Skip to content
Toggle navigation
Sign up
Product
Actions
Automate any workflow
Packages
Host and manage packages
Security
Find and fix vulnerabilities
Codespaces
Instant dev environments
Copilot
Write better code with AI
Code review
Manage code changes
Issues
Plan and track work
Discussions
Collaborate outside of code
Explore
All features
Documentation
GitHub Skills
Blog
Solutions
For
Enterprise
Teams
Startups
Education
By Solution
CI/CD & Automation
DevOps
DevSecOps
Case Studies
Customer Stories
Resources
Open Source
GitHub Sponsors
Fund open source developers
The ReadME Project
GitHub community articles
Repositories
Topics
Trending
Collections
Pricing
In this repository
All GitHub
↵
Jump to
↵
No suggested jump to results
In this repository
All GitHub
↵
Jump to
↵
In this user
All GitHub
↵
Jump to
↵
In this repository
All GitHub
↵
Jump to
↵
Sign in
Sign up
{{ message }}
parabirb
/
wrongthink
Public
Notifications
Fork
0
Star
0
Code
Issues
1
Pull requests
0
Actions
Projects
1
Security
Insights
More
Code
Issues
Pull requests
Actions
Projects
Security
Insights
Partial secret key disclosure, improper safety number calculation, & inadequate encryption strength
High
parabirb
published
GHSA-5jxh-6378-rg7v
Mar 15, 2021
Package
wrongthink
(wrongthink.me)
Affected versions
< 2.2.0
Patched versions
>= 2.2.0
Description
This advisory and the rest of the repository has been
moved
.
Severity
High
8.1
/ 10
CVSS base metrics
Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CVE ID
CVE-2021-21387
Weaknesses
CWE-319
CWE-326
CWE-358
Credits
parabirb
Analyst
You can’t perform that action at this time.
You signed in with another tab or window.
Reload
to refresh your session.
You signed out in another tab or window.
Reload
to refresh your session.
This advisory and the rest of the repository has been moved.