schema_version
stringclasses 1
value | id
stringlengths 19
19
| modified
stringlengths 20
20
| published
stringlengths 20
20
| withdrawn
stringlengths 20
20
⌀ | aliases
stringlengths 2
20
| summary
stringlengths 14
228
| details
stringlengths 48
1.45k
| severity
stringlengths 2
78
| affected
stringlengths 79
6.96k
| references
stringlengths 143
6.38k
| database_specific
stringlengths 131
174
|
---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-7rr7-rcjw-56vj | 2023-07-05T19:08:30Z | 2018-12-05T17:17:02Z | null | ['CVE-2018-16477'] | Exposure of Sensitive Information to an Unauthorized Actor in activestorage | A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path.
Vulnerable apps are those using either GCS or the Disk service in production. Other storage services such as S3 or Azure aren't affected.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16477'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7rr7-rcjw-56vj'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/rubyonrails-security/3KQRnXDIuLg/mByx5KkqBAAJ'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2018/11/27/Rails-4-2-5-0-5-1-5-2-have-been-released/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hjm9-576q-399p | 2022-09-14T22:24:11Z | 2018-12-21T17:46:23Z | null | ['CVE-2018-1000854'] | Remote Code Execution in esigate-core | esigate.org esigate version 5.2 and earlier contains a CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in ESI directive with user specified XSLT that can result in Remote Code Execution. This attack appear to be exploitable via Use of another weakness in backend application to reflect ESI directives. This vulnerability appears to have been fixed in 5.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.esigate:esigate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000854'}, {'type': 'WEB', 'url': 'https://github.com/esigate/esigate/issues/209'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjm9-576q-399p'}, {'type': 'PACKAGE', 'url': 'https://github.com/esigate/esigate'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7x9j-7223-rg5m | 2022-09-14T22:24:42Z | 2018-12-21T17:51:51Z | null | ['CVE-2016-1000031'] | Improper Access Control in commons-fileupload | Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000031'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7x9j-7223-rg5m'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FILEUPLOAD-279'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-4812'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190212-0001/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2016-12'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2016-23'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2016-30'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/93604'}, {'type': 'WEB', 'url': 'http://www.zerodayinitiative.com/advisories/ZDI-16-570/'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:40Z', 'nvd_published_at': '2016-10-25T14:29:00Z'} |
1.4.0 | GHSA-9fcp-vcq9-9h2h | 2022-09-14T22:12:13Z | 2018-12-19T19:24:18Z | null | ['CVE-2018-19907'] | OS Command Injection in craftercms:crafter-studio | A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19907'}, {'type': 'WEB', 'url': 'https://github.com/craftercms/craftercms/issues/2677'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9fcp-vcq9-9h2h'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/craftercms'}, {'type': 'WEB', 'url': 'https://medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77hp-pfxw-4w63 | 2022-09-14T22:20:53Z | 2018-12-20T22:02:09Z | null | ['CVE-2018-1000822'] | XML External Entity (XXE) vulnerability in codelibs fess | codelibs fess version before commit faa265b contains a XML External Entity (XXE) vulnerability in GSA XML file parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This attack appear to be exploitable via specially crafted GSA XML files. This vulnerability appears to have been fixed in after commit faa265b. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codelibs.fess:fess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000822'}, {'type': 'WEB', 'url': 'https://github.com/codelibs/fess/issues/1851'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/27/fess-XXE/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77hp-pfxw-4w63'}, {'type': 'PACKAGE', 'url': 'https://github.com/codelibs/fess'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwr2-wj63-86gr | 2023-09-12T21:07:28Z | 2018-12-06T15:49:10Z | null | ['CVE-2018-16478'] | Path Traversal in simplehttpserver | All versions of `simplehttpserver` are vulnerable to Path Traversal.
This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL.
## Recommendation
No fix is currently available. Do not use `simplehttpserver` in production or consider using an alternative module until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simplehttpserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16478'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/403703'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwr2-wj63-86gr'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/484.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/tikonen/blog/tree/master/simplehttpserver'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/744'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r2pp-x4mm-4999 | 2022-09-14T22:20:27Z | 2018-12-20T22:02:02Z | null | ['CVE-2018-1000820'] | XML External Entity (XXE) vulnerability in neo4j.procedure:apoc | neo4j-contrib neo4j-apoc-procedures version before commit 45bc09c contains a XML External Entity (XXE) vulnerability in XML Parser that can result in Disclosure of confidential data, denial of service, SSRF, port scanning. This vulnerability appears to have been fixed in after commit 45bc09c. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.4.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000820'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/issues/931'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/27/neo4f-apoc-procedures-XXE/'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:21Z', 'nvd_published_at': '2018-12-20T15:29:00Z'} |
1.4.0 | GHSA-v4x4-98cg-wr4g | 2023-09-05T17:59:57Z | 2018-12-26T17:45:19Z | null | ['CVE-2018-20325'] | Code injection in Danijar Definitions | There is a vulnerability in `load()` method in definitions/parser.py in the Danijar Hafner definitions package for Python. It can execute arbitrary python commands resulting in command execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'definitions'}, 'ecosystem_specific': {'affected_functions': ['definitions.parser.Parser._load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20325'}, {'type': 'WEB', 'url': 'https://github.com/danijar/definitions/issues/14'}, {'type': 'PACKAGE', 'url': 'https://github.com/danijar/definitions'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-www2-v7xj-xrc6 | 2022-09-14T22:10:48Z | 2018-12-12T15:52:07Z | null | ['CVE-2018-20060'] | Exposure of Sensitive Information to an Unauthorized Actor in urllib3 | urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ecosystem_specific': {'affected_functions': ['urllib3.poolmanager.PoolManager.urlopen', 'urllib3.util.retry.Retry', 'urllib3.util.retry.Retry.__init__', 'urllib3.util.retry.Retry.new']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20060'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/issues/1316'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/pull/1346'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/commit/560bd227b90f74417ffaedebf5f8d05a8ee4f532'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2272'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1649153'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-www2-v7xj-xrc6'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/06/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5SJERZEJDSUYQP7BNBXMBHRHGY26HRZD/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BXLAXHM3Z6DUCXZ7ZXZ2EAYJXWDCZFCT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWP36YW3KSVLXDBY3QJKDYEPCIMN3VQZ/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3990-1/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00039.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:30Z', 'nvd_published_at': '2018-12-11T17:29:00Z'} |
1.4.0 | GHSA-h4x4-5qp2-wp46 | 2021-09-13T15:14:09Z | 2018-12-21T17:46:54Z | null | ['CVE-2018-1000873'] | Moderate severity vulnerability that affects com.fasterxml.jackson.datatype:jackson-datatype-jsr353 | Fasterxml Jackson version Before 2.9.8 contains a CWE-20: Improper Input Validation vulnerability in Jackson-Databind that can result in Causes a denial-of-service (DoS). This attack appear to be exploitable via The victim deserializes malicious input, specifically very large values in the nanoseconds field of a time value. This vulnerability appears to have been fixed in 2.9.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.datatype:jackson-datatype-jsr310'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000873'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-modules-java8/issues/90'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-modules-java8/pull/87'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1665601'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-modules-java8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4x4-5qp2-wp46'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200904-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:51Z', 'nvd_published_at': '2018-12-20T17:29:00Z'} |
1.4.0 | GHSA-3448-vfvv-xp9g | 2023-09-27T11:10:06Z | 2018-12-26T17:45:07Z | null | ['CVE-2018-17197'] | Apache Tika Denial of Service due to Infinite Loop in Tika's SQLite3Parser | A carefully crafted or corrupt sqlite file can cause an infinite loop in Apache Tika's SQLite3Parser in versions 1.8-1.19.1 of Apache Tika. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17197'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3448-vfvv-xp9g'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7c021a4ea2037e52e74628e17e8e0e2acab1f447160edc8be0eae6d3@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106293'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-27xw-p8v6-9jjr | 2022-09-14T22:14:12Z | 2018-12-20T22:01:31Z | null | ['CVE-2018-15801'] | Spring Security vulnerable to Authorization Bypass | Spring Security versions 5.1.x prior to 5.1.2 contain an authorization bypass vulnerability during JWT issuer validation. In order to be impacted, the same private key for an honest issuer and a malicious user must be used when signing JWTs. In that case, a malicious user could fashion signed JWTs with the malicious issuer URL that may be granted for the honest issuer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15801'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-27xw-p8v6-9jjr'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2018-15801'}] | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:43Z', 'nvd_published_at': '2018-12-19T22:29:00Z'} |
1.4.0 | GHSA-8jjf-w7j6-323c | 2023-08-18T21:00:53Z | 2018-01-04T21:03:33Z | null | ['CVE-2017-1000452'] | Samlify vulnerable to Authentication Bypass by allowing tokens to be reused with different usernames | Versions of `samlify` prior to 2.4.0-rc5 are vulnerable to Authentication Bypass. The package fails to prevent XML Signature Wrapping, allowing tokens to be reused with different usernames. A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider.
## Recommendation
Upgrade to version 2.4.0-rc5 or later | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'samlify'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0-rc5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000452'}, {'type': 'WEB', 'url': 'https://github.com/tngan/samlify/commit/d382bbc7c6b8ea889839ae1f178730c25b09eb42'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/356284'}, {'type': 'PACKAGE', 'url': 'https://github.com/tngan/samlify'}, {'type': 'WEB', 'url': 'https://github.com/tngan/samlify/compare/v2.4.0-rc4...v2.4.0-rc5'}, {'type': 'WEB', 'url': 'https://github.com/tngan/samlify/releases/tag/v2.4.0-rc5'}, {'type': 'WEB', 'url': 'https://www.whitehats.nl/blog/xml-signature-wrapping-samlify'}] | {'cwe_ids': ['CWE-347', 'CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m34x-wgrh-g897 | 2022-04-28T20:13:30Z | 2018-01-24T19:38:52Z | null | ['CVE-2018-6184'] | Directory traversal vulnerability in Next.js | Next.js 4 before 4.2.3 has Directory Traversal under the `/_next` request namespace. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6184'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m34x-wgrh-g897'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/4.2.3'}, {'type': 'PACKAGE', 'url': 'https://github.com/zeit/next.js'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5jcf-c5rg-rmm8 | 2023-01-26T20:24:38Z | 2018-01-22T13:31:34Z | null | ['CVE-2017-0889'] | paperclip Server-Side Request Forgery vulnerability | Paperclip ruby gem version 3.1.4 and later suffers from a Server-SIde Request Forgery (SSRF) vulnerability in the `Paperclip::UriAdapter` class. Attackers may be able to access information about internal network resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'paperclip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.4'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0889'}, {'type': 'WEB', 'url': 'https://github.com/thoughtbot/paperclip/pull/2435'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/209430'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/713'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paperclip/CVE-2017-0889.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/paperclip'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:31Z', 'nvd_published_at': '2017-11-13T17:29:00Z'} |
1.4.0 | GHSA-mvw8-v767-qhjm | 2023-01-26T21:19:48Z | 2018-01-06T01:11:52Z | null | ['CVE-2018-5216'] | Radiant CMS vulnerable to Cross-site Scripting | Radiant CMS 1.1.4 has XSS via crafted Markdown input in the `part_body_content` parameter to an `admin/pages/*/edit `resource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'radiant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5216'}, {'type': 'PACKAGE', 'url': 'https://github.com/imsebao/404team'}, {'type': 'WEB', 'url': 'https://github.com/imsebao/404team/blob/master/radiantcms.md'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9pr6-grf4-x2fr | 2022-04-25T22:27:19Z | 2018-01-29T15:45:28Z | null | ['CVE-2017-18076'] | Omniauth allows POST parameters to be stored in session | In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18076'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/867'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/867/commits/71866c5264122e196847a3980c43051446a03e9b'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/888523'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/omniauth'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth/CVE-2017-18076.yml'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4109'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m7p8-9w66-9frm | 2023-01-23T21:24:13Z | 2018-01-06T01:11:34Z | null | ['CVE-2017-17718'] | net-ldap Improper Certificate Validation vulnerability | The Net::LDAP (aka net-ldap) gem before 0.16.0 for Ruby has Missing SSL Certificate Validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'net-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17718'}, {'type': 'WEB', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap/issues/258'}, {'type': 'WEB', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap/pull/279'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-ldap/ruby-net-ldap'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2017/12/17/10'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mhpp-875w-9cpv | 2021-09-15T20:10:32Z | 2018-01-22T13:32:42Z | null | ['CVE-2016-10707'] | Denial of Service in jquery | Affected versions of `jquery` use a lowercasing logic on attribute names. When given a boolean attribute with a name that contains uppercase characters, `jquery` enters into an infinite recursion loop, exceeding the call stack limit, and resulting in a denial of service condition.
## Recommendation
Update to version 3.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-rc.1'}, {'fixed': '3.0.0'}]}], 'versions': ['3.0.0-rc.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10707'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/3133'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/3133#issuecomment-358978489'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/3134'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mhpp-875w-9cpv'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2016-10707.yml'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jquery:20160529'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/330'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rhgq-vv9x-j4p5 | 2023-07-31T20:48:53Z | 2018-01-22T23:45:33Z | null | ['CVE-2014-5000'] | lawn-login exposes database password to unauthorized users | The login function in `lib/lawn.rb` in the lawn-login gem 0.0.7 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'lawn-login'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.0.7']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5000'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lawn-login/CVE-2014-5000.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/skalnik/lawn-login'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229060607/http://www.vapid.dhs.org/advisories/lawn-login-0.0.7.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-crmx-v835-hcp4 | 2021-12-02T22:47:59Z | 2018-01-04T21:04:09Z | 2021-12-02T22:47:36Z | ['CVE-2017-17461'] | Moderate severity vulnerability that affects marked | # Withdrawn
This advisory has been withdrawn, per NVD: ["This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue."](https://nvd.nist.gov/vuln/detail/CVE-2017-17461)
# Original Description
A Regular expression Denial of Service (ReDoS) vulnerability in the file marked.js of the marked npm package (tested on version 0.3.7) allows a remote attacker to overload and crash a server by passing a maliciously crafted string. | [] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17461'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-crmx-v835-hcp4'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x45-86q6-rcmr | 2023-07-31T20:50:46Z | 2018-01-22T23:17:39Z | null | ['CVE-2014-4994'] | Gyazo allows local users to write arbitrary files | `lib/gyazo/client.rb` in the gyazo gem 1.0.0 for Ruby allows local users to write to arbitrary files via a symlink attack on a temporary file, related to time-based filenames. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gyazo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0'}]}], 'versions': ['1.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4994'}, {'type': 'PACKAGE', 'url': 'https://github.com/gyazo/gyazo-ruby'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/gyazo/CVE-2014-4994.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229061943/http://www.vapid.dhs.org/advisories/gyazo-1.0.0.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/13'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:27Z', 'nvd_published_at': '2018-01-10T18:29:00Z'} |
1.4.0 | GHSA-rmxg-73gg-4p98 | 2021-09-17T18:58:18Z | 2018-01-22T13:32:06Z | null | ['CVE-2015-9251'] | Cross-Site Scripting (XSS) in jquery | Affected versions of `jquery` interpret `text/javascript` responses from cross-origin ajax requests, and automatically execute the contents in `jQuery.globalEval`, even when the ajax request doesn't contain the `dataType` option.
## Recommendation
Update to version 3.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.3'}, {'fixed': '3.0.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.3'}, {'fixed': '3.0.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jquery-rails'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.3'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9251'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/issues/2432#issuecomment-403761229'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/2588'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/pull/2588/commits/c254d308a7d3f1eac4d0b42837804cfffcba4bb2'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/b078a62013782c7424a4a61a240c23c4c0b42614'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/f60729f3903d17917dc351f3ac87794de379b0cc'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0481'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'PACKAGE', 'url': 'https://github.com/jquery/jquery'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/master/CHANGELOG.md#420'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/blob/v4.2.0/vendor/assets/javascripts/jquery3.js#L9377'}, {'type': 'WEB', 'url': 'https://github.com/rails/jquery-rails/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jquery-rails/CVE-2015-9251.yml'}, {'type': 'WEB', 'url': 'https://ics-cert.us-cert.gov/advisories/ICSA-18-212-04'}, {'type': 'WEB', 'url': 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210108-0004/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-DOTNET-JQUERY-450227'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:jquery:20150627'}, {'type': 'WEB', 'url': 'https://sw.aveva.com/hubfs/assets-2018/pdf/security-bulletin/SecurityBulletin_LFSec126.pdf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030101/http://www.securityfocus.com/bid/105658'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-08'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:10Z', 'nvd_published_at': '2018-01-18T23:29:00Z'} |
1.4.0 | GHSA-832h-xg76-4gv6 | 2021-09-03T22:10:24Z | 2018-01-29T15:50:46Z | null | ['CVE-2017-18077'] | ReDoS in brace-expansion | Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition.
## Proof of Concept
```
var expand = require('brace-expansion');
expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}');
```
## Recommendation
Update to version 1.1.7 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'brace-expansion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/brace-expansion/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/brace-expansion/pull/35'}, {'type': 'WEB', 'url': 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/862712'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-832h-xg76-4gv6'}, {'type': 'PACKAGE', 'url': 'https://github.com/juliangruber/brace-expansion'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/338'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w222-53c6-c86p | 2021-06-10T19:55:43Z | 2018-01-23T03:57:44Z | null | ['CVE-2018-1000006'] | Remote Code Execution in electron | Affected versions of `electron` may be susceptible to a remote code execution flaw when certain conditions are met:
1. The electron application is running on Windows.
2. The electron application registers as the default handler for a protocol, such as `nodeapp://`.
This vulnerability is caused by a failure to sanitize additional arguments to chromium in the command line handler for Electron.
MacOS and Linux are not vulnerable.
## Recommendation
Update electron to a version that is not vulnerable. If updating is not possible, the electron team has provided the following guidance:
If for some reason you are unable to upgrade your Electron version, you can append `--` as the last argument when calling `app.setAsDefaultProtocolClient`, which prevents Chromium from parsing further options. The double dash `--` signifies the end of command options, after which only positional parameters are accepted.
```
app.setAsDefaultProtocolClient(protocol, process.execPath, [
'--your-switches-here',
'--'
])
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.2-beta.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2-beta.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000006'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/protocol-handler-fix'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w222-53c6-c86p'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/releases/tag/v1.8.2-beta.4'}, {'type': 'WEB', 'url': 'https://medium.com/@Wflki/exploiting-electron-rce-in-exodus-wallet-d9e6db13c374'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43899/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/44357/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/563'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102796'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-94cq-7ccq-cmcm | 2023-01-23T20:52:59Z | 2018-01-24T17:10:45Z | null | ['CVE-2014-5002'] | lynx doesn't properly sanitize user input and exposes database password to unauthorized users | The lynx gem prior to 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
As of version 1.0.0, lynx no longer supports a `--password` option. Passwords are only configured in a configuration file, so it's no longer possible to expose passwords on the command line. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'lynx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5002'}, {'type': 'WEB', 'url': 'https://github.com/panthomakos/lynx/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/panthomakos/lynx'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lynx/CVE-2014-5002.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/23'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/lynx-0.2.0.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7px7-7xjx-hxm8 | 2023-09-07T22:53:21Z | 2018-01-04T21:04:19Z | null | ['CVE-2017-1000427'] | Marked vulnerable to XSS from data URIs | marked version 0.3.6 and earlier is vulnerable to an XSS attack in the data: URI parser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000427'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7px7-7xjx-hxm8'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:marked:20170112'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qh2h-chj9-jffq | 2022-08-03T21:32:55Z | 2018-06-08T12:43:43Z | null | ['CVE-2017-16042'] | Growl before 1.10.0 vulnerable to Command Injection | Affected versions of `growl` do not properly sanitize input prior to passing it into a shell command, allowing for arbitrary command execution.
## Recommendation
Update to version 1.10.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'growl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16042'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/pull/61'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/tj/node-growl/commit/d71177d5331c9de4658aca62e0ac921f178b0669'}, {'type': 'PACKAGE', 'url': 'https://github.com/tj/node-growl'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/146'}] | {'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pr3h-jjhj-573x | 2023-09-05T21:05:18Z | 2018-06-20T22:18:58Z | null | ['CVE-2018-3760'] | Sprockets path traversal leads to information leak | Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production.
All users running an affected release should either upgrade or use one of the work arounds immediately.
### Workaround:
In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets.
This work around will not be possible in all hosting environments and upgrading is advised. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0.beta1'}, {'fixed': '4.0.0.beta8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0.beta7'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'sprockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3760'}, {'type': 'WEB', 'url': 'https://github.com/rails/sprockets/commit/18b8a7f07a50c245e9aee7854ecdbe606bbd8bb5'}, {'type': 'WEB', 'url': 'https://github.com/rails/sprockets/commit/9c34fa05900b968d74f08ccf40917848a7be9441'}, {'type': 'WEB', 'url': 'https://github.com/rails/sprockets/commit/c09131cf5b2c479263939c8582e22b98ed616c5f'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2244'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2245'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2561'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2745'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/sprockets'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/msg/rubyonrails-security/ft_J--l55fM/7roDfQ50BwAJ'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4242'}] | {'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4662-j96g-mv46 | 2020-08-31T18:12:20Z | 2018-06-07T19:43:06Z | null | ['CVE-2016-10548'] | Arbitrary Code Injection in reduce-css-calc | Affected versions of `reduce-css-calc` pass input directly to `eval`. If user input is passed into the calc function, this may result in cross-site scripting on the browser, or remote code execution on the server.
## Proof of Concept
```
const reduceCSSCalc = require('reduce-css-calc');
console.log(reduceCSSCalc(`calc( (Buffer(10000)))`));
console.log(reduceCSSCalc(`calc( (global['fs'] = require('fs')))`));
console.log(reduceCSSCalc(`calc( (fs['readFileSync']("/etc/passwd", "utf-8")))`));
```
## Recommendation
Update to version 1.2.5 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'reduce-css-calc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10548'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/415a41b561ebea9b341efbb40b802fc9'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4662-j96g-mv46'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/144'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwrf-r5r4-7775 | 2020-08-31T18:09:06Z | 2018-06-07T19:43:25Z | null | ['CVE-2015-9236'] | Incorrect handling of CORS preflight request headers in hapi | Versions of `hapi` prior to 11.0.0 implement CORS incorrectly, allowing for configurations that at best return inconsistent headers, and at worst allow cross-origin activities that are expected to be forbidden.
If the connection has CORS enabled but one route has it off, and the route is not GET, the OPTIONS prefetch request will return the default CORS headers and then the actual request will go through and return no CORS headers. This defeats the purpose of turning CORS on the route.
## Recommendation
Update to version 11.0.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9236'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2840'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/issues/2850'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwrf-r5r4-7775'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/45'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-39pj-gq8q-9pfj | 2021-08-31T20:54:56Z | 2018-06-07T19:43:20Z | null | ['CVE-2015-9240'] | Authentication Weakness in keystone | Versions of `keystone` prior to 0.3.16 are affected by a partial authentication bypass vulnerability. In the default sign in functionality, if an attacker provides a full and correct password, yet only provides part of the associated email address, authentication will be granted.
## Recommendation
Update to version 0.3.16 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9240'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-39pj-gq8q-9pfj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/60'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/keystone'}] | {'cwe_ids': ['CWE-1255'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3pxp-6963-46r9 | 2023-01-31T01:38:38Z | 2018-06-07T19:43:00Z | null | ['CVE-2018-3746'] | Command Injection in pdfinfojs | Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor.
## Recommendation
Update to version 0.4.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'pdfinfojs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746'}, {'type': 'WEB', 'url': 'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330957'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3pxp-6963-46r9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/643'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:51Z', 'nvd_published_at': '2018-06-01T17:29:00Z'} |
1.4.0 | GHSA-rc8h-3fv6-pxv8 | 2020-08-31T18:09:46Z | 2018-06-07T19:43:15Z | null | ['CVE-2015-9241'] | Denial of Service in hapi | Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability.
The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers.
This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hapi will continue to hold the socket open until timed out (default node timeout is 2 minutes).
## Recommendation
Update to v11.1.3 or later | [] | [{'package': {'ecosystem': 'npm', 'name': 'hapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/pull/179'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/63'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:54:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq35-wqvf-r23c | 2023-01-23T21:24:55Z | 2018-06-05T21:32:06Z | null | ['CVE-2018-11627'] | Sinatra Cross-site Scripting vulnerability | Sinatra before 2.0.2 has XSS via the 400 Bad Request page that occurs upon a params parser exception. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11627'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/issues/1428'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/12786867d6faaceaec62c7c2cb5b0e2dc074d71a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0212'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0315'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sinatra/CVE-2018-11627.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/sinatra'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwjc-q9px-r9vq | 2023-05-22T15:35:11Z | 2018-06-07T19:43:11Z | null | ['CVE-2015-9242'] | Denial of Service in ecstatic | Versions of `ecstatic` prior to 1.4.0 are affected by a denial of service vulnerability when certain input strings are sent via the `Last-Modified` or `If-Modified-Since` headers.
Parsing certain inputs with `new Date()` or `Date.parse()` cases v8 to crash. As ecstatic passes the value of the affected headers into one of these functions, sending certain inputs via one of the headers will cause the server to crash.
## Recommendation
Update to version 1.4.0 or later. | [] | [{'package': {'ecosystem': 'npm', 'name': 'ecstatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9242'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/pull/179'}, {'type': 'WEB', 'url': 'https://github.com/jfhbrook/node-ecstatic/commit/0d0a2779ac5e5843d3745920212dfac9b69440e2'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/v8/issues/detail?id=4640'}, {'type': 'PACKAGE', 'url': 'https://github.com/jfhbrook/node-ecstatic'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vpch-rxw3-fgx8 | 2021-09-20T22:10:09Z | 2018-04-25T14:30:43Z | null | ['CVE-2018-1000160'] | Cross-Site Scripting in @risingstack/protect | All versions of `@risingstack/protect` are vulnerable to Cross-Site Scripting. The `isXss()` XSS validator has several bypasses that may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package. The package is not actively maintained and will not be patched. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@risingstack/protect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000160'}, {'type': 'WEB', 'url': 'https://github.com/RisingStack/protect/issues/16'}, {'type': 'PACKAGE', 'url': 'https://github.com/RisingStack/protect'}, {'type': 'WEB', 'url': 'https://github.com/RisingStack/protect/blob/60b0c91e86686d34e5202419ce9ae7e8dc08edcd/lib/rules/xss.js#L4-L13'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vpch-rxw3-fgx8'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-RISINGSTACKPROTECT-455402'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1116'}, {'type': 'WEB', 'url': 'http://embed.plnkr.co/xHbhB29JWWyMUMeHsLrm'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-px3r-jm9g-c8w8 | 2023-03-01T18:54:07Z | 2018-04-26T15:41:10Z | null | ['CVE-2018-3741'] | rails-html-sanitizer Cross-site Scripting vulnerability | There is a possible XSS vulnerability in all rails-html-sanitizer gem versions below 1.0.4 for Ruby. The gem allows non-whitelisted attributes to be present in sanitized output when input with specially-crafted HTML fragments, and these attributes can lead to an XSS attack on target applications. This issue is similar to CVE-2018-8048 in Loofah. All users running an affected release should either upgrade or use one of the workarounds immediately. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3741'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/f3ba1a839a35f2ba7f941c15e239a1cb379d56ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails-html-sanitizer'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:14Z', 'nvd_published_at': '2018-03-30T19:29:00Z'} |
1.4.0 | GHSA-882p-jqgm-f45g | 2023-05-04T19:56:39Z | 2018-04-13T16:17:46Z | null | ['CVE-2017-18258'] | Uncontrolled resource consumption in nokogiri | The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18258'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-882p-jqgm-f45g'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-18258.yml'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10284'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190719-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-1/'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:47Z', 'nvd_published_at': '2018-04-08T17:29:00Z'} |
1.4.0 | GHSA-jp4x-w63m-7wgm | 2023-09-13T19:42:48Z | 2018-04-26T15:25:17Z | null | ['CVE-2018-3728'] | Prototype Pollution in hoek | Versions of `hoek` prior to 4.2.1 and 5.0.3 are vulnerable to prototype pollution.
The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an _unvalidated_ payload created from a JSON string containing the `__proto__` property.
This can be demonstrated like so:
```javascript
var Hoek = require('hoek');
var malicious_payload = '{"__proto__":{"oops":"It works !"}}';
var a = {};
console.log("Before : " + a.oops);
Hoek.merge({}, JSON.parse(malicious_payload));
console.log("After : " + a.oops);
```
This type of attack can be used to overwrite existing properties causing a potential denial of service.
## Recommendation
Update to version 4.2.1, 5.0.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hoek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'hoek'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3728'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/commit/32ed5c9413321fbc37da5ca81a7cbab693786dee'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310439'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1263'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1264'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jp4x-w63m-7wgm'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:hoek:20180212'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/566'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103108'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-23v3-qfrj-wmgh | 2020-06-16T20:51:48Z | 2018-09-17T21:54:22Z | 2020-06-16T20:51:08Z | [] | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.20'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7818'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-23v3-qfrj-wmgh'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9mr8-6prp-gwjv | 2021-09-08T20:06:59Z | 2018-09-10T15:20:30Z | null | ['CVE-2018-3754'] | SQL Injection in query-mysql | All versions of `query-mysql` are vulnerable to SQL injection due to lack of user input sanitization allows to run arbitrary SQL queries when fetching data from database.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is passed into this module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'query-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3754'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311244'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mr8-6prp-gwjv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/666'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jxjr-5h69-qw3w | 2023-07-05T17:45:36Z | 2018-09-17T21:57:38Z | null | ['CVE-2015-7499'] | Heap-based buffer overflow in nokogiri | Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or crash the application. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7499'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1281925'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc'}, {'type': 'WEB', 'url': 'https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jxjr-5h69-qw3w'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-7499.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/ruby-security-ann/Dy7YiKb_pMM'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210724022841/http://www.securityfocus.com/bid/79509'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211205133229/https://securitytracker.com/id/1034243'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2549.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2550.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3430'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2834-1'}, {'type': 'WEB', 'url': 'http://xmlsoft.org/news.html'}] | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:24Z', 'nvd_published_at': '2015-12-15T21:59:00Z'} |
1.4.0 | GHSA-7hp2-xwpj-95jq | 2023-06-30T19:54:52Z | 2018-09-17T21:53:42Z | null | ['CVE-2015-8806'] | Denial of service or RCE from libxml2 and libxslt | Nokogiri is affected by series of vulnerabilities in libxml2 and libxslt, which are libraries Nokogiri depends on. It was discovered that libxml2 and libxslt incorrectly handled certain malformed documents, which can allow malicious users to cause issues ranging from denial of service to remote code execution attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8806'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1473'}, {'type': 'WEB', 'url': 'https://bugzilla.gnome.org/show_bug.cgi?id=749115'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-8806.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-37'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160928171015/http://www.securityfocus.com/bid/82071'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2016/dsa-3593'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/02/03/5'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2994-1'}] | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gpvj-q7fp-jcch | 2023-09-12T20:49:06Z | 2018-09-06T03:22:59Z | null | ['CVE-2018-3787'] | simplehttpserver allows directory traversal and file listing | Path traversal in simplehttpserver <v0.2.1 allows listing any file on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simplehttpserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3787'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/357109'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gpvj-q7fp-jcch'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:52Z', 'nvd_published_at': '2018-08-31T16:29:00Z'} |
1.4.0 | GHSA-qg3g-2mgh-33j8 | 2021-09-16T19:58:01Z | 2018-09-10T15:19:49Z | null | ['CVE-2018-8319'] | Sensitive Data Exposure in msrcrypto | Versions of `msrcrypto` prior to 1.4.1 are vulnerable to Sensitive Data Exposure. The package's Elliptic Curve Cryptography (ECC) implementation may leak information about a server's private ECC key. It can also allow attackers to craft invalid ECDSA signatures that pass as valid. There is no published proof-of-concept for this vulnerability.
## Recommendation
Upgrade to version 1.4.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'msrcrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8319'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qg3g-2mgh-33j8'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8319'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1112'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104655'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1041268'}] | {'cwe_ids': ['CWE-682'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hxhm-3vj9-6cqh | 2023-09-07T20:35:25Z | 2018-09-18T13:49:31Z | null | ['CVE-2016-10632'] | apk-parser2 downloads Resources over HTTP | Affected versions of `apk-parser2` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `apk-parser2`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'apk-parser2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10632'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hxhm-3vj9-6cqh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/223'}] | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m8cr-q935-8j67 | 2023-03-01T01:34:56Z | 2018-09-18T13:47:57Z | null | ['CVE-2018-3766'] | Path Traversal in buttle | All versions of `buttle` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'buttle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3766'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/358112'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m8cr-q935-8j67'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/990'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:26Z', 'nvd_published_at': '2018-07-05T16:29:00Z'} |
1.4.0 | GHSA-35c4-f3rq-f9g3 | 2020-06-16T21:42:52Z | 2018-09-17T21:57:23Z | 2020-06-16T20:54:03Z | [] | Moderate severity vulnerability that affects activesupport | Withdrawn, accidental duplicate publish.
The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.11'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activesupport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3227'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-35c4-f3rq-f9g3'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pj7m-g53m-7638 | 2023-01-23T21:30:26Z | 2018-09-13T15:49:56Z | null | ['CVE-2018-14041'] | Bootstrap Cross-site Scripting vulnerability | In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy. This is similar to CVE-2018-14042. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14041'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26423'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26627'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26630'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:18Z', 'nvd_published_at': '2018-07-13T14:29:00Z'} |
1.4.0 | GHSA-m4fw-77v7-924m | 2023-08-31T21:35:38Z | 2018-09-13T15:47:57Z | null | ['CVE-2018-1000559'] | Qutebrowser XSS Vulnerability | qutebrowser version introduced in v0.11.0 ([1179ee7a937fb31414d77d9970bac21095358449](https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f)) contains a Cross Site Scripting (XSS) vulnerability in history command, `qute://history` page that can result in Via injected JavaScript code, a website can steal the user's browsing history. This attack appear to be exploitable via the victim must open a page with a specially crafted `<title>` attribute, and then open the `qute://history` site via the `:history` command. This vulnerability appears to have been fixed in fixed in v1.3.3 ([4c9360237f186681b1e3f2a0f30c45161cf405c7](https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7), to be released today) and v1.4.0 ([5a7869f2feaa346853d2a85413d6527c87ef0d9f](https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f), released later this week). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'qutebrowser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000559'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/issues/4011'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/4c9360237f186681b1e3f2a0f30c45161cf405c7'}, {'type': 'WEB', 'url': 'https://github.com/qutebrowser/qutebrowser/commit/5a7869f2feaa346853d2a85413d6527c87ef0d9f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m4fw-77v7-924m'}, {'type': 'PACKAGE', 'url': 'https://github.com/qutebrowser/qutebrowser'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7375-vjr2-3g7w | 2021-09-02T19:13:45Z | 2018-09-27T11:37:19Z | null | ['CVE-2018-3748'] | Cross-Site Scripting in glance | Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'}, {'type': 'WEB', 'url': 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310133'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7375-vjr2-3g7w'}, {'type': 'PACKAGE', 'url': 'https://github.com/jarofghosts/glance'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/610'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6h9-pphv-m266 | 2023-08-08T10:40:52Z | 2018-09-13T15:47:26Z | null | ['CVE-2018-1000523'] | Topydo Improper Input Validation vulnerability | topydo contains a CWE-20: Improper Input Validation vulnerability in `ListFormatParser::parse`, file `topydo/lib/ListFormat.py` line 292 as of d4f843dac71308b2f29a7c2cdc76f055c3841523 that can result in Injection of arbitrary bytes to the terminal, including terminal escape code sequences. This attack appear to be exploitable via The victim must open a todo.txt with at least one specially crafted line. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'topydo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000523'}, {'type': 'WEB', 'url': 'https://github.com/bram85/topydo/issues/240'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6h9-pphv-m266'}, {'type': 'PACKAGE', 'url': 'https://github.com/bram85/topydo'}, {'type': 'WEB', 'url': 'https://github.com/bram85/topydo/blob/master/topydo/lib/ListFormat.py#L292'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mrhj-2g4v-39qx | 2020-06-16T21:54:12Z | 2018-09-17T21:58:19Z | 2020-06-16T21:47:07Z | [] | Moderate severity vulnerability that affects rails-html-sanitizer | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem 1.0.2 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via an HTML entity that is mishandled by the Rails::Html::FullSanitizer class. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.2'}, {'fixed': '1.0.3'}]}], 'versions': ['1.0.2']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7579'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mrhj-2g4v-39qx'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7phj-gmgx-2r66 | 2021-12-03T14:24:43Z | 2018-09-17T21:58:09Z | 2020-06-16T21:23:09Z | [] | Moderate severity vulnerability that affects activerecord | Withdrawn, accidental duplicate publish.
activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7577'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7phj-gmgx-2r66'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vqcq-mrmw-mcmg | 2022-04-26T18:30:20Z | 2018-09-06T03:27:18Z | null | ['CVE-2018-1000544'] | Rubyzip gem contains a Directory Traversal vulnerability in zip file component | rubyzip gem rubyzip version 1.2.1 and earlier contains a Directory Traversal vulnerability in Zip::File component that can result in write arbitrary files to the filesystem. This attack appear to be exploitable via If a site allows uploading of .zip files , an attacker can upload a malicious file that contains symlinks or files with absolute pathnames "../" to write arbitrary files to the filesystem..
This is similar to CVE-2017-5946 which was patched in 1.2.1 but the fix in that case was incomplete. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000544'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/issues/369'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3466'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2018-1000544.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/08/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00002.html'}] | {'cwe_ids': ['CWE-434', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fm87-46vv-jqrr | 2023-01-31T01:40:06Z | 2018-09-18T13:45:07Z | null | ['CVE-2018-3744'] | Path Traversal in html-pages | Versions of `html-pages` before 2.1.0 are vulnerable to path traversal.
## Recommendation
Update to version 2.1.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'html-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3744'}, {'type': 'WEB', 'url': 'https://github.com/danielcardoso/html-pages/issues/2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/306607'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fm87-46vv-jqrr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/665'}] | {'cwe_ids': ['CWE-22', 'CWE-35'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:53Z', 'nvd_published_at': '2018-05-29T20:29:00Z'} |
1.4.0 | GHSA-cvxm-f295-x957 | 2023-09-12T18:47:20Z | 2018-09-18T13:46:06Z | null | ['CVE-2018-3751'] | Prototype Pollution in merge-recursive | All versions of `merge-recursive` are vulnerable to Prototype Pollution. When malicious user input is merged with another object it allows the attacker to modify the prototype of Object via `__proto__` causing the addition or modification of an existing property.
Proof of concept:
```js
var merge = require('merge-recursive').recursive;
var malicious_payload = '{"__proto__":{"oops":"It works !"}}';
var a = {};
console.log("Before : " + a.oops);
merge({}, JSON.parse(malicious_payload));
console.log("After : " + a.oops);
```
## Recommendation
There is currently no fix available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'merge-recursive'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3751'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/311337'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cvxm-f295-x957'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/715'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pp57-mqmh-44h7 | 2021-09-16T18:18:02Z | 2018-09-06T23:24:21Z | null | ['CVE-2018-13797'] | Command Injection in macaddress | All versions of `macaddress` are vulnerable to command injection. For this vulnerability to be exploited an attacker needs to control the `iface` argument to the `one` method.
## Recommendation
Update to version 0.2.9 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'macaddress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13797'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/pull/20/'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/commit/358fd594adb196a86b94ac9c691f69fe5dad2332'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319467'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pp57-mqmh-44h7'}, {'type': 'PACKAGE', 'url': 'https://github.com/scravy/node-macaddress'}, {'type': 'WEB', 'url': 'https://github.com/scravy/node-macaddress/releases/tag/0.2.9'}, {'type': 'WEB', 'url': 'https://news.ycombinator.com/item?id=17283394'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/654'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-685w-vc84-wxcx | 2023-01-21T03:28:18Z | 2018-09-17T21:55:22Z | null | ['CVE-2014-8144'] | Doorkeeper contains Cross-site Request Forgery | Cross-site request forgery (CSRF) vulnerability in doorkeeper before 1.4.1 allows remote attackers to hijack the authentication of unspecified victims for requests that read a user OAuth authorization code via unknown vectors. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8144'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/99342'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-685w-vc84-wxcx'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q4/1076'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qf5x-qgx7-437h | 2020-06-17T15:15:04Z | 2018-09-17T21:54:11Z | 2020-06-17T15:15:04Z | [] | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.18'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0130'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qf5x-qgx7-437h'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5cv7-r488-wc5x | 2023-09-07T18:32:19Z | 2018-09-17T20:39:17Z | null | ['CVE-2017-16073'] | noderequest is malware | The `noderequest` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'noderequest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16073'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5cv7-r488-wc5x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/512'}] | {'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qc8j-m8j3-rjq6 | 2020-06-17T15:15:01Z | 2018-09-17T21:57:58Z | 2020-06-17T15:15:01Z | [] | Moderate severity vulnerability that affects rails-html-sanitizer | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via crafted tag attributes. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7578'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qc8j-m8j3-rjq6'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6834-r92f-jj42 | 2021-12-03T14:23:09Z | 2018-09-17T21:55:54Z | 2020-06-16T21:18:20Z | [] | Moderate severity vulnerability that affects actionview | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0752'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6834-r92f-jj42'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4xjh-m3qx-49wc | 2023-09-05T21:41:33Z | 2018-09-28T19:29:07Z | null | ['CVE-2018-17567'] | Jekyll allows attackers to access arbitrary files by specifying a symlink | Jekyll through 3.6.2, 3.7.x through 3.7.3, and 3.8.x through 3.8.3 allows attackers to access arbitrary files by specifying a symlink in the `include` key in the `_config.yml` file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'jekyll'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jekyll'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'jekyll'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17567'}, {'type': 'WEB', 'url': 'https://github.com/jekyll/jekyll/pull/7224'}, {'type': 'PACKAGE', 'url': 'https://github.com/jekyll/jekyll'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jekyll/CVE-2018-17567.yml'}, {'type': 'WEB', 'url': 'https://jekyllrb.com/news/2018/09/19/security-fixes-for-3-6-3-7-3-8/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/71da391f584b2fb301d2df0e491b279d87287e2fb4b11309f04ad984@%3Ccommits.accumulo.apache.org%3E'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4wch-fwmx-cf47 | 2023-09-08T20:55:42Z | 2018-09-18T13:50:25Z | null | ['CVE-2017-0930'] | Directory Traversal in augustine | Affected versions of `augustine` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
## Proof of Concept
```http
GET //etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No direct patch is available at this time.
Currently, the best mitigation for this flaw is to use a different, functionally equivalent static file server package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'augustine'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0930'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296282'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4wch-fwmx-cf47'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/559'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v543-gqhh-6gww | 2022-10-05T19:27:48Z | 2018-09-17T21:55:43Z | 2020-06-17T15:15:09Z | [] | Duplicate Advisory: Moderate severity vulnerability that affects activemodel | ## Duplicate advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-543v-gj2c-r3ch](https://github.com/advisories/GHSA-543v-gj2c-r3ch). This link is maintained to preserve external references.
## Original Description
Active Model in Ruby on Rails 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 supports the use of instance-level writers for class accessors, which allows remote attackers to bypass intended validation steps via crafted parameters. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activemodel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0753'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v543-gqhh-6gww'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rq8g-5pc5-wrhr | 2023-03-29T19:11:42Z | 2018-09-11T18:22:50Z | null | ['CVE-2018-1000620'] | Insufficient Entropy in cryptiles | Versions of `cryptiles` prior to 4.1.2 are vulnerable to Insufficient Entropy. The `randomDigits()` method does not provide sufficient entropy and its generates digits that are not evenly distributed.
## Recommendation
Upgrade to version 4.1.2. The package is deprecated and has been moved to `@hapi/cryptiles` and it is strongly recommended to use the maintained package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cryptiles'}, 'ecosystem_specific': {'affected_functions': ['cryptiles.randomDigits', 'cryptiles.randomBits']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000620'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/cryptiles/issues/34'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/cryptiles/issues/35'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/cryptiles/commit/9332d4263a32b84e76bf538d7470d01ea63fa047'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rq8g-5pc5-wrhr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hapijs/cryptiles'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/476.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1464'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/720'}] | {'cwe_ids': ['CWE-331'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:29Z', 'nvd_published_at': '2018-07-09T20:29:00Z'} |
1.4.0 | GHSA-5xmj-wm96-fmw8 | 2020-06-16T21:38:53Z | 2018-09-17T21:54:37Z | 2020-06-16T21:17:39Z | [] | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.21'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7829'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5xmj-wm96-fmw8'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cfhg-9x44-78h2 | 2023-09-11T18:21:34Z | 2018-09-17T20:43:59Z | null | ['CVE-2018-16460'] | ps Enables OS Command Injection | Versions of `ps` before 1.0.0 are vulnerable to command injection.
### Proof of concept:
```js
var ps = require('ps');
ps.lookup({ pid: "$(touch success.txt)" }, function(err, proc) { // this method is vulnerable to command injection
if (err) {throw err;}
if (proc) {
console.log(proc); // Process name, something like "node" or "bash"
} else {
console.log('No such process');
}
});
// Result: The file success.txt will exist on the filesystem if the touch command was executed
```
## Recommendation
Update to version 1.0.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ps'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16460'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390848'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cfhg-9x44-78h2'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/470.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/728'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77pc-q5q7-qg9h | 2020-06-16T21:37:28Z | 2018-09-17T21:58:30Z | 2020-06-16T21:21:56Z | [] | Moderate severity vulnerability that affects rails-html-sanitizer | Withdrawn, accidental duplicate publish.
Cross-site scripting (XSS) vulnerability in lib/rails/html/scrubbers.rb in the rails-html-sanitizer gem before 1.0.3 for Ruby on Rails 4.2.x and 5.x allows remote attackers to inject arbitrary web script or HTML via a crafted CDATA node. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77pc-q5q7-qg9h'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7mvr-5x2g-wfc8 | 2023-01-23T20:48:55Z | 2018-09-13T15:50:32Z | null | ['CVE-2018-14042'] | Bootstrap Cross-site Scripting vulnerability | In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip. This is similar to CVE-2018-14041. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14042'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26423'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26428'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/26628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26630'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2d90d369bbc2bd2647620246c55cec8c4705e3d0'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2018-14042.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:00Z', 'nvd_published_at': '2018-07-13T14:29:00Z'} |
1.4.0 | GHSA-vjcj-5g2r-vxqc | 2023-09-08T20:06:29Z | 2018-09-06T03:22:00Z | null | ['CVE-2018-16330'] | Pandao editor.md vulnerable to XSS in IMG attributes | Pandao Editor.md 1.5.0 allows XSS via crafted attributes of an invalid IMG element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.5.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16330'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vjcj-5g2r-vxqc'}, {'type': 'PACKAGE', 'url': 'https://github.com/pandao/editor.md'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6g87-ff9q-v847 | 2023-09-01T09:53:42Z | 2018-09-17T20:46:52Z | null | ['CVE-2018-1000518'] | websockets is vulnerable to denial of service by memory exhaustion | The Python websockets library version 4 contains a CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) vulnerability in Servers and clients, unless configured with compression=None that can result in Denial of Service by memory exhaustion. This attack appears to be exploitable via sending a specially crafted frame on an established connection. This vulnerability appears to have been fixed in version 5.0 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'websockets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000518'}, {'type': 'WEB', 'url': 'https://github.com/aaugustin/websockets/pull/407'}, {'type': 'PACKAGE', 'url': 'https://github.com/aaugustin/websockets'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6g87-ff9q-v847'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:15Z', 'nvd_published_at': '2018-06-26T16:29:00Z'} |
1.4.0 | GHSA-c9j3-wqph-5xx9 | 2023-02-03T20:45:07Z | 2018-09-17T20:43:34Z | null | ['CVE-2018-3786'] | Command Injection in egg-scripts | Versions of `egg-scripts` before 2.8.1 are vulnerable to command injection. This is only exploitable if a malicious argument is provided on the command line.
Example:
`eggctl start --daemon --stderr='/tmp/eggctl_stderr.log; touch /tmp/malicious'`
## Recommendation
Update to version 2.8.1 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'egg-scripts'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3786'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/egg-scripts/pull/26'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/egg-scripts/commit/b98fd03d1e3aaed68004b881f0b3d42fe47341dd'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/388936'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9j3-wqph-5xx9'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/egg-scripts/blob/2.8.1/History.md'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/694'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:55Z', 'nvd_published_at': '2018-08-24T20:29:00Z'} |
1.4.0 | GHSA-fpcv-j2q9-vqhw | 2021-09-10T18:43:58Z | 2018-09-06T03:24:50Z | null | ['CVE-2018-16405'] | Moderate severity vulnerability that affects mayan-edms | An issue was discovered in Mayan EDMS before 3.0.2. The Appearance app sets window.location directly, leading to XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mayan-edms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpcv-j2q9-vqhw'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mayan-edms/mayan-edms'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/commit/9ebe80595afe4fdd1e2c74358d6a9421f4ce130e'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/issues/494'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8462-q7x7-g2x4 | 2023-09-05T23:09:22Z | 2018-09-17T20:44:58Z | null | ['CVE-2018-13863'] | js-bson vulnerable to REDoS | The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8462-q7x7-g2x4'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/js-bson'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:bson:20180225'}] | {'cwe_ids': ['CWE-185', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2vr-2c89-ph88 | 2021-09-16T20:54:14Z | 2018-09-18T13:49:54Z | null | ['CVE-2016-10641'] | Downloads Resources over HTTP in node-bsdiff-android | Affected versions of `node-bsdiff-android` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-bsdiff-android'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10641'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c2vr-2c89-ph88'}, {'type': 'PACKAGE', 'url': 'https://github.com/arthur-zhang/node-bsdiff-android'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/234'}] | {'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xqvg-xm9m-p2c4 | 2021-09-22T16:31:46Z | 2018-09-11T18:57:16Z | null | ['CVE-2018-13796'] | Moderate severity vulnerability that affects mailman | An issue was discovered in GNU Mailman before 2.1.28. A crafted URL can cause arbitrary text to be displayed on a web page from a trusted site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13796'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/mailman/+bug/1780874'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqvg-xm9m-p2c4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/07/msg00034.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201904-10'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4348-1/'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/mailman-users@python.org/msg71003.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fp82-2h99-3fpp | 2022-04-26T20:44:24Z | 2018-09-18T13:47:24Z | null | ['CVE-2018-3753'] | Prototype Pollution in async merge-object | The utilities function in all versions of the merge-object node module can be tricked into modifying the prototype of Object when the attacker can control part of the structure passed to this function. This can let an attacker add or modify existing properties that will exist on all objects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'merge-object'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3753'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/310706'}] | {'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w578-j992-554x | 2022-04-26T18:30:50Z | 2018-09-06T03:28:50Z | null | ['CVE-2017-7481'] | Ansible fails to properly mark lookup-plugin results as unsafe | Ansible before versions 2.3.1.0 and 2.4.0.0 fails to properly mark lookup-plugin results as unsafe. If an attacker could control the results of lookup() calls, they could inject Unicode strings to be parsed by the jinja2 templating system, resulting in code execution. By default, the jinja2 templating language is now marked as 'unsafe' and is not evaluated. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['ansible.template.Templar._lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7481'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a1886911fcf4b691130cfc70dfc5daa5e07c46a3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w578-j992-554x'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2j2j-8rrv-264g | 2023-09-13T18:50:53Z | 2018-09-11T18:58:40Z | null | ['CVE-2018-16459'] | Cross-Site Scripting in exceljs | Versions of `exceljs` before 1.6.0 are vulnerable to cross-site scripting.
This vulnerability is due to `exceljs` not validating data from parsed XLSX file and embedding HTML tags, like `<script>` directly into the sheet cells. Because of this it's possible to inject malicious JavaScript code and execute it when data from the sheet is displayed in the browser.
## Recommendation
Update to version 1.6.0 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'exceljs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16459'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/356809'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2j2j-8rrv-264g'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/464.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/733'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5h6m-9mvx-m6c5 | 2021-09-01T22:13:13Z | 2018-09-06T03:25:03Z | null | ['CVE-2018-16407'] | Moderate severity vulnerability that affects mayan-edms | An issue was discovered in Mayan EDMS before 3.0.3. The Tags app has XSS because tag label values are mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mayan-edms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16407'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5h6m-9mvx-m6c5'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mayan-edms/mayan-edms'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/commit/076468a9225e4630a463c0bbceb8e5b805fe380c'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/issues/496'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-544j-77x9-h938 | 2021-12-03T14:12:20Z | 2018-09-17T21:53:30Z | 2020-06-16T20:59:59Z | [] | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
actionpack/lib/action_dispatch/routing/route_set.rb in Action Pack in Ruby on Rails 4.x before 4.2.5.1 and 5.x before 5.0.0.beta1.1 allows remote attackers to cause a denial of service (superfluous caching and memory consumption) by leveraging an application's use of a wildcard controller route. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7581'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-544j-77x9-h938'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m53f-rhq8-q6hf | 2021-12-03T14:21:39Z | 2018-09-17T21:55:03Z | 2020-06-17T15:14:56Z | [] | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0751'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m53f-rhq8-q6hf'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9vc2-p34x-jhxh | 2020-06-16T21:54:47Z | 2018-09-17T21:56:30Z | 2020-06-16T21:29:41Z | [] | Moderate severity vulnerability that affects rack | Withdrawn, accidental duplicate publish.
lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3225'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9vc2-p34x-jhxh'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpwp-69xv-c67f | 2023-08-08T09:18:41Z | 2018-09-13T15:46:40Z | null | ['CVE-2018-1000519'] | aiohttp-session Session Fixation vulnerability | The pypi package aiohttp-session before 2.4.0 contained a Session Fixation vulnerability in `load_session` function for RedisStorage that can result in Session Hijacking. This attack appear to be exploitable via Any method that allows setting session cookies (`?session=<>`, or meta tags or script tags with Set-Cookie). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp-session'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000519'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/issues/272'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/commit/6b7864004d3442dbcfaf8687f63262c1c629f569'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fpwp-69xv-c67f'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp-session'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp-session/blob/master/aiohttp_session/redis_storage.py#L60'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vwfg-qj3r-6v3r | 2021-12-03T14:24:02Z | 2018-09-17T21:57:47Z | 2020-06-17T15:15:11Z | [] | Moderate severity vulnerability that affects actionpack | Withdrawn, accidental duplicate publish.
The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.5.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.22.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.22.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.14.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.14.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7576'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vwfg-qj3r-6v3r'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:15:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5r76-cjf4-c9qx | 2021-09-01T22:20:48Z | 2018-09-06T03:24:57Z | null | ['CVE-2018-16406'] | Moderate severity vulnerability that affects mayan-edms | An issue was discovered in Mayan EDMS before 3.0.2. The Cabinets app has XSS via a crafted cabinet label. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mayan-edms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16406'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5r76-cjf4-c9qx'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mayan-edms/mayan-edms'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/blob/master/HISTORY.rst'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/commit/48dfc06e49c7f773749e063f8cc69c95509d1c32'}, {'type': 'WEB', 'url': 'https://gitlab.com/mayan-edms/mayan-edms/issues/495'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8p2p-p8mg-x3cw | 2022-04-25T22:32:08Z | 2018-03-05T19:33:54Z | null | ['CVE-2018-1000023'] | Insight API transaction broadcast endpoint can result in Full Path Disclosure | Bitpay/insight-api Insight-api version 5.0.0 and earlier contains a CWE-20: input validation vulnerability in transaction broadcast endpoint that can result in Full Path Disclosure. This attack appear to be exploitable via Web request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'insight-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000023'}, {'type': 'WEB', 'url': 'https://github.com/bitpay/insight-api/issues/542'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p2p-p8mg-x3cw'}, {'type': 'PACKAGE', 'url': 'https://github.com/bitpay/insight-api'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8xwg-wv7v-4vqp | 2023-09-13T19:06:52Z | 2018-03-26T16:41:17Z | null | ['CVE-2018-1000136'] | Electron Vulnerable to Code Execution by Re-Enabling Node.js Integration | A vulnerability has been discovered which allows Node.js integration to be re-enabled in some Electron applications that disable it.
For the application to be impacted by this vulnerability it must meet all of these conditions
- Runs on Electron 1.7, 1.8, or a 2.0.0-beta
- Allows execution of arbitrary remote code
- Disables Node.js integration
- Does not explicitly declare webviewTag: false in its webPreferences
- Does not enable the nativeWindowOption option
- Does not intercept new-window events and manually override event.newGuest without using the supplied options tag
## Recommendation
Update to `electron` version 1.7.13, 1.8.4, or 2.0.0-beta.5 or later.
If you are unable to update your Electron version can mitigate the vulnerability with the following code.
```js
app.on('web-contents-created', (event, win) => {
win.on('new-window', (event, newURL, frameName, disposition,
options, additionalFeatures) => {
if (!options.webPreferences) options.webPreferences = {};
options.webPreferences.nodeIntegration = false;
options.webPreferences.nodeIntegrationInWorker = false;
options.webPreferences.webviewTag = false;
delete options.webPreferences.preload;
})
})
// and *IF* you don't use WebViews at all,
// you might also want
app.on('web-contents-created', (event, win) => {
win.on('will-attach-webview', (event, webPreferences, params) => {
event.preventDefault();
})
})
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.1'}, {'fixed': '2.0.0-beta.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000136'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/12271'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/12292'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/12294'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/commit/1a48ee28276e6588dbf4e70e58d78e7bfdc57043'}, {'type': 'WEB', 'url': 'https://electronjs.org/blog/webview-fix'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}, {'type': 'WEB', 'url': 'https://www.electronjs.org/blog/webview-fix'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/574'}, {'type': 'WEB', 'url': 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x77-rpqf-j6mw | 2023-09-08T21:00:26Z | 2018-03-05T18:54:33Z | null | ['CVE-2017-1000189'] | ejs vulnerable to DoS due to weak input validation | nodejs ejs version older than 2.5.5 is vulnerable to a denial-of-service due to weak input validation in `ejs.renderFile()` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ejs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000189'}, {'type': 'WEB', 'url': 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6x77-rpqf-j6mw'}, {'type': 'PACKAGE', 'url': 'https://github.com/mde/ejs'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171123041449/http://www.securityfocus.com/bid/101893'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfwm-chj7-w59r | 2023-08-29T14:59:54Z | 2018-03-05T18:29:32Z | null | ['CVE-2017-16229'] | Ox gem stack overflow in sax_parse | In the Ox gem 2.8.1 for Ruby, the process crashes with a stack-based buffer over-read in the `read_from_str` function in `sax_buf.c` when a crafted input is supplied to `sax_parse`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16229'}, {'type': 'WEB', 'url': 'https://github.com/ohler55/ox/issues/195'}, {'type': 'PACKAGE', 'url': 'https://github.com/ohler55/ox'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ox/CVE-2017-16229.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/ox/versions/2.8.1'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h6rj-8r3c-9gpj | 2022-04-25T22:38:49Z | 2018-03-05T19:43:21Z | null | ['CVE-2015-4412'] | bson is vulnerable to denial of service due to incorrect regex validation | BSON injection vulnerability in the legal function in BSON (bson-ruby) gem before 3.0.4 for Ruby allows remote attackers to cause a denial of service (resource consumption) or inject arbitrary data via a crafted string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bson'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4412'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/commit/976da329ff03ecdfca3030eb6efe3c85e6db9999'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1229750'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h6rj-8r3c-9gpj'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/bson-ruby'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/bson-ruby/compare/7446d7c6764dfda8dc4480ce16d5c023e74be5ca...28f34978a85b689a4480b4d343389bf4886522e7'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bson/CVE-2015-4412.yml'}, {'type': 'WEB', 'url': 'https://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'http://sakurity.com/blog/2015/06/04/mongo_ruby_regexp.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/06/06/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/75045'}] | {'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wpq7-q8j4-72jg | 2022-04-25T22:40:41Z | 2018-03-07T22:22:24Z | null | ['CVE-2018-7307'] | Auth0-js bypasses CSRF checks | The Auth0.js library has a vulnerability affecting versions below 9.3 that allows an attacker to bypass the CSRF check from the state parameter if it's missing from the authorization response, leaving the client vulnerable to CSRF attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'auth0-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7307'}, {'type': 'WEB', 'url': 'https://auth0.com/docs/security/bulletins/cve-2018-7307'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wpq7-q8j4-72jg'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-688c-3x49-6rqj | 2023-08-29T15:23:28Z | 2018-03-07T22:22:22Z | null | ['CVE-2018-1000119'] | rack-protection gem timing attack vulnerability when validating CSRF token | Sinatra rack-protection versions 1.5.4 and 2.0.0.rc3 and earlier contains a timing attack vulnerability in the CSRF token checking that can result in signatures can be exposed. This attack appear to be exploitable via network connectivity to the ruby application. This vulnerability appears to have been fixed in 1.5.5 and 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-protection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack-protection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.beta1'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0.rc3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000119'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/rack-protection/pull/98'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/8aa6c42ef724f93ae309fb7c5668e19ad547eceb#commitcomment-27964109'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1060'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack-protection/CVE-2018-1000119.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sinatra/rack-protection'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4247'}] | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-82gw-pqf7-q3j2 | 2023-09-11T18:19:05Z | 2018-03-13T20:38:51Z | null | ['CVE-2018-1000086'] | pym.js CSRF Vulnerability | NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js `_onNavigateToMessage` function.
https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 can result in Arbitrary javascript code execution. This attack appears to be exploitable if the Attacker gains full javascript access to pages with Pym.js embeds, or when user visits an attacker-crafted page. This vulnerability appears to have been fixed in versions 1.3.2 and later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'pym.js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.2'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086'}, {'type': 'WEB', 'url': 'https://github.com/nprapps/pym.js/issues/170'}, {'type': 'WEB', 'url': 'https://github.com/nprapps/pym.js/commit/c3552a6cf2532664c17bd6a318fb3cf8e4cf2f97'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-82gw-pqf7-q3j2'}, {'type': 'PACKAGE', 'url': 'https://github.com/nprapps/pym.js'}, {'type': 'WEB', 'url': 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-325j-24f4-qv5x | 2021-08-31T20:21:06Z | 2018-03-07T22:22:20Z | null | ['CVE-2018-7651'] | Regular Expression Denial of Service in ssri | Version of `ssri` prior to 5.2.2 are vulnerable to regular expression denial of service (ReDoS) when using strict mode.
## Recommendation
Update to version 5.2.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ssri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7651'}, {'type': 'WEB', 'url': 'https://github.com/zkat/ssri/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/zkat/ssri/commit/d0ebcdc22cb5c8f47f89716d08b3518b2485d65d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-325j-24f4-qv5x'}, {'type': 'PACKAGE', 'url': 'https://github.com/zkat/ssri'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/565'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vqcm-7f7f-r539 | 2022-04-25T22:09:39Z | 2018-03-05T19:32:06Z | null | ['CVE-2014-5004'] | brbackup exposes database password to unauthorized users | lib/brbackup.rb in the brbackup gem 0.1.1 for Ruby places the database password on the mysql command line, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'brbackup'}, 'versions': ['0.1.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5004'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/brbackup/CVE-2014-5004.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229054738/http://www.securityfocus.com/bid/68506'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/10/6'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/brbackup-0.1.1.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6jqp-j69q-pm62 | 2022-04-25T22:28:16Z | 2018-03-05T19:16:56Z | null | ['CVE-2018-7560'] | AWS Lambda parser is vulnerable to Regular Expression Denial of Service | index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'aws-lambda-multipart-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560'}, {'type': 'WEB', 'url': 'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jqp-j69q-pm62'}, {'type': 'PACKAGE', 'url': 'https://github.com/myshenin/aws-lambda-multipart-parser'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:35Z', 'nvd_published_at': None} |