schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
14
228
details
stringlengths
48
1.45k
severity
stringlengths
2
78
affected
stringlengths
79
6.96k
references
stringlengths
143
6.38k
database_specific
stringlengths
131
174
1.4.0
GHSA-7rr7-rcjw-56vj
2023-07-05T19:08:30Z
2018-12-05T17:17:02Z
null
['CVE-2018-16477']
Exposure of Sensitive Information to an Unauthorized Actor in activestorage
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. Vulnerable apps are those using either GCS or the Disk service in production. Other storage services such as S3 or Azure aren't affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16477'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7rr7-rcjw-56vj'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:29Z', 'nvd_published_at': None}
1.4.0
GHSA-hjm9-576q-399p
2022-09-14T22:24:11Z
2018-12-21T17:46:23Z
null
['CVE-2018-1000854']
Remote Code Execution in esigate-core
esigate.org esigate version 5.2 and earlier contains a CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in ESI directive with user specified XSLT that can result in Remote Code Execution. This attack appear to be exploitable via Use of another weakness in backend application to reflect ESI directives. This vulnerability appears to have been fixed in 5.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.esigate:esigate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000854'}, {'type': 'WEB', 'url': 'https://github.com/esigate/esigate/issues/209'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjm9-576q-399p'}, {'type': 'PACKAGE', 'url': 'https://github.com/esigate/esigate'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:39Z', 'nvd_published_at': None}
1.4.0
GHSA-7x9j-7223-rg5m
2022-09-14T22:24:42Z
2018-12-21T17:51:51Z
null
['CVE-2016-1000031']
Improper Access Control in commons-fileupload
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000031'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7x9j-7223-rg5m'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FILEUPLOAD-279'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-4812'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190212-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2016-12'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2016-23'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2016-30'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/93604'}, {'type': 'WEB', 'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-570/'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:40Z', 'nvd_published_at': '2016-10-25T14:29:00Z'}
1.4.0
GHSA-9fcp-vcq9-9h2h
2022-09-14T22:12:13Z
2018-12-19T19:24:18Z
null
['CVE-2018-19907']
OS Command Injection in craftercms:crafter-studio
A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19907'}, {'type': 'WEB', 'url': 'https://github.com/craftercms/craftercms/issues/2677'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9fcp-vcq9-9h2h'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/craftercms'}, {'type': 'WEB', 'url': 'https://medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:17Z', 'nvd_published_at': None}
1.4.0
GHSA-77hp-pfxw-4w63
2022-09-14T22:20:53Z
2018-12-20T22:02:09Z
null
['CVE-2018-1000822']
XML External Entity (XXE) vulnerability in codelibs fess
codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codelibs.fess:fess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000822'}, {'type': 'WEB', 'url': 'https://github.com/codelibs/fess/issues/1851'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/27/fess-XXE/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77hp-pfxw-4w63'}, {'type': 'PACKAGE', 'url': 'https://github.com/codelibs/fess'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:51Z', 'nvd_published_at': None}
1.4.0
GHSA-vwr2-wj63-86gr
2023-09-12T21:07:28Z
2018-12-06T15:49:10Z
null
['CVE-2018-16478']
Path Traversal in simplehttpserver
All versions of `simplehttpserver` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL. ## Recommendation No fix is currently available. Do not use `simplehttpserver` in production or consider using an alternative module until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simplehttpserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16478'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwr2-wj63-86gr'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/tikonen/blog/tree/master/simplehttpserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/744'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:36Z', 'nvd_published_at': None}
1.4.0
GHSA-r2pp-x4mm-4999
2022-09-14T22:20:27Z
2018-12-20T22:02:02Z
null
['CVE-2018-1000820']
XML External Entity (XXE) vulnerability in neo4j.procedure:apoc
neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000820'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:21Z', 'nvd_published_at': '2018-12-20T15:29:00Z'}
1.4.0
GHSA-v4x4-98cg-wr4g
2023-09-05T17:59:57Z
2018-12-26T17:45:19Z
null
['CVE-2018-20325']
Code injection in Danijar Definitions
There is a vulnerability in `load()` method in definitions/parser.py in the Danijar Hafner definitions package for Python. It can execute arbitrary python commands resulting in command execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'definitions'}, 'ecosystem_specific': {'affected_functions': ['definitions.parser.Parser._load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20325'}, {'type': 'WEB', 'url': 'https://github.com/danijar/definitions/issues/14'}, {'type': 'PACKAGE', 'url': 'https://github.com/danijar/definitions'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:38Z', 'nvd_published_at': None}
1.4.0
GHSA-www2-v7xj-xrc6
2022-09-14T22:10:48Z
2018-12-12T15:52:07Z
null
['CVE-2018-20060']
Exposure of Sensitive Information to an Unauthorized Actor in urllib3
urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ecosystem_specific': {'affected_functions': ['urllib3.poolmanager.PoolManager.urlopen', 'urllib3.util.retry.Retry', 'urllib3.util.retry.Retry.__init__', 'urllib3.util.retry.Retry.new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20060'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/issues/1316'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/pull/1346'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/560bd227b90f74417ffaedebf5f8d05a8ee4f532'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2272'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1649153'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-www2-v7xj-xrc6'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3990-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:30Z', 'nvd_published_at': '2018-12-11T17:29:00Z'}
1.4.0
GHSA-h4x4-5qp2-wp46
2021-09-13T15:14:09Z
2018-12-21T17:46:54Z
null
['CVE-2018-1000873']
Moderate severity vulnerability that affects com.fasterxml.jackson.datatype:jackson-datatype-jsr353
Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.datatype:jackson-datatype-jsr310'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000873'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-modules-java8/issues/90'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-modules-java8/pull/87'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1665601'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-modules-java8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4x4-5qp2-wp46'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:51Z', 'nvd_published_at': '2018-12-20T17:29:00Z'}
1.4.0
GHSA-3448-vfvv-xp9g
2023-09-27T11:10:06Z
2018-12-26T17:45:07Z
null
['CVE-2018-17197']
Apache Tika Denial of Service due to Infinite Loop in Tika's SQLite3Parser
A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17197'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3448-vfvv-xp9g'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106293'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:58Z', 'nvd_published_at': None}
1.4.0
GHSA-27xw-p8v6-9jjr
2022-09-14T22:14:12Z
2018-12-20T22:01:31Z
null
['CVE-2018-15801']
Spring Security vulnerable to Authorization Bypass
Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15801'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-27xw-p8v6-9jjr'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15801'}]
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:43Z', 'nvd_published_at': '2018-12-19T22:29:00Z'}
1.4.0
GHSA-8jjf-w7j6-323c
2023-08-18T21:00:53Z
2018-01-04T21:03:33Z
null
['CVE-2017-1000452']
Samlify vulnerable to Authentication Bypass by allowing tokens to be reused with different usernames
Versions of `samlify` prior to 2.4.0-rc5 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider. ## Recommendation Upgrade to version 2.4.0-rc5 or later
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'samlify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0-rc5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000452'}, {'type': 'WEB', 'url': 'https://github.com/tngan/samlify/commit/d382bbc7c6b8ea889839ae1f178730c25b09eb42'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/356284'}, {'type': 'PACKAGE', 'url': 'https://github.com/tngan/samlify'}, {'type': 'WEB', 'url': 'https://github.com/tngan/samlify/compare/v2.4.0-rc4...v2.4.0-rc5'}, {'type': 'WEB', 'url': 'https://github.com/tngan/samlify/releases/tag/v2.4.0-rc5'}, {'type': 'WEB', 'url': 'https://www.whitehats.nl/blog/xml-signature-wrapping-samlify'}]
{'cwe_ids': ['CWE-347', 'CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:47Z', 'nvd_published_at': None}
1.4.0
GHSA-m34x-wgrh-g897
2022-04-28T20:13:30Z
2018-01-24T19:38:52Z
null
['CVE-2018-6184']
Directory traversal vulnerability in Next.js
Next.js 4 before 4.2.3 has Directory Traversal under the `/_next` request namespace.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6184'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m34x-wgrh-g897'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/4.2.3'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:41Z', 'nvd_published_at': None}
1.4.0
GHSA-5jcf-c5rg-rmm8
2023-01-26T20:24:38Z
2018-01-22T13:31:34Z
null
['CVE-2017-0889']
paperclip Server-Side Request Forgery vulnerability
Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the `Paperclip::UriAdapter` class. Attackers may be able to access information about internal network resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.4'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0889'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/paperclip/pull/2435'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/209430'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/713'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paperclip/CVE-2017-0889.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:31Z', 'nvd_published_at': '2017-11-13T17:29:00Z'}
1.4.0
GHSA-mvw8-v767-qhjm
2023-01-26T21:19:48Z
2018-01-06T01:11:52Z
null
['CVE-2018-5216']
Radiant CMS vulnerable to Cross-site Scripting
Radiant CMS 1.1.4 has XSS via crafted Markdown input in the `part_body_content` parameter to an `admin/pages/*/edit `resource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'radiant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5216'}, {'type': 'PACKAGE', 'url': 'https://github.com/imsebao/404team'}, {'type': 'WEB', 'url': 'https://github.com/imsebao/404team/blob/master/radiantcms.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:23Z', 'nvd_published_at': None}
1.4.0
GHSA-9pr6-grf4-x2fr
2022-04-25T22:27:19Z
2018-01-29T15:45:28Z
null
['CVE-2017-18076']
Omniauth allows POST parameters to be stored in session
In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/867'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/888523'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/omniauth'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth/CVE-2017-18076.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4109'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:12Z', 'nvd_published_at': None}
1.4.0
GHSA-m7p8-9w66-9frm
2023-01-23T21:24:13Z
2018-01-06T01:11:34Z
null
['CVE-2017-17718']
net-ldap Improper Certificate Validation vulnerability
The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL Certificate Validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'net-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17718'}, {'type': 'WEB', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap/issues/258'}, {'type': 'WEB', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap/pull/279'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/12/17/10'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:19Z', 'nvd_published_at': None}
1.4.0
GHSA-mhpp-875w-9cpv
2021-09-15T20:10:32Z
2018-01-22T13:32:42Z
null
['CVE-2016-10707']
Denial of Service in jquery
Affected versions of `jquery` use a lowercasing logic on attribute names. When given a boolean attribute with a name that contains uppercase characters, `jquery` enters into an infinite recursion loop, exceeding the call stack limit, and resulting in a denial of service condition. ## Recommendation Update to version 3.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10707'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/3133'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/3133#issuecomment-358978489'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/3134'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mhpp-875w-9cpv'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2016-10707.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jquery:20160529'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/330'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:22Z', 'nvd_published_at': None}
1.4.0
GHSA-rhgq-vv9x-j4p5
2023-07-31T20:48:53Z
2018-01-22T23:45:33Z
null
['CVE-2014-5000']
lawn-login exposes database password to unauthorized users
The login function in `lib/lawn.rb` in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'lawn-login'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.0.7']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5000'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lawn-login/CVE-2014-5000.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/skalnik/lawn-login'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229060607/http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:58Z', 'nvd_published_at': None}
1.4.0
GHSA-crmx-v835-hcp4
2021-12-02T22:47:59Z
2018-01-04T21:04:09Z
2021-12-02T22:47:36Z
['CVE-2017-17461']
Moderate severity vulnerability that affects marked
# Withdrawn This advisory has been withdrawn, per NVD: ["This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue."](https://nvd.nist.gov/vuln/detail/CVE-2017-17461) # Original Description A Regular expression Denial of Service (ReDoS) vulnerability in the file marked.js of the marked npm package (tested on version 0.3.7) allows a remote attacker to overload and crash a server by passing a maliciously crafted string.
[]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17461'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-crmx-v835-hcp4'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:51Z', 'nvd_published_at': None}
1.4.0
GHSA-6x45-86q6-rcmr
2023-07-31T20:50:46Z
2018-01-22T23:17:39Z
null
['CVE-2014-4994']
Gyazo allows local users to write arbitrary files
`lib/gyazo/client.rb` in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gyazo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0'}]}], 'versions': ['1.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4994'}, {'type': 'PACKAGE', 'url': 'https://github.com/gyazo/gyazo-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gyazo/CVE-2014-4994.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229061943/http://www.vapid.dhs.org/advisories/gyazo-1.0.0.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:27Z', 'nvd_published_at': '2018-01-10T18:29:00Z'}
1.4.0
GHSA-rmxg-73gg-4p98
2021-09-17T18:58:18Z
2018-01-22T13:32:06Z
null
['CVE-2015-9251']
Cross-Site Scripting (XSS) in jquery
Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option. ## Recommendation Update to version 3.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.3'}, {'fixed': '3.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.3'}, {'fixed': '3.0.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.3'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9251'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432#issuecomment-403761229'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/2588'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0481'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#420'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v4.2.0/vendor/assets/javascripts/jquery3.js#L9377'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2015-9251.yml'}, {'type': 'WEB', 'url': 'https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210108-0004/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450227'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jquery:20150627'}, {'type': 'WEB', 'url': 'https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030101/http://www.securityfocus.com/bid/105658'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-08'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:10Z', 'nvd_published_at': '2018-01-18T23:29:00Z'}
1.4.0
GHSA-832h-xg76-4gv6
2021-09-03T22:10:24Z
2018-01-29T15:50:46Z
null
['CVE-2017-18077']
ReDoS in brace-expansion
Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition. ## Proof of Concept ``` var expand = require('brace-expansion'); expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}'); ``` ## Recommendation Update to version 1.1.7 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'brace-expansion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/brace-expansion/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/brace-expansion/pull/35'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/862712'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-832h-xg76-4gv6'}, {'type': 'PACKAGE', 'url': 'https://github.com/juliangruber/brace-expansion'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/338'}]
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:01Z', 'nvd_published_at': None}
1.4.0
GHSA-w222-53c6-c86p
2021-06-10T19:55:43Z
2018-01-23T03:57:44Z
null
['CVE-2018-1000006']
Remote Code Execution in electron
Affected versions of `electron` may be susceptible to a remote code execution flaw when certain conditions are met: 1. The electron application is running on Windows. 2. The electron application registers as the default handler for a protocol, such as `nodeapp://`. This vulnerability is caused by a failure to sanitize additional arguments to chromium in the command line handler for Electron. MacOS and Linux are not vulnerable. ## Recommendation Update electron to a version that is not vulnerable. If updating is not possible, the electron team has provided the following guidance: If for some reason you are unable to upgrade your Electron version, you can append `--` as the last argument when calling `app.setAsDefaultProtocolClient`, which prevents Chromium from parsing further options. The double dash `--` signifies the end of command options, after which only positional parameters are accepted. ``` app.setAsDefaultProtocolClient(protocol, process.execPath, [ '--your-switches-here', '--' ]) ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.2-beta.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2-beta.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000006'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/protocol-handler-fix'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w222-53c6-c86p'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/releases/tag/v1.8.2-beta.4'}, {'type': 'WEB', 'url': 'https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43899/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44357/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/563'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102796'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:07Z', 'nvd_published_at': None}
1.4.0
GHSA-94cq-7ccq-cmcm
2023-01-23T20:52:59Z
2018-01-24T17:10:45Z
null
['CVE-2014-5002']
lynx doesn't properly sanitize user input and exposes database password to unauthorized users
The lynx gem prior to 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes. As of version 1.0.0, lynx no longer supports a `--password` option. Passwords are only configured in a configuration file, so it's no longer possible to expose passwords on the command line.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'lynx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5002'}, {'type': 'WEB', 'url': 'https://github.com/panthomakos/lynx/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/panthomakos/lynx'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lynx/CVE-2014-5002.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/lynx-0.2.0.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:24Z', 'nvd_published_at': None}
1.4.0
GHSA-7px7-7xjx-hxm8
2023-09-07T22:53:21Z
2018-01-04T21:04:19Z
null
['CVE-2017-1000427']
Marked vulnerable to XSS from data URIs
marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000427'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7px7-7xjx-hxm8'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:marked:20170112'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:14Z', 'nvd_published_at': None}
1.4.0
GHSA-qh2h-chj9-jffq
2022-08-03T21:32:55Z
2018-06-08T12:43:43Z
null
['CVE-2017-16042']
Growl before 1.10.0 vulnerable to Command Injection
Affected versions of `growl` do not properly sanitize input prior to passing it into a shell command, allowing for arbitrary command execution. ## Recommendation Update to version 1.10.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'growl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16042'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/pull/61'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/commit/d71177d5331c9de4658aca62e0ac921f178b0669'}, {'type': 'PACKAGE', 'url': 'https://github.com/tj/node-growl'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/146'}]
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:54Z', 'nvd_published_at': None}
1.4.0
GHSA-pr3h-jjhj-573x
2023-09-05T21:05:18Z
2018-06-20T22:18:58Z
null
['CVE-2018-3760']
Sprockets path traversal leads to information leak
Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately. ### Workaround: In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets. This work around will not be possible in all hosting environments and upgrading is advised.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.beta1'}, {'fixed': '4.0.0.beta8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0.beta7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3760'}, {'type': 'WEB', 'url': 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5'}, {'type': 'WEB', 'url': 'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441'}, {'type': 'WEB', 'url': 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2244'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2245'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2561'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2745'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/sprockets'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4242'}]
{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:53Z', 'nvd_published_at': None}
1.4.0
GHSA-4662-j96g-mv46
2020-08-31T18:12:20Z
2018-06-07T19:43:06Z
null
['CVE-2016-10548']
Arbitrary Code Injection in reduce-css-calc
Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server. ## Proof of Concept ``` const reduceCSSCalc = require('reduce-css-calc'); console.log(reduceCSSCalc(`calc( (Buffer(10000)))`)); console.log(reduceCSSCalc(`calc( (global['fs'] = require('fs')))`)); console.log(reduceCSSCalc(`calc( (fs['readFileSync']("/etc/passwd", "utf-8")))`)); ``` ## Recommendation Update to version 1.2.5 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'reduce-css-calc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10548'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4662-j96g-mv46'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/144'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:38Z', 'nvd_published_at': None}
1.4.0
GHSA-vwrf-r5r4-7775
2020-08-31T18:09:06Z
2018-06-07T19:43:25Z
null
['CVE-2015-9236']
Incorrect handling of CORS preflight request headers in hapi
Versions of `hapi` prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden. If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route. ## Recommendation Update to version 11.0.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9236'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2840'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2850'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwrf-r5r4-7775'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/45'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:39Z', 'nvd_published_at': None}
1.4.0
GHSA-39pj-gq8q-9pfj
2021-08-31T20:54:56Z
2018-06-07T19:43:20Z
null
['CVE-2015-9240']
Authentication Weakness in keystone
Versions of `keystone` prior to 0.3.16 are affected by a partial authentication bypass vulnerability. In the default sign in functionality, if an attacker provides a full and correct password, yet only provides part of the associated email address, authentication will be granted. ## Recommendation Update to version 0.3.16 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9240'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-39pj-gq8q-9pfj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/60'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/keystone'}]
{'cwe_ids': ['CWE-1255'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:41Z', 'nvd_published_at': None}
1.4.0
GHSA-3pxp-6963-46r9
2023-01-31T01:38:38Z
2018-06-07T19:43:00Z
null
['CVE-2018-3746']
Command Injection in pdfinfojs
Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor. ## Recommendation Update to version 0.4.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pdfinfojs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746'}, {'type': 'WEB', 'url': 'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330957'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3pxp-6963-46r9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/643'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:51Z', 'nvd_published_at': '2018-06-01T17:29:00Z'}
1.4.0
GHSA-rc8h-3fv6-pxv8
2020-08-31T18:09:46Z
2018-06-07T19:43:15Z
null
['CVE-2015-9241']
Denial of Service in hapi
Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability. The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers. This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes). ## Recommendation Update to v11.1.3 or later
[]
[{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/pull/179'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/63'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:18Z', 'nvd_published_at': None}
1.4.0
GHSA-mq35-wqvf-r23c
2023-01-23T21:24:55Z
2018-06-05T21:32:06Z
null
['CVE-2018-11627']
Sinatra Cross-site Scripting vulnerability
Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/issues/1428'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0212'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0315'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sinatra/CVE-2018-11627.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/sinatra'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:50Z', 'nvd_published_at': None}
1.4.0
GHSA-vwjc-q9px-r9vq
2023-05-22T15:35:11Z
2018-06-07T19:43:11Z
null
['CVE-2015-9242']
Denial of Service in ecstatic
Versions of `ecstatic` prior to 1.4.0 are affected by a denial of service vulnerability when certain input strings are sent via the `Last-Modified` or `If-Modified-Since` headers. Parsing certain inputs with `new Date()` or `Date.parse()` cases v8 to crash. As ecstatic passes the value of the affected headers into one of these functions, sending certain inputs via one of the headers will cause the server to crash. ## Recommendation Update to version 1.4.0 or later.
[]
[{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9242'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/pull/179'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/0d0a2779ac5e5843d3745920212dfac9b69440e2'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/v8/issues/detail?id=4640'}, {'type': 'PACKAGE', 'url': 'https://github.com/jfhbrook/node-ecstatic'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:32Z', 'nvd_published_at': None}
1.4.0
GHSA-vpch-rxw3-fgx8
2021-09-20T22:10:09Z
2018-04-25T14:30:43Z
null
['CVE-2018-1000160']
Cross-Site Scripting in @risingstack/protect
All versions of `@risingstack/protect` are vulnerable to Cross-Site Scripting. The `isXss()` XSS validator has several bypasses that may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package. The package is not actively maintained and will not be patched.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@risingstack/protect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000160'}, {'type': 'WEB', 'url': 'https://github.com/RisingStack/protect/issues/16'}, {'type': 'PACKAGE', 'url': 'https://github.com/RisingStack/protect'}, {'type': 'WEB', 'url': 'https://github.com/RisingStack/protect/blob/60b0c91e86686d34e5202419ce9ae7e8dc08edcd/lib/rules/xss.js#L4-L13'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vpch-rxw3-fgx8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RISINGSTACKPROTECT-455402'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1116'}, {'type': 'WEB', 'url': 'http://embed.plnkr.co/xHbhB29JWWyMUMeHsLrm'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:00Z', 'nvd_published_at': None}
1.4.0
GHSA-px3r-jm9g-c8w8
2023-03-01T18:54:07Z
2018-04-26T15:41:10Z
null
['CVE-2018-3741']
rails-html-sanitizer Cross-site Scripting vulnerability
There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3741'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:14Z', 'nvd_published_at': '2018-03-30T19:29:00Z'}
1.4.0
GHSA-882p-jqgm-f45g
2023-05-04T19:56:39Z
2018-04-13T16:17:46Z
null
['CVE-2017-18258']
Uncontrolled resource consumption in nokogiri
The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18258'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-882p-jqgm-f45g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-18258.yml'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190719-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-1/'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:47Z', 'nvd_published_at': '2018-04-08T17:29:00Z'}
1.4.0
GHSA-jp4x-w63m-7wgm
2023-09-13T19:42:48Z
2018-04-26T15:25:17Z
null
['CVE-2018-3728']
Prototype Pollution in hoek
Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution. The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property. This can be demonstrated like so: ```javascript var Hoek = require('hoek'); var malicious_payload = '{"__proto__":{"oops":"It works !"}}'; var a = {}; console.log("Before : " + a.oops); Hoek.merge({}, JSON.parse(malicious_payload)); console.log("After : " + a.oops); ``` This type of attack can be used to overwrite existing properties causing a potential denial of service. ## Recommendation Update to version 4.2.1, 5.0.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hoek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'hoek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3728'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310439'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1263'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1264'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jp4x-w63m-7wgm'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:hoek:20180212'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/566'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103108'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:55Z', 'nvd_published_at': None}
1.4.0
GHSA-23v3-qfrj-wmgh
2020-06-16T20:51:48Z
2018-09-17T21:54:22Z
2020-06-16T20:51:08Z
[]
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23v3-qfrj-wmgh'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:08Z', 'nvd_published_at': None}
1.4.0
GHSA-9mr8-6prp-gwjv
2021-09-08T20:06:59Z
2018-09-10T15:20:30Z
null
['CVE-2018-3754']
SQL Injection in query-mysql
All versions of `query-mysql` are vulnerable to SQL injection due to lack of user input sanitization allows to run arbitrary SQL queries when fetching data from database. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is passed into this module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'query-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3754'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311244'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mr8-6prp-gwjv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/666'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:59Z', 'nvd_published_at': None}
1.4.0
GHSA-jxjr-5h69-qw3w
2023-07-05T17:45:36Z
2018-09-17T21:57:38Z
null
['CVE-2015-7499']
Heap-based buffer overflow in nokogiri
Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or crash the application.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7499'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1281925'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxjr-5h69-qw3w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-7499.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/Dy7YiKb_pMM'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210724022841/http://www.securityfocus.com/bid/79509'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211205133229/https://securitytracker.com/id/1034243'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2549.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2550.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3430'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2834-1'}, {'type': 'WEB', 'url': 'http://xmlsoft.org/news.html'}]
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:24Z', 'nvd_published_at': '2015-12-15T21:59:00Z'}
1.4.0
GHSA-7hp2-xwpj-95jq
2023-06-30T19:54:52Z
2018-09-17T21:53:42Z
null
['CVE-2015-8806']
Denial of service or RCE from libxml2 and libxslt
Nokogiri is affected by series of vulnerabilities in libxml2 and libxslt, which are libraries Nokogiri depends on. It was discovered that libxml2 and libxslt incorrectly handled certain malformed documents, which can allow malicious users to cause issues ranging from denial of service to remote code execution attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8806'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1473'}, {'type': 'WEB', 'url': 'https://bugzilla.gnome.org/show_bug.cgi?id=749115'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-8806.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160928171015/http://www.securityfocus.com/bid/82071'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2016/dsa-3593'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/02/03/5'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2994-1'}]
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:55Z', 'nvd_published_at': None}
1.4.0
GHSA-gpvj-q7fp-jcch
2023-09-12T20:49:06Z
2018-09-06T03:22:59Z
null
['CVE-2018-3787']
simplehttpserver allows directory traversal and file listing
Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simplehttpserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3787'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/357109'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gpvj-q7fp-jcch'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:52Z', 'nvd_published_at': '2018-08-31T16:29:00Z'}
1.4.0
GHSA-qg3g-2mgh-33j8
2021-09-16T19:58:01Z
2018-09-10T15:19:49Z
null
['CVE-2018-8319']
Sensitive Data Exposure in msrcrypto
Versions of `msrcrypto` prior to 1.4.1 are vulnerable to Sensitive Data Exposure. The package's Elliptic Curve Cryptography (ECC) implementation may leak information about a server's private ECC key. It can also allow attackers to craft invalid ECDSA signatures that pass as valid. There is no published proof-of-concept for this vulnerability. ## Recommendation Upgrade to version 1.4.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'msrcrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8319'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qg3g-2mgh-33j8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8319'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1112'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104655'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041268'}]
{'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:47Z', 'nvd_published_at': None}
1.4.0
GHSA-hxhm-3vj9-6cqh
2023-09-07T20:35:25Z
2018-09-18T13:49:31Z
null
['CVE-2016-10632']
apk-parser2 downloads Resources over HTTP
Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser2`. ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'apk-parser2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10632'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hxhm-3vj9-6cqh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/223'}]
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:26Z', 'nvd_published_at': None}
1.4.0
GHSA-m8cr-q935-8j67
2023-03-01T01:34:56Z
2018-09-18T13:47:57Z
null
['CVE-2018-3766']
Path Traversal in buttle
All versions of `buttle` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths when fetching files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'buttle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3766'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/358112'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m8cr-q935-8j67'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/990'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:26Z', 'nvd_published_at': '2018-07-05T16:29:00Z'}
1.4.0
GHSA-35c4-f3rq-f9g3
2020-06-16T21:42:52Z
2018-09-17T21:57:23Z
2020-06-16T20:54:03Z
[]
Moderate severity vulnerability that affects activesupport
Withdrawn, accidental duplicate publish. The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-35c4-f3rq-f9g3'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:03Z', 'nvd_published_at': None}
1.4.0
GHSA-pj7m-g53m-7638
2023-01-23T21:30:26Z
2018-09-13T15:49:56Z
null
['CVE-2018-14041']
Bootstrap Cross-site Scripting vulnerability
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy. This is similar to CVE-2018-14042.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14041'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26423'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26627'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26630'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:18Z', 'nvd_published_at': '2018-07-13T14:29:00Z'}
1.4.0
GHSA-m4fw-77v7-924m
2023-08-31T21:35:38Z
2018-09-13T15:47:57Z
null
['CVE-2018-1000559']
Qutebrowser XSS Vulnerability
qutebrowser version introduced in v0.11.0 ([1179ee7a937fb31414d77d9970bac21095358449](https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f)) contains a Cross Site Scripting (XSS) vulnerability in history command, `qute://history` page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted `<title>` attribute, and then open the `qute://history` site via the `:history` command. This vulnerability appears to have been fixed in fixed in v1.3.3 ([4c9360237f186681b1e3f2a0f30c45161cf405c7](https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7), to be released today) and v1.4.0 ([5a7869f2feaa346853d2a85413d6527c87ef0d9f](https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f), released later this week).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000559'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/issues/4011'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m4fw-77v7-924m'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:51Z', 'nvd_published_at': None}
1.4.0
GHSA-7375-vjr2-3g7w
2021-09-02T19:13:45Z
2018-09-27T11:37:19Z
null
['CVE-2018-3748']
Cross-Site Scripting in glance
Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'}, {'type': 'WEB', 'url': 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310133'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7375-vjr2-3g7w'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarofghosts/glance'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/610'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:05Z', 'nvd_published_at': None}
1.4.0
GHSA-h6h9-pphv-m266
2023-08-08T10:40:52Z
2018-09-13T15:47:26Z
null
['CVE-2018-1000523']
Topydo Improper Input Validation vulnerability
topydo contains a CWE-20: Improper Input Validation vulnerability in `ListFormatParser::parse`, file `topydo/lib/ListFormat.py` line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'topydo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000523'}, {'type': 'WEB', 'url': 'https://github.com/bram85/topydo/issues/240'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6h9-pphv-m266'}, {'type': 'PACKAGE', 'url': 'https://github.com/bram85/topydo'}, {'type': 'WEB', 'url': 'https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:06Z', 'nvd_published_at': None}
1.4.0
GHSA-mrhj-2g4v-39qx
2020-06-16T21:54:12Z
2018-09-17T21:58:19Z
2020-06-16T21:47:07Z
[]
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.2'}, {'fixed': '1.0.3'}]}], 'versions': ['1.0.2']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mrhj-2g4v-39qx'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:07Z', 'nvd_published_at': None}
1.4.0
GHSA-7phj-gmgx-2r66
2021-12-03T14:24:43Z
2018-09-17T21:58:09Z
2020-06-16T21:23:09Z
[]
Moderate severity vulnerability that affects activerecord
Withdrawn, accidental duplicate publish. activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7phj-gmgx-2r66'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:09Z', 'nvd_published_at': None}
1.4.0
GHSA-vqcq-mrmw-mcmg
2022-04-26T18:30:20Z
2018-09-06T03:27:18Z
null
['CVE-2018-1000544']
Rubyzip gem contains a Directory Traversal vulnerability in zip file component
rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem.. This is similar to CVE-2017-5946 which was patched in 1.2.1 but the fix in that case was incomplete.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000544'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/issues/369'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3466'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2018-1000544.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html'}]
{'cwe_ids': ['CWE-434', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:07Z', 'nvd_published_at': None}
1.4.0
GHSA-fm87-46vv-jqrr
2023-01-31T01:40:06Z
2018-09-18T13:45:07Z
null
['CVE-2018-3744']
Path Traversal in html-pages
Versions of `html-pages` before 2.1.0 are vulnerable to path traversal. ## Recommendation Update to version 2.1.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'html-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3744'}, {'type': 'WEB', 'url': 'https://github.com/danielcardoso/html-pages/issues/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/306607'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fm87-46vv-jqrr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/665'}]
{'cwe_ids': ['CWE-22', 'CWE-35'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:53Z', 'nvd_published_at': '2018-05-29T20:29:00Z'}
1.4.0
GHSA-cvxm-f295-x957
2023-09-12T18:47:20Z
2018-09-18T13:46:06Z
null
['CVE-2018-3751']
Prototype Pollution in merge-recursive
All versions of `merge-recursive` are vulnerable to Prototype Pollution. When malicious user input is merged with another object it allows the attacker to modify the prototype of Object via `__proto__` causing the addition or modification of an existing property. Proof of concept: ```js var merge = require('merge-recursive').recursive; var malicious_payload = '{"__proto__":{"oops":"It works !"}}'; var a = {}; console.log("Before : " + a.oops); merge({}, JSON.parse(malicious_payload)); console.log("After : " + a.oops); ``` ## Recommendation There is currently no fix available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge-recursive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3751'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cvxm-f295-x957'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/715'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:01Z', 'nvd_published_at': None}
1.4.0
GHSA-pp57-mqmh-44h7
2021-09-16T18:18:02Z
2018-09-06T23:24:21Z
null
['CVE-2018-13797']
Command Injection in macaddress
All versions of `macaddress` are vulnerable to command injection. For this vulnerability to be exploited an attacker needs to control the `iface` argument to the `one` method. ## Recommendation Update to version 0.2.9 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'macaddress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13797'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/pull/20/'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319467'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pp57-mqmh-44h7'}, {'type': 'PACKAGE', 'url': 'https://github.com/scravy/node-macaddress'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/releases/tag/0.2.9'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=17283394'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/654'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:44Z', 'nvd_published_at': None}
1.4.0
GHSA-685w-vc84-wxcx
2023-01-21T03:28:18Z
2018-09-17T21:55:22Z
null
['CVE-2014-8144']
Doorkeeper contains Cross-site Request Forgery
Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8144'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99342'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-685w-vc84-wxcx'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/1076'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:25Z', 'nvd_published_at': None}
1.4.0
GHSA-qf5x-qgx7-437h
2020-06-17T15:15:04Z
2018-09-17T21:54:11Z
2020-06-17T15:15:04Z
[]
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qf5x-qgx7-437h'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:04Z', 'nvd_published_at': None}
1.4.0
GHSA-5cv7-r488-wc5x
2023-09-07T18:32:19Z
2018-09-17T20:39:17Z
null
['CVE-2017-16073']
noderequest is malware
The `noderequest` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'noderequest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16073'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5cv7-r488-wc5x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/512'}]
{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:32Z', 'nvd_published_at': None}
1.4.0
GHSA-qc8j-m8j3-rjq6
2020-06-17T15:15:01Z
2018-09-17T21:57:58Z
2020-06-17T15:15:01Z
[]
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qc8j-m8j3-rjq6'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:01Z', 'nvd_published_at': None}
1.4.0
GHSA-6834-r92f-jj42
2021-12-03T14:23:09Z
2018-09-17T21:55:54Z
2020-06-16T21:18:20Z
[]
Moderate severity vulnerability that affects actionview
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6834-r92f-jj42'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:20Z', 'nvd_published_at': None}
1.4.0
GHSA-4xjh-m3qx-49wc
2023-09-05T21:41:33Z
2018-09-28T19:29:07Z
null
['CVE-2018-17567']
Jekyll allows attackers to access arbitrary files by specifying a symlink
Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to access arbitrary files by specifying a symlink in the `include` key in the `_config.yml` file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'jekyll'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jekyll'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jekyll'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17567'}, {'type': 'WEB', 'url': 'https://github.com/jekyll/jekyll/pull/7224'}, {'type': 'PACKAGE', 'url': 'https://github.com/jekyll/jekyll'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jekyll/CVE-2018-17567.yml'}, {'type': 'WEB', 'url': 'https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/71da391f584b2fb301d2df0e491b279d87287e2fb4b11309f04ad984@%3Ccommits.accumulo.apache.org%3E'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:43Z', 'nvd_published_at': None}
1.4.0
GHSA-4wch-fwmx-cf47
2023-09-08T20:55:42Z
2018-09-18T13:50:25Z
null
['CVE-2017-0930']
Directory Traversal in augustine
Affected versions of `augustine` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. ## Proof of Concept ```http GET //etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No direct patch is available at this time. Currently, the best mitigation for this flaw is to use a different, functionally equivalent static file server package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'augustine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0930'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4wch-fwmx-cf47'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/559'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:26Z', 'nvd_published_at': None}
1.4.0
GHSA-v543-gqhh-6gww
2022-10-05T19:27:48Z
2018-09-17T21:55:43Z
2020-06-17T15:15:09Z
[]
Duplicate Advisory: Moderate severity vulnerability that affects activemodel
## Duplicate advisory This advisory has been withdrawn because it is a duplicate of [GHSA-543v-gj2c-r3ch](https://github.com/advisories/GHSA-543v-gj2c-r3ch). This link is maintained to preserve external references. ## Original Description Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v543-gqhh-6gww'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:09Z', 'nvd_published_at': None}
1.4.0
GHSA-rq8g-5pc5-wrhr
2023-03-29T19:11:42Z
2018-09-11T18:22:50Z
null
['CVE-2018-1000620']
Insufficient Entropy in cryptiles
Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed. ## Recommendation Upgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cryptiles'}, 'ecosystem_specific': {'affected_functions': ['cryptiles.randomDigits', 'cryptiles.randomBits']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000620'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/cryptiles/issues/34'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/cryptiles/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/cryptiles/commit/9332d4263a32b84e76bf538d7470d01ea63fa047'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rq8g-5pc5-wrhr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/cryptiles'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/476.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1464'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/720'}]
{'cwe_ids': ['CWE-331'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:29Z', 'nvd_published_at': '2018-07-09T20:29:00Z'}
1.4.0
GHSA-5xmj-wm96-fmw8
2020-06-16T21:38:53Z
2018-09-17T21:54:37Z
2020-06-16T21:17:39Z
[]
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xmj-wm96-fmw8'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:39Z', 'nvd_published_at': None}
1.4.0
GHSA-cfhg-9x44-78h2
2023-09-11T18:21:34Z
2018-09-17T20:43:59Z
null
['CVE-2018-16460']
ps Enables OS Command Injection
Versions of `ps` before 1.0.0 are vulnerable to command injection. ### Proof of concept: ```js var ps = require('ps'); ps.lookup({ pid: "$(touch success.txt)" }, function(err, proc) { // this method is vulnerable to command injection if (err) {throw err;} if (proc) { console.log(proc); // Process name, something like "node" or "bash" } else { console.log('No such process'); } }); // Result: The file success.txt will exist on the filesystem if the touch command was executed ``` ## Recommendation Update to version 1.0.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16460'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390848'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfhg-9x44-78h2'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/728'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:20Z', 'nvd_published_at': None}
1.4.0
GHSA-77pc-q5q7-qg9h
2020-06-16T21:37:28Z
2018-09-17T21:58:30Z
2020-06-16T21:21:56Z
[]
Moderate severity vulnerability that affects rails-html-sanitizer
Withdrawn, accidental duplicate publish. Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77pc-q5q7-qg9h'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:56Z', 'nvd_published_at': None}
1.4.0
GHSA-7mvr-5x2g-wfc8
2023-01-23T20:48:55Z
2018-09-13T15:50:32Z
null
['CVE-2018-14042']
Bootstrap Cross-site Scripting vulnerability
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14042'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26423'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26428'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26630'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2d90d369bbc2bd2647620246c55cec8c4705e3d0'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14042.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:00Z', 'nvd_published_at': '2018-07-13T14:29:00Z'}
1.4.0
GHSA-vjcj-5g2r-vxqc
2023-09-08T20:06:29Z
2018-09-06T03:22:00Z
null
['CVE-2018-16330']
Pandao editor.md vulnerable to XSS in IMG attributes
Pandao Editor.md 1.5.0 allows XSS via crafted attributes of an invalid IMG element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.5.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16330'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vjcj-5g2r-vxqc'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:55Z', 'nvd_published_at': None}
1.4.0
GHSA-6g87-ff9q-v847
2023-09-01T09:53:42Z
2018-09-17T20:46:52Z
null
['CVE-2018-1000518']
websockets is vulnerable to denial of service by memory exhaustion
The Python websockets library version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appears to be exploitable via sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in version 5.0
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'websockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000518'}, {'type': 'WEB', 'url': 'https://github.com/aaugustin/websockets/pull/407'}, {'type': 'PACKAGE', 'url': 'https://github.com/aaugustin/websockets'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6g87-ff9q-v847'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:15Z', 'nvd_published_at': '2018-06-26T16:29:00Z'}
1.4.0
GHSA-c9j3-wqph-5xx9
2023-02-03T20:45:07Z
2018-09-17T20:43:34Z
null
['CVE-2018-3786']
Command Injection in egg-scripts
Versions of `egg-scripts` before 2.8.1 are vulnerable to command injection. This is only exploitable if a malicious argument is provided on the command line. Example: `eggctl start --daemon --stderr='/tmp/eggctl_stderr.log; touch /tmp/malicious'` ## Recommendation Update to version 2.8.1 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'egg-scripts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3786'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/egg-scripts/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/egg-scripts/commit/b98fd03d1e3aaed68004b881f0b3d42fe47341dd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/388936'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9j3-wqph-5xx9'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/egg-scripts/blob/2.8.1/History.md'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/694'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:55Z', 'nvd_published_at': '2018-08-24T20:29:00Z'}
1.4.0
GHSA-fpcv-j2q9-vqhw
2021-09-10T18:43:58Z
2018-09-06T03:24:50Z
null
['CVE-2018-16405']
Moderate severity vulnerability that affects mayan-edms
An issue was discovered in Mayan EDMS before 3.0.2. The Appearance app sets window.location directly, leading to XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mayan-edms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpcv-j2q9-vqhw'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mayan-edms/mayan-edms'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/commit/9ebe80595afe4fdd1e2c74358d6a9421f4ce130e'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/issues/494'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:03Z', 'nvd_published_at': None}
1.4.0
GHSA-8462-q7x7-g2x4
2023-09-05T23:09:22Z
2018-09-17T20:44:58Z
null
['CVE-2018-13863']
js-bson vulnerable to REDoS
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8462-q7x7-g2x4'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/js-bson'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:bson:20180225'}]
{'cwe_ids': ['CWE-185', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:09Z', 'nvd_published_at': None}
1.4.0
GHSA-c2vr-2c89-ph88
2021-09-16T20:54:14Z
2018-09-18T13:49:54Z
null
['CVE-2016-10641']
Downloads Resources over HTTP in node-bsdiff-android
Affected versions of `node-bsdiff-android` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-bsdiff-android'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10641'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2vr-2c89-ph88'}, {'type': 'PACKAGE', 'url': 'https://github.com/arthur-zhang/node-bsdiff-android'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/234'}]
{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:04Z', 'nvd_published_at': None}
1.4.0
GHSA-xqvg-xm9m-p2c4
2021-09-22T16:31:46Z
2018-09-11T18:57:16Z
null
['CVE-2018-13796']
Moderate severity vulnerability that affects mailman
An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13796'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mailman/+bug/1780874'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqvg-xm9m-p2c4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201904-10'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4348-1/'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/mailman-users@python.org/msg71003.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:19Z', 'nvd_published_at': None}
1.4.0
GHSA-fp82-2h99-3fpp
2022-04-26T20:44:24Z
2018-09-18T13:47:24Z
null
['CVE-2018-3753']
Prototype Pollution in async merge-object
The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'merge-object'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3753'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310706'}]
{'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:00Z', 'nvd_published_at': None}
1.4.0
GHSA-w578-j992-554x
2022-04-26T18:30:50Z
2018-09-06T03:28:50Z
null
['CVE-2017-7481']
Ansible fails to properly mark lookup-plugin results as unsafe
Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['ansible.template.Templar._lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7481'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a1886911fcf4b691130cfc70dfc5daa5e07c46a3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w578-j992-554x'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:39Z', 'nvd_published_at': None}
1.4.0
GHSA-2j2j-8rrv-264g
2023-09-13T18:50:53Z
2018-09-11T18:58:40Z
null
['CVE-2018-16459']
Cross-Site Scripting in exceljs
Versions of `exceljs` before 1.6.0 are vulnerable to cross-site scripting. This vulnerability is due to `exceljs` not validating data from parsed XLSX file and embedding HTML tags, like `<script>` directly into the sheet cells. Because of this it's possible to inject malicious JavaScript code and execute it when data from the sheet is displayed in the browser. ## Recommendation Update to version 1.6.0 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'exceljs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16459'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/356809'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2j2j-8rrv-264g'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/464.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/733'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:14Z', 'nvd_published_at': None}
1.4.0
GHSA-5h6m-9mvx-m6c5
2021-09-01T22:13:13Z
2018-09-06T03:25:03Z
null
['CVE-2018-16407']
Moderate severity vulnerability that affects mayan-edms
An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag label values are mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mayan-edms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16407'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5h6m-9mvx-m6c5'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mayan-edms/mayan-edms'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/commit/076468a9225e4630a463c0bbceb8e5b805fe380c'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/issues/496'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:17Z', 'nvd_published_at': None}
1.4.0
GHSA-544j-77x9-h938
2021-12-03T14:12:20Z
2018-09-17T21:53:30Z
2020-06-16T20:59:59Z
[]
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-544j-77x9-h938'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:59Z', 'nvd_published_at': None}
1.4.0
GHSA-m53f-rhq8-q6hf
2021-12-03T14:21:39Z
2018-09-17T21:55:03Z
2020-06-17T15:14:56Z
[]
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m53f-rhq8-q6hf'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:56Z', 'nvd_published_at': None}
1.4.0
GHSA-9vc2-p34x-jhxh
2020-06-16T21:54:47Z
2018-09-17T21:56:30Z
2020-06-16T21:29:41Z
[]
Moderate severity vulnerability that affects rack
Withdrawn, accidental duplicate publish. lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9vc2-p34x-jhxh'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:41Z', 'nvd_published_at': None}
1.4.0
GHSA-fpwp-69xv-c67f
2023-08-08T09:18:41Z
2018-09-13T15:46:40Z
null
['CVE-2018-1000519']
aiohttp-session Session Fixation vulnerability
The pypi package aiohttp-session before 2.4.0 contained a Session Fixation vulnerability in `load_session` function for RedisStorage that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (`?session=<>`, or meta tags or script tags with Set-Cookie).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp-session'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000519'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/issues/272'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/commit/6b7864004d3442dbcfaf8687f63262c1c629f569'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpwp-69xv-c67f'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp-session'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:06Z', 'nvd_published_at': None}
1.4.0
GHSA-vwfg-qj3r-6v3r
2021-12-03T14:24:02Z
2018-09-17T21:57:47Z
2020-06-17T15:15:11Z
[]
Moderate severity vulnerability that affects actionpack
Withdrawn, accidental duplicate publish. The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwfg-qj3r-6v3r'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:11Z', 'nvd_published_at': None}
1.4.0
GHSA-5r76-cjf4-c9qx
2021-09-01T22:20:48Z
2018-09-06T03:24:57Z
null
['CVE-2018-16406']
Moderate severity vulnerability that affects mayan-edms
An issue was discovered in Mayan EDMS before 3.0.2. The Cabinets app has XSS via a crafted cabinet label.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mayan-edms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16406'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5r76-cjf4-c9qx'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mayan-edms/mayan-edms'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/issues/495'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:13Z', 'nvd_published_at': None}
1.4.0
GHSA-8p2p-p8mg-x3cw
2022-04-25T22:32:08Z
2018-03-05T19:33:54Z
null
['CVE-2018-1000023']
Insight API transaction broadcast endpoint can result in Full Path Disclosure
Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'insight-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000023'}, {'type': 'WEB', 'url': 'https://github.com/bitpay/insight-api/issues/542'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p2p-p8mg-x3cw'}, {'type': 'PACKAGE', 'url': 'https://github.com/bitpay/insight-api'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:02Z', 'nvd_published_at': None}
1.4.0
GHSA-8xwg-wv7v-4vqp
2023-09-13T19:06:52Z
2018-03-26T16:41:17Z
null
['CVE-2018-1000136']
Electron Vulnerable to Code Execution by Re-Enabling Node.js Integration
A vulnerability has been discovered which allows Node.js integration to be re-enabled in some Electron applications that disable it. For the application to be impacted by this vulnerability it must meet all of these conditions - Runs on Electron 1.7, 1.8, or a 2.0.0-beta - Allows execution of arbitrary remote code - Disables Node.js integration - Does not explicitly declare webviewTag: false in its webPreferences - Does not enable the nativeWindowOption option - Does not intercept new-window events and manually override event.newGuest without using the supplied options tag ## Recommendation Update to `electron` version 1.7.13, 1.8.4, or 2.0.0-beta.5 or later. If you are unable to update your Electron version can mitigate the vulnerability with the following code. ```js app.on('web-contents-created', (event, win) => { win.on('new-window', (event, newURL, frameName, disposition, options, additionalFeatures) => { if (!options.webPreferences) options.webPreferences = {}; options.webPreferences.nodeIntegration = false; options.webPreferences.nodeIntegrationInWorker = false; options.webPreferences.webviewTag = false; delete options.webPreferences.preload; }) }) // and *IF* you don't use WebViews at all, // you might also want app.on('web-contents-created', (event, win) => { win.on('will-attach-webview', (event, webPreferences, params) => { event.preventDefault(); }) }) ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.0.0-beta.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000136'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/12271'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/12292'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/12294'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/1a48ee28276e6588dbf4e70e58d78e7bfdc57043'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/webview-fix'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/blog/webview-fix'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/574'}, {'type': 'WEB', 'url': 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:59Z', 'nvd_published_at': None}
1.4.0
GHSA-6x77-rpqf-j6mw
2023-09-08T21:00:26Z
2018-03-05T18:54:33Z
null
['CVE-2017-1000189']
ejs vulnerable to DoS due to weak input validation
nodejs ejs version older than 2.5.5 is vulnerable to a denial-of-service due to weak input validation in `ejs.renderFile()`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000189'}, {'type': 'WEB', 'url': 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x77-rpqf-j6mw'}, {'type': 'PACKAGE', 'url': 'https://github.com/mde/ejs'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041449/http://www.securityfocus.com/bid/101893'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:34Z', 'nvd_published_at': None}
1.4.0
GHSA-wfwm-chj7-w59r
2023-08-29T14:59:54Z
2018-03-05T18:29:32Z
null
['CVE-2017-16229']
Ox gem stack overflow in sax_parse
In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the `read_from_str` function in `sax_buf.c` when a crafted input is supplied to `sax_parse`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16229'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/ox/issues/195'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohler55/ox'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ox/CVE-2017-16229.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/ox/versions/2.8.1'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:13Z', 'nvd_published_at': None}
1.4.0
GHSA-h6rj-8r3c-9gpj
2022-04-25T22:38:49Z
2018-03-05T19:43:21Z
null
['CVE-2015-4412']
bson is vulnerable to denial of service due to incorrect regex validation
BSON injection vulnerability in the legal function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1229750'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/bson-ruby'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bson/CVE-2015-4412.yml'}, {'type': 'WEB', 'url': 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/06/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/75045'}]
{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:12Z', 'nvd_published_at': None}
1.4.0
GHSA-wpq7-q8j4-72jg
2022-04-25T22:40:41Z
2018-03-07T22:22:24Z
null
['CVE-2018-7307']
Auth0-js bypasses CSRF checks
The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it's missing from the authorization response, leaving the client vulnerable to CSRF attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7307'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-7307'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wpq7-q8j4-72jg'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:53Z', 'nvd_published_at': None}
1.4.0
GHSA-688c-3x49-6rqj
2023-08-29T15:23:28Z
2018-03-07T22:22:22Z
null
['CVE-2018-1000119']
rack-protection gem timing attack vulnerability when validating CSRF token
Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-protection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack-protection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.beta1'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0.rc3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/rack-protection/pull/98'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1060'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack-protection/CVE-2018-1000119.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/rack-protection'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4247'}]
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:34Z', 'nvd_published_at': None}
1.4.0
GHSA-82gw-pqf7-q3j2
2023-09-11T18:19:05Z
2018-03-13T20:38:51Z
null
['CVE-2018-1000086']
pym.js CSRF Vulnerability
NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js `_onNavigateToMessage` function. https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 can result in Arbitrary javascript code execution. This attack appears to be exploitable if the Attacker gains full javascript access to pages with Pym.js embeds, or when user visits an attacker-crafted page. This vulnerability appears to have been fixed in versions 1.3.2 and later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pym.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.2'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086'}, {'type': 'WEB', 'url': 'https://github.com/nprapps/pym.js/issues/170'}, {'type': 'WEB', 'url': 'https://github.com/nprapps/pym.js/commit/c3552a6cf2532664c17bd6a318fb3cf8e4cf2f97'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-82gw-pqf7-q3j2'}, {'type': 'PACKAGE', 'url': 'https://github.com/nprapps/pym.js'}, {'type': 'WEB', 'url': 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:59Z', 'nvd_published_at': None}
1.4.0
GHSA-325j-24f4-qv5x
2021-08-31T20:21:06Z
2018-03-07T22:22:20Z
null
['CVE-2018-7651']
Regular Expression Denial of Service in ssri
Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode. ## Recommendation Update to version 5.2.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7651'}, {'type': 'WEB', 'url': 'https://github.com/zkat/ssri/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-325j-24f4-qv5x'}, {'type': 'PACKAGE', 'url': 'https://github.com/zkat/ssri'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/565'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:37Z', 'nvd_published_at': None}
1.4.0
GHSA-vqcm-7f7f-r539
2022-04-25T22:09:39Z
2018-03-05T19:32:06Z
null
['CVE-2014-5004']
brbackup exposes database password to unauthorized users
lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'brbackup'}, 'versions': ['0.1.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5004'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/brbackup/CVE-2014-5004.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229054738/http://www.securityfocus.com/bid/68506'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/10/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:05Z', 'nvd_published_at': None}
1.4.0
GHSA-6jqp-j69q-pm62
2022-04-25T22:28:16Z
2018-03-05T19:16:56Z
null
['CVE-2018-7560']
AWS Lambda parser is vulnerable to Regular Expression Denial of Service
index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'aws-lambda-multipart-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560'}, {'type': 'WEB', 'url': 'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jqp-j69q-pm62'}, {'type': 'PACKAGE', 'url': 'https://github.com/myshenin/aws-lambda-multipart-parser'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:35Z', 'nvd_published_at': None}