schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringclasses
24 values
aliases
stringlengths
2
20
summary
stringlengths
9
130
details
stringlengths
34
11.7k
severity
stringlengths
2
92
affected
stringlengths
73
3.22k
references
stringlengths
64
21.2k
database_specific
stringlengths
131
202
1.4.0
GHSA-xq5j-gw7f-jgj8
2023-08-08T15:14:47Z
2020-07-07T16:34:10Z
null
['CVE-2020-8167']
CSRF Vulnerability in rails-ujs
There is a vulnerability in rails-ujs that allows attackers to send CSRF tokens to wrong domains. Versions Affected: rails <= 6.0.3 Not affected: Applications which don't use rails-ujs. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ This is a regression of CVE-2015-1840. In the scenario...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.4.2'}}, {'package': {'ecosystem': 'RubyGems',...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8167'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/189878'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8167.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!t...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T15:51:37Z', 'nvd_published_at': '2020-06-19T18:15:00Z'}
1.4.0
GHSA-ff7x-qrg7-qggm
2022-08-11T14:58:19Z
2020-07-29T20:56:59Z
null
['CVE-2020-8116']
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'dot-prop'}, 'ecosystem_specific': {'affected_functions': ['dot-prop.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dot-prop'}, 'ecosystem_specific': {'affected_functions': ['dot-prop.se...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8116'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/issues/63'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/dot-prop/commit/3039c8c07f6fdaa8b595ec869ae0895686a7a0f2'}, {'type': 'WEB', 'url': 'https://github.com/sin...
{'cwe_ids': ['CWE-1321', 'CWE-425', 'CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T20:51:37Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}
1.4.0
GHSA-976r-qfjj-c24w
2021-09-22T21:16:56Z
2020-07-27T16:57:33Z
null
['CVE-2020-11981']
Command injection via Celery broker in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attacker can connect to the broker (Redis, RabbitMQ) directly, it is possible to inject commands, resulting in the celery worker running arbitrary commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['airflow.www_rbac.views.Airflow.index']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11981'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/afa4b11fddfdbadb048f742cf66d5c21c675a5c8'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers....
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:01Z', 'nvd_published_at': None}
1.4.0
GHSA-34gh-3cwv-wvp2
2021-09-23T17:29:15Z
2020-07-29T18:07:11Z
null
['CVE-2020-7683']
Directory traversal in rollup-plugin-server
This affects all versions of package rollup-plugin-server. There is no path sanitization in readFile operation performed inside the readFileFromContentBase function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7683'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINSERVER-590123'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:45:50Z', 'nvd_published_at': None}
1.4.0
GHSA-fpqv-x9hm-35j9
2021-09-23T18:13:50Z
2020-07-31T17:39:22Z
null
['CVE-2020-16095']
Potential XSS vulnerability in Kitodo.Presentation
### Impact Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected. It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, alt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}, {'typ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T15:07:04Z', 'nvd_published_at': None}
1.4.0
GHSA-xp63-6vf5-xf3v
2021-01-07T23:47:13Z
2020-07-20T17:20:20Z
null
['CVE-2020-15123']
Command injection in codecov (npm package)
### Impact The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix wa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-xf3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15123'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-node/pull/180'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codec...
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-20T17:19:56Z', 'nvd_published_at': None}
1.4.0
GHSA-gprm-xqrc-c2j3
2021-09-22T21:56:35Z
2020-07-27T22:51:44Z
null
['CVE-2020-1956']
Command Injection in Kylin
Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1956'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'}, {'type': 'WEB', 'url': 'https://community.sonarsource.com/t/apache-kylin-3-0-1-command-injection-vulnerability/25706'}, {'type': 'PAC...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:23Z', 'nvd_published_at': None}
1.4.0
GHSA-9h4g-27m8-qjrg
2021-09-22T20:28:29Z
2020-07-07T19:24:47Z
null
['CVE-2020-15779']
Path Traversal in socket.io-file
All versions of `socket.io-file` are vulnerable to Path Traversal. The package fails to sanitize user input and uses it to generate the file upload paths. The `socket.io-file::createFile` message contains a `name` option that is passed directly to `path.join()`. It is possible to upload files to arbitrary folders on ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io-file'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15779'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9h4g-27m8-qjrg'}, {'type': 'PACKAGE', 'url': 'https://github.com/rico345100/socket.io-file'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1519'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T19:23:52Z', 'nvd_published_at': None}
1.4.0
GHSA-jcq3-cprp-m333
2021-09-22T18:47:45Z
2020-07-01T17:12:20Z
null
['CVE-2019-2692']
Privilege escalation in mysql-connector-jav
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Succ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2692'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190423-0002/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-MYSQL-174574'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr201...
{'cwe_ids': ['CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:11:19Z', 'nvd_published_at': None}
1.4.0
GHSA-3q49-h8f9-9fr9
2023-05-16T16:03:45Z
2020-07-31T17:39:42Z
null
['CVE-2020-15134']
Missing TLS certificate verification
Faye uses [em-http-request][6] and [faye-websocket][10] in the Ruby version of its client. Those libraries both use the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/faye/faye/security/advisories/GHSA-3q49-h8f9-9fr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15134'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/even...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:38:46Z', 'nvd_published_at': None}
1.4.0
GHSA-2jpm-827p-j44g
2021-01-07T23:47:19Z
2020-07-09T18:28:07Z
null
['CVE-2020-15092']
Stored XSS in TimelineJS3
### Impact TimelineJS renders some user data as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most TimelineJS users configure their t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@knight-lab/timelinejs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NUKnightLab/TimelineJS3/security/advisories/GHSA-2jpm-827p-j44g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15092'}, {'type': 'WEB', 'url': 'https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-09T18:27:39Z', 'nvd_published_at': None}
1.4.0
GHSA-mm44-wc5p-wqhq
2022-01-18T23:05:18Z
2020-07-07T16:45:24Z
null
[]
Denial of service due to reference expansion in versions earlier than 4.0
### Impact The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply neste...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.upokecenter:cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-mm44-wc5p-wqhq'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR-Java'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:45:07Z', 'nvd_published_at': None}
1.4.0
GHSA-q4p3-qw5c-mhpc
2021-09-22T21:22:13Z
2020-07-27T16:57:25Z
null
['CVE-2020-11983']
Multiple stored XSS in RBAC Admin screens in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11983'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:16Z', 'nvd_published_at': None}
1.4.0
GHSA-4h44-w6fm-548g
2021-11-19T15:44:20Z
2020-07-29T16:15:12Z
null
['CVE-2020-15086']
Potential Remote Code Execution in TYPO3 with mediace extension
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1) > * CWE-325, CWE-20, CWE-200, CWE-502 ### Problem It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'friendsoftypo3/mediace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.2'}, {'fixed': '7.6.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15086'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfTYPO3/mediace/pull/31'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfT...
{'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-325', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:09:56Z', 'nvd_published_at': '2020-07-29T17:15:00Z'}
1.4.0
GHSA-93f3-23rq-pjfp
2022-08-10T23:59:40Z
2020-07-07T18:56:16Z
null
['CVE-2020-15095']
npm CLI exposing sensitive information through logs
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.14.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15095'}, {'type': 'WEB', 'url': 'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T18:30:59Z', 'nvd_published_at': '2020-07-07T19:15:00Z'}
1.4.0
GHSA-m93v-9qjc-3g79
2021-01-07T23:48:11Z
2020-07-07T00:01:07Z
null
['CVE-2020-4076']
Context isolation bypass via leaked cross-context objects in Electron
### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4076'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]
{'cwe_ids': ['CWE-501'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:29Z', 'nvd_published_at': None}
1.4.0
GHSA-43fq-w8qq-v88h
2023-02-28T15:12:44Z
2020-07-27T21:52:36Z
null
['CVE-2020-11538']
Out-of-bounds read in Pillow
In libImaging/SgiRleDecode.c in Pillow through 7.0.0, a number of out-of-bounds reads exist in the parsing of SGI image files, a different issue than CVE-2020-5311.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4504'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/2ef59fdbaeb756...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:35:11Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}
1.4.0
GHSA-w534-q4xf-h5v2
2021-01-07T23:47:26Z
2020-07-07T16:32:49Z
null
['CVE-2020-15231']
XSS in Mapfish Print relating to JSONP support
### Impact A user can use the JSONP support to do a Cross-site scripting. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e * https://cwe.mitre.org/data/definitions/79.html ### For more information ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-servlet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3...
[{'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15231'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:31:25Z', 'nvd_published_at': None}
1.4.0
GHSA-43jj-2rwc-2m3f
2021-09-22T21:03:46Z
2020-07-15T17:38:04Z
null
['CVE-2019-14273']
Broken access control on files
In SilverStripe assets 4.0, there is broken access control on files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14273'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'PACKAGE', 'url': 'https://github.com/FriendsOfPHP/security-advisories'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master...
{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-15T17:33:55Z', 'nvd_published_at': None}
1.4.0
GHSA-jphg-qwrw-7w9g
2023-01-25T22:49:03Z
2020-07-27T18:08:21Z
null
['CVE-2020-10663']
Unsafe object creation in json RubyGem
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269/GHSA-x457-cw4h-hq5f, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'json'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10663'}, {'type': 'PACKAGE', 'url': 'https://github.com/flori/json'}, {'type': 'WEB', 'url': 'https://github.com/flori/json/blob/master/CHANGES.md#2019-12-11-230'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gem...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T18:07:46Z', 'nvd_published_at': '2020-04-28T21:15:00Z'}
1.4.0
GHSA-7xcx-6wjh-7xp2
2021-09-22T21:03:04Z
2020-07-13T21:34:59Z
null
[]
Command Injection in standard-version
# GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-111` The [GitHub Security Lab](https://securitylab.github.com) team has identified a potential security vulnerability in [standard-version](https://github.com/conventional-changelog/standard-version). ## Summary The `standardVersion` function has a comman...
[]
[{'package': {'ecosystem': 'npm', 'name': 'standard-version'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/conventional-changelog/standard-version/security/advisories/GHSA-7xcx-6wjh-7xp2'}, {'type': 'PACKAGE', 'url': 'https://github.com/conventional-changelog/standard-version'}, {'type': 'WEB', 'url': 'https://github.com/conventional-changelog/standard-version/tree/2f04ac8fc1c134a...
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-13T21:33:29Z', 'nvd_published_at': None}
1.4.0
GHSA-8m73-w2r2-6xxj
2023-03-03T00:01:57Z
2020-07-29T17:29:51Z
null
['CVE-2020-7685']
Insecure defaults in UmbracoForms
This affects all versions of package UmbracoForms. When using the default configuration for upload forms, it is possible to upload arbitrary file types. The package offers a way for users to mitigate the issue. The users of this package can create a custom workflow and frontend validation that blocks certain file types...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoForms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7685'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-DOTNET-UMBRACOFORMS-595765'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:28:16Z', 'nvd_published_at': '2020-07-28T17:15:00Z'}
1.4.0
GHSA-v7m9-9497-p9gr
2021-11-19T15:44:01Z
2020-07-22T23:07:16Z
null
['CVE-2020-15110']
Possible pod name collisions in jupyterhub-kubespawner
### Impact _What kind of vulnerability is it? Who is impacted?_ JupyterHub deployments using: - KubeSpawner <= 0.11.1 (e.g. zero-to-jupyterhub 0.9.0) and - enabled named_servers (not default), and - an Authenticator that allows: - usernames with hyphens or other characters that require escape (e.g. `user-hyphen` or...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyterhub-kubespawner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/kubespawner/security/advisories/GHSA-v7m9-9497-p9gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15110'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/kubespawner/commit/3dfe870a7f5e98e2e398b01996ca6b8eff4bb1d0'}, {'type': 'PAC...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-17T20:49:37Z', 'nvd_published_at': '2020-07-17T21:15:00Z'}
1.4.0
GHSA-7hmh-8gwv-mfvq
2021-09-22T21:57:07Z
2020-07-27T22:51:47Z
null
['CVE-2020-1937']
SQL Injection in Kylin
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:42Z', 'nvd_published_at': '2020-02-24T21:15:00Z'}
1.4.0
GHSA-3pc2-fm7p-q2vg
2021-03-04T18:26:09Z
2020-07-02T16:55:11Z
null
['CVE-2020-4061']
Cross-site Scripting in October
### Impact Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack. ### Patches Issue has been patched in Build 467 (v1.0.467). ### Workarounds Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installatio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.319'}, {'fixed': '1.0.467'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4061'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-02T16:54:50Z', 'nvd_published_at': None}
1.4.0
GHSA-3x94-fv5h-5q2c
2021-10-08T20:36:13Z
2020-07-29T16:15:32Z
null
['CVE-2020-15099']
Exposure of Sensitive Information to an Unauthorized Actor in TYPO3 CMS
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (7.5) > * CWE-20, CWE-200 ### Problem In case an attacker manages to generate a valid cryptographic message authentication code (HMAC-SHA1) - either by using a different existing vulnerability or in case the internal _encryptionKey_ was ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.6'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3x94-fv5h-5q2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15099'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/TYPO3.CMS'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-...
{'cwe_ids': ['CWE-20', 'CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:14:57Z', 'nvd_published_at': '2020-07-29T17:15:00Z'}
1.4.0
GHSA-rvmq-4x66-q7j3
2023-09-01T10:09:33Z
2020-07-27T16:57:33Z
null
['CVE-2020-11978']
Remote code execution in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11978'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:54:51Z', 'nvd_published_at': '2020-07-17T00:15:00Z'}
1.4.0
GHSA-f97h-2pfx-f59f
2023-02-01T09:16:37Z
2020-07-29T18:07:20Z
null
['CVE-2020-7695']
HTTP response splitting in uvicorn
Uvicorn before 0.11.7 is vulnerable to HTTP response splitting. CRLF sequences are not escaped in the value of HTTP headers. Attackers can exploit exploit this to add arbitrary headers to HTTP responses, or even return an arbitrary response body, whenever crafted input is used to construct HTTP headers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'uvicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7695'}, {'type': 'PACKAGE', 'url': 'https://github.com/encode/uvicorn'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-570471'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:37:41Z', 'nvd_published_at': '2020-07-27T12:15:00Z'}
1.4.0
GHSA-5jpf-pj32-xx53
2021-01-07T23:44:25Z
2020-07-29T16:26:22Z
null
['CVE-2020-15125']
Authorization header is not sanitized in an error object in auth0
### Overview Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged expo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.27.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32-xx53'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/pull/507'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-auth0/pull...
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:25:59Z', 'nvd_published_at': None}
1.4.0
GHSA-236h-rqv8-8q73
2021-01-07T23:46:50Z
2020-07-22T23:06:47Z
null
['CVE-2020-15126']
GraphQL: Security breach on Viewer query
### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}, {...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-22T23:06:30Z', 'nvd_published_at': None}
1.4.0
GHSA-vr98-27qj-3c8q
2023-09-05T23:31:52Z
2020-07-29T18:07:35Z
null
['CVE-2020-7686']
Directory traversal in rollup-plugin-server
This affects all versions of package rollup-plugin-dev-server. There is no path sanitization in `readFile` operation inside the `readFileFromContentBase` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'rollup-plugin-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7686'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ROLLUPPLUGINDEVSERVER-590124'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:46:03Z', 'nvd_published_at': None}
1.4.0
GHSA-5x3v-2gxr-59m2
2021-04-07T19:55:55Z
2020-07-01T17:26:15Z
null
['CVE-2019-17572']
Directory traversal in Apache RocketMQ
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.rocketmq:rocketmq-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572'}, {'type': 'WEB', 'url': 'https://github.com/apache/rocketmq/issues/1637'}, {'type': 'WEB', 'url': 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:26:05Z', 'nvd_published_at': None}
1.4.0
GHSA-gm9x-q798-hmr4
2021-09-23T17:26:33Z
2020-07-29T14:53:40Z
null
[]
Command Injection in git-tags-remote
All versions of `git-tags-remote ` are vulnerable to Command Injection. The package fails to sanitize the repository input and passes it directly to an `exec` call on the `get` function . This may allow attackers to execute arbitrary code in the system if the `repo` value passed to the function is user-controlled. T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-tags-remote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sh0ji/git-tags-remote/issues/58'}, {'type': 'WEB', 'url': 'https://github.com/sh0ji/git-tags-remote/commit/a20488960cbd2c98455386108253094897ebfc1c'}, {'type': 'PACKAGE', 'url': 'https://github.com/sh0ji/git-tags-remote'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisor...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T14:52:24Z', 'nvd_published_at': None}
1.4.0
GHSA-h9jc-284h-533g
2021-01-07T23:48:28Z
2020-07-07T00:01:10Z
null
['CVE-2020-4077']
Context isolation bypass via contextBridge in Electron
### Impact Apps using both `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you mu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-501'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:23Z', 'nvd_published_at': None}
1.4.0
GHSA-f9mq-jph6-9mhm
2021-01-07T23:48:36Z
2020-07-07T00:01:13Z
null
['CVE-2020-4075']
Arbitrary file read via window-open IPC in Electron
### Impact The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open. ### Workarounds Ensure you are calling `event.preventDefault()` on all [`new-window`](https://electronjs.org/docs/api/web-contents#event-new-window) events where the `url` or `optio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-f9mq-jph6-9mhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-4075'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]
{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:54:56Z', 'nvd_published_at': None}
1.4.0
GHSA-vj42-xq3r-hr3r
2023-09-05T09:11:44Z
2020-07-27T21:52:39Z
null
['CVE-2020-10994']
Out-of-bounds reads in Pillow
In `libImaging/Jpeg2KDecode.c` in Pillow before 7.1.0, there are multiple out-of-bounds reads via a crafted JP2 file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10994'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4505'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/ff60894d697d19...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:51:26Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}
1.4.0
GHSA-vh7m-p724-62c2
2021-09-23T17:39:58Z
2020-07-29T20:40:35Z
null
['CVE-2020-13822']
Signature Malleabillity in elliptic
The Elliptic package before version 6.5.3 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'elliptic'}, 'ecosystem_specific': {'affected_functions': ['elliptic.ec']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13822'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/issues/226'}, {'type': 'WEB', 'url': 'https://github.com/indutny/elliptic/commit/856fe4d99fe7b6200556e6400b3bf585b1721bec'}, {'type': 'PACKAGE', 'url': 'https://github.com/indutny...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T20:39:31Z', 'nvd_published_at': None}
1.4.0
GHSA-f7f4-hqp2-7prc
2021-09-22T21:11:20Z
2020-07-24T20:10:21Z
null
['CVE-2018-21036']
Improper Input Validation in sails-hook-sockets
Sails.js before v1.0.0-46 allows attackers to cause a denial of service with a single request because there is no error handler in sails-hook-sockets to handle an empty pathname in a WebSocket request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sails-hook-sockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21036'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails-hook-sockets/commit/0533a4864b1920fd8fbb5287bc0889193c5faf44'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails-hook-sockets/commit/ff02114eaec090ee51db48435cc32d451...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-24T17:27:33Z', 'nvd_published_at': '2020-07-21T14:15:00Z'}
1.4.0
GHSA-7phr-5m9x-rw9q
2021-09-22T21:15:28Z
2020-07-27T16:02:57Z
null
['CVE-2020-7687']
Directory traversal in fast-http
This affects all versions of package fast-http. There is no path sanitization in the path provided at fs.readFile in index.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fast-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7687'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTHTTP-572892'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:00:48Z', 'nvd_published_at': None}
1.4.0
GHSA-cc2p-4jhr-xhhx
2021-01-07T23:43:05Z
2020-07-30T14:58:42Z
null
['CVE-2020-15130']
False-positive validity for NFT1 genesis transactions in SLPJS
### Impact In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token ty...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}]
{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T14:44:06Z', 'nvd_published_at': None}
1.4.0
GHSA-w7q9-p3jq-fmhm
2023-09-08T22:35:55Z
2020-07-27T15:46:57Z
null
['CVE-2020-8175']
Uncontrolled resource consumption in jpeg-js
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jpeg-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175'}, {'type': 'WEB', 'url': 'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/842462'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T15:46:02Z', 'nvd_published_at': None}
1.4.0
GHSA-jmqm-f2gx-4fjv
2021-09-22T19:00:07Z
2020-07-07T18:59:10Z
null
[]
Sensitive information exposure through logs in npm-registry-fetch
Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm-registry-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'npm-registry-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '8.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}, {'type': 'PACKAG...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T18:26:15Z', 'nvd_published_at': None}
1.4.0
GHSA-vhr6-pvjm-9qwf
2021-01-07T23:48:04Z
2020-07-10T20:55:00Z
null
['CVE-2020-15105']
User passwords are stored in clear text in the Django session
### Impact django-two-factor-auth versions 1.11 and before store the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authentication code...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-two-factor-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/security/advisories/GHSA-vhr6-pvjm-9qwf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15105'}, {'type': 'WEB', 'url': 'https://github.com/Bouke/django-two-factor-auth/commit/454fd9842fa6e8bb772dbf0943976bc8e3335359'}, {...
{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-10T20:52:31Z', 'nvd_published_at': None}
1.4.0
GHSA-67j9-c52g-w2q9
2021-01-07T23:46:05Z
2020-07-27T17:47:52Z
null
['CVE-2020-15120']
Authorization Bypass in I hate money
### Impact An authenticated member of one project can modify and delete members of another project, without knowledge of this other project's private code. This can be further exploited to access all bills of another project without knowledge of this other project's private code. With the default configuration, anybod...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ihatemoney'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/spiral-project/ihatemoney/security/advisories/GHSA-67j9-c52g-w2q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15120'}, {'type': 'WEB', 'url': 'https://github.com/spiral-project/ihatemoney/commit/8d77cf5d5646e1d2d8ded13f0660638f57e98471'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T17:47:33Z', 'nvd_published_at': None}
1.4.0
GHSA-m5vr-3m74-jwxp
2021-11-19T15:43:34Z
2020-07-29T16:15:19Z
null
['CVE-2020-15098']
Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2) > * CWE-325, CWE-20, CWE-200, CWE-502 ### Problem It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.20'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.6'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-m5vr-3m74-jwxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5091'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/TYPO3.CMS...
{'cwe_ids': ['CWE-20', 'CWE-200', 'CWE-325', 'CWE-327', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T16:14:21Z', 'nvd_published_at': '2020-07-29T17:15:00Z'}
1.4.0
GHSA-9qcf-c26r-x5rf
2021-10-21T21:18:39Z
2020-07-01T17:55:03Z
null
['CVE-2019-13990']
XML external entity injection in Terracotta Quartz Scheduler
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.quartz-scheduler:quartz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/issues/467'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/pull/501'}, {'type': 'WEB', 'url': 'https://github.com/quartz-scheduler/quartz/commit/13c1d...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-01T17:54:54Z', 'nvd_published_at': '2019-07-26T19:15:00Z'}
1.4.0
GHSA-57gr-jvqr-3hwm
2021-09-23T17:35:16Z
2020-07-29T18:07:38Z
null
['CVE-2020-15513']
Incorrect access control in typo3_forum
The typo3_forum extension before 1.2.1 for TYPO3 has Incorrect Access Control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mittwald/typo3_forum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15513'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-010'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:53:59Z', 'nvd_published_at': None}
1.4.0
GHSA-9vfj-5g7h-4p24
2021-06-15T18:10:24Z
2020-07-29T18:08:48Z
null
['CVE-2020-11994']
Server side template injection in Apache Camel
Server-Side Template Injection and arbitrary file disclosure on Camel templating components
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-robotframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11994'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d0e00f2e147a9e9b13a6829133092f349b2882bf6860397368a52600@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a406dc5a158fe6fab6ee85...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T18:06:56Z', 'nvd_published_at': '2020-07-08T16:15:00Z'}
1.4.0
GHSA-8843-m7mw-mxqm
2023-09-05T09:17:03Z
2020-07-27T21:52:41Z
null
['CVE-2020-10379']
Buffer overflow in Pillow
In Pillow before 7.1.0, there are two Buffer Overflows in `libImaging/TiffDecode.c`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10379'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/46f4a349b889...
{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:51:48Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}
1.4.0
GHSA-cqhg-xjhh-p8hf
2023-09-05T09:19:22Z
2020-07-27T21:52:43Z
null
['CVE-2020-10177']
Out-of-bounds reads in Pillow
Pillow before 7.1.0 has multiple out-of-bounds reads in `libImaging/FliDecode.c`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10177'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/issues/4750'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4503'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/4538'}, {'type...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T21:52:00Z', 'nvd_published_at': '2020-06-25T19:15:00Z'}
1.4.0
GHSA-5f9h-9pjv-v6j7
2022-05-26T20:45:56Z
2020-07-06T21:31:02Z
null
['CVE-2020-8161']
Directory traversal in Rack::Directory app bundled with Rack
A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8161'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/mas...
{'cwe_ids': ['CWE-22', 'CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T21:30:32Z', 'nvd_published_at': '2020-07-02T19:15:00Z'}
1.4.0
GHSA-vc9j-fhvv-8vrf
2023-09-12T18:20:33Z
2020-07-27T19:55:52Z
null
['CVE-2020-14000']
Remote Code Execution in scratch-vm
MIT Lifelong Kindergarten Scratch scratch-vm before `0.2.0-prerelease.20200714185213` loads extension URLs from untrusted project.json files with certain `_` characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is `getExtension...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'scratch-vm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0-prerelease.20200714185213'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0-prerelease.20200709173451'}}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-vm/pull/2476'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}, {'type': 'PACKAGE', 'url': 'https://github.com/L...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T19:53:24Z', 'nvd_published_at': None}
1.4.0
GHSA-qwfw-gxx2-mmv2
2021-09-22T21:50:54Z
2020-07-27T22:51:37Z
null
['CVE-2020-13925']
Command Injection in Kylin
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions afte...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:49:53Z', 'nvd_published_at': None}
1.4.0
GHSA-q7j5-9j77-g4gq
2021-07-29T20:50:40Z
2020-07-29T18:07:41Z
null
['CVE-2020-15515']
Remote code execution in turn extension for TYPO3
The turn extension through 0.3.2 for TYPO3 allows Remote Code Execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'marcwillmann/turn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15515'}, {'type': 'WEB', 'url': 'https://typo3.org/help/security-advisories'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2020-011'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T18:00:39Z', 'nvd_published_at': '2020-07-07T16:15:00Z'}
1.4.0
GHSA-vjv6-gq77-3mjw
2023-06-27T20:27:43Z
2020-07-07T16:32:45Z
null
['CVE-2020-15232']
XXE attack in Mapfish Print
### Impact A user can do to an XML External Entity (XXE) attack with the provided SDL style. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://cwe.mitre.org/data/definitions/611.html * https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e ### F...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mapfish.print:print-servlet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/mapfish-print/pull/1397'}, {'type': 'WEB', 'url': 'https://github.com/mapfish/ma...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:32:20Z', 'nvd_published_at': None}
1.4.0
GHSA-hg7c-66ff-9q8g
2020-07-31T16:18:53Z
2020-07-31T16:18:53Z
2020-07-31T16:18:53Z
[]
Sandbox bypass in constantinople
constantinople before 3.1.1 affected by a sandbox bypass.
[]
[{'package': {'ecosystem': 'npm', 'name': 'constantinople'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hg7c-66ff-9q8g'}, {'type': 'WEB', 'url': 'https://www.npmjs.c...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:01:22Z', 'nvd_published_at': None}
1.4.0
GHSA-wvh7-5p38-2qfc
2021-09-22T21:05:43Z
2020-07-23T18:20:10Z
null
[]
Storing Password in Local Storage
The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users...
[]
[{'package': {'ecosystem': 'npm', 'name': 'parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/Parse-SDK-JS'}]
{'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-23T18:18:24Z', 'nvd_published_at': None}
1.4.0
GHSA-j38c-25fj-mr84
2021-09-22T21:23:36Z
2020-07-27T16:57:34Z
null
['CVE-2020-9485']
Stored XSS in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. A stored XSS vulnerability was discovered in the Chart pages of the the "classic" UI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9485'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:57:02Z', 'nvd_published_at': None}
1.4.0
GHSA-2473-9hgq-j7xw
2021-01-07T23:47:06Z
2020-07-20T17:50:30Z
null
['CVE-2020-15118']
Cross-Site Scripting in Wagtail
### Impact When a form page type is made available to Wagtail editors through the `wagtail.contrib.forms` app, and the page template is built using Django's standard form rendering helpers such as `form.as_p` ([as directed in the documentation](https://docs.wagtail.io/en/stable/reference/contrib/forms/index.html#usage)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-2473-9hgq-j7xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15118'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/d9a41e7f24d08c024acc9a3094940199df94db34'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-20T17:47:32Z', 'nvd_published_at': None}
1.4.0
GHSA-wwgf-3xp7-cxj4
2021-09-22T20:22:02Z
2020-07-07T16:33:45Z
null
[]
Potentially sensitive data exposure in Symfony Web Socket Bundle
### Impact Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (d...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'gos/web-socket-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6...
[{'type': 'WEB', 'url': 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}, {'type': 'PACKAGE', 'url': 'https://github.com/GeniusesOfSymfony/WebSock...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T16:21:44Z', 'nvd_published_at': None}
1.4.0
GHSA-6jmr-jfh7-xg3h
2021-01-08T21:00:17Z
2020-07-30T14:58:53Z
null
['CVE-2020-15131']
False-positive validity for NFT1 genesis transactions
### Impact In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'}]
{'cwe_ids': ['CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-30T14:54:40Z', 'nvd_published_at': None}
1.4.0
GHSA-9g2w-5f3v-mfmm
2021-09-22T21:19:02Z
2020-07-27T16:57:33Z
null
['CVE-2020-11982']
Insecure default config of Celery worker in Apache Airflow
An issue was found in Apache Airflow versions 1.10.10 and below. When using CeleryExecutor, if an attack can connect to the broker (Redis, RabbitMQ) directly, it was possible to insert a malicious payload directly to the broker which could lead to a deserialization attack (and thus remote code execution) on the Worker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11982'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7255cf0be3566f23a768e2a04b40fb09e52fcd1872695428ba9afe91%40%3Cusers.airflow.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T16:55:08Z', 'nvd_published_at': None}
1.4.0
GHSA-6vrv-94jv-crrg
2021-01-07T23:48:19Z
2020-07-07T00:01:05Z
null
['CVE-2020-15096']
Context isolation bypass via Promise in Electron
### Impact Apps using `contextIsolation` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you must update your Electron v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.4'}]}]}, {'package': {'ecosystem': 'n...
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-6vrv-94jv-crrg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15096'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}]
{'cwe_ids': ['CWE-501'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-07-06T23:55:38Z', 'nvd_published_at': None}
1.4.0
GHSA-p6mc-m468-83gw
2022-02-08T22:04:28Z
2020-07-15T19:15:48Z
null
['CVE-2020-8203']
Prototype Pollution in lodash
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays. This vulnerability...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['lodash.baseSet']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['lodash.b...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/4744'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/4874'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc...
{'cwe_ids': ['CWE-1321', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-15T19:14:58Z', 'nvd_published_at': '2020-07-15T17:15:00Z'}
1.4.0
GHSA-2v5c-755p-p4gv
2023-05-16T16:01:20Z
2020-07-31T17:40:04Z
null
['CVE-2020-15133']
Missing TLS certificate verification in faye-websocket
The `Faye::WebSocket::Client` class uses the [`EM::Connection#start_tls`][1] method in [EventMachine][2] to implement the TLS handshake whenever a `wss:` URL is used for the connection. This method does not implement certificate verification by default, meaning that it does not check that the server presents a valid an...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'faye-websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/faye/faye-websocket-ruby/security/advisories/GHSA-2v5c-755p-p4gv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15133'}, {'type': 'WEB', 'url': 'https://github.com/eventmachine/eventmachine/issues/275'}, {'type': 'WEB', 'url': 'https://github.com/ev...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-31T17:39:00Z', 'nvd_published_at': '2020-07-31T18:15:00Z'}
1.4.0
GHSA-hx5g-8hq2-8x4w
2021-09-22T21:51:23Z
2020-07-27T22:51:40Z
null
['CVE-2020-13926']
SQL Injection in Kylin
Kylin concatenates and executes a Hive SQL in Hive CLI or beeline when building a new segment; some part of the HQL is from system configurations, while the configuration can be overwritten by certain rest api, which makes SQL injection attack is possible. Users of all previous versions after 2.0 should upgrade to 3.1....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin-server-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13926'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r63d5663169e866d44ff92507...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-07-27T22:50:07Z', 'nvd_published_at': None}
1.4.0
GHSA-33c7-2mpw-hg34
2021-07-29T21:17:18Z
2020-07-29T18:07:16Z
null
['CVE-2020-7694']
Log injection in uvicorn
This affects all versions of package uvicorn. The request logger provided by the package is vulnerable to ASNI escape sequence injection. Whenever any HTTP request is received, the default behaviour of uvicorn is to log its details to either the console or a log file. When attackers request crafted URLs with percent-en...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'uvicorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7694'}, {'type': 'WEB', 'url': 'https://github.com/encode/uvicorn'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-UVICORN-575560'}]
{'cwe_ids': ['CWE-116', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-29T17:37:27Z', 'nvd_published_at': '2020-07-27T12:15:00Z'}
1.4.0
GHSA-cr3x-7m39-c6jq
2023-07-05T20:22:39Z
2020-07-07T16:34:27Z
null
['CVE-2020-8163']
Remote code execution via user-provided local names in ActionView
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that would allow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8163'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/304805'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2020-8163.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!t...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-07-07T15:44:56Z', 'nvd_published_at': '2020-07-02T19:15:00Z'}
1.4.0
GHSA-v2wc-pfq2-5cm6
2021-01-08T20:22:25Z
2020-04-14T23:09:29Z
null
['CVE-2020-11001']
Possible XSS attack in Wagtail
### Impact A cross-site scripting (XSS) vulnerability exists on the page revision comparison view within the Wagtail admin interface. A user with a limited-permission editor account for the Wagtail admin could potentially craft a page revision history that, when viewed by a user with higher privileges, could perform ac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}], 'versions': ['2.8.0']}]
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-v2wc-pfq2-5cm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11001'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/61045ceefea114c40ac4b680af58990dbe732389'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T23:02:21Z', 'nvd_published_at': None}
1.4.0
GHSA-q8xg-8xwf-m598
2021-09-16T20:39:54Z
2020-04-16T03:14:59Z
null
['CVE-2020-10800']
Machine-In-The-Middle in lix
All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800'}, {'type': 'PACKAGE', 'url': 'https://github.com/lix-pm/lix.client'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1306'}]
{'cwe_ids': ['CWE-544', 'CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:10:39Z', 'nvd_published_at': '2020-03-21T15:15:00Z'}
1.4.0
GHSA-prfq-f66g-43mp
2021-01-08T20:23:16Z
2020-04-10T18:19:10Z
null
['CVE-2020-5263']
Information disclosure through error object in auth0.js
## Overview Between versions 8.0.0 and 9.13.1(inclusive), in the case of an (authentication) error, the error object returned by the library contains the original request of the user, which may include the plaintext password the user entered. If the error object is exposed or logged without modification, the applica...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/auth0.js/security/advisories/GHSA-prfq-f66g-43mp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5263'}, {'type': 'WEB', 'url': 'https://github.com/auth0/auth0.js/commit/355ca749b229fb93142f0b3978399b248d710828'}]
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-09T15:53:16Z', 'nvd_published_at': None}
1.4.0
GHSA-jpcq-cgw6-v4j6
2022-02-08T22:06:24Z
2020-04-29T22:19:14Z
null
['CVE-2020-11023']
Potential XSS vulnerability in jQuery
### Impact Passing HTML containing `<option>` elements from untrusted sources - even after sanitizing them - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround this issue w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges...
[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-jpcq-cgw6-v4j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11023'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/j...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T21:04:50Z', 'nvd_published_at': '2020-04-29T21:15:00Z'}
1.4.0
GHSA-5p34-5m6p-p58g
2021-08-25T20:57:31Z
2020-04-23T21:08:40Z
null
['CVE-2020-9546']
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9546'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2631'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r35d30db00440ef63...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:26:40Z', 'nvd_published_at': '2020-03-02T04:15:00Z'}
1.4.0
GHSA-fv3h-8x5j-pvgq
2023-09-01T10:18:10Z
2020-04-22T20:59:50Z
null
['CVE-2020-11888']
XSS in python-markdown2
python-markdown2 through 2.3.8 allows XSS because element names are mishandled unless a \w+ match succeeds. For example, an attack might use elementname@ or elementname- with an onclick attribute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11888'}, {'type': 'WEB', 'url': 'https://github.com/trentm/python-markdown2/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/trentm/python-markdown2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T19:19:38Z', 'nvd_published_at': None}
1.4.0
GHSA-5gm3-px64-rw72
2023-02-02T10:30:38Z
2020-04-01T16:36:44Z
null
['CVE-2019-19911']
Uncontrolled Resource Consumption in Pillow
There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19911'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:30:58Z', 'nvd_published_at': '2020-01-05T22:15:00Z'}
1.4.0
GHSA-9q64-mpxx-87fg
2020-12-15T16:51:18Z
2020-04-01T16:35:08Z
null
[]
Open Redirect in ecstatic
Versions of `ecstatic` prior to 4.1.2, 3.3.2 or 2.2.2 are vulnerable to Open Redirect. The package fails to validate redirects, allowing attackers to craft requests that result in an `HTTP 301` redirect to any other domains. ## Recommendation If using `ecstatic` 4.x, upgrade to 4.1.2 or later. If using `ecstatic` 3....
[]
[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.2'}]}]}, {'package': {'ecosystem': 'np...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10775'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/830'}]
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:37:18Z', 'nvd_published_at': None}
1.4.0
GHSA-h4rc-386g-6m85
2021-08-23T15:31:59Z
2020-04-23T20:19:02Z
null
['CVE-2020-11620']
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.jelly.impl.Embedded (aka commons-jelly).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11620'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2682'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T21:17:03Z', 'nvd_published_at': '2020-04-07T23:15:00Z'}
1.4.0
GHSA-9475-xg6m-j7pw
2021-01-08T20:21:35Z
2020-04-22T20:59:37Z
null
['CVE-2020-5268']
Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET
### Impact Saml2 tokens are usually used as bearer tokens - a caller that presents a token is assumed to be the subject of the token. There is also support in the Saml2 protocol for issuing tokens that is tied to a subject through other means, e.g. holder-of-key where possession of a private key must be proved. The Sus...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Sustainsys.Saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/security/advisories/GHSA-9475-xg6m-j7pw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5268'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/issues/712'}, {'type': 'WEB', 'url': 'https://github.com/Sustainsys/Saml2/com...
{'cwe_ids': ['CWE-303'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-21T18:41:43Z', 'nvd_published_at': None}
1.4.0
GHSA-qpg4-4w7w-2mq5
2023-05-16T15:51:44Z
2020-04-29T17:41:15Z
null
['CVE-2020-11020']
Authentication and extension bypass in Faye
On 20 April 2020 it was reported to me that the potential for authentication bypass exists in [Faye][1]'s extension system. This vulnerability has existed in the Node.js and Ruby versions of the server since version 0.5.0, when extensions were first introduced, in July 2010. It is patched in versions 1.0.4, 1.1.3 and 1...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'faye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/faye/faye/security/advisories/GHSA-qpg4-4w7w-2mq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11020'}, {'type': 'WEB', 'url': 'https://github.com/faye/faye/commit/65d297d341b607f3cb0b5fa6021a625a991cc30e'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T17:40:59Z', 'nvd_published_at': None}
1.4.0
GHSA-758m-v56v-grj4
2021-08-25T20:58:08Z
2020-04-23T21:36:03Z
null
['CVE-2020-10969']
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2642'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/04/...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T19:28:10Z', 'nvd_published_at': '2020-03-26T13:15:00Z'}
1.4.0
GHSA-4g46-5grc-wq49
2020-08-31T18:59:46Z
2020-04-01T16:36:31Z
null
['CVE-2019-15603']
Cross-Site Scripting in seeftl
All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative...
[]
[{'package': {'ecosystem': 'npm', 'name': 'seeftl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15603'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/665302'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1451'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:26:05Z', 'nvd_published_at': None}
1.4.0
GHSA-426h-24vj-qwxf
2021-07-29T15:52:29Z
2020-04-23T20:09:09Z
null
['CVE-2020-7614']
Command Injection in npm-programmatic
All versions of `npm-programmatic ` are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `exec` call on the `install`, `uninstall` and `list` functions . This may allow attackers to execute arbitrary code in the system if the package name passed to the function is ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm-programmatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7614'}, {'type': 'WEB', 'url': 'https://github.com/Manak/npm-programmatic/blob/master/index.js#L18'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NPMPROGRAMMATIC-564115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1507'}]
{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T20:02:33Z', 'nvd_published_at': '2020-04-07T14:15:00Z'}
1.4.0
GHSA-gxr4-xjj5-5px2
2022-02-08T22:06:37Z
2020-04-29T22:18:55Z
null
['CVE-2020-11022']
Potential XSS vulnerability in jQuery
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the follo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ...
[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery/security/advisories/GHSA-gxr4-xjj5-5px2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11022'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-29T22:18:37Z', 'nvd_published_at': '2020-04-29T22:15:00Z'}
1.4.0
GHSA-gqgv-6jq5-jjj9
2021-08-25T21:03:56Z
2020-04-30T17:16:47Z
null
['CVE-2017-1000048']
Prototype Pollution Protection Bypass in qs
Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Obje...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/issues/200'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-30T17:16:10Z', 'nvd_published_at': None}
1.4.0
GHSA-6chw-6frg-f759
2021-08-23T15:10:32Z
2020-04-03T21:48:38Z
null
[]
Regular Expression Denial of Service in Acorn
Affected versions of acorn are vulnerable to Regular Expression Denial of Service. A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop. The string is not valid UTF16 which usually results in it being sanitized before reaching the parser. If an application processes untrusted input and passe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.7.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'acorn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.1'}]}]}, {'package': {'ecosystem': 'npm'...
[{'type': 'WEB', 'url': 'https://github.com/acornjs/acorn/issues/929'}, {'type': 'WEB', 'url': 'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ACORN-559469'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1488'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-03T21:42:14Z', 'nvd_published_at': None}
1.4.0
GHSA-qh4w-7pw3-p4rp
2023-08-25T21:29:46Z
2020-04-29T15:34:50Z
null
['CVE-2015-4411']
BSON rubygem contains potential denial of service
The `Moped::BSON::ObjecId.legal?` method in `mongodb/bson-ruby` before 3.0.4 as used in rubygem-moped allows remote attackers to cause a denial of service (worker resource consumption) via a crafted string. NOTE: This issue is due to an incomplete fix to CVE-2015-4410.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4411'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/commit/fef6f75413511d653c76bf924a932374a183a24f#diff-8c8558c185bbb5...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-23T20:14:17Z', 'nvd_published_at': None}
1.4.0
GHSA-c2h6-7gm8-cv4w
2023-01-24T18:07:52Z
2020-04-01T16:35:44Z
null
['CVE-2020-5497']
XSS in MITREid Connect
The OpenID Connect reference implementation for MITREid Connect through 1.3.3 allows XSS due to userInfoJson being included in the page unsanitized. This is related to header.tag. The issue can be exploited to execute arbitrary JavaScript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mitre:openid-connect-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5497'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/issues/1521'}, {'type': 'WEB', 'url': 'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/pull/1526'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:02:47Z', 'nvd_published_at': '2020-01-04T03:15:00Z'}
1.4.0
GHSA-vcjj-xf2r-mwvc
2022-04-25T23:07:31Z
2020-04-01T15:47:45Z
null
['CVE-2019-14862']
XSS in knockout
There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'knockout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14862'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/issues/1244'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/pull/2345'}, {'type': 'WEB', 'url': 'https://github.com/knockout/knockout/commit/7e280b2b8a04cc19176b5...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T15:46:54Z', 'nvd_published_at': '2020-01-02T15:15:00Z'}
1.4.0
GHSA-wvpv-ffcv-r6cw
2021-01-08T20:22:38Z
2020-04-14T23:09:13Z
null
['CVE-2020-11005']
Internal NCryptDecrypt method could be used externally from WindowsHello library.
### Impact Every user of the library before version 1.0.4. ### Patches Patched in 1.0.4+. ### Workarounds None. ### References https://github.com/SeppPenner/WindowsHello/issues/3 ### For more information It this library is used to encrypt text and write the output to a txt file, another executable could be able to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'HaemmerElectronics.SeppPenner.WindowsHello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/SeppPenner/WindowsHello/security/advisories/GHSA-wvpv-ffcv-r6cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11005'}, {'type': 'WEB', 'url': 'https://github.com/SeppPenner/WindowsHello/issues/3'}]
{'cwe_ids': ['CWE-288'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T22:26:38Z', 'nvd_published_at': None}
1.4.0
GHSA-8vf3-4w62-m3pq
2021-08-23T15:16:25Z
2020-04-15T21:09:09Z
null
['CVE-2020-1697']
XSS in Keycloak
It was found in all keycloak versions before 9.0.0 that links to external applications (Application Links) in the admin console are not validated properly and could allow Stored XSS attacks. An authed malicious user could create URLs to trick users in other realms, and possibly conduct further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1697'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1697'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:56:17Z', 'nvd_published_at': '2020-02-10T15:15:00Z'}
1.4.0
GHSA-xfqh-7356-vqjj
2021-11-01T14:08:16Z
2020-04-15T21:08:21Z
null
['CVE-2019-14820']
Exposure of Sensitive Information to an Unauthorized Actor in Keycloak
It was found that keycloak before version 8.0.0 exposes internal adapter endpoints in org.keycloak.constants.AdapterConstants, which can be invoked via a specially-crafted URL. This vulnerability could allow an attacker to access unauthorized information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14820'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14820'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:54:33Z', 'nvd_published_at': '2020-01-08T15:15:00Z'}
1.4.0
GHSA-gvr4-7xgc-gx3w
2020-08-31T18:59:48Z
2020-04-01T16:36:15Z
null
['CVE-2019-15602']
Cross-Site Scripting in fileview
All versions of `fileview` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternati...
[]
[{'package': {'ecosystem': 'npm', 'name': 'fileview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15602'}, {'type': 'WEB', 'url': 'https://github.com/itworkcenter/fileview/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/itworkcenter/fileview/pull/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/507159'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-01T16:21:53Z', 'nvd_published_at': None}
1.4.0
GHSA-j438-45hc-vjhm
2021-01-08T20:59:34Z
2020-04-16T03:14:39Z
null
['CVE-2020-11003']
CSRF and DNS Rebinding in Oasis
### Impact _What kind of vulnerability is it? Who is impacted?_ If you're running a vulnerable application on your computer and an attacker can trick you into visiting a malicious website, they could use [DNS rebinding](https://en.wikipedia.org/wiki/DNS_rebinding) and [CSRF](https://en.wikipedia.org/wiki/Cross-site_re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@fraction/oasis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fraction/oasis/security/advisories/GHSA-j438-45hc-vjhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11003'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T22:57:22Z', 'nvd_published_at': None}
1.4.0
GHSA-rc5r-697f-28x6
2021-08-23T15:13:38Z
2020-04-15T21:07:59Z
null
['CVE-2019-12186']
XSS injection in the Grid component of Sylius
Grid component of Sylius omits HTML input sanitisation while rendering object implementing __toString() method through the string field type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12186'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sylius/grid/CVE-2019-12186.yaml'}, {'type': 'WEB', 'url': 'https://sylius.com/blog/cve-2019-12186/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T20:44:02Z', 'nvd_published_at': None}
1.4.0
GHSA-3j7m-hmh3-9jmp
2021-08-23T15:18:04Z
2020-04-16T03:14:47Z
null
['CVE-2016-1000237']
Cross-Site Scripting in sanitize-html
Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript. ## Recommendation Update to version 1.4.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sanitize-html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/punkave/sanitize-html/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/apostrophecms/sanitize-html/comm...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T02:54:08Z', 'nvd_published_at': None}
1.4.0
GHSA-8jpx-m2wh-2v34
2021-01-08T20:22:52Z
2020-04-10T18:42:20Z
null
['CVE-2020-11002']
Remote Code Execution (RCE) vulnerability in dropwizard-validation
### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.dropwizard:dropwizard-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0...
[{'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-3mcp-9wr4-cjqf'}, {'type': 'WEB', 'url': 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11002'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-10T18:37:22Z', 'nvd_published_at': None}
1.4.0
GHSA-95cm-88f5-f2c7
2021-10-21T21:13:58Z
2020-04-23T16:32:59Z
null
['CVE-2020-10672']
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.aries.transaction.jms.internal.XaPooledConnectionFactory (aka aries.transaction.jms).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10672'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2659'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-04-22T21:12:55Z', 'nvd_published_at': '2020-03-18T22:15:00Z'}
1.4.0
GHSA-pc5p-h8pf-mvwp
2021-08-23T15:27:24Z
2020-04-16T03:14:56Z
null
[]
Machine-In-The-Middle in https-proxy-agent
Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N/'}]
[{'package': {'ecosystem': 'npm', 'name': 'https-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541502'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/a...
{'cwe_ids': ['CWE-300'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-16T03:03:19Z', 'nvd_published_at': None}
1.4.0
GHSA-4gp3-p7ph-x2jr
2021-08-23T15:12:51Z
2020-04-14T23:09:00Z
null
['CVE-2019-10778']
OS Command Injection in devcert-sanscache
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'devcert-sanscache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778'}, {'type': 'WEB', 'url': 'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-04-14T15:32:49Z', 'nvd_published_at': None}
1.4.0
GHSA-3gg7-9q2x-79fc
2020-04-15T21:07:13Z
2020-04-15T21:09:40Z
null
['CVE-2020-1728']
Improper Restriction of Rendered UI Layers or Frames in Keycloak
A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws un...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1728'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1728'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-12264'}]
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-04-15T21:07:13Z', 'nvd_published_at': '2020-04-06T14:15:00Z'}