ecosystem stringclasses 14
values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 988
values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-frcq-4ffq-v4mw | Directory Traversal in lessindex | Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /..... | {'CVE-2017-16211'} | 2021-01-14T15:45:02Z | 2020-09-01T18:12:07Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/423', 'https://github.com/advisories/GHSA-frcq-4ffq-v4mw', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex', 'https://www.npmjs.com/advisories/423', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211'} | null |
GHSA | GHSA-cqxr-xf2w-943w | Creation of Temporary File in Directory with Insecure Permissions in auto-generated Java, Scala code | ### Impact
**This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually!
On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories... | {'CVE-2021-21430'} | 2022-04-19T19:02:52Z | 2021-05-11T00:05:06Z | MODERATE | 6.2 | {'CWE-379', 'CWE-378', 'CWE-377', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21430', 'https://github.com/OpenAPITools/openapi-generator/pull/9348', 'https://github.com/OpenAPITools/openapi-generator/pull/8787', 'https://github.com/OpenAPITools/openapi-generator/pull/8791', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-cqx... | null |
GHSA | GHSA-4vvp-x9h2-x2vf | Path Traversal in public | All versions of `public` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL.
## Recommendation
No fix is currently available. Do not use `public` in production or consider using an alternative module until a fix is... | null | 2021-09-29T16:30:39Z | 2020-09-03T20:26:39Z | MODERATE | 0 | {'CWE-22'} | {'https://hackerone.com/reports/593911', 'https://www.npmjs.com/advisories/1144', 'https://github.com/advisories/GHSA-4vvp-x9h2-x2vf'} | null |
GHSA | GHSA-3q5q-f79q-7hr2 | High severity vulnerability that affects rubyzip | Withdrawn, accidental duplicate publish.
The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem. | null | 2021-12-02T23:07:22Z | 2018-07-31T18:21:46Z | HIGH | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2017-5946', 'https://github.com/advisories/GHSA-3q5q-f79q-7hr2'} | null |
GHSA | GHSA-vxf6-w9mp-95hm | Low severity vulnerability that affects puppet | lib/puppet/network/authstore.rb in Puppet before 2.7.18, and Puppet Enterprise before 2.5.2, supports use of IP addresses in certnames without warning of potential risks, which might allow remote attackers to spoof an agent by acquiring a previously used IP address. | {'CVE-2012-3408'} | 2021-09-20T22:23:47Z | 2017-10-24T18:33:38Z | LOW | 0 | {'CWE-287'} | {'https://github.com/advisories/GHSA-vxf6-w9mp-95hm', 'http://puppetlabs.com/security/cve/cve-2012-3408/', 'https://nvd.nist.gov/vuln/detail/CVE-2012-3408', 'https://bugzilla.redhat.com/show_bug.cgi?id=839166', 'https://github.com/puppetlabs/puppet/commit/ab9150baa1b738467a33b01df1d90e076253fbbd'} | null |
GHSA | GHSA-vmqm-g3vh-847m | Denial of service in Apache Xerces2 | Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions. | {'CVE-2012-0881'} | 2021-09-29T18:00:54Z | 2020-06-15T18:51:38Z | HIGH | 7.5 | {'CWE-400'} | {'https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E', 'https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dce... | null |
GHSA | GHSA-9m4x-8w29-r78g | Server-Side Request Forgery in @uppy/companion | The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems. | {'CVE-2020-8205'} | 2021-01-08T20:55:35Z | 2020-08-13T18:54:19Z | MODERATE | 0 | {'CWE-918'} | {'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828', 'https://hackerone.com/reports/891270', 'https://github.com/advisories/GHSA-9m4x-8w29-r78g', 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'} | null |
GHSA | GHSA-vw27-fwjf-5qxm | Arbitrary command execution on Windows via qutebrowserurl: URL handler | ### Impact
Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers it as a handler for certain URL schemes. With some applications such as Outlook Desktop, opening a specially crafted URL can lead to argument injection, allowing execution of qutebrowser commands, which in turn allows arbitrary... | {'CVE-2021-41146'} | 2021-10-22T16:20:10Z | 2021-10-22T16:20:10Z | HIGH | 8.8 | {'CWE-88', 'CWE-77', 'CWE-641'} | {'https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm', 'https://github.com/advisories/GHSA-vw27-fwjf-5qxm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41146', 'https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430'} | null |
GHSA | GHSA-c968-pq7h-7fxv | Division by 0 in `Conv3DBackprop*` | ### Impact
The `tf.raw_ops.Conv3DBackprop*` operations fail to validate that the input tensors are not empty. In turn, this would result in a division by 0:
```python
import tensorflow as tf
input_sizes = tf.constant([0, 0, 0, 0, 0], shape=[5], dtype=tf.int32)
filter_tensor = tf.constant([], shape=[0, 0, 0, 1, 0], dt... | {'CVE-2021-29522'} | 2021-05-21T14:21:39Z | 2021-05-21T14:21:39Z | LOW | 2.5 | {'CWE-369'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29522', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c968-pq7h-7fxv', 'https://github.com/tensorflow/tensorflow/commit/311403edbc9816df80274bd1ea8b3c0c0f22c3fa', 'https://github.com/advisories/GHSA-c968-pq7h-7fxv'} | null |
GHSA | GHSA-2f5j-3mhq-xv58 | Double free in sys-info | An issue was discovered in the sys-info crate before 0.8.0 for Rust. sys_info::disk_info calls can trigger a double free. | {'CVE-2020-36434'} | 2021-08-25T20:58:15Z | 2021-08-25T20:58:15Z | CRITICAL | 9.8 | {'CWE-415'} | {'https://github.com/FillZpp/sys-info-rs/issues/63', 'https://rustsec.org/advisories/RUSTSEC-2020-0100.html', 'https://github.com/advisories/GHSA-2f5j-3mhq-xv58', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36434', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sys-info/RUSTSEC-2020-0100.md'} | null |
GHSA | GHSA-jxgm-9f58-w4xp | Improper Input Validation in Apache Archiva | In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | {'CVE-2019-0214'} | 2021-07-27T20:35:40Z | 2019-05-14T04:00:21Z | MODERATE | 6.5 | {'CWE-20'} | {'http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html', 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Canno... | null |
GHSA | GHSA-6h2c-g688-q9qr | Path traversal in Jenkins Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace. | {'CVE-2022-28156'} | 2022-04-12T21:59:20Z | 2022-03-30T00:00:24Z | MODERATE | 6.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-6h2c-g688-q9qr', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28156', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2683'} | null |
GHSA | GHSA-hm82-qr45-h7mw | Improperly Controlled Modification of Dynamically-Determined Object Attributes in field | Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28269'} | 2021-12-10T17:22:58Z | 2021-12-10T17:22:58Z | CRITICAL | 9.8 | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28269', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,', 'https://github.com/advisories/GHSA-hm82-qr45-h7mw', 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39', 'https://www.whitesourcesoftware.... | null |
GHSA | GHSA-hxx6-p24v-wg8c | High severity vulnerability that affects curl | lib/curl.rb in the Curl Gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a URL. | {'CVE-2013-2617'} | 2021-09-14T17:33:44Z | 2017-10-24T18:33:37Z | HIGH | 0 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2013-2617', 'http://www.osvdb.org/91230', 'http://packetstormsecurity.com/files/120778/Ruby-Gem-Curl-Command-Execution.html', 'https://github.com/advisories/GHSA-hxx6-p24v-wg8c', 'http://www.openwall.com/lists/oss-security/2013/03/19/9', 'http://seclists.org/fulldisclosure/2013/Ma... | null |
GHSA | GHSA-4g46-5grc-wq49 | Cross-Site Scripting in seeftl | All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative... | {'CVE-2019-15603'} | 2021-01-08T20:23:55Z | 2020-04-01T16:36:31Z | HIGH | 0 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-15603', 'https://www.npmjs.com/advisories/1451', 'https://github.com/advisories/GHSA-4g46-5grc-wq49', 'https://hackerone.com/reports/665302'} | null |
GHSA | GHSA-f78f-353m-cf4j | Code Injection in node-rules | node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization. | {'CVE-2020-7609'} | 2021-12-10T20:05:37Z | 2021-12-10T20:05:37Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7609', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832', 'https://github.com/advisor... | null |
GHSA | GHSA-c7pr-343r-5c46 | missing clamps for decimal args in external functions | ### Impact
The following code does not properly validate that its input is in bounds.
```python
@external
def foo(x: decimal) -> decimal:
return x
```
### Patches
0.3.0 / #2447
### Workarounds
Don't use decimal args
| {'CVE-2021-41122'} | 2021-10-07T13:56:53Z | 2021-10-06T17:48:46Z | MODERATE | 4.3 | {'CWE-682'} | {'https://github.com/advisories/GHSA-c7pr-343r-5c46', 'https://github.com/vyperlang/vyper/pull/2447', 'https://github.com/vyperlang/vyper/security/advisories/GHSA-c7pr-343r-5c46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41122'} | null |
GHSA | GHSA-w942-gw6m-p62c | Denial of service in GJSON | GJSON before 1.6.4 allows attackers to cause a denial of service via crafted JSON. | {'CVE-2020-35380'} | 2021-06-23T17:53:05Z | 2021-06-23T17:53:05Z | HIGH | 7.5 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35380', 'https://github.com/tidwall/gjson/commit/f0ee9ebde4b619767ae4ac03e8e42addb530f6bc', 'https://github.com/tidwall/gjson/issues/192', 'https://github.com/advisories/GHSA-w942-gw6m-p62c'} | null |
GHSA | GHSA-qwfw-gxx2-mmv2 | Command Injection in Kylin | Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions afte... | {'CVE-2020-13925'} | 2021-09-22T21:50:55Z | 2020-07-27T22:51:37Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584373', 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091... | null |
GHSA | GHSA-cj43-9h3w-v976 | Moderate severity vulnerability that affects puppet | Unspecified vulnerability in Puppet 2.7.x before 2.7.23 and 3.2.x before 3.2.4, and Puppet Enterprise 2.8.x before 2.8.3 and 3.0.x before 3.0.1, allows remote attackers to execute arbitrary Ruby programs from the master via the resource_type service. NOTE: this vulnerability can only be exploited utilizing unspecified... | {'CVE-2013-4761'} | 2021-12-02T22:32:28Z | 2017-10-24T18:33:37Z | MODERATE | 0 | null | {'http://rhn.redhat.com/errata/RHSA-2013-1283.html', 'https://github.com/advisories/GHSA-cj43-9h3w-v976', 'http://rhn.redhat.com/errata/RHSA-2013-1284.html', 'http://www.debian.org/security/2013/dsa-2761', 'http://puppetlabs.com/security/cve/cve-2013-4761/', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4761', 'http://lis... | null |
GHSA | GHSA-5379-r78w-42h2 | Unlimited transforms allowed for signed nodes | ### Impact
A malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack.
### Patches
This has been resolved in version 3.1.0. The resolution is to limit the numb... | {'CVE-2021-39171'} | 2022-04-19T19:03:03Z | 2021-08-30T16:11:57Z | MODERATE | 5.3 | {'CWE-400'} | {'https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2', 'https://github.com/advisories/GHSA-5379-r78w-42h2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39171', 'https://github.com/node-saml/passport-saml/pull/595'} | null |
GHSA | GHSA-84wg-rgp8-2hg4 | Command Injection in Apache James | Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information. | {'CVE-2021-38542'} | 2022-01-08T00:40:33Z | 2022-01-08T00:40:33Z | MODERATE | 0 | {'CWE-77'} | {'https://www.openwall.com/lists/oss-security/2022/01/04/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38542', 'http://www.openwall.com/lists/oss-security/2022/01/04/1', 'https://github.com/advisories/GHSA-84wg-rgp8-2hg4'} | null |
GHSA | GHSA-6m26-25q2-cq46 | Cross-site Scripting in microweber | Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3. | {'CVE-2022-0763'} | 2022-03-09T20:36:47Z | 2022-02-27T00:00:15Z | MODERATE | 4.8 | {'CWE-79'} | {'https://github.com/advisories/GHSA-6m26-25q2-cq46', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763', 'https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6', 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'} | null |
GHSA | GHSA-267x-w5hx-8hjr | Integer Overflow or Wraparound in OpenCV | In opencv/modules/imgcodecs/src/grfmt_pxm.cpp, function ReadNumber did not checkout the input length, which lead to integer overflow. If the image is from remote, may lead to remote code execution or denial of service. This affects OpenCV 3.3 (corresponding with OpenCV-Python version 3.3.0.9) and earlier. | {'CVE-2017-12864'} | 2021-11-18T15:30:15Z | 2021-10-12T22:02:45Z | HIGH | 8.8 | {'CWE-190'} | {'https://github.com/opencv/opencv/issues/9372', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://security.gentoo.org/glsa/201712-02', 'https://github.com/advisories/GHSA-267x-w5hx-8hjr', 'https://lists.debian.org/debian-lts-announce/2018/07/ms... | null |
GHSA | GHSA-qh4w-7pw3-p4rp | Potential denial of service in bson rubygem | The Moped::BSON::ObjecId.legal? method in mongodb/bson-ruby before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410. | {'CVE-2015-4411'} | 2021-08-25T21:02:03Z | 2020-04-29T15:34:50Z | HIGH | 7.5 | {'CWE-400'} | {'http://www.securityfocus.com/bid/75045', 'https://github.com/mongoid/moped/commit/dd5a7c14b5d2e466f7875d079af71ad19774609b#diff-3b93602f64c2fe46d38efd9f73ef5358R24', 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7', 'https://www.securit... | null |
GHSA | GHSA-w3f4-3q6j-rh82 | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist. | {'CVE-2018-5968'} | 2021-09-22T18:44:20Z | 2020-06-30T20:40:50Z | HIGH | 8.1 | {'CWE-184', 'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2018:0480', 'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://security.netapp.com/advisory/ntap-20180423-0002/', 'https://github.com/advisories/GHSA-w3f4-3... | null |
GHSA | GHSA-xqfj-cr6q-pc8w | Crash in `tf.transpose` with complex inputs | ### Impact
Passing a complex argument to `tf.transpose` at the same time as passing `conjugate=True` argument results in a crash:
```python
import tensorflow as tf
tf.transpose(conjugate=True, a=complex(1))
```
### Patches
We have received a patch for the issue in GitHub commit [1dc6a7ce6e0b3e27a7ae650bfc05b195ca793... | {'CVE-2021-29618'} | 2021-05-21T14:28:58Z | 2021-05-21T14:28:58Z | LOW | 2.5 | {'CWE-755'} | {'https://github.com/tensorflow/issues/42105', 'https://github.com/tensorflow/tensorflow/commit/1dc6a7ce6e0b3e27a7ae650bfc05b195ca793f88', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xqfj-cr6q-pc8w', 'https://github.com/tensorflow/issues/46973', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29618', ... | null |
GHSA | GHSA-wppj-3pjr-9w79 | crater is vulnerable to Unrestricted Upload of File with Dangerous Type | crater is vulnerable to Unrestricted Upload of File with Dangerous Type | {'CVE-2021-4080'} | 2022-01-21T23:55:11Z | 2022-01-21T23:55:11Z | HIGH | 8.8 | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4080', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://github.com/advisories/GHSA-wppj-3pjr-9w79', 'https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db'} | null |
GHSA | GHSA-q7wx-62r7-j2x7 | Moderate severity vulnerability that affects nokogiri | The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack. | {'CVE-2015-1819'} | 2021-09-16T19:39:37Z | 2018-08-08T22:31:12Z | MODERATE | 0 | null | {'https://support.apple.com/HT206167', 'http://rhn.redhat.com/errata/RHSA-2015-2550.html', 'http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html', 'https://support.apple.com/HT206169', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1819', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-N... | null |
GHSA | GHSA-hpcf-8vf9-q4gj | XSS in dialog closeText in jquery-ui | Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function.
jQuery-UI is a library for manipulating UI elements via jQuery.
Version 1.11.4 has a cross site scripting (XSS) vulnerabili... | {'CVE-2016-7103'} | 2022-02-08T22:08:51Z | 2017-10-24T18:33:35Z | HIGH | 6.1 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-7103', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.npmjs.com/advisories/127', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/jquery/jquery-ui/commit/... | null |
GHSA | GHSA-c3h9-896r-86jm | Improper Input Validation in GoGo Protobuf | An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | {'CVE-2021-3121'} | 2022-03-29T21:02:00Z | 2022-03-28T20:28:00Z | HIGH | 8.6 | {'CWE-20', 'CWE-129'} | {'https://github.com/advisories/GHSA-c3h9-896r-86jm', 'https://discuss.hashicorp.com/t/hcsec-2021-23-consul-exposed-to-denial-of-service-in-gogo-protobuf-dependency/29025', 'https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3121', 'https://secu... | null |
GHSA | GHSA-q24h-5rq3-63j9 | Incorrect Authorization in @uppy/companion | @uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name. | {'CVE-2022-0528'} | 2022-03-11T23:24:58Z | 2022-03-04T00:00:19Z | HIGH | 7.5 | {'CWE-200', 'CWE-863'} | {'https://github.com/advisories/GHSA-q24h-5rq3-63j9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0528', 'https://huntr.dev/bounties/8b060cc3-2420-468e-8293-b9216620175b', 'https://github.com/transloadit/uppy/commit/267c34045a1e62c98406d8c31261c604a11e544a'} | null |
GHSA | GHSA-p46c-w9m3-7qr2 | Use of Uninitialized Resource in flumedb. | An issue was discovered in the flumedb crate through 2021-01-07 for Rust. read_entry may read from uninitialized memory locations. | {'CVE-2021-45684'} | 2022-01-07T16:14:38Z | 2022-01-06T22:18:35Z | CRITICAL | 9.8 | {'CWE-908'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0086.html', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/flumedb/RUSTSEC-2021-0086.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45684', 'https://github.com/advisories/GHSA-p46c-w9m3-7qr2'} | null |
GHSA | GHSA-ggjr-2f7v-vhq4 | Authentication Bypass in Kiali | An authentication bypass vulnerability was found in Kiali in versions before 1.31.0 when the authentication strategy `OpenID` is used. When RBAC is enabled, Kiali assumes that some of the token validation is handled by the underlying cluster. When OpenID `implicit flow` is used with RBAC turned off, this token validati... | {'CVE-2021-20278'} | 2021-06-03T21:52:23Z | 2021-06-01T21:57:08Z | MODERATE | 6.5 | {'CWE-290'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1937171', 'https://kiali.io/news/security-bulletins/kiali-security-002/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20278', 'https://github.com/advisories/GHSA-ggjr-2f7v-vhq4'} | null |
GHSA | GHSA-hxm2-r34f-qmc5 | Regular Expression Denial of Service in minimatch | Affected versions of `minimatch` are vulnerable to regular expression denial of service attacks when user input is passed into the `pattern` argument of `minimatch(path, pattern)`.
## Proof of Concept
```
var minimatch = require(“minimatch”);
// utility function for generating long strings
var genstr = function (len... | {'CVE-2016-10540'} | 2021-06-10T23:23:42Z | 2018-10-09T00:40:41Z | HIGH | 7.5 | {'CWE-400'} | {'https://www.npmjs.com/advisories/118', 'https://github.com/advisories/GHSA-hxm2-r34f-qmc5', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10540', 'https://nodesecurity.io/advisories/118'} | null |
GHSA | GHSA-m93v-9qjc-3g79 | Context isolation bypass via leaked cross-context objects in Electron | ### Impact
Apps using `contextIsolation` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron v... | {'CVE-2020-4076'} | 2021-01-07T23:48:12Z | 2020-07-07T00:01:07Z | HIGH | 7.8 | {'CWE-501'} | {'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824', 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79', 'https://github.com/advisories/GHSA-m93v-9qjc-3g79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4076'} | null |
GHSA | GHSA-wv26-rj8c-4r33 | Moderate severity vulnerability that affects auth0-js | CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled. | {'CVE-2018-6874'} | 2021-09-21T21:53:19Z | 2018-11-06T23:15:13Z | HIGH | 8.8 | {'CWE-352'} | {'https://auth0.com/docs/security/bulletins/cve-2018-6874', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874', 'http://www.securityfocus.com/bid/103695', 'https://github.com/advisories/GHSA-wv26-rj8c-4r33'} | null |
GHSA | GHSA-hqc8-j86x-2764 | Off-by-one error in simple-slab | An issue was discovered in the simple-slab crate before 0.3.3 for Rust. remove() has an off-by-one error, causing memory leakage and a drop of uninitialized memory. | {'CVE-2020-35893'} | 2021-08-25T20:48:33Z | 2021-08-25T20:48:33Z | HIGH | 7.5 | {'CWE-193'} | {'https://github.com/advisories/GHSA-hqc8-j86x-2764', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35893', 'https://github.com/nathansizemore/simple-slab/issues/2', 'https://rustsec.org/advisories/RUSTSEC-2020-0039.html'} | null |
GHSA | GHSA-8w65-xjc5-9w79 | Cross-Site Scripting in node-red | Versions of `node-red` prior to 0.20.8are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new Flows, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 0.18.6 or later. | {'CVE-2019-15607'} | 2021-01-08T20:32:09Z | 2020-01-30T21:00:21Z | MODERATE | 0 | {'CWE-79'} | {'https://hackerone.com/reports/681986', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15607', 'https://github.com/advisories/GHSA-8w65-xjc5-9w79', 'https://www.npmjs.com/advisories/1456'} | null |
GHSA | GHSA-qqxw-m5fj-f7gv | The pattern '/\domain.com' is not disallowed when redirecting, allowing for open redirect | ### Impact
An open redirect vulnerability has been found in `oauth2_proxy`. Anyone who uses `oauth2_proxy` may potentially be impacted.
For a context [detectify] have an in depth blog post about the potential impact of an open redirect. Particularly see the OAuth section.
**tl;dr**: People's authentication tokens co... | {'CVE-2020-5233'} | 2022-04-19T19:02:24Z | 2021-12-20T18:02:38Z | MODERATE | 5.9 | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5233', 'https://github.com/advisories/GHSA-qqxw-m5fj-f7gv', 'https://github.com/oauth2-proxy/oauth2_proxy/releases/tag/v5.0.0', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-qqxw-m5fj-f7gv', 'https://github.com/oauth2-proxy/oauth2_proxy/commit/a316f8a... | null |
GHSA | GHSA-553q-hpvp-q8pc | Server-Side Request Forgery in snipe/snipe-it | Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to... | {'CVE-2021-4075'} | 2021-12-10T20:22:15Z | 2021-12-10T20:22:15Z | HIGH | 7.2 | {'CWE-918'} | {'https://github.com/advisories/GHSA-553q-hpvp-q8pc', 'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e', 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075'} | null |
GHSA | GHSA-4jqc-8m5r-9rpr | Prototype Pollution in set-value | This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays. | {'CVE-2021-23440'} | 2022-03-30T21:18:08Z | 2021-09-13T20:09:36Z | HIGH | 7.3 | {'CWE-843', 'CWE-1321'} | {'https://github.com/jonschlinkert/set-value/pull/33', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://github.com/advisories/GHSA-4jqc-8m5r-9rpr', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-... | null |
GHSA | GHSA-cpqf-3c3r-c9g2 | Cobbler before 3.3.0 allows log poisoning | Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection. | {'CVE-2021-40323'} | 2021-10-13T17:27:09Z | 2021-10-05T17:53:20Z | HIGH | 0 | {'CWE-94'} | {'https://github.com/cobbler/cobbler/commit/d8f60bbf14a838c8c8a1dba98086b223e35fe70a', 'https://github.com/advisories/GHSA-cpqf-3c3r-c9g2', 'https://github.com/cobbler/cobbler/releases/tag/v3.3.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40323'} | null |
GHSA | GHSA-gjq4-69wj-p6pr | Path traversal in pimcore | The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file. | {'CVE-2022-0665'} | 2022-03-03T13:27:26Z | 2022-02-23T00:00:59Z | MODERATE | 6.5 | {'CWE-22'} | {'https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0665', 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e', 'https://github.com/advisories/GHSA-gjq4-69wj-p6pr'} | null |
GHSA | GHSA-83r3-c79w-f6wc | High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations. | {'CVE-2015-7521'} | 2021-09-03T22:28:50Z | 2018-11-21T22:23:49Z | HIGH | 8.3 | {'CWE-287'} | {'http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html', 'http://www.openwall.com/lists/oss-security/2016/01/28/12', 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521', 'htt... | null |
GHSA | GHSA-vh95-rmgr-6w4m | Prototype Pollution in minimist | Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--__proto__.y=Polluted` adds a `y` p... | {'CVE-2020-7598'} | 2022-04-26T21:01:40Z | 2020-04-03T21:48:32Z | MODERATE | 5.6 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1179', 'https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94', 'https://github.com/advisories/GHSA-vh95-rmgr-6w4m', 'https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab', 'http://lists.opensuse.org/opensuse-security-anno... | null |
GHSA | GHSA-h698-r4hm-w94p | Validation Bypass in paypal-ipn | Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability.
paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox.
A motivated attacker could craft a request string using the simula... | {'CVE-2014-10067'} | 2021-09-23T20:58:30Z | 2020-08-31T22:54:56Z | MODERATE | 5.9 | {'CWE-287'} | {'https://www.npmjs.com/advisories/26', 'https://nodesecurity.io/advisories/26', 'https://github.com/andzdroid/paypal-ipn/issues/11', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067', 'https://github.com/advisories/GHSA-h698-r4hm-w94p'} | null |
GHSA | GHSA-j67m-jg9p-ppg4 | Malicious Package in ns-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-10-01T16:10:46Z | 2020-09-03T23:18:05Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1298', 'https://github.com/advisories/GHSA-j67m-jg9p-ppg4'} | null |
GHSA | GHSA-g6wq-qcwm-j5g2 | Regular Expression Denial of Service in websocket-extensions (RubyGem) | ### Impact
The ReDoS flaw allows an attacker to exhaust the server's capacity to process
incoming requests by sending a WebSocket handshake request containing a header
of the following form:
Sec-WebSocket-Extensions: a; b="\c\c\c\c\c\c\c\c\c\c ...
That is, a header containing an unclosed string parameter value w... | {'CVE-2020-7663'} | 2021-08-25T21:51:51Z | 2020-06-05T14:21:29Z | HIGH | 8.2 | {'CWE-400'} | {'https://github.com/faye/websocket-extensions-ruby/commit/aa156a439da681361ed6f53f1a8131892418838b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7663', 'https://blog.jcoglan.com/2020/06/02/redos-vulnerability-in-websocket-extensions', 'https://snyk.io/vuln/SNYK-RUBY-WEBSOCKETEXTENSIONS-570830', 'https://github.com/faye... | null |
GHSA | GHSA-3f8r-4qwm-r7jf | Improper Authentication in Apache Traffic Control | Improper authentication is possible in Apache Traffic Control versions 3.0.0 and 3.0.1 if LDAP is enabled for login in the Traffic Ops API component. Given a username for a user that can be authenticated via LDAP, it is possible to improperly authenticate as that user without that user's correct password. | {'CVE-2019-12405'} | 2021-10-13T17:25:42Z | 2021-05-18T15:39:16Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://github.com/advisories/GHSA-3f8r-4qwm-r7jf', 'https://support.f5.com/csp/article/K84141859?utm_source=f5support&utm_medium=RSS', 'https://github.com/apache/trafficcontrol/commit/f780aff77a52d52a37b4d1cc3e8e801c0b557356', 'https://lists.apache.org/thread.html/r3c675031ac220b5eae64a9c84a03ee60045c6045738607d... | null |
GHSA | GHSA-2gjg-5x33-mmp2 | Path Traversal in localhost-now | Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file.
## Recommendation
Update to version 1.0.2 or later. | {'CVE-2018-3729'} | 2021-01-08T20:08:59Z | 2018-07-25T22:44:05Z | HIGH | 0 | {'CWE-22'} | {'https://hackerone.com/reports/312889', 'https://github.com/advisories/GHSA-2gjg-5x33-mmp2', 'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729', 'https://www.npmjs.com/advisories/582'} | null |
GHSA | GHSA-62jx-8vmh-4mcw | Path trav in tar | An issue was discovered in the tar crate before 0.4.36 for Rust. When symlinks are present in a TAR archive, extraction can create arbitrary directories via .. traversal. | {'CVE-2021-38511'} | 2021-08-25T20:58:23Z | 2021-08-25T20:58:23Z | HIGH | 7.5 | {'CWE-22'} | {'https://github.com/advisories/GHSA-62jx-8vmh-4mcw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-38511', 'https://rustsec.org/advisories/RUSTSEC-2021-0080.html', 'https://github.com/alexcrichton/tar-rs/issues/238', 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tar/RUSTSEC-2021-0080.md'} | null |
GHSA | GHSA-gv26-jpj9-c8gq | Incomplete validation in `SparseSparseMinimum` | ### Impact
Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data:
```python
import tensorflow as tf
a_indices = tf.ones([45, 92], dtype=tf.int64)
a_values = tf.ones([45], dtype=tf.int64)... | {'CVE-2021-29607'} | 2022-03-21T20:38:04Z | 2022-03-18T17:52:25Z | MODERATE | 5.3 | {'CWE-754'} | {'https://github.com/advisories/GHSA-gv26-jpj9-c8gq', 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2', 'https://github.com/tensorflow/tensorflow/commit/f6fde895ef9c77d848061c0517f19d0ec2682f3a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29607', 'https://github.com/tensorflow/... | null |
GHSA | GHSA-x5pg-88wf-qq4p | Regular Expression Denial of Service in marked | Affected versions of `marked` are vulnerable to a regular expression denial of service.
The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds.
## Recommendation
Update to version 0.3.9 or later. | {'CVE-2017-16114'} | 2021-01-08T00:47:39Z | 2018-07-24T20:10:52Z | HIGH | 0 | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16114', 'https://github.com/chjj/marked/issues/937', 'https://nodesecurity.io/advisories/531', 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p', 'https://www.npmjs.com/advisories/531'} | null |
GHSA | GHSA-m69q-pmxg-vqch | Directory Traversal in cypserver | Affected versions of `cypserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /..... | {'CVE-2017-16191'} | 2021-01-14T15:40:59Z | 2020-09-01T18:26:00Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/440', 'https://github.com/advisories/GHSA-m69q-pmxg-vqch', 'https://www.npmjs.com/advisories/440', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16191', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver'} | null |
GHSA | GHSA-m7p8-9w66-9frm | Moderate severity vulnerability that affects net-ldap | The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL Certificate Validation. | {'CVE-2017-17718'} | 2021-09-15T18:19:26Z | 2018-01-06T01:11:34Z | MODERATE | 5.9 | {'CWE-295'} | {'https://github.com/ruby-ldap/ruby-net-ldap/issues/258', 'http://openwall.com/lists/oss-security/2017/12/17/10', 'https://github.com/ruby-ldap/ruby-net-ldap/pull/279', 'https://nvd.nist.gov/vuln/detail/CVE-2017-17718', 'https://github.com/advisories/GHSA-m7p8-9w66-9frm'} | null |
GHSA | GHSA-7xf6-cpxm-5mx9 | Malicious Package in bufner-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T21:35:53Z | 2020-09-03T22:27:18Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-7xf6-cpxm-5mx9', 'https://www.npmjs.com/advisories/1264'} | null |
GHSA | GHSA-73xv-w5gp-frxh | Logic error in Legion of the Bouncy Castle BC Java | An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different. | {'CVE-2020-28052'} | 2022-04-22T17:24:18Z | 2021-04-30T16:14:15Z | HIGH | 8.1 | {'CWE-670'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E', 'http... | null |
GHSA | GHSA-r7c9-c69m-rph8 | Code Injection in PHPUnit | Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendo... | {'CVE-2017-9841'} | 2022-04-19T20:16:50Z | 2022-03-26T00:19:30Z | CRITICAL | 9.8 | {'CWE-94'} | {'http://www.securityfocus.com/bid/101798', 'https://github.com/sebastianbergmann/phpunit/pull/1955', 'https://security.gentoo.org/glsa/201711-15', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841', 'https://github.com/sebastianbergmann/phpunit/pull/1956', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http:... | null |
GHSA | GHSA-hxf5-mg84-pj4m | Moderate severity vulnerability that affects moment | Withdrawn, accidental duplicate publish.
The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)." | null | 2021-12-02T23:08:18Z | 2018-07-31T23:03:17Z | MODERATE | 0 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-4055', 'https://github.com/advisories/GHSA-hxf5-mg84-pj4m'} | null |
GHSA | GHSA-jh2m-j8pp-55rc | Prototype Pollution in gedi | All versions of package gedi up to and including version 1.6.3 are vulnerable to Prototype Pollution via the set function. | {'CVE-2020-7727'} | 2021-07-29T22:08:46Z | 2021-05-06T18:12:47Z | CRITICAL | 9.8 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-GEDI-598803', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7727', 'https://github.com/advisories/GHSA-jh2m-j8pp-55rc'} | null |
GHSA | GHSA-2j55-pcw5-x4h2 | Critical severity vulnerability that affects active-support | The `active-support` ruby gem gem is malware and duplicates the official `activesupport` (no hyphen) gem, but adds a compiled extension. The extension attempts to resolve a base64 encoded domain (29faea63.planfhntage.de), downloads a payload, and executes.
This trojan horse gem could allow a remote attacker to execut... | {'CVE-2018-3779'} | 2021-01-08T20:07:51Z | 2018-08-13T15:02:49Z | CRITICAL | 0 | {'CWE-77'} | {'https://github.com/advisories/GHSA-2j55-pcw5-x4h2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3779', 'https://hackerone.com/reports/392311'} | null |
GHSA | GHSA-8j3f-mhq8-gmh4 | Reject unauthorized access with GitHub PATs | ### Impact
_What kind of vulnerability is it? Who is impacted?_
The additional auth mechanism added within https://github.com/go-vela/server/pull/246 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Steps to reproduce
1. Create Vela server
2. Login to Vela U... | {'CVE-2021-21432'} | 2022-04-19T19:02:53Z | 2022-02-15T01:57:18Z | HIGH | 7.5 | {'CWE-863', 'CWE-285'} | {'https://github.com/go-vela/server/security/advisories/GHSA-8j3f-mhq8-gmh4', 'https://github.com/advisories/GHSA-8j3f-mhq8-gmh4', 'https://pkg.go.dev/github.com/go-vela/server', 'https://github.com/go-vela/server/commit/cb4352918b8ecace9fe969b90404d337b0744d46', 'https://github.com/go-vela/server/pull/337', 'https://n... | null |
GHSA | GHSA-f3mq-99jr-ww4r | Multiple mutable pointers in cgc | Affected versions of this crate have the following issues:
1. `Ptr` implements `Send` and `Sync` for all types, this can lead to data
races by sending non-thread safe types across threads.
2. `Ptr::get` violates mutable alias rules by returning multiple mutable
references to the same object.
3. `Ptr::write` us... | {'CVE-2020-36467'} | 2021-08-25T20:56:16Z | 2021-08-25T20:56:16Z | MODERATE | 5.9 | {'CWE-657'} | {'https://rustsec.org/advisories/RUSTSEC-2020-0148.html', 'https://github.com/playXE/cgc/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36467', 'https://github.com/advisories/GHSA-f3mq-99jr-ww4r'} | null |
GHSA | GHSA-c36v-fmgq-m8hx | Prototype Pollution in immer | immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3757'} | 2021-09-13T20:32:41Z | 2021-09-07T22:57:14Z | HIGH | 7.5 | {'CWE-1321', 'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3757', 'https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa', 'https://github.com/advisories/GHSA-c36v-fmgq-m8hx', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'} | null |
GHSA | GHSA-vwhc-pww7-72x6 | Code Injection in total.js | Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of... | {'CVE-2021-32831'} | 2021-09-01T18:24:05Z | 2021-09-01T18:24:05Z | HIGH | 7.5 | {'CWE-94'} | {'https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11', 'https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/', 'https://github.com/advisories/GHSA-vwhc-pww7-72x6', 'https://www.npmjs.com/package/total.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-328... | null |
GHSA | GHSA-qgp4-5qx6-548g | Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby | ### Impact
An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run ... | {'CVE-2021-29460'} | 2022-04-19T19:02:55Z | 2021-04-30T17:30:06Z | HIGH | 7.6 | {'CWE-79'} | {'https://github.com/advisories/GHSA-qgp4-5qx6-548g', 'http://packetstormsecurity.com/files/162359/Kirby-CMS-3.5.3.1-Cross-Site-Scripting.html', 'https://github.com/getkirby/kirby/releases/tag/3.5.4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29460', 'https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx... | null |
GHSA | GHSA-73cq-fhp3-8rpw | Moderate severity vulnerability that affects org.restlet.jse:org.restlet | Restlet Framework 2.1.x before 2.1.7 and 2.x.x before 2.2 RC1, when using XMLRepresentation or XML serializers, allows attackers to cause a denial of service via an XML Entity Expansion (XEE) attack. | {'CVE-2014-1868'} | 2021-09-02T19:18:13Z | 2018-10-17T00:04:53Z | MODERATE | 0 | {'CWE-776'} | {'https://github.com/advisories/GHSA-73cq-fhp3-8rpw', 'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/91181', 'http://secunia.com/advisories/56940', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1868'} | null |
GHSA | GHSA-7xfp-9c55-5vqj | Remote Memory Exposure in request | Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body.
## Proof of Concept
```
var request = require('requ... | {'CVE-2017-16026'} | 2021-01-08T19:13:46Z | 2018-11-09T17:44:01Z | MODERATE | 0 | {'CWE-201'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16026', 'https://github.com/request/request/pull/2018', 'https://github.com/advisories/GHSA-7xfp-9c55-5vqj', 'https://github.com/request/request/issues/1904', 'https://www.npmjs.com/advisories/309', 'https://nodesecurity.io/advisories/309'} | null |
GHSA | GHSA-959q-32g8-vvp7 | Moderate severity vulnerability that affects org.keycloak:keycloak-core | It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks. | {'CVE-2017-12161'} | 2021-01-08T19:05:50Z | 2018-10-18T16:50:05Z | MODERATE | 0 | {'CWE-602'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1484564', 'https://github.com/advisories/GHSA-959q-32g8-vvp7', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161', 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770'} | null |
GHSA | GHSA-m6w8-fq7v-ph4m | GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior | ### Impact
The `GovernorCompatibilityBravo` module may lead to the creation of governance proposals that execute function calls with incorrect arguments due to bad ABI encoding. This happens if the proposal is created using explicit function signatures, e.g. a proposal to invoke the function `foo(uint256)` is created ... | null | 2022-04-19T19:03:20Z | 2022-01-13T16:09:36Z | MODERATE | 0 | null | {'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-m6w8-fq7v-ph4m', 'https://github.com/advisories/GHSA-m6w8-fq7v-ph4m'} | null |
GHSA | GHSA-vcg5-9xw6-r56c | Malicious Package in logsymbles | Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
... | null | 2021-09-30T21:55:56Z | 2020-09-02T21:40:49Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-vcg5-9xw6-r56c', 'https://www.npmjs.com/advisories/908'} | null |
GHSA | GHSA-6mqq-8r44-vmjc | Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 | In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. | {'CVE-2018-1334'} | 2021-09-02T18:14:47Z | 2019-03-14T15:41:04Z | MODERATE | 4.7 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1334', 'https://spark.apache.org/security.html#CVE-2018-1334', 'https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E', 'https://github.com/advisories/GHSA-6mqq-8r44-vmjc'} | null |
GHSA | GHSA-h9ph-jcgh-gf69 | Cross-site Scripting in Limesurvey | The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js. | {'CVE-2021-42112'} | 2021-11-17T21:26:06Z | 2021-10-12T16:40:28Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf', 'https://github.com/LimeSurvey/LimeSurvey/pull/2044', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112', 'https://github.com/advisories/GHSA-h9ph-jcgh-gf69', 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50... | null |
GHSA | GHSA-qgm6-9472-pwq7 | Integer Overflow in openssl-src | Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output ... | {'CVE-2021-23840'} | 2022-04-25T20:25:41Z | 2021-08-25T20:52:19Z | HIGH | 7.5 | {'CWE-190'} | {'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893... | null |
GHSA | GHSA-4mvc-qc5w-v5qr | Information disclosure in the Contao back end | ### Impact
Back end users can manipulate the details view URL to show pages and articles that have not been enabled for them.
### Patches
Update to Contao 4.4.46 or 4.8.6.
### Workarounds
None.
### References
https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html
### For more info... | {'CVE-2019-19712'} | 2021-08-19T16:09:47Z | 2019-12-17T22:53:34Z | MODERATE | 5.3 | {'CWE-276'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19712.yaml', 'https://github.com/advisories/GHSA-4mvc-qc5w-v5qr', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712', 'https://contao.org/en/news.html', 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr'... | null |
GHSA | GHSA-wq6x-g685-w5f2 | Improper Restriction of XML External Entity Reference in Plone | Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role. | {'CVE-2020-28734'} | 2021-04-07T21:13:00Z | 2021-04-07T21:13:00Z | HIGH | 8.8 | {'CWE-611'} | {'https://github.com/advisories/GHSA-wq6x-g685-w5f2', 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt', 'https://github.com/plone/Products.CMFPlone/issues/3209', 'https://www.misakikata.com/codes/plone/python-en.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28734'} | null |
GHSA | GHSA-xrr4-p6fq-hjg7 | Directory traversal vulnerability in Action View in Ruby on Rails | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pa... | {'CVE-2016-0752'} | 2022-04-25T20:40:52Z | 2017-10-24T18:33:35Z | HIGH | 7.5 | {'CWE-22'} | {'http://www.securityfocus.com/bid/81801', 'https://www.exploit-db.com/exploits/40561/', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html', 'http://rhn.redhat.com/errata/RHSA-2016-0296.html', 'http://www.securitytracker.com/id/1034816', 'http://www.openwall.com/lists/oss-security/201... | null |
GHSA | GHSA-fc42-h7q4-qp8h | Command Injection in killport | This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to t... | {'CVE-2021-23360'} | 2021-04-13T15:16:20Z | 2021-04-13T15:16:20Z | HIGH | 7.5 | {'CWE-77'} | {'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9', 'https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360', 'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638', 'https://github.com/advisories/GHSA-f... | null |
GHSA | GHSA-frxp-xxx8-hrg6 | Missing Authorization in DayByDay CRM | In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information. | {'CVE-2022-22108'} | 2022-01-08T00:31:52Z | 2022-01-08T00:31:52Z | MODERATE | 4.3 | {'CWE-862'} | {'https://github.com/advisories/GHSA-frxp-xxx8-hrg6', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108'} | null |
GHSA | GHSA-7ph6-5cmq-xgjq | Path traversal in xwiki-platform-skin-skinx | ### Impact
AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any sec... | {'CVE-2022-23620'} | 2022-02-11T15:00:33Z | 2022-02-09T21:53:29Z | MODERATE | 6.8 | {'CWE-22'} | {'https://jira.xwiki.org/browse/XWIKI-18819', 'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5', 'https://github.com/advisories/GHSA-7ph6-5cmq-xgjq', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-2362... | null |
GHSA | GHSA-v3jv-wrf4-5845 | Local Privilege Escalation in npm | Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resu... | {'CVE-2013-4116'} | 2021-09-23T21:38:19Z | 2020-09-01T16:03:34Z | LOW | 0 | {'CWE-59'} | {'https://github.com/npm/npm/issues/3635', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87141', 'https://bugzilla.redhat.com/show_bug.cgi?id=983917', 'https://github.com/advisories/GHSA-v3jv-wrf4-5845', 'http://www.securityfocus.com/bid/61083', 'http://www.openwall.com/lists/oss-security/2013/07/11/9', 'https:... | null |
GHSA | GHSA-69fv-gw6g-8ccg | Potential memory corruption in arrayfire | An issue was discovered in the arrayfire crate before 3.6.0 for Rust. Addition of the repr() attribute to an enum is mishandled, leading to memory corruption. | {'CVE-2018-20998'} | 2021-08-25T20:43:26Z | 2021-08-25T20:43:26Z | CRITICAL | 9.8 | {'CWE-119'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-20998', 'https://rustsec.org/advisories/RUSTSEC-2018-0011.html', 'https://github.com/arrayfire/arrayfire-rust/pull/177', 'https://github.com/advisories/GHSA-69fv-gw6g-8ccg'} | null |
GHSA | GHSA-5pg7-v24c-9rp9 | Prototype pollution in controlled-merge | Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28268'} | 2021-07-28T22:07:01Z | 2021-05-18T01:53:46Z | HIGH | 7.5 | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268', 'https://github.com/advisories/GHSA-5pg7-v24c-9rp9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28268', 'https://github.com/hlfshell/controlled-merge/commit/5a4b2e9ffe5a0be7f8843d4ab038599d3ae5f9d4', 'https://www.npmjs.com/package/controlled-... | null |
GHSA | GHSA-f85h-23mf-2fwh | Argument Injection in Ansible | A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be v... | {'CVE-2020-1738'} | 2022-02-09T22:00:04Z | 2022-02-09T22:00:04Z | MODERATE | 3.9 | {'CWE-88'} | {'https://security.gentoo.org/glsa/202006-11', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1738', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738', 'https://github.com/advisories/GHSA-f85h-23mf-2fwh', 'https://github.com/ansible/ansible/issues/67796'} | null |
GHSA | GHSA-f7q6-xxph-mfm8 | Cross-site Scripting in Pimcore | Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability. | {'CVE-2022-0251'} | 2022-02-10T22:24:52Z | 2022-01-27T00:01:26Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0251', 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb', 'https://github.com/advisories/GHSA-f7q6-xxph-mfm8', 'https://huntr.dev/bounties/eb4b08f9-cf8b-4335-b3b8-ed44e5fa80a5'} | null |
GHSA | GHSA-gchq-9r68-6jwv | Cross-Site Request Forgery in Jenkins Credentials Plugin | Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability. | {'CVE-2021-21648'} | 2021-06-16T17:24:31Z | 2021-06-16T17:24:31Z | MODERATE | 6.1 | {'CWE-79'} | {'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349', 'https://github.com/advisories/GHSA-gchq-9r68-6jwv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21648'} | null |
GHSA | GHSA-hq8g-qq57-5275 | SQL Injection in untitled-model | All versions of `untitled-model` re vulnerable to SQL Injection. Query parameters are not properly sanitized allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-28T17:03:10Z | 2020-09-11T21:24:33Z | HIGH | 0 | {'CWE-89'} | {'https://hackerone.com/reports/507222', 'https://www.npmjs.com/advisories/989', 'https://github.com/advisories/GHSA-hq8g-qq57-5275'} | null |
GHSA | GHSA-pfjq-935c-4895 | Data races in v9 | Affected versions of this crate unconditionally implement `Sync` for `SyncRef<T>`.
This definition allows data races if `&T` is accessible through `&SyncRef`.
`SyncRef<T>` derives `Clone` and `Debug`, and the default implementations of those traits access `&T` by invoking `T::clone()` & `T::fmt()`. It is possible to c... | null | 2021-08-25T21:00:37Z | 2021-08-25T21:00:37Z | MODERATE | 0 | {'CWE-362'} | {'https://github.com/purpleposeidon/v9/issues/1', 'https://github.com/advisories/GHSA-pfjq-935c-4895', 'https://rustsec.org/advisories/RUSTSEC-2020-0127.html'} | null |
GHSA | GHSA-vm59-329q-p468 | Cross-site Scripting in Apache UIMA | This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code. | {'CVE-2018-8035'} | 2021-08-03T21:30:32Z | 2019-05-14T04:00:37Z | MODERATE | 6.1 | {'CWE-79'} | {'https://github.com/advisories/GHSA-vm59-329q-p468', 'https://uima.apache.org/security_report', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'} | null |
GHSA | GHSA-mq7g-6rv4-pj95 | Downloads Resources over HTTP in embedza | Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`.... | {'CVE-2016-10569'} | 2021-01-08T18:26:11Z | 2019-02-18T23:35:23Z | HIGH | 0 | {'CWE-311'} | {'https://www.npmjs.com/advisories/187', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569', 'https://github.com/advisories/GHSA-mq7g-6rv4-pj95', 'https://nodesecurity.io/advisories/187'} | null |
GHSA | GHSA-m3xv-x3ph-mq22 | Server-side Template Injection in nystudio107/craft-seomatic | A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header. | {'CVE-2021-44618'} | 2022-03-24T13:44:50Z | 2022-03-12T00:00:34Z | HIGH | 9.8 | {'CWE-94'} | {'https://github.com/nystudio107/craft-seomatic/releases/tag/3.4.12', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618', 'https://github.com/advisories/GHSA-m3xv-x3ph-mq22', 'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'} | null |
GHSA | GHSA-crr2-ph72-c52g | Malicious Package in my-very-own-package | All versions of `my-very-own-package` contain malicious code. The package sends the output of `process.versions`, `process.arch` and `process.platform` to a remote server in a postinstall script.
## Recommendation
Remove the package from your environment. There are no further signs of compromise. | null | 2021-09-30T17:44:06Z | 2020-09-03T17:27:22Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1043', 'https://github.com/advisories/GHSA-crr2-ph72-c52g'} | null |
GHSA | GHSA-p43w-g3c5-g5mq | Out of bounds read in Pillow | An issue was discovered in Pillow before 8.1.1. There is an out-of-bounds read in SGIRleDecode.c. | {'CVE-2021-25293'} | 2021-12-02T15:31:01Z | 2021-03-29T16:35:27Z | HIGH | 7.5 | {'CWE-125'} | {'https://security.gentoo.org/glsa/202107-33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25293', 'https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html', 'https://github.com/python-pillow/Pillow/commit/4853e522bddbec66022c0915b9a56255d0188bf9', 'https://github.com/advisories/GHSA-p43w-g3c5-g5mq'} | null |
GHSA | GHSA-4fcw-pq4r-f4q7 | Server-Side Request Forgery in Spinnaker Orca | The Spinnaker template resolution functionality is vulnerable to Server-Side Request Forgery (SSRF), which allows an attacker to send requests on behalf of Spinnaker potentially leading to sensitive data disclosure. | {'CVE-2020-9298'} | 2021-05-07T15:54:31Z | 2021-05-07T15:54:31Z | HIGH | 7.5 | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9298', 'https://github.com/spinnaker/orca/releases/tag/v8.7.0', 'https://github.com/advisories/GHSA-4fcw-pq4r-f4q7', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-003.md', 'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67b... | null |
GHSA | GHSA-v988-828w-xvf2 | Authentication Bypass Using an Alternate Path or Channel and Authentication Bypass by Primary Weakness in rucio-webui | ### Impact
`rucio-webui` installations of the `1.26` release line potentially leak the contents of cookies to other sessions within a wsgi container. Impact is that Rucio authentication tokens are leaked to other users accessing the `webui` within a close timeframe, thus allowing users to access the `webui` with the le... | null | 2021-10-22T16:21:07Z | 2021-10-22T16:21:07Z | HIGH | 0 | {'CWE-288', 'CWE-305'} | {'https://github.com/advisories/GHSA-v988-828w-xvf2', 'https://github.com/rucio/rucio/issues/4928', 'https://github.com/rucio/rucio/issues/4810', 'https://github.com/rucio/rucio/releases/tag/1.26.7', 'https://github.com/rucio/rucio/security/advisories/GHSA-v988-828w-xvf2'} | null |
GHSA | GHSA-qggc-pj29-j27m | Improper Privilege Management in Mattermost | One of the API in Mattermost version 6.4.1 and earlier fails to properly protect the permissions, which allows the authenticated members with restricted custom admin role to bypass the restrictions and view the server logs and server config.json file contents. Per the Mattermost security updates page, versions 6.4.2, 6... | {'CVE-2022-1332'} | 2022-04-22T21:05:51Z | 2022-04-14T00:00:17Z | MODERATE | 4.3 | {'CWE-200', 'CWE-269'} | {'https://github.com/advisories/GHSA-qggc-pj29-j27m', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1332', 'https://mattermost.com/security-updates/'} | null |
GHSA | GHSA-5q8m-mqmx-pxp9 | Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation | Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path... | {'CVE-2018-1274'} | 2022-04-27T13:59:21Z | 2018-10-17T17:23:44Z | HIGH | 7.5 | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1274', 'https://pivotal.io/security/cve-2018-1274', 'http://www.securityfocus.com/bid/103769', 'https://github.com/advisories/GHSA-5q8m-mqmx-pxp9'} | null |
GHSA | GHSA-954j-f27r-cj52 | Cleartext storage of session identifier | User session identifiers were stored in cleartext - without processing of additional cryptographic hashing algorithms. This vulnerability cannot be exploited directly and occurs in combination with a chained attack - like for instance SQL injection in any other component of the system.
### Solution
Update to TYPO3 ver... | {'CVE-2020-26228'} | 2022-04-19T19:02:40Z | 2020-11-23T21:18:36Z | HIGH | 8.1 | {'CWE-312'} | {'https://github.com/advisories/GHSA-954j-f27r-cj52', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-954j-f27r-cj52', 'https://typo3.org/security/advisory/typo3-core-sa-2020-011', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26228'} | null |
GHSA | GHSA-c7fh-chf7-jr5x | ReDOS in Vfsjfilechooser2 | A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs. | {'CVE-2021-29061'} | 2022-01-06T18:44:27Z | 2022-01-06T18:44:27Z | HIGH | 7.5 | {'CWE-770'} | {'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29061', 'https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9', 'https://github.com/advisories/GHSA-c7fh-chf7-jr5x', 'https://github.com/fracpete/vfsjfilechooser2/comm... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.