phoenix AutoTest Plugin
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
{'CVE-2022-28158'}
2022-04-05T21:21:07Z
2022-03-30T00:00:21Z
MODERATE
6.5
{'CWE-862'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685', 'https://github.com/advisories/GHSA-4c7h-f2j9-9c46', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'}
null
GHSA
GHSA-m6f7-46hw-grcj
Critical severity vulnerability that affects cremefraiche
The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information.
{'CVE-2013-2090'}
2021-09-14T22:13:34Z
2017-10-24T18:33:37Z
CRITICAL
0
{'CWE-78'}
{'http://secunia.com/advisories/53391', 'http://osvdb.org/93395', 'https://github.com/advisories/GHSA-m6f7-46hw-grcj', 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html', 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html', 'https://nvd.nist.gov/vuln/detail/CVE-2013-2090', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/84271'}
null
GHSA
GHSA-gw5h-h6hj-f56g
Improper Authorization in Gogs
### Impact Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected. ### Patches Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.13.0+dev. ### Workarounds In addition to marking PAM accounts as expired, also disable/lock them. Running `usermod -L <username>` will add an exclamation mark to the password hash and would result in wrong passwords responses when trying to login. ### References https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62/ ### For more information If you have any questions or comments about this advisory, please post on https://github.com/gogs/gogs/issues/6810.
null
2022-04-19T19:03:27Z
2022-03-14T22:58:37Z
HIGH
8.2
{'CWE-285'}
{'https://github.com/advisories/GHSA-gw5h-h6hj-f56g', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g', 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62'}
null
GHSA
GHSA-frqg-7g38-6gcf
Improper escaping of command arguments on Windows leading to command injection
### Impact Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected. ### Patches 1.10.23 and 2.1.9 fix the issue ### Workarounds None
{'CVE-2021-41116'}
2022-04-22T15:41:33Z
2021-10-05T20:23:18Z
HIGH
8.2
{'CWE-77'}
{'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-frqg-7g38-6gcf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'}
null
GHSA
GHSA-rp63-jfmw-532w
High severity vulnerability that affects mail
The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
{'CVE-2012-2140'}
2021-09-17T19:22:25Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-20'}
{'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140', 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'http://secunia.com/advisories/48970', 'https://github.com/advisories/GHSA-rp63-jfmw-532w', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080648.html', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'http://www.openwall.com/lists/oss-security/2012/04/26/1', 'https://bugzilla.redhat.com/show_bug.cgi?id=816352', 'http://www.openwall.com/lists/oss-security/2012/04/25/8', 'https://bugzilla.novell.com/show_bug.cgi?id=759092', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html'}
null
GHSA
GHSA-c5hm-xc74-pqrg
OS Command Injection in jscover
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.
{'CVE-2020-7623'}
2022-02-10T23:37:22Z
2022-02-10T23:37:22Z
CRITICAL
9.8
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623', 'https://github.com/advisories/GHSA-c5hm-xc74-pqrg', 'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,'}
null
GHSA
GHSA-hjgp-8ffr-hwwr
Downloads Resources over HTTP in closurecompiler
Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closurecompiler`. ## Recommendation Update to version 1.6.1 or later.
{'CVE-2016-10582'}
2021-01-08T18:40:46Z
2019-02-18T23:51:19Z
HIGH
0
{'CWE-311'}
{'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://www.npmjs.com/advisories/169', 'https://nodesecurity.io/advisories/169'}
null
GHSA
GHSA-49qr-xh3w-h436
Moderate severity vulnerability that affects notebook
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPostHandler do not set a Content Security Policy to prevent this.
{'CVE-2018-19351'}
2021-09-01T14:11:52Z
2018-11-21T22:15:47Z
MODERATE
6.1
{'CWE-79'}
{'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/advisories/GHSA-49qr-xh3w-h436', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351', 'https://pypi.org/project/notebook/#history', 'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'}
null
GHSA
GHSA-gr4c-5rq6-cgh3
OPC UA applications can allow a remote attacker to determine a Server's private key
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack.
{'CVE-2018-7559'}
2022-04-26T19:12:43Z
2018-10-16T19:58:42Z
MODERATE
5.3
null
{'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7559', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf', 'https://github.com/advisories/GHSA-gr4c-5rq6-cgh3', 'http://www.securityfocus.com/bid/108688', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150'}
null
GHSA
GHSA-vjg4-v33c-ggc4
Out of bounds read in Tensorflow
### Impact The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap: ```python import tensorflow as tf @tf.function def test(): y = tf.raw_ops.FractionalAvgPoolGrad( orig_input_tensor_shape=[2,2,2,2], out_backprop=[[[[1,2], [3, 4], [5, 6]], [[7, 8], [9,10], [11,12]]]], row_pooling_sequence=[-10,1,2,3], col_pooling_sequence=[1,2,3,4], overlapping=True) return y test() ``` ### Patches We have patched the issue in GitHub commit [002408c3696b173863228223d535f9de72a101a9](https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yu Tian of Qihoo 360 AIVul Team.
{'CVE-2022-21730'}
2022-02-10T00:19:29Z
2022-02-09T18:29:45Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360', 'https://github.com/advisories/GHSA-vjg4-v33c-ggc4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21730', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4', 'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'}
null
GHSA
GHSA-fvgf-6h6h-3322
Improper Limitation of a Pathname to a Restricted Directory
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
{'CVE-2021-3281'}
2021-09-28T20:55:35Z
2021-03-18T20:29:49Z
MODERATE
5.3
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3281', 'https://docs.djangoproject.com/en/3.1/releases/3.0.12/', 'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://security.netapp.com/advisory/ntap-20210226-0004/', 'https://github.com/advisories/GHSA-fvgf-6h6h-3322', 'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/', 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/', 'https://groups.google.com/forum/#!forum/django-announce'}
null
GHSA
GHSA-8434-v7xw-8m9x
Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks
APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside application manifest. ### Impact An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended behavior through malicious package name. ### Patches The problem is fixed in version v2.0.4 and above. ### Workarounds ```bash > git fetch --tags; git checkout v2.0.6-dev ``` Or pull to the latest version: ```bash > git pull origin master ``` ### References - a966e781499ff6fd4eea66876d7532301b13a382 ### For more information If you have any questions or comments about this advisory: * Email me at [[email protected]](mailto:[email protected])
{'CVE-2021-21386'}
2022-04-19T19:02:50Z
2022-01-21T23:03:39Z
CRITICAL
9.3
{'CWE-88', 'CWE-78'}
{'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386', 'https://github.com/advisories/GHSA-8434-v7xw-8m9x', 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'}
null
GHSA
GHSA-v6wp-4m6f-gcjg
Open redirect vulnerability in `aiohttp` (`normalize_path_middleware` middleware)
### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. ### Patches _Has the problem been patched? What versions should users upgrade to?_ This security problem has been fixed in v3.7.4. Upgrade your dependency as follows: [`pip install aiohttp >= 3.7.4`] ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ If upgrading is not an option for you, a workaround can be to avoid using `aiohttp.web_middlewares.normalize_path_middleware` in your applications. ### References _Are there any links users can visit to find out more?_ * [aiohttp @ PyPI] * [GHSA-v6wp-4m6f-gcjg] * [OWASP page on open redirects] ### For more information If you have any questions or comments about this advisory: * Open an issue in the [aiohttp repo](https://github.com/aio-libs/aiohttp/issues/new/choose) * Email us at [email protected] and/or [email protected] Credit: [Jelmer Vernooij] and [Beast Glatisant]. [aiohttp @ PyPI]: https://pypi.org/p/aiohttp [`pip install aiohttp >= 3.7.4`]: https://pypi.org/project/aiohttp/3.7.4/ [GHSA-v6wp-4m6f-gcjg]: https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg [OWASP page on open redirects]: https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html [Jelmer Vernooij]: https://jelmer.uk [Beast Glatisant]: https://github.com/g147
{'CVE-2021-21330'}
2022-04-19T19:02:48Z
2021-02-26T02:11:57Z
LOW
3.1
{'CWE-601'}
{'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b', 'https://github.com/aio-libs/aiohttp/blob/master/CHANGES.rst#374-2021-02-25', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/', 'https://www.debian.org/security/2021/dsa-4864', 'https://github.com/aio-libs/aiohttp/security/advisories/GHSA-v6wp-4m6f-gcjg', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FU7ENI54JNEK3PHEFGCE46DGMFNTVU6L/', 'https://github.com/advisories/GHSA-v6wp-4m6f-gcjg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21330', 'https://pypi.org/project/aiohttp/'}
null