ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-qr2j-wrhx-4829
Improper Input Validation
In Go Ethereum (aka geth) before 1.8.14, TraceChain in eth/api_tracer.go does not verify that the end block is after the start block.
{'CVE-2018-16733'}
2021-05-18T18:38:06Z
2021-05-18T18:38:06Z
MODERATE
7.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-qr2j-wrhx-4829', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16733', 'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'}
null
{'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'}
{'https://github.com/ethereum/go-ethereum/commit/106d196ec4a6451efedc60ab15957f231fa85639'}
GHSA
GHSA-qpg4-4w7w-2mq5
Authentication and extension bypass in Faye
On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1.2.5, which we are releasing today. The vulnerability allows any client to bypass checks put in place by server-side extensions, by appending extra segments to the message channel. For example, the Faye [extension docs][2] suggest that users implement access control for subscriptions by checking incoming messages for the `/meta/subscribe` channel, for example: ```js server.addExtension({ incoming: function(message, callback) { if (message.channel === '/meta/subscribe') { if (message.ext.authToken !== 'my super secret password') { message.error = 'Invalid auth token'; } } callback(message); } }); ``` A bug in the server's code for recognising the special `/meta/*` channels, which trigger connection and subscription events, means that a client can bypass this check by sending a message to `/meta/subscribe/x` rather than `/meta/subscribe`: ```json { "channel": "/meta/subscribe/x", "clientId": "3jrc6602npj4gyp6bn5ap2wqzjtb2q3", "subscription": "/foo" } ``` This message will not be checked by the above extension, as it checks the message's channel is exactly equal to `/meta/subscribe`. But it will still be processed as a subscription request by the server, so the client becomes subscribed to the channel `/foo` without supplying the necessary credentials. The vulnerability is caused by the way the Faye server recognises meta channels. It will treat a message to any channel that's a prefix-match for one of the special channels `/meta/handshake`, `/meta/connect`, `/meta/subscribe`, `/meta/unsubscribe` or `/meta/disconnect`, as though it were an exact match for that channel. So, a message to `/meta/subscribe/x` is still processed as a subscription request, for example. An authentication bypass for subscription requests is the most serious effect of this but all other meta channels are susceptible to similar manipulation. This parsing bug in the server is fixed in versions 1.0.4, 1.1.3 and 1.2.5. These should be drop-in replacements for prior versions and you should upgrade immediately if you are running any prior version. If you are unable to install one of these versions, you can make your extensions catch all messages the server would process by checking the channel _begins_ with the expected channel name, for example: ```js server.addExtension({ incoming: function(message, callback) { if (message.channel.startsWith('/meta/subscribe')) { // authentication logic } callback(message); } }); ``` [1]: https://faye.jcoglan.com/ [2]: https://faye.jcoglan.com/node/extensions.html
{'CVE-2020-11020'}
2021-01-08T20:21:05Z
2020-04-29T17:41:15Z
HIGH
8.5
{'CWE-287'}
{'https://github.com/advisories/GHSA-qpg4-4w7w-2mq5', 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020', 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5'}
null
{'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}
{'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}
GHSA
GHSA-h6q6-9hqw-rwfv
Misinterpretation of malicious XML input
### Impact xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted documents. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to 0.5.0 (once it is released) ### Workarounds Downstream applications can validate the input and reject the maliciously crafted documents. ### References Similar to this one reported on the Go standard library: - https://mattermost.com/blog/coordinated-disclosure-go-xml-vulnerabilities/ ### For more information If you have any questions or comments about this advisory: * Open an issue in [`xmldom/xmldom`](https://github.com/xmldom/xmldom) * Email us: send an email to **all** addresses that are shown by `npm owner ls xmldom`
{'CVE-2021-21366'}
2022-04-19T19:02:49Z
2021-03-12T22:39:39Z
LOW
0
{'CWE-115', 'CWE-436'}
{'https://www.npmjs.com/package/xmldom', 'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://github.com/advisories/GHSA-h6q6-9hqw-rwfv', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv'}
null
{'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'}
{'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'}
GHSA
GHSA-wmj9-xh24-j4gx
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
{'CVE-2022-0558'}
2022-02-23T21:58:40Z
2022-02-11T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d', 'https://github.com/advisories/GHSA-wmj9-xh24-j4gx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0558', 'https://huntr.dev/bounties/8fffc95f-14ae-457b-aecc-be4716a8b91c'}
null
{'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'}
{'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'}
GHSA
GHSA-mg5p-95m9-rmfp
Arbitrary file write in actionpack-page_caching gem
There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
{'CVE-2020-8159'}
2022-04-07T15:10:56Z
2020-05-13T16:28:46Z
CRITICAL
9.8
{'CWE-22'}
{'https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html', 'https://github.com/advisories/GHSA-mg5p-95m9-rmfp', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8159', 'https://groups.google.com/forum/#!topic/rubyonrails-security/CFRVkEytdP8', 'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
null
{'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
{'https://github.com/rails/actionpack-page_caching/commit/127da70a559bed4fc573fdb4a6d498a7d5815ce2'}
GHSA
GHSA-8c6g-4xc5-w96c
Uninitialized memory exposure in claxon
An issue was discovered in the claxon crate before 0.4.1 for Rust. Uninitialized memory can be exposed because certain decode buffer sizes are mishandled.
{'CVE-2018-20992'}
2021-08-25T20:43:52Z
2021-08-25T20:43:52Z
MODERATE
6.5
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20992', 'https://github.com/advisories/GHSA-8c6g-4xc5-w96c', 'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c', 'https://rustsec.org/advisories/RUSTSEC-2018-0004.html'}
null
{'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c'}
{'https://github.com/ruuda/claxon/commit/8f28ec275e412dd3af4f3cda460605512faf332c'}
GHSA
GHSA-pq37-4c4g-v38c
Cross-site Scripting in vditor
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
{'CVE-2022-0341'}
2022-03-23T15:36:26Z
2022-03-15T00:01:02Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5', 'https://github.com/advisories/GHSA-pq37-4c4g-v38c', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/Vanessa219/vditor/issues/1102'}
null
{'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}
{'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}
GHSA
GHSA-qf8x-vqjv-92gr
Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter
Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading it.
{'CVE-2022-24901'}
2022-05-07T01:48:25Z
2022-05-04T18:59:46Z
HIGH
7.5
{'CWE-287', 'CWE-295'}
{'https://github.com/advisories/GHSA-qf8x-vqjv-92gr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}
null
{'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}
{'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}
GHSA
GHSA-j57w-3c39-gpp5
Improper Privilege Management in Snipe-IT
An unprivileged user of Snipe-IT prior to version 5.3.11 can create maintenance for an asset. Version 5.3.11 contains a patch for this issue.
{'CVE-2022-0611'}
2022-02-26T00:58:12Z
2022-02-17T00:00:35Z
HIGH
8.8
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0611', 'https://github.com/advisories/GHSA-j57w-3c39-gpp5', 'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439', 'https://huntr.dev/bounties/7b7447fc-f1b0-446c-b016-ee3f6511010b'}
null
{'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439'}
{'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439'}
GHSA
GHSA-jhq9-wm9m-cf89
CHECK-failure in `UnsortedSegmentJoin`
### Impact An attacker can cause a denial of service by controlling the values of `num_segments` tensor argument for `UnsortedSegmentJoin`: ```python import tensorflow as tf inputs = tf.constant([], dtype=tf.string) segment_ids = tf.constant([], dtype=tf.int32) num_segments = tf.constant([], dtype=tf.int32) separator = '' tf.raw_ops.UnsortedSegmentJoin( inputs=inputs, segment_ids=segment_ids, num_segments=num_segments, separator=separator) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/a2a607db15c7cd01d754d37e5448d72a13491bdb/tensorflow/core/kernels/unsorted_segment_join_op.cc#L92-L93) assumes that the `num_segments` tensor is a valid scalar: ```cc const Tensor& num_segments_tensor = context->input(2); auto num_segments = num_segments_tensor.scalar<NUM_SEGMENTS_TYPE>()(); ``` Since the tensor is empty the `CHECK` involved in `.scalar<T>()()` that checks that the number of elements is exactly 1 will be invalidated and this would result in process termination. ### Patches We have patched the issue in GitHub commit [704866eabe03a9aeda044ec91a8d0c83fc1ebdbe](https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29552'}
2021-05-21T14:23:48Z
2021-05-21T14:23:48Z
LOW
2.5
{'CWE-617'}
{'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe', 'https://github.com/advisories/GHSA-jhq9-wm9m-cf89', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29552', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jhq9-wm9m-cf89'}
null
{'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe'}
{'https://github.com/tensorflow/tensorflow/commit/704866eabe03a9aeda044ec91a8d0c83fc1ebdbe'}
GHSA
GHSA-98gj-wwxm-cj3h
Moderate severity vulnerability that affects mistune
Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the "key" argument.
{'CVE-2017-16876'}
2021-09-07T21:10:10Z
2019-01-04T17:47:50Z
MODERATE
6.1
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1524596', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/', 'https://github.com/advisories/GHSA-98gj-wwxm-cj3h', 'https://github.com/lepture/mistune/blob/master/CHANGES.rst', 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}
null
{'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}
{'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}
GHSA
GHSA-2v5j-q74q-r53f
django-helpdesk is vulnerable to Cross-site Scripting
django-helpdesk is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3994'}
2021-12-03T20:42:26Z
2021-12-03T20:42:26Z
HIGH
8.8
{'CWE-79'}
{'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06', 'https://github.com/advisories/GHSA-2v5j-q74q-r53f', 'https://huntr.dev/bounties/be7f211d-4bfd-44fd-91e8-682329906fbd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3994', 'https://github.com/django-helpdesk/django-helpdesk/releases/tag/0.3.2'}
null
{'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'}
{'https://github.com/django-helpdesk/django-helpdesk/commit/a22eb0673fe0b7784f99c6b5fd343b64a6700f06'}
GHSA
GHSA-mj2c-5mjv-gmmj
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable to SQL injection in ElementController.php. This vulnerability causes loss of data confidentiality.
{'CVE-2022-1339'}
2022-04-22T21:06:23Z
2022-04-14T00:00:19Z
HIGH
7.5
{'CWE-89'}
{'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c', 'https://huntr.dev/bounties/ae8dc737-844e-40da-a9f7-e72d8e50f6f9', 'https://github.com/advisories/GHSA-mj2c-5mjv-gmmj', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1339'}
null
{'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c'}
{'https://github.com/pimcore/pimcore/commit/adae3be64427466bf0df15ceaea2ac30da93752c'}
GHSA
GHSA-663j-rjcr-789f
CSV injection in shuup
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
{'CVE-2021-25962'}
2021-10-21T14:31:43Z
2021-09-30T20:50:07Z
HIGH
8
{'CWE-1236'}
{'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51', 'https://github.com/advisories/GHSA-663j-rjcr-789f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25962', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25962'}
null
{'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'}
{'https://github.com/shuup/shuup/commit/0a2db392e8518410c282412561461cd8797eea51'}
GHSA
GHSA-6pqm-xvfc-w7p4
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3993'}
2021-12-03T20:42:35Z
2021-12-03T20:42:35Z
MODERATE
6.5
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3993', 'https://huntr.dev/bounties/0aa84736-139b-4ae7-becf-604f7f60b1c9', 'https://github.com/advisories/GHSA-6pqm-xvfc-w7p4', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
null
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
GHSA
GHSA-7f42-p84j-f58p
Moderate severity vulnerability that affects sanitize
When Sanitize <= 4.6.2 is used in combination with libxml2 >= 2.9.2, a specially crafted HTML fragment can cause libxml2 to generate improperly escaped output, allowing non-whitelisted attributes to be used on whitelisted elements. This can allow HTML and JavaScript injection, which could result in XSS if Sanitize's output is served to browsers.
{'CVE-2018-3740'}
2021-01-08T19:16:14Z
2018-03-21T11:56:32Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-7f42-p84j-f58p', 'https://www.debian.org/security/2018/dsa-4358', 'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e', 'https://about.gitlab.com/2018/06/25/security-release-gitlab-11-dot-0-dot-1-released/', 'https://github.com/rgrove/sanitize/issues/176', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3740'}
null
{'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e'}
{'https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e'}
GHSA
GHSA-p6h4-93qp-jhcm
Command injection in Parse Server through prototype pollution
### Impact This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and any other database backend as well. This vulnerability has been confirmed on Linux (Ubuntu) and Windows. ### Patches Upgrade to Parse Server >=4.10.7. If you are using a prerelease version of Parse Server 5.0 (alpha, beta) we will publish a timely fix for these. However, as a general reminder we do not consider prerelease versions to be suitable for production deployment. Note that as part of the fix a new security feature scans for sensitive keywords in request data to prevent JavaScript prototype pollution. If such a keyword is found, the request is rejected with HTTP response code `400` and Parse Error `105` (`INVALID_KEY_NAME`). By default these keywords are: `{_bsontype: "Code"}`, `constructor`, `__proto__`. If you are using any of these keywords in your request data, you can override the default keywords by setting the new Parse Server option `requestKeywordDenylist` to `[]` and specify your own keywords as needed. ### Workarounds Although the fix is more broad and includes several aspects of the vulnerability, a quick and targeted fix can be achieved by patching the MongoDB Node.js driver and disable BSON code execution. To apply the patch, add the following code to be executed before starting Parse Server, for example in `index.js`. ``` const BSON = require('bson'); const internalDeserialize = BSON.prototype.deserialize; BSON.prototype.deserialize = (buffer, options = Object.create(null), ...others) => { if (options.constructor) { options = Object.assign(Object.create(null), options); } return internalDeserialize(buffer, options, ...others); }; const internalDeserializeStream = BSON.prototype.deserializeStream; BSON.prototype.deserializeStream = ( data, startIndex, numberOfDocuments, documents, docStartIndex, options = Object.create(null), ...others ) => { if (options.constructor) { options = Object.assign(Object.create(null), options); } return internalDeserializeStream( data, startIndex, numberOfDocuments, documents, docStartIndex, options, ...others ); }; ``` ### References - Original report on [huntr.dev](https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/)
{'CVE-2022-24760'}
2022-04-19T18:24:25Z
2022-03-11T23:53:23Z
CRITICAL
10
{'CWE-74', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24760', 'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d', 'https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm', 'https://github.com/advisories/GHSA-p6h4-93qp-jhcm'}
null
{'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'}
{'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'}
GHSA
GHSA-hpfq-8wx8-cgqw
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2021-08-04T21:16:12Z
2019-06-13T18:59:18Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-hpfq-8wx8-cgqw', 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4', 'https://github.com/infor-design/enterprise-ng/issues/511', 'https://www.npmjs.com/advisories/957'}
null
{'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'}
{'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'}
GHSA
GHSA-vfrc-7r7c-w9mx
Prototype Pollution in highlight.js
### Impact Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code blocks (or similar) and do not filter the language names the user can provide you may be vulnerable. The pollution should just be harmless data but this can cause problems for applications not expecting these properties to exist and can result in strange behavior or application crashes, i.e. a potential DOS vector. _If your website or application does not render user provided data it should be unaffected._ ### Patches Versions 9.18.2 and 10.1.2 and newer include fixes for this vulnerability. If you are using version 7 or 8 you are encouraged to upgrade to a newer release. ### Workarounds #### Patch your library Manually patch your library to create null objects for both `languages` and `aliases`: ```js const HLJS = function(hljs) { // ... var languages = Object.create(null); var aliases = Object.create(null); ``` #### Filter out bad data from end users Filter the language names that users are allowed to inject into your HTML to guarantee they are valid. ### References * [What is Prototype Pollution?](https://codeburst.io/what-is-prototype-pollution-49482fc4b638) * https://github.com/highlightjs/highlight.js/pull/2636 ### For more information If you have any questions or comments about this advisory: * Please file an issue against [highlight.js](https://github.com/highlightjs/highlight.js/issues/)
{'CVE-2020-26237'}
2022-04-19T19:02:31Z
2020-11-24T22:58:41Z
LOW
5.8
{'CWE-471'}
{'https://www.npmjs.com/package/highlight.js', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html', 'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0', 'https://github.com/advisories/GHSA-vfrc-7r7c-w9mx', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26237', 'https://github.com/highlightjs/highlight.js/pull/2636'}
null
{'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'}
{'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'}
GHSA
GHSA-cf8j-64h9-6q58
CSRF in Play Framework
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
{'CVE-2020-12480'}
2021-09-23T18:57:06Z
2020-08-18T17:30:25Z
MODERATE
6.5
{'CWE-352'}
{'https://github.com/playframework/playframework/pull/10285', 'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass', 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154', 'https://www.playframework.com/security/vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12480', 'https://github.com/advisories/GHSA-cf8j-64h9-6q58'}
null
{'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'}
{'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'}
GHSA
GHSA-hfwx-c7q6-g54c
Vulnerability allowing for reading internal HTTP resources
### Impact The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources. The impact is limited to internal services that serve content via. HTTP(S), and requires the attacker to know internal hostnames/IP addresses. The previous versions have been marked as deprecated on NPM. ### Patches Version 2.1.0 released alongside this security advisory addresses the issue. **Please note that this release is not backwards compatible out of the box. See the [changelog](https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md) for details.** Additionally, it's also recommended to upgrade to the latest version of Highcharts to get the added input sanitation implemented in version 9.0 and later. ### Workarounds There are no known workarounds to the issue - an upgrade to version 2.1.0 is required. ### For more information If you have any questions or comments about this advisory: * Open an issue in [the export server issue tracker](https://github.com/highcharts/node-export-server/issues) * Email us at [security@highsoft.com](mailto:security@highsoft.com)
null
2021-03-12T23:04:46Z
2021-03-12T23:04:46Z
HIGH
0
{'CWE-552'}
{'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/advisories/GHSA-hfwx-c7q6-g54c', 'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6', 'https://www.npmjs.com/package/highcharts-export-server', 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210'}
null
{'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'}
{'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'}
GHSA
GHSA-44gv-fgcj-w546
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.
{'CVE-2022-22107'}
2022-01-08T00:31:55Z
2022-01-08T00:31:55Z
MODERATE
4.3
{'CWE-862'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22107', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b', 'https://github.com/advisories/GHSA-44gv-fgcj-w546', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22107'}
null
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
{'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}
GHSA
GHSA-6jvm-3j5h-79f6
Moderate severity vulnerability that affects paperclip
The thoughtbot paperclip gem before 4.2.2 for Ruby does not consider the content-type value during media-type validation, which allows remote attackers to upload HTML documents and conduct cross-site scripting (XSS) attacks via a spoofed value, as demonstrated by image/jpeg.
{'CVE-2015-2963'}
2021-09-02T16:53:00Z
2017-10-24T18:33:36Z
MODERATE
0
{'CWE-79'}
{'http://jvn.jp/en/jp/JVN83881261/index.html', 'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57', 'https://robots.thoughtbot.com/paperclip-security-release', 'http://www.securityfocus.com/bid/75304', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2963', 'http://openwall.com/lists/oss-security/2015/06/19/3', 'https://github.com/advisories/GHSA-6jvm-3j5h-79f6', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000088'}
null
{'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}
{'https://github.com/thoughtbot/paperclip/commit/9aee4112f36058cd28d5fe4a006d6981bd1eda57'}
GHSA
GHSA-f8cm-364f-q9qh
Ensure that doorkeeper_token is valid when authenticating requests in API v2 calls
### Impact The perpetrator who previously obtained an old expired user token could use it to access Storefront API v2 endpoints. ### Patches Please upgrade to 3.7.11, 4.0.4, or 4.1.11 depending on your used Spree version. ### Workarounds In your project directory create a decorator file `app/controllers/spree/api/v2/base_controller_decotatror.rb` with contents: ```ruby module Spree module Api module V2 module BaseControllerDecorator private def spree_current_user return nil unless doorkeeper_token return @spree_current_user if @spree_current_user doorkeeper_authorize! @spree_current_user ||= ::Spree.user_class.find_by(id: doorkeeper_token.resource_owner_id) end end end end Spree::Api::V2::BaseController.prepend(Spree::Api::V2::BaseControllerDecorator) ``` ### For more information If you have any questions or comments about this advisory: * Email us at [security@spreecommerce.org](mailto:security@spreecommerce.org)
{'CVE-2020-15269'}
2022-04-19T19:02:38Z
2020-10-20T20:03:52Z
HIGH
7.4
{'CWE-287', 'CWE-613'}
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15269', 'https://github.com/spree/spree/security/advisories/GHSA-f8cm-364f-q9qh', 'https://github.com/advisories/GHSA-f8cm-364f-q9qh'}
null
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'}
{'https://github.com/spree/spree/commit/e43643abfe51f54bd9208dd02298b366e9b9a847'}
GHSA
GHSA-q9qc-pp5x-mc8c
Improper Neutralization of Special Elements Used in a Template Engine in microweber
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
{'CVE-2022-0896'}
2022-03-14T21:01:06Z
2022-03-10T00:00:40Z
HIGH
8.8
{'CWE-94', 'CWE-1336'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0896', 'https://huntr.dev/bounties/113056f1-7a78-4205-9f42-940ad41d8df0', 'https://github.com/advisories/GHSA-q9qc-pp5x-mc8c', 'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'}
null
{'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'}
{'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'}
GHSA
GHSA-896r-f27r-55mw
json-schema is vulnerable to Prototype Pollution
json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3918'}
2021-11-19T20:16:17Z
2021-11-19T20:16:17Z
MODERATE
9.8
{'CWE-1321', 'CWE-915'}
{'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b55f-cd2662c261a9', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3918', 'https://github.com/advisories/GHSA-896r-f27r-55mw'}
null
{'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}
{'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'}
GHSA
GHSA-w8f3-pvx4-4c3h
Prototype Pollution in arr-flatten-unflatten
All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor.
{'CVE-2020-7713'}
2021-07-29T21:16:54Z
2021-05-06T18:11:39Z
CRITICAL
0
{'CWE-1321'}
{'https://github.com/advisories/GHSA-w8f3-pvx4-4c3h', 'https://github.com/Quernest/arr-flatten-unflatten/pull/8', 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7713', 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396'}
null
{'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'}
{'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'}
GHSA
GHSA-prff-6j8q-vrv7
Cross-site Scripting in microweber
There is a persistent XSS Vulnerability exsists in the checkout page where we can able to execute any javascription in the last name field
{'CVE-2022-0379'}
2022-02-03T21:01:48Z
2022-01-28T22:15:33Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b', 'https://huntr.dev/bounties/933f94b8-c5e7-4c3a-92e0-4d1577d5fee6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0379', 'https://github.com/advisories/GHSA-prff-6j8q-vrv7'}
null
{'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'}
{'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'}
GHSA
GHSA-j383-35pm-c5h4
Path Traversal in Grunt
Grunt prior to version 1.5.2 is vulnerable to path traversal.
{'CVE-2022-0436'}
2022-04-26T21:51:43Z
2022-04-13T00:00:16Z
MODERATE
5.5
{'CWE-22'}
{'https://github.com/gruntjs/grunt/pull/1743', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/advisories/GHSA-j383-35pm-c5h4', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://huntr.dev/bounties/f55315e9-9f6d-4dbb-8c40-bae50c1ae92b'}
null
{'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c'}
{'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'}
GHSA
GHSA-743r-5g92-5vgf
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on MacOS. This issue has been addressed in aws-c-io submodule versions 0.10.5 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.4.2 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.6.1 on macOS. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on macOS. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on macOS. Amazon Web Services AWS-C-IO 0.10.4 on macOS.
{'CVE-2021-40829'}
2021-12-03T15:21:00Z
2021-11-24T21:11:16Z
MODERATE
6.3
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/advisories/GHSA-743r-5g92-5vgf', 'https://github.com/awslabs/aws-c-io/'}
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'}
GHSA
GHSA-h746-rm5q-8mgq
Legacy Node API Allows Impersonation in github.com/spiffe/spire/pkg/server/endpoints/node
#### Summary In SPIRE 0.8.1 through 0.8.4 and before versions 0.9.4, 0.10.2, 0.11.3 and 0.12.1, specially crafted requests to the FetchX509SVID RPC of SPIRE Server’s Legacy Node API can result in the possible issuance of an X.509 certificate with a URI SAN for a SPIFFE ID that the agent is not authorized to distribute. Proper controls are in place to require that the caller presents a valid agent certificate that is already authorized to issue at least one SPIFFE ID, and the requested SPIFFE ID belongs to the same trust domain, prior to being able to trigger this vulnerability. This issue has been fixed in SPIRE versions 0.8.5, 0.9.4, 0.10.2, 0.11.3 and 0.12.1. #### What are the changes introduced by the patched versions? The changes introduced to address this issue are related to enforcing that the FetchX509SVID RPC of SPIRE Server’s Legacy Node API only issues X.509 certificates with SPIFFE IDs that the agent is authorized to distribute. The patched version also includes a back-ported change that improves the handling of file descriptors related to workload attestation in SPIRE Agent. There are no changes in the expected behavior of SPIRE. #### Should I upgrade SPIRE? All SPIRE users running affected versions are advised to upgrade to the corresponding patched version. #### Workarounds No workarounds have been identified for this vulnerability.
{'CVE-2021-27098'}
2022-04-19T19:02:49Z
2021-05-21T14:31:11Z
HIGH
8.1
{'CWE-284', 'CWE-295'}
{'https://github.com/advisories/GHSA-h746-rm5q-8mgq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27098', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27098', 'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13', 'https://github.com/spiffe/spire/security/advisories/GHSA-h746-rm5q-8mgq'}
null
{'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13'}
{'https://github.com/spiffe/spire/commit/3c5115b57afc20a0a2c2b1b9dd60dd1fd9082e13'}
GHSA
GHSA-pc58-wgmc-hfjr
Prototype Pollution in mout
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, leading to a Prototype Pollution.
{'CVE-2020-7792'}
2022-02-09T22:49:20Z
2022-02-09T22:49:10Z
HIGH
7.5
{'CWE-1321'}
{'https://github.com/advisories/GHSA-pc58-wgmc-hfjr', 'https://snyk.io/vuln/SNYK-JS-MOUT-1014544', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792', 'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'}
null
{'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'}
{'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'}
GHSA
GHSA-pv39-qp28-4mgh
Improper Restriction of XML External Entity Reference in soa-model
Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4.
{'CVE-2021-43090'}
2022-04-12T16:40:10Z
2022-03-26T00:00:32Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/releases/tag/v1.6.4', 'https://github.com/advisories/GHSA-pv39-qp28-4mgh', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251', 'https://github.com/membrane/soa-model/issues/281', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43090'}
null
{'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'}
{'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'}
GHSA
GHSA-rqff-837h-mm52
Authorization bypass in url-parse
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
{'CVE-2022-0512'}
2022-02-24T14:01:29Z
2022-02-15T00:02:46Z
MODERATE
5.3
{'CWE-639'}
{'https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512', 'https://github.com/advisories/GHSA-rqff-837h-mm52', 'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'}
null
{'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'}
{'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'}
GHSA
GHSA-h6pr-c536-6rjg
Prototype Pollution in object-path-set
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
{'CVE-2021-23507'}
2022-02-11T16:16:48Z
2022-02-05T00:00:31Z
HIGH
7.5
{'CWE-1321'}
{'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761', 'https://github.com/advisories/GHSA-h6pr-c536-6rjg', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507', 'https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8'}
null
{'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'}
{'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'}
GHSA
GHSA-x462-89pf-6r5h
Crash due to malformed relay protocol message
### Impact 1. `syncthing` can be caused to crash and exit if sent a malformed relay protocol message message with a negative length field. 2. The relay server `strelaysrv` can be caused to crash and exit if sent a malformed relay protocol message with a negative length field. At no point is sensitive data exposed or liable to be altered due to this issue. Sensitive data is never exposed to relay operators. Syncthing itself would need to be lured to connect to a malicious relay server in order to exploit the issue. ### Patches Fixed in version 1.15.0. ### Workarounds 1. No known workaround for `strelaysrv`. 2. `syncthing` can be configured to not use relays, or to only use specific, trusted relays. If Syncthing is used in a closed environment or with relaying disabled, i.e., it does not communicate with unknown relays, Syncthing is not vulnerable. ### For more information If you have any questions or comments about this advisory, please discuss it [on the forum](https://forum.syncthing.net/). Thanks to Wojciech Paciorek for discovering and reporting this issue.
{'CVE-2021-21404'}
2021-05-21T16:23:17Z
2021-05-21T16:23:17Z
LOW
7.5
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21404', 'https://github.com/advisories/GHSA-x462-89pf-6r5h', 'https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h', 'https://pkg.go.dev/github.com/syncthing/syncthing', 'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97', 'https://github.com/syncthing/syncthing/releases/tag/v1.15.0'}
null
{'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97'}
{'https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97'}
GHSA
GHSA-52q8-877j-gghq
remote code execution via cache action in MoinMoin
### Impact The cache action in action/cache.py allows directory traversal through a crafted HTTP request. An attacker who can upload attachments to the wiki can use this to achieve remote code execution. ### Patches Users are strongly advised to upgrade to a patched version. MoinMoin Wiki 1.9.11 has the necessary fixes and also contains other important fixes. ### Workarounds It is not advised to work around this, but to upgrade MoinMoin to a patched version. That said, a work around via disabling the `cache` or the `AttachFile` action might be possible. Also, it is of course helpful if you give `write` permissions (which include uploading attachments) only to trusted users. ### Credits This vulnerability was discovered by Michael Chapman. ### For more information If you have any questions or comments about this advisory, email me at [twaldmann@thinkmo.de](mailto:twaldmann@thinkmo.de).
{'CVE-2020-25074'}
2022-03-22T20:54:56Z
2020-11-11T15:54:51Z
CRITICAL
0
{'CWE-22'}
{'https://www.debian.org/security/2020/dsa-4787', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00020.html', 'https://github.com/advisories/GHSA-52q8-877j-gghq', 'http://moinmo.in/SecurityFixes', 'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7', 'https://pypi.org/project/moin/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25074', 'https://github.com/moinwiki/moin-1.9/security/advisories/GHSA-52q8-877j-gghq'}
null
{'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'}
{'https://github.com/moinwiki/moin-1.9/commit/6b96a9060069302996b5af47fd4a388fc80172b7'}
GHSA
GHSA-r23f-c2j5-rx2f
Local File read vulnerability in OctoberCMS
### Impact An attacker can exploit this vulnerability to read local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc to your installation manually if unable to upgrade to Build 466. ### References Reported by [Sivanesh Ashok](https://stazot.com/) ### For more information If you have any questions or comments about this advisory: * Email us at [hello@octobercms.com](mailto:hello@octobercms.com) ### Threat assessment: <img width="1108" alt="Screen Shot 2020-03-31 at 2 37 53 PM" src="https://user-images.githubusercontent.com/7253840/78072989-44b3ac80-735d-11ea-8676-09c69f0409c4.png">
{'CVE-2020-5295'}
2022-04-19T19:02:26Z
2020-06-03T21:58:16Z
MODERATE
4.8
{'CWE-98'}
{'https://github.com/advisories/GHSA-r23f-c2j5-rx2f', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'https://github.com/octobercms/october/security/advisories/GHSA-r23f-c2j5-rx2f', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5295'}
null
{'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'}
{'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'}
GHSA
GHSA-6cw8-7j6c-hccp
Moderate severity vulnerability that affects io.vertx:vertx-core
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
{'CVE-2018-12537'}
2021-01-08T21:06:43Z
2018-10-19T17:43:36Z
MODERATE
0
{'CWE-93'}
{'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72', 'https://github.com/eclipse/vert.x/issues/2470', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537', 'https://github.com/advisories/GHSA-6cw8-7j6c-hccp', 'https://bugzilla.redhat.com/show_bug.cgi?id=1591072', 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-021_vertx.txt', 'https://access.redhat.com/errata/RHSA-2018:2371'}
null
{'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'}
{'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'}
GHSA
GHSA-cjc7-49v2-jp64
Incomplete validation in `SparseAdd`
### Impact Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data: ```python import tensorflow as tf a_indices = tf.zeros([10, 97], dtype=tf.int64) a_values = tf.zeros([10], dtype=tf.int64) a_shape = tf.zeros([0], dtype=tf.int64) b_indices = tf.zeros([0, 0], dtype=tf.int64) b_values = tf.zeros([0], dtype=tf.int64) b_shape = tf.zeros([0], dtype=tf.int64) thresh = 0 tf.raw_ops.SparseAdd(a_indices=a_indices, a_values=a_values, a_shape=a_shape, b_indices=b_indices, b_values=b_values, b_shape=b_shape, thresh=thresh) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/656e7673b14acd7835dc778867f84916c6d1cac2/tensorflow/core/kernels/sparse_add_op.cc) has a large set of validation for the two sparse tensor inputs (6 tensors in total), but does not validate that the tensors are not empty or that the second dimension of `*_indices` matches the size of corresponding `*_shape`. This allows attackers to send tensor triples that represent invalid sparse tensors to abuse code assumptions that are not protected by validation. ### Patches We have patched the issue in GitHub commit [6fd02f44810754ae7481838b6a67c5df7f909ca3](https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3) followed by GitHub commit [41727ff06111117bdf86b37db198217fd7a143cc](https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29609'}
2021-05-21T17:08:02Z
2021-05-21T14:28:29Z
MODERATE
5.3
{'CWE-665', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29609', 'https://github.com/advisories/GHSA-cjc7-49v2-jp64', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cjc7-49v2-jp64'}
null
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}
{'https://github.com/tensorflow/tensorflow/commit/41727ff06111117bdf86b37db198217fd7a143cc', 'https://github.com/tensorflow/tensorflow/commit/6fd02f44810754ae7481838b6a67c5df7f909ca3'}
GHSA
GHSA-phrq-v4q2-hmq6
Code injection vulnerability in allSelectors()
Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker.
{'CVE-2020-13756'}
2022-03-26T00:32:36Z
2022-03-26T00:15:22Z
CRITICAL
9.8
{'CWE-20'}
{'http://seclists.org/fulldisclosure/2020/Jun/7', 'http://packetstormsecurity.com/files/157923/Sabberworm-PHP-CSS-Code-Injection.html', 'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13756', 'https://github.com/advisories/GHSA-phrq-v4q2-hmq6', 'https://packetstormsecurity.com/files/cve/CVE-2020-13756', 'https://github.com/sabberworm/PHP-CSS-Parser/releases/tag/8.3.1', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sabberworm/php-css-parser/CVE-2020-13756.yaml'}
null
{'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4'}
{'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4'}
GHSA
GHSA-c8wh-6jw4-2h79
Potential unauthorized access to stored request & session data when plugin is misconfigured in October CMS Debugbar
### Impact The debugbar contains a perhaps little known feature where it will log all requests (and all information pertaining to each request including session data) whenever it is enabled. This presents a problem if the plugin is ever enabled on a system that is open to untrusted users as the potential exists for them to use this feature to view all requests being made to the application and obtain sensitive information from those requests. There even exists the potential for account takeovers of authenticated users by non-authenticated public users, which would then lead to a number of other potential issues as an attacker could theoretically get full access to the system if the required conditions existed. ### Patches Issue has been patched in v3.1.0 by locking down access to the debugbar to all users; it now requires an authenticated backend user with a specifically enabled permission before it is even usable, and the feature that allows access to stored request information is restricted behind a different permission that's more restrictive. ### Workarounds Apply https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18 to your installation manually if unable to upgrade to v3.1.0. ### For more information If you have any questions or comments about this advisory: * Email us at [octobercms@luketowers.ca](mailto:octobercms@luketowers.ca) & [hello@octobercms.com](mailto:hello@octobercms.com) ### Acknowledgements Thanks to [Freddie Poser](https://twitter.com/vogonjeltz101) for reporting the issue to the RainLab team.
{'CVE-2020-11094'}
2022-04-19T19:02:27Z
2020-06-03T23:19:12Z
MODERATE
6.1
{'CWE-532'}
{'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18', 'https://github.com/advisories/GHSA-c8wh-6jw4-2h79', 'https://github.com/rainlab/debugbar-plugin/security/advisories/GHSA-c8wh-6jw4-2h79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11094'}
null
{'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18'}
{'https://github.com/rainlab/debugbar-plugin/commit/86dd29f9866d712de7d98f5f9dc67751b82ecd18'}
GHSA
GHSA-vpq5-4rc8-c222
Denial of Service in canvas
Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process. ## Recommendation Upgrade to version 1.6.10
null
2020-08-31T18:36:23Z
2019-06-05T14:10:45Z
MODERATE
0
null
{'https://hackerone.com/reports/315037', 'https://github.com/advisories/GHSA-vpq5-4rc8-c222', 'https://www.npmjs.com/advisories/804', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
null
{'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
{'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}
GHSA
GHSA-4q97-fh3f-j294
Prototype Pollution in tiny-conf
All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7724'}
2021-07-29T22:08:56Z
2021-05-10T15:59:24Z
CRITICAL
9.8
{'CWE-1321'}
{'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7724', 'https://github.com/advisories/GHSA-4q97-fh3f-j294', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792'}
null
{'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'}
{'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'}
GHSA
GHSA-63xm-rx5p-xvqr
Heap buffer overflow in Tensorflow
### Impact The implementation of `SparseFillEmptyRowsGrad` uses a double indexing pattern: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/core/kernels/sparse_fill_empty_rows_op.cc#L263-L269 It is possible for `reverse_index_map(i)` to be an index outside of bounds of `grad_values`, thus resulting in a heap buffer overflow. ### Patches We have patched the issue in 390611e0d45c5793c7066110af37c8514e6a6c54 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15195'}
2021-11-19T15:19:39Z
2020-09-25T18:28:29Z
HIGH
8.5
{'CWE-119', 'CWE-122', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15195', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-63xm-rx5p-xvqr', 'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}
{'https://github.com/tensorflow/tensorflow/commit/390611e0d45c5793c7066110af37c8514e6a6c54'}
GHSA
GHSA-6fvx-r7hx-3vh6
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
{'CVE-2018-15531'}
2022-04-27T14:25:07Z
2018-10-17T18:28:00Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353', 'https://jenkins.io/security/advisory/2018-09-25/', 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6', 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15531', 'http://www.openwall.com/lists/oss-security/2018/09/25/3'}
null
{'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'}
{'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'}
GHSA
GHSA-hpv4-7p9c-mvfr
Heap buffer overflow in `FractionalAvgPoolGrad`
### Impact The implementation for `tf.raw_ops.FractionalAvgPoolGrad` can be tricked into accessing data outside of bounds of heap allocated buffers: ```python import tensorflow as tf tf.raw_ops.FractionalAvgPoolGrad( orig_input_tensor_shape=[0,1,2,3], out_backprop = np.array([[[[541],[541]],[[541],[541]]]]), row_pooling_sequence=[0, 0, 0, 0, 0], col_pooling_sequence=[-2, 0, 0, 2, 0], overlapping=True) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/fractional_avg_pool_op.cc#L205) does not validate that the input tensor is non-empty. Thus, code constructs an empty `EigenDoubleMatrixMap` and then accesses this buffer with indices that are outside of the empty area. ### Patches We have patched the issue in GitHub commit [0f931751fb20f565c4e94aa6df58d54a003cdb30](https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37651'}
2021-08-25T14:43:21Z
2021-08-25T14:43:21Z
HIGH
7.1
{'CWE-787', 'CWE-125'}
{'https://github.com/advisories/GHSA-hpv4-7p9c-mvfr', 'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hpv4-7p9c-mvfr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37651'}
null
{'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'}
{'https://github.com/tensorflow/tensorflow/commit/0f931751fb20f565c4e94aa6df58d54a003cdb30'}
GHSA
GHSA-3x58-xr87-2fcj
Cross-site scripting in bluemonday
bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the "script" string.
{'CVE-2021-29272'}
2022-03-15T21:37:06Z
2021-05-18T21:07:37Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/microcosm-cc/bluemonday/issues/111', 'https://vuln.ryotak.me/advisories/4.txt', 'https://github.com/microcosm-cc/bluemonday/releases/tag/v1.0.5', 'https://github.com/advisories/GHSA-3x58-xr87-2fcj', 'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee', 'https://vuln.ryotak.me/advisories/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29272'}
null
{'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee'}
{'https://github.com/microcosm-cc/bluemonday/commit/524f142fe46e945b7dcd291d7805c4b7dcf75bee'}
GHSA
GHSA-h2fw-93qx-vrcq
SQL Injection in Moodle
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
{'CVE-2022-0983'}
2022-04-05T20:54:47Z
2022-03-26T00:00:29Z
HIGH
8.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0983', 'https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74074', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4GRMWBGHOJMFXMTORECQNULJK7ZJJ6Y/', 'https://github.com/advisories/GHSA-h2fw-93qx-vrcq', 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119', 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}
null
{'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}
{'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}
GHSA
GHSA-rcp4-jm2v-mr3f
Cross-site scripting in Shopizer
A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from the backend, e.g., in admin/customers/list.html.
{'CVE-2021-33561'}
2021-06-08T23:10:24Z
2021-06-08T23:10:24Z
MODERATE
4.8
{'CWE-79'}
{'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271', 'https://github.com/advisories/GHSA-rcp4-jm2v-mr3f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33561', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
GHSA
GHSA-3jxh-789f-p7m6
Cross-site Scripting
An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.
{'CVE-2021-27902'}
2021-07-07T17:11:18Z
2021-07-02T18:36:31Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27902', 'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#360---2021-01-26', 'https://github.com/advisories/GHSA-3jxh-789f-p7m6', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security-1'}
null
{'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'}
{'https://github.com/craftcms/cms/commit/8ee85a8f03c143fa2420e7d6f311d95cae3b19ce'}
GHSA
GHSA-3c6g-pvg8-gqw2
Command injection in json
This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
{'CVE-2020-7712'}
2022-02-08T22:04:50Z
2021-05-06T18:11:21Z
HIGH
7.2
{'CWE-78'}
{'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-608931', 'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483', 'https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/trentm/json/issues/144', 'https://snyk.io/vuln/SNYK-JS-JSON-597481', 'https://lists.apache.org/thread.html/r977a907ecbedf87ae5ba47d4c77639efb120f74d4d1b3de14a4ef4da@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rba7ea4d75d6a8e5b935991d960d9b893fd30e576c4d3b531084ebd7d@%3Cissues.flink.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-608932', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/ra890c24b3d90be36daf48ae76b263acb297003db24c1122f8e4aaef2@%3Cissues.flink.apache.org%3E', 'https://github.com/trentm/json/pull/145', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7712', 'https://github.com/advisories/GHSA-3c6g-pvg8-gqw2', 'https://lists.apache.org/thread.html/r9c6d28e5b9a9b3481b7d1f90f1c2f75cd1a5ade91038426e0fb095da@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'}
{'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'}
GHSA
GHSA-82j4-vr25-x394
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0940'}
2022-03-23T15:41:45Z
2022-03-15T00:01:01Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-82j4-vr25-x394', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0940', 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73', 'https://huntr.dev/bounties/856bd2e2-db4f-4b7d-9927-222261ae3782'}
null
{'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'}
{'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'}
GHSA
GHSA-p523-jrph-qjc6
Insufficient Session Expiration in shopware
### Impact Automatically invalidate sessions upon password change ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
{'CVE-2022-21652'}
2022-01-06T23:49:17Z
2022-01-06T23:49:17Z
LOW
3.5
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21652', 'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/advisories/GHSA-p523-jrph-qjc6', 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0', 'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6'}
null
{'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'}
{'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'}
GHSA
GHSA-58w4-w77w-qv3w
Reflected XSS with parameters in PostComment
### Impact An attacker could inject malicious web code into the users' web browsers by creating a malicious link. ### Patches The problem is fixed in 4.2.0 ### References [Cross-site Scripting (XSS) - Reflected (CWE-79) ](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-26225'}
2022-04-19T19:02:40Z
2020-11-16T21:23:29Z
MODERATE
8.7
{'CWE-79'}
{'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26225', 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-58w4-w77w-qv3w', 'https://github.com/advisories/GHSA-58w4-w77w-qv3w'}
null
{'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'}
{'https://github.com/PrestaShop/productcomments/commit/c56e3e9495c4a0a9c1e7dc43e1bb0fcad2796dbf'}
GHSA
GHSA-2cv6-6437-39p2
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0930'}
2022-03-22T20:03:40Z
2022-03-13T00:00:53Z
HIGH
4.8
{'CWE-79'}
{'https://github.com/advisories/GHSA-2cv6-6437-39p2', 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e', 'https://huntr.dev/bounties/d184ce19-9608-42f1-bc3d-06ece2d9a993', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930'}
null
{'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e'}
{'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e'}
GHSA
GHSA-59c7-4xj2-hgvw
Moderate severity vulnerability that affects rails-html-sanitizer
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
{'CVE-2015-7578'}
2021-09-01T21:30:33Z
2017-10-24T18:33:36Z
MODERATE
6.1
{'CWE-79'}
{'http://www.securitytracker.com/id/1034816', 'http://www.openwall.com/lists/oss-security/2016/01/25/11', 'http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178046.html', 'https://github.com/advisories/GHSA-59c7-4xj2-hgvw', 'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00024.html', 'http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578', 'https://groups.google.com/forum/message/raw?msg=ruby-security-ann/uh--W4TDwmI/ygHE7hlZEgAJ', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178064.html'}
null
{'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}
{'https://github.com/rails/rails-html-sanitizer/commit/297161e29a3e11186ce4c02bf7defc088bf544d4'}
GHSA
GHSA-6fw4-hr69-g3rv
Prototype Pollution in property-expr
The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function.
{'CVE-2020-7707'}
2021-07-29T22:00:51Z
2021-05-06T17:29:47Z
CRITICAL
9.8
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://github.com/advisories/GHSA-6fw4-hr69-g3rv', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'}
null
{'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'}
{'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'}
GHSA
GHSA-ggxm-pgc9-g7fp
Arbitrary Code Execution in rdoc
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
{'CVE-2021-31799'}
2022-04-22T15:44:17Z
2021-09-01T18:53:15Z
HIGH
7
{'CWE-74', 'CWE-77'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31799', 'https://security.netapp.com/advisory/ntap-20210902-0004/', 'https://security-tracker.debian.org/tracker/CVE-2021-31799', 'https://github.com/advisories/GHSA-ggxm-pgc9-g7fp', 'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7', 'https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html'}
null
{'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'}
{'https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7'}
GHSA
GHSA-6m93-343m-3jrc
Cross-site Scripting in HTML2PDF
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
{'CVE-2021-45394'}
2022-01-25T20:48:30Z
2022-01-21T23:29:48Z
HIGH
8.8
{'CWE-79', 'CWE-918'}
{'https://github.com/advisories/GHSA-6m93-343m-3jrc', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394', 'https://www.synacktiv.com/sites/default/files/2022-01/html2pdf_ssrf_deserialization.pdf'}
null
{'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585'}
{'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f'}
GHSA
GHSA-48ww-j4fc-435p
Command injection in nodemailer
This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails.
{'CVE-2020-7769'}
2021-07-29T20:31:01Z
2021-05-10T19:16:52Z
CRITICAL
9.8
{'CWE-88'}
{'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://www.npmjs.com/package/nodemailer', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js#L75', 'https://github.com/advisories/GHSA-48ww-j4fc-435p', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7769', 'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'}
null
{'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'}
{'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'}
GHSA
GHSA-269g-pwp5-87pp
TemporaryFolder on unix-like systems does not limit access to created files
### Vulnerability The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability. Example of vulnerable code: ```java public static class HasTempFolder { @Rule public TemporaryFolder folder = new TemporaryFolder(); @Test public void testUsingTempFolder() throws IOException { folder.getRoot(); // Previous file permissions: `drwxr-xr-x`; After fix:`drwx------` File createdFile= folder.newFile("myfile.txt"); // unchanged/irrelevant file permissions File createdFolder= folder.newFolder("subfolder"); // unchanged/irrelevant file permissions // ... } } ``` ### Impact On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability **does not** allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. When analyzing the impact of this vulnerability, here are the important questions to ask: 1. Do the JUnit tests write sensitive information, like API keys or passwords, into the temporary folder? - If yes, this vulnerability impacts you, but only if you also answer 'yes' to question 2. - If no, this vulnerability does not impact you. 2. Do the JUnit tests ever execute in an environment where the OS has other untrusted users. _This may apply in CI/CD environments but normally won't be 'yes' for personal developer machines._ - If yes, and you answered 'yes' to question 1, this vulnerability impacts you. - If no, this vulnerability does not impact you. ### Patches Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. - Java 1.7 and higher users: this vulnerability is fixed in 4.13.1. - Java 1.6 and lower users: **no patch is available, you must use the workaround below.** ### Workarounds If you are unable to patch, or are stuck running on Java 1.6, specifying the `java.io.tmpdir` system environment variable to a directory that is exclusively owned by the executing user will fix this vulnerability. ### References - [CWE-200: Exposure of Sensitive Information to an Unauthorized Actor](https://cwe.mitre.org/data/definitions/200.html) - Fix commit https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae #### Similar Vulnerabilities - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 ### For more information If you have any questions or comments about this advisory, please pen an issue in [junit-team/junit4](https://github.com/junit-team/junit4/issues).
{'CVE-2020-15250'}
2022-04-25T23:05:55Z
2020-10-12T17:33:00Z
MODERATE
4.4
{'CWE-200', 'CWE-732'}
{'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html', 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb2ffe2993f4dccc48d832e1a0f1c419477781b6ea16e725ca2276dbb@%3Cdev.knox.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15250', 'https://lists.apache.org/thread.html/r29d703d1986d9b871466ff24082a1828ac8ad27bb0965a93a383872e@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r30f502d2f79e8d635361adb8108dcbb73095163fcbd776ee7984a094@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r9710067c7096b83cb6ae8f53a2f6f94e9c042d1bf1d6929f8f2a2b7a@%3Ccommits.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r934208a520b38f5cf0cae199b6b076bfe7d081809528b0eff2459e40@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/rf797d119cc3f51a8d7c3c5cbe50cb4524c8487282b986edde83a9467@%3Ccommits.pulsar.apache.org%3E', 'https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html', 'https://lists.apache.org/thread.html/rc49cf1547ef6cac1be4b3c92339b2cae0acacf5acaba13cfa429a872@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rde8e70b95c992378e8570e4df400c6008a9839eabdfb8f800a3e5af6@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r09cfbb5aedd76023691bbce9ca4ce2e16bb07dd37554a17efc19935d@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rf2ec93f4ca9a97d1958eb4a31b1830f723419ce9bf2018a6e5741d5b@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r01110833b63616ddbef59ae4e10c0fbd0060f0a51206defd4cb4d917@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/rdbdd30510a7c4d0908fd22075c02b75bbc2e0d977ec22249ef3133cb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rbaec90e699bc7c7bd9a053f76707a36fda48b6d558f31dc79147dbf9@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r742b44fd75215fc75963b8ecc22b2e4372e68d67d3d859d2b5e8743f@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r687f489b10b0d14e46f626aa88476545e1a2600b24c4ebd3c0d2a10b@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/reb700e60b9642eafa4b7922bfee80796394135aa09c7a239ef9f7486@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r8b02dc6f18df11ff39eedb3038f1e31e6f90a779b1959bae65107279@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r500517c23200fb2fdb0b82770a62dd6c88b3521cfb01cfd0c76e3f8b@%3Cdev.creadur.apache.org%3E', 'https://github.com/junit-team/junit4/blob/7852b90cfe1cea1e0cdaa19d490c83f0d8684b50/doc/ReleaseNotes4.13.1.md', 'https://lists.apache.org/thread.html/r717877028482c55acf604d7a0106af4ca05da4208c708fb157b53672@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/ra1bdb9efae84794e8ffa2f8474be8290ba57830eefe9714b95da714b@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/rf6e5d894d4b03bef537c9d6641272e0197c047c0d1982b4e176d0353@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r925eaae7dd8f77dd61eefc49c1fcf54bd9ecfe605486870d7b1e9390@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rb2771949c676ca984e58a5cd5ca79c2634dee1945e0406e48e0f8457@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r5f8841507576f595bb783ccec6a7cb285ea90d4e6f5043eae0e61a41@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/rb33212dab7beccaf1ffef9b88610047c644f644c7a0ebdc44d77e381@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/r2b78f23bc2711a76a7fc73ad67b7fcd6817c5cfccefd6f30a4f54943@%3Cdev.knox.apache.org%3E', 'https://lists.apache.org/thread.html/r1209986f79359b518d09513ff05a88e5b3c398540e775edea76a4774@%3Cdev.knox.apache.org%3E', 'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae', 'https://lists.apache.org/thread.html/rea812d8612fdc46842a2a57248cad4b01ddfdb1e9b037c49e68fdbfb@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rdef7d1380c86e7c0edf8a0f89a2a8db86fce5e363457d56b722691b4@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/junit-team/junit4/issues/1676', 'https://github.com/advisories/GHSA-269g-pwp5-87pp', 'https://lists.apache.org/thread.html/r95f8ef60c4b3a5284b647bb3132cda08e6fadad888a66b84f49da0b0@%3Ccommits.creadur.apache.org%3E'}
null
{'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'}
{'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'}
GHSA
GHSA-wf5p-c75w-w3wh
Null pointer dereference in TFLite MLIR optimizations
### Impact An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service: This is caused by the MLIR optimization of `L2NormalizeReduceAxis` operator. The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/compiler/mlir/lite/transforms/optimize.cc#L67-L70) unconditionally dereferences a pointer to an iterator to a vector without checking that the vector has elements: ```cc bool L2NormalizeReduceAxis(Value sq_op, DenseElementsAttr axis) { if (sq_op.getType().cast<ShapedType>().getRank() - 1 == *axis.getValues<int>().begin() || *axis.getValues<int>().begin() == -1) { // ... } // ... } ``` ### Patches We have patched the issue in GitHub commit [d6b57f461b39fd1aa8c1b870f1b974aac3554955](https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37689'}
2021-08-25T14:39:36Z
2021-08-25T14:39:36Z
HIGH
7.8
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37689', 'https://github.com/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wf5p-c75w-w3wh', 'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'}
null
{'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'}
{'https://github.com/tensorflow/tensorflow/commit/d6b57f461b39fd1aa8c1b870f1b974aac3554955'}
GHSA
GHSA-c2vx-49jm-h3f6
Pysaml2 does not sanitize XML responses
XML External Entity (XXE) vulnerability in PySAML2 4.4.0 and earlier allows remote attackers to read arbitrary files via a crafted SAML XML request or response.
{'CVE-2016-10149'}
2022-04-26T18:16:33Z
2018-07-16T16:50:12Z
HIGH
7.5
{'CWE-611'}
{'https://access.redhat.com/errata/RHSA-2017:0937', 'https://github.com/rohe/pysaml2/pull/379', 'https://github.com/advisories/GHSA-c2vx-49jm-h3f6', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850716', 'https://access.redhat.com/errata/RHSA-2017:0936', 'http://www.openwall.com/lists/oss-security/2017/01/19/5', 'http://www.securityfocus.com/bid/97692', 'https://github.com/rohe/pysaml2/issues/366', 'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10149', 'https://access.redhat.com/errata/RHSA-2017:0938', 'http://www.debian.org/security/2017/dsa-3759'}
null
{'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'}
{'https://github.com/rohe/pysaml2/commit/6e09a25d9b4b7aa7a506853210a9a14100b8bc9b'}
GHSA
GHSA-fw5q-j9p4-3vxg
Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Components are: Blog comment posting Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by yama
{'CVE-2020-15276'}
2022-04-19T19:02:38Z
2020-10-30T19:10:20Z
LOW
7.7
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15276', 'https://basercms.net/security/20201029', 'https://github.com/advisories/GHSA-fw5q-j9p4-3vxg', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg'}
null
{'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'}
{'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'}
GHSA
GHSA-xvm2-9xvc-hx7f
Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer
### Impact Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues. ### Patches Upgrade to version 2.1.0. ### Workarounds No known workaround. ### References https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73 ### For more information If you have any questions or comments about this advisory: * Open an issue in [monitorjbl/excel-streaming-reader](https://github.com/monitorjbl/excel-streaming-reader)
{'CVE-2022-23640'}
2022-04-19T19:03:23Z
2022-03-02T21:30:54Z
CRITICAL
9.8
{'CWE-611'}
{'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73', 'https://github.com/advisories/GHSA-xvm2-9xvc-hx7f', 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'}
null
{'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'}
{'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'}
GHSA
GHSA-c7fm-jx59-wjf6
Authorization Bypass Through User-Controlled Key in LiveHelperChat
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
{'CVE-2022-0266'}
2022-01-21T18:50:58Z
2022-01-21T18:50:58Z
MODERATE
6.5
{'CWE-639'}
{'https://github.com/advisories/GHSA-c7fm-jx59-wjf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266', 'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}
{'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}
GHSA
GHSA-p49h-hjvm-jg3h
PCX P mode buffer overflow in Pillow
libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer overflow.
{'CVE-2020-5312'}
2021-11-03T18:05:04Z
2021-11-03T18:05:04Z
HIGH
9.8
{'CWE-120'}
{'https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-83.yaml', 'https://www.debian.org/security/2020/dsa-4631', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/', 'https://access.redhat.com/errata/RHSA-2020:0578', 'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd', 'https://access.redhat.com/errata/RHSA-2020:0580', 'https://access.redhat.com/errata/RHSA-2020:0566', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5312', 'https://access.redhat.com/errata/RHSA-2020:0683', 'https://access.redhat.com/errata/RHSA-2020:0694', 'https://usn.ubuntu.com/4272-1/', 'https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/', 'https://github.com/advisories/GHSA-p49h-hjvm-jg3h', 'https://access.redhat.com/errata/RHSA-2020:0681'}
null
{'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd'}
{'https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd'}
GHSA
GHSA-jr3j-whm4-9wwm
Reflected XSS when using flashMessages or languageDictionary
### Overview Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's - `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`. - `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. ### Am I affected? You are affected by this vulnerability if you are using `auth0-lock` version `11.30.0` or lower and all of the following conditions apply: - You are utilizing `flashMessage` feature. - User input or data from URL parameters is incorporated into the `flashMessage`. An example of a vulnerable snippet where query parameters are used to populate the `text` property of a `flashMessage`. ```js var params = new URLSearchParams(location.search); var errorMessage = params.get('error__message'); var showParams = {}; if (!!errorMessage === true) { showParams.flashMessage = { type: 'error', text: 'We were unable to log you in. ' + errorMessage, }; } lock.show(showParams); ``` OR - You are utilizing `languageDictionary` feature. - User input or data from URL parameters is used in `languageDictionary` properties. An example of a vulnerable snippet where query parameters are used to populate the `socialLoginInstructions` property of a `languageDictionary`. ```js var params = new URLSearchParams(location.search); var instruction = params.get('instruction'); var options = { languageDictionary: { emailInputPlaceholder: "something@youremail.com", title: "title", socialLoginInstructions: instruction }, }; var lock = new Auth0LockPasswordless( CLIENT_ID, DOMAIN, options ); lock.show() ``` ### How to fix that? Upgrade to version `11.30.1`. ### Will this update impact my users? The fix uses [DOMPurify](https://github.com/cure53/DOMPurify) to sanitise the `flashMessage` and `languageDictionary` inputs. If you are including inline JavaScript in these fields, like `script` tags or `onclick` attributes, these will be removed.
{'CVE-2021-32641'}
2021-06-07T18:54:44Z
2021-06-04T19:10:34Z
HIGH
8.1
{'CWE-79'}
{'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://github.com/advisories/GHSA-jr3j-whm4-9wwm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/releases/tag/v11.30.1'}
null
{'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'}
{'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'}
GHSA
GHSA-r7cj-8hjg-x622
DBAL 3 SQL Injection Security Vulnerability
We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction. We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately. The vulnerability can happen when unsanitized input is passed to many APIs in Doctrine DBAL and ORM that ultimately end up calling `AbstractPlatform::modifyLimitQuery`. As a workaround you can cast all limit and offset parameters to integers before passing them to Doctrine APIs. This vulnerability has been assigned [CVE-2021-43608](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43608).
{'CVE-2021-43608'}
2021-12-16T14:11:44Z
2021-11-16T17:25:57Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/doctrine/dbal/releases', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622', 'https://github.com/advisories/GHSA-r7cj-8hjg-x622', 'https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html'}
null
{'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'}
{'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'}
GHSA
GHSA-2828-9vh6-9m6j
Client Denial of Service on TUF
### Impact An attacker who can gain file access to the repository and modify metadata files may cause a denial of service to clients by creating many invalid signatures on a metadata file. Having a large number of signatures to verify will delay the moment when the client will determine the signature is not valid. This delay may be for at least a few minutes, but possibly could be longer especially if multiple files are impacted. The tuf maintainers would like to thank Erik MacLean of Analog Devices, Inc. for reporting this issue. ### Patches No fix exists for this issue. ### Workarounds No workarounds are known for this issue. ### References * [CVE-2020-6173](https://nvd.nist.gov/vuln/detail/CVE-2020-6173) * [Issue #973](https://github.com/theupdateframework/tuf/issues/973)
{'CVE-2020-6173'}
2021-09-23T19:00:17Z
2020-08-21T16:25:48Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/theupdateframework/tuf/security/advisories/GHSA-2828-9vh6-9m6j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6173', 'https://github.com/advisories/GHSA-2828-9vh6-9m6j', 'https://github.com/theupdateframework/tuf/issues/973', 'https://github.com/theupdateframework/tuf/commits/develop'}
null
{'https://github.com/theupdateframework/tuf/commits/develop'}
{'https://github.com/theupdateframework/tuf/commits/develop'}
GHSA
GHSA-3p85-p4qg-hcrp
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4081'}
2021-12-16T14:27:58Z
2021-12-16T14:27:58Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4081', 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3', 'https://github.com/advisories/GHSA-3p85-p4qg-hcrp'}
null
{'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}
{'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'}
GHSA
GHSA-vrw4-w73r-6mm8
TimelockController vulnerability in OpenZeppelin Contracts
### Impact A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker. ### Patches A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`: - 4.3.1 - 3.4.2 - 3.4.2-solc-0.7 Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles. ### Workarounds Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. ### References [Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958). ### Credits The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
{'CVE-2021-39168'}
2021-09-13T20:30:26Z
2021-08-30T16:12:49Z
CRITICAL
10
{'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https://github.com/advisories/GHSA-vrw4-w73r-6mm8', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-vrw4-w73r-6mm8'}
null
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'}
GHSA
GHSA-g57j-q48p-9vm2
Command injection in Gerapy
This affects the package Gerapy from 0 and before 0.9.3. The input being passed to Popen, via the project_configure endpoint, isn’t being sanitized.
{'CVE-2020-7698'}
2022-03-21T22:49:53Z
2021-05-06T18:52:13Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2', 'https://snyk.io/vuln/SNYK-PYTHON-GERAPY-572470', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7698', 'https://github.com/advisories/GHSA-g57j-q48p-9vm2'}
null
{'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2'}
{'https://github.com/Gerapy/Gerapy/commit/e8446605eb2424717418eae199ec7aad573da2d2'}
GHSA
GHSA-754h-5r27-7x3r
RCE in Symfony
Description ----------- The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching and ESI support in mind (all HTTP calls come from a trusted backend in that scenario). But when used by `CachingHttpClient` and if an attacker can control the response for a request being made by the `CachingHttpClient`, remote code execution is possible. Resolution ---------- HTTP headers designed for internal use in `HttpCache` are now stripped from remote responses before being passed to `HttpCache`. The patch for this issue is available [here](https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78) for the 4.4 branch. Credits ------- I would like to thank Matthias Pigulla (webfactory GmbH) for reporting and fixing the issue.
{'CVE-2020-15094'}
2022-03-18T18:31:50Z
2020-09-02T17:29:56Z
HIGH
8
{'CWE-212'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://packagist.org/packages/symfony/http-kernel', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VAQJXAKWPMWB7OL6QPG2ZSEQZYYPU5RC/', 'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78', 'https://packagist.org/packages/symfony/symfony', 'https://github.com/advisories/GHSA-754h-5r27-7x3r'}
null
{'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'}
{'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'}
GHSA
GHSA-x7j7-qp7j-hw3q
Cross-site scripting (XSS) from writer field content in the site frontend
### Impact Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, otherwise the formatting would be lost. Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the site frontend or Panel session of other users. If the user is logged in to the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Because the writer field did not securely sanitize its contents on save, it was possible to inject malicious HTML code into the content file by sending it to Kirby's API directly without using the Panel. This malicious HTML code would then be displayed on the site frontend and executed in the browsers of site visitors and logged in users who are browsing the site. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users. They can escalate their privileges if they get access to the Panel session of an admin user. Depending on your site, other JavaScript-powered attacks are possible. You are *not* affected if you don't use the writer field in any of your blueprints. The attack can only be performed by logged-in users and only surfaces in the site frontend (i.e. in your templates). The Panel itself is unaffected and will not execute JavaScript that was injected into writer field content. ### Patches We have patched the vulnerability in [Kirby 3.5.8](https://github.com/getkirby/kirby/releases/tag/3.5.8) by sanitizing all writer field contents on the backend whenever the content is modified via Kirby's API. Please update to this or a [later version](https://github.com/getkirby/kirby/releases/) to fix the vulnerability. ### Credits Thanks to Azrul Ikhwan Zulkifli (@azrultech) from BAE Systems AI Vulnerability Research Team for responsibly reporting the identified issue.
{'CVE-2021-41252'}
2022-04-19T19:03:14Z
2021-11-16T17:04:19Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://github.com/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252'}
null
{'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'}
{'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'}
GHSA
GHSA-28xr-mwxg-3qc8
Command injection in simple-git
`simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover. A fix was released in simple-git@3.6.0.
{'CVE-2022-24066'}
2022-05-03T22:29:55Z
2022-04-02T00:00:13Z
HIGH
8.1
{'CWE-74', 'CWE-77'}
{'https://github.com/advisories/GHSA-28xr-mwxg-3qc8', 'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24066', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b'}
null
{'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5'}
{'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5'}
GHSA
GHSA-jjx5-3f36-6927
Incorrect buffer size calculation in iced-x86
An issue was discovered in the iced-x86 crate through 1.10.3 for Rust. In Decoder::new(), slice.get_unchecked(slice.length()) is used unsafely.
{'CVE-2021-38188'}
2021-08-25T20:55:47Z
2021-08-25T20:55:47Z
CRITICAL
9.8
{'CWE-131'}
{'https://rustsec.org/advisories/RUSTSEC-2021-0068.html', 'https://github.com/icedland/iced/issues/168', 'https://github.com/advisories/GHSA-jjx5-3f36-6927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38188', 'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'}
null
{'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'}
{'https://github.com/icedland/iced/commit/3c607a003e03b773108401d109167d1840487dce'}
GHSA
GHSA-h3gg-7wx2-cq3h
XSS in Flarum Sticky extension
### Impact A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit. Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an HTML injection where `<script>` tags would not be executed. However it was possible to run javascript from other HTML attributes, enabling a cross-site scripting (XSS) attack to be performed. Since the exploit only happens with the first post of a pinned discussion, an attacker would need the ability to pin their own discussion, or be able to edit a discussion that was previously pinned. On forums where all pinned posts are authored by your staff, you can be relatively certain the vulnerability has not been exploited. Forums where some user-created discussions were pinned can look at the first post edit date to find whether the vulnerability might have been exploited. Because Flarum doesn't store the post content history, you cannot be certain if a malicious edit was reverted. ### Patches The fix will be available in version v0.1.0-beta.16 with Flarum beta 16. The fix has already been back-ported to Flarum beta 15 as version v0.1.0-beta.15.1 of the Sticky extension. ### Workarounds Forum administrators can disable the Sticky extension until they are able to apply the update. The vulnerability cannot be exploited while the extension is disabled. ### References - [Release announcement](https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151) - [Pull Request](https://github.com/flarum/sticky/pull/24) ### For more information If you have any questions or comments about this advisory, please start a new discussion on our [support forum](https://discuss.flarum.org/t/support). If you discover a security vulnerability within Flarum, please send an e-mail to [security@flarum.org](mailto:security@flarum.org). All security vulnerabilities will be promptly addressed. More details can be found in our [security policy](https://github.com/flarum/core/security/policy).
{'CVE-2021-21283'}
2022-04-19T19:02:46Z
2021-01-29T18:13:41Z
MODERATE
0
{'CWE-79'}
{'https://github.com/flarum/sticky/pull/24', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/advisories/GHSA-h3gg-7wx2-cq3h', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-sticky-010-beta151)', 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h'}
null
{'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'}
{'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'}
GHSA
GHSA-5r9v-8w62-r26j
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0253'}
2022-01-25T19:13:22Z
2022-01-21T23:48:25Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/advisories/GHSA-5r9v-8w62-r26j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
{'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}
GHSA
GHSA-63m4-fhf2-cmf7
Command Execution in windows-cpu
Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution. ## Proof of Concept ``` var win = require('windows-cpu'); wind.findLoad('foo & calc.exe'); ``` ## Recommendation Update to version 0.1.5 or later.
{'CVE-2017-1000219'}
2021-09-23T21:42:05Z
2020-09-01T16:43:55Z
CRITICAL
9.8
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000219', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117', 'https://nodesecurity.io/advisories/336', 'https://www.npmjs.com/advisories/336', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://github.com/advisories/GHSA-63m4-fhf2-cmf7'}
null
{'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}
{'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'}
GHSA
GHSA-rhq2-3vr9-6mcr
Files on the host computer can be accessed from the Gradio interface
### Impact This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generated the link, while the link was active. An attacker would be able to view the contents of a file on the computer if they knew the exact relative filepath. We do not have any evidence that this was ever exploited, but we treated the issue seriously and immediately took steps to mitigate it (see below) ### Response 1. We worked with @haby0 to immediately patch the issue and released a new version, `gradio 2.5.0`, within 24 hours of the issue being brought to our attention 2. We enabled a notification that is printed to anyone using an older version of gradio telling them to upgrade (see screenshot below) 3. We expanded our test suite to test for this vulnerability ensuring that our patch does not get reverted in future releases of `gradio` ![image](https://user-images.githubusercontent.com/1778297/146251425-f36b519b-6d4a-4dfb-8d89-c1ed005979d3.png) ### Patches The problem has been patched in `gradio>=2.5.0`.
{'CVE-2021-43831'}
2022-04-19T19:03:17Z
2022-01-21T23:43:33Z
HIGH
8.3
{'CWE-22'}
{'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr', 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43831', 'https://github.com/advisories/GHSA-rhq2-3vr9-6mcr'}
null
{'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'}
{'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'}
GHSA
GHSA-xx8c-m748-xr4j
Access Restriction Bypass in kubernetes
The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.
{'CVE-2016-1905'}
2022-04-12T22:01:30Z
2022-02-15T01:57:18Z
MODERATE
7.7
{'CWE-284'}
{'https://github.com/advisories/GHSA-xx8c-m748-xr4j', 'https://access.redhat.com/errata/RHSA-2016:0070', 'https://github.com/kubernetes/kubernetes/issues/19479', 'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1905'}
null
{'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22'}
{'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22'}
GHSA
GHSA-mv26-cx23-vrfg
Server-Side Request Forgery in @peertube/embed-api
@peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery.
{'CVE-2022-0508'}
2022-02-11T15:05:03Z
2022-02-09T00:00:31Z
MODERATE
6.5
{'CWE-918'}
{'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c', 'https://github.com/advisories/GHSA-mv26-cx23-vrfg', 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508'}
null
{'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'}
{'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'}
GHSA
GHSA-fwcm-636p-68r5
Server-side request forgery in CarrierWave
### Impact [CarrierWave download feature](https://github.com/carrierwaveuploader/carrierwave#uploading-files-from-a-remote-location) has an SSRF vulnerability, allowing attacks to provide DNS entries or IP addresses that are intended for internal use and gather information about the Intranet infrastructure of the platform. ### Patches Upgrade to [2.1.1](https://rubygems.org/gems/carrierwave/versions/2.1.1) or [1.3.2](https://rubygems.org/gems/carrierwave/versions/1.3.2). ### Workarounds Using proper network segmentation and applying the principle of least privilege to outbound connections from application servers can reduce the severity of SSRF vulnerabilities. Ideally the vulnerable gem should run on an isolated server without access to any internal network resources or cloud metadata access. ### References [Server-Side Request Forgery Prevention Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html) ### For more information If you have any questions or comments about this advisory: * Open an issue in [CarrierWave repo](https://github.com/carrierwaveuploader/carrierwave) * Email me at [mit.shibuya@gmail.com](mailto:mit.shibuya@gmail.com)
{'CVE-2021-21288'}
2022-04-19T19:02:45Z
2021-02-08T19:16:26Z
LOW
0
{'CWE-918'}
{'https://github.com/advisories/GHSA-fwcm-636p-68r5', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#211---2021-02-08', 'https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-fwcm-636p-68r5', 'https://rubygems.org/gems/carrierwave/', 'https://github.com/carrierwaveuploader/carrierwave/blob/master/CHANGELOG.md#132---2021-02-08', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21288', 'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'}
null
{'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'}
{'https://github.com/carrierwaveuploader/carrierwave/commit/012702eb3ba1663452aa025831caa304d1a665c0'}
GHSA
GHSA-4qwp-7c67-jmcc
Unauthenticated remote code execution in Ignition
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
{'CVE-2021-3129'}
2022-02-17T18:03:08Z
2021-03-29T20:23:46Z
CRITICAL
9.8
{'CWE-94'}
{'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/pull/334', 'https://github.com/advisories/GHSA-4qwp-7c67-jmcc', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b', 'http://packetstormsecurity.com/files/162094/Ignition-2.5.1-Remote-Code-Execution.html', 'https://www.ambionics.io/blog/laravel-debug-rce'}
null
{'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'}
{'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'}
GHSA
GHSA-8f89-2fwj-5v5r
Improper Input Validation in klona
Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona.
{'CVE-2020-8125'}
2021-04-13T15:41:24Z
2021-04-13T15:41:24Z
HIGH
9.8
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://github.com/advisories/GHSA-8f89-2fwj-5v5r', 'https://hackerone.com/reports/778414', 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}
null
{'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}
{'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'}
GHSA
GHSA-9wcg-jrwf-8gg7
Prototype Pollution in express-fileupload
This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution.
{'CVE-2020-7699'}
2022-05-04T02:19:37Z
2020-08-05T14:53:16Z
CRITICAL
9.8
{'CWE-915'}
{'https://github.com/richardgirges/express-fileupload/pull/237', 'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://github.com/advisories/GHSA-9wcg-jrwf-8gg7', 'https://github.com/richardgirges/express-fileupload/issues/236', 'https://snyk.io/vuln/SNYK-JS-EXPRESSFILEUPLOAD-595969', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7699'}
null
{'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'}
{'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'}
GHSA
GHSA-m242-wc86-8768
Moderate severity vulnerability that affects python-fedora
python-fedora 0.8.0 and lower is vulnerable to an open redirect resulting in loss of CSRF protection
{'CVE-2017-1002150'}
2021-12-02T22:53:40Z
2018-07-13T15:17:05Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002150', 'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929.patch', 'https://github.com/advisories/GHSA-m242-wc86-8768'}
null
{'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929'}
{'https://github.com/fedora-infra/python-fedora/commit/b27f38a67573f4c989710c9bfb726dd4c1eeb929'}
GHSA
GHSA-27pv-q55r-222g
Path traversal in github.com/ipfs/go-ipfs
### Impact It is currently possible for path traversal to occur with DAGs containing relative paths during retrieval. This can cause files to be overwritten, or written to incorrect output directories. The issue can only occur when `ipfs get` is done on an affected DAG. 1. The only affected command is `ipfs get`. 2. The gateway is not affected. ### Patches Traversal fix patched in https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227 `tar-utils` patch applied to go-ipfs via https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2 ### Workarounds Upgrade to go-ipfs 0.8 or later. ### References Binaries for the patched versions of go-ipfs are available on the IPFS distributions site, https://dist.ipfs.io/go-ipfs ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ipfs](https://github.com/ipfs/go-ipfs) * Email us at [security@ipfs.io](mailto:security@ipfs.io)
{'CVE-2020-26279'}
2022-04-19T19:02:51Z
2021-06-23T17:27:44Z
HIGH
7.7
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26279', 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227', 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-27pv-q55r-222g', 'https://github.com/advisories/GHSA-27pv-q55r-222g', 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'}
null
{'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227', 'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2'}
{'https://github.com/ipfs/go-ipfs/commit/b7ddba7fe47dee5b1760b8ffe897908417e577b2', 'https://github.com/whyrusleeping/tar-utils/commit/20a61371de5b51380bbdb0c7935b30b0625ac227'}
GHSA
GHSA-vfq6-hq5r-27r6
Potential account hijack via password reset form in Django
Django before 1.11.27, 2.x before 2.2.9, and 3.x before 3.0.1 allows account takeover. A suitably crafted email address (that is equal to an existing user's email address after case transformation of Unicode characters) would allow an attacker to be sent a password reset token for the matched user account. (One mitigation in the new releases is to send password reset tokens only to the registered user email address.)
{'CVE-2019-19844'}
2022-03-21T20:49:09Z
2020-01-16T22:35:12Z
CRITICAL
9.8
{'CWE-640'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19844', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HCM2DPUI7TOZWN4A6JFQFUVQ2XGE7GUD/', 'https://usn.ubuntu.com/4224-1/', 'https://groups.google.com/forum/#!topic/django-announce/3oaB2rVH3a0', 'https://github.com/advisories/GHSA-vfq6-hq5r-27r6', 'https://security.gentoo.org/glsa/202004-17', 'https://www.djangoproject.com/weblog/2019/dec/18/security-releases/', 'https://www.debian.org/security/2020/dsa-4598', 'https://security.netapp.com/advisory/ntap-20200110-0003/', 'https://seclists.org/bugtraq/2020/Jan/9', 'http://packetstormsecurity.com/files/155872/Django-Account-Hijack.html', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2'}
null
{'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2', 'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70'}
{'https://github.com/django/django/commit/5b1fbcef7a8bec991ebe7b2a18b5d5a95d72cb70', 'https://github.com/django/django/commit/f4cff43bf921fcea6a29b726eb66767f67753fa2'}
GHSA
GHSA-4mrx-6fxm-8jpg
Buffer Overflow in vyper
### Impact Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. ### Patches 0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b) ### Workarounds Use .vy interfaces.
{'CVE-2022-24788'}
2022-04-22T19:54:12Z
2022-04-20T20:31:44Z
HIGH
7.1
{'CWE-119', 'CWE-120'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24788', 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b', 'https://github.com/advisories/GHSA-4mrx-6fxm-8jpg', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg'}
null
{'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
{'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}
GHSA
GHSA-4gwh-2pqx-f5cc
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php.
{'CVE-2021-44277'}
2021-12-03T20:48:42Z
2021-12-03T20:48:42Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-4gwh-2pqx-f5cc', 'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277', 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}
null
{'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}
{'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'}
GHSA
GHSA-39wj-j3jc-858m
XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic
### Impact This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic. This vulnerability was reported by Naveen Sunkavally at Horizon3.ai. ### Patches Upgrade to 3.2.4 or 2.16.5. Link to patch for 2.x versions: https://github.com/mautic/mautic/compare/2.16.4...2.16.5.diff Link to patch for 3.x versions: https://github.com/mautic/mautic/compare/3.2.2...3.2.4.diff ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Post in https://forum.mautic.org/c/support * Email us at security@mautic.org
{'CVE-2020-35124'}
2022-04-19T19:02:44Z
2021-01-19T20:43:56Z
CRITICAL
0
{'CWE-79'}
{'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://github.com/advisories/GHSA-39wj-j3jc-858m', 'https://forum.mautic.org/c/announcements/16', 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://www.horizon3.ai/disclosures/mautic-unauth-xss-to-rce', 'https://github.com/mautic/mautic/security/advisories/GHSA-39wj-j3jc-858m', 'https://packagist.org/packages/mautic/core'}
null
{'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'}
{'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'}
GHSA
GHSA-p9j6-4pjr-gp48
Path Traversal in MPXJ
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
{'CVE-2020-35460'}
2021-01-22T20:50:55Z
2020-12-18T18:28:23Z
MODERATE
5.3
{'CWE-22'}
{'http://www.mpxj.org/changes-report.html#a8.3.5', 'https://github.com/advisories/GHSA-p9j6-4pjr-gp48', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35460', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'}
null
{'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'}
{'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'}
GHSA
GHSA-cwfw-4gq5-mrqx
Regular Expression Denial of Service (ReDoS) in braces
A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
{'CVE-2018-1109'}
2022-01-06T20:42:03Z
2022-01-06T20:42:03Z
LOW
0
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1547272', 'https://snyk.io/vuln/npm:braces:20180219', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109', 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://github.com/advisories/GHSA-cwfw-4gq5-mrqx'}
null
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}
{'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}
GHSA
GHSA-w7q7-vjp8-7jv4
SQL Injection in typeorm
Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 0.1.15
null
2021-08-04T20:56:26Z
2019-06-06T15:30:16Z
HIGH
0
{'CWE-89'}
{'https://github.com/advisories/GHSA-w7q7-vjp8-7jv4', 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://hackerone.com/reports/319458', 'https://www.npmjs.com/advisories/800'}
null
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}
GHSA
GHSA-8v67-x8q5-3x3g
Cross-Site Scripting in simditor
Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 2.3.22 or later.
{'CVE-2018-19048'}
2021-08-04T14:53:06Z
2019-05-14T04:01:27Z
MODERATE
6.1
{'CWE-79'}
{'https://www.npmjs.com/advisories/884', 'https://github.com/hkglue/simditor_demo.git', 'https://github.com/advisories/GHSA-8v67-x8q5-3x3g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd', 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md'}
null
{'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}
{'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}
GHSA
GHSA-98vv-pw6r-q6q4
Uncontrolled Resource Consumption in pillow
The package pillow from 0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
{'CVE-2021-23437'}
2021-09-22T13:54:07Z
2021-09-07T23:08:10Z
HIGH
7.5
{'CWE-400', 'CWE-125'}
{'https://github.com/advisories/GHSA-98vv-pw6r-q6q4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23437', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VKRCL7KKAKOXCVD7M6WC5OKFGL4L3SJT/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RNSG6VFXTAROGF7ACYLMAZNQV4EJ6I2C/', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443', 'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'}
null
{'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'}
{'https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b'}
GHSA
GHSA-wm47-8v5p-wjpj
Possible request smuggling in HTTP/2 due missing validation
### Impact If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain objects (`HttpRequest`, `HttpContent`, etc.) via `Http2StreamFrameToHttpObjectCodec `and then sent up to the child channel's pipeline and proxied through a remote peer as HTTP/1.1 this may result in request smuggling. In a proxy case, users may assume the content-length is validated somehow, which is not the case. If the request is forwarded to a backend channel that is a HTTP/1.1 connection, the Content-Length now has meaning and needs to be checked. An attacker can smuggle requests inside the body as it gets downgraded from HTTP/2 to HTTP/1.1. A sample attack request looks like: ``` POST / HTTP/2 :authority:: externaldomain.com Content-Length: 4 asdfGET /evilRedirect HTTP/1.1 Host: internaldomain.com ``` Users are only affected if all of this is `true`: * `HTTP2MultiplexCodec` or `Http2FrameCodec` is used * `Http2StreamFrameToHttpObjectCodec` is used to convert to HTTP/1.1 objects * These HTTP/1.1 objects are forwarded to another remote peer. ### Patches This has been patched in 4.1.60.Final ### Workarounds The user can do the validation by themselves by implementing a custom `ChannelInboundHandler` that is put in the `ChannelPipeline` behind `Http2StreamFrameToHttpObjectCodec`. ### References Related change to workaround the problem: https://github.com/Netflix/zuul/pull/980
{'CVE-2021-21295'}
2022-04-25T20:27:22Z
2021-03-09T18:49:49Z
MODERATE
5.9
{'CWE-444'}
{'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r2936730ef0a06e724b96539bc7eacfcd3628987c16b1b99c790e7b87@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcfc535afd413d9934d6ee509dce234dac41fa3747a7555befb17447e@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22adb45fe902aeafcd0a1c4db13984224a667676c323c66db3af38a1@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/reafc834062486adfc7be5bb8f7b7793be0d33f483678a094c3f9d468@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r02e467123d45006a1dda20a38349e9c74c3a4b53e2e07be0939ecb3f@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r70cebada51bc6d49138272437d8a28fe971d0197334ef906b575044c@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r312ce5bd3c6bf08c138349b507b6f1c25fe9cf40b6f2b0014c9d12b1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9924ef9357537722b28d04c98a189750b80694a19754e5057c34ca48@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rae198f44c3f7ac5264045e6ba976be1703cff38dcf1609916e50210d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rd4a6b7dec38ea6cd28b6f94bd4b312629a52b80be3786d5fb0e474bc@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/rbed09768f496244a2e138dbbe6d2847ddf796c9c8ef9e50f2e3e30d9@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rc0087125cb15b4b78e44000f841cd37fefedfda942fd7ddf3ad1b528@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r0b09f3e31e004fe583f677f7afa46bd30110904576c13c5ac818ac2c@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r57245853c7245baab09eae08728c52b58fd77666538092389cc3e882@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/racc191a1f70a4f13155e8002c61bddef2870b26441971c697436ad5d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r04a3e0d9f53421fb946c60cc54762b7151dc692eb4e39970a7579052@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/ra64d56a8a331ffd7bdcd24a9aaaeeedeacd5d639f5a683389123f898@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r59bac5c09f7a4179b9e2460e8f41c278aaf3b9a21cc23678eb893e41@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rb95d42ce220ed4a4683aa17833b5006d657bc4254bc5cb03cd5e6bfb@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcf3752209a8b04996373bf57fdc808b3bfaa2be8702698a0323641f8@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5470456cf1409a99893ae9dd57439799f6dc1a60fda90e11570f66fe@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r27b7e5a588ec826b15f38c40be500c50073400019ce7b8adfd07fece@%3Cissues.hbase.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/re4f70b62843e92163fab03b65e2aa8078693293a0c36f1cc260079ed@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rcd163e421273e8dca1c71ea298dce3dd11b41d51c3a812e0394e6a5d@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r1908a34b9cc7120e5c19968a116ddbcffea5e9deb76c2be4fa461904@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7bb3cdc192e9a6f863d3ea05422f09fa1ae2b88d4663e63696ee7ef5@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r584cf871f188c406d8bd447ff4e2fd9817fca862436c064d0951a071@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rf934292a4a1c189827f625d567838d2c1001e4739b158638d844105b@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb592033a2462548d061a83ac9449c5ff66098751748fcd1e2d008233@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ea2f1a9d79d4fc1896e085f31fb60a21b1770d0a26a5250f849372d@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r1bca0b81193b74a451fc6d687ab58ef3a1f5ec40f6c61561d8dd9509@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r86cd38a825ab2344f3e6cad570528852f29a4ffdf56ab67d75c36edf@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r8db1d7b3b9acc9e8d2776395e280eb9615dd7790e1da8c57039963de@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5fc5786cdd640b1b0a3c643237ce0011f0a08a296b11c0e2c669022c@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r268850f26639ebe249356ed6d8edb54ee8943be6f200f770784fb190@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r15f66ada9a5faf4bac69d9e7c4521cedfefa62df9509881603791969@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r490ca5611c150d193b320a2608209180713b7c68e501b67b0cffb925@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r5232e33a1f3b310a3e083423f736f3925ebdb150844d60ac582809f8@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rca0978b634a0c3ebee4126ec29c7f570b165fae3f8f3658754c1cbd3@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/re7c69756a102bebce8b8681882844a53e2f23975a189363e68ad0324@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rf87b870a22aa5c77c27900967b518a71a7d954c2952860fce3794b60@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r855b4b6814ac829ce2d48dd9d8138d07f33387e710de798ee92c011e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r6aee7e3566cb3e51eeed2fd8786704d91f80a7581e00a787ba9f37f6@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r5e66e286afb5506cdfe9bbf68a323e8d09614f6d1ddc806ed0224700@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r040a5e4d9cca2f98354b58a70b27099672276f66995c4e2e39545d0b@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r67e6a636cbc1958383a1cd72b7fd0cd7493360b1dd0e6c12f5761798@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9051e4f484a970b5566dc1870ecd9c1eb435214e2652cf3ea4d0c0cc@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra83096bcbfe6e1f4d54449f8a013117a0536404e9d307ab4a0d34f81@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r16c4b55ac82be72f28adad4f8061477e5f978199d5725691dcc82c24@%3Ccommits.servicecomb.apache.org%3E', 'https://github.com/Netflix/zuul/pull/980', 'https://lists.apache.org/thread.html/ra96c74c37ed7252f78392e1ad16442bd16ae72a4d6c8db50dd55c88b@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rc73b8dd01b1be276d06bdf07883ecd93fe1a01f139a99ef30ba4308c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rb523bb6c60196c5f58514b86a8585c2069a4852039b45de3818b29d2@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r602e98daacc98934f097f07f2eed6eb07c18bfc1949c8489dc7bfcf5@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ra655e5cec74d1ddf62adacb71d398abd96f3ea2c588f6bbf048348eb@%3Cissues.kudu.apache.org%3E', 'https://lists.apache.org/thread.html/r3c293431c781696681abbfe1c573c2d9dcdae6fd3ff330ea22f0433f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd25c88aad0e76240dd09f0eb34bdab924933946429e068a167adcb73@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r3c4596b9b37f5ae91628ccf169d33cd5a0da4b16b6c39d5bad8e03f3@%3Cdev.jackrabbit.apache.org%3E', 'https://lists.apache.org/thread.html/r96ce18044880c33634c4b3fcecc57b8b90673c9364d63eba00385523@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r5baac01f9e06c40ff7aab209d5751b3b58802c63734e33324b70a06a@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4', 'https://lists.apache.org/thread.html/rb06c1e766aa45ee422e8261a8249b561784186483e8f742ea627bda4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2e93ce23e04c3f0a61e987d1111d0695cb668ac4ec4edbf237bd3e80@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r6d32fc3cd547f7c9a288a57c7f525f5d00a00d5d163613e0d10a23ef@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/rc165e36ca7cb5417aec3f21bbc4ec00fb38ecebdd96a82cfab9bd56f@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21295', 'https://lists.apache.org/thread.html/rbadcbcb50195f00bbd196403865ced521ca70787999583c07be38d0e@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r790c2926efcd062067eb18fde2486527596d7275381cfaff2f7b3890@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb51d6202ff1a773f96eaa694b7da4ad3f44922c40b3d4e1a19c2f325@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r905b92099998291956eebf4f1c5d95f5a0cbcece2946cc46d32274fd@%3Cdev.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/r3ff9e735ca33612d900607dc139ebd38a64cadc6bce292e53eb86d7f@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r22b2f34447d71c9a0ad9079b7860323d5584fb9b40eb42668c21eaf1@%3Cissues.hbase.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210604-0003/', 'https://lists.apache.org/thread.html/r6a122c25e352eb134d01e7f4fc4d345a491c5ee9453fef6fc754d15b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re6207ebe2ca4d44f2a6deee695ad6f27fd29d78980f1d46ed1574f91@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r837bbcbf12e335e83ab448b1bd2c1ad7e86efdc14034b23811422e6a@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6a29316d758db628a1df49ca219d64caf493999b52cc77847bfba675@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdc096e13ac4501ea2e2b03a197682a313b85d3d3ec89d5ae5551b384@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/security/advisories/GHSA-wm47-8v5p-wjpj', 'https://lists.apache.org/thread.html/r393a339ab0b63ef9e6502253eeab26e7643b3e69738d5948b2b1d064@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rcfc154eb2de23d2dc08a56100341161e1a40a8ea86c693735437e8f2@%3Ccommits.servicecomb.apache.org%3E'}
null
{'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'}
{'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'}