Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nulllengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
3
183
details
stringlengths
9
12.9k
severity
stringlengths
2
92
affected
stringlengths
84
2.74k
references
stringlengths
99
16.4k
database_specific
stringlengths
131
210
1.4.0
GHSA-76f4-fw33-6j2v
2021-10-08T21:23:41Z
2021-04-19T14:48:26Z
null
[]
Potential sensitive data exposure in applications using Vaadin 15
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` - https://vaadin.com/security/cve-2020-36319
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2020-36319'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:14:31Z', 'nvd_published_at': None}
1.4.0
GHSA-w3hj-wr2q-x83g
2021-03-30T17:04:34Z
2021-04-06T17:22:17Z
null
[]
Discovery uses the same AES/GCM Nonce throughout the session
Discovery uses the same AES/GCM Nonce throughout the session though it should be generated on per message basis which can lead to the leaking of the session key. As the actual ENR record is signed with a different key it is not possible for an attacker to alter the ENR record. Note that the node private key is not com...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.pegasys.discovery:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ConsenSys/discovery/security/advisories/GHSA-w3hj-wr2q-x83g'}]
{'cwe_ids': ['CWE-323'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:04:34Z', 'nvd_published_at': None}
1.4.0
GHSA-hmw2-mvvh-jf5j
2021-04-08T22:25:20Z
2021-04-13T15:22:47Z
null
['CVE-2019-10801']
OS Command Injection in enpeem
enpeem through 2.2.0 allows execution of arbitrary commands. The "options.dir" argument is provided to the "exec" function without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'enpeem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10801'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T22:25:20Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}
1.4.0
GHSA-5fjj-cfh2-ghc5
2021-04-06T22:34:40Z
2021-04-13T15:25:24Z
null
['CVE-2020-8128']
Server-Side Request Forgery and Inclusion of Functionality from Untrusted Control Sphere in jsreport
An unintended require and server-side request forgery vulnerabilities in jsreport version 2.5.0 and earlier allow attackers to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsreport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8128'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/660565'}]
{'cwe_ids': ['CWE-829', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:34:40Z', 'nvd_published_at': '2020-02-14T22:15:00Z'}
1.4.0
GHSA-7xc5-ggpp-g249
2023-08-07T11:51:29Z
2021-04-20T16:13:24Z
null
['CVE-2020-28468']
pwntools Server-Side Template Injection (SSTI) vulnerability
This affects the package pwntools before 4.3.1. The shellcraft generator for affected versions of this module are vulnerable to Server-Side Template Injection (SSTI), which can lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pwntools'}, 'ecosystem_specific': {'affected_functions': ['pwnlib.shellcraft.pretty', 'pwnlib.constants.ConstantsModule.eval']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28468'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/issues/1427'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/pull/1732'}, {'type': 'WEB', 'url': 'https://github.com/Gallopsled/pwntools/commit/138188eb1c027a2...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:11:00Z', 'nvd_published_at': '2021-01-08T12:15:00Z'}
1.4.0
GHSA-3c67-gc48-983w
2023-08-31T20:35:31Z
2021-04-20T16:44:37Z
null
['CVE-2020-10691']
Path Traversal in Ansible
An archive traversal flaw was found in all ansible-engine versions 2.9.x prior to 2.9.7, when running `ansible-galaxy collection` install. When extracting a collection .tar.gz file, the directory is created without sanitizing the filename. An attacker could take advantage to overwrite any file within the system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10691'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68596'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/b2551bb6943eec078066aa3a923e0bb3ed85abe8'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:22:26Z', 'nvd_published_at': '2020-04-30T17:15:00Z'}
1.4.0
GHSA-mmhj-4w6j-76h7
2021-03-30T22:27:45Z
2021-04-06T17:22:55Z
null
['CVE-2021-21413']
Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate
Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. `Reference` objects allow access to the underlying reference's full prototype chain. In an environment where...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'isolated-vm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T22:27:45Z', 'nvd_published_at': '2021-03-30T23:15:00Z'}
1.4.0
GHSA-2xpj-f5g2-8p7m
2023-08-30T21:16:22Z
2021-04-20T16:30:51Z
null
['CVE-2020-17446']
Asyncpg Arbitrary Code Execution Via Access to an Uninitialized Pointer
asyncpg before 0.21.0 allows a malicious PostgreSQL server to trigger a crash or execute arbitrary code (on a database client) via a crafted server response, because of access to an uninitialized pointer in the array data decoder.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'asyncpg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17446'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/commit/69bcdf5bf7696b98ee708be5408fd7d854e910d0'}, {'type': 'WEB', 'url': 'https://github.com/MagicStack/asyncpg/releases/tag/v0.21.0'}, {'type': 'WEB', 'url': 'https://lists.de...
{'cwe_ids': ['CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T21:35:20Z', 'nvd_published_at': '2020-08-12T16:15:00Z'}
1.4.0
GHSA-rvcw-f68w-8h8h
2023-03-17T17:49:57Z
2021-04-19T15:00:05Z
null
['CVE-2021-29446']
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jose-node-cjs-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29446'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-cjs-runtime'}]
{'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:33Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}
1.4.0
GHSA-3pcr-4982-548m
2021-04-12T22:33:05Z
2021-04-13T15:13:37Z
null
[]
Exposure of .env if project root is configured as web root in shopware/production
### Impact The .env and other sensitive files can be leaked if the project root and not `/public` is configured as the web root. ### Patches We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. https://www.shopw...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/production'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-3pcr-4982-548m'}]
{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:33:05Z', 'nvd_published_at': None}
1.4.0
GHSA-67mq-h2r9-rh2m
2022-12-03T03:51:28Z
2021-04-13T15:23:41Z
null
['CVE-2020-28460']
Prototype pollution in multi-ini
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'multi-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460'}, {'type': 'WEB', 'url': 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:23:09Z', 'nvd_published_at': '2020-12-22T13:15:00Z'}
1.4.0
GHSA-6g3c-2mh5-7q6x
2023-09-25T16:03:47Z
2021-04-19T14:56:33Z
null
['CVE-2021-29451']
Missing validation of JWT signature in `ManyDesigns/Portofino`
### Impact [Portofino](https://github.com/ManyDesigns/Portofino) is an open source web development framework. Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. ### Patches The issue will be patched in the upcoming 5.2.1 release. ### For more info...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-dispatcher'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino-core'}, 'ecosystem_s...
[{'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T22:57:13Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}
1.4.0
GHSA-vp77-fqqp-79j8
2021-03-22T22:39:06Z
2021-04-13T15:20:27Z
null
['CVE-2020-28449']
Prototype Pollution in decal
This affects all versions of package decal. The vulnerability is in the set function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28449'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/set.js%23L45-L73'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051007'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}]
{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:39:06Z', 'nvd_published_at': '2021-02-04T15:15:00Z'}
1.4.0
GHSA-wq5h-f9p5-q7fx
2023-04-21T15:24:43Z
2021-04-20T14:02:30Z
null
['CVE-2021-29434']
Improper validation of URLs ('Cross-site Scripting') in Wagtail rich text fields
### Impact When saving the contents of a rich text field in the admin interface, Wagtail does not apply server-side checks to ensure that link URLs use a valid protocol. A malicious user with access to the admin interface could thus craft a POST request to publish content with `javascript:` URLs containing arbitrary co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ecosystem_specific': {'affected_functions': ['wagtail.admin.rich_text.converters.contentstate.link_entity']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2....
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-wq5h-f9p5-q7fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29434'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5c7a60977cba478f6a35390ba98cffc2bd41c8a4'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T18:46:26Z', 'nvd_published_at': '2021-04-19T19:15:00Z'}
1.4.0
GHSA-jh5x-hfhg-78jq
2023-07-05T23:21:42Z
2021-04-22T16:20:50Z
null
['CVE-2020-28948']
Deserialization of Untrusted Data in Archive_Tar
Archive_Tar through 1.4.10 allows an unserialization attack because `phar:` is blocked but `PHAR:` is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pear/archive_tar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28948'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}, {'type': 'PACKAGE', 'url': 'https://github.com/pear/Arc...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T00:18:26Z', 'nvd_published_at': '2020-11-19T19:15:00Z'}
1.4.0
GHSA-cwg9-c9cr-p5fq
2021-03-26T23:20:56Z
2021-04-13T15:18:53Z
null
['CVE-2021-28161']
Improper Neutralization of Input in Theia console
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@theia/console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/issues/8794'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T23:20:56Z', 'nvd_published_at': '2021-03-12T22:15:00Z'}
1.4.0
GHSA-5c66-v29h-xjh8
2021-04-20T18:36:33Z
2021-04-22T16:11:55Z
null
['CVE-2021-29459']
XSS Cross Site Scripting
### Impact It is possible to persistently inject scripts in XWiki. For unregistred users: - By filling simple text fields For registered users: - By filling their personal information - (if they have edit rights) By filling the values of static lists using App Within Minutes That can lead to user's session hijacking...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intro...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29459'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T18:36:33Z', 'nvd_published_at': '2021-04-20T19:15:00Z'}
1.4.0
GHSA-wgpj-7c2j-vfjm
2023-09-05T14:29:48Z
2021-04-08T16:33:38Z
null
['CVE-2021-30185']
Indico Tampering with links (e.g. password reset) in sent emails
### Impact An external audit of the Indico codebase has discovered a vulnerability in Indico's URL generation logic which could have allowed an attacker to make Indico send a password reset link with a valid token pointing to an attacker-controlled domain by sending that domain in the `Host` header. Had a user clicked ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'indico'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/indico/indico/security/advisories/GHSA-wgpj-7c2j-vfjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30185'}, {'type': 'WEB', 'url': 'https://github.com/indico/indico/releases/tag/v2.3.4'}, {'type': 'WEB', 'url': 'https://www.shorebreaksecurity.com/...
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T16:33:24Z', 'nvd_published_at': '2021-04-07T14:15:00Z'}
1.4.0
GHSA-4jj4-m52p-8rx3
2021-04-07T22:31:58Z
2021-04-13T15:24:08Z
null
['CVE-2020-28281']
Prototype pollution in set-object-value
Prototype pollution vulnerability in 'set-object-value' versions 0.0.0 through 0.0.5 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-object-value'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28281'}, {'type': 'WEB', 'url': 'https://github.com/react-atomic/react-atomic-organism/blob/e5645a2f9e632ffdebc83d720498831e09754c22/packages/lib/set-object-value/src/index.js#L16'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulne...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:31:58Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}
1.4.0
GHSA-7mx5-x372-xh87
2021-04-08T20:26:23Z
2021-04-20T16:40:27Z
null
['CVE-2020-17526']
Incorrect Session Validation in Apache Airflow
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17526'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r466759f377651f0a690475d5a52564d0e786e82c08d5a5730a4f8352@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbeeb73a6c741f2f9200d83b9c2220...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:26:23Z', 'nvd_published_at': '2020-12-21T17:15:00Z'}
1.4.0
GHSA-jff2-qjw8-5476
2021-04-29T17:22:56Z
2021-04-06T17:30:14Z
null
['CVE-2021-21388']
Command Injection Vulnerability in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a parameter check. Please upgrade to version >= 5.6.4 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do onl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-jff2-qjw8-5476'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21388'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/01ef56cd5824ed6da1c11b37013a027fdef67...
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T20:19:25Z', 'nvd_published_at': '2021-04-29T18:15:00Z'}
1.4.0
GHSA-x7wf-5mjc-6x76
2021-04-07T19:31:51Z
2021-04-07T21:13:44Z
null
['CVE-2020-28735']
SSRF attacks via tracebacks in Plone
Plone before 5.2.3 allows SSRF attacks via the tracebacks feature (only available to the Manager role).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28735'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:31:51Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}
1.4.0
GHSA-6rv4-4qv6-88g2
2021-04-12T17:39:01Z
2021-04-12T17:39:19Z
null
['CVE-2021-25913']
Prototype Pollution in set-or-get
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-or-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913'}, {'type': 'WEB', 'url': 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/set-or-get'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoft...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T17:38:22Z', 'nvd_published_at': '2021-02-08T22:15:00Z'}
1.4.0
GHSA-4gfq-6m28-m5mg
2021-03-19T23:11:49Z
2021-04-13T15:16:11Z
null
['CVE-2020-7775']
Improper neutralization of arguments in freediskspace
This affects all versions of package freediskspace. The vulnerability arises out of improper neutralization of arguments in line 71 of freediskspace.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'freediskspace'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7775'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FREEDISKSPACE-1040716'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T23:11:49Z', 'nvd_published_at': '2021-02-02T19:15:00Z'}
1.4.0
GHSA-cq8r-fc3q-6hg2
2021-04-06T20:51:59Z
2021-04-13T15:29:40Z
null
['CVE-2020-28479']
Denial of Service (DoS) via the unsetByPath function in jsjoints
The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jointjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}, {'type': 'WEB', 'url': 'https://github.com/clientIO/joint/releases/tag/v3.3.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:51:59Z', 'nvd_published_at': '2021-01-19T15:15:00Z'}
1.4.0
GHSA-j32x-j8pj-pg2h
2021-03-22T22:36:42Z
2021-04-13T15:20:34Z
null
['CVE-2020-28450']
Prototype Pollution in decal
This affects all versions of package decal. The vulnerability is in the extend function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'decal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28450'}, {'type': 'WEB', 'url': 'https://github.com/gigafied/decal.js/blob/master/src/utils/extend.js#L23-L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DECAL-1051028'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/decal'}]
{'cwe_ids': ['CWE-1321', 'CWE-400', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:36:42Z', 'nvd_published_at': '2021-02-04T15:15:00Z'}
1.4.0
GHSA-p62g-jhg6-v3rq
2023-08-31T20:32:30Z
2021-04-07T20:37:06Z
null
['CVE-2020-10684']
Code Injection, Race Condition, and Execution with Unnecessary Privileges in Ansible
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10684'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a9d2ceafe429171c0e2ad007058b88bae57c74ce'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-250', 'CWE-362', 'CWE-862', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:46:48Z', 'nvd_published_at': '2020-03-24T14:15:00Z'}
1.4.0
GHSA-crh4-294p-vcfq
2021-10-08T21:22:01Z
2021-04-19T14:53:20Z
null
[]
Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17
Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://va...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.4'}, {'fixed': '2.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-text-field-flow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0....
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/flow-components'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31405'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:12:10Z', 'nvd_published_at': None}
1.4.0
GHSA-4hv7-3q38-97m8
2021-04-06T23:35:22Z
2021-04-13T15:24:47Z
null
['CVE-2020-28464']
Arbitrary code execution in djv
This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'djv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/pull/98/files'}, {'type': 'WEB', 'url': 'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DJV-1014545'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:35:22Z', 'nvd_published_at': '2021-01-04T12:15:00Z'}
1.4.0
GHSA-xmxh-g7wj-8m4m
2021-04-13T15:32:15Z
2021-04-13T15:32:26Z
null
['CVE-2019-10789']
OS Command Injection in curling
npm package `curling` before version 1.1.0 is vulnerable to Command Injection via the run function. The command argument can be controlled by users without any sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'curling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10789'}, {'type': 'WEB', 'url': 'https://github.com/hgarcia/curling/blob/e861d625c074679a2931bcf4ce8da0afa8162c53/lib/curl-transport.js#L56'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CURLING-546484'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:13:03Z', 'nvd_published_at': '2020-02-06T16:15:00Z'}
1.4.0
GHSA-7cj4-gj8m-m2f7
2021-08-31T21:06:39Z
2021-04-22T16:13:23Z
null
['CVE-2020-17510']
Authentication bypass in Apache Shiro
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5753018...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T21:21:47Z', 'nvd_published_at': '2020-11-05T21:15:00Z'}
1.4.0
GHSA-934w-hvj4-7fr6
2021-08-02T15:38:02Z
2021-04-13T15:25:15Z
null
['CVE-2020-7762']
Path Traversal in jsreport-chrome-pdf
This affects the package jsreport-chrome-pdf before 1.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsreport-chrome-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762'}, {'type': 'WEB', 'url': 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:36:49Z', 'nvd_published_at': '2020-11-05T13:15:00Z'}
1.4.0
GHSA-ghhp-997w-qr28
2021-04-21T19:37:39Z
2021-04-21T19:38:01Z
null
['CVE-2021-26701']
.NET Core Remote Code Execution Vulnerability
.NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112. ### Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to upd...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Text.Encodings.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26701'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/178'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/'}, {'typ...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:37:39Z', 'nvd_published_at': '2021-02-25T23:15:00Z'}
1.4.0
GHSA-xv5h-v7jh-p2qh
2021-05-10T15:11:26Z
2021-04-27T20:09:25Z
null
['CVE-2021-29442']
Authentication bypass for specific endpoint
The [`ConfigOpsController`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java) lets the user perform management operations like querying the database or even wiping it out. While the [`/data/remove`](ht...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29442'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4463'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4517'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:49Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}
1.4.0
GHSA-rv39-3qh7-9v7w
2022-02-08T22:03:58Z
2021-04-30T17:29:51Z
null
['CVE-2020-5421']
Improper Input Validation in Spring Framework
In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-framework-bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.8'}}, {'package': {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5421'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a5...
{'cwe_ids': ['CWE-35'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T21:06:49Z', 'nvd_published_at': '2020-09-19T04:15:00Z'}
1.4.0
GHSA-36hp-jr8h-556f
2021-05-10T14:56:08Z
2021-04-27T20:09:17Z
null
['CVE-2021-29441']
Authentication Bypass
When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L8...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/4701'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/pull/4703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-36hp-jr8h-556f'}]
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T20:08:38Z', 'nvd_published_at': '2021-04-27T21:15:00Z'}
1.4.0
GHSA-3pqx-4fqf-j49f
2022-01-04T19:49:51Z
2021-04-20T16:40:42Z
null
['CVE-2019-20477']
Deserialization of Untrusted Data in PyYAML
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1'}, {'fixed': '5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20477'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedora...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T19:24:04Z', 'nvd_published_at': '2020-02-19T04:15:00Z'}
1.4.0
GHSA-gg2g-m5wc-vccq
2021-04-16T22:53:30Z
2021-04-06T18:36:40Z
null
['CVE-2021-21423']
Rebuild-bot workflow may allow unauthorised repository modifications
### Impact `projen` is a project generation tool that synthesizes project configuration files such as `package.json`, `tsconfig.json`, `.gitignore`, GitHub Workflows, `eslint`, `jest`, and more, from a well-typed definition written in JavaScript. Users of projen's `NodeProject` project type (including any project type...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'projen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.16.41'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/projen/projen/security/advisories/GHSA-gg2g-m5wc-vccq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21423'}, {'type': 'WEB', 'url': 'https://github.com/projen/projen/commit/36030c6a4b1acd0054673322612e7c70e9446643'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-527'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T18:36:19Z', 'nvd_published_at': '2021-04-06T19:15:00Z'}
1.4.0
GHSA-77g3-3j5w-64w4
2021-08-31T21:10:36Z
2021-04-07T20:36:46Z
null
['CVE-2020-10685']
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
A flaw was found in Ansible Engine affecting Ansible Engine versions 2.7.x before 2.7.17 and 2.8.x before 2.8.11 and 2.9.x before 2.9.7 as well as Ansible Tower before and including versions 3.4.5 and 3.5.5 and 3.6.3 when using modules which decrypts vault files such as assemble, script, unarchive, win_copy, aws_s3 or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.17'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11'}]}]}, {'package': {'ecosystem...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10685'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/68433'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10685'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-377', 'CWE-459', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T14:11:30Z', 'nvd_published_at': '2020-05-11T14:15:00Z'}
1.4.0
GHSA-7fjp-g4m7-fx23
2021-04-12T20:05:57Z
2021-04-13T15:12:26Z
null
[]
User (Encrypted) Password Field Being Serialised
### Impact Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed. ### Patches Issue has been patched in version 0.3.7-beta and onwards. ### Workarounds Add the 'password' field to the Users model file ...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'pwweb/laravel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.6-beta'}}]
[{'type': 'WEB', 'url': 'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T20:05:57Z', 'nvd_published_at': None}
1.4.0
GHSA-f7vx-j8mp-3h2x
2021-03-29T22:11:05Z
2021-04-13T15:18:01Z
null
['CVE-2019-17636']
Insufficient Verification of Data Authenticity in Eclipse Theia
In Eclipse Theia versions 0.3.9 through 0.15.0, one of the default pre-packaged Theia extensions is "Mini-Browser", published as "@theia/mini-browser" on npmjs.com. This extension, for its own needs, exposes a HTTP endpoint that allows to read the content of files on the hosts filesystem, given their path, without rest...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@theia/mini-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.9'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17636'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/pull/7205'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-theia/theia/commit/b212d07f915df1509180944ee3132714bc2636bf'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/...
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:11:05Z', 'nvd_published_at': '2020-03-10T15:15:00Z'}
1.4.0
GHSA-45w5-pvr8-4rh5
2021-03-26T22:09:16Z
2021-04-13T15:19:14Z
null
['CVE-2021-26275']
Command injection in eslint-fixer
The eslint-fixer package through 0.1.5 for Node.js allows command injection via shell metacharacters to the fix function. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. The ozum/eslint-fixer GitHub repository has been intentionally deleted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'eslint-fixer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26275'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4774'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/eslint-fixer'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:09:16Z', 'nvd_published_at': '2021-03-19T00:15:00Z'}
1.4.0
GHSA-rmp7-f2vp-3rq4
2023-08-30T22:09:23Z
2021-04-20T16:31:54Z
null
['CVE-2021-25925']
Cross-site scripting in SiCKRAGE
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25925'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:56:03Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}
1.4.0
GHSA-43ch-2h55-2vj7
2021-03-29T21:49:55Z
2021-04-13T15:18:17Z
null
['CVE-2020-28360']
Server-Side Request Forgery in private-ip
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request se...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'private-ip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}, {'type': 'WEB', 'url': 'https://github.com/frenchbread/private-ip'}, {'type': 'WEB', 'url': 'https://johnjhacking.com/blog...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T21:49:55Z', 'nvd_published_at': '2020-11-23T21:15:00Z'}
1.4.0
GHSA-h73g-8g27-xxcx
2021-04-08T21:59:12Z
2021-04-13T15:22:58Z
null
['CVE-2020-28439']
Command injection in corenlp-js-prefab
This affects all versions of package corenlp-js-prefab. The injection point is located in line 10 in 'index.js.' It depends on a vulnerable package 'corenlp-js-interface.'
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'corenlp-js-prefab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28439'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CORENLPJSPREFAB-1050434'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:59:12Z', 'nvd_published_at': '2020-12-11T17:15:00Z'}
1.4.0
GHSA-836c-xg97-8p4h
2023-08-07T13:07:47Z
2021-04-30T17:34:48Z
null
['CVE-2020-27197']
libtaxii Server-Side Request Forgery vulnerability
"TAXII libtaxii through 1.1.117, as used in EclecticIQ OpenTAXII through 0.2.0 and other products, allows SSRF via an initial http:// substring to the parse method, even when the no_network setting is used for the XML parser. NOTE: the vendor points out that the parse method "wraps the lxml library" and that this may b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'libtaxii'}, 'ecosystem_specific': {'affected_functions': ['libtaxii.common.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.118'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27197'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/issues/246'}, {'type': 'WEB', 'url': 'https://github.com/eclecticiq/OpenTAXII/issues/176'}, {'type': 'WEB', 'url': 'https://github.com/TAXIIProject/libtaxii/pull/247'}, {'typ...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:53:43Z', 'nvd_published_at': '2020-10-17T20:15:00Z'}
1.4.0
GHSA-qfxv-qqvg-24pg
2021-03-29T22:57:19Z
2021-04-13T15:17:36Z
null
['CVE-2019-10788']
OS Command Injection in im-metadata
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'im-metadata'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788'}, {'type': 'WEB', 'url': 'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:57:19Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}
1.4.0
GHSA-vwfx-hh3w-fj99
2021-03-31T17:35:42Z
2021-04-06T17:24:14Z
null
['CVE-2021-21418']
Potential XSS injection in the newsletter conditions field
### Impact An employee can inject javascript in the newsletter condition field that will then be executed on the front office ### Patches The issue has been fixed in 2.6.1
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/ps_emailsubscription'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21418'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b7...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T17:35:42Z', 'nvd_published_at': '2021-03-31T18:15:00Z'}
1.4.0
GHSA-75xc-qvxh-27f8
2021-04-16T23:15:02Z
2021-04-19T14:51:06Z
null
['CVE-2021-31403']
Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack - https://vaadin.com/security/cve-2021-31403
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.7.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.12.3'...
[{'type': 'WEB', 'url': 'https://github.com/vaadin/framework/security/advisories/GHSA-75xc-qvxh-27f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31403'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pull/12188'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/framework/pu...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:02Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-58f5-hfqc-jgch
2021-04-16T23:01:38Z
2021-04-19T14:57:22Z
null
['CVE-2021-29443']
Padding Oracle Attack due to Observable Timing Discrepancy in jose
jose is an npm library providing a number of cryptographic operations. ### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'npm',...
[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-58f5-hfqc-jgch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29443'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose'}]
{'cwe_ids': ['CWE-203', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:01:38Z', 'nvd_published_at': '2021-04-16T18:15:00Z'}
1.4.0
GHSA-7jgj-8wvc-jh57
2021-04-21T19:15:50Z
2021-04-21T19:16:06Z
null
['CVE-2018-8292']
.NET Core Information Disclosure
An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Net.Http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8292'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/88'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2902'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T19:15:50Z', 'nvd_published_at': None}
1.4.0
GHSA-6hrm-jqp3-64cv
2023-01-26T22:35:31Z
2021-04-13T15:42:36Z
null
['CVE-2020-24393']
Improper Certificate Validation in TweetStream
TweetStream 2.6.1 uses the library eventmachine in an insecure way that does not have TLS hostname validation. This allows an attacker to perform a man-in-the-middle attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'tweetstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24393'}, {'type': 'PACKAGE', 'url': 'https://github.com/tweetstream/tweetstream'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2020-096-tweetstream-tweetstream'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:54:38Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}
1.4.0
GHSA-qg7c-q3vq-rgxr
2021-04-12T22:32:54Z
2021-04-13T15:13:26Z
null
[]
Leak of information via Store-API aggregations in shopware/platform and shopware/core
### Impact Leak of information via Store-API ### Patches We recommend to update to the current version 6.3.5.3. You can get the update to 6.3.5.3 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1 and 6.2, ...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.5.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': ...
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-qg7c-q3vq-rgxr'}]
{'cwe_ids': ['CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T22:32:54Z', 'nvd_published_at': None}
1.4.0
GHSA-8hw9-22v6-9jr9
2021-04-16T23:04:15Z
2021-04-19T15:14:33Z
null
['CVE-2021-29452']
Any logged in user could edit any other logged in user.
### Impact Everyone who is running a12n-server. A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. ### Patches Patched in v0.18.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@curveball/a12n-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.18.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/@curveball/a12n-server'}]
{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:04:15Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}
1.4.0
GHSA-4vp3-vfww-8648
2021-04-09T22:11:38Z
2021-04-13T15:48:05Z
null
['CVE-2020-29454']
Incorrect permission enforcement in UmbracoCms
Editors/LogViewerController.cs in Umbraco through 8.9.1 allows a user to visit a logviewer endpoint even if they lack Applications.Settings access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29454'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/pull/9361'}]
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:11:38Z', 'nvd_published_at': '2020-12-02T02:15:00Z'}
1.4.0
GHSA-35mm-cc6r-8fjp
2023-08-08T15:34:06Z
2021-04-07T20:58:47Z
null
['CVE-2020-8264']
Cross-site scripting in actionpack
In actionpack gem >= 6.0.0, a possible XSS vulnerability exists when an application is running in development mode allowing an attacker to send or embed (in another page) a specially crafted URL which can allow the attacker to execute JavaScript in the context of the local application. This vulnerability is in the Acti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8264'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/904059'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8264.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rubyonr...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T23:19:13Z', 'nvd_published_at': '2021-01-06T21:15:00Z'}
1.4.0
GHSA-25xc-jwfq-39jw
2022-08-15T20:03:44Z
2021-04-19T14:50:49Z
null
['CVE-2021-31407']
OSGi applications using Vaadin 12-14 and 19 vulnerable to server classes and resources exposure
Vulnerability in OSGi integration in `com.vaadin:flow-server` versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request. - https://vaadin.com/security/cve-2021-31407
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.7'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'t...
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-25xc-jwfq-39jw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31407'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/osgi/issues/50'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10229'}, {'ty...
{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:42Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-64x2-gq24-75pv
2021-04-20T22:19:53Z
2021-04-22T16:15:23Z
null
['CVE-2020-13954']
Cross-site scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack via the styleSheetPath, which allows a malicious actor to inject javascript into the web page. This vulnerability affects all ve...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13954'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69bf9ae064dd100364cd8a15f0b3ec@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r51fdd73548290b2dfd0b48f7ab69b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T22:19:53Z', 'nvd_published_at': '2020-11-12T13:15:00Z'}
1.4.0
GHSA-h8hx-2c5r-32cf
2021-04-13T17:01:38Z
2021-04-13T17:01:50Z
null
['CVE-2021-29435']
Cross-Site Request Forgery (CSRF) in trestle-auth
### Impact A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. ### Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'trestle-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-32cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29435'}, {'type': 'WEB', 'url': 'https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8dfe3a23c11dc'}, {'type'...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:01:38Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}
1.4.0
GHSA-c6c4-7x48-4cqp
2021-10-08T21:24:15Z
2021-04-19T14:47:47Z
null
[]
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:vaadin-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '14.4...
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-c6c4-7x48-4cqp'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31404'}]
{'cwe_ids': ['CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:13:25Z', 'nvd_published_at': None}
1.4.0
GHSA-67mm-m3wx-j7fr
2022-04-27T19:13:33Z
2021-04-13T15:15:29Z
null
['CVE-2021-26541']
Command injection in gitlog
The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'gitlog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26541'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65'}, {'type': 'WEB', 'url': 'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:05:05Z', 'nvd_published_at': '2021-02-08T17:15:00Z'}
1.4.0
GHSA-qr9h-vr5p-pwwx
2022-04-18T21:56:34Z
2021-04-12T18:59:11Z
null
['CVE-2020-27543']
Denial of Service (DoS) in restify-paginate
The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'restify-paginate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27543'}, {'type': 'PACKAGE', 'url': 'https://github.com/paulvarache/restify-paginate/'}, {'type': 'WEB', 'url': 'https://github.com/secoats/cve/tree/master/CVE-2020-27543_dos_restify-paginate'}, {'type': 'WEB', 'url': 'https://security.netapp.com/a...
{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-16T00:43:59Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}
1.4.0
GHSA-mm4f-47ch-f7hx
2022-07-05T18:00:53Z
2021-04-13T15:32:43Z
null
['CVE-2021-23363']
Arbitrary code execution in kill-by-port
This affects the package kill-by-port before 0.0.2. If (attacker-controlled) user input is given to the killByPort function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'kill-by-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23363'}, {'type': 'WEB', 'url': 'https://github.com/GuyMograbi/kill-by-port/commit/ea5b1f377e196a4492e05ff070eba8b30b7372c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/GuyMograbi/kill-by-port'}, {'type': 'WEB', 'url': 'https://github.com/GuyM...
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:18:57Z', 'nvd_published_at': '2021-03-30T15:15:00Z'}
1.4.0
GHSA-c9g6-9335-x697
2021-04-06T21:47:25Z
2021-04-13T15:27:51Z
null
['CVE-2020-7693']
Improper Input Validation in SocksJS-Node
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'sockjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/issues/252'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/pull/265'}, {'type': 'WEB', 'url': 'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:47:25Z', 'nvd_published_at': '2020-07-09T14:15:00Z'}
1.4.0
GHSA-m496-x567-f98c
2021-04-30T20:19:58Z
2021-04-22T16:10:49Z
null
['CVE-2021-21426']
Fixes a bug in Zend Framework's Stream HTTP Wrapper
### Impact CVE-2021-3007: Backport of Zend_Http_Response_Stream, added certain type checking as a way to prevent exploitation. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3007 This vulnerability is caused by the unsecured deserialization of an object. In versions higher than Zend Framework 3.0.0, the attac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.4.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 19.4.12'}}, {'package': {'ecosystem': 'Packagist', 'name': 'openmage/magento-lts'}, 'ranges': ...
[{'type': 'WEB', 'url': 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-m496-x567-f98c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21426'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-21T20:16:53Z', 'nvd_published_at': '2021-04-21T21:15:00Z'}
1.4.0
GHSA-xgxc-v2qg-chmh
2021-04-30T20:43:54Z
2021-04-08T18:11:48Z
null
['CVE-2021-28658']
Directory Traversal in Django
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'Py...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28658'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/3.1/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/django-announce/c/ePr5j-ngdPU'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T18:11:26Z', 'nvd_published_at': '2021-04-06T15:15:00Z'}
1.4.0
GHSA-9w49-m7xh-5r39
2021-04-09T21:59:25Z
2021-04-20T16:37:56Z
null
['CVE-2020-29456']
Cross-site scripting in papermerge
Multiple cross-site scripting (XSS) vulnerabilities in Papermerge before 1.5.2 allow remote attackers to inject arbitrary web script or HTML via the rename, tag, upload, or create folder function. The payload can be in a folder, a tag, or a document's filename. If email consumption is configured in Papermerge, a malici...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'papermerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29456'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/ciur/papermerge/releases/tag/v1.5.2'}, {'type': 'WEB', 'url': 'https://www.papermerge.com/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:59:25Z', 'nvd_published_at': '2020-12-02T08:15:00Z'}
1.4.0
GHSA-73xv-w5gp-frxh
2022-02-08T22:01:10Z
2021-04-30T16:14:15Z
null
['CVE-2020-28052']
Logic error in Legion of the Bouncy Castle BC Java
An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15to18'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'fixed': '1.67'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.65'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2...
{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T00:15:55Z', 'nvd_published_at': '2020-12-18T01:15:00Z'}
1.4.0
GHSA-jxg6-fhwc-9v9c
2021-03-23T19:29:27Z
2021-04-13T15:19:39Z
null
['CVE-2020-28501']
Regular Expression Denial of Service (ReDoS) in es6-crawler-detect
This affects the package es6-crawler-detect before 3.1.3. No limitation of user agent string length supplied to regex operators.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'es6-crawler-detect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28501'}, {'type': 'WEB', 'url': 'https://github.com/JefferyHus/es6-crawler-detect/pull/27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ES6CRAWLERDETECT-1051529'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-23T19:29:27Z', 'nvd_published_at': '2021-03-22T12:15:00Z'}
1.4.0
GHSA-26vr-8j45-3r4w
2022-08-10T23:33:55Z
2021-04-06T17:31:30Z
null
['CVE-2021-28165']
Jetty vulnerable to incorrect handling of invalid large TLS frame, exhausting CPU resources
### Impact When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. ### Workarounds The problem can be worked around by compiling the following cl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.2.2'}, {'fixed': '9.4.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ecosystem_specif...
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-26vr-8j45-3r4w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28165'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.htm...
{'cwe_ids': ['CWE-400', 'CWE-551', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:02:13Z', 'nvd_published_at': '2021-04-01T15:15:00Z'}
1.4.0
GHSA-8cr8-4vfw-mr7h
2022-08-22T19:43:17Z
2021-04-30T17:30:37Z
null
['CVE-2021-28965']
REXML round-trip instability
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rexml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28965'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/2fe62e29094d95921d7e19abbd2e26b23d78dc5b'}, {'type': 'WEB', 'url': 'https://github.com/ruby/rexml/commit/3c137eb119550874b2b3e27d12b733ca67033377'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-115', 'CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:31:39Z', 'nvd_published_at': '2021-04-21T07:15:00Z'}
1.4.0
GHSA-58c7-px5v-82hh
2023-03-30T14:48:14Z
2021-04-06T17:28:59Z
null
['CVE-2021-21416']
Potential sensitive information disclosed in error reports
django-registration is a user-registration application for Django. ### Impact The django-registration package provides tools for implementing user-account registration flows in the Django web framework. In django-registration prior to 3.1.2, the base user-account registration view did not properly apply filters to s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-registration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/security/advisories/GHSA-58c7-px5v-82hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21416'}, {'type': 'WEB', 'url': 'https://github.com/ubernostrum/django-registration/commit/2db0bb7ec35636ea46b07b146328b87b2cb13ca...
{'cwe_ids': ['CWE-201', 'CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:03:08Z', 'nvd_published_at': '2021-04-01T22:15:00Z'}
1.4.0
GHSA-ph32-23p8-9rw5
2021-07-28T18:30:26Z
2021-04-13T15:17:45Z
null
['CVE-2019-10786']
Improper Input Validation in network-manager
network-manager through 1.0.2 allows remote attackers to execute arbitrary commands via the "execSync()" argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'network-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10786'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NETWORKMANAGER-544035'}]
{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:36:25Z', 'nvd_published_at': '2020-02-04T21:15:00Z'}
1.4.0
GHSA-78vq-9j56-wrfr
2023-08-29T12:13:04Z
2021-04-30T17:29:15Z
null
['CVE-2020-25739']
Gon gem lack of escaping certain input when outputting as JSON
An issue was discovered in the gon gem before gon-6.4.0 for Ruby. MultiJson does not honor the escape_mode parameter to escape fields as an XSS protection mechanism. To mitigate, json_dumper.rb in gon now does escaping for XSS by default without relying on MultiJson.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25739'}, {'type': 'WEB', 'url': 'https://github.com/gazay/gon/commit/fe3c7b2191a992386dc9edd37de5447a4e809bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gazay/gon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/ma...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-28T15:05:22Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}
1.4.0
GHSA-r96p-v3cr-gfv8
2021-07-29T20:42:20Z
2021-04-13T15:28:01Z
null
['CVE-2020-28470']
Cross-site Scripting (XSS) in @scullyio/scully
This affects the package @scullyio/scully before 1.0.9. The transfer state is serialised with the JSON.stringify() function and then written into the HTML page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@scullyio/scully'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28470'}, {'type': 'WEB', 'url': 'https://github.com/scullyio/scully/pull/1182'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SCULLYIOSCULLY-1055829'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:40:15Z', 'nvd_published_at': '2021-01-14T10:15:00Z'}
1.4.0
GHSA-gqvf-892r-vjm5
2023-07-05T19:26:32Z
2021-04-13T15:42:19Z
null
['CVE-2020-7942']
Improper Certificate Validation in Puppet
Previously, Puppet operated on the model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.13.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7942'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puppet/CVE-2020-7942.yml'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2020-7942/'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T23:15:22Z', 'nvd_published_at': '2020-02-19T21:15:00Z'}
1.4.0
GHSA-72rj-36qc-47g7
2023-08-25T22:09:00Z
2021-04-27T15:54:52Z
null
['CVE-2021-31671']
Pgsync Contains Cleartext Transmission of Sensitive Information
pgsync before 0.6.7 is affected by Information Disclosure of sensitive information. Syncing the schema with the `--schema-first` and `--schema-only` options is mishandled. For example, the sslmode connection parameter may be lost, which means that SSL would not be used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pgsync'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31671'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/issues/121'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/commit/05cd18f5fc09407e4b544f2c12f819cabc50c40e'}, {'type': 'WEB', 'url': 'https://github.com/ankane/pgsync/blo...
{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T15:54:16Z', 'nvd_published_at': '2021-04-27T03:15:00Z'}
1.4.0
GHSA-333x-qr3v-g4xx
2021-04-05T19:04:46Z
2021-04-13T15:30:16Z
null
['CVE-2020-7782']
Command injection in spritesheet-js
This affects all versions of package spritesheet-js. It depends on a vulnerable package platform-command. The injection point is located in line 32 in lib/generator.js, which is triggered by main entry of the package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'spritesheet-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7782'}, {'type': 'WEB', 'url': 'https://github.com/krzysztof-o/spritesheet.js/blob/master/lib/generator.js#23L32'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SPRITESHEETJS-1048333'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T19:04:46Z', 'nvd_published_at': '2021-02-08T19:15:00Z'}
1.4.0
GHSA-9jhm-8m8c-c3f4
2021-04-15T21:00:29Z
2021-04-19T14:54:15Z
null
['CVE-2021-29431']
SSRF in Sydent due to missing validation of hostnames
### Impact Sydent can be induced to send HTTP GET requests to internal systems, due to lack of parameter validation or IP address blacklisting. It is not possible to exfiltrate data or control request headers, but it might be possible to use the attack to perform an internal port enumeration. ### Patches Fixed in 9...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-sydent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/security/advisories/GHSA-9jhm-8m8c-c3f4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29431'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/sydent/commit/0f00412017f25619bc36c264b29ea96808bf310a'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:00:29Z', 'nvd_published_at': '2021-04-15T21:15:00Z'}
1.4.0
GHSA-7mpx-vg3c-cmr4
2021-04-09T19:38:58Z
2021-04-13T15:22:37Z
null
['CVE-2020-7787']
Improper Authentication in react-adal
This affects versions of react-adal < 0.5.1. It is possible for a specially crafted JWT token and request URL can cause the nonce, session and refresh values to be incorrectly validated, causing the application to treat an attacker-generated JWT token as authentic. The logical defect is caused by how the nonce, session...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-adal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7787'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/pull/115'}, {'type': 'WEB', 'url': 'https://github.com/salvoravida/react-adal/commit/74158dba1647b12fe96fa401e306a6287fe9e2a9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T19:38:58Z', 'nvd_published_at': '2020-12-09T17:15:00Z'}
1.4.0
GHSA-4v4g-726h-xvfv
2023-03-17T17:49:46Z
2021-04-19T14:59:06Z
null
['CVE-2021-29445']
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-esm-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jose-node-esm-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-4v4g-726h-xvfv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29445'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-node-esm-runtime'}]
{'cwe_ids': ['CWE-203', 'CWE-208', 'CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:41Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}
1.4.0
GHSA-893h-35v4-mxqx
2023-08-31T20:01:05Z
2021-04-20T16:43:33Z
null
['CVE-2020-1737']
Path Traversal in Ansible
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file sy...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1737'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67795'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/67799'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737'}, {'type'...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:58:06Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-g4mq-6fp5-qwcf
2021-08-31T21:10:23Z
2021-04-20T16:46:12Z
null
['CVE-2020-1733']
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p <dir>";...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.17'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1733'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67791'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-362', 'CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:50:43Z', 'nvd_published_at': '2020-03-11T19:15:00Z'}
1.4.0
GHSA-x823-j7c4-vpc5
2023-08-30T22:10:24Z
2021-04-20T16:31:43Z
null
['CVE-2021-25926']
Cross-site scripting in sickrage
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sickrage'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.54'}, {'fixed': '10.0.11.dev2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.11.dev1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25926'}, {'type': 'WEB', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE/commit/9f42426727e16609ad3d1337f6637588b8ed28e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/SiCKRAGE/SiCKRAGE'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T20:57:46Z', 'nvd_published_at': '2021-04-12T14:15:00Z'}
1.4.0
GHSA-375m-5fvv-xq23
2021-04-16T23:17:39Z
2021-04-19T15:11:54Z
null
[]
VVE-2021-0002: Incorrect `returndatasize` when using simple forwarder proxies deployed prior to EIP-1167 adoption
## Background @tjayrush reported a data handling issue with certain Web3 libraries using Vyper-deploy forwarder proxy contracts using our Vyper's built-in `create_forwarder_to` function prior to our change to support EIP-1167 style forwarder proxies. ### Impact If you are an end user of a forwarder-style proxy deploy...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-375m-5fvv-xq23'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/pull/2281'}, {'type': 'WEB', 'url': 'https://pypi.org/project/vyper/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:17:39Z', 'nvd_published_at': None}
1.4.0
GHSA-wq6x-g685-w5f2
2021-04-07T19:34:40Z
2021-04-07T21:13:00Z
null
['CVE-2020-28734']
Improper Restriction of XML External Entity Reference in Plone
Plone before 5.2.3 allows XXE attacks via a feature that is explicitly only available to the Manager role.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone.app.event'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28734'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/3209'}, {'type': 'WEB', 'url': 'https://dist.plone.org/release/5.2.3/RELEASE-NOTES.txt'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:34:40Z', 'nvd_published_at': '2020-12-30T19:15:00Z'}
1.4.0
GHSA-p7jq-v8jp-j424
2021-04-16T23:15:49Z
2021-04-19T14:50:38Z
null
['CVE-2021-31406']
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. - https://vaadi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'...
[{'type': 'WEB', 'url': 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31406'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/10157'}, {'type': 'WEB', 'url': 'https://vaadin.com/security/cve-2021-31406'}]
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:15:49Z', 'nvd_published_at': '2021-04-23T16:15:00Z'}
1.4.0
GHSA-867q-77cc-98mv
2021-05-10T19:29:52Z
2021-04-29T21:51:37Z
null
['CVE-2021-21429']
Creation of Temporary File in Directory with Insecure Permissions in the OpenAPI Generator Maven plugin
### Impact Using `File.createTempFile` in JDK will result in creating and using insecure temporary files that can leave application and system data vulnerable to attacks. This vulnerability only impacts unix-like systems where the local system temporary directory is shared between all users. This vulnerability does no...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator-maven-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-867q-77cc-98mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21429'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/8795'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-377', 'CWE-378', 'CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T19:58:51Z', 'nvd_published_at': '2021-04-27T20:15:00Z'}
1.4.0
GHSA-g8r4-p96j-xfxc
2022-08-11T00:01:25Z
2021-04-16T19:53:12Z
null
['CVE-2021-29440']
Grav's Twig processing allowing dangerous PHP functions by default
### Impact Twig processing of static pages can be enabled in the front matter by any administrative user allowed to create or edit pages. As the Twig processor runs unsandboxed, this behavior can be used to gain arbitrary code execution and elevate privileges on the instance. ### Patches The issue was addressed by ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.10'}}]
[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-g8r4-p96j-xfxc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29440'}, {'type': 'WEB', 'url': 'https://blog.sonarsource.com/grav-cms-code-execution-vulnerabilities'}, {'type': 'WEB', 'url': 'https://packagist.or...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T19:55:46Z', 'nvd_published_at': '2021-04-13T20:15:00Z'}
1.4.0
GHSA-94hh-pjjg-rwmr
2023-03-17T17:49:50Z
2021-04-19T14:58:49Z
null
['CVE-2021-29444']
Padding Oracle Attack due to Observable Timing Discrepancy in jose-browser-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jose-browser-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-94hh-pjjg-rwmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29444'}, {'type': 'PACKAGE', 'url': 'https://github.com/panva/jose'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jose-browser-runtime'}]
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-16T23:00:49Z', 'nvd_published_at': '2021-04-16T22:15:00Z'}
1.4.0
GHSA-rj44-gpjc-29r7
2021-03-30T20:20:04Z
2021-04-06T17:22:41Z
null
['CVE-2021-21412']
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
### Impact Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled) ### Patches [A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0 ### Workarounds By default, EGF parse functions ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@thi.ng/egf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412'}, {'type': 'WEB', 'url': 'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-30T17:40:22Z', 'nvd_published_at': '2021-03-30T18:15:00Z'}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
7