ecosystem stringclasses 14
values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 988
values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
GHSA | GHSA-cmc7-mfmr-xqrx | Logic error in authentication in proxy.py | before_upstream_connection in AuthPlugin in http/proxy/auth.py in proxy.py before 2.3.1 accepts incorrect Proxy-Authorization header data because of a boolean confusion (and versus or). | {'CVE-2021-3116'} | 2021-04-07T21:01:25Z | 2021-04-07T21:01:25Z | HIGH | 7.5 | {'CWE-287', 'CWE-480'} | {'https://github.com/advisories/GHSA-cmc7-mfmr-xqrx', 'https://github.com/abhinavsingh/proxy.py/pull/482/commits/9b00093288237f5073c403f2c4f62acfdfa8ed46', 'https://pypi.org/project/proxy.py/2.3.1/#history', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3116', 'https://cardaci.xyz/advisories/2021/01/10/proxy.py-2.3.0-brok... | null |
GHSA | GHSA-2xwq-h7r9-6w27 | Cross-site Scripting in kimai2 | Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs | {'CVE-2021-3957'} | 2021-11-23T17:59:40Z | 2021-11-23T17:59:40Z | MODERATE | 4.6 | {'CWE-352'} | {'https://github.com/advisories/GHSA-2xwq-h7r9-6w27', 'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3', 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'} | null |
GHSA | GHSA-q8qj-fc9q-cphr | Undefined behavior in Tensorflow | ### Impact
If a user passes an invalid argument to `dlpack.to_dlpack` the expected validations will cause variables to bind to `nullptr` while setting a `status` variable to the error condition.
However, this `status` argument is not properly checked:
https://github.com/tensorflow/tensorflow/blob/0e68f4d3295eb0281a517... | {'CVE-2020-15191'} | 2021-11-19T15:19:57Z | 2020-09-25T18:28:25Z | MODERATE | 5.3 | {'CWE-252', 'CWE-20', 'CWE-476'} | {'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00065.html', 'https://github.com/tensorflow/tensorflow/commit/22e07fb204386768e5bcbea563641ea11f96ceb8', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q8qj-fc9q-cphr', 'https://github.com/tensorflow/tensorflow/releases/tag/v2.3.1', '... | null |
GHSA | GHSA-277p-xwpp-3jf7 | Malicious Package in rrgod | All versions of `rrgod` are considered malicious. The package is malware designed to run arbitrary scripts. When installed, the package downloads an arbitrary file and executes its contents as a pre, post and install scripts.
## Recommendation
This package is not available on the npm Registry anymore. If you happen ... | null | 2021-10-01T13:42:10Z | 2020-09-02T15:49:22Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-277p-xwpp-3jf7', 'https://www.npmjs.com/advisories/764'} | null |
GHSA | GHSA-vrh8-27q8-fr8f | Low severity vulnerability that affects org.apache.solr:solr-core | Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL. | {'CVE-2017-3164'} | 2021-09-20T22:18:55Z | 2019-03-14T15:39:56Z | HIGH | 7.5 | {'CWE-918'} | {'https://lists.apache.org/thread.html/75dc651478f9d04505b46d44fe3ac739e7aaf3d7bf1257973685f8f7@%3Cdev.lucene.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN%3DwO5rYs6ktAX-5%3D-f5JDFwbbTSM2TTjEbGO5jKKA%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/43026507... | null |
GHSA | GHSA-fqfj-cmh6-hj49 | Ruby OpenID | Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their Ope... | {'CVE-2019-11027'} | 2021-09-21T16:25:53Z | 2019-06-13T16:15:56Z | CRITICAL | 9.8 | {'CWE-918'} | {'https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html', 'https://security.gentoo.org/glsa/202003-09', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11027', 'https://marc.info/?l=openid-security&m=155154717027534&w=2', 'https://github.com/openid/ruby-openid/issues/122', 'https://github.com/advisories/GHSA-fq... | null |
GHSA | GHSA-cvh5-p6r6-g2qc | Exposed phpinfo() leadked via documentation files | ### Impact
The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc).
### Patches
Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7... | {'CVE-2021-37704'} | 2021-08-30T16:13:40Z | 2021-08-30T16:13:40Z | MODERATE | 5.4 | {'CWE-200', 'CWE-668'} | {'https://github.com/PHPSocialNetwork/phpfastcache/pull/813', 'https://github.com/PHPSocialNetwork/phpfastcache/pull/815', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37704', 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc', 'https://github.com/PHPSocialNetwork/phpfastcache/blob... | null |
GHSA | GHSA-gcx2-gvj7-pxv3 | Insufficient Protection against HTTP Request Smuggling in mitmproxy | ### Impact
In mitmproxy 7.0.4 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/resp... | {'CVE-2022-24766'} | 2022-03-22T19:32:46Z | 2022-03-22T19:22:59Z | CRITICAL | 9.8 | {'CWE-444'} | {'https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24766', 'https://mitmproxy.org/posts/releases/mitmproxy8/', 'https://github.com/advisories/GHSA-gcx2-gvj7-pxv3', 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj... | null |
GHSA | GHSA-3gqj-cmxr-p4x2 | Forced Browsing in Twisted | Twisted before 16.3.1 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to... | {'CVE-2016-1000111'} | 2021-08-12T17:02:19Z | 2021-04-30T17:32:28Z | MODERATE | 5.3 | {'CWE-425'} | {'https://twistedmatrix.com/trac/ticket/8623', 'http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html', 'https://www.openwall.com/lists/oss-security/2016/07/18/6', 'https://twistedmatrix.com/pipermail/twisted-web/2016-August/005268.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000111'... | null |
GHSA | GHSA-2q95-593f-g7h7 | OS Command Injection in Centreon | /graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter. | {'CVE-2020-22345'} | 2021-09-02T17:16:06Z | 2021-09-02T17:16:06Z | HIGH | 8.8 | {'CWE-78'} | {'https://engindemirbilek.github.io/centreon-19.10-rce', 'https://github.com/advisories/GHSA-2q95-593f-g7h7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-22345', 'https://github.com/centreon/centreon/pull/8467#event-3163627607'} | null |
GHSA | GHSA-74hh-4rcv-pp27 | Malicious Package in bitconijs-lib | All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a d... | null | 2021-10-01T20:43:55Z | 2020-09-04T16:44:19Z | CRITICAL | 9.1 | {'CWE-506'} | {'https://github.com/advisories/GHSA-74hh-4rcv-pp27', 'https://www.npmjs.com/advisories/1370'} | null |
GHSA | GHSA-gcqq-w6gr-h9j9 | Directory traversal vulnerability in RubyZip | The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem. | {'CVE-2017-5946'} | 2022-04-25T16:33:03Z | 2017-10-24T18:33:35Z | CRITICAL | 9.8 | {'CWE-22'} | {'http://www.debian.org/security/2017/dsa-3801', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5946', 'http://www.securityfocus.com/bid/96445', 'https://github.com/advisories/GHSA-gcqq-w6gr-h9j9', 'https://github.com/rubyzip/rubyzip/releases', 'https://github.com/rubyzip/rubyzip/issues/315'} | null |
GHSA | GHSA-q52j-4q2q-hcj6 | Authentication Bypass in console-io | Affected versions of the `console-io` package do not configure the underlying websocket library to require authentication, resulting in an authentication bypass vulnerability. As `console-io` allows terminal access on the server via a web page, an authentication bypass is essentially remote code execution.
## Recomm... | {'CVE-2016-10532'} | 2021-09-16T19:31:29Z | 2019-02-18T23:39:39Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://github.com/advisories/GHSA-q52j-4q2q-hcj6', 'https://nodesecurity.io/advisories/90', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10532', 'https://www.npmjs.com/advisories/90'} | null |
GHSA | GHSA-j96p-r523-8r3w | HTTP Request Smuggling in github.com/hyperledger/fabric | A vulnerability has been detected in HyperLedger Fabric v1.4.0, v2.0.0, v2.0.1, v2.3.0. It can easily break down as many orderers as the attacker wants. This bug can be leveraged by constructing a message whose header is invalid to the interface Order. This bug has been admitted and fixed by the developers of Fabric. | {'CVE-2021-43669'} | 2021-12-03T20:52:02Z | 2021-12-03T20:52:02Z | HIGH | 7.5 | {'CWE-444'} | {'https://github.com/advisories/GHSA-j96p-r523-8r3w', 'https://github.com/hyperledger/fabric/pull/2828', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43669', 'https://github.com/hyperledger/fabric/releases/tag/v2.4.0-beta', 'https://jira.hyperledger.org/browse/FAB-18528'} | null |
GHSA | GHSA-7p79-6x2v-5h88 | Server crash if running Python 3.10 w/ Sanic 20.12 | **!!! ONLY APPLIES TO VERSIONS PRIOR TO Sanic v20.12 WHEN USING Python 3.10 !!!**
Sanic v20.12 officially supports Python versions 3.6, 3.7, 3.8, and 3.9. However, if you accidentally run it with version 3.10 (**which is not supported by Sanic 20.12**), your server is prone to crashing on an incoming web request.
###... | null | 2022-04-19T19:03:23Z | 2022-02-16T22:57:57Z | HIGH | 0 | null | {'https://github.com/sanic-org/sanic/security/advisories/GHSA-7p79-6x2v-5h88', 'https://github.com/sanic-org/sanic/releases/tag/v20.12.6', 'https://github.com/advisories/GHSA-7p79-6x2v-5h88'} | null |
GHSA | GHSA-52qp-gwwh-qrg4 | Missing Handler in @scandipwa/magento-scripts | ### Impact
After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-a... | {'CVE-2021-32684'} | 2021-06-21T17:10:02Z | 2021-06-21T17:10:02Z | MODERATE | 6.2 | {'CWE-670'} | {'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4', 'https://github.com/advisories/GHSA-52qp-gwwh-qrg4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684', 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'} | null |
GHSA | GHSA-pfrg-w49c-8432 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-20... | {'CVE-2020-0768'} | 2021-08-02T17:26:23Z | 2021-08-02T17:26:23Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0768', 'https://github.com/advisories/GHSA-pfrg-w49c-8432', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0768'} | null |
GHSA | GHSA-v35c-49j6-q8hq | Security Constraint Bypass in Spring Security | Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet... | {'CVE-2016-9879'} | 2021-10-04T21:19:12Z | 2020-09-15T20:30:34Z | HIGH | 7.5 | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-9879', 'https://access.redhat.com/errata/RHSA-2017:1832', 'https://github.com/advisories/GHSA-v35c-49j6-q8hq', 'https://pivotal.io/security/cve-2016-9879', 'http://www.securityfocus.com/bid/95142'} | null |
GHSA | GHSA-5qx5-vg5w-5mx3 | Stored XSS vulnerability in Jenkins Badge Plugin | Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | {'CVE-2022-23108'} | 2022-04-29T04:37:49Z | 2022-01-13T00:00:54Z | MODERATE | 0 | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://github.com/advisories/GHSA-5qx5-vg5w-5mx3', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108'} | null |
GHSA | GHSA-5v95-v8c8-3rh6 | Privilege escalation in rbac | ### Impact
Using a carefully crafted request or malicious proxy, a user with `UserWrite` permissions could create another user with higher privileges than their own due to insufficient checks on the allowed set of permissions. The event would be captured in the Event Log.
### Patches
The issue has been fixed in 0.24.0... | {'CVE-2021-22538'} | 2021-05-21T14:32:55Z | 2021-05-21T14:32:55Z | HIGH | 8.8 | {'CWE-276'} | {'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.24.0', 'https://github.com/google/exposure-notifications-verification-server/commit/eb8cf40b12dbe79304f1133c06fb73419383cd95', 'https://github.com/google/exposure-notifications-verification-server/releases/tag/v0.23.1', 'https://gith... | null |
GHSA | GHSA-j6w4-pg6p-5mrv | Directory Traversal in tmock | `tmock` is a static file server.
`tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```
HTTP/1.1 200 OK
Date: Thu, 04 May 20... | {'CVE-2017-16106'} | 2021-01-08T18:36:36Z | 2018-07-23T23:51:04Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/375', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock', 'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv', 'https://nodesecurity.io/advisories/375', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106'} | null |
GHSA | GHSA-7cj4-gj8m-m2f7 | Authentication bypass in Apache Shiro | Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. | {'CVE-2020-17510'} | 2021-08-31T21:06:40Z | 2021-04-22T16:13:23Z | CRITICAL | 9.8 | {'CWE-287'} | {'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html',... | null |
GHSA | GHSA-6584-gfwm-3vc3 | Malicious Package in budfer-xor | Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-29T20:54:03Z | 2020-09-03T21:43:01Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-6584-gfwm-3vc3', 'https://www.npmjs.com/advisories/1233'} | null |
GHSA | GHSA-54qq-9chj-rxhv | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability. | {'CVE-2022-0395'} | 2022-02-10T22:25:23Z | 2022-01-29T00:00:33Z | MODERATE | 5.4 | {'CWE-79'} | {'https://huntr.dev/bounties/36abbd6e-239e-4739-8c77-ba212b946a4a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395', 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb', 'https://github.com/advisories/GHSA-54qq-9chj-rxhv'} | null |
GHSA | GHSA-8phj-f9w2-cjcc | Arbitrary file reading vulnerability in Aim | ### Impact
A path traversal attack aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored... | {'CVE-2021-43775'} | 2022-04-19T19:03:15Z | 2021-11-23T22:03:23Z | HIGH | 8.6 | {'CWE-22'} | {'https://github.com/aimhubio/aim/pull/1003', 'https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc', 'https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16', 'https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d563973... | null |
GHSA | GHSA-x38q-xg2h-rxgx | Regular Expression Denial of Service in Leo Editor | Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py. | {'CVE-2020-23478'} | 2021-09-30T18:35:49Z | 2021-09-23T23:14:28Z | HIGH | 7.5 | {'CWE-697'} | {'https://github.com/leo-editor/leo-editor/issues/1597', 'https://github.com/advisories/GHSA-x38q-xg2h-rxgx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23478'} | null |
GHSA | GHSA-jjp3-m93h-5jm4 | Cross-site Scripting in microweber | Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12. | {'CVE-2022-0928'} | 2022-03-24T23:19:36Z | 2022-03-12T00:00:34Z | MODERATE | 6.8 | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928', 'https://github.com/advisories/GHSA-jjp3-m93h-5jm4', 'https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd'} | null |
GHSA | GHSA-g4xp-36c3-f7mr | Hidden Directories Always Served in inert | Versions 1.1.1 and earlier of `inert` are vulnerable to an information leakage vulnerability which causes files in hidden directories to be served, even when showHidden is false.
The inert directory handler always allows files in hidden directories to be served, even when `showHidden` is false.
## Recommendation
Up... | {'CVE-2014-10068'} | 2021-01-07T23:37:01Z | 2020-08-31T22:47:41Z | MODERATE | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/14', 'https://github.com/hapijs/inert/commit/e8f99f94da4cb08e8032eda984761c3f111e3e82', 'https://github.com/hapijs/inert/pull/15', 'https://github.com/advisories/GHSA-g4xp-36c3-f7mr', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10068', 'https://nodesecurity.io/advisories/14'} | null |
GHSA | GHSA-6j63-35hj-vmcg | Moderate severity vulnerability that affects mysql-binuuid-rails | mysql-binuuid-rails 1.1.0 and earlier allows SQL Injection because it removes default string escaping for affected database columns. | {'CVE-2018-18476'} | 2021-09-02T16:27:55Z | 2018-10-30T20:34:06Z | CRITICAL | 9.8 | {'CWE-89'} | {'https://gist.github.com/viraptor/881276ea61e8d56bac6e28454c79f1e6', 'https://github.com/nedap/mysql-binuuid-rails/pull/18', 'https://github.com/advisories/GHSA-6j63-35hj-vmcg', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18476'} | null |
GHSA | GHSA-43q8-3fv7-pr5x | Improper Validation of Integrity Check Value in TensorFlow | ### Impact
The implementation of [`tf.sparse.split`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_split_op.cc#L26-L102) does not fully validate the input arguments. Hence, a malicious user can trigger a denial of service via a segfault or a heap O... | null | 2022-02-09T23:37:55Z | 2022-02-09T23:37:55Z | HIGH | 7 | {'CWE-354'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x', 'https://github.com/advisories/GHSA-43q8-3fv7-pr5x', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69', 'https://github.com/tensorflow/tensorflow/commit/61bf91e768173b001d56923600b40d9a95a04ad5', 'https... | null |
GHSA | GHSA-qc36-q22q-cjw3 | SMTP command injection in lettre | ### Impact
Affected versions of lettre allowed SMTP command injection through an attacker's controlled message body. The module for escaping lines starting with a period wouldn't catch a period that was placed after a double CRLF sequence, allowing the attacker to end the current message and write arbitrary SMTP comma... | {'CVE-2021-38189'} | 2022-04-19T19:02:58Z | 2021-07-12T17:03:27Z | CRITICAL | 9.8 | {'CWE-147'} | {'https://github.com/lettre/lettre/commit/8bfc20506cc5e098fe6eb3d1cafe3bea791215ce', 'https://github.com/lettre/lettre/security/advisories/GHSA-qc36-q22q-cjw3', 'https://github.com/lettre/lettre/pull/627/commits/93458d01fed0ec81c0e7b4e98e6f35961356fae2', 'https://rustsec.org/advisories/RUSTSEC-2021-0069.html', 'https:/... | null |
GHSA | GHSA-mpjm-v997-c4h4 | Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API | ### Impact
This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.
All current stable versions of Electron are affected.
### Patches
This... | {'CVE-2021-39184'} | 2022-04-19T19:03:06Z | 2021-10-12T21:59:13Z | MODERATE | 6.8 | {'CWE-668'} | {'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4', 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f', 'https://github.com/electron/electron/pull/30728', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39184', 'https://github.com/advisories/GHSA-m... | null |
GHSA | GHSA-9wrv-g75h-8ccc | Improper Access Control in Shopware | Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can g... | {'CVE-2022-24872'} | 2022-05-04T03:52:20Z | 2022-04-22T21:04:27Z | HIGH | 8.1 | {'CWE-732'} | {'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-04-2022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://github.com/advisories/GHSA-9wrv-g75h-8ccc', 'https://github.com/shopware/platform/se... | null |
GHSA | GHSA-3h87-v52r-p9rg | Out of bounds write in reorder | An issue was discovered in the reorder crate through 2021-02-24 for Rust. swap_index has an out-of-bounds write if an iterator returns a len() that is too small. | {'CVE-2021-29941'} | 2021-08-25T20:54:08Z | 2021-08-25T20:54:08Z | HIGH | 7.3 | {'CWE-787'} | {'https://rustsec.org/advisories/RUSTSEC-2021-0050.html', 'https://github.com/tiby312/reorder/issues/1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29941', 'https://github.com/advisories/GHSA-3h87-v52r-p9rg'} | null |
GHSA | GHSA-j379-9jr9-w5cq | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ec... | {'CVE-2018-1000844'} | 2021-09-14T18:15:57Z | 2018-12-21T17:48:26Z | CRITICAL | 9.1 | {'CWE-611'} | {'https://github.com/square/retrofit/pull/2735', 'https://github.com/advisories/GHSA-j379-9jr9-w5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'} | null |
GHSA | GHSA-4vhw-4rw7-jfpv | Path traversal in mozwire | An issue was discovered in the mozwire crate through 2020-08-18 for Rust. A ../ directory-traversal situation allows overwriting local files that have .conf at the end of the filename. | {'CVE-2020-35883'} | 2021-08-25T20:49:02Z | 2021-08-25T20:49:02Z | CRITICAL | 9.1 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35883', 'https://github.com/advisories/GHSA-4vhw-4rw7-jfpv', 'https://rustsec.org/advisories/RUSTSEC-2020-0030.html', 'https://github.com/NilsIrl/MozWire/issues/14'} | null |
GHSA | GHSA-rgh3-987h-wpmw | XML External Entity Injection in XStream | Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document. | {'CVE-2016-3674'} | 2021-09-22T18:47:03Z | 2020-06-30T22:48:14Z | HIGH | 7.5 | {'CWE-200'} | {'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183180.html', 'http://www.openwall.com/lists/oss-security/2016/03/25/8', 'http://www.openwall.com/lists/oss-security/2016/03/28/1', 'https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385', 'http://rhn.redhat.com/errata/RHSA-2016-2823.html', 'h... | null |
GHSA | GHSA-qrqm-fpv6-6r8g | Command Injection Vulnerability in Mechanize | This security advisory has been created for public disclosure of a Command Injection vulnerability that was responsibly reported by @kyoshidajp (Katsuhiko YOSHIDA).
### Impact
Mechanize `>= v2.0`, `< v2.7.7` allows for OS commands to be injected using several classes' methods which implicitly use Ruby's `Kernel.open`... | {'CVE-2021-21289'} | 2022-04-27T20:24:22Z | 2021-02-02T18:50:27Z | HIGH | 7.4 | {'CWE-78'} | {'https://security.gentoo.org/glsa/202107-17', 'https://github.com/sparklemotion/mechanize/releases/tag/v2.7.7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21289', 'https://github.com/sparklemotion/mechanize/commit/66a6a1bfa653a5f13274a396a5e5441238656aa0', 'https://github.com/sparklemotion/mechanize/security/advisorie... | null |
GHSA | GHSA-w32p-76xr-88pc | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1024, CVE-20... | {'CVE-2019-1003'} | 2021-03-29T20:59:06Z | 2021-03-29T20:59:06Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/advisories/GHSA-w32p-76xr-88pc', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1003', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003', 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee', 'https://github.com/chakra-core/ChakraC... | null |
GHSA | GHSA-c6pw-q7f2-97hv | Privilege Escalation in cordova-plugin-inappbrowser | Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the packa... | {'CVE-2019-0219'} | 2022-02-23T22:12:28Z | 2020-09-04T17:57:43Z | CRITICAL | 9.8 | {'CWE-79'} | {'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/11/28/1', 'https://www.npmjs.com/advisories/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219', 'https://lists.apache.org/thread/4vtg0trd... | null |
GHSA | GHSA-wr5r-m8pc-85j9 | Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml | Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources. | {'CVE-2019-3772'} | 2021-01-08T21:17:22Z | 2019-01-25T16:18:49Z | LOW | 0 | {'CWE-611'} | {'http://www.securityfocus.com/bid/106749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://pivotal.io/security/cve-2019-3772', 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'} | null |
GHSA | GHSA-c6fg-99pr-25m9 | Uncapped length of skin data fields submitted by players | ### Impact
Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave.
This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an e... | null | 2022-01-06T23:53:58Z | 2022-01-06T23:53:58Z | HIGH | 7.5 | null | {'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb', 'https://github.com/advisories/GHSA-c6fg-99pr-25m9'} | null |
GHSA | GHSA-g644-6fg4-hrh9 | Out-of-bounds write in ChakraCore | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-20... | {'CVE-2020-0830'} | 2021-07-28T18:57:47Z | 2021-07-28T18:57:47Z | HIGH | 7.5 | {'CWE-787'} | {'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0830', 'https://github.com/advisories/GHSA-g644-6fg4-hrh9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-0830'} | null |
GHSA | GHSA-54fx-gm74-q676 | Permissions bypass in SmallRye | A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixe... | {'CVE-2020-1729'} | 2022-03-21T20:50:43Z | 2022-03-18T17:55:47Z | MODERATE | 4 | {'CWE-863'} | {'https://github.com/advisories/GHSA-54fx-gm74-q676', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729', 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444'} | null |
GHSA | GHSA-4r8q-gv9j-3xx6 | Open Redirect | ### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `tr... | {'CVE-2021-32645'} | 2022-03-21T20:46:04Z | 2022-03-18T17:55:07Z | MODERATE | 4.3 | {'CWE-601'} | {'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/advisories/GHSA-4r8q-gv9j-... | null |
GHSA | GHSA-pc5p-h8pf-mvwp | Machine-In-The-Middle in https-proxy-agent | Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, w... | null | 2021-08-23T15:27:25Z | 2020-04-16T03:14:56Z | MODERATE | 6.1 | {'CWE-300'} | {'https://hackerone.com/reports/541502', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://www.npmjs.com/advisories/1184', 'https://github.com/advisories/GHSA-pc5p-h8pf-mvwp', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'} | null |
GHSA | GHSA-cvhw-2593-5j2q | Double Free in OpenCV | OpenCV 3.0.0 has a double free issue that allows attackers to execute arbitrary code. This issue was fixed in OpenCV version 3.3.1 (corresponding to OpenCV-Python and and OpenCV-Contrib-Python 3.3.1.11). | {'CVE-2016-1516'} | 2021-11-18T15:34:34Z | 2021-10-12T22:00:08Z | HIGH | 8.8 | {'CWE-415'} | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1516', 'https://arxiv.org/pdf/1701.04739.pdf', 'https://github.com/opencv/opencv/issues/5956', 'https://lists.debian.org/debian-lts-announce/2021/10/msg00028.html', 'https://github.com/opencv/opencv/pull/9376', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00030.ht... | null |
GHSA | GHSA-8jxq-75rw-fhj9 | Eve allows execution of arbitrary code via Code Injection in the where parameter | io/mongo/parser.py in Eve (aka pyeve) before 0.7.5 allows remote attackers to execute arbitrary code via Code Injection in the where parameter. | {'CVE-2018-8097'} | 2022-04-26T18:10:00Z | 2018-07-12T20:29:35Z | CRITICAL | 9.8 | {'CWE-94'} | {'https://github.com/advisories/GHSA-8jxq-75rw-fhj9', 'https://github.com/pyeve/eve/issues/1101', 'https://github.com/pyeve/eve/commit/f8f7019ffdf9b4e05faf95e1f04e204aa4c91f98', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8097'} | null |
GHSA | GHSA-j29f-m23h-3p8p | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0911'} | 2022-03-29T21:29:56Z | 2022-03-17T00:00:48Z | MODERATE | 5.4 | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0911', 'https://github.com/advisories/GHSA-j29f-m23h-3p8p', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447'} | null |
GHSA | GHSA-9988-f88m-mr42 | Exposure of Sensitive Information to an Unauthorized Actor in FreeTAKServer-UI | FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys. | {'CVE-2022-25512'} | 2022-03-28T22:34:41Z | 2022-03-12T00:00:37Z | HIGH | 7.5 | {'CWE-200'} | {'https://github.com/FreeTAKTeam/UI/issues/26', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25512', 'https://github.com/advisories/GHSA-9988-f88m-mr42'} | null |
GHSA | GHSA-7xrj-f5rp-j55h | Uncontrolled Resource Consumption in transpile | All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function. | {'CVE-2021-23429'} | 2021-09-02T17:10:42Z | 2021-09-02T17:10:42Z | MODERATE | 6.5 | {'CWE-400', 'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23429', 'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774', 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53', 'https://github.com/advisories/GHSA-7xrj-f5rp-j55h'} | null |
GHSA | GHSA-3p3h-qghp-hvh2 | Open Redirect in werkzeug | Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | {'CVE-2020-28724'} | 2021-04-20T16:30:26Z | 2021-04-20T16:30:26Z | MODERATE | 6.1 | {'CWE-601'} | {'https://github.com/pallets/werkzeug/pull/890/files', 'https://github.com/advisories/GHSA-3p3h-qghp-hvh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28724', 'https://github.com/pallets/werkzeug/issues/822', 'https://github.com/pallets/flask/issues/1639'} | null |
GHSA | GHSA-4c7m-wxvm-r7gc | Improper parsing of octal bytes in netmask | Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN ... | {'CVE-2021-28918'} | 2022-04-01T20:21:55Z | 2021-04-14T15:03:16Z | CRITICAL | 9.1 | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-28918', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://github.com/advisories/GHSA-4c7m-wxvm-r7gc', 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/', 'https://rootdaemon.com/2021/03/29/vulnerabil... | null |
GHSA | GHSA-779f-wgxg-qr8f | Prototype Pollution in lodash.mergewith | Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommend... | null | 2021-09-29T14:58:42Z | 2020-09-03T18:10:22Z | HIGH | 0 | {'CWE-1321'} | {'https://www.npmjs.com/advisories/1071', 'https://github.com/advisories/GHSA-779f-wgxg-qr8f'} | null |
GHSA | GHSA-xqvg-xm9m-p2c4 | Moderate severity vulnerability that affects mailman | An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site. | {'CVE-2018-13796'} | 2021-09-22T16:31:46Z | 2018-09-11T18:57:16Z | MODERATE | 6.5 | {'CWE-20'} | {'https://bugs.launchpad.net/mailman/+bug/1780874', 'https://security.gentoo.org/glsa/201904-10', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13796', 'https://usn.ubuntu.com/4348-1/', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html', 'https://www.mail-archive.com/mailman-users@python.org/msg71003.htm... | null |
GHSA | GHSA-52p9-v744-mwjj | Remote code execution in Kramdown | Kramdown before 2.3.1 does not restrict Rouge formatters to the Rouge::Formatters namespace, and thus arbitrary classes can be instantiated. | {'CVE-2021-28834'} | 2021-04-14T18:12:09Z | 2021-03-29T16:30:34Z | HIGH | 9.8 | {'CWE-94'} | {'https://github.com/gettalong/kramdown/pull/708', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28834', 'https://github.com/stanhu/kramdown/commit/d6a1cbcb2caa2f8a70927f176070d126b2422760', 'https://www.debian.org/security/2021/dsa-4890', 'https://about.gitlab.com/releases/2021/03/17/security-release-gitlab-13-9-4-releas... | null |
GHSA | GHSA-28hp-fgcr-2r4h | Cross-Site Scripting via JSONP | JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors. | null | 2021-08-17T15:35:31Z | 2019-06-27T17:25:42Z | MODERATE | 0 | {'CWE-79'} | {'https://www.npmjs.com/advisories/1630', 'https://github.com/advisories/GHSA-28hp-fgcr-2r4h', 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'} | null |
GHSA | GHSA-3r8w-mphv-2f3f | Prototype Pollution | All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function. | {'CVE-2021-23396'} | 2021-06-21T17:12:25Z | 2021-06-21T17:12:25Z | MODERATE | 5.6 | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396', 'https://github.com/advisories/GHSA-3r8w-mphv-2f3f'} | null |
GHSA | GHSA-mgr2-3mpv-43gc | Downloads Resources over HTTP in openframe-image | Affected versions of `openframe-image` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the pack... | {'CVE-2016-10616'} | 2021-09-16T20:55:30Z | 2019-02-18T23:47:37Z | HIGH | 0 | {'CWE-311', 'CWE-269'} | {'https://nodesecurity.io/advisories/218', 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc', 'https://www.npmjs.com/advisories/218', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616'} | null |
GHSA | GHSA-rww7-2gpw-fv6j | Crash when type cannot be specialized in Tensorflow | ### Impact
Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174):
```cc
void InferenceContext::PreInputInit(
const OpDef& op_def, const... | {'CVE-2022-23572'} | 2022-02-11T20:48:06Z | 2022-02-09T23:28:29Z | MODERATE | 6.5 | {'CWE-754'} | {'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j', 'https://github.com/advisories/GHSA-rww7-2gpw-fv6j', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572', 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b', 'https://github.com/tensorflow/tensorfl... | null |
GHSA | GHSA-pwwm-pwx2-2hw7 | Generation of Error Message Containing Sensitive Information in Snipe-IT | Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information. | {'CVE-2022-0622'} | 2022-02-26T01:13:46Z | 2022-02-18T00:00:37Z | MODERATE | 5.3 | {'CWE-209'} | {'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/advisories/GHSA-pwwm-pwx2-2hw7'} | null |
GHSA | GHSA-r659-8xfp-j327 | Prototype Pollution in objection.js | objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16. | {'CVE-2021-3766'} | 2021-10-08T20:12:34Z | 2021-09-07T23:09:43Z | CRITICAL | 9.8 | {'CWE-1321', 'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/advisories/GHSA-r659-8xfp-j327', 'https://huntr.dev/bounties/c98e0f0e... | null |
GHSA | GHSA-773h-w45w-f2f9 | Denial of service vulnerability exists in libxmljs | libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will cra... | {'CVE-2022-21144'} | 2022-05-04T14:48:04Z | 2022-05-03T00:00:46Z | HIGH | 0 | {'CWE-400'} | {'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://github.com/libxmljs/libxmljs/pull/594', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/advisories/GHSA-773h-w45w-f2f9', 'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756'} | null |
GHSA | GHSA-6gww-qpm6-mc2g | Server-Side Request Forgery in ssrf-agent | The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private. | {'CVE-2021-23718'} | 2021-12-06T21:36:54Z | 2021-12-02T17:51:51Z | MODERATE | 6.5 | {'CWE-918'} | {'https://github.com/advisories/GHSA-6gww-qpm6-mc2g', 'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362', 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718', 'ht... | null |
GHSA | GHSA-gfj6-p24g-6hpm | Malicious Package in jc-sha3 | Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised. | null | 2021-09-30T16:35:08Z | 2020-09-03T22:55:06Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://github.com/advisories/GHSA-gfj6-p24g-6hpm', 'https://www.npmjs.com/advisories/1277'} | null |
GHSA | GHSA-h9v8-rm3m-5h5f | OS Command Injection in git-add-remote | git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument. | {'CVE-2020-7630'} | 2022-02-10T23:47:47Z | 2022-02-10T23:47:47Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7630', 'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269', 'https://github.com/advisories/GHSA-h9v8-rm3m-5h5f', 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,'} | null |
GHSA | GHSA-j4mv-2rv7-v2j9 | Improper Privilege Management in Concrete CMS | Privilege escalation from Editor to Admin using Groups in Concrete CMS versions 8.5.6 and below. If a group is granted "view" permissions on the bulkupdate page, then users in that group can escalate to being an administrator with a specially crafted curl. Fixed by adding a check for group permissions before allowing a... | {'CVE-2021-22966'} | 2021-11-23T18:18:07Z | 2021-11-23T18:18:07Z | MODERATE | 0 | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22966', 'https://documentation.concretecms.org/developers/introduction/version-history/857-release-notes', 'https://hackerone.com/reports/1362747', 'https://github.com/advisories/GHSA-j4mv-2rv7-v2j9'} | null |
GHSA | GHSA-hf4p-jm7r-vjjj | Deserialization of Untrusted Data in EthereumJ | An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server. | {'CVE-2018-15890'} | 2021-08-17T19:40:01Z | 2019-07-26T16:10:39Z | CRITICAL | 9.8 | {'CWE-502'} | {'https://github.com/ethereum/ethereumj', 'https://github.com/advisories/GHSA-hf4p-jm7r-vjjj', 'https://github.com/ethereum/ethereumj/issues/1161', 'https://github.com/frohoff/ysoserial/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'} | null |
GHSA | GHSA-q67f-3jq4-mww2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0831'} | 2022-03-11T23:22:38Z | 2022-03-05T00:00:45Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/advisories/GHSA-q67f-3jq4-mww2', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'} | null |
GHSA | GHSA-9423-6c93-gpp8 | Arbitrary File Write via Archive Extraction (Zip Slip) | The CPIO extraction functionality doesn't sanitize the paths of the archived files for leading and non-leading ".." which leads in file extraction outside of the current directory. Note, the fixing commit was applied to all affected versions which were re-released. | {'CVE-2020-7667'} | 2022-01-04T19:27:35Z | 2021-06-23T17:13:29Z | HIGH | 7.5 | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSASSOFTWAREGORPMUTILSCPIO-570427', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7667', 'https://github.com/advisories/GHSA-9423-6c93-gpp8', 'https://github.com/sassoftware/go-rpmutils/commit/a64058cf21b8aada501bba923c9aab66fb6febf0'} | null |
GHSA | GHSA-hfm2-fffh-v47v | Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1131, CVE-2019-1139, CVE-2019-1140, CVE-2019-1141, CVE-2019-1195, CVE-2019-1197. | {'CVE-2019-1196'} | 2021-03-29T20:58:01Z | 2021-03-29T20:58:01Z | HIGH | 7.5 | {'CWE-787'} | {'https://github.com/chakra-core/ChakraCore/commit/dce7443ae45f82eceec3284974610e1a1bbe6792', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1196', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1196', 'https://github.com/advisories/GHSA-hfm2-fffh-v47v', 'https://github.com/chakra-core/ChakraC... | null |
GHSA | GHSA-96qc-ghj4-rq27 | Directory Traversal in yttivy | Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../..... | {'CVE-2017-16219'} | 2021-01-14T15:40:24Z | 2020-09-01T18:24:56Z | HIGH | 0 | {'CWE-22'} | {'https://www.npmjs.com/advisories/441', 'https://github.com/advisories/GHSA-96qc-ghj4-rq27', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy', 'https://nodesecurity.io/advisories/441', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219'} | null |
GHSA | GHSA-wj36-v8j4-pc7c | Low severity vulnerability that affects express-cart | A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators. | {'CVE-2018-16483'} | 2021-09-21T21:12:02Z | 2019-02-07T18:16:03Z | HIGH | 8.8 | {'CWE-290'} | {'https://hackerone.com/reports/343626', 'https://github.com/advisories/GHSA-wj36-v8j4-pc7c', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'} | null |
GHSA | GHSA-vqmr-957g-r7w3 | High severity vulnerability that affects rendertron | Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files. | {'CVE-2017-18355'} | 2021-09-20T22:15:16Z | 2019-02-12T15:36:39Z | HIGH | 7.5 | {'CWE-200'} | {'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355'} | null |
GHSA | GHSA-9h6g-6mxg-vvp4 | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadi... | null | 2022-04-19T19:02:54Z | 2021-04-19T14:47:18Z | MODERATE | 4 | {'CWE-208'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4', 'https://github.com/advisories/GHSA-9h6g-6mxg-vvp4', 'https://vaadin.com/security/cve-2021-31406'} | null |
GHSA | GHSA-hh56-x62g-gvhc | Cross-site scripting in CLEditor | Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element. | {'CVE-2019-1010113'} | 2021-08-17T19:05:00Z | 2019-07-26T16:10:06Z | MODERATE | 6.1 | {'CWE-79'} | {'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113', 'https://github.com/advisories/GHSA-hh56-x62g-gvhc'} | null |
GHSA | GHSA-vm6v-w6q2-mrrq | Malicious Package in bb-builder | All versions of `bb-builder` contained malicious code. The package ran an executable targeting Windows and uploaded information to a remote server.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be ... | null | 2021-09-30T20:09:25Z | 2020-09-03T19:20:05Z | CRITICAL | 9.8 | {'CWE-506'} | {'https://www.npmjs.com/advisories/1119', 'https://github.com/advisories/GHSA-vm6v-w6q2-mrrq'} | null |
GHSA | GHSA-m362-87jc-f39v | Directory Traversal in uv-tj-demo | Affected versions of `uv-tj-demo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /.... | {'CVE-2017-16200'} | 2021-01-14T15:41:37Z | 2020-09-01T18:16:24Z | HIGH | 0 | {'CWE-22'} | {'https://nodesecurity.io/advisories/428', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16200', 'https://www.npmjs.com/advisories/428', 'https://github.com/advisories/GHSA-m362-87jc-f39v', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo'} | null |
GHSA | GHSA-qmmc-jppf-32wv | Directory Traversal in Docker | Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." | {'CVE-2014-9358'} | 2022-02-15T00:41:14Z | 2022-02-15T00:41:14Z | MODERATE | 6.5 | {'CWE-59'} | {'http://www.securityfocus.com/archive/1/534215/100/0/threaded', 'https://github.com/advisories/GHSA-qmmc-jppf-32wv', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9358', 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9358', 'https:/... | null |
GHSA | GHSA-mxv6-q98x-h958 | Data races in model | `Shared` data structure in `model` crate implements `Send` and `Sync` traits regardless of the inner type.
This allows safe Rust code to trigger a data race, which is undefined behavior in Rust.
Users are advised to treat `Shared` as an unsafe type.
It should not be used outside of the testing context,
and care must b... | {'CVE-2020-36460'} | 2021-08-25T20:56:07Z | 2021-08-25T20:56:07Z | HIGH | 8.1 | {'CWE-362', 'CWE-843'} | {'https://github.com/advisories/GHSA-mxv6-q98x-h958', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36460', 'https://rustsec.org/advisories/RUSTSEC-2020-0140.html', 'https://github.com/spacejam/model/issues/3'} | null |
GHSA | GHSA-xjjg-vmw6-c2p9 | Open Redirect in httpie | All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control. | {'CVE-2019-10751'} | 2021-08-17T22:17:52Z | 2019-08-27T17:44:33Z | HIGH | 8.8 | {'CWE-601'} | {'https://github.com/advisories/GHSA-xjjg-vmw6-c2p9', 'https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10751'} | null |
GHSA | GHSA-82gw-pqf7-q3j2 | High severity vulnerability that affects pym.js | NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function.
https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 that can result in Arbitrary javascript code execution. This attack appear to be exploitable via ... | {'CVE-2018-1000086'} | 2021-09-03T21:50:02Z | 2018-03-13T20:38:51Z | HIGH | 8.8 | {'CWE-352'} | {'https://github.com/advisories/GHSA-82gw-pqf7-q3j2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086', 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html', 'https://github.com/nprapps/pym.js', 'https://github.com/nprapps/pym.js/issues/170'} | null |
GHSA | GHSA-c8cc-p3j7-4c7f | Moderate severity vulnerability that affects org.apache.mesos:mesos | Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because ins... | {'CVE-2018-8023'} | 2021-09-08T21:43:34Z | 2018-10-17T19:54:14Z | MODERATE | 5.9 | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-8023', 'https://github.com/advisories/GHSA-c8cc-p3j7-4c7f', 'https://lists.apache.org/thread.html/r0dd7ff197b2e3bdd80a0326587ca3d0c22e10d1dba17c769d6da7d7a@%3Cuser.flink.apache.org%3E', 'https://lists.apache.org/thread.html/9b9d3f6bd09f3ebd2284b82077033bdc71da550a1c4c010c2494... | null |
GHSA | GHSA-g996-q5r8-w7g2 | Escape validation messages in the PHP templating engine | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle. | {'CVE-2019-10909'} | 2021-08-18T22:15:16Z | 2019-11-12T23:00:53Z | MODERATE | 5.4 | {'CWE-79'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml', 'https://www.drupal.org/sa-core-2019-005', 'https://github.com/advisories/GHSA-g996-q5r8-w7g2', 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine', 'https://nvd... | null |
GHSA | GHSA-jjpq-gp5q-8q6w | Cross-site scripting in Apache Tomcat | The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website. | {'CVE-2019-0221'} | 2021-07-14T19:43:47Z | 2019-05-30T03:30:42Z | MODERATE | 6.1 | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e137... | null |
GHSA | GHSA-wcv5-qrj6-9pfm | Heap buffer overflow in `Conv3DBackprop*` | ### Impact
Missing validation between arguments to `tf.raw_ops.Conv3DBackprop*` operations can result in heap buffer overflows:
```python
import tensorflow as tf
input_sizes = tf.constant([1, 1, 1, 1, 2], shape=[5], dtype=tf.int32)
filter_tensor = tf.constant([734.6274508233133, -10.0, -10.0, -10.0, -10.0, -10.0, -10... | {'CVE-2021-29520'} | 2022-04-26T18:10:21Z | 2021-05-21T14:21:12Z | LOW | 2.5 | {'CWE-787', 'CWE-120'} | {'https://github.com/tensorflow/tensorflow/commit/8f37b52e1320d8d72a9529b2468277791a261197', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29520', 'https://github.com/advisories/GHSA-wcv5-qrj6-9pfm', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-qrj6-9pfm'} | null |
GHSA | GHSA-xv6v-72hh-g6g2 | Moderate severity vulnerability that affects org.owasp.antisamy:antisamy | OWASP OWASP ANTISAMY version 1.5.7 and earlier contains a Cross Site Scripting (XSS) vulnerability in AntiSamy.scan() - for both SAX & DOM that can result in Cross Site Scripting. | {'CVE-2018-1000643'} | 2021-12-03T14:28:42Z | 2018-10-18T17:22:26Z | MODERATE | 0 | null | {'https://github.com/advisories/GHSA-xv6v-72hh-g6g2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000643'} | null |
GHSA | GHSA-4c7h-f2j9-9c46 | Missing permission Phoenix AutoTest Plugin | A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | {'CVE-2022-28158'} | 2022-04-05T21:21:07Z | 2022-03-30T00:00:21Z | MODERATE | 6.5 | {'CWE-862'} | {'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685', 'https://github.com/advisories/GHSA-4c7h-f2j9-9c46', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'} | null |
GHSA | GHSA-m6f7-46hw-grcj | Critical severity vulnerability that affects cremefraiche | The set_meta_data function in lib/cremefraiche.rb in the Creme Fraiche gem before 0.6.1 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in the file name of an email attachment. NOTE: some of these details are obtained from third party information. | {'CVE-2013-2090'} | 2021-09-14T22:13:34Z | 2017-10-24T18:33:37Z | CRITICAL | 0 | {'CWE-78'} | {'http://secunia.com/advisories/53391', 'http://osvdb.org/93395', 'https://github.com/advisories/GHSA-m6f7-46hw-grcj', 'http://packetstormsecurity.com/files/121635/Ruby-Gem-Creme-Fraiche-0.6-Command-Injection.html', 'http://www.vapid.dhs.org/advisories/cremefraiche-cmd-inj.html', 'https://nvd.nist.gov/vuln/detail/CVE-2... | null |
GHSA | GHSA-gw5h-h6hj-f56g | Improper Authorization in Gogs | ### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
### Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.1... | null | 2022-04-19T19:03:27Z | 2022-03-14T22:58:37Z | HIGH | 8.2 | {'CWE-285'} | {'https://github.com/advisories/GHSA-gw5h-h6hj-f56g', 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78', 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g', 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0d0e0bd7ab62'} | null |
GHSA | GHSA-frqg-7g38-6gcf | Improper escaping of command arguments on Windows leading to command injection | ### Impact
Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected.
### Patches
1.10.23 and 2.1.9 fix the issue
### Workarounds
None
| {'CVE-2021-41116'} | 2022-04-22T15:41:33Z | 2021-10-05T20:23:18Z | HIGH | 8.2 | {'CWE-77'} | {'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/advisories/GHSA-frqg-7g38-6gcf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41116'} | null |
GHSA | GHSA-rp63-jfmw-532w | High severity vulnerability that affects mail | The Mail gem before 2.4.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery. | {'CVE-2012-2140'} | 2021-09-17T19:22:25Z | 2017-10-24T18:33:38Z | HIGH | 0 | {'CWE-20'} | {'http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080747.html', 'https://nvd.nist.gov/vuln/detail/CVE-2012-2140', 'https://github.com/mikel/mail/blob/9beb079c70d236a5ad2e1ba95b2c977e55deb7af/CHANGELOG.rdoc', 'https://github.com/mikel/mail/commit/ac56f03bdfc30b379aeecd4ff317d08fdaa328c2', 'http://secu... | null |
GHSA | GHSA-c5hm-xc74-pqrg | OS Command Injection in jscover | jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument. | {'CVE-2020-7623'} | 2022-02-10T23:37:22Z | 2022-02-10T23:37:22Z | CRITICAL | 9.8 | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623', 'https://github.com/advisories/GHSA-c5hm-xc74-pqrg', 'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,'} | null |
GHSA | GHSA-hjgp-8ffr-hwwr | Downloads Resources over HTTP in closurecompiler | Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `c... | {'CVE-2016-10582'} | 2021-01-08T18:40:46Z | 2019-02-18T23:51:19Z | HIGH | 0 | {'CWE-311'} | {'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://www.npmjs.com/advisories/169', 'https://nodesecurity.io/advisories/169'} | null |
GHSA | GHSA-49qr-xh3w-h436 | Moderate severity vulnerability that affects notebook | Jupyter Notebook before 5.7.1 allows XSS via an untrusted notebook because nbconvert responses are considered to have the same origin as the notebook server. In other words, nbconvert endpoints can execute JavaScript with access to the server API. In notebook/nbconvert/handlers.py, NbconvertFileHandler and NbconvertPos... | {'CVE-2018-19351'} | 2021-09-01T14:11:52Z | 2018-11-21T22:15:47Z | MODERATE | 6.1 | {'CWE-79'} | {'https://groups.google.com/forum/#!topic/jupyter/hWzu2BSsplY', 'https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst', 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html', 'https://github.com/advisories/GHSA-49qr-xh3w-h436', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19351', 'http... | null |
GHSA | GHSA-gr4c-5rq6-cgh3 | OPC UA applications can allow a remote attacker to determine a Server's private key | An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit 2018-04-12, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit 2018-03-13. A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad... | {'CVE-2018-7559'} | 2022-04-26T19:12:43Z | 2018-10-16T19:58:42Z | MODERATE | 5.3 | null | {'https://github.com/OPCFoundation/UA-.NET-Legacy/commit/e2a781b38efb8686d2bd850c2f2372b5c670bc45', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7559', 'https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-7559.pdf', 'https://github.com/advisories/GHSA-gr4c-5rq6-cgh... | null |
GHSA | GHSA-vjg4-v33c-ggc4 | Out of bounds read in Tensorflow | ### Impact
The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds ... | {'CVE-2022-21730'} | 2022-02-10T00:19:29Z | 2022-02-09T18:29:45Z | HIGH | 8.1 | {'CWE-125'} | {'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360', 'https://github.com/advisories/GHSA-vjg4-v33c-ggc4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21730', 'https://github.com/tensorflow/tensorflow/security/advisories/GHS... | null |
GHSA | GHSA-fvgf-6h6h-3322 | Improper Limitation of a Pathname to a Restricted Directory | In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments. | {'CVE-2021-3281'} | 2021-09-28T20:55:35Z | 2021-03-18T20:29:49Z | MODERATE | 5.3 | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3281', 'https://docs.djangoproject.com/en/3.1/releases/3.0.12/', 'https://docs.djangoproject.com/en/3.1/releases/security/', 'https://security.netapp.com/advisory/ntap-20210226-0004/', 'https://github.com/advisories/GHSA-fvgf-6h6h-3322', 'https://github.com/django/django/comm... | null |
GHSA | GHSA-8434-v7xw-8m9x | Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks | APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside application manifest.
### Impact
An attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified or could cause other unintended... | {'CVE-2021-21386'} | 2022-04-19T19:02:50Z | 2022-01-21T23:03:39Z | CRITICAL | 9.3 | {'CWE-88', 'CWE-78'} | {'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386', 'https://github.com/advisories/GHSA-8434-v7xw-8m9x', 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'} | null |
GHSA | GHSA-v6wp-4m6f-gcjg | Open redirect vulnerability in `aiohttp` (`normalize_path_middleware` middleware) | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Open redirect vulnerability — a maliciously crafted link to an aiohttp-based web-server could redirect the browser to a different website.
It is caused by a bug in the `aiohttp.web_middlewares.normalize_path_middleware` middleware.
### Patches
_Has the ... | {'CVE-2021-21330'} | 2022-04-19T19:02:48Z | 2021-02-26T02:11:57Z | LOW | 3.1 | {'CWE-601'} | {'https://github.com/aio-libs/aiohttp/commit/2545222a3853e31ace15d87ae0e2effb7da0c96b', 'https://github.com/aio-libs/aiohttp/blob/master/CHANGES.rst#374-2021-02-25', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JN3V7CZJRT4QFCVXB6LDPCJH7NAOFCA5/', 'https://www.debian.or... | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.