ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-gfh2-7jg5-653p
Denial of Service in docker2aci
docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain.
{'CVE-2016-8579'}
2022-04-12T22:38:28Z
2022-02-15T01:57:18Z
MODERATE
4
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-8579', 'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f', 'https://github.com/advisories/GHSA-gfh2-7jg5-653p', 'https://github.com/appc/docker2aci/issues/203', 'https://www.securityfocus.com/bid/93560', 'https://github.com/appc/docker2aci/releases/tag/v0.13.0', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8579'}
null
{'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'}
{'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'}
GHSA
GHSA-q9vw-wr57-xjv3
Information Exposure in Heketi
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
{'CVE-2017-15104'}
2022-04-12T22:38:47Z
2022-02-15T01:57:18Z
HIGH
7.8
{'CWE-200', 'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15104', 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00', 'https://github.com/advisories/GHSA-q9vw-wr57-xjv3', 'https://access.redhat.com/security/cve/CVE-2017-15104', 'https://github.com/heketi/heketi/releases/tag/v5.0.1', 'https://access.redhat.com/errata/RHSA-2017:3481', 'https://bugzilla.redhat.com/show_bug.cgi?id=1510149'}
null
{'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'}
{'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'}
GHSA
GHSA-wxr6-29pv-ch68
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4164'}
2022-01-21T23:44:17Z
2022-01-21T23:44:17Z
HIGH
7.6
{'CWE-352'}
{'https://github.com/advisories/GHSA-wxr6-29pv-ch68', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164', 'https://huntr.dev/bounties/2debace1-a0f3-45c1-95fa-9d0512680758', 'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'}
null
{'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'}
{'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'}
GHSA
GHSA-9vxc-g2jx-qj3p
API Admin Auth Weakness in tomato
Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less than 200 requests. ## Details The tomato API has an admin service that is enabled by setting up an `access_key` in the config options. This `access_key` is intended to protect the API admin from unauthorized access. Tomato verifies the `access_key` by checking to see if the server `access_key` incorporates the user provided value at any location. This allows an attacker to provide a single character as an `access_key`, and so long as the server key contains at least one instance of that character it will be considered a valid key. ## Proof of Concept This is the snippet of code that does the comparison to authorize requests. ``` if (access_key && config.master.api.access_key.indexOf(access_key) !== -1) { ``` For an access_key that is set to anything that includes the letter 'a' the following request would be authorized. ``` $ curl -X POST "http://localhost:8081/api/exec" -H "Content-Type: application/json" -d @test -H "access-key: a" { "cmd": "ls", "path": ".", "stdout": "app.js\nconfig.js\nlog\nnode_modules\nserver.js\n", "stderr": "" } ``` ## Recommendation Update to version 0.0.6 or later.
{'CVE-2013-7379'}
2021-09-23T21:00:30Z
2020-08-31T22:59:07Z
CRITICAL
0
{'CWE-287'}
{'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://www.npmjs.com/advisories/38', 'https://github.com/advisories/GHSA-9vxc-g2jx-qj3p', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
{'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}
{'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}
GHSA
GHSA-x84v-xcm2-53pg
Moderate severity vulnerability that affects requests
The Requests package through 2.19.1 before 2018-09-14 for Python sends an HTTP Authorization header to an http URI upon receiving a same-hostname https-to-http redirect, which makes it easier for remote attackers to discover credentials by sniffing the network.
{'CVE-2018-18074'}
2021-09-21T22:17:47Z
2018-10-29T19:06:46Z
HIGH
7.5
{'CWE-522'}
{'https://usn.ubuntu.com/3790-2/', 'https://github.com/requests/requests/pull/4718', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00024.html', 'https://github.com/requests/requests/issues/4716', 'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff', 'https://usn.ubuntu.com/3790-1/', 'https://bugs.debian.org/910766', 'http://docs.python-requests.org/en/master/community/updates/#release-and-version-history', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18074', 'https://github.com/advisories/GHSA-x84v-xcm2-53pg', 'https://access.redhat.com/errata/RHSA-2019:2035'}
null
{'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff'}
{'https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff'}
GHSA
GHSA-f77h-m9w2-vvg2
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4017'}
2021-12-03T20:38:57Z
2021-12-03T20:38:57Z
HIGH
8.8
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4017', 'https://github.com/advisories/GHSA-f77h-m9w2-vvg2', 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
null
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
GHSA
GHSA-h395-qcrw-5vmq
Inconsistent Interpretation of HTTP Requests in github.com/gin-gonic/gin
This affects all versions of package github.com/gin-gonic/gin under 1.7.0. When gin is exposed directly to the internet, a client's IP can be spoofed by setting the X-Forwarded-For header.
{'CVE-2020-28483'}
2021-06-23T17:53:21Z
2021-06-23T17:53:21Z
HIGH
7.1
{'CWE-113', 'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28483', 'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711', 'https://github.com/advisories/GHSA-h395-qcrw-5vmq', 'https://github.com/gin-gonic/gin/pull/2632', 'https://github.com/gin-gonic/gin/pull/2474%23issuecomment-729696437', 'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMGINGONICGIN-1041736', 'https://github.com/gin-gonic/gin/releases/tag/v1.7.0'}
null
{'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'}
{'https://github.com/gin-gonic/gin/commit/bfc8ca285eb46dad60e037d57c545cd260636711'}
GHSA
GHSA-whr9-vfh2-7hm6
Memory corruption in `DrawBoundingBoxesV2`
### Impact The implementation of `tf.raw_ops.MaxPoolGradWithArgmax` can cause reads outside of bounds of heap allocated data if attacker supplies specially crafted inputs: ```python import tensorflow as tf images = tf.fill([10, 96, 0, 1], 0.) boxes = tf.fill([10, 53, 0], 0.) colors = tf.fill([0, 1], 0.) tf.raw_ops.DrawBoundingBoxesV2(images=images, boxes=boxes, colors=colors) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/31bd5026304677faa8a0b77602c6154171b9aec1/tensorflow/core/kernels/image/draw_bounding_box_op.cc#L116-L130) assumes that the last element of `boxes` input is 4, as required by [the op](https://www.tensorflow.org/api_docs/python/tf/raw_ops/DrawBoundingBoxesV2). Since this is not checked attackers passing values less than 4 can write outside of bounds of heap allocated objects and cause memory corruption: ```cc const auto tboxes = boxes.tensor<T, 3>(); for (int64 bb = 0; bb < num_boxes; ++bb) { ... const int64 min_box_row = static_cast<float>(tboxes(b, bb, 0)) * (height - 1); const int64 max_box_row = static_cast<float>(tboxes(b, bb, 2)) * (height - 1); const int64 min_box_col = static_cast<float>(tboxes(b, bb, 1)) * (width - 1); const int64 max_box_col = static_cast<float>(tboxes(b, bb, 3)) * (width - 1); ... } ``` If the last dimension in `boxes` is less than 4, accesses similar to `tboxes(b, bb, 3)` will access data outside of bounds. Further during code execution there are also writes to these indices. ### Patches We have patched the issue in GitHub commit [79865b542f9ffdc9caeb255631f7c56f1d4b6517](https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29571'}
2021-05-21T14:25:28Z
2021-05-21T14:25:28Z
MODERATE
4.5
{'CWE-787'}
{'https://github.com/advisories/GHSA-whr9-vfh2-7hm6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29571', 'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-whr9-vfh2-7hm6'}
null
{'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517'}
{'https://github.com/tensorflow/tensorflow/commit/79865b542f9ffdc9caeb255631f7c56f1d4b6517'}
GHSA
GHSA-97wf-p777-86jq
Division by zero in TFLite's implementation of Split
### Impact The implementation of the `Split` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e2752089ef7ce9bcf3db0ec618ebd23ea119d0c7/tensorflow/lite/kernels/split.cc#L63-L65): ```cc TF_LITE_ENSURE_MSG(context, input_size % num_splits == 0, "Not an even split"); const int slice_size = input_size / num_splits; ``` An attacker can craft a model such that `num_splits` would be 0. ### Patches We have patched the issue in GitHub commit [b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d](https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-29599'}
2021-05-21T14:28:01Z
2021-05-21T14:28:01Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-97wf-p777-86jq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29599', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97wf-p777-86jq', 'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'}
null
{'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'}
{'https://github.com/tensorflow/tensorflow/commit/b22786e7e9b7bdb6a56936ff29cc7e9968d7bc1d'}
GHSA
GHSA-qmw8-3v4g-gwj4
Prefix escape
### Impact By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is. [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N) ### Patches A patch have been submitted by Corey Farrell git@cfware.com, the reporter. All releases after v4.0.2 include the fix. ### Workarounds There are no workaround available. ### For more information If you have any questions or comments about this advisory: * Open an issue in [fastify-reply-from](https://github.com/fastify/fastify-reply-from) * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-21321'}
2021-03-03T17:50:05Z
2021-03-03T01:52:05Z
CRITICAL
10
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
null
{'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
{'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
GHSA
GHSA-h9mj-fghc-664w
Denial of Service in mqtt
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. ## Proof of Concept The following is a demonstration of how to generate the malicious packet sequence, but does not include information on handling the initial network connections and MQTT overhead. ``` var mqttp = require('mqtt-packet'); var packets = []; for(var i=0; i<=1000;i++){ packets.push( mqttp.generate({ cmd:'publish', topic:Buffer.from('hello'), payload:Buffer.from('world'), retain: false, dup: false, messageId: ++i, qos: 1 }) ) } ``` ## Recommendation Update to version 2.15.0 or later.
{'CVE-2017-10910'}
2021-09-14T17:16:40Z
2017-12-28T22:51:58Z
MODERATE
6.5
{'CWE-674'}
{'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923', 'https://jvn.jp/en/jp/JVN45494523/index.html', 'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://github.com/mqttjs/MQTT.js/releases/tag/v2.15.0', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json'}
null
{'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}
{'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}
GHSA
GHSA-v592-xf75-856p
Erroneous Proof of Work calculation in geth
### Impact An ethash mining DAG generation flaw in Geth could cause miners to erroneously calculate PoW in an upcoming epoch (estimated early January, 2021). This happened on the ETC chain on 2020-11-06. This issue is relevant only for miners, non-mining nodes are unaffected. ### Patches This issue is also fixed as of 1.9.24. Thanks to @slavikus for bringing the issue to our attention and writing the fix. ### For more information If you have any questions or comments about this advisory: * Open an issue in [go-ethereum](https://github.com/ethereum/go-ethereum) * Email us at [security@ethereum.org](mailto:security@ethereum.org)
{'CVE-2020-26240'}
2022-04-19T19:02:40Z
2021-06-29T21:12:56Z
MODERATE
5.3
{'CWE-682'}
{'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0', 'https://github.com/ethereum/go-ethereum/security/advisories/GHSA-v592-xf75-856p', 'https://blog.ethereum.org/2020/11/12/geth_security_release/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26240', 'https://github.com/ethereum/go-ethereum/pull/21793', 'https://github.com/advisories/GHSA-v592-xf75-856p'}
null
{'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'}
{'https://github.com/ethereum/go-ethereum/commit/d990df909d7839640143344e79356754384dcdd0'}
GHSA
GHSA-4cx6-fj7j-pjx9
Code injection in Stripe CLI on windows
### Impact A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addresses the vulnerability by throwing an error in these situations before the code can run. There has been no evidence of exploitation of this vulnerability. ### Recommendation Upgrade to Stripe CLI v1.7.13. ### Acknowledgments Thanks to [trungpabc](https://hackerone.com/trungpabc) for reporting the issue. ### For more information Email us at [security@stripe.com](mailto:security@stripe.com).
{'CVE-2022-24753'}
2022-03-18T21:10:50Z
2022-03-10T18:17:50Z
HIGH
7.7
{'CWE-78'}
{'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd', 'https://github.com/advisories/GHSA-4cx6-fj7j-pjx9', 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24753'}
null
{'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'}
{'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'}
GHSA
GHSA-356r-77q8-f64f
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1
{'CVE-2021-3819'}
2021-10-04T13:58:41Z
2021-09-29T17:12:37Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/advisories/GHSA-356r-77q8-f64f', 'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
GHSA
GHSA-5w9c-rv96-fr7g
Removal of functional code in faker.js
Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/GHSA-gh88-3pxp-6fm8). The functional code for this package was forked and can be found [here](https://github.com/faker-js/faker).
null
2022-03-23T16:01:20Z
2022-03-22T19:28:24Z
HIGH
0
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://github.com/advisories/GHSA-5w9c-rv96-fr7g', 'https://www.npmjs.com/package/faker', 'https://www.npmjs.com/package/@faker-js/faker', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://snyk.io/vuln/SNYK-JS-COLORS-2331906'}
null
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
GHSA
GHSA-v7wg-cpwc-24m4
Unchecked Class Instantiation when providing Plugin Classes
pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The first impacted version is REL9.4.1208 (it introduced `socketFactory` connection property).
{'CVE-2022-21724'}
2022-04-17T16:42:44Z
2022-02-02T00:04:20Z
HIGH
7
{'CWE-665', 'CWE-668', 'CWE-74'}
{'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://github.com/advisories/GHSA-v7wg-cpwc-24m4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724'}
null
{'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}
{'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}
GHSA
GHSA-738m-f33v-qc2r
SMTP Injection in PHPMailer
### Impact Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts. ### Patches Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0). ### Workarounds Manually strip line breaks from email addresses before passing them to PHPMailer. ### References https://nvd.nist.gov/vuln/detail/CVE-2015-8476 ### For more information If you have any questions or comments about this advisory: * Open a private issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)
{'CVE-2015-8476'}
2021-08-19T19:39:12Z
2020-03-05T22:09:19Z
LOW
0
{'CWE-20'}
{'https://github.com/advisories/GHSA-738m-f33v-qc2r', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0', 'http://www.openwall.com/lists/oss-security/2015/12/05/1', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://www.debian.org/security/2015/dsa-3416', 'http://www.openwall.com/lists/oss-security/2015/12/04/5', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.14', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-738m-f33v-qc2r', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpmailer/phpmailer/CVE-2015-8476.yaml', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177139.html'}
null
{'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
{'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
GHSA
GHSA-mmj4-777p-fpq9
Validation bypass in frourio-express
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformerを使用してチェックする、vaildatorを使わない、など。 ### さらなる情報 このセキュリティ勧告に関する質問やコメントについては、以下の方法でお問い合わせいただけます。 * [frourio](https://github.com/frouriojs/frourio)にIssueを開く。 ## English ### Impact Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder. Validators does not work properly for request bodies and queries in specific situations. Addtionally, some kind of input is not validated. (false positives) ### Patches Please update your frourio to v0.26.0 or later. You also need to install `class-transformer` and `reflect-metadata` to your project. ### Workarounds Validate objects from request with class-transformer in controllers by yourself, or prevent using validators. ### For more information If you have any questions or comments about this advisory: * Open an issue in [frourio](https://github.com/frouriojs/frourio)
{'CVE-2022-23624'}
2022-04-19T19:03:22Z
2022-02-07T22:38:37Z
HIGH
8.1
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
null
{'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
{'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
GHSA
GHSA-q97v-764g-r2rp
High severity vulnerability that affects gollum and gollum-lib
The gollum-grit_adapter Ruby gem dependency in gollum before 3.1.1 and the gollum-lib gem dependency in gollum-lib before 4.0.1 when the string "master" is in any of the wiki documents, allows remote authenticated users to execute arbitrary code via the -O or --open-files-in-pager flags.
{'CVE-2014-9489'}
2021-09-16T19:42:57Z
2017-11-16T01:47:37Z
HIGH
8.8
{'CWE-284'}
{'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7', 'https://github.com/gollum/gollum/issues/913', 'https://github.com/advisories/GHSA-q97v-764g-r2rp', 'http://www.securityfocus.com/bid/71499', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9489', 'http://www.openwall.com/lists/oss-security/2015/01/03/19'}
null
{'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}
{'https://github.com/gollum/grit_adapter/commit/4520d973c81fecfebbeacd2ef2f1849d763951c7'}
GHSA
GHSA-4vmm-mhcq-4x9j
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution. ## Recommendation Update to version 3.1.1 or later.
null
2021-08-16T16:06:39Z
2019-06-14T16:15:14Z
CRITICAL
10
null
{'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://snyk.io/vuln/npm:constantinople:20180421', 'https://www.npmjs.com/advisories/568', 'https://nodesecurity.io/advisories/568', 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703', 'https://github.com/advisories/GHSA-4vmm-mhcq-4x9j'}
null
{'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}
{'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}
GHSA
GHSA-q65m-pv3f-wr5r
XSS in Bleach when noscript and raw tag whitelisted
### Impact A [mutation XSS](https://cure53.de/fp170.pdf) affects users calling `bleach.clean` with `noscript` and a raw tag (see below) in the allowed/whitelisted tags option. ### Patches v3.1.1 ### Workarounds * modify `bleach.clean` calls to not whitelist `noscript` and one or more of the following raw tags: ``` title textarea script style noembed noframes iframe xmp ``` * A strong [Content-Security-Policy](https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP) without `unsafe-inline` and `unsafe-eval` [`script-src`s](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/script-src)) will also help mitigate the risk. ### References * https://bugzilla.mozilla.org/show_bug.cgi?id=1615315 * https://cure53.de/fp170.pdf * https://nvd.nist.gov/vuln/detail/CVE-2020-6802 * https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach ### Credits * Reported by [Yaniv Nizry](https://twitter.com/ynizry) from the CxSCA AppSec group at Checkmarx ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/mozilla/bleach/issues](https://github.com/mozilla/bleach/issues) * Email us at [security@mozilla.org](mailto:security@mozilla.org)
{'CVE-2020-6802'}
2021-08-19T17:32:15Z
2020-02-24T17:33:44Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-q65m-pv3f-wr5r', 'https://bugzilla.mozilla.org/show_bug.cgi?id=1615315', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6802', 'https://github.com/mozilla/bleach/security/advisories/GHSA-q65m-pv3f-wr5r', 'https://www.checkmarx.com/blog/vulnerabilities-discovered-in-mozilla-bleach', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YTULPQB7HVPPYWEYVNHJGDTSPVIDHIZX/', 'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCNLM2MGQTOLCIVVYS2Z5S7KOQJR5JC4/', 'https://cure53.de/fp170.pdf', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/72R4VFFHDRSQMNT7IZU3X2755ZP4HGNI/', 'https://advisory.checkmarx.net/advisory/CX-2020-4276'}
null
{'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'}
{'https://github.com/mozilla/bleach/commit/f77e0f6392177a06e46a49abd61a4d9f035e57fd'}
GHSA
GHSA-g25h-jr74-qp5j
Incomplete validation in `QuantizeV2`
### Impact Due to incomplete validation in `tf.raw_ops.QuantizeV2`, an attacker can trigger undefined behavior via binding a reference to a null pointer or can access data outside the bounds of heap allocated arrays: ```python import tensorflow as tf tf.raw_ops.QuantizeV2( input=[1,2,3], min_range=[1,2], max_range=[], T=tf.qint32, mode='SCALED', round_mode='HALF_AWAY_FROM_ZERO', narrow_range=False, axis=1, ensure_minimum_range=3) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/quantize_op.cc#L59) has some validation but does not check that `min_range` and `max_range` both have the same non-zero number of elements. If `axis` is provided (i.e., not `-1`), then validation should check that it is a value in range for the rank of `input` tensor and then the lengths of `min_range` and `max_range` inputs match the `axis` dimension of the `input` tensor. ### Patches We have patched the issue in GitHub commit [6da6620efad397c85493b8f8667b821403516708](https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37663'}
2021-08-25T14:42:23Z
2021-08-25T14:42:23Z
HIGH
7.8
{'CWE-20'}
{'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37663', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g25h-jr74-qp5j', 'https://github.com/advisories/GHSA-g25h-jr74-qp5j'}
null
{'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}
{'https://github.com/tensorflow/tensorflow/commit/6da6620efad397c85493b8f8667b821403516708'}
GHSA
GHSA-m2q3-53fq-7h66
Moderate severity vulnerability that affects gollum
The Precious module in gollum before 4.0.1 allows remote attackers to read arbitrary files by leveraging the lack of a certain temporary-file check.
{'CVE-2015-7314'}
2021-09-14T22:05:23Z
2018-08-28T22:33:51Z
MODERATE
0
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-7314', 'https://github.com/gollum/gollum/issues/1070', 'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1', 'http://jvn.jp/en/jp/JVN27548431/index.html', 'https://github.com/advisories/GHSA-m2q3-53fq-7h66', 'http://jvndb.jvn.jp/jvndb/JVNDB-2015-000149', 'http://www.openwall.com/lists/oss-security/2015/09/22/12'}
null
{'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'}
{'https://github.com/gollum/gollum/commit/ce68a88293ce3b18c261312392ad33a88bb69ea1'}
GHSA
GHSA-gpfj-4j6g-c4w9
Clipboard-based DOM-XSS
### Impact A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of JavaScript in the browser of the victim (the user who pasted the code). Users directed to copy text from a malicious website and paste it into pages that utilize this library are affected. The following @github/paste-markdown code snippet is triggered when the user pastes something and the browser's clipboard data contains an entry whose content-type is **text/HTML**. ```typescript function generateText(transfer: DataTransfer): string | undefined { if (Array.from(transfer.types).indexOf('text/html') === -1) return let html = transfer.getData('text/html') if (!/<table/i.test(html)) return html = html.replace(/<meta.*?>/, '') const el = document.createElement('div') el.innerHTML = html const tables = el.querySelectorAll('table') for (const table of tables) { if (table.closest('[data-paste-markdown-skip]')) { table.replaceWith(new Text(table.textContent || '')) } const formattedTable = tableMarkdown(table) table.replaceWith(new Text(formattedTable)) } return el.innerHTML } ``` ### Patches A security patch was released in [version 0.3.4](https://github.com/github/paste-markdown/releases/tag/v0.3.4). ### Workarounds A Content Security Policy that prevents `unsafe-inline` helps reduce the likelihood of this vulnerability being exploited in modern browsers. <!-- ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [example link to repo](http://example.com) * Email us at [example email address](mailto:example@example.com) * -->
{'CVE-2021-37700'}
2022-04-19T19:03:05Z
2021-08-12T20:42:17Z
MODERATE
6.5
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37700', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4', 'https://github.com/advisories/GHSA-gpfj-4j6g-c4w9', 'https://github.com/github/paste-markdown/security/advisories/GHSA-gpfj-4j6g-c4w9', 'https://www.npmjs.com/package/@github/paste-markdown'}
null
{'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'}
{'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'}
GHSA
GHSA-hfvc-g252-rp4g
Denial of Service in i18n
This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs.
{'CVE-2020-7791'}
2021-05-10T15:32:30Z
2020-12-14T19:50:22Z
MODERATE
7.5
{'CWE-20', 'CWE-400'}
{'https://lists.apache.org/thread.html/rc850d0fce066f9eb9e8553172d9207bad7df4d2059d93abc5c7e85c4@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7791', 'https://snyk.io/vuln/SNYK-DOTNET-I18N-1050179', 'https://lists.apache.org/thread.html/r1573c58dc283b05f7a40a3f5ff0079b5bbde0492d406ee0fe98d40b6@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra5047392edf1fecba441c9adc8807ed6c5f7d2cc71f2f3bb89f35371@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-hfvc-g252-rp4g', 'https://github.com/turquoiseowl/i18n/issues/387', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9744574911e7e4edf5f4eeae92a4ccc83e3723cec937950062bb8775@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3', 'https://lists.apache.org/thread.html/rc2abba7aa0450198494bbee654fce9b97fad72a4989323e189faede4@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r394b1ae54693609a60ea8aab02ff045dc92f593aa3aebff562e69958@%3Ccommits.druid.apache.org%3E'}
null
{'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'}
{'https://github.com/turquoiseowl/i18n/commit/c418e3345313dc896c1951d8c46ab0b9b12fcbd3'}
GHSA
GHSA-pxcf-v868-m492
Injection and Cross-site Scripting in osm-static-maps
This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which gives opportunity for XSS or rendered on the server (puppeteer) which also gives opportunity for SSRF and Local File Read.
{'CVE-2020-7749'}
2021-08-02T15:31:50Z
2021-05-10T18:43:45Z
HIGH
7.6
{'CWE-74', 'CWE-79'}
{'https://github.com/advisories/GHSA-pxcf-v868-m492', 'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/pull/24', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7749'}
null
{'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'}
{'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'}
GHSA
GHSA-jgpq-g82g-6c39
confinit vulnerable to prototype pollution
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7638'}
2021-07-28T23:16:45Z
2020-04-07T15:52:05Z
MODERATE
5.3
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://github.com/advisories/GHSA-jgpq-g82g-6c39'}
null
{'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
{'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
GHSA
GHSA-jjhw-5mxp-2g2q
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.
{'CVE-2021-25933'}
2021-05-28T22:27:51Z
2021-05-25T18:47:01Z
MODERATE
4.8
{'CWE-79'}
{'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.com/advisories/GHSA-jjhw-5mxp-2g2q', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}
null
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,'}
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'}
GHSA
GHSA-gvcj-pfq2-wxj7
High severity vulnerability that affects electron
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
{'CVE-2016-1202'}
2021-09-13T12:46:47Z
2017-10-24T18:33:35Z
HIGH
7.8
{'CWE-426'}
{'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7', 'https://github.com/electron/electron/pull/2976', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'http://jvn.jp/en/jp/JVN00324715/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1202'}
null
{'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}
{'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}
GHSA
GHSA-mh3m-8c74-74xh
Denial of Service in graphql-go
### Impact This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. To make things worse the only mitigation in affected versions creates opportunities for other attacks. This issue is only available if you are using `graphql.MaxDepth` option in your schema (which is highly recommended in most cases). ### Patches The issue has been patched in version `v1.3.0`. We have been trying to maintain backwards compatibility and avoid breaking changes so upgrading should not be problematic. ### Workarounds The best workaround is to patch to a version greater than or equal to `v1.3.0`. Otherwise, the only workaround in versions prior to `v1.3.0` is to disable the `graphql.MaxDepth` option from your schema. Unfortunately, this could potentially create opportunities for other attacks. ### References There are no references or links. This issue was reported privately and was fixed before creating this Security Advisory. ### For more information If you have any questions or comments feel free to reach out to @pavelnikolov or @tony on the Gopher Slack.
{'CVE-2022-21708'}
2022-04-19T19:03:20Z
2022-01-27T15:28:06Z
MODERATE
6.5
{'CWE-400'}
{'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh', 'https://github.com/advisories/GHSA-mh3m-8c74-74xh', 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21708'}
null
{'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'}
{'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'}
GHSA
GHSA-6w5m-jgc5-8cgc
orchardcore is vulnerable to Cross-site Scripting
orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2022-0159'}
2022-01-21T23:57:49Z
2022-01-21T23:57:49Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/00937280-e2ab-49fe-8d43-8235b3c3db4b', 'https://github.com/advisories/GHSA-6w5m-jgc5-8cgc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159', 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}
null
{'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}
{'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}
GHSA
GHSA-6q5w-m3c5-rv95
Data races in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor.
{'CVE-2020-35866'}
2021-08-25T20:47:59Z
2021-08-25T20:47:59Z
CRITICAL
9.8
{'CWE-362'}
{'https://github.com/rusqlite/rusqlite/releases/tag/0.23.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35866', 'https://rustsec.org/advisories/RUSTSEC-2020-0014.html', 'https://github.com/advisories/GHSA-6q5w-m3c5-rv95', 'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'}
null
{'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'}
{'https://github.com/rusqlite/rusqlite/commit/c9ef5bd63cad5c0c123344c072b490a1a9bcbe1f'}
GHSA
GHSA-cf36-985g-v73c
Moderate severity vulnerability that affects omniauth-facebook
The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.
{'CVE-2013-4562'}
2021-09-08T22:01:45Z
2017-10-24T18:33:37Z
MODERATE
0
{'CWE-352'}
{'https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ', 'https://github.com/advisories/GHSA-cf36-985g-v73c', 'http://seclists.org/oss-sec/2013/q4/267', 'http://www.osvdb.org/99693', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4562', 'http://seclists.org/oss-sec/2013/q4/264', 'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7', 'http://osvdb.org/ref/99/omniauth-facebook_gem.txt'}
null
{'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'}
{'https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7'}
GHSA
GHSA-4286-h47h-m5v6
Improper Authentication in showdoc
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
{'CVE-2021-41745'}
2021-10-28T17:10:57Z
2021-10-25T19:43:24Z
HIGH
0
{'CWE-287', 'CWE-434'}
{'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability', 'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/advisories/GHSA-4286-h47h-m5v6'}
null
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
GHSA
GHSA-6fmv-q269-55cw
Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit template. Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security/20201029 Found by Aquilao Null
{'CVE-2020-15277'}
2022-04-19T19:02:38Z
2020-10-30T17:05:59Z
HIGH
7.2
{'CWE-434', 'CWE-74'}
{'https://basercms.net/security/20201029', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://github.com/advisories/GHSA-6fmv-q269-55cw'}
null
{'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
{'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
GHSA
GHSA-557g-r22w-9wvx
Incorrect Permission Assignment for Critical Resource in Singularity
An issue was discovered in Singularity 3.1.0 to 3.2.0-rc2, a malicious user with local/network access to the host system (e.g. ssh) could exploit this vulnerability due to insecure permissions allowing a user to edit files within `/run/singularity/instances/sing/<user>/<instance>`. The manipulation of those files can change the behavior of the starter-suid program when instances are joined resulting in potential privilege escalation on the host.
{'CVE-2019-11328'}
2021-12-20T18:25:33Z
2021-12-20T18:25:33Z
HIGH
8.8
{'CWE-269'}
{'http://www.openwall.com/lists/oss-security/2019/05/16/1', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LNU5BUHFOTYUZVHFUSX2VG4S3RCPUEMA/', 'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31', 'http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00028.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LIHV7DSEVTB5SUPEZ2UXGS3Q6WMEQSO2/', 'https://github.com/sylabs/singularity/releases/tag/v3.2.0', 'http://www.securityfocus.com/bid/108360', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00059.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11328', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5O3TPL5OOTIZEI4H6IQBCCISBARJ6WL3/', 'https://github.com/advisories/GHSA-557g-r22w-9wvx'}
null
{'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}
{'https://github.com/sylabs/singularity/commit/618c9d56802399adb329c23ea2b70598eaff4a31'}
GHSA
GHSA-vrxp-mg9f-hwf3
Improperly Implemented path matching for in-toto-golang
### Impact Authenticated attackers posing as functionaries (i.e., within a trusted set of users for a layout) are able to create attestations that may bypass DISALLOW rules in the same layout. An attacker with access to trusted private keys, may issue an attestation that contains a disallowed artifact by including path traversal semantics (e.g., foo vs dir/../foo). ### Patches The problem has been fixed in version 0.3.0. ### Workarounds Exploiting this vulnerability is dependent on the specific policy applied. ### For more information If you have any questions or comments about this advisory: * Open an issue in [in-toto-golang](http://github.com/in-toto/in-toto-golang) * Email us at [in-toto-public](mailto:in-toto-public@googlegroups.com) * If this is a sensitive security-relevant disclosure, please send a PGP encrypted email to santiagotorres@purdue.edu or jcappos@nyu.edu
{'CVE-2021-41087'}
2022-04-19T19:03:09Z
2021-09-22T20:37:09Z
MODERATE
5.6
{'CWE-22', 'CWE-345'}
{'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290', 'https://github.com/in-toto/in-toto-golang/security/advisories/GHSA-vrxp-mg9f-hwf3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41087', 'https://github.com/advisories/GHSA-vrxp-mg9f-hwf3'}
null
{'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'}
{'https://github.com/in-toto/in-toto-golang/commit/f2c57d1e0f15e3ffbeac531829c696b72ecc4290'}
GHSA
GHSA-55j9-849x-26h4
Remote Code Execution in Red Discord Bot
### Impact A RCE exploit has been discovered in the Trivia module: this exploit allows Discord users with specifically crafted usernames to inject code into the Trivia module's leaderboard command. By abusing this exploit, it's possible to perform destructive actions and/or access sensitive information. ### Patches This critical exploit has been fixed on version 3.3.11. ### Workarounds Unloading the Trivia module with ``unload trivia`` can render this exploit not accessible. We still highly recommend updating to 3.3.11 to completely patch this issue. ### References https://github.com/Cog-Creators/Red-DiscordBot/pull/4175 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Cog-Creators/Red-DiscordBot](https://github.com/Cog-Creators/Red-DiscordBot) * Over on our [Discord server](https://discord.gg/red)
{'CVE-2020-15140'}
2022-04-19T19:02:32Z
2020-08-21T16:30:52Z
HIGH
8.2
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15140', 'https://github.com/advisories/GHSA-55j9-849x-26h4', 'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81', 'https://github.com/Cog-Creators/Red-DiscordBot/security/advisories/GHSA-55j9-849x-26h4'}
null
{'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'}
{'https://github.com/Cog-Creators/Red-DiscordBot/pull/4175/commits/9ab536235bafc2b42c3c17d7ce26f1cc64482a81'}
GHSA
GHSA-7w54-gp8x-f33m
Potential exposure of tokens to an Unauthorized Actor
### Impact When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication done to the previous URL could potentially reach a server that is outside of Replit's control and the token used to connect to the Repl could be obtained by an attacker, leading to full compromise of that Repl (not of the account). ### Patches This was patched in 7.3.1, by updating the address of the fallback WebSocket polling proxy to the new one. ### Workarounds Specify the new address for the polling host (`gp-v2.replit.com`) in the `ConnectArgs`: ```typescript const connectOptions: ConnectArgs = { // ... pollingHost: 'gp-v2.replit.com', }; client.connect(connectOptions); ``` ### For more information Thanks to https://hackerone.com/orlserg for disclosing this. If you have any questions or comments about this advisory: * Open an issue in [replit/crosis](https://github.com/replit/crosis) * Email us at [security@replit.com](mailto:security@replit.com)
{'CVE-2022-21671'}
2022-01-25T17:03:48Z
2022-01-12T22:44:47Z
HIGH
0
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21671', 'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://github.com/advisories/GHSA-7w54-gp8x-f33m'}
null
{'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'}
{'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'}
GHSA
GHSA-jmhf-9fj8-88gh
Open Redirect in AllTube
### Impact Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain. ### Patches 3.0.1 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) ### References * https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a * https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203/ * https://nvd.nist.gov/vuln/detail/CVE-2022-0692
{'CVE-2022-0692'}
2022-04-19T19:03:24Z
2022-02-23T21:15:01Z
MODERATE
6.1
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/advisories/GHSA-jmhf-9fj8-88gh'}
null
{'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
{'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
GHSA
GHSA-c53v-qmrx-93hg
Open redirect in shopware
### Impact Arbitrary redirect while using certain URLs ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.html ### References https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022
{'CVE-2022-21651'}
2022-01-06T23:49:19Z
2022-01-06T23:49:19Z
MODERATE
6.8
{'CWE-601'}
{'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/advisories/GHSA-c53v-qmrx-93hg', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
null
{'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
{'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
GHSA
GHSA-rpg7-q4cv-p466
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4123'}
2022-01-04T18:52:37Z
2021-12-17T20:00:16Z
MODERATE
6.5
{'CWE-352'}
{'https://github.com/advisories/GHSA-rpg7-q4cv-p466', 'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}
{'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}
GHSA
GHSA-6hwh-rqwf-cxxr
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util
vega-util prior to 1.13.1 allows manipulation of object prototype. The &#39;vega.mergeConfig&#39; method within vega-util could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10806'}
2021-07-28T18:36:57Z
2021-05-07T16:32:02Z
MODERATE
4.3
{'CWE-20', 'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10806', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223', 'https://github.com/advisories/GHSA-6hwh-rqwf-cxxr'}
null
{'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'}
{'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'}
GHSA
GHSA-9m6j-fcg5-2442
Path traversal in url-parse
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
{'CVE-2021-27515'}
2021-05-06T16:31:23Z
2021-05-06T16:10:51Z
HIGH
5.3
{'CWE-23'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://advisory.checkmarx.net/advisory/CX-2021-4306', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://github.com/unshiftio/url-parse/pull/197', 'https://github.com/advisories/GHSA-9m6j-fcg5-2442'}
null
{'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'}
{'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'}
GHSA
GHSA-q4qf-3fc6-8x34
Segfault and data corruption in tensorflow-lite
### Impact To mimic Python's indexing with negative values, TFLite uses `ResolveAxis` to convert negative values to positive indices. However, the only check that the converted index is now valid is only present in debug builds: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/lite/kernels/internal/reference/reduce.h#L68-L72 If the `DCHECK` does not trigger, then code execution moves ahead with a negative index. This, in turn, results in accessing data out of bounds which results in segfaults and/or data corruption. ### Patches We have patched the issue in 2d88f470dea2671b430884260f3626b1fe99830a and will release patch releases for all versions between 1.15 and 2.3. We recommend users to upgrade to TensorFlow 1.15.4, 2.0.3, 2.1.2, 2.2.1, or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15207'}
2021-11-19T15:11:40Z
2020-09-25T18:28:43Z
HIGH
8.7
{'CWE-119', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q4qf-3fc6-8x34', 'https://github.com/advisories/GHSA-q4qf-3fc6-8x34', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15207', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'}
{'https://github.com/tensorflow/tensorflow/commit/2d88f470dea2671b430884260f3626b1fe99830a'}
GHSA
GHSA-hwch-749c-rv63
Potential Command Injection in hubot-scripts
Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module. ### Mitigating Factors The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts. ## Recommendation Update hubot-scripts to version 2.4.4 or later.
{'CVE-2013-7378'}
2021-04-12T21:34:55Z
2020-08-31T22:46:38Z
CRITICAL
9.8
{'CWE-74'}
{'https://www.npmjs.com/advisories/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7378', 'https://web.archive.org/web/20140731222413/', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'https://github.com/advisories/GHSA-hwch-749c-rv63', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'https://', 'http://www.openwall.com/lists/oss-security/2014/05/15/2'}
null
{'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'}
{'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'}
GHSA
GHSA-8vv3-jxm8-f4vf
Prototype Pollution in connie-lang
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.
{'CVE-2020-7706'}
2021-07-29T22:00:16Z
2021-05-06T17:29:25Z
CRITICAL
9.8
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7706', 'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853', 'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a', 'https://github.com/advisories/GHSA-8vv3-jxm8-f4vf'}
null
{'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'}
{'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'}
GHSA
GHSA-5w65-6875-rhq8
Undefined Behavior in sailsjs-cacheman
All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2021-09-21T17:05:45Z
2019-09-11T23:01:57Z
LOW
0
null
{'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://www.npmjs.com/advisories/752', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f', 'https://github.com/advisories/GHSA-5w65-6875-rhq8'}
null
{'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
{'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
GHSA
GHSA-9x4c-63pf-525f
Arbitrary Code Generation
### Impact Clients generated with a maliciously crafted OpenAPI Document can generate arbitrary Python code. Subsequent execution of this malicious client is arbitrary code execution. Giving this a CVSS of 8.0 (high) with CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:P/RL:U/RC:C . ### Patches Fix will be included in version 0.5.3 ### Workarounds Inspect OpenAPI documents before generating, or inspect generated code before executing. ### For more information If you have any questions or comments about this advisory: * Open an issue in [openapi-python-client](https://github.com/triaxtec/openapi-python-client/issues) * Email us at [danthony@triaxtec.com](mailto:danthony@triaxtec.com)
{'CVE-2020-15142'}
2022-04-19T19:02:33Z
2020-08-20T14:38:24Z
HIGH
8
{'CWE-94'}
{'https://github.com/triaxtec/openapi-python-client/blob/main/CHANGELOG.md#053---2020-08-13', 'https://github.com/triaxtec/openapi-python-client/security/advisories/GHSA-9x4c-63pf-525f', 'https://github.com/advisories/GHSA-9x4c-63pf-525f', 'https://pypi.org/project/openapi-python-client/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15142', 'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'}
null
{'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'}
{'https://github.com/triaxtec/openapi-python-client/commit/f7a56aae32cba823a77a84a1f10400799b19c19a'}
GHSA
GHSA-q3x2-jvp3-wj78
Unrestricted XML files leading to cross-site scripting in Microweber
Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack.
{'CVE-2022-0963'}
2022-03-29T21:18:46Z
2022-03-16T00:00:47Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://github.com/advisories/GHSA-q3x2-jvp3-wj78', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'}
null
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}
GHSA
GHSA-98pq-pmw9-4gpm
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2016-10550'}
2021-01-08T19:05:38Z
2019-02-18T23:54:34Z
HIGH
0
{'CWE-89'}
{'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://nodesecurity.io/advisories/112'}
null
{'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03'}
{'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03'}
GHSA
GHSA-w8h4-vw8f-rvvj
Improper Control of Dynamically-Managed Code Resources in config-shield
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.
{'CVE-2021-26276'}
2022-04-27T20:27:31Z
2021-04-13T15:30:09Z
MODERATE
5.3
{'CWE-913'}
{'https://github.com/advisories/GHSA-w8h4-vw8f-rvvj', 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://advisory.checkmarx.net/advisory/CX-2021-4773', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'}
null
{'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}
{'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}
GHSA
GHSA-wvcv-832q-fjg7
RSA weakness in tslite-ng
### Impact The code that performs decryption and padding check in RSA PKCS#1 v1.5 decryption is data dependant. In particular, code in current (as of 0.8.0-alpha38) master https://github.com/tlsfuzzer/tlslite-ng/blob/0812ed60860fa61a6573b2c0e18771414958f46d/tlslite/utils/rsakey.py#L407-L441 and code in 0.7.5 branch https://github.com/tlsfuzzer/tlslite-ng/blob/acdde3161124d6ae37c506b3476aea9996d12e97/tlslite/utils/rsakey.py#L394-L425 has multiple ways in which it leaks information (for one, it aborts as soon as the plaintext doesn't start with 0x00, 0x02) about the decrypted ciphertext (both the bit length of the decrypted message as well as where the first unexpected byte lays). All TLS servers that enable RSA key exchange as well as applications that use the RSA decryption API directly are vulnerable. All previous versions of tlslite-ng are vulnerable. ### Patches The patches to fix it are proposed in https://github.com/tlsfuzzer/tlslite-ng/pull/438 https://github.com/tlsfuzzer/tlslite-ng/pull/439 Note: the patches depend on Python processing the individual bytes in side-channel free manner, this is known to not be the case: https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/ As such, users that require side-channel resistance are recommended to use different TLS implementations, as stated in the [security policy](https://github.com/tlsfuzzer/tlslite-ng/blob/master/SECURITY.md) of tlslite-ng. ### Workarounds There is no way to workaround this issue. ### References https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/ ### For more information If you have any questions or comments about this advisory please open an issue in [tlslite-ng](https://github.com/tlsfuzzer/tlslite-ng/issues).
{'CVE-2020-26263'}
2022-04-19T19:02:42Z
2020-12-21T16:56:37Z
LOW
7.5
{'CWE-326'}
{'https://github.com/tlsfuzzer/tlslite-ng/pull/439', 'https://pypi.org/project/tlslite-ng/', 'https://securitypitfalls.wordpress.com/2018/08/03/constant-time-compare-in-python/', 'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26263', 'https://github.com/tlsfuzzer/tlslite-ng/security/advisories/GHSA-wvcv-832q-fjg7', 'https://github.com/tlsfuzzer/tlslite-ng/pull/438', 'https://github.com/advisories/GHSA-wvcv-832q-fjg7'}
null
{'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368'}
{'https://github.com/tlsfuzzer/tlslite-ng/commit/c28d6d387bba59d8bd5cb3ba15edc42edf54b368'}
GHSA
GHSA-2mm9-c2fx-c7m4
XSS in docsify
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) The isURL external check can be bypassed by inserting more “////” characters
{'CVE-2021-23342'}
2021-03-15T23:55:40Z
2021-03-01T19:44:27Z
HIGH
0
{'CWE-79'}
{'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://github.com/advisories/GHSA-2mm9-c2fx-c7m4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'https://snyk.io/vuln/SNYK-JS-DOCSIFY-1066017', 'https://www.npmjs.com/package/docsify'}
null
{'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'}
{'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'}
GHSA
GHSA-9w2p-5mgw-p94c
Integer overflow due to conversion to unsigned
### Impact The implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` is vulnerable to an integer overflow issue caused by converting a signed integer value to an unsigned one and then allocating memory based on this value. ```python import tensorflow as tf tf.raw_ops.QuantizeAndDequantizeV4Grad( gradients=[1.0,2.0], input=[1.0,1.0], input_min=[0.0], input_max=[10.0], axis=-100) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L126) uses the `axis` value as the size argument to `absl::InlinedVector` constructor. But, the constructor uses an unsigned type for the argument, so the implicit conversion transforms the negative value to a large integer. ### Patches We have patched the issue in GitHub commit [96f364a1ca3009f98980021c4b32be5fdcca33a1](https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, and TensorFlow 2.4.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37645'}
2021-08-25T14:43:37Z
2021-08-25T14:43:37Z
MODERATE
5.5
{'CWE-681'}
{'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9w2p-5mgw-p94c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37645', 'https://github.com/advisories/GHSA-9w2p-5mgw-p94c'}
null
{'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'}
{'https://github.com/tensorflow/tensorflow/commit/96f364a1ca3009f98980021c4b32be5fdcca33a1'}
GHSA
GHSA-3227-r97m-8j95
Relative Path Traversal in afire serve_static
### Impact This vulnerability effects the built-in afire serve_static extension allowing paths containing `//....` to bypass the previous path sanitation and request files in higher directories that should not be accessible. ### Patches The issue has been fixed in [afire 1.1.0](https://crates.io/crates/afire/1.1.0). If you can, just update to the newest version of afire. ### Workarounds If you can't update afire you can simply disallow paths containing `/..` with the following middleware. Make sure this is the last middleware added to the server so it runs first, stopping the bad requests. ```rust use afire::prelude::*; struct PathTraversalFix; impl Middleware for PathTraversalFix { fn pre(&self, req: Request) -> MiddleRequest { if req.path.replace("\\", "/").contains("/..") { return MiddleRequest::Send( Response::new() .status(400) .text("Paths containing `..` are not allowed"), ); } MiddleRequest::Continue } } ``` ```rust let mut server = Server::new(host, port); PathTraversalFix.attach(&mut server); ``` ### References You can read about the new changes to afire in 1.1.0 [here](https://connorcode.com/writing/afire/update-3) ### For more information If you have any questions or comments about this advisory you can email me or message me on discord. [[https://connorcode.com/contact](https://connorcode.com/contact)]
null
2022-04-22T20:16:47Z
2022-04-22T20:16:45Z
HIGH
0
{'CWE-22', 'CWE-34'}
{'https://github.com/Basicprogrammer10/afire/security/advisories/GHSA-3227-r97m-8j95', 'https://github.com/Basicprogrammer10/afire/releases/tag/v1.1.0', 'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921', 'https://github.com/advisories/GHSA-3227-r97m-8j95'}
null
{'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921'}
{'https://github.com/Basicprogrammer10/afire/commit/da7904c04f82e1cb43cc42eaf6a1dba072b5c921'}
GHSA
GHSA-9pgx-gcph-mpqr
XSS via the history parameter in SQL command
### Impact Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected. ### Patches Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9). ### Workarounds Use browser which encodes URL parameters (e.g. Chrome or Firefox). ### References https://sourceforge.net/p/adminer/bugs-and-features/775/ ### For more information If you have any questions or comments about this advisory: * Comment at https://sourceforge.net/p/adminer/bugs-and-features/775/
{'CVE-2020-35572'}
2022-04-19T19:02:47Z
2021-02-11T20:42:28Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-9pgx-gcph-mpqr', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://packagist.org/packages/vrana/adminer', 'https://github.com/vrana/adminer', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://sourceforge.net/p/adminer/news/', 'https://github.com/vrana/adminer/security/advisories/GHSA-9pgx-gcph-mpqr', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
null
{'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
{'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
GHSA
GHSA-cm5x-837x-jf3c
Division by 0 in inplace operations
### Impact An attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0: ```python import tensorflow as tf tf.raw_ops.InplaceSub(x=[],i=[-99,-1,-1],v=[1,1,1]) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`. ### Patches We have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37660'}
2021-08-25T14:42:44Z
2021-08-25T14:42:44Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cm5x-837x-jf3c', 'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618', 'https://github.com/advisories/GHSA-cm5x-837x-jf3c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37660'}
null
{'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'}
{'https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618'}
GHSA
GHSA-2wx6-wc87-rmjm
GitHub personal access token leaking into temporary EasyBuild (debug) logs
### Impact The GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--from-pr`, etc.) is shown in plain text in EasyBuild debug log files. Scope: * the log message only appears in the top-level log file, *not* in the individual software installation logs (see https://easybuild.readthedocs.io/en/latest/Logfiles.html); - as a consequence, tokens are *not* included in the partial log files that are uploaded into a gist when using `--upload-test-report` in combination with `--from-pr`, nor in the installation logs that are copied to the software installation directories; * the message is only logged when using `--debug`, so it will not appear when using the default EasyBuild configuration (only info messages are logged by default); * the log message is triggered via `--from-pr`, but also via various other GitHub integration options like `--new-pr`, `--merge-pr`, `--close-pr`, etc., but usually only appears in the temporary log file that is cleaned up automatically as soon as eb completes successfully; * you may have several debug log files that include your GitHub token in `/tmp` (or a different location if you've set the `--tmpdir` EasyBuild configuration option) on the systems where you use EasyBuild, but they are located in a subdirectory that is only accessible to your account (permissions set to 700); * the only way that a log file that may include your token could have been made public is *if you shared it yourself*, for example by copying the contents of the log file into a gist manually, or by sending a log file to someone; * for log files uploaded to GitHub, your token would be revoked automatically when GitHub notices it; ### Patches The issue is fixed with the changes in https://github.com/easybuilders/easybuild-framework/pull/3248. This fix is included in EasyBuild v4.1.2 (released on Mon Mar 16th 2020), and in the `master`+ `develop` branches of the `easybuild-framework` repository since Mon Mar 16th 2020 (see https://github.com/easybuilders/easybuild-framework/pull/3248 and https://github.com/easybuilders/easybuild-framework/pull/3249 resp.). **Make sure you revoke the existing GitHub tokens you're using with EasyBuild** (via https://github.com/settings/tokens), and install new ones using "`eb --install-github-token --force`" (see also https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html#installing-a-github-token-install-github-token). ### Workarounds * avoid using the GitHub integration features (see https://easybuild.readthedocs.io/en/latest/Integration_with_GitHub.html) with EasyBuild versions older than version 4.1.2; * don't share top-level EasyBuild (debug) log files with others, unless you are sure your GitHub token is not included in them; * clean up temporary EasyBuild log files in `/tmp`on the system(s) where you`re using EasyBuild ### References * https://github.com/easybuilders/easybuild-framework/pull/3248 (PR that fixes the issue) * (release announcement to EasyBuild mailing list) ### For more information * Open an issue in [the `easybuild-framework` repository](https://github.com/easybuilders/easybuild-framework) * Email us at [easybuild-admin@lists.ugent.be](mailto:easybuild-admin@lists.ugent.be)
{'CVE-2020-5262'}
2022-04-19T19:02:45Z
2020-03-19T17:29:58Z
MODERATE
7.7
{'CWE-532'}
{'https://github.com/easybuilders/easybuild-framework/security/advisories/GHSA-2wx6-wc87-rmjm', 'https://github.com/easybuilders/easybuild-framework/pull/3249', 'https://github.com/easybuilders/easybuild-framework/pull/3248', 'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9', 'https://github.com/advisories/GHSA-2wx6-wc87-rmjm', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5262'}
null
{'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9'}
{'https://github.com/easybuilders/easybuild-framework/commit/210743d0e3618a8ac0a56eb9c0f4fa4fd8ae53b9'}
GHSA
GHSA-cxjc-r2fp-7mq6
XSS in dijit editor's LinkDialog plugin
### Impact XSS possible for users of the Dijit Editor's LinkDialog plugin ### Patches Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3 ### Workarounds Users may apply the patch made in these releases. ### For more information If you have any questions or comments about this advisory, open an issue in [dojo/dijit](https://github.com/dojo/dijit/)
{'CVE-2020-4051'}
2022-04-19T19:02:29Z
2020-06-15T21:53:12Z
LOW
3.7
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051', 'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6', 'https://github.com/advisories/GHSA-cxjc-r2fp-7mq6'}
null
{'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'}
{'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'}
GHSA
GHSA-2wwc-w2gw-4329
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.
{'CVE-2019-1366'}
2021-03-29T20:55:36Z
2021-03-29T20:55:36Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1366', 'https://github.com/advisories/GHSA-2wwc-w2gw-4329', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1366'}
null
{'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d', 'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf'}
{'https://github.com/chakra-core/ChakraCore/commit/94181502091b7c22eb86ab1b45ce80bf7ff03aaf', 'https://github.com/chakra-core/ChakraCore/commit/cc871514deeaeaedb5b757c2ca8cd4ab9abccb5d'}
GHSA
GHSA-rqrc-8q8f-cp9c
Infinite loop in .Net Bond
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads.
{'CVE-2020-1469'}
2022-04-08T22:43:53Z
2022-04-08T18:11:51Z
HIGH
7.5
{'CWE-835', 'CWE-434'}
{'https://www.nuget.org/packages/Bond.Core.CSharp/9.0.1', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1469', 'https://github.com/advisories/GHSA-rqrc-8q8f-cp9c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469', 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1469'}
null
{'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}
{'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343', 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}
GHSA
GHSA-7375-vjr2-3g7w
Cross-Site Scripting in glance
Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package.
{'CVE-2018-3748'}
2021-09-02T19:13:46Z
2018-09-27T11:37:19Z
MODERATE
6.1
{'CWE-79'}
{'https://hackerone.com/reports/310133', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'}
null
{'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'}
{'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'}
GHSA
GHSA-7378-6268-4278
High severity vulnerability that affects DotNetZip
DotNetZip.Semvered before 1.11.0 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
{'CVE-2018-1002205'}
2021-01-08T19:18:21Z
2018-10-16T17:16:40Z
HIGH
0
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-DOTNET-DOTNETZIP-60245', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366', 'https://github.com/advisories/GHSA-7378-6268-4278', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002205', 'https://snyk.io/research/zip-slip-vulnerability', 'https://github.com/haf/DotNetZip.Semverd/pull/121'}
null
{'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'}
{'https://github.com/haf/DotNetZip.Semverd/commit/55d2c13c0cc64654e18fcdd0038fdb3d7458e366'}
GHSA
GHSA-q9mp-79cp-9g8j
Improper Authentication
Traefik 2.x, in certain configurations, allows HTTPS sessions to proceed without mutual TLS verification in a situation where ERR_BAD_SSL_CLIENT_AUTH_CERT should have occurred.
{'CVE-2019-20894'}
2021-09-02T22:00:09Z
2021-09-02T22:00:09Z
HIGH
7.5
{'CWE-287', 'CWE-295'}
{'https://github.com/containous/traefik/issues/5312', 'https://github.com/containous/traefik/pull/7008', 'https://github.com/advisories/GHSA-q9mp-79cp-9g8j', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20894', 'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}
null
{'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}
{'https://github.com/containous/traefik/commit/2b353971696717e980521b0e4baa1eba66c8d2bf'}
GHSA
GHSA-xw93-v57j-fcgh
Division by 0 in `SparseMatMul`
### Impact An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.SparseMatMul`: ```python import tensorflow as tf a = tf.constant([100.0, 100.0, 100.0, 100.0], shape=[2, 2], dtype=tf.float32) b = tf.constant([], shape=[0, 2], dtype=tf.float32) tf.raw_ops.SparseMatMul( a=a, b=b, transpose_a=True, transpose_b=True, a_is_sparse=True, b_is_sparse=True) ``` The division by 0 occurs deep in Eigen code because the `b` tensor is empty. ### Patches We have patched the issue in GitHub commit [7f283ff806b2031f407db64c4d3edcda8fb9f9f5](https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29557'}
2021-05-21T14:24:48Z
2021-05-21T14:24:48Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29557', 'https://github.com/advisories/GHSA-xw93-v57j-fcgh', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xw93-v57j-fcgh'}
null
{'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'}
{'https://github.com/tensorflow/tensorflow/commit/7f283ff806b2031f407db64c4d3edcda8fb9f9f5'}
GHSA
GHSA-8wrg-m8vm-5fvj
Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server
### Impact Authentication Bypass by Primary Weakness (CWE-305) Commit: https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1 ALL Users is impacted. ### Patches Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6
{'CVE-2021-21403'}
2022-04-19T19:02:51Z
2022-02-15T01:57:18Z
HIGH
7.5
{'CWE-305'}
{'https://github.com/advisories/GHSA-8wrg-m8vm-5fvj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21403', 'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj', 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
null
{'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
{'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}
GHSA
GHSA-9qcf-c26r-x5rf
XML external entity injection in Terracotta Quartz Scheduler
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
{'CVE-2019-13990'}
2021-10-21T21:18:40Z
2020-07-01T17:55:03Z
CRITICAL
9.8
{'CWE-611'}
{'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170', 'https://github.com/quartz-scheduler/quartz/issues/467', 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/quartz-scheduler/quartz/pull/501', 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/advisories/GHSA-9qcf-c26r-x5rf', 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551', 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'}
{'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551'}
GHSA
GHSA-x2fc-mxcx-w4mf
Prototype Pollution in mathjs
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.
{'CVE-2020-7743'}
2021-05-10T18:39:04Z
2021-05-10T18:39:04Z
HIGH
0
{'CWE-915'}
{'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://github.com/advisories/GHSA-x2fc-mxcx-w4mf', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e', 'https://www.npmjs.com/package/mathjs', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113', 'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://github.com/josdejong/mathjs/blob/develop/src/utils/object.js%23L82', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7743'}
null
{'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'}
{'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'}
GHSA
GHSA-gcv8-gh4r-25x6
Authorization Bypass Through User-Controlled Key in urijs
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
{'CVE-2022-0613'}
2022-04-01T18:06:55Z
2022-02-17T00:00:35Z
MODERATE
6.5
{'CWE-639'}
{'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613', 'https://github.com/advisories/GHSA-gcv8-gh4r-25x6', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/'}
null
{'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'}
{'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'}
GHSA
GHSA-m7fq-cf8q-35q7
High severity vulnerability that affects crack
The crack gem 0.3.1 and earlier for Ruby does not properly restrict casts of string values, which might allow remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion, a similar vulnerability to CVE-2013-0156.
{'CVE-2013-1800'}
2021-09-15T18:18:56Z
2017-10-24T18:33:37Z
HIGH
0
null
{'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6', 'https://nvd.nist.gov/vuln/detail/CVE-2013-1800', 'https://support.cloud.engineyard.com/entries/22915701-january-14-2013-security-vulnerabilities-httparty-extlib-crack-nori-update-these-gems-immediately', 'http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00003.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=917236', 'https://bugzilla.novell.com/show_bug.cgi?id=804721', 'https://github.com/advisories/GHSA-m7fq-cf8q-35q7', 'http://secunia.com/advisories/52897'}
null
{'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}
{'https://github.com/jnunemaker/crack/commit/e3da1212a1f84a898ee3601336d1dbbf118fb5f6'}
GHSA
GHSA-f8q4-jwww-x3wv
Race Condition in Paramiko
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.
{'CVE-2022-24302'}
2022-04-18T22:19:04Z
2022-03-19T00:01:03Z
MODERATE
5.9
{'CWE-362'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TPMKRUS4HO3P7NR7P4Y6CLHB4MBEE3AI/', 'https://www.paramiko.org/changelog.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LUEUEGILZ7MQXRSUF5VMMO4SWJQVPTQL/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24302', 'https://github.com/advisories/GHSA-f8q4-jwww-x3wv', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U63MJ2VOLLQ35R7CYNREUHSXYLWNPVSB/', 'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e', 'https://lists.debian.org/debian-lts-announce/2022/03/msg00032.html', 'https://github.com/pypa/advisory-database/tree/main/vulns/paramiko/PYSEC-2022-166.yaml', 'https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546'}
null
{'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'}
{'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'}
GHSA
GHSA-2p6g-gjp8-ggg9
Validation bypass in personnummer
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerability impacts users who rely on the for last digits of personnummer to be a _real_ personnummer. ### Patches The issue have been patched in all repositories. The following versions should be updated to as soon as possible: C# 3.0.2 D 3.0.1 Dart 3.0.3 Elixir 3.0.0 Go 3.0.1 Java 3.3.0 JavaScript 3.1.0 Kotlin 1.1.0 Lua 3.0.1 PHP 3.0.2 Perl 3.0.0 Python 3.0.2 Ruby 3.0.1 Rust 3.0.0 Scala 3.0.1 Swift 1.0.1 If you are using any of the earlier packages, please update to latest. ### Workarounds The issue arrieses from the regular expression allowing the first three digits in the last four digits of the personnummer to be 000, which is invalid. To mitigate this without upgrading, a check on the last four digits can be made to make sure it's not 000x. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Personnummer Meta](https://github.com/personnummer/meta/issues) * Email us at [Personnummer Email](mailto:security@personnummer.dev) ### Credits Niklas Sköldmark (Medborgarskolan)
null
2020-09-11T16:41:26Z
2020-09-09T17:29:34Z
LOW
0
null
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/advisories/GHSA-2p6g-gjp8-ggg9', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'}
null
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}
GHSA
GHSA-pw2r-vq6v-hr8c
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
{'CVE-2022-0536'}
2022-02-14T22:27:57Z
2022-02-10T00:00:31Z
MODERATE
5.9
{'CWE-200'}
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://github.com/advisories/GHSA-pw2r-vq6v-hr8c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'}
null
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'}
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'}
GHSA
GHSA-9g9w-hmvj-5h57
Prototype Pollution in merge-deep
Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 3.0.1 or later.
{'CVE-2018-3722'}
2021-01-08T19:04:35Z
2018-07-26T15:17:15Z
LOW
0
{'CWE-471'}
{'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://www.npmjs.com/advisories/580', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57', 'https://hackerone.com/reports/310708'}
null
{'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'}
{'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'}
GHSA
GHSA-mqf3-28j7-3mj6
Information Exposure in Kubernetes
Kubernetes before 1.2.0-alpha.5 allows remote attackers to read arbitrary pod logs via a container name.
{'CVE-2015-7528'}
2022-04-12T22:40:23Z
2022-02-15T01:57:18Z
MODERATE
5.3
{'CWE-200'}
{'https://github.com/kubernetes/kubernetes/pull/17886', 'https://github.com/advisories/GHSA-mqf3-28j7-3mj6', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7528', 'https://github.com/kubernetes/kubernetes/releases/tag/v1.2.0-alpha.5', 'http://rhn.redhat.com/errata/RHSA-2015-2615.html', 'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671', 'https://github.com/openshift/origin/pull/6113', 'https://access.redhat.com/errata/RHSA-2015:2544'}
null
{'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671'}
{'https://github.com/kubernetes/kubernetes/commit/afd56495a1052a3387b81df1786a8d0f51bc8671'}
GHSA
GHSA-88cc-g835-76rp
Improper Restriction of XML External Entity Reference
PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.
{'CVE-2020-13692'}
2022-02-10T00:30:23Z
2022-02-10T00:30:07Z
HIGH
7.7
{'CWE-611'}
{'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E', 'https://github.com/advisories/GHSA-88cc-g835-76rp', 'https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E', 'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13', 'https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200619-0005/', 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65', 'https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692'}
null
{'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'}
{'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'}
GHSA
GHSA-cqxx-66wh-8pjw
Improper Removal of Sensitive Information Before Storage or Transfer in irrd
IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instances that process password hashes, which means it is limited to IRRd instances that serve authoritative databases. IRRd instances operating solely as mirrors of other IRR databases are not affected. The issue occurred: * For `mntner` objects where all password hash names (`MD5-PW` and `CRYPT-PW`) were in lower or mixed case in the `auth` attribute. For these objects, hashes remained in the output of all queries of any method and all database exports made with the `export_destination` setting. Fortunately, objects in the common public IRR database virtually all use uppercase hash names which means very few of those objects were affected. * For any GraphQL queries that queried the `auth` field on `mntner` objects. * For any GraphQL queries that queried the `objectText` field on the `journal` field on `mntner` objects, if the `nrtm_access_list` setting permitted journal access. The two GraphQL cases are visible in logs, allowing users to determine whether any existing objects had their hashes exposed. This has been fixed in IRRd 4.2.3 and the main branch. Versions in the 4.1.x series never were affected. Users of the 4.2.x series are strongly recommended to upgrade. All users running a more recent version from the main branch should update to the latest version. Alternatively, but not recommended, apply the patch manually [for 4.2.x]
{'CVE-2022-24798'}
2022-04-13T01:15:56Z
2022-04-01T13:59:17Z
HIGH
7.5
{'CWE-212'}
{'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24798', 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw', 'https://github.com/advisories/GHSA-cqxx-66wh-8pjw', 'https://irrd.readthedocs.io/en/stable/releases/4.2.3/', 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'}
null
{'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70', 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'}
{'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6', 'https://github.com/irrdnet/irrd/commit/fdffaf8dd71713f06e99dff417e6aa1e6fa84b70'}
GHSA
GHSA-3j95-fjv2-3m4p
CSS Injection in Chartkick gem
The Chartkick gem through 3.3.2 for Ruby allows Cascading Style Sheets (CSS) Injection (without attribute).
{'CVE-2020-16254'}
2021-09-23T18:53:25Z
2020-08-12T14:29:15Z
MODERATE
6.1
{'CWE-74'}
{'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2020-16254.yml', 'https://github.com/ankane/chartkick/issues/546', 'https://github.com/ankane/chartkick', 'https://github.com/advisories/GHSA-3j95-fjv2-3m4p', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16254', 'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'}
null
{'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'}
{'https://github.com/ankane/chartkick/commit/ba67ab5e603de4d94676790fdac425f8199f1c4f'}
GHSA
GHSA-vrgp-3ph6-2wwq
SQL Injection in Dolibarr
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
{'CVE-2021-36625'}
2022-04-15T23:31:18Z
2022-04-01T00:00:41Z
HIGH
8.8
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22', 'https://github.com/advisories/GHSA-vrgp-3ph6-2wwq'}
null
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
GHSA
GHSA-3q32-j57w-q4w7
Path Traversal in total.js
Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths. The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`. ## Recommendation - If you are using version 2.1.x, upgrade to 2.1.1 or later. - If you are using version 2.2.x, upgrade to 2.2.1 or later. - If you are using version 2.3.x, upgrade to 2.3.1 or later. - If you are using version 2.4.x, upgrade to 2.4.1 or later. - If you are using version 2.5.x, upgrade to 2.5.1 or later. - If you are using version 2.6.x, upgrade to 2.6.3 or later. - If you are using version 2.7.x, upgrade to 2.7.1 or later. - If you are using version 2.8.x, upgrade to 2.8.1 or later. - If you are using version 2.9.x, upgrade to 2.9.5 or later. - If you are using version 3.0.x, upgrade to 3.0.1 or later. - If you are using version 3.1.x, upgrade to 3.1.1 or later. - If you are using version 3.2.x, upgrade to 3.2.4 or later.
{'CVE-2019-8903'}
2021-08-31T21:22:07Z
2019-02-20T15:40:13Z
HIGH
7.5
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8903', 'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'}
null
{'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'}
{'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'}
GHSA
GHSA-mq35-wqvf-r23c
Sinatra has XSS via 400 Bad Request page via params parser exception
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
{'CVE-2018-11627'}
2022-04-26T18:04:34Z
2018-06-05T21:32:06Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/sinatra/sinatra/issues/1428', 'https://access.redhat.com/errata/RHSA-2019:0315', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627', 'https://access.redhat.com/errata/RHSA-2019:0212', 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a', 'https://github.com/advisories/GHSA-mq35-wqvf-r23c'}
null
{'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'}
{'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'}
GHSA
GHSA-3j9m-hcv9-rpj8
XSS vulnerability allowing arbitrary JavaScript execution
Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ## CVE-2021-41174 XSS vulnerability on unauthenticated pages ### Summary CVSS Score: 6.9 Medium CVSS:[CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:H/A:N/E:U/RL:O/RC:R/CR:L/MAV:N/MAC:H/MPR:N/MUI:R/MS:C/MC:N/MI:H/MA:L) We received a security report to security@grafana.com on 2021-10-21 about a vulnerability in Grafana regarding the XSS vulnerability. It was later identified as affecting Grafana versions from 8.0.0-beta1 to 8.2.2. [CVE-2021-41174](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41174) has been assigned to this vulnerability. ### Impact If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. There are two ways an unauthenticated user can open a page in Grafana that contains the login button: - Anonymous authentication is enabled. This means all pages in Grafana would be open for the attack. - The link is to an unauthenticated page. The following pages are vulnerable: - `/dashboard-solo/snapshot/*` - `/dashboard/snapshot/*` - `/invite/:code` The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} An example of an expression would be: `{{constructor.constructor(‘alert(1)’)()}}`. This can be included in the link URL like this: https://play.grafana.org/dashboard/snapshot/%7B%7Bconstructor.constructor('alert(1)')()%7D%7D?orgId=1 When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. ### Attack audit We can not guarantee that the below will identify all attacks, so if you find something using the audit process described below, you should consider doing a full assessment. #### Through reverse proxy/load balancer logs To determine if your Grafana installation has been exploited for this vulnerability, search through your reverse proxy/load balancer access logs for instances where the path contains `{{` followed by something that would invoke JavaScript code. For example, this could be code that attempts to show a fake login page or to steal browser or session data. The [OWASP cheat sheet](https://cheatsheetseries.owasp.org/cheatsheets/XSS_Filter_Evasion_Cheat_Sheet.html) has several examples of XSS attacks. #### Through the Grafana Enterprise audit feature If you enabled “Log web requests” in your configuration with `router_logging = true`, look for requests where `path` contains `{{` followed by something that would invoke JavaScript code. ### Patched versions Release 8.2.3: - [Download Grafana 8.2.3](https://grafana.com/grafana/download/8.2.3) - [Release notes](https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-2-3/) ### Solutions and mitigations Download and install the appropriate patch for your version of Grafana. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched, and [Grafana Enterprise](https://grafana.com/products/enterprise) customers were provided with updated binaries under embargo. ### Workaround If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string `{{` in the path. Example of an Nginx rule to block the literal string `{{`: ``` location ~ \{\{ { deny all; } ``` ### Timeline and postmortem Here is a detailed timeline starting from when we originally learned of the issue. All times in UTC. * 2021-10-21 23:13: Security researcher sends the initial report about an XSS vulnerability. * 2021-10-21 23:13: Confirmed to be reproducible in at least versions 8.0.5 and 8.2.2. * 2021-10-22 02:02 MEDIUM severity declared. * 2021-10-22 09:22: it is discovered that Grafana instances with anonymous auth turned on are vulnerable. This includes https://play.grafana.org/ . * 2021-10-22 09:50: Anonymous access disabled for all instances on Grafana Cloud as a mitigation measure. * 2021-10-22 11:15: Workaround deployed on Grafana Cloud that blocks malicious requests. * 2021-10-22 12:35: Enabled anonymous access for instances on Grafana Cloud. * 2021-10-22 12:51: All instances protected by the workaround. From this point forward, Grafana Cloud is no longer affected. * 2021-10-22 14:05 Grafana Cloud instances updated with a fix. * 2021-10-22 19:23 :Determination that no weekend work is needed as the issue is of MEDIUM severity and the root cause has been identified. * 2021-10-25 14:13: Audit of Grafana Cloud concluded, no evidence of exploitation. * 2021-10-27 12:00: Grafana Enterprise images released to customers under embargo. * 2021-11-03 12:00: Public release. ## Reporting security issues If you think you have found a security vulnerability, please send a report to [security@grafana.com](mailto:security@grafana.com). This address can be used for all of Grafana Labs' open source and commercial products (including but not limited to Grafana, Tempo, Loki, k6, Tanka, and Grafana Cloud, Grafana Enterprise, and grafana.com). We only accept vulnerability reports at this address. We would prefer that you encrypt your message to us using our PGP key. The key fingerprint is: F988 7BEA 027A 049F AE8E 5CAA D125 8932 BE24 C5CA The key is available from [ keyserver.ubuntu.com]( https://keyserver.ubuntu.com/pks/lookup?op=get&fingerprint=on&search=0xD1258932BE24C5CA) by searching for [security@grafana]( https://keyserver.ubuntu.com/pks/lookup?search=security@grafana&fingerprint=on&op=index). ## Security announcements There is a Security [category](https://grafana.com/tags/security/) on the Grafana blog where we will post a summary, remediation, and mitigation details for any patch containing security fixes and you can subscribe to updates from our [Security Announcements RSS feed](https://grafana.com/tags/security/index.xml).
{'CVE-2021-41174'}
2021-11-29T15:05:32Z
2021-11-08T18:13:19Z
MODERATE
6.9
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41174', 'https://github.com/grafana/grafana/security/advisories/GHSA-3j9m-hcv9-rpj8', 'https://github.com/advisories/GHSA-3j9m-hcv9-rpj8'}
null
{'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'}
{'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88'}
GHSA
GHSA-m87f-9fvv-2mgg
Deserialization of Untrusted Data in parlai
### Impact Due to use of unsafe YAML deserialization logic, an attacker with the ability to modify local YAML configuration files could provide malicious input, resulting in remote code execution or similar risks. ### Patches The issue can be patched by upgrading to v1.1.0 or later. It can also be patched by replacing YAML deserialization with equivalent safe_load calls. ### References - https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725 - https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879 - https://anon-artist.github.io/blogs/blog3.html
{'CVE-2021-39207'}
2022-04-19T19:03:08Z
2021-09-13T20:05:39Z
HIGH
8.4
{'CWE-502'}
{'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/advisories/GHSA-m87f-9fvv-2mgg', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39207', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879', 'https://github.com/facebookresearch/ParlAI/security/advisories/GHSA-m87f-9fvv-2mgg'}
null
{'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'}
{'https://github.com/facebookresearch/ParlAI/commit/507d066ef432ea27d3e201da08009872a2f37725', 'https://github.com/facebookresearch/ParlAI/commit/4374fa2aba383db6526ab36e939eb1cf8ef99879'}
GHSA
GHSA-pf59-j7c2-rh6x
Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default, allowing the attacker to redirect full or partial network traffic from the node to the compromised pod.
{'CVE-2020-13597'}
2022-04-12T22:53:10Z
2022-02-15T01:57:18Z
LOW
6
{'CWE-200', 'CWE-201'}
{'https://github.com/kubernetes/kubernetes/issues/91507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597', 'https://groups.google.com/forum/#!topic/kubernetes-security-announce/BMb_6ICCfp8', 'https://github.com/advisories/GHSA-pf59-j7c2-rh6x', 'https://github.com/containernetworking/plugins/pull/484/', 'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965', 'https://www.projectcalico.org/security-bulletins/'}
null
{'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965'}
{'https://github.com/containernetworking/plugins/commit/ad10b6fa91aacd720f1f9ab94341a97a82a24965'}
GHSA
GHSA-389p-fchr-q2mg
Path Traversal in ImpressCMS
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
{'CVE-2022-24977'}
2022-02-26T00:34:46Z
2022-02-15T00:02:47Z
CRITICAL
9.8
{'CWE-22'}
{'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/advisories/GHSA-389p-fchr-q2mg', 'https://r0.haxors.org/posts?id=8'}
null
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}
GHSA
GHSA-mw36-7c6c-q4q2
XStream can be used for Remote Code Execution
### Impact The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14. ### Workarounds No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use. Users of XStream 1.4.13 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type)); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### Credits Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html). ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26217'}
2022-04-25T23:05:50Z
2020-11-16T20:07:59Z
HIGH
8
{'CWE-78'}
{'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://x-stream.github.io/CVE-2020-26217.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.debian.org/security/2020/dsa-4811', 'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E', 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2', 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html', 'https://security.netapp.com/advisory/ntap-20210409-0004/', 'https://github.com/advisories/GHSA-mw36-7c6c-q4q2', 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'}
{'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a'}
GHSA
GHSA-rjjg-hgv6-h69v
Memory corruption in Tensorflow
### Impact The implementation of `dlpack.to_dlpack` can be made to use uninitialized memory resulting in further memory corruption. This is because the pybind11 glue code assumes that the argument is a tensor: https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/tfe_wrapper.cc#L1361 However, there is nothing stopping users from passing in a Python object instead of a tensor. ```python In [2]: tf.experimental.dlpack.to_dlpack([2]) ==1720623==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x55b0ba5c410a in tensorflow::(anonymous namespace)::GetTensorFromHandle(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:46:7 #1 0x55b0ba5c38f4 in tensorflow::TFE_HandleToDLPack(TFE_TensorHandle*, TF_Status*) third_party/tensorflow/c/eager/dlpack.cc:252:26 ... ``` The uninitialized memory address is due to a `reinterpret_cast` https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517c3662f6698992b7b2cf/tensorflow/python/eager/pywrap_tensor.cc#L848-L850 Since the `PyObject` is a Python object, not a TensorFlow Tensor, the cast to `EagerTensor` fails. ### Patches We have patched the issue in 22e07fb204386768e5bcbea563641ea11f96ceb8 and will release a patch release for all affected versions. We recommend users to upgrade to TensorFlow 2.2.1 or 2.3.1. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-15193'}
2021-08-26T15:11:04Z
2020-09-25T18:28:27Z
HIGH
7.1
{'CWE-908'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjjg-hgv6-h69v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15193', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/advisories/GHSA-rjjg-hgv6-h69v', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1'}
null
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}
{'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8'}
GHSA
GHSA-3crj-w4f5-gwh4
Processing untrusted theming resources might execute arbitrary code (ACE)
### Impact When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process. While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-) of the [Less.js library](https://github.com/less/less.js), it is an unexpected behavior in the context of OpenUI5 and SAPUI5 development. Especially in the context of [UI5 Tooling](https://github.com/SAP/ui5-tooling), which relies on less-openui5, this poses a security threat: An attacker might create a [library](https://sap.github.io/ui5-tooling/pages/Builder/#library) or [theme-library](https://sap.github.io/ui5-tooling/pages/Builder/#theme-library) containing a custom control or theme, hiding malicious JavaScript code in one of the `.less` files. This is an example of inline JavaScript in a Less file: ```less .rule { @var: `(function(){console.log('Hello from JavaScript'); process.exit(1);})()`; color: @var; } ``` Starting with Less.js version 3.0.0, the Inline JavaScript feature is disabled by default. less-openui5 however currently uses [a fork](https://github.com/SAP/less-openui5/tree/master/lib/thirdparty/less) of Less.js v1.6.3. Note that disabling the Inline JavaScript feature in Less.js versions 1.x, still evaluates code has additional double codes around it: ```less .rule { @var: "`(function(){console.log('Hello from JavaScript'); process.exit(1);})()`"; color: @var; } ``` ### Patches We decided to remove the inline JavaScript evaluation feature completely from the code of our Less.js fork. This fix is available in less-openui5 version [v0.10.0](https://github.com/SAP/less-openui5/releases/tag/v0.10.0) ### Workarounds Only process trusted theming resources. ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/SAP/less-openui5 * Email us at secure@sap.com
{'CVE-2021-21316'}
2021-02-17T17:18:20Z
2021-01-29T20:51:37Z
HIGH
6.3
{'CWE-74'}
{'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://www.npmjs.com/package/less-openui5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8', 'https://github.com/advisories/GHSA-3crj-w4f5-gwh4', 'http://lesscss.org/usage/#less-options-enable-inline-javascript-deprecated-'}
null
{'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'}
{'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'}
GHSA
GHSA-p6mc-m468-83gw
Prototype Pollution in lodash
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays. This vulnerability causes the addition or modification of an existing property that will exist on all objects and may lead to Denial of Service or Code Execution under specific circumstances.
{'CVE-2020-8203'}
2022-04-26T20:58:31Z
2020-07-15T19:15:48Z
HIGH
7.4
{'CWE-770', 'CWE-1321'}
{'https://hackerone.com/reports/712065', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-p6mc-m468-83gw', 'https://github.com/lodash/lodash/issues/4874', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/lodash/lodash/issues/4744', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.npmjs.com/advisories/1523', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'}
{'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'}
GHSA
GHSA-cwx2-736x-mf6w
Prototype pollution in object-path
### Impact A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `includeInheritedProps: true`, or by using the default `withInheritedProps` instance. The default operating mode is not affected by the vulnerability if version >= 0.11.0 is used. Any usage of `set()` in versions < 0.11.0 is vulnerable. ### Patches Upgrade to version >= 0.11.5 ### Workarounds Don't use the `includeInheritedProps: true` options or the `withInheritedProps` instance if using a version >= 0.11.0. ### References [Read more about the prototype pollution vulnerability](https://codeburst.io/what-is-prototype-pollution-49482fc4b638) ### For more information If you have any questions or comments about this advisory: * Open an issue in [object-path](https://github.com/mariocasciaro/object-path)
{'CVE-2020-15256'}
2022-04-19T19:02:39Z
2020-10-19T20:55:55Z
HIGH
7.7
{'CWE-20', 'CWE-471'}
{'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://github.com/advisories/GHSA-cwx2-736x-mf6w', 'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256'}
null
{'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'}
{'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'}
GHSA
GHSA-x949-7cm6-fm6p
Code Injection in md-to-pdf.
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
{'CVE-2021-23639'}
2021-12-16T14:34:40Z
2021-12-16T14:34:40Z
CRITICAL
9.8
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a', 'https://github.com/simonhaenisch/md-to-pdf/issues/99', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/advisories/GHSA-x949-7cm6-fm6p'}
null
{'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}
{'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}
GHSA
GHSA-8xjv-v9xq-m5h9
Moderate severity vulnerability that affects Pillow
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
{'CVE-2016-0775'}
2021-09-07T20:34:14Z
2018-07-24T20:15:36Z
MODERATE
6.5
{'CWE-119'}
{'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b', 'https://security.gentoo.org/glsa/201612-52', 'https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst', 'https://github.com/advisories/GHSA-8xjv-v9xq-m5h9', 'http://www.debian.org/security/2016/dsa-3499', 'https://nvd.nist.gov/vuln/detail/CVE-2016-0775'}
null
{'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'}
{'https://github.com/python-pillow/Pillow/commit/893a40850c2d5da41537958e40569c029a6e127b'}
GHSA
GHSA-pg36-wpm5-g57p
HTTP Request Smuggling: LF vs CRLF handling in Waitress
### Impact Waitress implemented a &amp;quot;MAY&amp;quot; part of the RFC7230 (https://tools.ietf.org/html/rfc7230#section-3.5) which states: Although the line terminator for the start-line and header fields is the sequence CRLF, a recipient MAY recognize a single LF as a line terminator and ignore any preceding CR. Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. Example: ``` Content-Length: 100[CRLF] X-Header: x[LF]Content-Length: 0[CRLF] ``` Would get treated by Waitress as if it were: ``` Content-Length: 100 X-Header: x Content-Length: 0 ``` This could potentially get used by attackers to split the HTTP request and smuggle a second request in the body of the first. ### Patches This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. Waitress no longer implements the MAY part of the specification and instead requires that all lines are terminated correctly with CRLF. If any lines are found with a bare CR or LF a 400 Bad Request is sent back to the requesting entity. The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don&amp;#39;t cause any changes in behavior. ### Workarounds Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn&amp;#39;t use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method) ### Issues/more security issues: * open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) * email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)
{'CVE-2019-16785'}
2022-04-25T23:10:29Z
2019-12-20T23:03:57Z
HIGH
7.1
{'CWE-444'}
{'https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p', 'https://github.com/advisories/GHSA-pg36-wpm5-g57p', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16785', 'https://access.redhat.com/errata/RHSA-2020:0720', 'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/', 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}
null
{'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba'}
{'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba'}
GHSA
GHSA-pg97-ww7h-5mjr
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
### Impact _What kind of vulnerability is it? Who is impacted?_ Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these versions of Dojo: * 1.16.1 * 1.15.2 * 1.14.5 * 1.13.6 * 1.12.7 * 1.11.9 Users of Dojo 1.10.x and earlier should review this change and determine if it impacts them, and backport the change as appropriate. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ The change applied in https://github.com/dojo/dojox/pull/315 could get added separately as a patch. ### For more information If you have any questions or comments about this advisory: * Open an issue in [dojo/dojox](https://github.com/dojo/dojox/)
{'CVE-2019-10785'}
2022-04-19T19:02:30Z
2020-02-13T22:21:06Z
MODERATE
6.1
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://github.com/dojo/dojox/pull/315', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee', 'https://github.com/advisories/GHSA-pg97-ww7h-5mjr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://snyk.io/vuln/SNYK-JS-DOJOX-548257', 'https://github.com/dojo/dojox/security/advisories/GHSA-pg97-ww7h-5mjr'}
null
{'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}
{'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}
GHSA
GHSA-hp4c-x6r7-6555
Floating point exception in `SparseDenseCwiseDiv`
### Impact The implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error: ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseDenseCwiseDiv( sp_indices=np.array([[4]]), sp_values=np.array([-400]), sp_shape=np.array([647.]), dense=np.array([0])) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. ### Patches We have patched the issue in GitHub commit [d9204be9f49520cdaaeb2541d1dc5187b23f31d9](https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37636'}
2021-08-25T14:44:14Z
2021-08-25T14:44:14Z
MODERATE
5.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-hp4c-x6r7-6555', 'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hp4c-x6r7-6555', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37636'}
null
{'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'}
{'https://github.com/tensorflow/tensorflow/commit/d9204be9f49520cdaaeb2541d1dc5187b23f31d9'}
GHSA
GHSA-3949-f494-cm99
Cross-site Scripting in Prism
### Impact Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. ### Patches This bug has been fixed in v1.27.0. ### Workarounds Do not use the Command line plugin on untrusted inputs, or sanitized all code blocks (remove all HTML code text) from all code blocks that use the Command line plugin. ### References - https://github.com/PrismJS/prism/pull/3341
{'CVE-2022-23647'}
2022-02-26T01:32:38Z
2022-02-22T19:32:18Z
HIGH
7.5
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99', 'https://github.com/advisories/GHSA-3949-f494-cm99', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://github.com/PrismJS/prism/pull/3341'}
null
{'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c'}
{'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c'}
GHSA
GHSA-w5cr-frph-hw7f
Use of uninitialized buffer in rkyv
An issue was discovered in the rkyv crate before 0.6.0 for Rust. When an archive is created via serialization, the archive content may contain uninitialized values of certain parts of a struct.
{'CVE-2021-31919'}
2021-08-25T21:01:50Z
2021-08-25T21:01:50Z
HIGH
7.5
{'CWE-908'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-31919', 'https://github.com/advisories/GHSA-w5cr-frph-hw7f', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712', 'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://rustsec.org/advisories/RUSTSEC-2021-0054.html'}
null
{'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712'}
{'https://github.com/djkoloski/rkyv/commit/9c65ae9c2c67dd949b5c3aba9b8eba6da802ab7e', 'https://github.com/djkoloski/rkyv/commit/f141b560523a20557db6540576d153010bd18712'}
GHSA
GHSA-g92x-8m54-p89v
Cross-Site Request Forgery in snipe-it
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3858'}
2021-10-22T13:56:57Z
2021-10-21T17:48:55Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://github.com/advisories/GHSA-g92x-8m54-p89v', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'}
null
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}
GHSA
GHSA-jx5q-g37m-h5hj
Client-Side JavaScript Prototype Pollution in oro/platform
### Summary By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. ### Workarounds Configure WAF to drop requests containing next strings: `__proto__` , `constructor[prototype]`, `constructor.prototype`
{'CVE-2021-43852'}
2022-01-13T18:33:44Z
2022-01-06T18:29:51Z
MODERATE
5.3
{'CWE-74', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://github.com/advisories/GHSA-jx5q-g37m-h5hj'}
null
{'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}
{'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}