Skip to content

File tree

8 files changed

+113
-12
lines changed

8 files changed

+113
-12
lines changed

advisories/github-reviewed/2021/03/GHSA-2v5f-23xc-v9qr/GHSA-2v5f-23xc-v9qr.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2v5f-23xc-v9qr",
4-
"modified": "2023-09-13T22:25:15Z",
4+
"modified": "2025-11-04T16:33:40Z",
55
"published": "2021-03-11T22:50:39Z",
66
"aliases": [
77
"CVE-2021-3377"
@@ -47,6 +47,10 @@
4747
{
4848
"type": "WEB",
4949
"url": "https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://security.netapp.com/advisory/ntap-20241108-0002"
5054
}
5155
],
5256
"database_specific": {

advisories/github-reviewed/2021/04/GHSA-hj5v-574p-mj7c/GHSA-hj5v-574p-mj7c.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-hj5v-574p-mj7c",
4-
"modified": "2024-10-21T21:03:12Z",
4+
"modified": "2025-11-04T16:34:14Z",
55
"published": "2021-04-20T16:39:57Z",
66
"aliases": [
77
"CVE-2020-29651"
@@ -68,6 +68,18 @@
6868
"type": "PACKAGE",
6969
"url": "https://github.com/pytest-dev/py"
7070
},
71+
{
72+
"type": "WEB",
73+
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00024.html"
74+
},
75+
{
76+
"type": "WEB",
77+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4"
78+
},
79+
{
80+
"type": "WEB",
81+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHDTINIBJZ67T3W74QTBIY5LPKAXEOGR"
82+
},
7183
{
7284
"type": "WEB",
7385
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/AYWNYEV3FGDHPIHX4DDUDMFZ6NLCQRC4"

advisories/github-reviewed/2021/05/GHSA-7w8j-85wm-6xfq/GHSA-7w8j-85wm-6xfq.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-7w8j-85wm-6xfq",
4-
"modified": "2021-05-20T22:53:36Z",
4+
"modified": "2025-11-04T16:34:47Z",
55
"published": "2021-05-24T19:51:58Z",
66
"aliases": [
77
"CVE-2021-20086"
@@ -43,6 +43,10 @@
4343
{
4444
"type": "WEB",
4545
"url": "https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://security.netapp.com/advisory/ntap-20241108-0002"
4650
}
4751
],
4852
"database_specific": {

advisories/github-reviewed/2021/05/GHSA-cf4h-3jhx-xvhq/GHSA-cf4h-3jhx-xvhq.json

Lines changed: 41 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-cf4h-3jhx-xvhq",
4-
"modified": "2022-09-30T02:23:38Z",
4+
"modified": "2025-11-04T16:33:59Z",
55
"published": "2021-05-06T16:09:43Z",
66
"aliases": [
77
"CVE-2021-23358"
@@ -76,6 +76,14 @@
7676
"type": "WEB",
7777
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1081504"
7878
},
79+
{
80+
"type": "WEB",
81+
"url": "https://security.netapp.com/advisory/ntap-20241108-0002"
82+
},
83+
{
84+
"type": "WEB",
85+
"url": "https://security.netapp.com/advisory/ntap-20240808-0003"
86+
},
7987
{
8088
"type": "WEB",
8189
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV"
@@ -84,6 +92,14 @@
8492
"type": "WEB",
8593
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z"
8694
},
95+
{
96+
"type": "WEB",
97+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FGEE7U4Z655A2MK5EW4UQQZ7B64XJWBV"
98+
},
99+
{
100+
"type": "WEB",
101+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EOKATXXETD2PF3OR36Q5PD2VSVAR6J5Z"
102+
},
87103
{
88104
"type": "WEB",
89105
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00038.html"
@@ -92,22 +108,42 @@
92108
"type": "WEB",
93109
"url": "https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf@%3Cissues.cordova.apache.org%3E"
94110
},
111+
{
112+
"type": "WEB",
113+
"url": "https://lists.apache.org/thread.html/re69ee408b3983b43e9c4a82a9a17cbbf8681bb91a4b61b46f365aeaf%40%3Cissues.cordova.apache.org%3E"
114+
},
95115
{
96116
"type": "WEB",
97117
"url": "https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039@%3Cissues.cordova.apache.org%3E"
98118
},
119+
{
120+
"type": "WEB",
121+
"url": "https://lists.apache.org/thread.html/rbc84926bacd377503a3f5c37b923c1931f9d343754488d94e6f08039%40%3Cissues.cordova.apache.org%3E"
122+
},
99123
{
100124
"type": "WEB",
101125
"url": "https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba@%3Cissues.cordova.apache.org%3E"
102126
},
127+
{
128+
"type": "WEB",
129+
"url": "https://lists.apache.org/thread.html/raae088abdfa4fbd84e1d19d7a7ffe52bf8e426b83e6599ea9a734dba%40%3Cissues.cordova.apache.org%3E"
130+
},
103131
{
104132
"type": "WEB",
105133
"url": "https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306@%3Cissues.cordova.apache.org%3E"
106134
},
135+
{
136+
"type": "WEB",
137+
"url": "https://lists.apache.org/thread.html/r770f910653772317b117ab4472b0a32c266ee4abbafda28b8a6f9306%40%3Cissues.cordova.apache.org%3E"
138+
},
107139
{
108140
"type": "WEB",
109141
"url": "https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1@%3Cissues.cordova.apache.org%3E"
110142
},
143+
{
144+
"type": "WEB",
145+
"url": "https://lists.apache.org/thread.html/r5df90c46f7000c4aab246e947f62361ecfb849c5a553dcdb0ef545e1%40%3Cissues.cordova.apache.org%3E"
146+
},
111147
{
112148
"type": "WEB",
113149
"url": "https://github.com/jashkenas/underscore/releases/tag/1.12.1"
@@ -119,6 +155,10 @@
119155
{
120156
"type": "PACKAGE",
121157
"url": "https://github.com/jashkenas/underscore"
158+
},
159+
{
160+
"type": "WEB",
161+
"url": "http://seclists.org/fulldisclosure/2025/Apr/14"
122162
}
123163
],
124164
"database_specific": {

advisories/github-reviewed/2021/09/GHSA-p5w8-wqhj-9hhf/GHSA-p5w8-wqhj-9hhf.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-p5w8-wqhj-9hhf",
4-
"modified": "2024-10-28T14:25:37Z",
4+
"modified": "2025-11-04T16:35:21Z",
55
"published": "2021-09-10T17:56:06Z",
66
"aliases": [
77
"CVE-2021-32839"
88
],
99
"summary": "StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service)",
10-
"details": "### Impact\nThe formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\\r\\n' in SQL comments.\n\n### Patches\nThe issues has been fixed in sqlparse 0.4.2.\n\n### Workarounds\nOnly the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool.\n\n### References\nThis issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/). \n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues)\n* Email us at [[email protected]](mailto:[email protected])\n",
10+
"details": "### Impact\nThe formatter function that strips comments from a SQL contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\\r\\n' in SQL comments.\n\n### Patches\nThe issues has been fixed in sqlparse 0.4.2.\n\n### Workarounds\nOnly the formatting feature that removes comments from SQL statements is affected by this regular expression. As a workaround don't use the `sqlformat.format` function with keyword `strip_comments=True` or the `--strip-comments` command line flag when using the `sqlformat` command line tool.\n\n### References\nThis issue was discovered by GitHub team members @erik-krogh and @yoff. It was found using a [CodeQL](https://codeql.github.com/) query which identifies inefficient regular expressions. You can see the results of the query on python-sqlparse by following [this link](https://lgtm.com/query/2223658096471222354/). \n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [sqlparse issue tracker](https://github.com/andialbrecht/sqlparse/issues)\n* Email us at [[email protected]](mailto:[email protected])",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -60,6 +60,10 @@
6060
"type": "WEB",
6161
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/sqlparse/PYSEC-2021-333.yaml"
6262
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00022.html"
66+
},
6367
{
6468
"type": "ADVISORY",
6569
"url": "https://securitylab.github.com/advisories/GHSL-2021-107-andialbrecht-sqlparse"

advisories/github-reviewed/2022/01/GHSA-qrpm-p2h7-hrv2/GHSA-qrpm-p2h7-hrv2.json

Lines changed: 15 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-qrpm-p2h7-hrv2",
4-
"modified": "2022-03-18T13:15:55Z",
4+
"modified": "2025-11-04T16:35:00Z",
55
"published": "2022-01-21T23:57:06Z",
66
"aliases": [
77
"CVE-2021-23566"
@@ -56,14 +56,27 @@
5656
"type": "PACKAGE",
5757
"url": "https://github.com/ai/nanoid"
5858
},
59+
{
60+
"type": "WEB",
61+
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00025.html"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00006.html"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550"
70+
},
5971
{
6072
"type": "WEB",
6173
"url": "https://snyk.io/vuln/SNYK-JS-NANOID-2332193"
6274
}
6375
],
6476
"database_specific": {
6577
"cwe_ids": [
66-
"CWE-200"
78+
"CWE-200",
79+
"CWE-704"
6780
],
6881
"severity": "MODERATE",
6982
"github_reviewed": true,

advisories/github-reviewed/2022/02/GHSA-rmr5-cpv2-vgjf/GHSA-rmr5-cpv2-vgjf.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rmr5-cpv2-vgjf",
4-
"modified": "2022-02-07T21:02:28Z",
4+
"modified": "2025-11-04T16:34:34Z",
55
"published": "2022-02-01T00:48:15Z",
66
"aliases": [
77
"CVE-2021-43859"
88
],
99
"summary": "Denial of Service by injecting highly recursive collections or maps in XStream",
10-
"details": "### Impact\nThe vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream.\n\n### Patches\nXStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded.\n\n### Workarounds\nThe attack uses the hash code implementation for collections and maps to force an exponential calculation time due to highly recursive structures with in the collection or map. Following types of the Java runtime are affected in Java versions available in December 2021:\n\n- java.util.HashMap\n- java.util.HashSet\n- java.util.Hashtable\n- java.util.LinkedHashMap\n- java.util.LinkedHashSet\n- java.util.Stack (older Java revisions only)\n- java.util.Vector (older Java revisions only)\n- Other third party collection implementations that use their element's hash code may also be affected\n\nIf your object graph does not use referenced elements at all, you may simply set the NO_REFERENCE mode:\n```Java\nXStream xstream = new XStream();\nxstream.setMode(XStream.NO_REFERENCES);\n```\n\nIf your object graph contains neither a Hashtable, HashMap nor a HashSet (or one of the linked variants of it) then you can use the security framework to deny the usage of these types:\n```Java\nXStream xstream = new XStream();\nxstream.denyTypes(new Class[]{\n java.util.HashMap.class, java.util.HashSet.class, java.util.Hashtable.class, java.util.LinkedHashMap.class, java.util.LinkedHashSet.class\n});\n```\n\nUnfortunately these types are very common. If you only use HashMap or HashSet and your XML refers these only as default map or set, you may additionally change the default implementation of java.util.Map and java.util.Set at unmarshalling time::\n```Java\nxstream.addDefaultImplementation(java.util.TreeMap.class, java.util.Map.class);\nxstream.addDefaultImplementation(java.util.TreeSet.class, java.util.Set.class);\n```\nHowever, this implies that your application does not care about the implementation of the map and all elements are comparable.\n\n### References\nSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html).\n\n### Credits\nThe vulnerability was discovered and reported by r00t4dm at Cloud-Penetrating Arrow Lab.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)\n* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)\n",
10+
"details": "### Impact\nThe vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream.\n\n### Patches\nXStream 1.4.19 monitors and accumulates the time it takes to add elements to collections and throws an exception if a set threshold is exceeded.\n\n### Workarounds\nThe attack uses the hash code implementation for collections and maps to force an exponential calculation time due to highly recursive structures with in the collection or map. Following types of the Java runtime are affected in Java versions available in December 2021:\n\n- java.util.HashMap\n- java.util.HashSet\n- java.util.Hashtable\n- java.util.LinkedHashMap\n- java.util.LinkedHashSet\n- java.util.Stack (older Java revisions only)\n- java.util.Vector (older Java revisions only)\n- Other third party collection implementations that use their element's hash code may also be affected\n\nIf your object graph does not use referenced elements at all, you may simply set the NO_REFERENCE mode:\n```Java\nXStream xstream = new XStream();\nxstream.setMode(XStream.NO_REFERENCES);\n```\n\nIf your object graph contains neither a Hashtable, HashMap nor a HashSet (or one of the linked variants of it) then you can use the security framework to deny the usage of these types:\n```Java\nXStream xstream = new XStream();\nxstream.denyTypes(new Class[]{\n java.util.HashMap.class, java.util.HashSet.class, java.util.Hashtable.class, java.util.LinkedHashMap.class, java.util.LinkedHashSet.class\n});\n```\n\nUnfortunately these types are very common. If you only use HashMap or HashSet and your XML refers these only as default map or set, you may additionally change the default implementation of java.util.Map and java.util.Set at unmarshalling time::\n```Java\nxstream.addDefaultImplementation(java.util.TreeMap.class, java.util.Map.class);\nxstream.addDefaultImplementation(java.util.TreeSet.class, java.util.Set.class);\n```\nHowever, this implies that your application does not care about the implementation of the map and all elements are comparable.\n\n### References\nSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html).\n\n### Credits\nThe vulnerability was discovered and reported by r00t4dm at Cloud-Penetrating Arrow Lab.\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)\n* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -56,6 +56,18 @@
5656
"type": "WEB",
5757
"url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00018.html"
5858
},
59+
{
60+
"type": "WEB",
61+
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00023.html"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VACQYG356OHUTD5WQGAQ4L2TTFTAV3SJ"
66+
},
67+
{
68+
"type": "WEB",
69+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XODFRE2ZL64FICBJDOPWOLPTSSAI4U7X"
70+
},
5971
{
6072
"type": "WEB",
6173
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/VACQYG356OHUTD5WQGAQ4L2TTFTAV3SJ"

advisories/github-reviewed/2022/04/GHSA-8hfj-j24r-96c4/GHSA-8hfj-j24r-96c4.json

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-8hfj-j24r-96c4",
4-
"modified": "2022-04-04T21:25:48Z",
4+
"modified": "2025-11-04T16:35:41Z",
55
"published": "2022-04-04T21:25:48Z",
66
"aliases": [
77
"CVE-2022-24785"
88
],
99
"summary": "Path Traversal: 'dir/../../filename' in moment.locale",
10-
"details": "### Impact\nThis vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.\n\n### Patches\nThis problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).\n\n### Workarounds\nSanitize user-provided locale name before passing it to moment.js.\n\n### References\n_Are there any links users can visit to find out more?_\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [moment repo](https://github.com/moment/moment)\n",
10+
"details": "### Impact\nThis vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.\n\n### Patches\nThis problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).\n\n### Workarounds\nSanitize user-provided locale name before passing it to moment.js.\n\n### References\n_Are there any links users can visit to find out more?_\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Open an issue in [moment repo](https://github.com/moment/moment)",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -75,6 +75,14 @@
7575
"type": "WEB",
7676
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html"
7777
},
78+
{
79+
"type": "WEB",
80+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q"
81+
},
82+
{
83+
"type": "WEB",
84+
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5"
85+
},
7886
{
7987
"type": "WEB",
8088
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q"
@@ -87,6 +95,10 @@
8795
"type": "WEB",
8896
"url": "https://security.netapp.com/advisory/ntap-20220513-0006"
8997
},
98+
{
99+
"type": "WEB",
100+
"url": "https://security.netapp.com/advisory/ntap-20241108-0002"
101+
},
90102
{
91103
"type": "WEB",
92104
"url": "https://www.tenable.com/security/tns-2022-09"

0 commit comments

Comments
 (0)