ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
GHSA
GHSA-7wv8-g97r-432h
Exposure of Sensitive Information to an Unauthorized Actor in microweber
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0281'}
2022-01-27T18:32:04Z
2022-01-21T18:06:47Z
HIGH
7.5
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0281', 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://huntr.dev/bounties/315f5ac6-1b5e-4444-ad8f-802371da3505', 'https://github.com/advisories/GHSA-7wv8-g97r-432h'}
null
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
{'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}
GHSA
GHSA-wrxc-mr2w-cjpv
Open Redirect in Grav
Common/Grav.php in Grav before 1.6.23 has an Open Redirect.
{'CVE-2020-11529'}
2022-01-07T00:20:50Z
2022-01-07T00:20:50Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7', 'https://github.com/getgrav/grav/issues/3134', 'https://getgrav.org/#changelog', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11529', 'https://github.com/advisories/GHSA-wrxc-mr2w-cjpv'}
null
{'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7'}
{'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7'}
GHSA
GHSA-3pqg-4rqg-pg9g
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
{'CVE-2022-28367'}
2022-05-04T04:00:41Z
2022-04-23T00:03:04Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/nahsra/antisamy/releases/tag/v1.6.6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367', 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae', 'https://github.com/advisories/GHSA-3pqg-4rqg-pg9g'}
null
{'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}
{'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}
GHSA
GHSA-8gvg-8vhf-h26g
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0917, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933.
{'CVE-2019-0937'}
2021-03-29T20:59:03Z
2021-03-29T20:59:03Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0937', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/advisories/GHSA-8gvg-8vhf-h26g', 'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0937'}
null
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
{'https://github.com/chakra-core/ChakraCore/commit/7827e117753052d479fabe19a25cfece88059bca', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7'}
GHSA
GHSA-8rh6-h94m-vj54
Incorrect Comparison in cvxopt
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
{'CVE-2021-41500'}
2022-01-18T22:48:48Z
2022-01-07T00:01:11Z
HIGH
7.5
{'CWE-697'}
{'https://github.com/advisories/GHSA-8rh6-h94m-vj54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41500', 'https://github.com/cvxopt/cvxopt/issues/193', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/CXTPM3DGVYTYQ54OFCMXZVWVOMR7JM2D/', 'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
null
{'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
{'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}
GHSA
GHSA-x823-j7c4-vpc5
Cross-site scripting in sickrage
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
{'CVE-2021-25926'}
2021-04-23T18:45:59Z
2021-04-20T16:31:43Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25926,', 'https://github.com/advisories/GHSA-x823-j7c4-vpc5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}
null
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}
{'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}
GHSA
GHSA-m8p2-495h-ccmh
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
{'CVE-2019-10219'}
2022-02-11T21:13:08Z
2020-01-08T17:01:52Z
MODERATE
6.5
{'CWE-79'}
{'https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219', 'https://lists.apache.org/thread.html/r87b7e2d22982b4ca9f88f5f4f22a19b394d2662415b233582ed22ebf@%3Cnotifications.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://github.com/advisories/GHSA-m8p2-495h-ccmh', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10219', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://lists.apache.org/thread.html/rb8dca19a4e52b60dab0ab21e2ff9968d78f4b84e4033824db1dd24b4@%3Cpluto-scm.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rf9c17c3efc4a376a96e9e2777eee6acf0bec28e2200e4b35da62de4a@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/rd418deda6f0ebe658c2015f43a14d03acb8b8c2c093c5bf6b880cd7c@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r4f8b4e2541be4234946e40d55859273a7eec0f4901e8080ce2406fe6@%3Cnotifications.accumulo.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://security.netapp.com/advisory/ntap-20220210-0024/', 'https://access.redhat.com/errata/RHSA-2020:0161'}
null
{'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'}
{'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'}
GHSA
GHSA-8vj2-vxx3-667w
Arbitrary expression injection in Pillow
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method `ImageMath.eval("exec(exit())")`. While Pillow 9.0.0 restricted top-level builtins available to PIL.ImageMath.eval(), it did not prevent builtins available to lambda expressions. These are now also restricted in 9.0.1.
{'CVE-2022-22817'}
2022-04-19T19:03:27Z
2022-01-12T20:07:33Z
CRITICAL
9.8
{'CWE-74'}
{'https://github.com/advisories/GHSA-8vj2-vxx3-667w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22817', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security', 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00018.html', 'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11', 'https://www.debian.org/security/2022/dsa-5053'}
null
{'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11'}
{'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11'}
GHSA
GHSA-c53x-wwx2-pg96
Cross-Site Scripting in @berslucas/liljs
Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. ## Recommendation Upgrade to version 1.0.2 or later.
null
2021-09-28T17:27:44Z
2020-09-03T17:03:58Z
MODERATE
6.5
{'CWE-79'}
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c', 'https://github.com/advisories/GHSA-c53x-wwx2-pg96', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2'}
null
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
{'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'}
GHSA
GHSA-6f89-8j54-29xf
Heap buffer overflow in `FractionalAvgPoolGrad`
### Impact The implementation of `tf.raw_ops.FractionalAvgPoolGrad` is vulnerable to a heap buffer overflow: ```python import tensorflow as tf orig_input_tensor_shape = tf.constant([1, 3, 2, 3], shape=[4], dtype=tf.int64) out_backprop = tf.constant([2], shape=[1, 1, 1, 1], dtype=tf.int64) row_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) col_pooling_sequence = tf.constant([1], shape=[1], dtype=tf.int64) tf.raw_ops.FractionalAvgPoolGrad( orig_input_tensor_shape=orig_input_tensor_shape, out_backprop=out_backprop, row_pooling_sequence=row_pooling_sequence, col_pooling_sequence=col_pooling_sequence, overlapping=False) ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/dcba796a28364d6d7f003f6fe733d82726dda713/tensorflow/core/kernels/fractional_avg_pool_op.cc#L216) fails to validate that the pooling sequence arguments have enough elements as required by the `out_backprop` tensor shape. ### Patches We have patched the issue in GitHub commit [12c727cee857fa19be717f336943d95fca4ffe4f](https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29578'}
2021-05-21T17:08:41Z
2021-05-21T14:26:21Z
LOW
2.5
{'CWE-119', 'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f', 'https://github.com/advisories/GHSA-6f89-8j54-29xf', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6f89-8j54-29xf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29578'}
null
{'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'}
{'https://github.com/tensorflow/tensorflow/commit/12c727cee857fa19be717f336943d95fca4ffe4f'}
GHSA
GHSA-pm52-wwrw-c282
Command Injection in wiki-plugin-datalog
Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system. ## Recommendation Upgrade to version 0.1.6 or later.
null
2021-08-16T15:29:05Z
2019-06-13T18:59:06Z
HIGH
6.5
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926', 'https://github.com/advisories/GHSA-pm52-wwrw-c282'}
null
{'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}
{'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}
GHSA
GHSA-p885-prv3-m4xv
Cross-site Scripting in snipe-it
Stored Cross Site Scripting vulnerability in Item name parameter in GitHub repository snipe/snipe-it prior to v5.4.3. The vulnerability is capable of stolen the user Cookie.
{'CVE-2022-1380'}
2022-04-27T20:26:42Z
2022-04-17T00:00:32Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1380', 'https://github.com/advisories/GHSA-p885-prv3-m4xv', 'https://huntr.dev/bounties/3d45cfca-3a72-4578-b735-98837b998a12'}
null
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9'}
{'https://github.com/snipe/snipe-it/commit/f211c11034baf4281aa62e7b5e0347248d995ee9'}
GHSA
GHSA-cfjv-5498-mph5
XSS in Action View
There is a potential Cross-Site Scripting (XSS) vulnerability in Action View's translation helpers. Views that allow the user to control the default (not found) value of the `t` and `translate` helpers could be susceptible to XSS attacks. ### Impact When an HTML-unsafe string is passed as the default for a missing translation key [named `html` or ending in `_html`](https://guides.rubyonrails.org/i18n.html#using-safe-html-translations), the default string is incorrectly marked as HTML-safe and not escaped. Vulnerable code may look like the following examples: ```erb <%# The welcome_html translation is not defined for the current locale: %> <%= t("welcome_html", default: untrusted_user_controlled_string) %> <%# Neither the title.html translation nor the missing.html translation is defined for the current locale: %> <%= t("title.html", default: [:"missing.html", untrusted_user_controlled_string]) %> ``` ### Patches Patched Rails versions, 6.0.3.3 and 5.2.4.4, are available from the normal locations. The patches have also been applied to the `master`, `6-0-stable`, and `5-2-stable` branches on GitHub. If you track any of these branches, you should update to the latest. To aid users who aren’t able to upgrade immediately, we’ve provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * [5-2-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-5-2-translate-helper-xss-patch) — patch for the 5.2 release series * [6-0-translate-helper-xss.patch](https://gist.github.com/georgeclaghorn/a466e103922ee81f24c32c9034089442#file-6-0-translate-helper-xss-patch) — patch for the 6.0 release series Please note that only the 5.2 and 6.0 release series are currently supported. Users of earlier, unsupported releases are advised to update as soon as possible, as we cannot provide security fixes for unsupported releases. ### Workarounds Impacted users who can’t upgrade to a patched Rails version can avoid this issue by manually escaping default translations with the `html_escape` helper (aliased as `h`): ```erb <%= t("welcome_html", default: h(untrusted_user_controlled_string)) %> ```
{'CVE-2020-15169'}
2022-04-19T19:02:34Z
2020-09-11T15:19:57Z
MODERATE
5.4
{'CWE-79'}
{'https://www.debian.org/security/2020/dsa-4766', 'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15169', 'https://github.com/rails/rails/security/advisories/GHSA-cfjv-5498-mph5', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XJ7NUWXAEVRQCROIIBV4C6WXO6IR3KSB/', 'https://github.com/advisories/GHSA-cfjv-5498-mph5'}
null
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}
{'https://github.com/rails/rails/commit/e663f084460ea56c55c3dc76f78c7caeddeeb02e'}
GHSA
GHSA-w42g-7vfc-xf37
Introspection in schema validation in Apollo Server
We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions. ### Impact If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting validation rules to be enforced on the WebSocket subscriptions transport **and** are unconcerned about introspection being enabled on the WebSocket subscriptions transport (or were not expecting that), then this advisory is not applicable. If `introspection: true` is passed to the `ApolloServer` constructor options, the impact is limited to user-provided validation rules (i.e., using `validationRules`) since there would be no expectation that introspection was disabled. The enforcement of user-provided validation rules on the HTTP transport is working as intended and is unaffected by this advisory. Similarly, disabling introspection on the HTTP transport is working as intended and is unaffected by this advisory. > **Note:** Unless `subscriptions: false` is explicitly passed to the constructor parameters of `new ApolloServer({ ... })`, **subscriptions are enabled by default, whether or not there is a `Subscription` type present in the schema.** As an alternative to upgrading to a patched version, see the _Workarounds_ section below to disable subscriptions if it is not necessary. In cases where `subscriptions: false` is **not** explicitly set, the subscription server **is impacted** since validation rules which are enforced on the main request pipeline within Apollo Server were not being passed to the `SubscriptionServer.create` invocation ([seen here, prior to the patch](https://github.com/apollographql/apollo-server/blob/7d6f23443e52a90deb74f152f34bb76eea78ee19/packages/apollo-server-core/src/ApolloServer.ts#L677-L726)). The omitted validation rules for the subscription server include any `validationRules` passed by implementors to the `ApolloServer` constructor which were expected to be enforced on the subscriptions WebSocket endpoint. **Additionally**, because an internal [`NoIntrospection`](https://github.com/apollographql/apollo-server/blob/7d6f23443/packages/apollo-server-core/src/ApolloServer.ts#L77-L88) validation rule is used to disable introspection, it would have been possible to introspect a server on the WebSocket endpoint that the `SubscriptionServer` creates even though it was not possible on other transports (e.g. HTTP). **The severity of risk depends on whether sensitive information is being stored in the schema itself.** The contents of schema descriptions, or secrets which might be revealed by the names of types or field names within those types, will determine the risk to individual implementors. ### Affected packages The bug existed in `apollo-server-core` versions prior to version 2.14.2, however, this means all integration packages (e.g., `apollo-server-express`, etc.) prior to version 2.14.2 which depend on `apollo-server-core` for their subscriptions support are affected. This includes the `apollo-server` package that automatically provides an Express server. Therefore, for officially published Apollo Server packages, the full list of affected packages includes: `apollo-server`, `apollo-server-azure-functions`, `apollo-server-cache-memcached`, `apollo-server-core`, `apollo-server-cloud-functions`, `apollo-server-cloudflare`, `apollo-server-express`, `apollo-server-fastify`, `apollo-server-hapi`, `apollo-server-koa`, `apollo-server-lambda`, and `apollo-server-micro`. > Note: The full list included here doesn't fit into the box provided by the GitHub Security Advisories form. ### Resolution The problem is resolved in Apollo Server versions 2.14.2 or higher. If upgrading is not an option, see _Workarounds_ below. When upgrading, ensure that the affected integration package (e.g., `apollo-server-express`) **and** the `apollo-server-core` package are both updated to the patched versions. (The version numbers should both be 2.14.2.) ### Workarounds Upgrading to a patched version is the recommended solution. If upgrading is not an option, subscriptions can be disabled with `subscriptions: false` to resolve the impact. **Disabling subscriptions in this way will disable _all_ subscriptions support and the WebSocket transport**: ```js const server = new ApolloServer({ subscriptions: false, /* Other options, such as typeDefs, resolvers, schema, etc. */ }); ``` ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/apollographql/apollo-server/issues/new) and the maintainers will try to assist. ### Credit and appreciation Apollo fully believes in ethical disclosure of vulnerabilities by security researchers who notify us with details and provide us time to address and fix the issues before publicly disclosing. Credit for this discovery goes to the team at [Bitwala](https://www.bitwala.com/), who reported the concern to us responsibly after discovering it during their own auditing.
null
2020-08-31T19:02:47Z
2020-06-05T19:38:14Z
MODERATE
0
null
{'https://www.npmjs.com/advisories/1526', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1530', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1528', 'https://www.npmjs.com/advisories/1527', 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1532', 'https://www.npmjs.com/advisories/1536', 'https://www.npmjs.com/advisories/1531', 'https://www.npmjs.com/advisories/1533', 'https://github.com/advisories/GHSA-w42g-7vfc-xf37', 'https://www.npmjs.com/advisories/1529', 'https://www.npmjs.com/advisories/1534'}
null
{'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}
{'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'}
GHSA
GHSA-p77h-hv6g-fmfp
Sensitive Data Exposure in ibm_db
Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode. ## Recommendation Upgrade to version 2.6.0 or later and ensure sensitive information was not logged.
null
2021-09-29T18:49:03Z
2020-09-03T20:43:16Z
MODERATE
5
null
{'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762', 'https://github.com/advisories/GHSA-p77h-hv6g-fmfp'}
null
{'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
{'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'}
GHSA
GHSA-36p3-wjmg-h94x
Remote Code Execution in Spring Framework
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. These are the prerequisites for the exploit: - JDK 9 or higher - Apache Tomcat as the Servlet container - Packaged as WAR - `spring-webmvc` or `spring-webflux` dependency ## Patches - Spring Framework [5.3.18](https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18) and [5.2.20](https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE) - Spring Boot [2.6.6](https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6) and [2.5.12](https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12) ## Workarounds For those who are unable to upgrade, leaked reports recommend setting `disallowedFields` on `WebDataBinder` through an `@ControllerAdvice`. This works generally, but as a centrally applied workaround fix, may leave some loopholes, in particular if a controller sets `disallowedFields` locally through its own `@InitBinder` method, which overrides the global setting. To apply the workaround in a more fail-safe way, applications could extend `RequestMappingHandlerAdapter` to update the `WebDataBinder` at the end after all other initialization. In order to do that, a Spring Boot application can declare a `WebMvcRegistrations` bean (Spring MVC) or a `WebFluxRegistrations` bean (Spring WebFlux).
{'CVE-2022-22965'}
2022-04-01T16:26:09Z
2022-03-31T18:30:50Z
CRITICAL
0
{'CWE-74'}
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15', 'https://tanzu.vmware.com/security/cve-2022-22965', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6', 'https://github.com/advisories/GHSA-36p3-wjmg-h94x', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18', 'https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22965'}
null
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
GHSA
GHSA-4hvf-hxvg-f67v
Read and Write outside of bounds in TensorFlow
### Impact An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in [the conversion from sparse tensors to dense tensors](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293). ### Patches We have patched the issue in GitHub commit [6364463d6f5b6254cac3d6aedf999b6a96225038](https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23560'}
2022-02-11T15:08:01Z
2022-02-09T23:53:30Z
HIGH
8.8
{'CWE-787', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23560', 'https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/internal/utils/sparsity_format_converter.cc#L252-L293', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v', 'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038', 'https://github.com/advisories/GHSA-4hvf-hxvg-f67v'}
null
{'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'}
{'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'}
GHSA
GHSA-hw3m-8h25-8frw
Command Injection in Apache Kylin
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform the following steps, resulting in a command injection vulnerability. This issue affects Apache Kylin 4.0.0.
{'CVE-2021-45456'}
2022-01-08T00:42:59Z
2022-01-08T00:42:59Z
MODERATE
0
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45456', 'https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf', 'http://www.openwall.com/lists/oss-security/2022/01/06/1', 'https://github.com/apache/kylin/pull/1781', 'https://github.com/advisories/GHSA-hw3m-8h25-8frw', 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
null
{'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
{'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
GHSA
GHSA-8qv8-fq5w-p966
phpservermon is vulnerable to CRLF Injection
phpservermon is vulnerable to Improper Neutralization of CRLF Sequences.
{'CVE-2021-4097'}
2021-12-16T14:26:00Z
2021-12-16T14:26:00Z
MODERATE
6.3
{'CWE-93'}
{'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4097', 'https://huntr.dev/bounties/d617ced7-be06-4e34-9db0-63d45c003a43', 'https://github.com/advisories/GHSA-8qv8-fq5w-p966'}
null
{'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}
{'https://github.com/phpservermon/phpservermon/commit/162bba0046fcda1580f4fbc7b9ababe3c7c13ce4'}
GHSA
GHSA-hv96-xxx2-5v7w
Downloads Resources over HTTP in nw
Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`. ## Recommendation Update to version 0.23.6-1 or later.
{'CVE-2016-10588'}
2021-06-10T23:26:25Z
2019-02-18T23:51:04Z
HIGH
8.1
{'CWE-311'}
{'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://nodesecurity.io/advisories/166'}
null
{'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}
{'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}
GHSA
GHSA-82rf-q3pr-4f6p
Sensitive data exposure in NATS
Preview versions of two NPM packages and one Deno package from the NATS project contain an information disclosure flaw, leaking options to the NATS server; for one package, this includes TLS private credentials. The _connection_ configuration options in these JavaScript-based implementations were fully serialized and sent to the server in the client's CONNECT message, immediately after TLS establishment. The nats.js client supports Mutual TLS and the credentials for the TLS client key are included in the connection configuration options; disclosure of the client's TLS private key to the server has been observed. Most authentication mechanisms are handled after connection, instead of as part of connection, so other authentication mechanisms are unaffected. For clarity: NATS account NKey authentication is NOT affected. Neither the nats.ws nor the nats.deno clients support Mutual TLS: the affected versions listed below are those where the logic flaw is present. We are including the nats.ws and nats.deno versions out of an abundance of caution, as library maintainers, but rate as minimal the likelihood of applications leaking sensitive data. Affected versions: Security impact: * NPM package nats.js: + mainline is unaffected + beta branch is vulnerable from 2.0.0-201, fixed in 2.0.0-209 Logic flaw: * NPM package nats.ws: + status: preview + flawed from 1.0.0-85, fixed in 1.0.0-111 * Deno repository https://github.com/nats-io/nats.deno + status: preview + flawed in all git tags prior to fix + fixed with git tag v1.0.0-9 Impact: For deployments using TLS client certificates (for mutual TLS), private key material for TLS is leaked from the client application to the server. If the server is untrusted (run by a third party), or if the client application also disables TLS verification (and so the true identity of the server is unverifiable) then authentication credentials are leaked.
{'CVE-2020-26149'}
2021-10-04T21:25:48Z
2020-10-08T22:11:32Z
HIGH
7.5
{'CWE-522'}
{'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9', 'https://github.com/advisories/GHSA-82rf-q3pr-4f6p', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
null
{'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
{'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'}
GHSA
GHSA-52rg-hpwq-qp56
Allocation of Resources Without Limits or Throttling in Keycloak
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
{'CVE-2020-10758'}
2022-02-09T00:56:51Z
2022-02-09T00:56:51Z
HIGH
7.5
{'CWE-770'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1843849', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758', 'https://github.com/advisories/GHSA-52rg-hpwq-qp56', 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
null
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
GHSA
GHSA-7q44-r25x-wm4q
Remote Code Execution vulnerability in PHPMailer 6.4.1 running on Windows
PHPMailer 6.4.1 contains a possible remote code execution vulnerability through the `$lang_path` parameter of the `setLanguage()` method. If the `$lang_path` parameter is passed unfiltered from user input, it can be set to [a UNC path](https://docs.microsoft.com/en-us/dotnet/standard/io/file-path-formats#unc-paths), and if an attacker is also able to create a remote mount on the server that the UNC path points to, a script file under their control may be executed. ### Impact Arbitrary code may be run by a remote attacker under the web server or PHP process running on Window hosts. ### Patches Mitigated in PHPMailer 6.5.0 by no longer treating translation files as PHP code, but by parsing their text content directly. This approach avoids the possibility of executing unknown code while retaining backward compatibility. This isn't ideal, so the current translation format is deprecated and will be replaced in the next major release. ### Workarounds Any of: * Ensure that calling code does not pass unfiltered user-supplied data to the `$lang_path` parameter of the `setLanguage()` method. * Block or filter the use of unknown UNC paths in this parameter (or altogether). * Ensure that unauthorised users do not have the ability to read from unknown remote servers via UNC paths. * Run on an OS that does not support UNC paths ### References [CVE-2021-34551](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-34551). Reported by [listensec.com](https://listensec.com) via Tidelift. ### For more information If you have any questions or comments about this advisory: * Open an issue in [PHPMailer](https://github.com/PHPMailer/PHPMailer) * [Email the maintainers](mailto:[email protected])
{'CVE-2021-34551'}
2022-04-19T19:03:00Z
2021-06-22T15:17:51Z
HIGH
8.1
{'CWE-94', 'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34551', 'https://github.com/PHPMailer/PHPMailer/blob/master/SECURITY.md', 'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-7q44-r25x-wm4q', 'https://github.com/advisories/GHSA-7q44-r25x-wm4q', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3YRMWGA4VTMXFB22KICMB7YMFZNFV3EJ/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/FJYSOFCUBS67J3TKR74SD3C454N7VTYM/'}
null
{'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}
{'https://github.com/PHPMailer/PHPMailer/commit/acd264bf17ff4ac5c915f0d4226dce8a9ea70bc3'}
GHSA
GHSA-3hxh-8cp2-g4hg
Use after free and segfault in shape inference functions
### Impact When running shape functions, some functions (such as `MutableHashTableShape`) produce extra output information in the form of a `ShapeAndType` struct. The shapes embedded in this struct are owned by an inference context that is cleaned up almost immediately; if the upstream code attempts to access this shape information, it can trigger a segfault. `ShapeRefiner` is mitigating this for normal output shapes by cloning them (and thus putting the newly created shape under ownership of an inference context that will not die), but we were not doing the same for shapes and types. This commit fixes that by doing similar logic on output shapes and types. ### Patches We have patched the issue in GitHub commit [ee119d4a498979525046fba1c3dd3f13a039fbb1](https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2021-37690'}
2021-08-25T14:39:22Z
2021-08-25T14:39:22Z
MODERATE
6.6
{'CWE-416'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37690', 'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3hxh-8cp2-g4hg', 'https://github.com/advisories/GHSA-3hxh-8cp2-g4hg'}
null
{'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1'}
{'https://github.com/tensorflow/tensorflow/commit/ee119d4a498979525046fba1c3dd3f13a039fbb1'}
GHSA
GHSA-wmfg-55f9-j8hq
Server-Side Template Injection
### Impact A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282. ### Patches Effective Immediately, all users should upgrade to version 2.1.2 or higher. ### Workarounds None. ### References https://securitylab.github.com/research/bean-validation-RCE ### For more information If you have any questions or comments about this advisory: * Open an issue in [the BrowserUp Proxy repo](http://github.com/browserup/browserup-proxy) * Contact us via the [BrowserUp website](https://browserup.com) or email us at [[email protected]](mailto:[email protected])
{'CVE-2020-26282'}
2022-04-19T19:02:43Z
2020-12-24T20:49:34Z
HIGH
10
{'CWE-74'}
{'https://securitylab.github.com/research/bean-validation-RCE', 'https://github.com/browserup/browserup-proxy/releases/tag/v2.1.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26282', 'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab', 'https://github.com/browserup/browserup-proxy/security/advisories/GHSA-wmfg-55f9-j8hq', 'https://github.com/advisories/GHSA-wmfg-55f9-j8hq'}
null
{'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
{'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
GHSA
GHSA-v82v-rq72-phq9
Server side request forgery in @isomorphic-git/cors-proxy
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
{'CVE-2021-23664'}
2022-01-31T22:00:02Z
2022-01-26T22:13:05Z
HIGH
8.6
{'CWE-918'}
{'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311', 'https://github.com/advisories/GHSA-v82v-rq72-phq9'}
null
{'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
{'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}
GHSA
GHSA-mfcp-34xw-p57x
Authentication Bypass in saml2-js
Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely. ## Recommendation Upgrade to version 2.0.5 or later.
null
2021-09-29T20:12:43Z
2020-09-03T21:20:52Z
MODERATE
6.8
{'CWE-287'}
{'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637', 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/advisories/GHSA-mfcp-34xw-p57x'}
null
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}
{'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'}
GHSA
GHSA-w4f3-7f7c-x652
SQL Injection in tribalsystems/zenario
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 and prior allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
{'CVE-2021-26830'}
2022-03-21T20:29:00Z
2022-03-18T17:49:01Z
CRITICAL
9.1
{'CWE-89'}
{'https://github.com/advisories/GHSA-w4f3-7f7c-x652', 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1', 'https://github.com/TribalSystems/Zenario/releases/tag/8.8.53370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26830'}
null
{'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}
{'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}
GHSA
GHSA-qhrx-hcm6-pmrw
Unsafe deserialization in SmtpTransport in CakePHP
An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.
{'CVE-2019-11458'}
2021-08-19T15:25:21Z
2019-12-02T18:12:26Z
HIGH
7.5
{'CWE-502'}
{'https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7', 'https://github.com/cakephp/cakephp/commits/master', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458', 'https://github.com/advisories/GHSA-qhrx-hcm6-pmrw', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/CVE-2019-11458.yaml', 'https://github.com/cakephp/cakephp/releases', 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e', 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}
null
{'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}
{'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}
GHSA
GHSA-r7rh-g777-g5gx
SilverStripe GraphQL Server permission checker not inherited by query subclass.
Default SilverStripe GraphQL Server (aka silverstripe/graphql) 3.x through 3.4.1 permission checker not inherited by query subclass.
{'CVE-2021-28661'}
2021-10-18T18:40:16Z
2021-10-12T18:49:23Z
MODERATE
4.3
{'CWE-863'}
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed', 'https://github.com/silverstripe/silverstripe-graphql/releases/tag/3.5.2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28661', 'https://www.silverstripe.org/download/security-releases/CVE-2021-28661', 'https://github.com/advisories/GHSA-r7rh-g777-g5gx', 'https://github.com/silverstripe/silverstripe-graphql/releases'}
null
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}
{'https://github.com/silverstripe/silverstripe-graphql/pull/407/commits/16961459f681f7b32145296189dfdbcc7715e6ed'}
GHSA
GHSA-hhvc-g5hv-48c6
Write to immutable memory region in TensorFlow
### Impact The `tf.raw_ops.ImmutableConst` operation returns a constant tensor created from a memory mapped file which is assumed immutable. However, if the type of the tensor is not an integral type, the operation crashes the Python interpreter as it tries to write to the memory area: ```python >>> import tensorflow as tf >>> with open('/tmp/test.txt','w') as f: f.write('a'*128) >>> tf.raw_ops.ImmutableConst(dtype=tf.string,shape=2, memory_region_name='/tmp/test.txt') ``` If the file is too small, TensorFlow properly returns an error as the memory area has fewer bytes than what is needed for the tensor it creates. However, as soon as there are enough bytes, the above snippet causes a segmentation fault. This is because the alocator used to return the buffer data is not marked as returning an opaque handle since the [needed virtual method](https://github.com/tensorflow/tensorflow/blob/c1e1fc899ad5f8c725dcbb6470069890b5060bc7/tensorflow/core/framework/typed_allocator.h#L78-L85) is [not overriden](https://github.com/tensorflow/tensorflow/blob/acdf3c04fcfa767ae8d109b9e1f727ef050dba4d/tensorflow/core/kernels/immutable_constant_op.cc). ### Patches We have patched the issue in GitHub commit [c1e1fc899ad5f8c725dcbb6470069890b5060bc7](https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7) and will release TensorFlow 2.4.0 containing the patch. TensorFlow nightly packages after this commit will also have the issue resolved. Since this issue also impacts TF versions before 2.4, we will patch all releases between 1.15 and 2.3 inclusive. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2020-26268'}
2021-01-07T22:37:16Z
2020-12-10T19:07:28Z
LOW
4.4
{'CWE-471'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hhvc-g5hv-48c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26268', 'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7', 'https://github.com/advisories/GHSA-hhvc-g5hv-48c6'}
null
{'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'}
{'https://github.com/tensorflow/tensorflow/commit/c1e1fc899ad5f8c725dcbb6470069890b5060bc7'}
GHSA
GHSA-jrgf-vfw2-hj26
RCE via PHP Object injection via SOAP Requests
### Impact This vulnerability allows an admin user to generate soap credentials that can be used to trigger RCE via PHP Object Injection through product attributes and a product. ### Patches The latest OpenMage Versions up from 19.4.7 and 20.0.3 have this Issue solved ### Credits Credit to Luke Rodgers for reporting
{'CVE-2020-15244'}
2022-04-19T19:02:36Z
2020-10-30T17:06:06Z
HIGH
8
{'CWE-74', 'CWE-502'}
{'https://github.com/OpenMage/magento-lts', 'https://github.com/advisories/GHSA-jrgf-vfw2-hj26', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15244', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-jrgf-vfw2-hj26', 'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}
null
{'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}
{'https://github.com/OpenMage/magento-lts/commit/26433d15b57978fcb7701b5f99efe8332ca8630b'}
GHSA
GHSA-rx34-jff5-ph35
Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0912, CVE-2019-0913, CVE-2019-0914, CVE-2019-0915, CVE-2019-0916, CVE-2019-0922, CVE-2019-0923, CVE-2019-0924, CVE-2019-0925, CVE-2019-0927, CVE-2019-0933, CVE-2019-0937.
{'CVE-2019-0917'}
2021-03-29T21:00:06Z
2021-03-29T21:00:06Z
HIGH
7.5
{'CWE-787'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0917', 'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0917', 'https://github.com/advisories/GHSA-rx34-jff5-ph35'}
null
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}
{'https://github.com/chakra-core/ChakraCore/commit/d797e3f00e34c12c8c0ae52f56344325439dccd7', 'https://github.com/chakra-core/ChakraCore/commit/b5f8fad1b00087bd0a24cc173c2dfedc4f8aee33'}
GHSA
GHSA-6jp6-9rf9-gc66
Cross-site Scripting in Weblate
### Impact Due to improper neutralization, it was possible to perform cross-site scripting via crafted user and language names. ### Patches The issues were fixed in the 4.11 release. The following commits are addressing it: * f6753a1a1c63fade6ad418fbda827c6750ab0bda * 9e19a8414337692cc90da2a91c9af5420f2952f1 * 22d577b1f1e88665a88b4569380148030e0f8389 ### Workarounds You can look for crafted user and language names to see if you were affected. ### References * https://hackerone.com/reports/1486674 * https://hackerone.com/reports/1486718 * https://hackerone.com/reports/1485226 ### For more information If you have any questions or comments about this advisory: * Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions) * Email us at [[email protected]](mailto:[email protected])
{'CVE-2022-24710'}
2022-04-15T09:19:28Z
2022-02-25T22:18:50Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-6jp6-9rf9-gc66', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24710', 'https://github.com/advisories/GHSA-6jp6-9rf9-gc66', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda'}
null
{'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda'}
{'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389', 'https://github.com/WeblateOrg/weblate/commit/9e19a8414337692cc90da2a91c9af5420f2952f1', 'https://github.com/WeblateOrg/weblate/commit/f6753a1a1c63fade6ad418fbda827c6750ab0bda'}
GHSA
GHSA-pfxf-wh96-fvjc
Log Forging in generator-jhipster-kotlin
### Impact We log the mail for invalid password reset attempts. As the email is provided by a user and the api is public this can be used by an attacker to forge log entries. This is vulnerable to https://cwe.mitre.org/data/definitions/117.html This problem affects only application generated with jwt or session authentication. Applications using oauth are not vulnerable. ### Patches version 1.7.0. ### Workarounds In `AccountResource.kt` you should change the line ```kotlin log.warn("Password reset requested for non existing mail '$mail'"); ``` to ```kotlin log.warn("Password reset requested for non existing mail"); ``` ### References * https://cwe.mitre.org/data/definitions/117.html * https://owasp.org/www-community/attacks/Log_Injection * https://www.baeldung.com/jvm-log-forging ### For more information If you have any questions or comments about this advisory: * Open an issue in [jhipster kotlin](https://github.com/jhipster/jhipster-kotlin)
{'CVE-2020-4072'}
2021-01-07T23:50:01Z
2020-06-25T20:02:51Z
MODERATE
5.3
{'CWE-117'}
{'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/advisories/GHSA-pfxf-wh96-fvjc', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4072'}
null
{'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
{'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'}
GHSA
GHSA-54gp-qff8-946c
Insecure direct object reference of log files of the Import/Export feature
### Impact Insecure direct object reference of log files of the Import/Export feature ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version. https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659
{'CVE-2021-37709'}
2022-04-26T18:04:08Z
2021-08-30T16:14:19Z
MODERATE
6.5
{'CWE-639', 'CWE-532'}
{'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37709', 'https://github.com/shopware/platform/security/advisories/GHSA-54gp-qff8-946c', 'https://github.com/advisories/GHSA-54gp-qff8-946c'}
null
{'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec'}
{'https://github.com/shopware/platform/commit/a9f52abb6eb503654c492b6b2076f8d924831fec'}
GHSA
GHSA-fq86-3f29-px2c
`CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow
### Impact The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`IsSimplifiableReshape`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742) would trigger `CHECK` failures. ### Patches We have patched the issue in GitHub commits [ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1](https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1), [1fb27733f943295d874417630edd3b38b34ce082](https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082), and [240655511cd3e701155f944a972db71b6c0b1bb6](https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2022-23581'}
2022-02-11T20:38:44Z
2022-02-07T22:01:14Z
MODERATE
6.5
{'CWE-617'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23581', 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082', 'https://github.com/advisories/GHSA-fq86-3f29-px2c', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c', 'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1'}
null
{'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082', 'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1'}
{'https://github.com/tensorflow/tensorflow/commit/240655511cd3e701155f944a972db71b6c0b1bb6', 'https://github.com/tensorflow/tensorflow/commit/ebc1a2ffe5a7573d905e99bd0ee3568ee07c12c1', 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082'}
GHSA
GHSA-m49f-hcxp-6hm6
CSRF allowing an external page to trigger a user logout event
### Impact A malicious user can trigger a user logout if a signed in user visits a malicious website that makes a request to the Panel's sign-out endpoint. This requires a targeted attack against a specific Panel instance, and serves only to sign a user out. **No user details are leaked, nor is any user data affected, this is simply an annoyance at worst.** ### Patches None. ### Workarounds None. ### For more information If you have any questions or comments about this advisory please contact `Tactical Fish#8008` on Discord, or email `[email protected]`.
{'CVE-2021-41176'}
2022-04-19T19:03:12Z
2021-10-25T19:42:46Z
LOW
0
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41176', 'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.3', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-m49f-hcxp-6hm6', 'https://github.com/advisories/GHSA-m49f-hcxp-6hm6'}
null
{'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}
{'https://github.com/pterodactyl/panel/commit/45999ba4ee1b2dcb12b4a2fa2cedfb6b5d66fac2'}
GHSA
GHSA-2pr6-76vf-7546
Denial of Service in js-yaml
Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. ## Recommendation Upgrade to version 3.13.0.
null
2021-08-04T21:32:57Z
2019-06-05T14:35:29Z
MODERATE
5.9
{'CWE-400'}
{'https://github.com/nodeca/js-yaml/issues/475', 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://github.com/advisories/GHSA-2pr6-76vf-7546', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'}
null
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}
{'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}
GHSA
GHSA-mmq6-q8r3-48fm
Crash in `tf.strings.substr` due to `CHECK`-fail
### Impact An attacker can cause a denial of service via `CHECK`-fail in `tf.strings.substr` with invalid arguments: ```python import tensorflow as tf tf.strings.substr(input='abc', len=1, pos=[1,-1]) ``` ```python import tensorflow as tf tf.strings.substr(input='abc', len=1, pos=[1,2]) ``` ### Patches We have received a patch for the issue in GitHub commit [890f7164b70354c57d40eda52dcdd7658677c09f](https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported in [#46900](https://github.com/tensorflow/issues/46900) and fixed in [#46974](https://github.com/tensorflow/issues/46974).
{'CVE-2021-29617'}
2021-09-28T21:11:39Z
2021-05-21T14:28:50Z
LOW
2.5
{'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29617', 'https://github.com/tensorflow/issues/46900', 'https://github.com/tensorflow/issues/46974', 'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mmq6-q8r3-48fm', 'https://github.com/advisories/GHSA-mmq6-q8r3-48fm'}
null
{'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}
{'https://github.com/tensorflow/tensorflow/commit/890f7164b70354c57d40eda52dcdd7658677c09f'}
GHSA
GHSA-vj42-xq3r-hr3r
Out-of-bounds reads in Pillow
In libImaging/Jpeg2KDecode.c in Pillow before 7.0.0, there are multiple out-of-bounds reads via a crafted JP2 file.
{'CVE-2020-10994'}
2021-09-22T21:44:31Z
2020-07-27T21:52:39Z
MODERATE
5.5
{'CWE-125'}
{'https://github.com/advisories/GHSA-vj42-xq3r-hr3r', 'https://github.com/python-pillow/Pillow/pull/4505', 'https://github.com/python-pillow/Pillow/commits/master/src/libImaging/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10994', 'https://snyk.io/vuln/SNYK-PYTHON-PILLOW-574575', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HOKHNWV2VS5GESY7IBD237E7C6T3I427/', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/BEBCPE4F2VHTIT6EZA2YZQZLPVDEBJGD/', 'https://github.com/python-pillow/Pillow/pull/4538', 'https://usn.ubuntu.com/4430-2/', 'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4', 'https://github.com/python-pillow/Pillow/blob/master/docs/releasenotes/7.1.0.rst#security', 'https://pillow.readthedocs.io/en/stable/releasenotes/7.1.0.html', 'https://usn.ubuntu.com/4430-1/', 'https://pillow.readthedocs.io/en/stable/releasenotes/'}
null
{'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4'}
{'https://github.com/python-pillow/Pillow/commit/ff60894d697d1992147b791101ad53a8bf1352e4'}
GHSA
GHSA-74qp-233x-p5j8
Cross-site scripting (XSS) in Apache Livy
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
{'CVE-2021-26544'}
2021-05-13T22:30:41Z
2021-05-13T22:30:41Z
MODERATE
5.4
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26544', 'http://www.openwall.com/lists/oss-security/2021/02/20/1', 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://github.com/advisories/GHSA-74qp-233x-p5j8', 'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache.org%3E'}
null
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}
GHSA
GHSA-rrx2-r989-2c43
Integer overflows in Tensorflow
### Impact The [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service): ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseDenseCwiseDiv( sp_indices=np.array([[9]]), sp_values=np.array([5]), sp_shape=np.array([92233720368., 92233720368]), dense=np.array([4])) ``` We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The latter is an instance of [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and is easily fixed by replacing a call to `TensorShape` constructor with a call to `BuildTensorShape` static helper factory. ### Patches We have patched the issue in GitHub commits [1b54cadd19391b60b6fcccd8d076426f7221d5e8](https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8) and [e952a89b7026b98fe8cbe626514a93ed68b7c510](https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Faysal Hossain Shezan from University of Virginia.
{'CVE-2022-23567'}
2022-02-11T17:05:35Z
2022-02-09T23:39:33Z
MODERATE
6.5
{'CWE-190'}
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23567', 'https://github.com/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md'}
null
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510'}
{'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8', 'https://github.com/tensorflow/tensorflow/commit/e952a89b7026b98fe8cbe626514a93ed68b7c510'}
GHSA
GHSA-6394-6h9h-cfjg
Regular Expression Denial of Service
A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern.
null
2021-02-25T17:23:13Z
2019-06-07T21:12:35Z
MODERATE
0
{'CWE-400'}
{'https://github.com/advisories/GHSA-6394-6h9h-cfjg', 'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
null
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
{'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}
GHSA
GHSA-vpfp-5gwq-g533
Improper Authentication in Apache ShenYu Admin
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
{'CVE-2021-37580'}
2021-11-18T15:12:16Z
2021-11-17T23:15:30Z
CRITICAL
9.8
{'CWE-287'}
{'https://github.com/advisories/GHSA-vpfp-5gwq-g533', 'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4', 'http://www.openwall.com/lists/oss-security/2021/11/16/1'}
null
{'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'}
{'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'}
GHSA
GHSA-589w-hccm-265x
Inline attribute values were not processed.
### Impact Inline attributes have not been processed escape. If the data that came from users was not processed, then an XSS vulnerability is possible ### Patches Fixed in 9.4.4
{'CVE-2020-15263'}
2021-01-07T22:50:46Z
2020-10-19T20:17:47Z
HIGH
8
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15263', 'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169', 'https://github.com/advisories/GHSA-589w-hccm-265x', 'https://github.com/orchidsoftware/platform/security/advisories/GHSA-589w-hccm-265x'}
null
{'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169'}
{'https://github.com/orchidsoftware/platform/commit/03f9a113b1a70bc5075ce86a918707f0e7d82169'}
GHSA
GHSA-hrqr-hxpp-chr3
Possible Information Leak / Session Hijack Vulnerability in Rack
There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison. ### Impact The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session. ## Releases The 1.6.12 and 2.0.8 releases are available at the normal locations. ### Workarounds There are no known workarounds. ### Patches To aid users who aren't able to upgrade immediately we have provided patches for the two supported release series. They are in git-am format and consist of a single changeset. * 1-6-session-timing-attack.patch - Patch for 1.6 series * 2-0-session-timing-attack.patch - Patch for 2.6 series ### Credits Thanks Will Leinweber for reporting this!
{'CVE-2019-16782'}
2022-04-19T19:02:23Z
2019-12-18T19:01:31Z
MODERATE
6.3
{'CWE-208', 'CWE-203'}
{'https://github.com/advisories/GHSA-hrqr-hxpp-chr3', 'http://www.openwall.com/lists/oss-security/2019/12/18/3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782', 'http://www.openwall.com/lists/oss-security/2019/12/19/3', 'http://www.openwall.com/lists/oss-security/2020/04/09/2', 'http://www.openwall.com/lists/oss-security/2020/04/08/1', 'http://www.openwall.com/lists/oss-security/2019/12/18/2', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/', 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3', 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38', 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}
null
{'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
{'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}
GHSA
GHSA-772j-h9xw-ffp5
CHECK-fail in SparseCross due to type confusion
### Impact The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service: ```python import tensorflow as tf hashed_output = False num_buckets = 1949315406 hash_key = 1869835877 out_type = tf.string internal_type = tf.string indices_1 = tf.constant([0, 6], shape=[1, 2], dtype=tf.int64) indices_2 = tf.constant([0, 0], shape=[1, 2], dtype=tf.int64) indices = [indices_1, indices_2] values_1 = tf.constant([0], dtype=tf.int64) values_2 = tf.constant([72], dtype=tf.int64) values = [values_1, values_2] batch_size = 4 shape_1 = tf.constant([4, 122], dtype=tf.int64) shape_2 = tf.constant([4, 188], dtype=tf.int64) shapes = [shape_1, shape_2] dense_1 = tf.constant([188, 127, 336, 0], shape=[4, 1], dtype=tf.int64) dense_2 = tf.constant([341, 470, 470, 470], shape=[4, 1], dtype=tf.int64) dense_3 = tf.constant([188, 188, 341, 922], shape=[4, 1], dtype=tf.int64) denses = [dense_1, dense_2, dense_3] tf.raw_ops.SparseCross(indices=indices, values=values, shapes=shapes, dense_inputs=denses, hashed_output=hashed_output, num_buckets=num_buckets, hash_key=hash_key, out_type=out_type, internal_type=internal_type) ``` The above code will result in a `CHECK` fail in [`tensor.cc`](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/framework/tensor.cc#L670-L675): ```cc void Tensor::CheckTypeAndIsAligned(DataType expected_dtype) const { CHECK_EQ(dtype(), expected_dtype) << " " << DataTypeString(expected_dtype) << " expected, got " << DataTypeString(dtype()); ... } ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements: ```cc if (DT_STRING == values_.dtype()) return Fingerprint64(values_.vec<tstring>().data()[start + n]); return values_.vec<int64>().data()[start + n]; ``` Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue. ### Patches We have patched the issue in GitHub commit [b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025](https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang and Ying Wang of Baidu X-Team.
{'CVE-2021-29519'}
2021-05-21T14:21:08Z
2021-05-21T14:21:08Z
LOW
2.5
{'CWE-843'}
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025', 'https://github.com/advisories/GHSA-772j-h9xw-ffp5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29519', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-772j-h9xw-ffp5'}
null
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}
{'https://github.com/tensorflow/tensorflow/commit/b1cc5e5a50e7cee09f2c6eb48eb40ee9c4125025'}
GHSA
GHSA-jq4v-f5q6-mjqq
Cross-Site Scripting in lxml
An XSS vulnerability was discovered in the python `lxml` clean module versions before 4.6.3. When disabling the safe_attrs_only and forms arguments, the Cleaner class does not remove the formaction attribute allowing for JS to bypass the sanitizer. A remote attacker could exploit this flaw to run arbitrary JS code on users who interact with incorrectly sanitized HTML. This issue is patched in `lxml` 4.6.3.
{'CVE-2021-28957'}
2021-10-21T17:31:22Z
2021-03-22T16:53:53Z
MODERATE
6.1
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28957', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00031.html', 'https://bugs.launchpad.net/lxml/+bug/1888153', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/3C2R44VDUY7FJVMAVRZ2WY7XYL4SVN45/', 'https://github.com/lxml/lxml/pull/316', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/XXN3QPWCTQVOGW4BMWV3AUUZZ4NRZNSQ/', 'https://security.netapp.com/advisory/ntap-20210521-0004/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/advisories/GHSA-jq4v-f5q6-mjqq', 'https://www.debian.org/security/2021/dsa-4880', 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d', 'https://pypi.org/project/lxml'}
null
{'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d'}
{'https://github.com/lxml/lxml/commit/2d01a1ba8984e0483ce6619b972832377f208a0d', 'https://github.com/lxml/lxml/pull/316/commits/10ec1b4e9f93713513a3264ed6158af22492f270', 'https://github.com/lxml/lxml/commit/a5f9cb52079dc57477c460dbe6ba0f775e14a999'}
GHSA
GHSA-2x4q-6jfv-8h9h
Path Traversal in glance
Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`. ## Recommendation Update to version 3.0.4 or later.
{'CVE-2018-3715'}
2021-01-08T21:14:55Z
2018-07-26T14:53:14Z
HIGH
0
{'CWE-22'}
{'https://www.npmjs.com/advisories/590', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106'}
null
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
{'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'}
GHSA
GHSA-4f5x-q4jc-xfcf
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore.
{'CVE-2022-0262'}
2022-01-21T23:31:35Z
2022-01-21T23:31:35Z
MODERATE
6.6
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0262', 'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7', 'https://huntr.dev/bounties/b38a4e14-5dcb-4e49-9990-494dc2a8fa0d', 'https://github.com/advisories/GHSA-4f5x-q4jc-xfcf'}
null
{'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7'}
{'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7'}
GHSA
GHSA-5m6c-jp6f-2vcv
Open Redirect in OAuth2 Proxy
### Impact As users can provide a redirect address for the proxy to send the authenticated user to at the end of the authentication flow. This is expected to be the original URL that the user was trying to access. This redirect URL is checked within the proxy and validated before redirecting the user to prevent malicious actors providing redirects to potentially harmful sites.
{'CVE-2020-4037'}
2021-12-20T17:58:59Z
2021-12-20T17:58:59Z
MODERATE
4.3
{'CWE-601'}
{'https://github.com/advisories/GHSA-5m6c-jp6f-2vcv', 'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2', 'https://github.com/oauth2-proxy/oauth2-proxy/releases/tag/v6.0.0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4037', 'https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-5m6c-jp6f-2vcv'}
null
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
{'https://github.com/oauth2-proxy/oauth2-proxy/commit/ee5662e0f5001d76ec76562bb605abbd07c266a2'}
GHSA
GHSA-ppc3-fpvh-7396
Improper synchronization in Apache Netbeans HTML/Java API
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file.
{'CVE-2020-17534'}
2022-05-03T19:31:06Z
2022-02-09T22:25:18Z
HIGH
7
{'CWE-362'}
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E', 'https://github.com/advisories/GHSA-ppc3-fpvh-7396', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534'}
null
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
GHSA
GHSA-63q7-h895-m982
Cross-site Scripting in dompurify
Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements.
{'CVE-2020-26870'}
2022-04-28T17:58:52Z
2020-12-18T22:51:40Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/advisories/GHSA-63q7-h895-m982', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://research.securitum.com/mutation-xss-via-mathml-mutation-dompurify-2-0-17-bypass/', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00029.html', 'https://snyk.io/vuln/SNYK-JS-DOMPURIFY-1016634', 'https://www.oracle.com//security-alerts/cpujul2021.html'}
null
{'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
{'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'}
GHSA
GHSA-f698-m2v9-5fh3
Command Injection in opencv
Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands. ## Recommendation Upgrade to version 6.1.0.
null
2021-08-04T20:49:45Z
2019-06-04T20:11:44Z
LOW
0
{'CWE-77'}
{'https://github.com/advisories/GHSA-f698-m2v9-5fh3', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb', 'https://www.npmjs.com/advisories/789'}
null
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
{'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}
GHSA
GHSA-3c48-6pcv-88rm
Macro in MathJax running untrusted Javascript within a web browser
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
{'CVE-2018-1999024'}
2022-04-26T18:18:00Z
2018-07-27T17:05:27Z
MODERATE
5.4
{'CWE-79'}
{'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
null
{'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
{'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'}
GHSA
GHSA-r9p9-mrjm-926w
Use of a Broken or Risky Cryptographic Algorithm
The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key used in this implementation to be revealed after a number of ECDH operations are performed.
{'CVE-2020-28498'}
2021-03-08T16:06:50Z
2021-03-08T16:06:50Z
MODERATE
6.8
{'CWE-327'}
{'https://github.com/advisories/GHSA-r9p9-mrjm-926w', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/christianlundkvist/blog/blob/master/2020_05_26_secp256k1_twist_attacks/secp256k1_twist_attacks.md', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1069836'}
null
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}
{'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'}
GHSA
GHSA-4w46-w44m-3jq3
Parse Server stores password in plain text
Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext. This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password storage.
{'CVE-2020-26288'}
2022-04-19T19:02:42Z
2020-12-28T16:33:17Z
LOW
7.7
{'CWE-312'}
{'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://www.npmjs.com/advisories/1593', 'https://github.com/advisories/GHSA-4w46-w44m-3jq3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26288'}
null
{'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
{'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'}
GHSA
GHSA-hx77-5p88-f92r
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4131'}
2022-01-05T20:33:55Z
2022-01-05T20:33:55Z
HIGH
8.8
{'CWE-352'}
{'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f', 'https://github.com/advisories/GHSA-hx77-5p88-f92r', 'https://huntr.dev/bounties/52dfac87-4fd3-4dfb-83d2-d39916764d43', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4131'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f'}
{'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f'}
GHSA
GHSA-6cgh-hjpw-q3gq
Utils.readChallengeTx does not verify the server account signature
The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. The function does not verify that the server has signed the transaction and has been fixed so that it does in v8.2.3. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to v8.2.3 to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction.
{'CVE-2021-32738'}
2022-04-19T19:03:01Z
2021-07-02T19:20:33Z
MODERATE
6.5
{'CWE-287'}
{'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/advisories/GHSA-6cgh-hjpw-q3gq'}
null
{'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}
{'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'}
GHSA
GHSA-vcjj-9vg7-vf68
Null pointer dereference in TFLite
### Impact An attacker can craft a TFLite model that would trigger a null pointer dereference, which would result in a crash and denial of service: ```python import tensorflow as tf model = tf.keras.models.Sequential() model.add(tf.keras.Input(shape=(1, 2, 3))) model.add(tf.keras.layers.Dense(0, activation='relu')) converter = tf.lite.TFLiteConverter.from_keras_model(model) tflite_model = converter.convert() interpreter = tf.lite.Interpreter(model_content=tflite_model) interpreter.allocate_tensors() interpreter.invoke() ``` The [implementation](https://github.com/tensorflow/tensorflow/blob/149562d49faa709ea80df1d99fc41d005b81082a/tensorflow/lite/kernels/internal/optimized/optimized_ops.h#L268-L285) unconditionally dereferences a pointer. ```cc if (y4 > 1) { // ... } else { for (int i0 = 0; i0 < y0; ++i0) { const T* input2_data_ptr = nullptr; for (int i1 = 0; i1 < y1; ++i1) { input2_data_ptr = input2_data_reset; for (int i2 = 0; i2 < y2; ++i2) { scalar_broadcast_f(y3, params, *input1_data_ptr, input2_data_ptr, output_data_ptr); } } } } ``` ### Patches We have patched the issue in GitHub commit [15691e456c7dc9bd6be203b09765b063bf4a380c](https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37688'}
2021-08-25T14:39:54Z
2021-08-25T14:39:54Z
HIGH
7.8
{'CWE-476'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37688', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/advisories/GHSA-vcjj-9vg7-vf68', 'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}
null
{'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}
{'https://github.com/tensorflow/tensorflow/commit/15691e456c7dc9bd6be203b09765b063bf4a380c'}
GHSA
GHSA-jgrx-mgxx-jf9v
Regular Expression Denial of Service in tmpl
nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion.
{'CVE-2021-3777'}
2022-05-04T03:26:17Z
2021-09-20T20:27:52Z
HIGH
7.5
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://github.com/advisories/GHSA-jgrx-mgxx-jf9v', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
null
{'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
{'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'}
GHSA
GHSA-52mh-p2m2-w625
Cross-site Scripting in HAPI FHIR
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)
{'CVE-2019-12741'}
2021-08-04T21:01:40Z
2019-06-07T20:56:59Z
MODERATE
6.1
{'CWE-79'}
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741', 'https://github.com/advisories/GHSA-52mh-p2m2-w625', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'}
null
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}
GHSA
GHSA-jm34-xm8m-w958
Open Redirect in oauth2_proxy
The Bitly oauth2_proxy in version 2.1 and earlier was affected by an open redirect vulnerability during the start and termination of the 2-legged OAuth flow. This issue was caused by improper input validation and a violation of RFC-6819
{'CVE-2017-1000070'}
2021-12-20T18:04:40Z
2021-12-20T18:04:40Z
MODERATE
6.1
{'CWE-601'}
{'https://github.com/bitly/oauth2_proxy/pull/359', 'https://github.com/advisories/GHSA-jm34-xm8m-w958', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000070', 'https://github.com/bitly/oauth2_proxy/issues/228', 'https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-1000070', 'https://tools.ietf.org/html/rfc6819#section-5.2.3.5', 'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
null
{'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
{'https://github.com/bitly/oauth2_proxy/commit/289a6ccf463a425c7606178c510fc5eeb9c8b050'}
GHSA
GHSA-5949-rw7g-wx7w
Deserialization of untrusted data in jackson-databind
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20190'}
2021-04-26T14:52:04Z
2021-01-20T21:20:15Z
HIGH
0
{'CWE-502'}
{'https://security.netapp.com/advisory/ntap-20210219-0008/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://github.com/advisories/GHSA-5949-rw7g-wx7w', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a', 'https://lists.apache.org/thread.html/r380e9257bacb8551ee6fcf2c59890ae9477b2c78e553fa9ea08e9d9a@%3Ccommits.nifi.apache.org%3E'}
null
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}
GHSA
GHSA-74mg-6xqx-2vrq
Deserialization exploitation in Apache Dubbo
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be executed after a series of program calls, however, those special functions may cause remote command execution. For example, the hashCode() function of the EqualsBean class in rome-1.7.0.jar will cause the remotely load malicious classes and execute malicious code by constructing a malicious request. This issue was fixed in Apache Dubbo 2.6.9 and 2.7.8.
{'CVE-2020-11995'}
2022-02-09T22:27:01Z
2022-02-09T22:27:01Z
CRITICAL
9.8
{'CWE-502'}
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E', 'https://github.com/advisories/GHSA-74mg-6xqx-2vrq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995'}
null
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}
GHSA
GHSA-xqj7-j8j5-f2xr
Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
{'CVE-2018-1000180'}
2022-04-26T18:56:39Z
2018-10-16T17:44:39Z
HIGH
7.5
{'CWE-327'}
{'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000180', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'http://www.securityfocus.com/bid/106567', 'https://github.com/bcgit/bc-java/wiki/CVE-2018-1000180', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.debian.org/security/2018/dsa-4233', 'https://access.redhat.com/errata/RHSA-2018:2424', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2425', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://access.redhat.com/errata/RHSA-2018:2643', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-xqj7-j8j5-f2xr', 'https://access.redhat.com/errata/RHSA-2018:2428', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://security.netapp.com/advisory/ntap-20190204-0003/'}
null
{'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'}
{'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'}
GHSA
GHSA-qfpc-5pjr-mh26
Missing validation in shape inference for `Dequantize`
### Impact The shape inference code for `tf.raw_ops.Dequantize` has a vulnerability that could trigger a denial of service via a segfault if an attacker provides invalid arguments: ```python import tensorflow as tf tf.compat.v1.disable_v2_behavior() tf.raw_ops.Dequantize( input_tensor = tf.constant(-10.0, dtype=tf.float32), input_tensor = tf.cast(input_tensor, dtype=tf.quint8), min_range = tf.constant([], shape=[0], dtype=tf.float32), max_range = tf.constant([], shape=[0], dtype=tf.float32), mode = 'MIN_COMBINED', narrow_range=False, axis=-10, dtype=tf.dtypes.float32) ``` The shape inference [implementation](https://github.com/tensorflow/tensorflow/blob/460e000de3a83278fb00b61a16d161b1964f15f4/tensorflow/core/ops/array_ops.cc#L2999-L3014) uses `axis` to select between two different values for `minmax_rank` which is then used to retrieve tensor dimensions. However, code assumes that `axis` can be either `-1` or a value greater than `-1`, with no validation for the other values. ### Patches We have patched the issue in GitHub commit [da857cfa0fde8f79ad0afdbc94e88b5d4bbec764](https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Yakun Zhang of Baidu Security.
{'CVE-2021-37677'}
2021-08-25T14:41:23Z
2021-08-25T14:41:23Z
MODERATE
5.5
{'CWE-20'}
{'https://github.com/advisories/GHSA-qfpc-5pjr-mh26', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37677', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qfpc-5pjr-mh26', 'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
null
{'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
{'https://github.com/tensorflow/tensorflow/commit/da857cfa0fde8f79ad0afdbc94e88b5d4bbec764'}
GHSA
GHSA-2rr5-8q37-2w7h
Improper Restriction of XML External Entity Reference (XXE) in Nokogiri on JRuby
### Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.0)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:H/RL:O/RC:C/MAV:N/MAC:L) for JRuby users. (This security advisory does not apply to CRuby users.) ### Impact In Nokogiri v1.12.4 and earlier, **on JRuby only**, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: - Nokogiri::XML::SAX::Parser - Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser - Nokogiri::XML::SAX::PushParser - Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser ### Mitigation JRuby users should upgrade to Nokogiri v1.12.5 or later. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.
{'CVE-2021-41098'}
2021-11-04T18:25:39Z
2021-09-27T20:12:47Z
HIGH
7.5
{'CWE-611'}
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d', 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41098', 'https://github.com/advisories/GHSA-2rr5-8q37-2w7h'}
null
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}
{'https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d'}
GHSA
GHSA-844w-j86r-4x2j
Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow
### Impact A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory. This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed. ### Patches Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0. ### For more information Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
{'CVE-2019-16778'}
2021-11-01T14:12:43Z
2019-12-16T20:17:10Z
LOW
2.6
{'CWE-681', 'CWE-122'}
{'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778', 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j', 'https://github.com/advisories/GHSA-844w-j86r-4x2j'}
null
{'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}
{'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}
GHSA
GHSA-3xpw-vhmv-cw7h
Command injection in czproject/git-php
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
{'CVE-2022-25866'}
2022-04-27T14:35:59Z
2022-04-26T00:00:35Z
HIGH
8.1
{'CWE-74'}
{'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25866', 'https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349', 'https://github.com/advisories/GHSA-3xpw-vhmv-cw7h', 'https://github.com/czproject/git-php/releases/tag/v4.0.3'}
null
{'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}
{'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}
GHSA
GHSA-w8qv-6jwh-64r5
Regular Expression Denial of Service in browserslist
The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries.
{'CVE-2021-23364'}
2021-05-24T19:52:40Z
2021-05-24T19:52:40Z
MODERATE
5.3
{'CWE-400'}
{'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://github.com/advisories/GHSA-w8qv-6jwh-64r5', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98', 'https://github.com/browserslist/browserslist/pull/593'}
null
{'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}
{'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'}
GHSA
GHSA-8h84-8j4f-p97q
Injection in bodymen
bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10792'}
2021-04-13T15:24:21Z
2021-04-13T15:24:21Z
MODERATE
6.3
{'CWE-74'}
{'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://github.com/advisories/GHSA-8h84-8j4f-p97q', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'}
null
{'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
{'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'}
GHSA
GHSA-mxjr-xmcg-fg7w
Arbitrary Code Injection in mobile-icon-resizer
mobile-icon-resizer resizes large images for use as icons for iOS and Android. mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3. mobile-icon-resizer takes an options object as an argument to define the resulting icons as such: ``` var options = { config: './config.js' } resize(options, function(err){}); ``` config.js would need to be a file on the filesystem and look something like: ``` var config = { iOS: { "images": [ /* iOS image definitions are not vulnerable */ ] }, android: { "images" : [ { "baseRatio" : "console.log('Executing script as baseRatio property')", "folder" : "drawable-ldpi" }, { "ratio" : "console.log('Executing script as ratio property')", "folder" : "drawable-mdpi" }, /* other android image defintiions ... */ ] } }; exports = module.exports = config; ``` The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed. ## Recommendation Update to version 0.4.3 or later.
null
2021-08-17T15:41:59Z
2019-06-27T17:25:21Z
MODERATE
6.5
{'CWE-94'}
{'https://github.com/advisories/GHSA-mxjr-xmcg-fg7w', 'https://www.npmjs.com/advisories/317', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
null
{'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
{'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}
GHSA
GHSA-7528-7jg5-6g62
Cross-site Scripting Vulnerability in CodeIgniter4
### Impact Cross-Site Scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4. Attackers can do XSS attacks if you are using `API\ResponseTrait`. ### Patches Upgrade to v4.1.8 or later. ### Workarounds Do one of the following: 1. Do not use `API\ResponseTrait` nor `ResourceController` 2. Disable Auto Route and [Use Defined Routes Only](https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only) ### References - [Cross Site Scripting (XSS) Software Attack | OWASP Foundation](https://owasp.org/www-community/attacks/xss/) ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeIgniter4/issues) * Email us at [SECURITY.md](https://github.com/codeigniter4/CodeIgniter4/blob/develop/SECURITY.md)
{'CVE-2022-21715'}
2022-04-19T19:03:21Z
2022-01-27T15:09:00Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-7528-7jg5-6g62', 'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd', 'https://codeigniter4.github.io/userguide/incoming/routing.html#use-defined-routes-only', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21715'}
null
{'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd'}
{'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd'}
GHSA
GHSA-9c8h-vvrj-w2p8
Heap OOB in `RaggedGather`
### Impact If the arguments to `tf.raw_ops.RaggedGather` don't determine a valid ragged tensor code can trigger a read from outside of bounds of heap allocated buffers. ```python import tensorflow as tf tf.raw_ops.RaggedGather( params_nested_splits = [0,0,0], params_dense_values = [1,1], indices = [0,0,9,0,0], OUTPUT_RAGGED_RANK=0) ``` In debug mode, the same code triggers a `CHECK` failure. The [implementation](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/ragged_gather_op.cc#L70) directly reads the first dimension of a tensor shape before checking that said tensor has rank of at least 1 (i.e., it is not a scalar). Furthermore, the implementation does not check that the list given by `params_nested_splits` is not an empty list of tensors. ### Patches We have patched the issue in GitHub commit [a2b743f6017d7b97af1fe49087ae15f0ac634373](https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373). The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by members of the Aivul Team from Qihoo 360.
{'CVE-2021-37641'}
2021-08-25T14:43:59Z
2021-08-25T14:43:59Z
HIGH
7.1
{'CWE-125'}
{'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/advisories/GHSA-9c8h-vvrj-w2p8', 'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37641'}
null
{'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'}
{'https://github.com/tensorflow/tensorflow/commit/a2b743f6017d7b97af1fe49087ae15f0ac634373'}
GHSA
GHSA-g95j-p8f6-pwh4
Downloads Resources over HTTP in headless-browser-lite
Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`. ## Recommendation Update to version 2015.4.18-a or later.
{'CVE-2016-10625'}
2021-06-10T23:42:14Z
2019-02-18T23:56:58Z
HIGH
8.1
{'CWE-311'}
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://www.npmjs.com/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nodesecurity.io/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625', 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4'}
null
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'}
{'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'}
GHSA
GHSA-2hw7-mxvj-m455
Path traversal in Node-RED-Dashboard
In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files.
{'CVE-2021-3223'}
2021-01-29T18:13:52Z
2021-01-29T18:13:52Z
HIGH
0
{'CWE-22'}
{'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://github.com/advisories/GHSA-2hw7-mxvj-m455', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3223'}
null
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}
{'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'}
GHSA
GHSA-v6vg-pxvv-g5cq
Improper Privilege Management in Snipe-IT
Snipe-IT prior to 5.3.9 is vulnerable to improper privilege management. A user who does not have access to the supplier module may view supplier content.
{'CVE-2022-0579'}
2022-02-26T00:33:40Z
2022-02-15T00:02:45Z
MODERATE
6.5
{'CWE-269'}
{'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1', 'https://huntr.dev/bounties/70a99cf4-3241-4ffc-b9ed-5c54932f3849', 'https://github.com/advisories/GHSA-v6vg-pxvv-g5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0579'}
null
{'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}
{'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}
GHSA
GHSA-qw8w-2xcp-xg59
Low severity vulnerability that affects passenger
Phusion Passenger 4.0.37 allows local users to write to certain files and directories via a symlink attack on (1) control_process.pid or a (2) generation-* file. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1831.
{'CVE-2014-1832'}
2021-09-16T21:10:03Z
2018-10-10T17:29:27Z
LOW
0
null
{'http://openwall.com/lists/oss-security/2014/01/30/3', 'http://openwall.com/lists/oss-security/2014/01/29/6', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149032.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1832', 'https://github.com/advisories/GHSA-qw8w-2xcp-xg59', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736958', 'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0', 'https://bugzilla.redhat.com/show_bug.cgi?id=1058992'}
null
{'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
{'https://github.com/phusion/passenger/commit/94428057c602da3d6d34ef75c78091066ecac5c0'}
GHSA
GHSA-f7hx-fqxw-rvvj
Insufficient output escaping of attachment names in PHPMailer
### Impact CWE-116: Incorrect output escaping. An attachment added like this (note the double quote within the attachment name, which is entirely valid): $mail->addAttachment('/tmp/attachment.tmp', 'filename.html";.jpg'); Will result in a message containing these headers: Content-Type: application/octet-stream; name="filename.html";.jpg" Content-Disposition: attachment; filename="filename.html";.jpg" The attachment will be named `filename.html`, and the trailing `";.jpg"` will be ignored. Mail filters that reject `.html` attachments but permit `.jpg` attachments may be fooled by this. Note that the MIME type itself is obtained automatically from the *source filename* (in this case `attachment.tmp`, which maps to a generic `application/octet-stream` type), and not the *name* given to the attachment (though these are the same if a separate name is not provided), though it can be set explicitly in other parameters to attachment methods. ### Patches Patched in PHPMailer 6.1.6 by escaping double quotes within the name using a backslash, as per RFC822 section 3.4.1, resulting in correctly escaped headers like this: Content-Type: application/octet-stream; name="filename.html\";.jpg" Content-Disposition: attachment; filename="filename.html\";.jpg" ### Workarounds Reject or filter names and filenames containing double quote (`"`) characters before passing them to attachment functions such as `addAttachment()`. ### References [CVE-2020-13625](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-13625). [PHPMailer 6.1.6 release](https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the PHPMailer repo](https://github.com/PHPMailer/PHPMailer/issues)
{'CVE-2020-13625'}
2021-08-25T21:37:24Z
2020-05-27T16:37:02Z
HIGH
7.5
{'CWE-116'}
{'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-f7hx-fqxw-rvvj', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/SMH4TC5XTS3KZVGMSKEPPBZ2XTZCKKCX/', 'https://usn.ubuntu.com/4505-1/', 'https://github.com/advisories/GHSA-f7hx-fqxw-rvvj', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00004.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13625', 'https://lists.debian.org/debian-lts-announce/2020/06/msg00014.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00067.html', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/EFM3BZABL6RUHTVMXSC7OFMP4CKWMRPJ/', 'https://github.com/PHPMailer/PHPMailer/releases/tag/v6.1.6', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00085.html'}
null
{'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3'}
{'https://github.com/PHPMailer/PHPMailer/commit/c2796cb1cb99d7717290b48c4e6f32cb6c60b7b3'}
GHSA
GHSA-p5xh-vx83-mxcj
HTTP Request Smuggling in Twisted
In Twisted Web through 20.3.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.
{'CVE-2020-10109'}
2022-04-04T21:10:40Z
2020-03-31T15:40:12Z
CRITICAL
9.8
{'CWE-444'}
{'https://lists.fedoraproject.org/archives/list/[email protected]/message/YW3NIL7VXSGJND2Q4BSXM3CFTAFU6T7D/', 'https://usn.ubuntu.com/4308-1/', 'https://know.bishopfox.com/advisories/twisted-version-19.10.0', 'https://security.gentoo.org/glsa/202007-24', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00021.html', 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/6ISMZFZBWW4EV6ETJGXAYIXN3AT7GBPL/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10109', 'https://github.com/twisted/twisted/blob/6ff2c40e42416c83203422ff70dfc49d2681c8e2/NEWS.rst#twisted-2030-2020-03-13', 'https://github.com/advisories/GHSA-p5xh-vx83-mxcj', 'https://usn.ubuntu.com/4308-2/'}
null
{'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}
{'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'}
GHSA
GHSA-jjcx-999m-35hc
Improper Input Validation in Firefly III
Firefly III 4.7.17.3 is vulnerable to local file enumeration. An attacker can enumerate local files due to the lack of protocol scheme sanitization, such as for file:/// URLs. This is related to fints_url to import/job/configuration, and import/create/fints.
{'CVE-2019-14671'}
2021-09-08T17:27:07Z
2021-09-08T17:27:07Z
LOW
3.3
{'CWE-20'}
{'https://github.com/advisories/GHSA-jjcx-999m-35hc', 'https://github.com/firefly-iii/firefly-iii/issues/2367', 'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14671'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c'}
{'https://github.com/firefly-iii/firefly-iii/commit/e80d616ef4397e6e764f6b7b7a5b30121244933c'}
GHSA
GHSA-j44m-qm6p-hp7m
Arbitrary File Overwrite in tar
Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. ## Recommendation For tar 4.x, upgrade to version 4.4.2 or later. For tar 2.x, upgrade to version 2.2.2 or later.
{'CVE-2018-20834'}
2021-08-03T21:28:27Z
2019-05-01T18:37:31Z
HIGH
7.5
{'CWE-59'}
{'https://hackerone.com/reports/344595', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834', 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://github.com/advisories/GHSA-j44m-qm6p-hp7m', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://www.npmjs.com/advisories/803'}
null
{'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}
{'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'}
GHSA
GHSA-6r7c-6w96-8pvw
Remote Code Execution in AjaxNetProfessional
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary .NET classes, which can be abused to gain remote code execution. ### Description Serialization is a process of converting an object into a sequence of bytes which can be persisted to a disk or database or can be sent through streams. The reverse process of creating object from sequence of bytes is called deserialization. Serialization is commonly used for communication (sharing objects between multiple hosts) and persistence (store the object state in a file or a database). It is an integral part of popular protocols like Remote Method Invocation (RMI), Java Management Extension (JMX), Java Messaging System (JMS), Action Message Format (AMF), Java Server Faces (JSF) ViewState, etc. Deserialization of untrusted data (CWE-502), is when the application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, letting the attacker to control the state or the flow of the execution. Java deserialization issues have been known for years. However, interest in the issue intensified greatly in 2015, when classes that could be abused to achieve remote code execution were found in a popular library (Apache Commons Collection). These classes were used in zero-days affecting IBM WebSphere, Oracle WebLogic and many other products. An attacker just needs to identify a piece of software that has both a vulnerable class on its path, and performs deserialization on untrusted data. Then all they need to do is send the payload into the deserializer, getting the command executed. Developers put too much trust in Java Object Serialization. Some even de-serialize objects pre-authentication. When deserializing an Object in Java you typically cast it to an expected type, and therefore Java's strict type system will ensure you only get valid object trees. Unfortunately, by the time the type checking happens, platform code has already created and executed significant logic. So, before the final type is checked a lot of code is executed from the readObject() methods of various objects, all of which is out of the developer's control. By combining the readObject() methods of various classes which are available on the classpath of the vulnerable application an attacker can execute functions (including calling Runtime.exec() to execute local OS commands). ### Releases Releases before version 21.11.29.1 are affected. Please be careful to download any binary DLL from other web sites, especially we found NuGet packages not owned by us that contain vulnerable versions. ### Workarounds There is no workaround available that addresses all issues except updating to latest version from GitHub. ### References Find original CVE posting here: https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971 Note: the official Ajax.NET Professional (AjaxPro) NuGet package is available here: https://www.nuget.org/packages/AjaxNetProfessional/ ### For more information If you have any questions or comments about this advisory: * Open an issue on this GitHub repository
null
2022-04-19T19:03:17Z
2021-12-07T21:21:49Z
CRITICAL
9.8
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23758', 'https://github.com/advisories/GHSA-6r7c-6w96-8pvw', 'https://security.snyk.io/vuln/SNYK-DOTNET-AJAXPRO2-1925971', 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57', 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-6r7c-6w96-8pvw'}
null
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
{'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/b0e63be5f0bb20dfce507cb8a1a9568f6e73de57'}
GHSA
GHSA-hqq7-2q2v-82xq
Cross-site Scripting in sanitize-url
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
{'CVE-2021-23648'}
2022-04-22T14:58:23Z
2022-03-17T00:00:24Z
MODERATE
5.4
{'CWE-79'}
{'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sanitize-url/blob/main/src/index.ts%23L11', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648', 'https://lists.fedoraproject.org/archives/list/[email protected]/message/2PFW6Q2LXXWTFRTMTRN4ZGADFRQPKJ3D/', 'https://snyk.io/vuln/SNYK-JS-BRAINTREESANITIZEURL-2339882', 'https://github.com/advisories/GHSA-hqq7-2q2v-82xq'}
null
{'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
{'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}
GHSA
GHSA-7x48-7466-3g33
Command injection in guake
Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method. **Note:** Exploitation requires the user to have installed another malicious program that will be able to send dbus signals or run terminal commands.
{'CVE-2021-23556'}
2022-04-05T18:49:12Z
2022-03-18T00:01:11Z
MODERATE
6.4
null
{'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888', 'https://github.com/Guake/guake/pull/2017', 'https://github.com/Guake/guake/issues/1796', 'https://github.com/Guake/guake/releases', 'https://github.com/pypa/advisory-database/tree/main/vulns/guake/PYSEC-2022-165.yaml', 'https://snyk.io/vuln/SNYK-PYTHON-GUAKE-2386334', 'https://github.com/advisories/GHSA-7x48-7466-3g33', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23556'}
null
{'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888'}
{'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e8a629781b888'}
GHSA
GHSA-9mxf-g3x6-wv74
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
{'CVE-2018-14721'}
2021-06-10T23:55:51Z
2019-01-04T19:07:06Z
CRITICAL
10
{'CWE-918'}
{'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1106', 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://seclists.org/bugtraq/2019/May/68', 'https://access.redhat.com/errata/RHSA-2019:1140', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.debian.org/security/2019/dsa-4452', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://github.com/FasterXML/jackson-databind/issues/2097', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://access.redhat.com/errata/RHSA-2019:1822'}
null
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
GHSA
GHSA-x4g7-fvjj-prg8
Division by 0 in `QuantizedConv2D`
### Impact An attacker can trigger a division by 0 in `tf.raw_ops.QuantizedConv2D`: ```python import tensorflow as tf input = tf.zeros([1, 1, 1, 1], dtype=tf.quint8) filter = tf.constant([], shape=[1, 0, 1, 1], dtype=tf.quint8) min_input = tf.constant(0.0) max_input = tf.constant(0.0001) min_filter = tf.constant(0.0) max_filter = tf.constant(0.0001) strides = [1, 1, 1, 1] padding = "SAME" tf.raw_ops.QuantizedConv2D(input=input, filter=filter, min_input=min_input, max_input=max_input, min_filter=min_filter, max_filter=max_filter, strides=strides, padding=padding) ``` This is because the [implementation](https://github.com/tensorflow/tensorflow/blob/00e9a4d67d76703fa1aee33dac582acf317e0e81/tensorflow/core/kernels/quantized_conv_ops.cc#L257-L259) does a division by a quantity that is controlled by the caller: ```cc const int filter_value_count = filter_width * filter_height * input_depth; const int64 patches_per_chunk = kMaxChunkSize / (filter_value_count * sizeof(T1)); ``` ### Patches We have patched the issue in GitHub commit [cfa91be9863a91d5105a3b4941096044ab32036b](https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b). The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Ying Wang and Yakun Zhang of Baidu X-Team.
{'CVE-2021-29527'}
2021-05-21T14:21:59Z
2021-05-21T14:21:59Z
LOW
2.5
{'CWE-369'}
{'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4g7-fvjj-prg8', 'https://github.com/advisories/GHSA-x4g7-fvjj-prg8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29527'}
null
{'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b'}
{'https://github.com/tensorflow/tensorflow/commit/cfa91be9863a91d5105a3b4941096044ab32036b'}
GHSA
GHSA-887w-45rq-vxgf
Moderate severity vulnerability that affects SQLAlchemy
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
{'CVE-2019-7164'}
2022-03-23T21:45:00Z
2019-04-16T15:50:41Z
CRITICAL
9.8
{'CWE-89'}
{'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html', 'https://github.com/advisories/GHSA-887w-45rq-vxgf', 'https://github.com/sqlalchemy/sqlalchemy/issues/4481', 'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414', 'https://nvd.nist.gov/vuln/detail/CVE-2019-7164', 'https://access.redhat.com/errata/RHSA-2019:0984', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:0981', 'https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html', 'https://www.oracle.com/security-alerts/cpujan2021.html'}
null
{'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414'}
{'https://github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414'}
GHSA
GHSA-82mg-x548-gq3j
LDAP Injection in ldapauth
Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter. ## Recommendation ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch available. Consider updating to use [ldapauth-fork](https://www.npmjs.com/package/ldapauth-fork) 2.3.3 or greater.
{'CVE-2015-7294'}
2021-09-23T19:58:04Z
2020-08-31T22:49:46Z
HIGH
7.5
{'CWE-90'}
{'https://www.npmjs.com/advisories/19', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'https://github.com/advisories/GHSA-82mg-x548-gq3j', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4', 'https://github.com/vesse/node-ldapauth-fork/issues/21', 'http://www.openwall.com/lists/oss-security/2015/09/21/2', 'http://www.openwall.com/lists/oss-security/2015/09/18/4'}
null
{'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}
{'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'}
GHSA
GHSA-9c78-vcq7-7vxq
Out of bounds write in TFLite
### Impact An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. ### Patches We have patched the issue in GitHub commit [6c0b2b70eeee588591680f5b7d5d38175fd7cdf6](https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6). The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. ### For more information Please consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions. ### Attribution This vulnerability has been reported by Wang Xuan of Qihoo 360 AIVul Team.
{'CVE-2022-23561'}
2022-02-11T15:07:45Z
2022-02-09T23:53:47Z
HIGH
8.8
{'CWE-787'}
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23561', 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq', 'https://github.com/advisories/GHSA-9c78-vcq7-7vxq'}
null
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6'}
{'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6'}
GHSA
GHSA-xmc8-26q4-qjhx
Denial of Service (DoS) in Jackson Dataformat CBOR
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
{'CVE-2020-28491'}
2022-02-09T18:27:40Z
2021-12-09T19:17:21Z
HIGH
7.5
{'CWE-770'}
{'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://github.com/advisories/GHSA-xmc8-26q4-qjhx', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28491'}
null
{'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
{'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
GHSA
GHSA-rp42-c45j-g46x
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4107'}
2021-12-16T14:12:23Z
2021-12-16T14:12:23Z
MODERATE
5.3
{'CWE-79'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89', 'https://huntr.dev/bounties/1d124520-cf29-4539-a0f3-6d041af7b5a8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4107', 'https://github.com/advisories/GHSA-rp42-c45j-g46x'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/a062d3d5fecb000db207a2ad8a446db97ad96b89'}
GHSA
GHSA-9c5c-5j4h-8q2c
bookstack is vulnerable to Improper Access Control.
bookstack prior to version 21.11.3 is vulnerable to Improper Access Control.
{'CVE-2021-4119'}
2022-01-04T19:34:01Z
2021-12-16T19:40:26Z
MODERATE
5.3
{'CWE-284'}
{'https://github.com/advisories/GHSA-9c5c-5j4h-8q2c', 'https://huntr.dev/bounties/135f2d7d-ab0b-4351-99b9-889efac46fca', 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4119', 'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}
null
{'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}
{'https://github.com/bookstackapp/bookstack/commit/e765e618547c92f4e0b46caca6fb91f0174efd99'}
GHSA
GHSA-24r8-fm9r-cpj2
Low severity vulnerability that affects com.linecorp.armeria:armeria
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function ### Impact String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implementation of `equals` method from `java.lang.String`. While this attack is not practically possible, an attacker still has a potential to attack if the victim's server validates user by using `equals` method. We would like to thank @chrsow for pointing out the issue. ## Potentially vulnerable codes https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/OAuth2Token.java#L54 https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/BasicToken.java#L64 ### Patches There are two options to patch this issue. 1. Remove `equals` method; it has been exclusively used for test cases and was never used in any OSS projects that are using Armeria. (But it is worth noting that there are possibilities of closed projects authenticating users by utilizing `equals` method) 2. Use `MessageDigest.isEqual` to compare the credential instead. ### Workarounds 1. Update to the latest version (TBD) 2-1. Users can prevent these vulnerabilities by modifying and implementing timing attack preventions by themselves. 2-2. Precisely speaking, it is possible to compare credentials by securely comparing them after calling methods to directly return the input (namely `Object. accessToken()`, `Object.username()` and `Object.password()`). ### References - https://cwe.mitre.org/data/definitions/208.html - https://security.stackexchange.com/questions/111040/should-i-worry-about-remote-timing-attacks-on-string-comparison ### Side Note Since it is a theoretical attack, there is no PoC available from neither the vendor nor the security team.
{'CVE-2019-16771'}
2022-04-19T19:02:23Z
2019-12-05T18:40:51Z
LOW
4.8
{'CWE-113'}
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771'}
null
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}
GHSA
GHSA-p2j7-6g9h-32xh
Cross site scripting in Shopizer
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
{'CVE-2022-23059'}
2022-04-12T21:59:09Z
2022-03-30T00:00:27Z
MODERATE
5.4
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://github.com/advisories/GHSA-p2j7-6g9h-32xh', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}
GHSA
GHSA-q6j3-c4wc-63vw
CSRF tokens leaked in URL by canned query form
### Impact The HTML form for a read-only canned query includes the hidden CSRF token field added in #798 for writable canned queries (#698). This means that submitting those read-only forms exposes the CSRF token in the URL - for example on https://latest.datasette.io/fixtures/neighborhood_search submitting the form took me to: https://latest.datasette.io/fixtures/neighborhood_search?text=down&csrftoken=CSRFTOKEN-HERE This token could potentially leak to an attacker if the resulting page has a link to an external site on it and the user clicks the link, since the token would be exposed in the referral logs. ### Patches A fix for this issue has been released in Datasette 0.46. ### Workarounds You can fix this issue in a Datasette instance without upgrading by copying the [0.46 query.html template](https://raw.githubusercontent.com/simonw/datasette/0.46/datasette/templates/query.html) into a custom `templates/` directory and running Datasette with the `--template-dir=templates/` option. ### References Issue 918 discusses this in details: https://github.com/simonw/datasette/issues/918 ### For more information Contact swillison at gmail with any questions.
null
2021-09-23T18:50:16Z
2020-08-11T14:54:40Z
MODERATE
4.3
{'CWE-200'}
{'https://snyk.io/vuln/SNYK-PYTHON-DATASETTE-598229', 'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b', 'https://github.com/advisories/GHSA-q6j3-c4wc-63vw', 'https://github.com/simonw/datasette/security/advisories/GHSA-q6j3-c4wc-63vw', 'https://github.com/simonw/datasette/issues/918'}
null
{'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b'}
{'https://github.com/simonw/datasette/commit/7f10f0f7664d474c1be82bf668829e3b736a3d2b'}
GHSA
GHSA-f8xq-q7px-wg8c
Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging
### Impact The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could lead to arbitrary commands running on the user's computer. ### Patches The problem has been patched as of `2.8.11`, which escapes the data saved to the csv with single quotes. ### Workarounds If you are using an older version of `gradio`, don't open csv files generated by `gradio` with Excel or similar spreadsheet programs.
{'CVE-2022-24770'}
2022-03-22T12:44:43Z
2022-03-18T23:11:43Z
HIGH
8.8
{'CWE-1236'}
{'https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c', 'https://github.com/gradio-app/gradio/pull/817', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24770', 'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239', 'https://github.com/advisories/GHSA-f8xq-q7px-wg8c'}
null
{'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239'}
{'https://github.com/gradio-app/gradio/commit/80fea89117358ee105973453fdc402398ae20239'}
GHSA
GHSA-3pcq-34w5-p4g2
forEachSeries and forEachLimit do not limit the number of requests
### Impact This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. ### Patches The problem has been patched in 1.0.4. ### Workarounds There is no workaround aside from upgrading to 1.0.4.
{'CVE-2021-41167'}
2021-10-27T17:05:59Z
2021-10-21T17:49:30Z
HIGH
7.5
{'CWE-400'}
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/advisories/GHSA-3pcq-34w5-p4g2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41167'}
null
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}
{'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'}