ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-c6fg-99pr-25m9
Uncapped length of skin data fields submitted by players
### Impact Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave. This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an e...
null
2022-01-06T23:53:58Z
2022-01-06T23:53:58Z
HIGH
7.5
null
{'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'}
{'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'}
GHSA
GHSA-54fx-gm74-q676
Permissions bypass in SmallRye
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixe...
{'CVE-2020-1729'}
2022-03-21T20:50:43Z
2022-03-18T17:55:47Z
MODERATE
4
{'CWE-863'}
{'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444', 'https://github.com/advisories/GHSA-54fx-gm74-q676', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729'}
null
{'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}
{'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}
GHSA
GHSA-4r8q-gv9j-3xx6
Open Redirect
### Impact In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL. This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `tr...
{'CVE-2021-32645'}
2022-03-21T20:46:04Z
2022-03-18T17:55:07Z
MODERATE
4.3
{'CWE-601'}
{'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://github.com/advisories/GHSA-4r...
null
{'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}
{'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}
GHSA
GHSA-pc5p-h8pf-mvwp
Machine-In-The-Middle in https-proxy-agent
Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, w...
null
2021-08-23T15:27:25Z
2020-04-16T03:14:56Z
MODERATE
6.1
{'CWE-300'}
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://github.com/advisories/GHSA-pc5p-h8pf-mvwp', 'https://www.npmjs.com/advisories/1184', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131', 'https://hackerone.com/reports/541502'}
null
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b'}
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b'}
GHSA
GHSA-8jxq-75rw-fhj9
Eve allows execution of arbitrary code via Code Injection in the where parameter
io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter.
{'CVE-2018-8097'}
2022-04-26T18:10:00Z
2018-07-12T20:29:35Z
CRITICAL
9.8
{'CWE-94'}
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/advisories/GHSA-8jxq-75rw-fhj9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8097'}
null
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'}
{'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98'}
GHSA
GHSA-j29f-m23h-3p8p
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0911'}
2022-03-29T21:29:56Z
2022-03-17T00:00:48Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/advisories/GHSA-j29f-m23h-3p8p', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
GHSA
GHSA-52p9-v744-mwjj
Remote code execution in Kramdown
Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated.
{'CVE-2021-28834'}
2021-04-14T18:12:09Z
2021-03-29T16:30:34Z
HIGH
9.8
{'CWE-94'}
{'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://github.com/gettalong/kramdown/compare/REL_2_3_0...REL_2_3_1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834', 'https://github.com/advisories/GHSA-52p9-v744-mwjj', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd...
null
{'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2', 'https://gitlab.com/gitlab-org/gitlab/-/commit/179329b5c3c118924fb242dc449d06b4ed6ccb66', 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760'}
{'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://github.com/stanhu/kramdown/commit/ff0218aefcf00cd5a389e17e075d36cd46d011e2'}
GHSA
GHSA-28hp-fgcr-2r4h
Cross-Site Scripting via JSONP
JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.
null
2021-08-17T15:35:31Z
2019-06-27T17:25:42Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-28hp-fgcr-2r4h', 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4', 'https://www.npmjs.com/advisories/1630'}
null
{'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'}
{'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'}
GHSA
GHSA-rww7-2gpw-fv6j
Crash when type cannot be specialized in Tensorflow
### Impact Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174): ```cc void InferenceContext::PreInputInit( const OpDef& op_def, const...
{'CVE-2022-23572'}
2022-02-11T20:48:06Z
2022-02-09T23:28:29Z
MODERATE
6.5
{'CWE-754'}
{'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572', 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b', 'https://github.com/advisories/...
null
{'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b'}
{'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b'}
GHSA
GHSA-pwwm-pwx2-2hw7
Generation of Error Message Containing Sensitive Information in Snipe-IT
Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information.
{'CVE-2022-0622'}
2022-02-26T01:13:46Z
2022-02-18T00:00:37Z
MODERATE
5.3
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/advisories/GHSA-pwwm-pwx2-2hw7'}
null
{'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'}
{'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'}
GHSA
GHSA-r659-8xfp-j327
Prototype Pollution in objection.js
objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16.
{'CVE-2021-3766'}
2021-10-08T20:12:34Z
2021-09-07T23:09:43Z
CRITICAL
9.8
{'CWE-1321', 'CWE-915'}
{'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc', 'https://github.com/ad...
null
{'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9'}
{'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6'}
GHSA
GHSA-773h-w45w-f2f9
Denial of service vulnerability exists in libxmljs
libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will cra...
{'CVE-2022-21144'}
2022-05-04T14:48:04Z
2022-05-03T00:00:46Z
HIGH
0
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756', 'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/advisories/GHSA-773h-w45w-f2f9', 'https://github.com/libxmljs/libxmljs/pull/594'}
null
{'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d'}
{'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d'}
GHSA
GHSA-6gww-qpm6-mc2g
Server-Side Request Forgery in ssrf-agent
The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.
{'CVE-2021-23718'}
2021-12-06T21:36:54Z
2021-12-02T17:51:51Z
MODERATE
6.5
{'CWE-918'}
{'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346', 'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718',...
null
{'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'}
{'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346'}
GHSA
GHSA-q67f-3jq4-mww2
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
{'CVE-2022-0831'}
2022-03-11T23:22:38Z
2022-03-05T00:00:45Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://github.com/advisories/GHSA-q67f-3jq4-mww2', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'}
null
{'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'}
{'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'}
GHSA
GHSA-9423-6c93-gpp8
Arbitrary File Write via Archive Extraction (Zip Slip)
The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released.
{'CVE-2020-7667'}
2022-01-04T19:27:35Z
2021-06-23T17:13:29Z
HIGH
7.5
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667', 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0', 'https://github.com/advisories/GHSA-9423-6c93-gpp8'}
null
{'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'}
{'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'}
GHSA
GHSA-hfm2-fffh-v47v
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197.
{'CVE-2019-1196'}
2021-03-29T20:58:01Z
2021-03-29T20:58:01Z
HIGH
7.5
{'CWE-787'}
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/advisories/GHSA-hfm2-fffh-v47v', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://github.com/chakra-core/ChakraC...
null
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
{'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://github.com/chakra-core/ChakraCore/commit/6b1250b6ffea7006226dd937e52cf5b353fcfc15'}
GHSA
GHSA-vqmr-957g-r7w3
High severity vulnerability that affects rendertron
Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files.
{'CVE-2017-18355'}
2021-09-20T22:15:16Z
2019-02-12T15:36:39Z
HIGH
7.5
{'CWE-200'}
{'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}
null
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
GHSA
GHSA-g996-q5r8-w7g2
Escape validation messages in the PHP templating engine
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.
{'CVE-2019-10909'}
2021-08-18T22:15:16Z
2019-11-12T23:00:53Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://www.drupal.org/sa-core-2019-005', 'https://symfony.com/blog/c...
null
{'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}
{'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}
GHSA
GHSA-wcv5-qrj6-9pfm
Heap buffer overflow in `Conv3DBackprop*`
### Impact Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows: ```python import tensorflow as tf input_sizes = tf.constant([1, 1, 1, 1, 2], shape=[5], dtype=tf.int32) filter_tensor = tf.constant([734.6274508233133, -10.0, -10.0, -10.0, -10.0, -10.0, -10...
{'CVE-2021-29520'}
2022-04-26T18:10:21Z
2021-05-21T14:21:12Z
LOW
2.5
{'CWE-787', 'CWE-120'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm', 'https://github.com/advisories/GHSA-wcv5-qrj6-9pfm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29520', 'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'}
null
{'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'}
{'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197'}
GHSA
GHSA-gw5h-h6hj-f56g
Improper Authorization in Gogs
### Impact Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected. ### Patches Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.1...
null
2022-04-19T19:03:27Z
2022-03-14T22:58:37Z
HIGH
8.2
{'CWE-285'}
{'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62', 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://github.com/advisories/GHSA-gw5h-h6hj-f56g'}
null
{'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'}
{'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'}
GHSA
GHSA-frqg-7g38-6gcf
Improper escaping of command arguments on Windows leading to command injection
### Impact Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected. ### Patches 1.10.23 and 2.1.9 fix the issue ### Workarounds None
{'CVE-2021-41116'}
2022-04-22T15:41:33Z
2021-10-05T20:23:18Z
HIGH
8.2
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41116', 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://github.com/advisories/GHSA-frqg-7g38-6gcf'}
null
{'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}
{'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}
GHSA
GHSA-rp63-jfmw-532w
High severity vulnerability that affects mail
The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
{'CVE-2012-2140'}
2021-09-17T19:22:25Z
2017-10-24T18:33:38Z
HIGH
0
{'CWE-20'}
{'http://secunia.com/advisories/48970', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080645.html', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'http://lists.fedoraproject.org/pipe...
null
{'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2'}
{'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'https://github.com/mikel/mail/commit/39b590ddb08f90ddbe445837359a2c8843e533d0'}
GHSA
GHSA-hjgp-8ffr-hwwr
Downloads Resources over HTTP in closurecompiler
Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `c...
{'CVE-2016-10582'}
2021-01-08T18:40:46Z
2019-02-18T23:51:19Z
HIGH
0
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://nodesecurity.io/advisories/169', 'https://www.npmjs.com/advisories/169', 'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'}
null
{'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'}
{'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'}
GHSA
GHSA-49qr-xh3w-h436
Moderate severity vulnerability that affects notebook
Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPos...
{'CVE-2018-19351'}
2021-09-01T14:11:52Z
2018-11-21T22:15:47Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-49qr-xh3w-h436', 'https://pypi.org/project/notebook/#history', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351', 'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY', 'https://github.com/jupyter/notebook...
null
{'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'}
{'https://github.com/jupyter/notebook/commit/107a89fce5f413fb5728c1c5d2c7788e1fb17491'}
GHSA
GHSA-gr4c-5rq6-cgh3
OPC UA applications can allow a remote attacker to determine a Server's private key
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad...
{'CVE-2018-7559'}
2022-04-26T19:12:43Z
2018-10-16T19:58:42Z
MODERATE
5.3
null
{'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'http://www.securityfocus.com/bid/108688', 'https://github.com/advisories/GHSA-gr4c-5rq6-cgh3', 'https://nvd.nist.gov/vu...
null
{'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150'}
{'https://github.com/OPCFoundation/UA-.NETStandard/commit/ebcf026a54dd0c9052cff009d96d827ac923d150', 'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45'}
GHSA
GHSA-vjg4-v33c-ggc4
Out of bounds read in Tensorflow
### Impact The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds ...
{'CVE-2022-21730'}
2022-02-10T00:19:29Z
2022-02-09T18:29:45Z
HIGH
8.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4', 'https://github.com/advisories/GHSA-vjg4-v33c-ggc4', 'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/te...
null
{'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'}
{'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'}
GHSA
GHSA-fvgf-6h6h-3322
Improper Limitation of a Pathname to a Restricted Directory
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
{'CVE-2021-3281'}
2021-09-28T20:55:35Z
2021-03-18T20:29:49Z
MODERATE
5.3
{'CWE-22'}
{'https://docs.djangoproject.com/en/3.1/releases/3.0.12/', 'https://www.djangoproject.com/weblog/2021/feb/01/security-releases/', 'https://github.com/advisories/GHSA-fvgf-6h6h-3322', 'https://groups.google.com/forum/#!forum/django-announce', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedorapr...
null
{'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'}
{'https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23'}
GHSA
GHSA-8434-v7xw-8m9x
Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks
APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside application manifest. ### Impact An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended...
{'CVE-2021-21386'}
2022-04-19T19:02:50Z
2022-01-21T23:03:39Z
CRITICAL
9.3
{'CWE-88', 'CWE-78'}
{'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386', 'https://github.com/advisories/GHSA-8434-v7xw-8m9x', 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'}
null
{'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'}
{'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'}
GHSA
GHSA-v6wp-4m6f-gcjg
Open redirect vulnerability in `aiohttp` (`normalize_path_middleware` middleware)
### Impact _What kind of vulnerability is it? Who is impacted?_ Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website. It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware. ### Patches _Has the ...
{'CVE-2021-21330'}
2022-04-19T19:02:48Z
2021-02-26T02:11:57Z
LOW
3.1
{'CWE-601'}
{'https://pypi.org/project/aiohttp/', 'https://github.com/advisories/GHSA-v6wp-4m6f-gcjg', 'https://www.debian.org/security/2021/dsa-4864', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21330', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/...
null
{'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b'}
{'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b'}
GHSA
GHSA-ghhm-xrwp-75m9
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control
{'CVE-2021-4194'}
2022-01-14T19:39:05Z
2022-01-08T00:34:12Z
MODERATE
4.3
{'CWE-668', 'CWE-284'}
{'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://github.com/advisories/GHSA-ghhm-xrwp-75m9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114'}
null
{'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'}
{'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'}
GHSA
GHSA-mc7w-4cjf-c973
OS Command Injection in node-opencv
utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.
{'CVE-2019-10061'}
2021-10-12T22:06:57Z
2021-10-12T22:06:57Z
CRITICAL
9.8
{'CWE-78'}
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://www.npmjs.com/advisories/789', 'https://github.com/advisories/GHSA-mc7w-4cjf-c973', 'https://www.npmjs.com/package/opencv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061', 'https://github.com/peterbraden/node-open...
null
{'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b'}
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563'}
GHSA
GHSA-7rg4-266c-jqw6
Predictable CSRF tokens in centreon/centreon
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
{'CVE-2021-28055'}
2021-06-08T20:12:56Z
2021-06-08T20:12:56Z
MODERATE
6.5
{'CWE-352', 'CWE-330'}
{'https://github.com/advisories/GHSA-7rg4-266c-jqw6', 'https://github.com/centreon/centreon/releases/tag/2.8.37', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5...
null
{'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}
{'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}
GHSA
GHSA-m9hw-7xfv-wqg7
Prototype Pollution in json-logic-js
Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution. The follo...
null
2020-11-12T19:36:14Z
2020-11-12T19:36:14Z
HIGH
0
{'CWE-471'}
{'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b', 'https://www.npmjs.com/advisories/1542', 'https://github.com/advisories/GHSA-m9hw-7xfv-wqg7', 'https://www.npmjs.com/package/json-logic-js'}
null
{'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b'}
{'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b'}
GHSA
GHSA-9p47-w5xp-f4xr
Downloads Resources over HTTP in windows-build-tools
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runnin...
{'CVE-2017-16003'}
2021-01-08T19:03:26Z
2018-11-09T17:48:37Z
HIGH
0
{'CWE-311'}
{'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003', 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'htt...
null
{'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'}
{'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)'}
GHSA
GHSA-hjp8-2cm3-cc45
Cookie exposure in requestretry
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites.
{'CVE-2022-0654'}
2022-03-03T22:02:14Z
2022-02-24T00:00:54Z
HIGH
7.5
{'CWE-200'}
{'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc', 'https://github.com/advisories/GHSA-hjp8-2cm3-cc45', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654', 'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}
null
{'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}
{'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}
GHSA
GHSA-w2f4-hxpm-mq98
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2021-3915'}
2021-11-17T21:12:03Z
2021-11-15T23:17:37Z
HIGH
7.6
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3915', 'https://github.com/advisories/GHSA-w2f4-hxpm-mq98', 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}
null
{'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}
{'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}
GHSA
GHSA-59q2-x2qc-4c97
Heap OOB access in unicode ops
### Impact An attacker can access data outside of bounds of heap allocated array in `tf.raw_ops.UnicodeEncode`: ```python import tensorflow as tf input_values = tf.constant([58], shape=[1], dtype=tf.int32) input_splits = tf.constant([[81, 101, 0]], shape=[3], dtype=tf.int32) output_encoding = "UTF-8" tf.raw_ops.Unic...
{'CVE-2021-29559'}
2021-05-21T14:24:54Z
2021-05-21T14:24:54Z
LOW
2.5
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-59q2-x2qc-4c97', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29559', 'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298', 'https://github.com/advisories/GHSA-59q2-x2qc-4c97'}
null
{'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298'}
{'https://github.com/tensorflow/tensorflow/commit/51300ba1cc2f487aefec6e6631fef03b0e08b298'}
GHSA
GHSA-hwcf-pp87-7x6p
Moderate severity vulnerability that affects ejs
nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the ejs.renderFile() resulting in code injection
{'CVE-2017-1000188'}
2021-09-14T17:32:10Z
2017-11-30T23:15:05Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'http://www.securityfocus.com/bid/101889', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188', 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p'}
null
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}
{'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}
GHSA
GHSA-4vrf-ff7v-hpgr
Division by zero in TFLite's implementation of `EmbeddingLookup`
The implementation of the `EmbeddingLookup` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/e4b29809543b250bc9b19678ec4776299dd569ba/tensorflow/lite/kernels/embedding_lookup.cc#L73-L74): ```cc const int row_size = SizeOfDimension(value, 0); const int row_bytes ...
{'CVE-2021-29596'}
2021-05-21T14:27:51Z
2021-05-21T14:27:51Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29596', 'https://github.com/advisories/GHSA-4vrf-ff7v-hpgr', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4vrf-ff7v-hpgr'}
null
{'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'}
{'https://github.com/tensorflow/tensorflow/commit/f61c57bd425878be108ec787f4d96390579fb83e'}
GHSA
GHSA-h676-pjr4-hgqx
Path Traversal in S-Cart
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
{'CVE-2021-44111'}
2022-02-26T00:28:57Z
2022-02-12T00:00:42Z
MODERATE
4.4
{'CWE-22'}
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://github.com/s-cart/s-cart/issues/102', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111', 'https://github.com/advisories/GHSA-h676-pjr4-hgqx'}
null
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'}
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'}
GHSA
GHSA-x3v8-c8qx-3j3r
Null pointer exception in `DeserializeSparse`
### Impact The [shape inference code for `DeserializeSparse`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/ops/sparse_ops.cc#L152-L168) can trigger a null pointer dereference: ```python import tensorflow as tf dataset = tf.data.Dataset.range(3) @tf.function...
{'CVE-2021-41215'}
2021-11-10T18:57:45Z
2021-11-10T18:57:45Z
MODERATE
5.5
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41215', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x3v8-c8qx-3j3r', 'https://github.com/advisories/GHSA-x3v8-c8qx-3j3r', 'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'}
null
{'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'}
{'https://github.com/tensorflow/tensorflow/commit/d3738dd70f1c9ceb547258cbb82d853da8771850'}
GHSA
GHSA-8xc6-g8xw-h2c4
YARP Denial of Service Vulnerability
### Impact A denial of service vulnerability exists in how YARP processes input. ### Patches If you're using YARP `1.0.0`, you should update to NuGet package version [`1.0.1`](https://www.nuget.org/packages/Yarp.ReverseProxy/1.0.1). If you're using YARP `1.1.0-RC.1`, you should update to NuGet package version [`1.1....
{'CVE-2022-26924'}
2022-05-03T17:43:20Z
2022-04-22T20:23:44Z
HIGH
7.5
null
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38', 'https://nvd.nist.gov/vuln/detail/CVE-2022-26924', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26924', 'https://github.com/advisories/GHSA-8xc6-g8xw-h2c4', 'https://github.com/microsoft/revers...
null
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'}
{'https://github.com/microsoft/reverse-proxy/commit/11e6272da17beb03d0b44a19d3c4f1ffa52b7c38'}
GHSA
GHSA-f2rp-4rv7-fc95
Exposure of Sensitive Information to an Unauthorized Actor in foreman_fog_proxmox
A flaw was found in the Foreman project. The Proxmox compute resource exposes the password through the API to an authenticated local attacker with view_hosts permission. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. Versions before foreman_fog_proxmo...
{'CVE-2021-20259'}
2021-06-16T20:01:38Z
2021-06-10T15:54:43Z
HIGH
7.8
{'CWE-200'}
{'https://github.com/advisories/GHSA-f2rp-4rv7-fc95', 'https://github.com/theforeman/foreman_fog_proxmox/releases/tag/v0.13.1', 'https://bugzilla.redhat.com/show_bug.cgi?id=1932144', 'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b', 'https://nvd.nist.gov/vuln...
null
{'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'}
{'https://github.com/theforeman/foreman_fog_proxmox/pull/184/commits/b7e910bf61563f5d447c71b1b41e2a373a794d7b'}
GHSA
GHSA-jgjc-332c-8cmc
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
{'CVE-2019-18622'}
2021-08-19T16:24:17Z
2020-01-16T21:56:15Z
CRITICAL
9.8
{'CWE-89'}
{'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'https://www.phpmyadmin.net/security/PMASA-201...
null
{'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'}
{'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'}
GHSA
GHSA-mvff-h3cj-wj9c
Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux
### Impact Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind moun...
{'CVE-2021-43816'}
2022-02-16T22:03:34Z
2022-01-06T17:36:59Z
HIGH
8
{'CWE-281'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX/', 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://gi...
null
{'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea', 'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299'}
{'https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299', 'https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea'}
GHSA
GHSA-xxgp-pcfc-3vgc
Privilege Escalation in Hibernate Validator
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access thos...
{'CVE-2017-7536'}
2022-03-31T22:00:46Z
2020-06-15T19:57:48Z
HIGH
7
{'CWE-470'}
{'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access....
null
{'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b'}
{'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac'}
GHSA
GHSA-qq74-vgcf-54c3
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0946'}
2022-03-23T15:38:13Z
2022-03-15T00:01:00Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0946', 'https://github.com/advisories/GHSA-qq74-vgcf-54c3'}
null
{'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'}
{'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'}
GHSA
GHSA-f2rp-38vg-j3gh
Null characters not escaped
### Impact Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows): ```javascript const cp = require("child_process"); const s...
{'CVE-2021-21384'}
2021-03-22T14:18:23Z
2021-03-18T23:47:56Z
HIGH
6.3
{'CWE-88'}
{'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384', 'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3', 'https://github.com/advisories/GHSA-f2rp-38vg-j3gh', 'https://github.com/ericcornelissen/shescape/commit/07a069a66...
null
{'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b'}
{'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b'}
GHSA
GHSA-28mg-98xm-q493
Open Redirect in archivy
archivy prior to version 1.7.1 is vulnerable to open redirect.
{'CVE-2022-0697'}
2022-04-05T00:13:22Z
2022-03-08T00:00:32Z
MODERATE
6.1
{'CWE-601'}
{'https://huntr.dev/bounties/2d0301a2-10ff-48f4-a346-5a0e8707835b', 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574', 'https://github.com/pypa/advisory-database/tree/main/vulns/archivy/PYSEC-2022-161.yaml', 'https://github.com/advisories/GHSA-28mg-98xm-q493', 'https://github.com/arch...
null
{'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}
{'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}
GHSA
GHSA-h24f-9mm4-w336
Cross-site Scripting (XSS) - Stored in crud-file-server
Versions of `crud-file-server` before 0.8.0 are vulnerable to stored cross-site scripting (XSS). This is due to insufficient santiziation of filenames when directory index is served by `crud-file-server`. ## Recommendation Update to version 0.8.0 or later.
{'CVE-2018-3726'}
2021-01-08T18:44:58Z
2018-07-18T18:34:27Z
CRITICAL
0
{'CWE-79'}
{'https://hackerone.com/reports/311101', 'https://www.npmjs.com/advisories/570', 'https://github.com/advisories/GHSA-h24f-9mm4-w336', 'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3726'}
null
{'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa'}
{'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa'}
GHSA
GHSA-7hwc-46rm-65jh
Denial of service in XStream
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
{'CVE-2017-7957'}
2021-09-22T18:46:26Z
2020-06-30T22:48:24Z
HIGH
7.5
{'CWE-20'}
{'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'http://www.securitytracker.com/id/1039499', 'https://www-prd-trops.events.ibm.com/node/715749', 'https://github.com/x-...
null
{'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab'}
{'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d'}
GHSA
GHSA-whv6-rj84-2vh2
Cross-Site Scripting in nextcloud-vue-collections
Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's b...
null
2021-10-04T20:36:43Z
2020-09-04T17:21:58Z
HIGH
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-whv6-rj84-2vh2', 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583', 'https://www.npmjs.com/advisories/1442'}
null
{'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'}
{'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'}
GHSA
GHSA-247x-2f9f-5wp7
Stack overflow in TensorFlow
### Impact The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`: ``` library { function { signature { name: "So...
{'CVE-2022-23591'}
2022-02-11T20:00:23Z
2022-02-09T23:30:01Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/advisories/GHSA-247x-2f9f-5wp7', 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23591'}
null
{'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
{'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}
GHSA
GHSA-2xw8-j43j-5vxp
elgg is vulnerable to Cross-site Scripting
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4072'}
2022-01-06T21:35:42Z
2022-01-06T21:35:42Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072', 'https://github.com/advisories/GHSA-2xw8-j43j-5vxp', 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955'}
null
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}
GHSA
GHSA-3xc7-xg67-pw99
Sensitive Data Exposure in sequelize-cli
Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text. ## Recommendation Upgrade to version 5.5.0 or later.
null
2021-08-04T20:54:46Z
2019-06-05T20:43:10Z
LOW
3.5
{'CWE-532'}
{'https://github.com/advisories/GHSA-3xc7-xg67-pw99', 'https://github.com/sequelize/cli/pull/722', 'https://www.npmjs.com/advisories/825', 'https://github.com/sequelize/cli/issues/172', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320', 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}
null
{'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}
{'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}
GHSA
GHSA-9cwv-cppx-mqjm
Improper Authentication in Capsule Proxy
### Impact Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`. ### Patches Patch has been merged in the v0.2.1 release. ### Workarounds...
{'CVE-2022-23652'}
2022-04-19T19:03:24Z
2022-02-23T21:17:25Z
HIGH
8.8
{'CWE-287'}
{'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/advisories/GHSA-9cwv-cppx-mqjm', 'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23652', 'https://github.com/clastix/capsule-pro...
null
{'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8'}
{'https://github.com/clastix/capsule-proxy/commit/efe91f68ebf8a9e3d21491dc57da7b8a746415d8'}
GHSA
GHSA-399h-cmvp-qgx5
Incorrect Default Permissions in Binance tss-lib
The keygen protocol implementation in Binance tss-lib before 1.2.0 allows attackers to generate crafted h1 and h2 parameters in order to compromise a signing round or obtain sensitive information from other parties.
{'CVE-2020-12118'}
2021-06-29T21:32:11Z
2021-06-29T21:32:11Z
HIGH
7.2
{'CWE-276'}
{'https://github.com/advisories/GHSA-399h-cmvp-qgx5', 'https://github.com/binance-chain/tss-lib/pull/89', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12118', 'https://github.com/binance-chain/tss-lib/releases/tag/v1.2.0', 'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'...
null
{'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'}
{'https://github.com/binance-chain/tss-lib/pull/89/commits/7b7c17e90504d5dad94b938e84fec690bb1ec311'}
GHSA
GHSA-jpwx-ffjq-wr4w
Content object state fetch functions open to SQL injection
### Impact This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible. ### Patches The ...
null
2021-09-07T22:54:23Z
2021-09-07T22:54:23Z
HIGH
0
{'CWE-89'}
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://github.com/advisories/GHSA-jpwx-ffjq-wr4w', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection', 'https://github.com/ezsystems/ezpublish-l...
null
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'}
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'}
GHSA
GHSA-6jmh-9gqm-5xrx
Cross-Site Request Forgery (CSRF) in livehelperchat
A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed.
{'CVE-2022-0226'}
2022-01-26T20:21:03Z
2022-01-26T20:21:03Z
MODERATE
4.3
{'CWE-352'}
{'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370', 'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226', 'https://github.com/advisories/GHSA-6jmh-9gqm-5xrx'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}
{'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}
GHSA
GHSA-4f6x-49g2-99fm
Cross-site Scripting in Mermaid
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
{'CVE-2021-35513'}
2021-12-10T18:57:41Z
2021-12-10T18:57:41Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-4f6x-49g2-99fm', 'https://github.com/mermaid-js/mermaid/pull/2123', 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e', 'https://github.com/mermaid-js/mermaid/issues/2122', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513', 'https://gi...
null
{'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'}
{'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e'}
GHSA
GHSA-jcw8-r9xm-32c6
Command Injection in dns-sync
Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method. ## Recommendation - Use an alternative dns resolver - Do not allow untrusted input into `dns-sync.resolve()`
{'CVE-2017-16100'}
2021-01-08T18:35:10Z
2018-07-18T18:28:02Z
CRITICAL
0
{'CWE-94'}
{'https://nodesecurity.io/advisories/523', 'https://github.com/skoranga/node-dns-sync/issues/5', 'https://www.npmjs.com/advisories/523', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16100', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://www.npmjs.com/advisories/153',...
null
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}
{'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d'}
GHSA
GHSA-7g7r-gr46-q4p5
Cross-Site Request Forgery in yetiforce
Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users.
{'CVE-2022-0269'}
2022-01-31T21:47:29Z
2022-01-27T16:21:33Z
HIGH
8
{'CWE-352'}
{'https://github.com/advisories/GHSA-7g7r-gr46-q4p5', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'}
GHSA
GHSA-4r3m-j6x5-48m3
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.
{'CVE-2020-15155'}
2022-04-19T19:02:32Z
2020-08-28T21:20:42Z
LOW
7.3
{'CWE-79'}
{'https://basercms.net/security/20200827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f...
null
{'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}
{'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}
GHSA
GHSA-c92m-rrrc-q5wf
High severity vulnerability that affects safemode
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
{'CVE-2016-3693'}
2021-09-08T21:49:15Z
2017-10-24T18:33:35Z
HIGH
8.1
{'CWE-200'}
{'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'http://rubysec.com/advisories/CVE-2016-3693/', 'http://projects.theforeman.org/issues/14635', 'http://www.openwall.com/lists/oss-security/2016/04/20/8', 'http://theforeman.org/security.html#2016-3693', 'https://nvd.nist.gov/vuln/...
null
{'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f', 'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2'}
{'https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab65b2f2', 'https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d7126f'}
GHSA
GHSA-v52p-hfjf-wg88
Division by zero in TFLite's implementation of `SpaceToBatchNd`
### Impact The implementation of the `SpaceToBatchNd` TFLite operator is [vulnerable to a division by zero error](https://github.com/tensorflow/tensorflow/blob/412c7d9bb8f8a762c5b266c9e73bfa165f29aac8/tensorflow/lite/kernels/space_to_batch_nd.cc#L82-L83): ```cc TF_LITE_ENSURE_EQ(context, final_dim_size % block_shape[d...
{'CVE-2021-29597'}
2021-05-21T14:27:54Z
2021-05-21T14:27:54Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708', 'https://github.com/advisories/GHSA-v52p-hfjf-wg88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v52p-hfjf-wg88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29597'}
null
{'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'}
{'https://github.com/tensorflow/tensorflow/commit/6d36ba65577006affb272335b7c1abd829010708'}
GHSA
GHSA-r626-fc64-3q28
Data race in abox
An issue was discovered in the abox crate before 0.4.1 for Rust. Affected versions of this crate implements `Send`/`Sync` for `AtomicBox<T>` without requiring `T: Send`/`T: Sync`. This allows to create data races to `T: !Sync` and send `T: !Send` to another thread. Such behavior breaks the compile-time thread safety...
{'CVE-2020-36441'}
2021-08-25T20:59:06Z
2021-08-25T20:59:06Z
HIGH
8.1
{'CWE-119', 'CWE-362'}
{'https://github.com/SonicFrog/abox/commit/34c2b9e', 'https://rustsec.org/advisories/RUSTSEC-2020-0121.html', 'https://github.com/SonicFrog/abox/pull/2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36441', 'https://github.com/SonicFrog/abox/issues/1', 'https://github.com/advisories/GHSA-r626-fc64-3q28'}
null
{'https://github.com/SonicFrog/abox/commit/34c2b9e'}
{'https://github.com/SonicFrog/abox/commit/34c2b9e'}
GHSA
GHSA-hrpp-f84w-xhfg
Outdated Static Dependency in vue-moment
Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability. ## Recommendation Upgrade to version 4...
null
2021-10-04T19:13:24Z
2020-09-04T16:55:06Z
MODERATE
5.3
{'CWE-1104'}
{'https://www.npmjs.com/advisories/532', 'https://www.npmjs.com/advisories/1425', 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e', 'https://github.com/advisories/GHSA-hrpp-f84w-xhfg', 'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934'}
null
{'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e'}
{'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e'}
GHSA
GHSA-whrh-9j4q-g7ph
CSRF Vulnerability in polaris-website
### Impact CSRF vulnerability: In some very specific circumstances, an attacker would be able to update your settings. Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings. ### Patch...
null
2021-09-23T18:38:12Z
2020-08-05T21:43:19Z
MODERATE
6.8
{'CWE-352'}
{'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph', 'https://github.com/advisories/GHSA-whrh-9j4q-g7ph', 'https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473', 'https://www.barracuda.com/glossary/csrf', 'https://owasp.org/www-community/attacks/csrf', 'https://github.com/polaris-rbx/P...
null
{'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b'}
{'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b'}
GHSA
GHSA-qr95-4mq5-r3fh
Phar unserialization vulnerability in phpMussel
### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone using >= v1.0.0 < v1.6.0. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be prefe...
{'CVE-2020-4043'}
2021-01-08T20:12:51Z
2020-06-10T19:40:30Z
HIGH
7.7
{'CWE-502'}
{'https://github.com/advisories/GHSA-qr95-4mq5-r3fh', 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities', 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMu...
null
{'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'}
{'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'}
GHSA
GHSA-2ccw-7px8-vmpf
Open Redirect in Flask-AppBuilder
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later. ### For more information If you h...
{'CVE-2022-24776'}
2022-04-07T00:09:52Z
2022-03-25T19:27:39Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf', 'https://github.com/dpgaspar/Flask-AppBuilder/releases/tag/v3.4.5', 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776', 'http...
null
{'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea'}
{'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804/commits/5214d975ebad2ff32057443d2cc20fef1c04d0ea'}
GHSA
GHSA-cg54-gpgr-4rm6
user-readable api tokens in systemd units for JupyterHub
### Impact user API tokens issued to single-user servers are specified in the environment of systemd units, which are accessible to all users. In particular, the-littlest-jupyterhub is affected, which uses systemdspawner by default. ### Patches Patched in jupyterhub-systemdspawner v0.15 ### Workarounds No workaround...
{'CVE-2020-26261'}
2022-04-19T19:02:42Z
2020-12-09T16:27:43Z
HIGH
7.9
{'CWE-668'}
{'https://pypi.org/project/jupyterhub-systemdspawner/', 'https://github.com/jupyterhub/systemdspawner/blob/master/CHANGELOG.md#v015', 'https://github.com/advisories/GHSA-cg54-gpgr-4rm6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26261', 'https://github.com/jupyterhub/systemdspawner/security/advisories/GHSA-cg54-gpgr-4...
null
{'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580'}
{'https://github.com/jupyterhub/systemdspawner/commit/a4d08fd2ade1cfd0ef2c29dc221e649345f23580'}
GHSA
GHSA-7p8h-86p5-wv3p
Cross-site scripting
Two kinds of XSS were found: 1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2. Data cells identified as media will be rendered a...
{'CVE-2021-21422'}
2022-04-19T19:03:00Z
2021-06-28T17:18:04Z
HIGH
8.1
{'CWE-79'}
{'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p', 'https://github.com/advisories/GHSA-7p8h-86p5-wv3p', 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21422', 'https://github.com/mongo-e...
null
{'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b'}
{'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b'}
GHSA
GHSA-4873-36h9-wv49
Out-of-bounds read/write and invalid free with `externref`s and GC safepoints in Wasmtime
### Impact There was an invalid free and out-of-bounds read and write bug when running Wasm that uses `externref`s in Wasmtime. To trigger this bug, Wasmtime needs to be running Wasm that uses `externref`s, the host creates non-null `externrefs`, Wasmtime performs a garbage collection (GC), and there has to be a Wasm...
{'CVE-2021-39218'}
2022-04-19T19:03:08Z
2021-09-20T19:54:16Z
MODERATE
6.3
{'CWE-590', 'CWE-787', 'CWE-125'}
{'https://crates.io/crates/wasmtime', 'https://github.com/advisories/GHSA-4873-36h9-wv49', 'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAVBRYDDUIY2ZR3K3FO4BVYJKIMJ5TP7/', '...
null
{'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'}
{'https://github.com/bytecodealliance/wasmtime/commit/398a73f0dd862dbe703212ebae8e34036a18c11c'}
GHSA
GHSA-3q6f-8grx-pr4v
Cross-site scripting in jspdf
"It's possible to use nested script tags in order to bypass the filtering regex."
{'CVE-2020-7691'}
2021-05-11T16:43:52Z
2021-05-11T16:43:52Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-3q6f-8grx-pr4v', 'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d', 'https://github.com/MrRio/jsPDF/issues/2971', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-575255', 'https://snyk.io/vuln/SNYK-JS-JSPDF-568273', 'https://nvd.nist.gov/vuln/detail/CVE-202...
null
{'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'}
{'https://github.com/MrRio/jsPDF/commit/d0323215b1a1cd1c35bf2b213274ae1e4797715d'}
GHSA
GHSA-qf2g-q4mc-w7rr
Cross-site Scripting in Fork CMS
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
{'CVE-2022-0145'}
2022-03-30T21:04:26Z
2022-03-25T00:00:34Z
MODERATE
5.4
{'CWE-79'}
{'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/advisories/GHSA-qf2g-q4mc-w7rr', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'}
null
{'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}
{'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}
GHSA
GHSA-49q3-8867-5wmp
Remote Command Execution in reg-keygen-git-hash-plugin
### Impact `reg-keygen-git-hash-plugin` through 0.10.15 allow remote attackers to execute of arbitrary commands. ### Patches Upgrade to version 0.10.16 or later. ### For more information If you have any questions or comments about this advisory: - Open an issue in [reg-viz/reg-suit](https://github.com/reg-viz/reg-...
{'CVE-2021-32673'}
2022-04-19T19:02:59Z
2021-06-08T18:47:06Z
HIGH
8.8
{'CWE-94', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32673', 'https://github.com/advisories/GHSA-49q3-8867-5wmp', 'https://github.com/reg-viz/reg-suit/releases/tag/v0.10.16', 'https://www.npmjs.com/package/reg-keygen-git-hash-plugin', 'https://github.com/reg-viz/reg-suit/security/advisories/GHSA-49q3-8867-5wmp', 'https://github...
null
{'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'}
{'https://github.com/reg-viz/reg-suit/commit/f84ad9c7a22144d6c147dc175c52756c0f444d87'}
GHSA
GHSA-8pmx-p244-g88h
Interpreter crash from `tf.io.decode_raw`
### Impact The implementation of `tf.io.decode_raw` produces incorrect results and crashes the Python interpreter when combining `fixed_length` and wider datatypes. ```python import tensorflow as tf tf.io.decode_raw(tf.constant(["1","2","3","4"]), tf.uint16, fixed_length=4) ``` The...
{'CVE-2021-29614'}
2022-04-26T18:09:06Z
2021-05-21T14:28:42Z
HIGH
7.1
{'CWE-665', 'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29614', 'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8pmx-p244-g88h', 'https://github.com/advisories/GHSA-8pmx-p244-g88h'}
null
{'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'}
{'https://github.com/tensorflow/tensorflow/commit/698e01511f62a3c185754db78ebce0eee1f0184d'}
GHSA
GHSA-fxmx-pfm2-85m2
Cross-site Scripting in Ericsson CodeChecker
In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
{'CVE-2021-44217'}
2022-01-21T23:32:32Z
2022-01-21T23:32:32Z
MODERATE
0
{'CWE-79'}
{'https://github.com/advisories/GHSA-fxmx-pfm2-85m2', 'https://user-images.githubusercontent.com/9525971/142965091-e118b012-a7fc-4c2f-ad0c-80aeed6f7ec9.png', 'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1', 'https://github.com/Ericsson/codechecker/releases/tag/v6.18.2', 'https:...
null
{'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1'}
{'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1'}
GHSA
GHSA-wh69-wc6q-7888
Command injection in node-dns-sync
dns-sync through 0.2.0 allows execution of arbitrary commands . This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
{'CVE-2020-11079'}
2021-11-04T17:08:10Z
2020-05-28T18:42:59Z
HIGH
8.6
{'CWE-94', 'CWE-77'}
{'https://github.com/skoranga/node-dns-sync/security/advisories/GHSA-wh69-wc6q-7888', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11079', 'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc', 'https://github.com/advisories/GHSA-wh69-wc6q-7888'}
null
{'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc'}
{'https://github.com/skoranga/node-dns-sync/commit/cb10a5ac7913eacc031ade7d91596277f31645dc'}
GHSA
GHSA-m4hf-j54p-p353
Type confusion leading to segfault in Tensorflow
### Impact The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion: ```python imp...
{'CVE-2022-21731'}
2022-02-11T17:05:51Z
2022-02-10T00:19:50Z
MODERATE
6.5
{'CWE-754', 'CWE-843'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21731', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059', 'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022', 'https://github.com/advisori...
null
{'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'}
{'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'}
GHSA
GHSA-97m3-w2cp-4xx6
Embedded Malicious Code in node-ipc
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
{'CVE-2022-23812'}
2022-04-15T13:11:55Z
2022-03-16T23:54:32Z
CRITICAL
9.8
{'CWE-94', 'CWE-506'}
{'https://github.com/advisories/GHSA-97m3-w2cp-4xx6', 'https://github.com/RIAEvangelist/node-ipc/issues/233', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812', 'https://github.com/RIAEvangelist/node-ipc/issues/236', 'https://security.netapp.com/advisory/ntap-20220407-0005/', 'https://snyk.io/vuln/SNYK-JS-NODEIPC-24263...
null
{'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'}
{'https://github.com/RIAEvangelist/node-ipc/commit/847047cf7f81ab08352038b2204f0e7633449580'}
GHSA
GHSA-r9q4-w3fm-wrm2
Cross-Site Scripting in google-closure-library
Versions of `google-closure-library` prior to 20190301.0.0 are vulnerable to Cross-Site Scripting. The `safedomtreeprocessor.processToString()` function improperly processed empty elements, which could allow attackers to execute arbitrary JavaScript through Mutation Cross-Site Scripting. ## Recommendation Upgrade to...
null
2021-09-27T21:01:49Z
2020-09-02T21:21:43Z
MODERATE
0
{'CWE-79'}
{'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa#commitcomment-33294853', 'https://www.npmjs.com/advisories/878', 'https://snyk.io/vuln/SNYK-JS-GOOGLECLOSURELIBRARY-174519', 'https://github.com/advisories/GHSA-r9q4-w3fm-wrm2'}
null
{'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa'}
{'https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa'}
GHSA
GHSA-jf9v-q8vh-3fmc
Cross-site scripting in ICEcoder
In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed.
{'CVE-2021-32106'}
2021-09-09T17:11:11Z
2021-09-09T17:11:11Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://github.com/icecoder/ICEcoder', 'https://github.com/advisories/GHSA-jf9v-q8vh-3fmc', 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f25...
null
{'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'}
{'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'}
GHSA
GHSA-p8q8-jfcv-g2h2
Directory Traversal in Archive_Tar
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
{'CVE-2021-32610'}
2021-09-27T18:46:37Z
2021-08-09T20:40:06Z
HIGH
7.1
{'CWE-59'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html', 'https://lists.fedoraproject.o...
null
{'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'}
{'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'}
GHSA
GHSA-894g-6j7q-2hx6
Cross site scripting in flask-admin
helpers.py in Flask-Admin 1.5.2 has Reflected XSS via a crafted URL.
{'CVE-2018-16516'}
2022-03-26T00:47:38Z
2018-12-19T19:23:52Z
MODERATE
6.1
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIYCWIH3BRLI2QNC53CQXLKVP27X7EH/', 'https://github.com/flask-admin/flask-admin/pull/1699', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16516', 'https://github.com/flask-admin/flask-admin/releases/tag/v1.5.3', 'https://lists...
null
{'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'}
{'https://github.com/flask-admin/flask-admin/commit/8af10e0b022464fdcb2da3d0ea5bbd2f11c0acd1'}
GHSA
GHSA-hvr8-466p-75rh
Integer overflow discovered in Pillow
Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
{'CVE-2016-4009'}
2022-04-26T18:16:33Z
2018-07-24T20:15:48Z
CRITICAL
9.8
{'CWE-119'}
{'https://security.gentoo.org/glsa/201612-52', 'https://github.com/advisories/GHSA-hvr8-466p-75rh', 'http://www.securityfocus.com/bid/86064', 'https://github.com/python-pillow/Pillow/pull/1714', 'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e', 'https://github.com/python-pillow/...
null
{'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e'}
{'https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e'}
GHSA
GHSA-hxhj-hp9m-qwc4
Moderate severity vulnerability that affects private_address_check
The private_address_check ruby gem before 0.4.0 is vulnerable to a bypass due to use of Ruby's Resolv.getaddresses method, which is OS-dependent and should not be relied upon for security measures, such as when used to blacklist private network addresses to prevent server-side request forgery.
{'CVE-2017-0904'}
2021-01-08T18:38:40Z
2017-11-29T23:21:05Z
MODERATE
0
{'CWE-242'}
{'https://edoverflow.com/2017/ruby-resolv-bug/', 'https://github.com/advisories/GHSA-hxhj-hp9m-qwc4', 'https://github.com/jtdowney/private_address_check/issues/1', 'https://hackerone.com/reports/287835', 'https://nvd.nist.gov/vuln/detail/CVE-2017-0904', 'https://hackerone.com/reports/287245', 'https://github.com/jtdown...
null
{'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}
{'https://github.com/jtdowney/private_address_check/commit/58a0d7fe31de339c0117160567a5b33ad82b46af'}
GHSA
GHSA-9w7h-3wwh-6m5q
Cross-site Scripting in Microweber
Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user.
{'CVE-2022-1439'}
2022-04-26T13:14:56Z
2022-04-23T00:03:02Z
MODERATE
6.3
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://github.com/advisories/GHSA-9w7h-3wwh-6m5q'}
null
{'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'}
{'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'}
GHSA
GHSA-pvrc-hg3f-58r6
Heap OOB access in `Dilation2DBackpropInput`
### Impact An attacker can write outside the bounds of heap allocated arrays by passing invalid arguments to `tf.raw_ops.Dilation2DBackpropInput`: ```python import tensorflow as tf input_tensor = tf.constant([1.1] * 81, shape=[3, 3, 3, 3], dtype=tf.float32) filter = tf.constant([], shape=[0, 0, 3], dtype=tf.float...
{'CVE-2021-29566'}
2021-05-21T14:25:13Z
2021-05-21T14:25:13Z
LOW
2.5
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pvrc-hg3f-58r6', 'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29566', 'https://github.com/advisories/GHSA-pvrc-hg3f-58r6'}
null
{'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}
{'https://github.com/tensorflow/tensorflow/commit/3f6fe4dfef6f57e768260b48166c27d148f3015f'}
GHSA
GHSA-8rf6-w2mx-4xjh
TODO
** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other ...
{'CVE-2019-15149'}
2021-12-03T14:37:54Z
2019-08-19T23:45:47Z
CRITICAL
0
null
{'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149', 'https://github.com/advisories/GHSA-8rf6-w2mx-4xjh', 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'}
null
{'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'}
{'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'}
GHSA
GHSA-gcvv-gq92-x94r
Authenticated server-side request forgery in file upload via URL.
### Impact Authenticated server-side request forgery in file upload via URL. ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For o...
{'CVE-2021-37711'}
2021-08-23T19:42:49Z
2021-08-23T19:42:49Z
HIGH
8.8
{'CWE-918'}
{'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711'}
null
{'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'}
{'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'}
GHSA
GHSA-c383-q5vf-hx55
Integer Overflow or Wraparound in Microweber
Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound.
{'CVE-2022-0913'}
2022-03-23T15:35:30Z
2022-03-12T00:00:36Z
HIGH
7.5
{'CWE-190'}
{'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://github.com/advisories/GHSA-c383-q5vf-hx55'}
null
{'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'}
{'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'}
GHSA
GHSA-vwcg-7xqw-qcxw
Heap Overflow in PyMiniRacer
A heap overflow in Sqreen PyMiniRacer (aka Python Mini Racer) before 0.3.0 allows remote attackers to potentially exploit heap corruption. More details on https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/.
{'CVE-2020-25489'}
2021-01-07T22:56:19Z
2020-09-18T18:03:59Z
MODERATE
0
{'CWE-119'}
{'https://github.com/sqreen/PyMiniRacer/compare/v0.2.0...v0.3.0', 'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d', 'https://blog.sqreen.com/vulnerability-disclosure-finding-a-vulnerability-in-sqreens-php-agent-and-how-we-fixed-it/', 'https://github.com/advisories/GHSA-vwcg-7xqw-q...
null
{'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'}
{'https://github.com/sqreen/PyMiniRacer/commit/627b54768293ec277f1adb997c888ec524f4174d'}
GHSA
GHSA-5ph6-qq5x-7jwc
ExternalName Services can be used to gain access to Envoy's admin interface
### Impact Josh Ferrell (@josh-ferrell) from VMware has reported that a specially crafted ExternalName type Service may be used to access Envoy's admin interface, which Contour normally prevents from access outside the Envoy container. This can be used to shut down Envoy remotely (a denial of service), or to expose the...
{'CVE-2021-32783'}
2022-04-19T19:03:04Z
2021-08-30T17:22:10Z
HIGH
8.5
{'CWE-610'}
{'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32783', 'https://github.com/advisories/GHSA-5ph6-qq5x-7jwc', 'https://github.com/projectcontour/contour/releases/tag/v1.16.1', 'https://github.com/projectcontour/contour/security/advi...
null
{'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'}
{'https://github.com/projectcontour/contour/commit/5f3e6d0ab1d48e64bae46400c85c490b200393a3', 'https://github.com/projectcontour/contour/commit/b53a5c4fd927f4ea2c6cf02f1359d8e28bef852e'}
GHSA
GHSA-w4v7-hwx7-9929
Cross-site Scripting in tempura
This affects the package tempura before 0.4.0. If the input to the esc function is of type object (i.e an array) it is returned without being escaped/sanitized, leading to a potential Cross-Site Scripting vulnerability.
{'CVE-2021-23784'}
2021-11-08T17:50:10Z
2021-11-08T17:50:10Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b', 'https://snyk.io/vuln/SNYK-JS-TEMPURA-1569633', 'https://github.com/lukeed/tempura/releases/tag/v0.4.0', 'https://github.com/advisories/GHSA-w4v7-hwx7-9929', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23784'}
null
{'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'}
{'https://github.com/lukeed/tempura/commit/58a5c3671e2f36b26810e77ead9e0dd471902f9b'}
GHSA
GHSA-p9pc-299p-vxgp
Prototype Pollution in yargs-parser
Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects. Parsing the argument `--foo.__proto__.bar baz'` adds a...
{'CVE-2020-7608'}
2021-07-28T21:26:25Z
2020-09-04T18:00:54Z
MODERATE
5.3
{'CWE-915'}
{'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7608', 'https://github.com/advisories/GHSA-p9pc-299p-vxgp', 'https://snyk.io/vuln/SNYK-JS-YARGSPARSER-560381', 'https://www.npmjs.com/advisories/1500'}
null
{'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'}
{'https://github.com/yargs/yargs-parser/commit/63810ca1ae1a24b08293a4d971e70e058c7a41e2'}
GHSA
GHSA-x7gm-rfgv-w973
Potential DoS with NumberFilter conversion to integer values.
### Impact Automatically generated `NumberFilter` instances, whose value was later converted to an integer, were subject to potential DoS from maliciously input using exponential format with sufficiently large exponents. ### Patches Version 2.4.0+ applies a `MaxValueValidator` with a a default `limit_value` of 1e50...
{'CVE-2020-15225'}
2022-01-06T20:22:26Z
2020-09-28T19:05:29Z
HIGH
7.5
{'CWE-681'}
{'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b', 'https://github.com/carltongibson/django-filter/releases/tag/2.4.0', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DPHENTRHRAYFXYPPBT7JRHZRWILRY44S/', 'https://security.ne...
null
{'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b'}
{'https://github.com/carltongibson/django-filter/commit/340cf7a23a2b3dcd7183f6a0d6c383e85b130d2b'}
GHSA
GHSA-3m93-m4q6-mc6v
Inclusion of Sensitive Information in Log Files and Improper Output Neutralization for Logs in Ansible
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
{'CVE-2019-14864'}
2022-04-25T23:34:51Z
2020-02-26T19:54:31Z
MODERATE
6.5
{'CWE-532'}
{'https://www.debian.org/security/2021/dsa-4950', 'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e', 'https://github.com/ansible/ansible/issues/63522', 'https://github.com/advisories/GHSA-3m93-m4q6-mc6v', 'https://github.com/ansible/ansible/pull/64748', 'https://github.com/ansible/ans...
null
{'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'}
{'https://github.com/ansible/ansible/commit/75288a89d0053d6df35c90863fb6c9542d89850e'}
GHSA
GHSA-6677-83pp-f862
Cross-Site Scripting in @nuxt/devalue
Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys. ## Recommendation Upgrade to version 1.2.3 or later.
{'CVE-2019-13506'}
2021-08-17T18:13:30Z
2019-07-16T00:42:02Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/nuxt/devalue/pull/8', 'https://github.com/advisories/GHSA-6677-83pp-f862', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13506', 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be', 'https://github.com/Rich-Harris/devalue/issues/19', 'https://github.com/nuxt/nuxt.js/compa...
null
{'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be'}
{'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be'}
GHSA
GHSA-6f84-42vf-ppwp
Division by 0 in `QuantizedMul`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedMul`: ```python import tensorflow as tf x = tf.zeros([4, 1], dtype=tf.quint8) y = tf.constant([], dtype=tf.quint8) min_x = tf.constant(0.0) max_x = tf.constant(0.0010000000474974513) min_y = tf.constant(0.0) max_y = tf.constant(0.0010000000474...
{'CVE-2021-29528'}
2021-05-21T17:06:47Z
2021-05-21T14:22:02Z
LOW
2.5
{'CWE-369'}
{'https://github.com/advisories/GHSA-6f84-42vf-ppwp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29528', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f84-42vf-ppwp', 'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'}
null
{'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'}
{'https://github.com/tensorflow/tensorflow/commit/a1b11d2fdd1e51bfe18bb1ede804f60abfa92da6'}