schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 3 183 | details stringlengths 9 12.9k | severity stringlengths 2 92 | affected stringlengths 84 2.74k | references stringlengths 99 16.4k | database_specific stringlengths 131 210 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-prmc-5v5w-c465 | 2021-03-31T18:09:39Z | 2021-04-06T17:32:38Z | null | [] | Client TLS credentials sent raw to server in npm package nats | Nats is a Node.js client for the NATS messaging system.
## Problem Description
_Preview versions_ of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials.
The _connection_ configu... | [] | [{'package': {'ecosystem': 'npm', 'name': 'nats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-201'}, {'fixed': '2.0.0-209'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-208'}}] | [{'type': 'WEB', 'url': 'https://github.com/nats-io/nats.js/security/advisories/GHSA-prmc-5v5w-c465'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2020-26149.txt'}] | {'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:09:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6qpr-9mc5-7gch | 2023-09-07T18:43:43Z | 2021-04-12T19:50:20Z | null | ['CVE-2020-28490'] | Command Injection in async-git | The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: `git.reset('atouch HACKEDb')` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'async-git'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-J... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T22:57:13Z', 'nvd_published_at': '2021-02-18T15:15:00Z'} |
1.4.0 | GHSA-88rc-3p98-rgvx | 2021-04-12T22:33:13Z | 2021-04-13T15:13:48Z | null | [] | After order payment process manipulation in shopware/platform and shopware/core | ### Impact
After order payment process manipulation
### Patches
We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1 a... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ... | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-88rc-3p98-rgvx'}] | {'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vf26-7gjf-f92r | 2021-04-08T20:03:52Z | 2021-04-13T15:23:29Z | null | ['CVE-2019-10796'] | OS Command Injection in rpi | rpi through 0.0.3 allows execution of arbritary commands. The variable pinNumbver in function GPIO within src/lib/gpio.js is used as part of the arguement of exec function without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rpi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10796'}, {'type': 'WEB', 'url': 'https://github.com/xseignard/rpi/blob/master/src/lib/gpio.js#L47'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RPI-548942'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:03:52Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-6757-jp84-gxfx | 2022-07-29T18:40:16Z | 2021-04-20T16:14:24Z | null | ['CVE-2020-1747'] | Improper Input Validation in PyYAML | A vulnerability was discovered in the PyYAML library in versions before 5.3.1, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this fla... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.full_load', 'yaml.FullLoader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1747'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/386'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/5080ba513377b6355a0502104846ee804656f1e0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:29:00Z', 'nvd_published_at': '2020-03-24T15:15:00Z'} |
1.4.0 | GHSA-fvrf-9428-527m | 2021-04-30T20:20:59Z | 2021-04-22T16:11:01Z | null | ['CVE-2021-21427'] | Backport for CVE-2021-21024 Blind SQLi from Magento 2 | ### Impact
This vulnerability allows an administrator unauthorized access to restricted resources.
We fixed a vulnerability in the MySQL adapter to prevent SQL injection attacks. This is a backport of CVE-2021-21024 https://helpx.adobe.com/security/products/magento/apsb21-08.html.
### Patches
_Has the problem been... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': ... | [{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-fvrf-9428-527m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21427'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:06:43Z', 'nvd_published_at': '2021-04-21T21:15:00Z'} |
1.4.0 | GHSA-j2h6-73x8-22c4 | 2023-08-31T20:44:29Z | 2021-04-20T16:43:53Z | null | ['CVE-2020-1746'] | Exposure of Sensitive Information to an Unauthorized Actor in ansible | A flaw was found in the Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when the ldap_attr and ldap_entry community modules are used. The issue discloses the LDAP bind pas... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1746'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67866/commits/0ff609f1bc5e391fa25710b9a0baaf669f347eb1'}, {'type': 'WEB', 'url': 'https://bugzilla.redh... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:47:04Z', 'nvd_published_at': '2020-05-12T18:15:00Z'} |
1.4.0 | GHSA-6q4w-3wp4-q5wf | 2022-05-03T02:57:48Z | 2021-04-13T15:15:57Z | null | ['CVE-2021-27191'] | Denial of Service in get-ip-range | The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'get-ip-range'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191'}, {'type': 'WEB', 'url': 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4304'}, {'type': 'WEB', 'url': 'https://security.net... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:50:19Z', 'nvd_published_at': '2021-02-11T18:15:00Z'} |
1.4.0 | GHSA-gwp7-vqr5-h33h | 2023-08-07T13:01:27Z | 2021-04-20T16:13:45Z | null | ['CVE-2020-35678'] | Open Redirect in autobahn | Autobahn|Python before 20.12.3 allows redirect header injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'autobahn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35678'}, {'type': 'WEB', 'url': 'https://github.com/crossbario/autobahn-python/pull/1439'}, {'type': 'WEB', 'url': 'https://autobahn.readthedocs.io/en/latest/changelog.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbario/autobahn-pytho... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:27:56Z', 'nvd_published_at': '2020-12-27T00:15:00Z'} |
1.4.0 | GHSA-rhh9-cm65-3w54 | 2021-10-05T16:27:33Z | 2021-04-30T17:29:30Z | null | ['CVE-2018-11765'] | Improper Authentication in Apache Hadoop | In Apache Hadoop versions 3.0.0-alpha2 to 3.0.0, 2.9.0 to 2.9.2, 2.8.0 to 2.8.5, any users can access some servlets without authentication when Kerberos authentication is enabled and SPNEGO through HTTP is not enabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha2'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-m... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11765'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r17d94d132b207dad221595fd8b8b18628f5f5ec7e3f5be939ecd8928@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2c7f899911a04164ed170708... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:56:41Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-rjmf-p882-645m | 2021-04-12T18:51:10Z | 2021-04-12T18:51:17Z | null | ['CVE-2021-20327'] | Improper Certificate Validation | A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongodb-client-encryption'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}], 'versions': ['1.2.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/NODE-3125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisori... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:00:28Z', 'nvd_published_at': '2021-02-25T17:15:00Z'} |
1.4.0 | GHSA-q348-f93x-9gx4 | 2021-04-28T22:29:16Z | 2021-04-29T21:53:06Z | null | ['CVE-2021-30492'] | Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain | ### Impact
Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF).
### Resolution
Validate the provided Zendesk subdomain to be a valid subdomain in:
* getAuthUrl
* getAccessToken | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendesk/zendesk_api_client_php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/pull/466'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c533... | {'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T22:29:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxmg-hm46-cf62 | 2023-09-12T19:23:11Z | 2021-04-13T15:41:01Z | null | ['CVE-2020-24391'] | Remote code execution in mongo-express | mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongodb-query-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24391'}, {'type': 'WEB', 'url': 'https://github.com/mongodb-js/query-parser/issues/16'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:14:37Z', 'nvd_published_at': '2021-03-30T21:15:00Z'} |
1.4.0 | GHSA-22cm-3qf2-2wc7 | 2021-04-01T23:39:38Z | 2021-04-13T15:30:27Z | null | ['CVE-2021-23335'] | LDAP Injection in is-user-valid | All versions of package is-user-valid are vulnerable to LDAP Injection which can lead to either authentication bypass or information exposure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-user-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23335'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ISUSERVALID-1056766'}] | {'cwe_ids': ['CWE-74', 'CWE-90'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:39:38Z', 'nvd_published_at': '2021-02-11T12:15:00Z'} |
1.4.0 | GHSA-hxp5-8pgq-mgv9 | 2021-04-21T20:27:19Z | 2021-04-22T16:14:14Z | null | ['CVE-2020-13955'] | Missing Authentication for Critical Function in Apache Calcite | "HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.26.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fix... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CALCITE-4298'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thr... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:27:19Z', 'nvd_published_at': '2020-10-09T13:15:00Z'} |
1.4.0 | GHSA-2c8c-84w2-j38j | 2021-04-07T19:33:49Z | 2021-04-07T21:14:00Z | null | ['CVE-2020-28736'] | Improper Restriction of XML External Entity Reference in Plone | Plone before 5.2.3 allows XXE attacks via a feature that is protected by an unapplied permission of plone.schemaeditor.ManageSchemata (therefore, only available to the Manager role). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28736'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:33:49Z', 'nvd_published_at': '2020-12-30T19:15:00Z'} |
1.4.0 | GHSA-frpw-jrwx-hcfv | 2023-09-07T22:38:20Z | 2021-04-13T15:30:00Z | null | ['CVE-2021-25864'] | Path Traversal in node-red-contrib-huemagic | node-red-contrib-huemagic 3.0.0 is affected by `hue/assets/..%2F` Directory Traversal.in the `res.sendFile` API, used in file hue-magic.js, to fetch an arbitrary file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-red-contrib-huemagic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25864'}, {'type': 'WEB', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic/issues/217'}, {'type': 'PACKAGE', 'url': 'https://github.com/Foddy/node-red-contrib-huemagic'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:24:50Z', 'nvd_published_at': '2021-01-26T18:16:00Z'} |
1.4.0 | GHSA-9mrv-456v-pf22 | 2021-03-22T23:06:41Z | 2021-04-13T15:19:50Z | null | ['CVE-2020-28487'] | Cross-site Scripting in vis-timeline | This affects the package vis-timeline before 7.4.4.
An attacker with the ability to control the items of a Timeline element can inject additional script code into the generated application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'vis-timeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28487'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/issues/838'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/pull/840'}, {'type': 'WEB', 'url': 'https://github.com/visjs/vis-timeline/commit/a7ca349c7b3b6080efd0... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:06:41Z', 'nvd_published_at': '2021-01-22T18:15:00Z'} |
1.4.0 | GHSA-4mg9-vhxq-vm7j | 2021-11-18T19:46:31Z | 2021-04-29T21:52:53Z | null | [] | SQL Server LIMIT / OFFSET SQL Injection in laravel/framework and illuminate/database | ### Impact
Those using SQL Server with Laravel and allowing user input to be passed directly to the `limit` and `offset` functions are vulnerable to SQL injection. Other database drivers such as MySQL and Postgres are not affected by this vulnerability.
### Patches
This problem has been patched on Laravel versions 6... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.40.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.20.26'}]}... | [{'type': 'WEB', 'url': 'https://github.com/laravel/framework/security/advisories/GHSA-4mg9-vhxq-vm7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/illuminate/database'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/laravel/framew... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T20:17:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-prv2-xwr7-hr57 | 2021-04-08T20:19:06Z | 2021-04-13T15:23:21Z | null | ['CVE-2019-10798'] | Uncontrolled Resource Consumption in rdf-graph-array | rdf-graph-array through 0.3.0-rc6 manipulation of JavaScript objects resutling in Prototype Pollution. The rdf.Graph.prototype.add method could be tricked into adding or modifying properties of Object.prototype. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'rdf-graph-array'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0-rc6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10798'}, {'type': 'WEB', 'url': 'https://github.com/rdf-ext-archive/rdf-graph-array/blob/master/index.js#L211'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RDFGRAPHARRAY-551803'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:19:06Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-m429-fhmv-c6q2 | 2023-08-31T21:46:29Z | 2021-04-20T16:44:07Z | null | ['CVE-2020-14365'] | Improper Verification of Cryptographic Signature in ansible | A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when `disable_gpg_check` is set to `False`, which is the default behavior. This flaw leads to malicious... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14365'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/9bea33ffa3be3d64827f59882d95b817cfab9b7e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1869154'}, {'type': 'PACKAGE', 'url': 'https://github.com/ans... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:49:57Z', 'nvd_published_at': '2020-09-23T13:15:00Z'} |
1.4.0 | GHSA-j6qj-j888-vvgq | 2022-04-22T15:49:55Z | 2021-04-06T17:32:00Z | null | ['CVE-2021-28163'] | Directory exposure in jetty | ### Impact
If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download.
For example, the problem manifests in the follo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.32'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-deploy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}... | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.htm... | {'cwe_ids': ['CWE-200', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:13:08Z', 'nvd_published_at': '2021-04-01T15:15:00Z'} |
1.4.0 | GHSA-5chj-xprr-7qqx | 2022-01-04T19:33:28Z | 2021-04-22T16:15:33Z | null | ['CVE-2020-9447'] | Cross-site Scripting in GwtUpload | The file-upload feature in GwtUpload 1.0.3 allows XSS via a crafted filename. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.gwtupload:gwtupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9447'}, {'type': 'WEB', 'url': 'https://github.com/manolo/gwtupload/issues/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/manolo/gwtupload'}, {'type': 'WEB', 'url': 'https://www.coresecurity.com/advisories/gwtupload-xss-file-upload-functional... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:17:42Z', 'nvd_published_at': '2020-02-28T16:15:00Z'} |
1.4.0 | GHSA-6hgr-2g6q-3rmc | 2021-10-08T21:22:21Z | 2021-04-22T16:11:26Z | null | [] | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempte... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-6hgr-2g6q-3rmc'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/commit/815b967fc84fefa8d3a4d72b9a036f48b0d96326'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:31:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hj5v-574p-mj7c | 2023-08-07T13:05:28Z | 2021-04-20T16:39:57Z | null | ['CVE-2020-29651'] | py vulnerable to Regular Expression Denial of Service | A denial of service via regular expression in the py.path.svnwc component of py (aka python-py) through 1.9.0 could be used by attackers to cause a compute-time denial of service attack by supplying malicious input to the blame functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29651'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/pull/257/commits/4a9017dc6199d2a564b6e4b0a... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:17:48Z', 'nvd_published_at': '2020-12-09T07:15:00Z'} |
1.4.0 | GHSA-69q2-p9xp-739v | 2022-03-22T22:08:40Z | 2021-04-20T16:32:08Z | null | ['CVE-2020-29128'] | XML Injection in petl | petl before 1.68, in some configurations, allows resolution of entities in an XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'petl'}, 'ecosystem_specific': {'affected_functions': ['petl.io.xml.XmlView']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/security/advisories/GHSA-f5gc-p5m3-v347'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29128'}, {'type': 'WEB', 'url': 'https://github.com/petl-developers/petl/issues/526'}, {'type': 'WEB', 'url': 'https://github.com/petl-develo... | {'cwe_ids': ['CWE-91'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:20:39Z', 'nvd_published_at': '2020-11-26T05:15:00Z'} |
1.4.0 | GHSA-vf4w-fg7r-5v94 | 2021-04-23T00:22:49Z | 2021-04-07T20:56:55Z | null | ['CVE-2021-30130'] | Improper Certificate Validation in phpseclib | phpseclib before 2.0.31 and 3.x before 3.0.7 mishandles RSA PKCS#1 v1.5 signature verification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpseclib/phpseclib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.31'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30130'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/pull/1635'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/2.0.31'}, {'type': 'WEB', 'url': 'https://github.com/phpseclib/phpseclib/releases/tag/3... | {'cwe_ids': ['CWE-295', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T17:29:49Z', 'nvd_published_at': '2021-04-06T15:15:00Z'} |
1.4.0 | GHSA-g78f-549w-c354 | 2021-04-07T23:21:37Z | 2021-04-13T15:23:59Z | null | ['CVE-2020-28448'] | Prototype Pollution in multi-ini | This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28448'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/pull/37'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:21:37Z', 'nvd_published_at': '2020-12-22T13:15:00Z'} |
1.4.0 | GHSA-w9fg-xffh-p362 | 2021-08-31T21:08:01Z | 2021-04-13T15:12:51Z | null | ['CVE-2021-21394'] | Denial of service (via resource exhaustion) due to improper input validation on third-party identifier endpoints | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
The issue is fixed by #9321.
### Workarounds
Depending on the needs and configuration of the homeserver a few o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-w9fg-xffh-p362'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21394'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synap... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:01:40Z', 'nvd_published_at': '2021-04-12T21:15:00Z'} |
1.4.0 | GHSA-7359-3c6r-hfc2 | 2023-01-24T14:59:50Z | 2021-04-22T16:22:15Z | null | ['CVE-2016-11086'] | Improper Certificate Validation in oauth ruby gem | lib/oauth/consumer.rb in the oauth-ruby gem through 0.5.4 for Ruby does not verify server X.509 certificates if a certificate bundle cannot be found, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-11086'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/issues/137'}, {'type': 'WEB', 'url': 'https://github.com/oauth-xx/oauth-ruby/commit/eb5b00a91d4ef0899082fdba929c34ccad6d4ccb'}, {'type': 'PACKAGE', 'url': 'https://github.com/o... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:23:58Z', 'nvd_published_at': '2020-09-24T20:15:00Z'} |
1.4.0 | GHSA-jgpv-4h4c-xhw3 | 2021-04-22T17:01:01Z | 2021-04-23T16:54:36Z | null | [] | Uncontrolled Resource Consumption in pillow | ### Impact
_Pillow before 8.1.1 allows attackers to cause a denial of service (memory consumption) because the reported size of a contained image is not properly checked for a BLP container, and thus an attempted memory allocation can be very large._
### Patches
_An issue was discovered in Pillow before 6.2.0. When re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.1.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/calix2/pyVulApp/security/advisories/GHSA-jgpv-4h4c-xhw3'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:01:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p48w-vf3c-rqjx | 2021-04-27T19:43:14Z | 2021-04-29T21:51:21Z | null | ['CVE-2021-21365'] | Cross-Site Scripting in Bootstrap Package | ### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'bk2k/bootstrap-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed':... | [{'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365'}, {'type': 'WEB', 'url': 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:43:14Z', 'nvd_published_at': '2021-04-27T20:15:00Z'} |
1.4.0 | GHSA-fjq3-5pxw-4wj4 | 2023-09-07T15:55:33Z | 2021-04-07T21:06:30Z | null | ['CVE-2020-7965'] | Cross-Site Request Forgery in Webargs | flaskparser.py in Webargs 5.x through 5.5.2 doesn't check that the Content-Type header is application/json when receiving JSON input. If the request body is valid JSON, it will accept it even if the content type is application/x-www-form-urlencoded. This allows for JSON POST requests to be made across domains, leading ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7965'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/webargs/commit/b9ee8b0aa668207a363d9fd21d967eeadb975c3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/marshmallow-code/webargs'}, {'type': 'WEB', 'url': 'https://webargs.readth... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:19:18Z', 'nvd_published_at': '2020-01-29T15:15:00Z'} |
1.4.0 | GHSA-jrh7-mhhx-6h88 | 2021-08-31T21:07:44Z | 2021-04-13T15:12:40Z | null | ['CVE-2021-21393'] | Denial of service (via resource exhaustion) due to improper input validation on groups/communities endpoints | ### Impact
Missing input validation of some parameters on the groups (also known as communities) endpoints could cause excessive use of disk space and memory leading to resource exhaustion. Additionally clients may have issues rendering large fields.
### Patches
This issue is fixed by #9321 and #9393.
### Workarounds... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jrh7-mhhx-6h88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21393'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9321'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synap... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:48:55Z', 'nvd_published_at': '2021-04-12T22:15:00Z'} |
1.4.0 | GHSA-c6p9-24rc-jr5h | 2021-04-21T19:02:43Z | 2021-04-22T16:15:15Z | null | ['CVE-2020-7744'] | Remote Code Execution and download tracking in Mintegral SDK | "This affects all versions of package com.mintegral.msdk:alphab. The Android SDK distributed by the company contains malicious functionality in this module that tracks: 1. Downloads from Google urls either within Google apps or via browser including file downloads, e-mail attachments and Google Docs links. 2. All apk d... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mintegral.msdk:alphab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.6.01'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7744'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/remote-code-execution-rce-sourmint/'}, {'type': 'WEB', 'url': 'https://snyk.io/research/sour-mint-malicious-sdk/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMMINTEGRALMSDK-1018714... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:02:43Z', 'nvd_published_at': '2020-10-15T13:15:00Z'} |
1.4.0 | GHSA-ffw3-6mp6-jmvj | 2023-08-30T22:07:40Z | 2021-04-07T21:05:57Z | null | ['CVE-2021-26559'] | Improper Access Control in Apache Airflow | Improper Access Control on Configurations Endpoint for the Stable API of Apache Airflow allows users with Viewer or User role to get Airflow Configurations including sensitive information even when `[webserver] expose_config` is set to `False` in `airflow.cfg`. This allowed a privilege escalation attack. This issue aff... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26559'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/blob/486b76438c0679682cf98cb88ed39c4b161cbcc8/CHANGELOG.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thre... | {'cwe_ids': ['CWE-269', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T23:27:01Z', 'nvd_published_at': '2021-02-17T15:15:00Z'} |
1.4.0 | GHSA-rjww-2x8v-m9v9 | 2022-09-21T19:31:15Z | 2021-04-19T14:52:14Z | null | ['CVE-2020-36319'] | Potential sensitive data exposure in applications using Vaadin 15 | Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rjww-2x8v-m9v9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36319'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8016'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/8051'}, {'typ... | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:31Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-v7ff-8wcx-gmc5 | 2022-04-17T16:45:25Z | 2021-04-06T17:31:01Z | null | ['CVE-2021-28164'] | Authorization Before Parsing and Canonicalization in jetty | Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.37'}, {'fixed': '9.4.39'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.htm... | {'cwe_ids': ['CWE-200', 'CWE-551', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:28:10Z', 'nvd_published_at': '2021-04-01T15:15:00Z'} |
1.4.0 | GHSA-cccf-7xw3-p2vr | 2022-02-11T21:12:25Z | 2021-04-30T17:28:33Z | null | ['CVE-2020-10719'] | HTTP Request Smuggling in Undertow | A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}] | {'cwe_ids': ['CWE-444'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:37:37Z', 'nvd_published_at': '2020-05-26T16:15:00Z'} |
1.4.0 | GHSA-xwg3-qrcg-w9x6 | 2021-04-23T17:17:16Z | 2021-04-19T14:51:25Z | null | ['CVE-2021-31404'] | Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18 | Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.4.7... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9875'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:19Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-35q2-47q7-3pc3 | 2022-08-11T00:21:37Z | 2021-04-27T15:56:03Z | null | ['CVE-2021-29469'] | Node-Redis potential exponential regex in monitor mode | ### Impact
When a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a denial of service.
### Patches
The problem was fixed in commit [`2d11b6d`](https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'redis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/security/advisories/GHSA-35q2-47q7-3pc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29469'}, {'type': 'WEB', 'url': 'https://github.com/NodeRedis/node-redis/commit/2d11b6dc9b9774464a91fb4b448bad8bf699629e'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-23T18:11:39Z', 'nvd_published_at': '2021-04-23T18:15:00Z'} |
1.4.0 | GHSA-gwrp-pvrq-jmwv | 2022-02-08T21:31:42Z | 2021-04-26T16:04:00Z | null | ['CVE-2021-29425'] | Path Traversal and Improper Input Validation in Apache Commons IO | In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-io:commons-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29425'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/IO-556'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01b4a1fcdf3311c936ce33d75a9398b6c255f00c1a2f312ac21effe1@%3Cnotifications.zookeeper.apache.org%3E'}, {'ty... | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T15:21:31Z', 'nvd_published_at': '2021-04-13T07:15:00Z'} |
1.4.0 | GHSA-52qp-jpq7-6c54 | 2021-04-27T20:54:56Z | 2021-04-29T21:52:30Z | null | ['CVE-2021-29476'] | Insecure Deserialization of untrusted data in rmccue/requests | ### Impact
Unserialization of untrusted data.
### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
*... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rmccue/requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/WordPress/Requests/security/advisories/GHSA-52qp-jpq7-6c54'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29476'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/rmccue/Requests/pu... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:54:56Z', 'nvd_published_at': '2021-04-27T21:15:00Z'} |
1.4.0 | GHSA-4c7m-wxvm-r7gc | 2022-04-01T20:21:55Z | 2021-04-14T15:03:16Z | null | ['CVE-2021-28918'] | Improper parsing of octal bytes in netmask | Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'netmask'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28918'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pch5-whg9-qr2r'}, {'type': 'PACKAGE', 'url': 'https://github.com/rs/node-netmask/'}, {'type': 'WEB', 'url': 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fb... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:13:23Z', 'nvd_published_at': '2021-04-01T13:15:00Z'} |
1.4.0 | GHSA-whq6-mj2r-mjqc | 2021-03-29T22:11:57Z | 2021-04-13T15:17:53Z | null | ['CVE-2019-10783'] | OS Command Injection in lsof | All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lsof'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LSOF-543632'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:57Z', 'nvd_published_at': '2020-01-29T22:15:00Z'} |
1.4.0 | GHSA-hh8v-jmh3-9437 | 2021-04-06T21:51:28Z | 2021-04-13T15:25:33Z | null | ['CVE-2020-8823'] | Cross-site scripting in SocksJS-node | htmlfile in lib/transport/htmlfile.js in SockJS before 0.3.0 is vulnerable to Reflected XSS via the /htmlfile c (aka callback) parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8823'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/theyiyibest/Reflected-XSS-on-SockJS'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SOCKJS-548397'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:51:28Z', 'nvd_published_at': '2020-02-10T03:15:00Z'} |
1.4.0 | GHSA-5wrh-4jwv-5w78 | 2021-08-31T21:07:35Z | 2021-04-13T15:13:08Z | null | ['CVE-2021-21392'] | Open redirect via transitional IPv6 addresses on dual-stack networks | ### Impact
Requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addresses were used. Outbound requests to federation, identity servers, when calculating the key validity for third-party invite events, sending push notifications, and generating URL previews are affected. ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-5wrh-4jwv-5w78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21392'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/9240'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/s... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T21:51:49Z', 'nvd_published_at': '2021-04-12T22:15:00Z'} |
1.4.0 | GHSA-rp4x-wxqv-cf9m | 2021-04-16T23:17:25Z | 2021-04-19T14:52:29Z | null | ['CVE-2019-25027'] | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-2502... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.4.3... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-rp4x-wxqv-cf9m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25027'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/5498'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}] | {'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-g4cp-h53p-v3v8 | 2022-02-11T21:12:32Z | 2021-04-30T17:28:42Z | null | ['CVE-2020-10705'] | Allocation of Resources Without Limits or Throttling in Undertow | A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1803241'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0014/'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T16:36:15Z', 'nvd_published_at': '2020-06-10T20:15:00Z'} |
1.4.0 | GHSA-gfr2-qpxh-qj9m | 2022-05-05T21:55:25Z | 2021-04-07T20:35:24Z | null | ['CVE-2020-1735'] | Path Traversal in Ansible | A flaw was found in the Ansible Engine when the fetch module is used. An attacker could intercept the module, inject a new path, and then choose a new destination path on the controller node. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1735'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67793'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1735'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:54:51Z', 'nvd_published_at': '2020-03-16T16:15:00Z'} |
1.4.0 | GHSA-pxcc-hj8w-fmm7 | 2021-03-31T18:00:32Z | 2021-04-06T17:25:12Z | null | ['CVE-2021-21414'] | Command injection vulnerability in @prisma/sdk in getPackedPackage function | ### Impact
As of today, we are not aware of any Prisma users or external consumers of the `@prisma/sdk` package who are affected by this security vulnerability.
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
It only affects the `getPackedPack... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@prisma/sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/prisma/prisma/security/advisories/GHSA-pxcc-hj8w-fmm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21414'}, {'type': 'WEB', 'url': 'https://github.com/prisma/prisma/pull/6245'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-202... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T18:00:32Z', 'nvd_published_at': '2021-04-29T01:15:00Z'} |
1.4.0 | GHSA-wmg4-8cp2-hpg9 | 2022-08-11T13:18:23Z | 2021-04-19T14:54:04Z | null | ['CVE-2021-29430'] | Sydent vulnerable to denial of service attack via memory exhaustion | ### Impact
Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to disk space exhaustion and denial of service.
Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious home... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-wmg4-8cp2-hpg9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29430'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0523511d2fb40f2738f8a8549868f44b96e5dab7'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:49:34Z', 'nvd_published_at': '2021-04-15T21:15:00Z'} |
1.4.0 | GHSA-qgp4-5qx6-548g | 2021-04-27T20:11:58Z | 2021-04-30T17:30:06Z | null | ['CVE-2021-29460'] | Cross-site scripting (XSS) from unsanitized uploaded SVG files in Kirby | ### Impact
An editor with write access to the Kirby Panel can upload an SVG or XML file that contains harmful content like `<script>` tags. The direct link to that file can be sent to other users or visitors of the site. If the victim opens that link in a browser where they are logged in to Kirby, the script will run ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-qgp4-5qx6-548g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29460'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.5.4'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/fil... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:11:58Z', 'nvd_published_at': '2021-04-27T20:15:00Z'} |
1.4.0 | GHSA-82mf-mmh7-hxp5 | 2021-10-08T21:23:58Z | 2021-04-19T14:48:15Z | null | [] | Directory traversal in development mode handler in Vaadin 14 and 15-17 | Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '18.0.... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-82mf-mmh7-hxp5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36321'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qgcg-p3v2-9h4p | 2021-04-27T21:33:12Z | 2021-04-30T17:29:42Z | null | ['CVE-2020-5412'] | Externally Controlled Reference to a Resource in Another Sphere and Confused Deputy in Spring Cloud Netflix | Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to othe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-netflix'}, 'ranges': [{'type': 'ECOSYSTEM', 'even... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5412'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5412'}] | {'cwe_ids': ['CWE-441', 'CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:33:12Z', 'nvd_published_at': '2020-08-07T21:15:00Z'} |
1.4.0 | GHSA-jqj4-r483-4gvr | 2021-10-08T21:23:23Z | 2021-04-19T14:48:51Z | null | [] | Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13 | Missing output sanitization in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL.
- https://vaadin.com/security/cve-2019-2502... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '13.0... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-jqj4-r483-4gvr'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2019-25027'}] | {'cwe_ids': ['CWE-81'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2548-q746-x5x6 | 2021-03-22T20:46:47Z | 2021-04-13T15:20:49Z | null | ['CVE-2021-23359'] | Code injection in port-killer | This affects all versions of package port-killer. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'port-killer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23359'}, {'type': 'WEB', 'url': 'https://github.com/tylerjpeterson/port-killer/blob/1ca3a99ad80cc9ed5498d12b185189c10329025b/index.js%23L19'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078533'}] | {'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:46:47Z', 'nvd_published_at': '2021-03-18T13:15:00Z'} |
1.4.0 | GHSA-qwwg-gc55-qqrv | 2021-04-13T15:54:30Z | 2021-04-13T15:54:40Z | null | ['CVE-2020-17131'] | Out-of-bounds Write in Chakra | Chakra Scripting Engine Memory Corruption Vulnerability | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17131'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6531'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/wiki/Roadmap#v11124'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/securit... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:08:14Z', 'nvd_published_at': '2020-12-10T00:15:00Z'} |
1.4.0 | GHSA-3h5r-928v-mxhh | 2021-10-08T21:22:53Z | 2021-04-19T14:49:13Z | null | [] | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2018-25007'}] | {'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h5h8-pc6h-jvvx | 2022-08-11T00:19:18Z | 2021-04-29T21:52:04Z | null | ['CVE-2021-29472'] | Composer's missing argument delimiter can lead to code execution via VCS repository URLs or source download URLs on systems with Mercurial | URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow commands to be executed in the HgDriver if hg/Mercurial is installed on the system.
### Impact
- The impact to Composer users directly is limited as the composer... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'composer/composer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.13'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29472'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/php-supply-chain-attack-on-composer/'}, {'type': 'WEB', 'url': 'https://getcompose... | {'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:33:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'} |
1.4.0 | GHSA-2pwh-52h7-7j84 | 2021-04-13T17:35:23Z | 2021-04-16T19:52:49Z | null | [] | JavaScript execution via malicious molfiles (XSS) | ### Impact
The viewer plugin implementation of `<mol:molecule>` renders molfile data directly inside a `<script>` tag without any escaping. Arbitrary JavaScript code can thus be executed in the client browser via crafted molfiles.
### Patches
Patched in v0.3.0: Molfile data is now rendered as value of a hidden `<input... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'de.ipb-halle:molecularfaces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipb-halle/MolecularFaces/security/advisories/GHSA-2pwh-52h7-7j84'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:35:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gcm9-cc3r-c6vj | 2021-03-29T22:10:04Z | 2021-04-13T15:18:09Z | null | ['CVE-2020-27224'] | Cross-site Scripting (XSS) in Eclipse Theia | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@theia/preview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 1.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27224'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/7954'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7971'}, {'type': 'WEB', 'url': 'https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:10:04Z', 'nvd_published_at': '2021-02-24T17:15:00Z'} |
1.4.0 | GHSA-gwr8-5j83-483c | 2022-04-26T17:59:52Z | 2021-04-20T16:44:22Z | null | ['CVE-2019-14904'] | OS Command Injection and Improper Input Validation in ansible | A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and exe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14904'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/65686'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1776944'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T13:24:57Z', 'nvd_published_at': '2020-08-26T03:15:00Z'} |
1.4.0 | GHSA-rhwf-hqpr-q8g2 | 2021-04-07T19:36:21Z | 2021-04-13T15:24:38Z | null | ['CVE-2020-8129'] | Code Injection in script-manager | An unintended require vulnerability in script-manager npm package version 0.8.6 and earlier may allow attackers to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'script-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8129'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660563'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:36:21Z', 'nvd_published_at': '2020-02-14T22:15:00Z'} |
1.4.0 | GHSA-mh74-4m5g-fcjx | 2022-08-11T13:17:50Z | 2021-04-19T14:54:24Z | null | ['CVE-2021-29432'] | Malicious users could abuse Sydent to control the content of invitation emails | ### Impact
A malicious user could abuse Sydent to send out arbitrary emails from the Sydent email address. This could be used to construct plausible phishing emails, for example.
### Patches
Fixed in 4469d1d, 6b405a8, 65a6e91.
Note that these patches include changes to the *default* email templates. If these templa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-mh74-4m5g-fcjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29432'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/4469d1d42b2b1612b70638224c07e19623039c42'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:47:15Z', 'nvd_published_at': '2021-04-15T21:15:00Z'} |
1.4.0 | GHSA-63rq-p8fp-524q | 2021-04-12T18:44:12Z | 2021-04-13T15:12:06Z | null | [] | Potential API key leak | If a user is actively blackholing the location or weather APIs, or those APIs become otherwise unavailable, it is possible for the API keys to get leaked to the active IRC channel.
This is patched in v1.2.4 | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'sopel-modules.weather'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sopel-irc/sopel-weather/security/advisories/GHSA-63rq-p8fp-524q'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:44:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xrx6-fmxq-rjj2 | 2023-02-13T17:27:22Z | 2021-04-30T17:35:15Z | null | ['CVE-2020-25658'] | Timing attacks in python-rsa | It was found that python-rsa is vulnerable to Bleichenbacher timing attacks. An attacker can use this flaw via the RSA decryption API to decrypt parts of the cipher text encrypted with RSA | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25658'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/issues/165'}, {'type': 'WEB', 'url': 'https://github.com/sybrenstuvel/python-rsa/commit/dae8ce0d85478e16f2368b2341632775313d41ed'}, {'type': 'WEB', 'url': 'https://access.r... | {'cwe_ids': ['CWE-327', 'CWE-385'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:11:41Z', 'nvd_published_at': '2020-11-12T14:15:00Z'} |
1.4.0 | GHSA-53xj-v576-3ch2 | 2022-06-17T20:44:20Z | 2021-04-13T15:22:09Z | null | ['CVE-2019-10802'] | OS Command Injection in giting | giting version prior to 0.0.8 allows execution of arbritary commands. The first argument `repo` of function `pull()` is executed by the package without any validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'giting'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10802'}, {'type': 'PACKAGE', 'url': 'https://github.com/MangoRaft/git'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITING-559008'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208120654/https://github.com/MangoRaft/git/commi... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:50:02Z', 'nvd_published_at': '2020-02-28T21:15:00Z'} |
1.4.0 | GHSA-42j4-733x-5vcf | 2021-04-16T23:15:27Z | 2021-04-19T14:49:32Z | null | ['CVE-2020-36320'] | Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7 | Unsafe validation RegEx in `EmailValidator` class in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.21 (Vaadin 7.0.0 through 7.7.21) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses.
- https://vaadin.com/security/cve-2020-36320 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.22'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-42j4-733x-5vcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36320'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/issues/7757'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/p... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:27Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-ccgm-3xw4-h5p8 | 2021-04-19T21:54:20Z | 2021-04-20T16:30:03Z | null | ['CVE-2021-29421'] | Improper Restriction of XML External Entity Reference in pikepdf | models/metadata.py in the pikepdf package 1.3.0 through 2.9.2 for Python allows XXE when parsing XMP metadata entries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pikepdf'}, 'ecosystem_specific': {'affected_functions': ['pikepdf.models.metadata.XMLParser', 'pikepdf.models.metadata.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29421'}, {'type': 'WEB', 'url': 'https://github.com/pikepdf/pikepdf/commit/3f38f73218e5e782fe411ccbb3b44a793c0b343a'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36P4HTLBJP... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T21:54:20Z', 'nvd_published_at': '2021-04-01T20:15:00Z'} |
1.4.0 | GHSA-j9wr-49vq-rm5g | 2021-10-08T21:24:54Z | 2021-04-19T14:46:49Z | null | [] | Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19 | Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.
- https://vaadin.com/security/cve-2021-31407 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '14.4.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.0... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-j9wr-49vq-rm5g'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31407'}] | {'cwe_ids': ['CWE-402'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-86hp-cj9j-33vv | 2021-08-30T23:28:52Z | 2021-04-07T20:33:26Z | null | ['CVE-2020-1753'] | Insertion of Sensitive Information into Log File, Invocation of Process Using Visible Sensitive Information, and Exposure of Sensitive Information to an Unauthorized Actor in Ansible | A security flaw was found in Ansible Engine, all Ansible 2.7.x versions prior to 2.7.17, all Ansible 2.8.x versions prior to 2.8.11 and all Ansible 2.9.x versions prior to 2.9.7, when managing kubernetes using the k8s module. Sensitive parameters such as passwords and tokens are passed to kubectl from the command line,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1753'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/kubernetes/pull/51'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1753'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible-collections/kub... | {'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T17:15:45Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-2fw4-mgq9-39cx | 2021-04-21T21:15:38Z | 2021-04-22T15:53:45Z | null | ['CVE-2017-18924'] | Code Injection in oauth2-server | "oauth2-server (aka node-oauth2-server) through 3.1.1 implements OAuth 2.0 without PKCE. It does not prevent authorization code injection. This is similar to CVE-2020-7692. NOTE: the vendor states 'As RFC7636 is an extension, I think the claim in the Readme of "RFC 6749 compliant" is valid and not misleading and I also... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'oauth2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18924'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/pull/452'}, {'type': 'WEB', 'url': 'https://codeburst.io/missing-the-point-in-securin... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:15:38Z', 'nvd_published_at': '2020-10-04T05:15:00Z'} |
1.4.0 | GHSA-mr8h-j9cv-4m8h | 2021-04-22T14:30:10Z | 2021-04-22T16:11:17Z | null | ['CVE-2021-31408'] | Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19 | `Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempte... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '19.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-mr8h-j9cv-4m8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31408'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10577'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31408'}... | {'cwe_ids': ['CWE-287', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T14:30:10Z', 'nvd_published_at': '2021-04-23T17:15:00Z'} |
1.4.0 | GHSA-9h6g-6mxg-vvp4 | 2021-10-08T21:24:35Z | 2021-04-19T14:47:18Z | null | [] | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 | Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
- https://vaadi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.0.1'}]}], 'versions': ['19.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform/'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}] | {'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77pw-c3j2-5fc8 | 2023-08-31T15:48:04Z | 2021-04-30T17:34:03Z | null | ['CVE-2020-13952'] | Plaintext password leak in Apache Superset | In the course of work on the open source project it was discovered that authenticated users running queries against Hive and Presto database engines could access information via a number of templated fields including the contents of query description metadata database, the hashed version of the authenticated users’ pas... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.37.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13952'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1faa368f580d2cb691576bee1277855f769667f3114d5df1dacbea6%40%3Cdev.superset.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:18:16Z', 'nvd_published_at': '2020-09-30T21:15:00Z'} |
1.4.0 | GHSA-49r2-73m6-pp8f | 2021-04-23T17:13:44Z | 2021-04-19T14:51:58Z | null | ['CVE-2020-36321'] | Directory traversal in development mode handler in Vaadin 14 and 15-17 | Improper URL validation in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.
- https://vaadin.com/security/cve-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.2'... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-49r2-73m6-pp8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36321'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/9392'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36321'}] | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:16:25Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-fc42-h7q4-qp8h | 2021-03-22T18:24:32Z | 2021-04-13T15:16:20Z | null | ['CVE-2021-23360'] | Command Injection in killport | This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'killport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360'}, {'type': 'WEB', 'url': 'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638'}, {'type': 'WEB', 'url': 'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9'}, {'type': ... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T18:24:32Z', 'nvd_published_at': '2021-03-21T16:15:00Z'} |
1.4.0 | GHSA-vgv5-cxvh-vfxh | 2022-11-08T18:16:44Z | 2021-04-07T20:50:57Z | null | ['CVE-2020-26759'] | Arbitrary code execution in clickhouse-driver | clickhouse-driver before 0.1.5 allows a malicious clickhouse server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, due to a buffer overflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'clickhouse-driver'}, 'ecosystem_specific': {'affected_functions': ['clickhouse_driver.bufferedreader.BufferedReader', 'clickhouse_driver.bufferedreader.BufferedReader.read', 'clickhouse_driver.bufferedreader.BufferedReader.read_strings', 'clickhouse_driver.bufferedwriter.Buff... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26759'}, {'type': 'WEB', 'url': 'https://github.com/mymarilyn/clickhouse-driver/commit/3e990547e064b8fca916b23a0f7d6fe8c63c7f6b'}, {'type': 'WEB', 'url': 'https://github.com/mymarilyn/clickhouse-driver/commit/d708ed548e1d6f254ba81a21de8ba543a53b559... | {'cwe_ids': ['CWE-120'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:25:07Z', 'nvd_published_at': '2021-01-06T13:15:00Z'} |
1.4.0 | GHSA-2f6g-w5gj-c93h | 2021-03-22T23:02:01Z | 2021-04-13T15:20:09Z | null | ['CVE-2021-23328'] | Prototype Pollution in iniparserjs | This affects all versions of package iniparserjs. This vulnerability relates when ini_parser.js is concentrating arrays. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'iniparserjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23328'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-INIPARSERJS-1065989'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/iniparserjs'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:02:01Z', 'nvd_published_at': '2021-01-29T17:15:00Z'} |
1.4.0 | GHSA-hhx9-p69v-cx2j | 2023-09-20T18:19:48Z | 2021-04-30T17:34:13Z | null | ['CVE-2020-13927'] | Authentication bypass in Apache Airflow | "The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/sec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13927'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/9611/commits/c8053e166d45ad519c0a1cd4480e025a759c176e'}, {'type': 'WEB', 'url': 'https://airflow.apache.org/docs/apache-airflow/1.10.11/security.html#api-authentication'}, {'ty... | {'cwe_ids': ['CWE-1188', 'CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T19:30:46Z', 'nvd_published_at': '2020-11-10T16:15:00Z'} |
1.4.0 | GHSA-hmv2-79q8-fv6g | 2021-04-22T22:04:31Z | 2021-04-30T17:31:43Z | null | ['CVE-2020-7212'] | Uncontrolled Resource Consumption in urllib3 | The _encode_invalid_chars function in util/url.py in the urllib3 library 1.25.2 through 1.25.7 for Python allows a denial of service (CPU consumption) because of an inefficient algorithm. The percent_encodings array contains all matches of percent encodings. It is not deduplicated. For a URL of length N, the size of pe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.2'}, {'fixed': '1.25.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.25.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7212'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/a74c9cfbaed9f811e7563cfc3dce894928e0221a'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://pypi.org/pro... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:04:31Z', 'nvd_published_at': '2020-03-06T20:15:00Z'} |
1.4.0 | GHSA-86vp-x3pr-79rx | 2022-08-11T16:58:14Z | 2021-04-20T16:40:14Z | null | ['CVE-2020-17515'] | Apache Airflow Cross-site scripting due to incomplete fix for CVE-2020-13944 | The `origin` parameter passed to some of the endpoints like `/trigger` was vulnerable to XSS exploit. This issue affects Apache Airflow versions prior to 1.10.14. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue completely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17515'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/14738'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/409c249121bd9c8902fc2ba551b21873ab41f953'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airf... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T23:23:06Z', 'nvd_published_at': '2020-12-11T14:15:00Z'} |
1.4.0 | GHSA-3p3h-qghp-hvh2 | 2023-08-31T16:36:07Z | 2021-04-20T16:30:26Z | null | ['CVE-2020-28724'] | Open Redirect in werkzeug | Open redirect vulnerability in werkzeug before 0.11.6 via a double slash in the URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28724'}, {'type': 'WEB', 'url': 'https://github.com/pallets/flask/issues/1639'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/issues/822'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/pull/890/files'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T20:51:30Z', 'nvd_published_at': '2020-11-18T15:15:00Z'} |
1.4.0 | GHSA-jmx8-355m-8vwh | 2021-04-16T23:18:28Z | 2021-04-19T14:53:09Z | null | ['CVE-2018-25007'] | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/4774'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2018-25007'}] | {'cwe_ids': ['CWE-754'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:18:28Z', 'nvd_published_at': '2021-04-23T16:15:00Z'} |
1.4.0 | GHSA-w8h4-vw8f-rvvj | 2023-09-12T19:22:22Z | 2021-04-13T15:30:09Z | null | ['CVE-2021-26276'] | Improper Control of Dynamically-Managed Code Resources in config-shield | scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. **NOTE:** the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'config-shield'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'}, {'type': 'WEB', 'url': 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4773'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:44:52Z', 'nvd_published_at': '2021-01-27T20:15:00Z'} |
1.4.0 | GHSA-79qm-h35f-hr77 | 2022-01-04T19:48:58Z | 2021-04-13T15:23:13Z | null | ['CVE-2019-10799'] | OS Command Injection in compile-sass | compile-sass prior to 1.0.5 allows execution of arbritary commands. The function "setupCleanupOnExit(cssPath)" within "dist/index.js" is executed as part of the "rm" command without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'compile-sass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10799'}, {'type': 'WEB', 'url': 'https://github.com/eiskalteschatten/compile-sass/commit/d9ada7797ff93875b6466dea7a78768e90a0f8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/eiskalteschatten/compile-sass'}, {'type': 'WEB', 'url': 'https://sny... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:21:56Z', 'nvd_published_at': '2020-02-24T18:15:00Z'} |
1.4.0 | GHSA-vh8f-xw5v-8993 | 2021-04-12T19:01:01Z | 2021-04-12T19:01:20Z | null | ['CVE-2020-7786'] | Command Injection in macfromip | All versions of npm package macfromip are affected by a command injection vulnerability. The injection point is located in line 66 in macfromip.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'macfromip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MACFROMIP-1048336'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/macfromip'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:59:04Z', 'nvd_published_at': '2021-02-08T19:15:00Z'} |
1.4.0 | GHSA-c43q-5hpj-4crv | 2021-04-22T19:22:31Z | 2021-04-23T16:55:01Z | null | ['CVE-2021-28168'] | Local information disclosure via system temporary directory | ## Impact
Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.jersey.core:jersey-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.28'}, {'fixed': '2.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.glassfish.jersey.core:... | [{'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-ee4j/jersey/pull/4712'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.h... | {'cwe_ids': ['CWE-378', 'CWE-379', 'CWE-668', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T19:22:31Z', 'nvd_published_at': '2021-04-22T18:15:00Z'} |
1.4.0 | GHSA-8h84-8j4f-p97q | 2021-04-07T20:24:23Z | 2021-04-13T15:24:21Z | null | ['CVE-2019-10792'] | Injection in bodymen | bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}, {'type': 'WEB', 'url': 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T20:24:23Z', 'nvd_published_at': '2020-02-18T16:15:00Z'} |
1.4.0 | GHSA-r9vm-rhmf-7hxx | 2021-03-29T23:01:10Z | 2021-04-13T15:17:06Z | null | ['CVE-2019-10787'] | OS Command Injection in im-resize | im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'im-resize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10787'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T23:01:10Z', 'nvd_published_at': '2020-02-04T21:15:00Z'} |
1.4.0 | GHSA-rpw6-9xfx-jvcx | 2023-07-05T23:20:00Z | 2021-04-22T16:20:36Z | null | ['CVE-2020-36193'] | Directory Traversal in Archive_Tar | Tar.php in Archive_Tar through 1.4.11 allows write operations with Directory Traversal due to inadequate checking of symbolic links, a related issue to CVE-2020-28948.
### :exclamation: Note:
There was an [initial fix](https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916) for this vulne... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36193'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/cde460582ff389404b5b3ccb59374e9b389de916'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:56:54Z', 'nvd_published_at': '2021-01-18T20:15:00Z'} |
1.4.0 | GHSA-9w8r-397f-prfh | 2023-08-07T11:25:58Z | 2021-04-20T16:35:47Z | null | ['CVE-2021-20270'] | Infinite Loop in Pygments | An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pygments'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '2.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20270'}, {'type': 'WEB', 'url': 'https://github.com/pygments/pygments/commit/f91804ff4772e3ab41f46e28d370f57898700333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1922136'}, {'type': 'PACKAGE', 'url': 'https://github.com/p... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:58:03Z', 'nvd_published_at': '2021-03-23T17:15:00Z'} |
1.4.0 | GHSA-75c5-f4gw-38r9 | 2023-07-05T23:21:01Z | 2021-04-22T16:20:59Z | null | ['CVE-2020-28949'] | Multiple vulnerabilities through filename manipulation in Archive_Tar | Archive_Tar through 1.4.10 has `://` filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as `file://` to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:20:31Z', 'nvd_published_at': '2020-11-19T19:15:00Z'} |
1.4.0 | GHSA-pghf-347x-c2gj | 2021-04-14T22:22:37Z | 2021-04-16T19:53:28Z | null | ['CVE-2021-30459'] | SQL Injection via in django-debug-toolbar | ### Impact
With Django Debug Toolbar attackers are able to execute SQL by changing the `raw_sql` input of the SQL explain, analyze or select forms and submitting the form.
**NOTE:** This is a high severity issue for anyone using the toolbar in a **production environment**.
Generally the Django Debug Toolbar team only... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-debug-toolbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30459'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30459'}, {'type': 'WEB', 'url': 'https://gi... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T22:22:37Z', 'nvd_published_at': '2021-04-14T18:15:00Z'} |
1.4.0 | GHSA-22wc-c9wj-6q2v | 2021-04-16T23:11:53Z | 2021-04-19T15:12:05Z | null | [] | VVE-2021-0001: Memory corruption using function calls within arrays | ### Impact
When performing a function call inside an array, there is a memory corruption issue that occurs because of an incorrect pointer to the the tip of the stack.
### Patches
This issue was partially fixed in [VVE-2020-0004](https://github.com/vyperlang/vyper/security/advisories/GHSA-2r3x-4mrv-mcxf), however the ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-22wc-c9wj-6q2v'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2345'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/11b7b5b7e59bc9dc859d51cd41a924b59fe47c9e'}, {'type': 'WEB', 'url': 'https://pyp... | {'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:11:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pw4v-gr34-2553 | 2022-07-22T16:32:37Z | 2021-04-16T19:53:37Z | null | ['CVE-2021-29433'] | Sydent DoS (via resource exhaustion) due to improper input validation | ### Impact
Missing input validation of some parameters on the endpoints used to confirm third-party identifiers could cause excessive use of disk space and memory leading to resource exhaustion.
### Patches
Fixed by 3175fd3.
### For more information
If you have any questions or comments about this advisory, email ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-pw4v-gr34-2553'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29433'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/3175fd358ebc2c310eab7a3dbf296ce2bd54c1da'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T18:45:07Z', 'nvd_published_at': '2021-04-15T18:15:00Z'} |
1.4.0 | GHSA-xw22-wv29-3299 | 2021-04-02T17:05:21Z | 2021-04-06T17:29:52Z | null | ['CVE-2021-21421'] | ApiKey secret could be revelated on network issue | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Applications that are using node-etsy-client and reporting client error to the end user will offer api key value too
### Patches
_Has the problem been patched? What versions should users upgrade to?_
creharmony/node-etsy-client#18 fixes this issue. This ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-etsy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/creharmony/node-etsy-client/security/advisories/GHSA-xw22-wv29-3299'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21421'}, {'type': 'WEB', 'url': 'https://github.com/creharmony/node-etsy-client/commit/b4beb8ef080366c1a87dbf9e163051a446acaa7d'}] | {'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T17:05:21Z', 'nvd_published_at': '2021-04-01T22:15:00Z'} |
1.4.0 | GHSA-4hjq-422q-4vpx | 2022-08-10T23:35:31Z | 2021-04-06T17:20:58Z | null | ['CVE-2021-27908'] | Mautic vulnerable to secret data exfiltration via symfony parameters | ### Impact
Symfony parameters (which is what Mautic transforms configuration parameters into) can be used within other Symfony parameters by design. However, this also means that an admin who is normally not privy to certain parameters, such as database credentials, could expose them by leveraging any of the free text ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-4hjq-422q-4vpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27908'}, {'type': 'PACKAGE', 'url': 'https://github.com/mautic/mautic'}] | {'cwe_ids': ['CWE-732', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T16:38:12Z', 'nvd_published_at': '2021-03-23T20:15:00Z'} |
1.4.0 | GHSA-23c7-6444-399m | 2022-10-25T20:51:03Z | 2021-04-09T15:42:40Z | null | ['CVE-2021-21431'] | Improper Input Validation in sopel-plugins.channelmgnt | ### Impact
On some IRC servers, restrictions around the removal of the bot using the kick/kickban command could be bypassed when kicking multiple users at once.
We also believe it may have been possible to remove users from other channels but due to the wonder that is IRC and following RfCs, We have no POC for that.
F... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sopel-plugins.channelmgnt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/security/advisories/GHSA-23c7-6444-399m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21431'}, {'type': 'WEB', 'url': 'https://github.com/MirahezeBots/sopel-channelmgnt/commit/643388365f28c5cc682254ab913c401f0e53260a'... | {'cwe_ids': ['CWE-20', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T15:42:18Z', 'nvd_published_at': '2021-04-09T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.