ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
npm | GHSA-7r8m-45gc-m2c8 | Downloads Resources over HTTP in mongodb-instance | Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `... | {'CVE-2016-10572'} | 2021-01-08T19:14:34Z | 2019-02-18T23:52:14Z | HIGH | null | {'CWE-311'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'} | null | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} | {'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'} |
npm | GHSA-vpf5-82c8-9v36 | Prototype Pollution in algoliasearch-helper | The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to ... | {'CVE-2021-23433'} | 2021-11-24T19:00:33Z | 2021-11-23T21:15:35Z | MODERATE | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'htt... | null | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} | {'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd'} |
npm | GHSA-vm5j-vqr6-v7v8 | OS Command Injection in pixl-class | pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization. | {'CVE-2020-7640'} | 2021-05-25T20:40:19Z | 2021-12-10T20:04:56Z | HIGH | null | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | null | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} | {'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'} |
npm | GHSA-q42p-pg8m-cqh6 | Prototype Pollution in handlebars | Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
## Recommendation
For handlebars 4.1.x upgrade to 4.1.2 or later.
For handlebars 4.0.x upgrade to 4.0.14 or later. | null | 2021-08-04T20:54:05Z | 2019-06-05T14:07:48Z | HIGH | null | {'CWE-471'} | {'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://www.npmjs.com/advisories/755', 'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} | null | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} | {'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'} |
npm | GHSA-jmqm-f2gx-4fjv | Sensitive information exposure through logs in npm-registry-fetch | Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | null | 2021-09-22T19:00:07Z | 2020-07-07T18:59:10Z | MODERATE | null | {'CWE-352'} | {'https://github.com/npm/npm-registry-fetch', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88', 'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFE... | null | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} | {'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'} |
npm | GHSA-w3w8-37jv-2c58 | Cross-Site Scripting in mustache | Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted.
### Example
Template:
```<a href={{foo}}/>```
Input:
```{ 'foo' : 'test.com onload=alert(1)'}```
Rendered result:
```<a href=test.com onload=alert(1)/>```
## Recommenda... | {'CVE-2015-8862'} | 2021-09-20T22:34:08Z | 2017-10-24T18:33:36Z | HIGH | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'http://www.securityfocus.com/bid/96436', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/janl/mustache.js', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', ... | null | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} | {'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5'} |
npm | GHSA-8p9r-f949-699g | Path Traversal in browserless-chrome | This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server. | {'CVE-2020-7758'} | 2021-04-20T22:41:52Z | 2021-05-10T18:46:48Z | HIGH | null | {'CWE-22'} | {'https://www.npmjs.com/package/browserless-chrome', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-775... | null | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} | {'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6'} |
npm | GHSA-6c8f-qphg-qjgp | Validation Bypass in kind-of | Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation.
## Recommendation
Upgrade to versions 6.0.3 or later. | {'CVE-2019-20149'} | 2021-08-23T15:03:55Z | 2020-03-31T15:59:54Z | HIGH | null | {'CWE-668'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://www.npmjs.com/a... | null | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} | {'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'} |
npm | GHSA-4m8h-h59m-m34j | Prototype Pollution in bmoor | The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664) | {'CVE-2021-23558'} | 2022-02-07T21:21:00Z | 2022-02-01T00:50:09Z | HIGH | null | {'CWE-1321'} | {'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://github.com/b-heilman/bmoor/', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https:... | null | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} | {'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'} |
npm | GHSA-wmx6-vxcf-c3gr | Validation Bypass in slp-validate | Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade... | {'CVE-2019-16761'} | 2021-01-08T20:11:31Z | 2019-11-15T23:10:19Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr',... | null | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} | {'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'} |
npm | GHSA-77jf-fjjf-xcww | Invalid Curve Attack in openpgp | Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may ex... | {'CVE-2019-9155'} | 2021-07-27T21:15:18Z | 2019-08-23T21:42:22Z | MODERATE | null | {'CWE-327'} | {'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/S... | null | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} | {'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'} |
npm | GHSA-v8v8-6859-qxm4 | Arbitrary shell command execution in logkitty | Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1. | {'CVE-2020-8149'} | 2020-06-04T19:33:24Z | 2020-06-05T14:47:02Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf', 'https://github.com/zamotany/logkitty/pull/18', 'https://hackerone.com/reports/825729'} | null | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} | {'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'} |
npm | GHSA-74cr-77xc-8g6r | Prototype Pollution in @apollo/gateway | Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This ... | null | 2021-08-16T15:28:22Z | 2019-06-13T20:37:39Z | HIGH | null | {'CWE-400', 'CWE-1321'} | {'https://github.com/apollographql/apollo-server/pull/2779', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://www.npmjs.com/advisories/917'} | null | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} | {'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'} |
npm | GHSA-x2mc-8fgj-3wmr | Improper Input Validation in tar-fs | A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. | {'CVE-2018-20835'} | 2021-08-03T21:27:51Z | 2019-05-01T18:37:18Z | HIGH | null | {'CWE-20'} | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2', 'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'} | null | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} | {'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'} |
npm | GHSA-w46j-8hm6-h8mm | XSS in apexcharts | The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields. | {'CVE-2021-23327'} | 2021-02-10T18:18:38Z | 2021-02-11T20:47:34Z | MODERATE | null | {'CWE-79'} | {'https://www.npmjs.com/package/apexcharts', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://nvd.nis... | null | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} | {'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19'} |
npm | GHSA-gqgv-6jq5-jjj9 | Prototype Pollution Protection Bypass in qs | Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Obje... | {'CVE-2017-1000048'} | 2021-08-25T21:03:56Z | 2020-04-30T17:16:47Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://github.com/ljharb/qs/issues/200', 'https://snyk.io/vuln/npm:qs:20170213', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://www.npmjs.c... | null | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} | {'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d'} |
npm | GHSA-v39p-96qg-c8rf | Prototype Pollution in object-path | This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operat... | {'CVE-2021-23434'} | 2021-08-30T18:16:08Z | 2021-09-01T18:37:11Z | MODERATE | null | {'CWE-843', 'CWE-1321'} | {'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', 'https://github.com/mariocasciaro/object-path/commit/... | null | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} | {'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb'} |
npm | GHSA-qv2v-m59f-v5fw | Insecure randomness in socket.io | Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
## Recommendation
Update to v0.9.7 or later. | {'CVE-2017-16031'} | 2021-09-16T21:04:32Z | 2018-11-07T00:29:37Z | HIGH | null | {'CWE-330'} | {'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://github.com/socketio/socket.io/pull/857', 'https://nodesecurity.io/advisories/321', 'https://github.com/socketio/socket.io', 'https://www.npmjs.com/advisories/321', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/socketio/socket.io/iss... | null | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} | {'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'} |
npm | GHSA-vc9j-fhvv-8vrf | Remote Code Execution in scratch-vm | MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdFor... | {'CVE-2020-14000'} | 2021-09-22T21:24:07Z | 2020-07-27T19:55:52Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://github.com/LLK/scratch-vm/pull/2476', 'https://github.com/LLK/scratch-vm'} | null | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} | {'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'} |
npm | GHSA-fj59-f6c3-3vw4 | Command Injection in systeminformation | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `... | {'CVE-2020-26300'} | 2021-09-10T14:54:48Z | 2020-10-27T20:40:00Z | MODERATE | null | {'CWE-78'} | {'https://github.com/sebhildebrandt/systeminformation', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4', 'https... | null | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} | {'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'} |
npm | GHSA-m8fw-534v-xm85 | Cross-Site Scripting (XSS) in cloudcmd | Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable.
## Recommendation
Update to version 9.1.6 or later. | null | 2020-08-31T18:31:00Z | 2019-06-04T15:43:29Z | HIGH | null | {'CWE-79'} | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38', 'https://www.npmjs.com/advisories/642', 'https://hackerone.com/reports/341044)', 'https://hackerone.com/reports/341044'} | null | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} | {'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'} |
npm | GHSA-pw54-mh39-w3hc | Regular expression denial of service in npm-user-validate | This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters. | {'CVE-2020-7754'} | 2021-04-20T17:21:44Z | 2021-05-10T19:08:15Z | HIGH | null | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f3... | null | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} | {'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e'} |
npm | GHSA-h97g-4mx7-5p2p | Open Redirect in apostrophe | Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end.
## Recommendation
Update to version 2.92.0 or later. | null | 2021-09-28T21:18:57Z | 2020-09-03T17:11:36Z | MODERATE | null | {'CWE-601'} | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7', 'https://github.com/apostrophecms/apostrophe', 'https://www.npmjs.com/advisories/1029', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089'} | null | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} | {'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7'} |
npm | GHSA-rwv8-jvff-jq28 | Path Traversal in public | Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.
## Recommendation
Update to version 0.1.3 or later. | {'CVE-2018-3731'} | 2020-08-31T18:28:14Z | 2018-07-18T21:20:30Z | HIGH | null | {'CWE-22'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918', 'https://www.npmjs.com/advisories/571', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731'} | null | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} | {'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2'} |
npm | GHSA-p493-635q-r6gr | Remote code execution via the `pretty` option. | ### Impact
If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.
### Patches
Upgrade to `pug@... | {'CVE-2021-21353'} | 2021-03-03T01:49:22Z | 2021-03-03T02:03:52Z | HIGH | null | {'CWE-74'} | {'https://www.npmjs.com/package/pug-code-gen', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://nvd.nist.gov/vuln/... | null | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} | {'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0'} |
npm | GHSA-7jh9-6cpf-h4m7 | XSS in hello.js | This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1). | {'CVE-2020-7741'} | 2021-01-13T19:06:37Z | 2021-01-13T19:07:01Z | CRITICAL | null | {'CWE-79'} | {'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546'} | null | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} | {'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669'} |
npm | GHSA-4j46-mp85-mv8c | Path traversal in rollup-plugin-serve | Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation. | {'CVE-2020-7684'} | 2021-05-18T01:51:52Z | 2021-05-18T01:52:24Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2', 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969', 'https://vuldb.com/?id.158745', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7684'} | null | {'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'} | {'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969'} |
npm | GHSA-3pxp-6963-46r9 | Command Injection in pdfinfojs | Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor.
## Recommendation
Update to version 0.4.1 or later. | {'CVE-2018-3746'} | 2020-08-31T18:31:03Z | 2018-06-07T19:43:00Z | HIGH | null | {'CWE-77'} | {'https://hackerone.com/reports/330957', 'https://www.npmjs.com/advisories/643', 'https://github.com/advisories/GHSA-3pxp-6963-46r9', 'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746'} | null | {'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'} | {'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd'} |
npm | GHSA-rch9-xh7r-mqgw | Cross-Site Scripting in simple-server | Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server.
## Recommendation
Update to version 1.1.0 or later. | {'CVE-2018-3717'} | 2020-08-31T18:29:12Z | 2018-07-26T15:08:05Z | HIGH | null | {'CWE-79'} | {'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717', 'https://hackerone.com/reports/309394', 'https://hackerone.com/reports/309641', 'https://www.npmjs.com/advisories/595', 'https://www.npmjs.com/advisories/584', 'https://github.com/... | null | {'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'} | {'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b'} |
npm | GHSA-jfcc-rm7f-xgf8 | Cross-Site Scripting in mavon-editor | All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available. | null | 2021-09-29T18:37:46Z | 2020-09-03T20:36:35Z | MODERATE | null | {'CWE-79'} | {'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://github.com/hinesboy/mavonEditor', 'https://www.npmjs.com/advisories/1169', 'https://www.npmjs.com/package/mavon-editor', 'https://github.com/hinesboy/mavonEditor/pull/548', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-4591... | null | {'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'} | {'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72'} |
npm | GHSA-3fjq-93xj-3f3f | Cross-Site Scripting in serialize-to-js | Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 3.0.1 or later. | {'CVE-2019-16772'} | 2021-01-08T20:02:20Z | 2019-12-06T23:20:26Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://www.npmjs.com/advisories/1429', 'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad133... | null | {'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'} | {'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'} |
npm | GHSA-wm77-q74p-5763 | Path Traversal in superstatic | Affected of `superstatic` are vulnerable to path traversal when used on Windows.
Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).
## Recommendation
Upd... | null | 2021-08-09T22:21:02Z | 2018-07-27T17:06:03Z | HIGH | null | {'CWE-177'} | {'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://www.npmjs.com/advisories/652', 'https://github.com/firebase/superstatic/pull/255', 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'} | null | {'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'} | {'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'} |
npm | GHSA-753c-phhg-cj29 | Improper Neutralization of Special Elements used in a Command | This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function. | {'CVE-2021-23352'} | 2021-03-12T21:10:53Z | 2021-03-12T23:01:49Z | HIGH | null | {'CWE-77', 'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'} | null | {'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'} | {'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'} |
npm | GHSA-f522-ffg8-j8r6 | Regular Expression Denial of Service in is-my-json-valid | Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.
## Recommendation
Update to version 1.4.1, 2.17.2 or later. | {'CVE-2016-2537'} | 2021-09-09T21:38:37Z | 2017-10-24T18:33:35Z | HIGH | null | {'CWE-20'} | {'https://www.npmjs.com/advisories/76', 'https://www.npmjs.com/advisories/572', 'https://nodesecurity.io/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://github.com/mafintosh/is-my-json-valid/co... | null | {'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b'} | {'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'} |
npm | GHSA-pch5-whg9-qr2r | netmask npm package vulnerable to octal input data | The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918. | {'CVE-2021-29418'} | 2021-06-09T23:10:53Z | 2021-03-29T21:32:05Z | MODERATE | null | {'CWE-20'} | {'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://www.npmjs.com/package/netmask', 'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://sick.c... | null | {'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'} | {'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4'} |
npm | GHSA-h73q-5wmj-q8pj | Cross site scripting in datatables.net | This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped. | {'CVE-2021-23445'} | 2021-10-13T17:26:00Z | 2021-09-29T17:11:28Z | MODERATE | null | {'CWE-79'} | {'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371', 'https://cdn.datatables.net/1.11.3/', 'https://github.com... | null | {'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'} | {'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b'} |
npm | GHSA-qqxp-xp9v-vvx6 | Moderate severity vulnerability that affects jquery-ui | Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo. | {'CVE-2012-6662'} | 2021-09-16T20:04:38Z | 2017-10-24T18:33:37Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'http://bugs.jqueryui.com/ticket/8859', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'http://www.securityfocus.com/bid/71107', 'http://seclists.org/oss-sec/2014/q4/613', 'https://github.com/jquery/jquery-ui/commit/f2854408cc... | null | {'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'} | {'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e'} |
npm | GHSA-g452-6rfc-vrvx | Prototype Pollution in open-graph | This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload. | {'CVE-2021-23419'} | 2021-08-30T21:26:46Z | 2021-09-01T18:31:53Z | MODERATE | null | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747', 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348', 'https://github.com/samholmes/node-open-graph', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419'} | null | {'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'} | {'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'} |
npm | GHSA-hhqj-cfjx-vj25 | Cross site scripting in reveal.js | The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on ... | {'CVE-2022-0776'} | 2022-03-10T16:00:14Z | 2022-03-02T00:00:20Z | MODERATE | null | {'CWE-79'} | {'https://github.com/hakimel/reveal.js', 'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'} | null | {'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'} | {'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'} |
npm | GHSA-c35v-qwqg-87jc | Timing Attack in express-basic-auth | Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in ent... | null | 2021-08-04T20:58:12Z | 2019-06-06T15:32:32Z | LOW | null | {'CWE-208'} | {'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345', 'https://www.npmjs.com/advisories/827', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', ... | null | {'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'} | {'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'} |
npm | GHSA-6c3f-p5wp-34mh | OS Command Injection in async-git | The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing... | {'CVE-2021-3190'} | 2022-05-03T02:56:05Z | 2021-01-29T18:14:00Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58... | null | {'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'} | {'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a'} |
npm | GHSA-wx69-rvg3-x7fc | XSS via prototype pollution in NodeBB | ### Impact
A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report.
### Patches
The ... | {'CVE-2021-43787'} | 2021-12-01T15:07:01Z | 2021-11-30T22:21:01Z | CRITICAL | null | {'CWE-79'} | {'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc', 'https://github.com/NodeBB/NodeBB'} | null | {'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'} | {'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c'} |
npm | GHSA-84p7-fh9c-6g8h | Prototype Pollution in mixme | ### Impact
When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content.
### Patches
The problem was patch with a more agressive discovery of secured properties to filter out.
| null | 2021-09-16T21:30:18Z | 2021-09-20T19:52:24Z | HIGH | null | {'CWE-1321'} | {'https://github.com/adaltas/node-mixme/issues/1', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme', 'https:/... | null | {'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'} | {'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad'} |
npm | GHSA-94xh-2fmc-xf5j | command injection vulnerability | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
### References
_Are there any links use... | {'CVE-2020-7752'} | 2021-10-08T21:15:35Z | 2020-10-27T20:30:20Z | HIGH | null | {'CWE-78'} | {'https://github.com/sebhildebrandt/systeminformation', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909', 'h... | null | {'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'} | {'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61'} |
npm | GHSA-rjf2-j2r6-q8gr | Prototype Pollution in vm2 | This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine. | {'CVE-2021-23449'} | 2021-10-19T14:18:05Z | 2021-10-19T15:28:45Z | CRITICAL | null | {'CWE-915', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23449', 'https://github.com/patriksimek/vm2', 'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481... | null | {'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'} | {'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886'} |
npm | GHSA-m52x-29pq-w3vv | Cross-Site Scripting in pannellum | Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 2.5.6 or later. | {'CVE-2019-16763'} | 2021-01-08T18:31:10Z | 2019-11-22T18:18:03Z | MODERATE | null | {'CWE-79'} | {'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763', 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://www.npmjs.com/advisories/1418'} | null | {'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'} | {'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'} |
npm | GHSA-vx3p-948g-6vhq | Regular Expression Denial of Service (ReDoS) | npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option. | {'CVE-2021-27290'} | 2021-10-21T17:38:11Z | 2021-03-19T21:24:36Z | HIGH | null | {'CWE-400'} | {'https://github.com/npm/ssri', 'https://www.npmjs.com/package/ssri', 'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://www.oracle.com/security-aler... | null | {'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1'} | {'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2'} |
npm | GHSA-43f8-2h32-f4cj | Regular Expression Denial of Service in hosted-git-info | The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity | {'CVE-2021-23362'} | 2022-03-18T20:25:44Z | 2021-05-06T16:10:39Z | MODERATE | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://github.com/npm/hosted-git-info', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355', 'https://github.com/npm/ho... | null | {'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3'} | {'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7'} |
npm | GHSA-67mq-h2r9-rh2m | Prototype pollution in multi-ini | This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448. | {'CVE-2020-28460'} | 2021-04-07T23:23:09Z | 2021-04-13T15:23:41Z | HIGH | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229'} | null | {'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'} | {'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'} |
npm | GHSA-8v38-pw62-9cw2 | Incorrect returned href via an '@' sign but no user info and hostname | A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,
`````
parse(\"http://@/127.0.0.1\")
`````
Will return:
`````
{
slashes: true,
protocol: 'http:',
hash: '',
query: '',
pathname: '/127.0.0.1',
auth: '',... | {'CVE-2022-0639'} | 2022-03-11T22:48:39Z | 2022-02-18T00:00:33Z | MODERATE | null | {'CWE-639'} | {'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639', 'https://github.com/unshiftio/url-parse'} | null | {'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'} | {'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'} |
npm | GHSA-7wpw-2hjm-89gp | Prototype Pollution in merge | All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge . | {'CVE-2020-28499'} | 2021-05-04T20:20:28Z | 2021-05-04T20:18:47Z | HIGH | null | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://snyk.io/vuln/SNYK-JS-MERGE-1042987', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49... | null | {'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'} | {'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4'} |
npm | GHSA-6956-83fg-5wc5 | Prototype Pollution in set-in | The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049) | {'CVE-2022-25354'} | 2022-03-29T21:05:15Z | 2022-03-18T00:01:11Z | CRITICAL | null | {'CWE-1321'} | {'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://github.com/ahdinosaur/set-in', 'https://snyk.io/vuln/SNYK-JS-SETIN-2388571', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%2... | null | {'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'} | {'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'} |
npm | GHSA-4xcv-9jjx-gfj3 | Denial of Service in mem | Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
## Recommendation
Upgrade to v... | null | 2021-08-17T15:44:45Z | 2019-07-05T21:07:58Z | MODERATE | null | {'CWE-400'} | {'https://www.npmjs.com/advisories/1084', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://snyk.io/vuln/npm:mem:20180117', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'} | null | {'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'} | {'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'} |
npm | GHSA-333x-9vgq-v2j4 | Directory Traversal in geddy | Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
### Proof of Concept
```
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
```
## Recommendation
Update geddy to version >= 13.0.8 | {'CVE-2015-5688'} | 2021-08-31T20:33:50Z | 2017-10-24T18:33:36Z | HIGH | null | {'CWE-22'} | {'https://github.com/geddy/geddy', 'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688', 'https://github.com/geddy/geddy/pull/699', 'https://github.com/geddy/geddy/issues/697', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/gedd... | null | {'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'} | {'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231'} |
npm | GHSA-32x6-qvw6-mxj4 | Forwarding of confidentials headers to third parties in fluture-node | ### Impact
Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the reque... | {'CVE-2022-24719'} | 2022-03-15T18:05:24Z | 2022-03-01T22:14:57Z | LOW | null | {'CWE-359', 'CWE-601', 'CWE-200'} | {'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/psf/requests/pull/4718', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/fluture-js/fluture-node', 'https://github.com/fluture-js/fluture-node/comm... | null | {'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4'} | {'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77'} |
npm | GHSA-6chw-6frg-f759 | Regular Expression Denial of Service in Acorn | Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passe... | null | 2021-08-23T15:10:32Z | 2020-04-03T21:48:38Z | HIGH | null | {'CWE-400'} | {'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469', 'https://www.npmjs.com/advisories/1488'} | null | {'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'} | {'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802'} |
npm | GHSA-3qh4-r86r-grvm | Arbitrary JavaScript Execution in typed-function | Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code.
## Recommendation
Upgrade to version 0.10.6 or later. | {'CVE-2017-1001004'} | 2020-08-31T18:36:57Z | 2020-09-02T18:24:39Z | HIGH | null | {'CWE-94'} | {'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-v... | null | {'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'} | {'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe'} |
npm | GHSA-33rv-m2gp-mm2r | Prototype pollution in safe-flat | Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25927'} | 2021-05-20T21:34:56Z | 2021-06-21T17:18:29Z | CRITICAL | null | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927', 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927'} | null | {'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'} | {'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'} |
npm | GHSA-hhfg-6hfc-rvxm | Regular Expression Denial of Service in jsoneditor | JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInn... | {'CVE-2021-3822'} | 2022-05-04T03:39:38Z | 2021-09-29T17:15:55Z | MODERATE | null | {'CWE-400', 'CWE-697', 'CWE-1333'} | {'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822', 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e', 'https://github.com/josdejong/jsoneditor'} | null | {'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'} | {'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'} |
npm | GHSA-gjwp-7v3g-99pj | Cross-site Request Forgery (CSRF) in joplin | The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms. | {'CVE-2021-23431'} | 2021-08-25T18:00:40Z | 2021-09-02T17:09:05Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23431', 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e', 'https://github.com/laurent22/joplin', 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'} | null | {'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'} | {'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e'} |
npm | GHSA-4r62-v4vq-hr96 | Regular Expression Denial of Service (REDoS) in Marked | ### Impact
_What kind of vulnerability is it? Who is impacted?_
[Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
A Denial of Service attack can affect anyone who runs user generated code through `marked`.
### Patches
_Has the problem been pa... | {'CVE-2021-21306'} | 2021-02-08T21:17:26Z | 2021-02-08T21:17:58Z | MODERATE | null | {'CWE-400'} | {'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd', 'https://www.npmjs.com/package/marked', 'https://github.com/markedjs/marked/issues/1927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306', 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96', 'https://githu... | null | {'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'} | {'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd'} |
npm | GHSA-4p55-xj37-fx7g | Improper Authorization in Strapi | In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes. | {'CVE-2020-27665'} | 2020-10-29T16:25:47Z | 2020-10-29T18:29:31Z | MODERATE | null | {'CWE-276'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27665', 'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616', 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb', 'https://github.com/strapi/strapi/pull/8439'} | null | {'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'} | {'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb'} |
npm | GHSA-6c3j-c64m-qhgq | XSS in jQuery as used in Drupal, Backdrop CMS, and other products | jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. | {'CVE-2019-11358'} | 2022-02-08T22:08:08Z | 2019-04-26T16:29:11Z | MODERATE | null | {'CWE-79', 'CWE-1321'} | {'https://seclists.org/bugtraq/2019/Apr/32', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://backdropcms.org/security/backdrop-sa-core-2019-009', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13... | null | {'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b'} | {'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b'} |
npm | GHSA-2v5f-23xc-v9qr | Cross-site scripting | The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0. | {'CVE-2021-3377'} | 2021-03-11T22:49:55Z | 2021-03-11T22:50:39Z | MODERATE | null | {'CWE-79'} | {'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377', 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf'} | null | {'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'} | {'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27'} |
npm | GHSA-xc6g-ggrc-qq4r | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`.
## Proof of Concept
```
var sanitizeHtml = require('sanitize-html');
var dirty = '!<textarea></textarea><svg/onload=prompt`xs`></textarea>!';
var clean = sanitizeHtml(dirty, {
... | {'CVE-2017-16016'} | 2020-08-31T18:12:43Z | 2018-11-09T17:47:23Z | MODERATE | null | {'CWE-79'} | {'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://nodesecurity.io/advisories/154', 'https://github.com/punkave/sanitize-ht... | null | {'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403'} | {'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'} |
npm | GHSA-gh78-48h3-frjq | Improper exception handling in Aedes | An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream. | {'CVE-2020-13410'} | 2021-05-05T20:02:28Z | 2021-05-06T18:10:46Z | HIGH | null | {'CWE-755'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13410', 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b', 'https://github.com/moscajs/aedes/pull/493', 'https://payatu.com/advisory/dos-in-aedes-mqtt-broker'} | null | {'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'} | {'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b'} |
npm | GHSA-m7rg-8wvq-846v | Prototype pollution | Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25947'} | 2021-06-14T21:47:44Z | 2021-06-07T21:49:14Z | CRITICAL | null | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947', 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'} | null | {'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'} | {'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2'} |
npm | GHSA-c53x-wwx2-pg96 | Cross-Site Scripting in @berslucas/liljs | Versions of `@berslucas/liljs` prior to 1.0.2 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser.
## Recommendation
Upgrade to version 1.0.2 or later. | null | 2021-09-28T17:27:43Z | 2020-09-03T17:03:58Z | MODERATE | null | {'CWE-79'} | {'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c', 'https://www.npmjs.com/advisories/1016', 'https://github.com/bersLucas/liljs/pull/7', 'https://snyk.io/vuln/SNYK-JS-BERSLUCASLILJS-450217', 'https://github.com/bersLucas/liljs', 'https://github.com/bersLucas/liljs/releases/tag/1.0.2'... | null | {'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'} | {'https://github.com/bersLucas/liljs/commit/779c0dcd8aba434a1c94db7d1d2d990a629f9a6c'} |
npm | GHSA-pm52-wwrw-c282 | Command Injection in wiki-plugin-datalog | Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system.
## Recommendation
Upgrade to version 0.1.6 or later. | null | 2021-08-16T14:32:10Z | 2019-06-13T18:59:06Z | HIGH | null | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540', 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7', 'https://www.npmjs.com/advisories/926'} | null | {'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'} | {'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'} |
npm | GHSA-w42g-7vfc-xf37 | Introspection in schema validation in Apollo Server | We encourage all users of Apollo Server to read this advisory in its entirety to understand the impact. The _Resolution_ section contains details on patched versions.
### Impact
If `subscriptions: false` is passed to the `ApolloServer` constructor options, there is no impact. If implementors were not expecting vali... | null | 2020-08-31T19:02:14Z | 2020-06-05T19:38:14Z | MODERATE | null | null | {'https://www.npmjs.com/advisories/1526', 'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114', 'https://www.npmjs.com/advisories/1535', 'https://www.npmjs.com/advisories/1530', 'https://www.npmjs.com/advisories/1525', 'https://www.npmjs.com/advisories/1528', 'https://www.npm... | null | {'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'} | {'https://github.com/apollographql/apollo-server/commit/e2e816316f5c28a03de2ee1589edb2b10c358114'} |
npm | GHSA-p77h-hv6g-fmfp | Sensitive Data Exposure in ibm_db | Versions of `ibm_db` prior to 2.6.0 are vulnerable to Sensitive Data Exposure. The package printed database credentials in plaintext in logs while in debug mode.
## Recommendation
Upgrade to version 2.6.0 or later and ensure sensitive information was not logged. | null | 2021-09-29T18:49:03Z | 2020-09-03T20:43:16Z | MODERATE | null | null | {'https://www.npmjs.com/advisories/1185', 'https://github.com/ibmdb/node-ibm_db', 'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8', 'https://github.com/ibmdb/node-ibm_db/issues/563', 'https://snyk.io/vuln/SNYK-JS-IBMDB-459762'} | null | {'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'} | {'https://github.com/ibmdb/node-ibm_db/commit/526c88b5eedc605274def65405279f6708d91ce8'} |
npm | GHSA-hv96-xxx2-5v7w | Downloads Resources over HTTP in nw | Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`.
## Reco... | {'CVE-2016-10588'} | 2021-06-10T23:26:24Z | 2019-02-18T23:51:04Z | HIGH | null | {'CWE-311'} | {'https://github.com/advisories/GHSA-hv96-xxx2-5v7w', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588', 'https://www.npmjs.com/advisories/166', 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b', 'https://nodesecurity.io/advisories/166'} | null | {'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'} | {'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'} |
npm | GHSA-82rf-q3pr-4f6p | Sensitive data exposure in NATS | Preview versions of two NPM packages and one Deno package from the NATS
project contain an information disclosure flaw, leaking options to the
NATS server; for one package, this includes TLS private credentials.
The _connection_ configuration options in these JavaScript-based
implementations were fully serialized and ... | {'CVE-2020-26149'} | 2021-10-04T21:25:47Z | 2020-10-08T22:11:32Z | HIGH | null | {'CWE-522'} | {'http://www.openwall.com/lists/oss-security/2020/09/30/3', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26149', 'https://github.com/nats-io/nats.ws', 'https://github.com/nats-io/nats.deno/compare/v1.0.0-8...v1.0.0-9', 'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'} | null | {'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'} | {'https://github.com/nats-io/nats.ws/commit/0a37ac2a411ff63f0707cda69a268c5fc4079eb7'} |
npm | GHSA-v82v-rq72-phq9 | Server side request forgery in @isomorphic-git/cors-proxy | The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js. | {'CVE-2021-23664'} | 2022-01-31T22:00:02Z | 2022-01-26T22:13:05Z | HIGH | null | {'CWE-918'} | {'https://snyk.io/vuln/SNYK-JS-ISOMORPHICGITCORSPROXY-1734788', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664', 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311', 'https://github.com/isomorphic-git/cors-proxy'} | null | {'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'} | {'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'} |
npm | GHSA-mfcp-34xw-p57x | Authentication Bypass in saml2-js | Versions of `saml2-js` prior to 2.0.5 are vulnerable to an Authentication Bypass. The package fails to enforce the assertion conditions for encrypted assertions, which may allow an attacker to reuse encrypted assertion tokens indefinitely.
## Recommendation
Upgrade to version 2.0.5 or later. | null | 2021-09-29T20:12:42Z | 2020-09-03T21:20:52Z | MODERATE | null | {'CWE-287'} | {'https://www.npmjs.com/advisories/1222', 'https://snyk.io/vuln/SNYK-JS-SAML2JS-474637', 'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0', 'https://github.com/Clever/saml2/pull/190', 'https://github.com/Clever/saml2'} | null | {'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'} | {'https://github.com/Clever/saml2/commit/ae0da4d0a0ea682a737be481e3bd78798be405c0'} |
npm | GHSA-pfxf-wh96-fvjc | Log Forging in generator-jhipster-kotlin | ### Impact
We log the mail for invalid password reset attempts.
As the email is provided by a user and the api is public this can be used by an attacker to forge log entries.
This is vulnerable to https://cwe.mitre.org/data/definitions/117.html
This problem affects only application generated with jwt or session auth... | {'CVE-2020-4072'} | 2021-01-07T23:50:00Z | 2020-06-25T20:02:51Z | MODERATE | null | {'CWE-117'} | {'https://github.com/jhipster/jhipster-kotlin/security/advisories/GHSA-pfxf-wh96-fvjc', 'https://owasp.org/www-community/attacks/Log_Injection', 'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449', 'https://www.baeldung.com/jvm-log-forging', 'https://nvd.nist.gov/vuln/detail/CV... | null | {'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'} | {'https://github.com/jhipster/jhipster-kotlin/commit/426ccab85e7e0da562643200637b99b6a2a99449'} |
npm | GHSA-2pr6-76vf-7546 | Denial of Service in js-yaml | Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.
## Recommendation
Upgrade to version 3.13.0. | null | 2021-08-04T21:32:56Z | 2019-06-05T14:35:29Z | MODERATE | null | {'CWE-400'} | {'https://github.com/nodeca/js-yaml/issues/475', 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235', 'https://www.npmjs.com/advisories/788', 'https://www.npmjs.com/advisories/788/versions', 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'} | null | {'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'} | {'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'} |
npm | GHSA-6394-6h9h-cfjg | Regular Expression Denial of Service | A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the "\s*" pattern. | null | 2021-02-25T17:23:12Z | 2019-06-07T21:12:35Z | MODERATE | null | {'CWE-400'} | {'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'} | null | {'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'} | {'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'} |
npm | GHSA-2x4q-6jfv-8h9h | Path Traversal in glance | Versions of `glance` before 3.0.4 are vulnerable to path traversal allowing a remote attacker to read arbitrary files from the server using `glance`.
## Recommendation
Update to version 3.0.4 or later. | {'CVE-2018-3715'} | 2020-08-31T18:29:00Z | 2018-07-26T14:53:14Z | HIGH | null | {'CWE-22'} | {'https://www.npmjs.com/advisories/590', 'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19', 'https://github.com/advisories/GHSA-2x4q-6jfv-8h9h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3715', 'https://hackerone.com/reports/310106'} | null | {'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'} | {'https://github.com/jarofghosts/glance/commit/8cfd88e44ebd3f07e3a2eaf376a3e758b6c4ca19'} |
npm | GHSA-63q7-h895-m982 | Cross-site Scripting in dompurify | Cure53 DOMPurify before 2.0.17 allows mutation XSS. This occurs because a serialize-parse roundtrip does not necessarily return the original DOM tree, and a namespace can change from HTML to MathML, as demonstrated by nesting of FORM elements. | {'CVE-2020-26870'} | 2022-04-28T17:58:51Z | 2020-12-18T22:51:40Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d', 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26870', 'https://github.com/cure53/DOMPurify/compare/2.0.16...2.0.17', 'https://research.securitum.com/m... | null | {'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'} | {'https://github.com/cure53/DOMPurify/commit/02724b8eb048dd219d6725b05c3000936f11d62d'} |
npm | GHSA-f698-m2v9-5fh3 | Command Injection in opencv | Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands.
## Recommendation
Upgrade to version 6.1.0.
| null | 2020-08-31T18:35:50Z | 2019-06-04T20:11:44Z | LOW | null | {'CWE-77'} | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb', 'https://www.npmjs.com/advisories/789'} | null | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'} | {'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'} |
npm | GHSA-3c48-6pcv-88rm | Macro in MathJax running untrusted Javascript within a web browser | MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. Th... | {'CVE-2018-1999024'} | 2022-04-26T18:17:56Z | 2018-07-27T17:05:27Z | MODERATE | null | {'CWE-79'} | {'https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999024', 'https://github.com/advisories/GHSA-3c48-6pcv-88rm', 'https://github.com/mathjax/MathJax', 'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'} | null | {'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'} | {'https://github.com/mathjax/MathJax/commit/a55da396c18cafb767a26aa9ad96f6f4199852f1'} |
npm | GHSA-r9p9-mrjm-926w | Use of a Broken or Risky Cryptographic Algorithm | The npm package `elliptic` before version 6.5.4 are vulnerable to Cryptographic Issues via the secp256k1 implementation in elliptic/ec/key.js. There is no check to confirm that the public key point passed into the derive function actually exists on the secp256k1 curve. This results in the potential for the private key ... | {'CVE-2020-28498'} | 2021-03-08T16:02:43Z | 2021-03-08T16:06:50Z | MODERATE | null | {'CWE-327'} | {'https://snyk.io/vuln/SNYK-JS-ELLIPTIC-1064899', 'https://github.com/indutny/elliptic/pull/244/commits', 'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f', 'https://www.npmjs.com/package/elliptic', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28498', 'https://github.com/christianlundk... | null | {'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'} | {'https://github.com/indutny/elliptic/commit/441b7428b0e8f6636c42118ad2aaa186d3c34c3f'} |
npm | GHSA-4w46-w44m-3jq3 | Parse Server stores password in plain text | Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js.
In Parse Server before version 4.5.0, user passwords involved in LDAP authentication are stored in cleartext.
This is fixed in version 4.5.0 by stripping password after authentication to prevent cleartext password st... | {'CVE-2020-26288'} | 2021-01-07T22:32:25Z | 2020-12-28T16:33:17Z | LOW | null | {'CWE-312'} | {'https://www.npmjs.com/package/parse-server', 'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a', 'https://github.com/parse-community/parse-server/releases/tag/4.5.0', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-4w46-w44m-3jq3', 'https://www.... | null | {'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'} | {'https://github.com/parse-community/parse-server/commit/da905a357d062ab4fea727a21eac231acc2ed92a'} |
npm | GHSA-6cgh-hjpw-q3gq | Utils.readChallengeTx does not verify the server account signature | The `Utils.readChallengeTx` function used in [SEP-10 Stellar Web Authentication](https://github.com/stellar/stellar-protocol/blob/master/ecosystem/sep-0010.md) states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transac... | {'CVE-2021-32738'} | 2021-07-02T18:25:08Z | 2021-07-02T19:20:33Z | MODERATE | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32738', 'https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3', 'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3', 'https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq'} | null | {'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'} | {'https://github.com/stellar/js-stellar-sdk/commit/6f0bb889c2d10b431ddd5f4a1bcdd519c80430b3'} |
npm | GHSA-jgrx-mgxx-jf9v | Regular Expression Denial of Service in tmpl | nodejs-tmpl is simple string formatting. tmpl is vulnerable to Inefficient Regular Expression Complexity which may lead to resource exhaustion. | {'CVE-2021-3777'} | 2022-05-04T03:26:16Z | 2021-09-20T20:27:52Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3777', 'https://huntr.dev/bounties/a07b547a-f457-41c9-9d89-ee48bee8a4df', 'https://github.com/daaku/nodejs-tmpl', 'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'} | null | {'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'} | {'https://github.com/daaku/nodejs-tmpl/commit/4c654e4d1542f329ed561fd95ccd80f30c6872d6'} |
npm | GHSA-w8qv-6jwh-64r5 | Regular Expression Denial of Service in browserslist | The package browserslist from 4.0.0 and before 4.16.5 are vulnerable to Regular Expression Denial of Service (ReDoS) during parsing of queries. | {'CVE-2021-23364'} | 2021-05-20T22:03:36Z | 2021-05-24T19:52:40Z | MODERATE | null | {'CWE-400'} | {'https://github.com/browserslist/browserslist/blob/e82f32d1d4100d6bc79ea0b6b6a2d281a561e33c/index.js%23L472-L474', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23364', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1277182', 'https://snyk.io/vuln/SNYK-JS-BROWSERSLIST-1090194', 'https://github.com/browserslist/browserslis... | null | {'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'} | {'https://github.com/browserslist/browserslist/commit/c091916910dfe0b5fd61caad96083c6709b02d98'} |
npm | GHSA-8h84-8j4f-p97q | Injection in bodymen | bodymen before 1.1.1 is vulnerable to Prototype Pollution. The handler function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | {'CVE-2019-10792'} | 2021-04-07T20:24:23Z | 2021-04-13T15:24:21Z | MODERATE | null | {'CWE-74'} | {'https://snyk.io/vuln/SNYK-JS-BODYMEN-548897', 'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10792'} | null | {'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'} | {'https://github.com/diegohaz/bodymen/commit/5d52e8cf360410ee697afd90937e6042c3a8653b'} |
npm | GHSA-mxjr-xmcg-fg7w | Arbitrary Code Injection in mobile-icon-resizer | mobile-icon-resizer resizes large images for use as icons for iOS and Android.
mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3.
mobile-icon-resizer takes an options object as an argument to define the resulting icons as such:
```
var options = {
config: './config.js'
}
resize(options... | null | 2021-08-17T15:41:58Z | 2019-06-27T17:25:21Z | MODERATE | null | {'CWE-94'} | {'https://www.npmjs.com/advisories/317', 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408', 'https://nodesecurity.io/advisories/317', 'https://github.com/muzzley/mobile-icon-resizer/issues/8', 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'} | null | {'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'} | {'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'} |
npm | GHSA-g95j-p8f6-pwh4 | Downloads Resources over HTTP in headless-browser-lite | Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system runn... | {'CVE-2016-10625'} | 2021-06-10T23:42:13Z | 2019-02-18T23:56:58Z | HIGH | null | {'CWE-311'} | {'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://www.npmjs.com/advisories/230', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://nodesecurity.io/advisories/230', 'https://nvd.nist.gov/vuln/detail/CVE... | null | {'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'} | {'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916', 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'} |
npm | GHSA-2hw7-mxvj-m455 | Path traversal in Node-RED-Dashboard | In Node-RED-Dashboard before 2.26.2 there is a path traversal vulnerability. It allows ui_base/js/..%2f directory traversal to read files. | {'CVE-2021-3223'} | 2021-01-27T23:26:39Z | 2021-01-29T18:13:52Z | HIGH | null | {'CWE-22'} | {'https://github.com/node-red/node-red-dashboard/releases/tag/2.26.2', 'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97', 'https://github.com/node-red/node-red-dashboard/issues/669', 'https://www.npmjs.com/package/node-red-dashboard', 'https://nvd.nist.gov/vuln/detail/CVE-... | null | {'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'} | {'https://github.com/node-red/node-red-dashboard/commit/f48f356df966f607ba3d09c27396074b81f2ae97'} |
npm | GHSA-j44m-qm6p-hp7m | Arbitrary File Overwrite in tar | Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.
## Recommendation... | {'CVE-2018-20834'} | 2021-08-03T21:28:27Z | 2019-05-01T18:37:31Z | HIGH | null | {'CWE-59'} | {'https://hackerone.com/reports/344595', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://access.redhat.com/errata/RHSA-2019:1821', 'https://github.com/npm/node-tar/commits/v2.2.2', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://nvd... | null | {'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d', 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'} | {'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8', 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'} |
npm | GHSA-hqq7-2q2v-82xq | Cross-site Scripting in sanitize-url | The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function. | {'CVE-2021-23648'} | 2022-03-21T17:20:05Z | 2022-03-17T00:00:24Z | MODERATE | null | {'CWE-79'} | {'https://github.com/braintree/sanitize-url/pull/40', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HLAQRRGNSO5MYCPAXGPH2OCSHOGHSQMQ/', 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183', 'https://github.com/braintree/sa... | null | {'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'} | {'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'} |
npm | GHSA-82mg-x548-gq3j | LDAP Injection in ldapauth | Versions 2.2.4 and earlier of `ldapauth-fork` are affected by an LDAP injection vulnerability. This allows an attacker to inject and run arbitrary LDAP commands via the username parameter.
## Recommendation
ldapauth is not actively maintained, having not seen a publish since 2014. As a result, there is no patch ava... | {'CVE-2015-7294'} | 2021-09-23T19:58:02Z | 2020-08-31T22:49:46Z | HIGH | null | {'CWE-90'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-7294', 'https://www.npmjs.com/advisories/18', 'http://www.openwall.com/lists/oss-security/2015/09/18/8', 'https://www.npmjs.com/advisories/19', 'https://github.com/vesse/node-ldapauth-fork', 'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d9... | null | {'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'} | {'https://github.com/vesse/node-ldapauth-fork/commit/3feea43e243698bcaeffa904a7324f4d96df60e4'} |
npm | GHSA-3pcq-34w5-p4g2 | forEachSeries and forEachLimit do not limit the number of requests | ### Impact
This is a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potentia... | {'CVE-2021-41167'} | 2021-10-27T17:05:58Z | 2021-10-21T17:49:30Z | HIGH | null | {'CWE-400'} | {'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436', 'https://github.com/nicolas-van/modern-async/issues/5', 'https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2', 'https://github.com/nicolas-van/modern-async', 'https://nvd.nist.gov/vuln/detail/... | null | {'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'} | {'https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436'} |
npm | GHSA-7p7h-4mm5-852v | Regular Expression Denial of Service in trim-newlines | @rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method. | {'CVE-2021-33623'} | 2022-05-04T03:06:53Z | 2021-06-07T22:10:39Z | HIGH | null | {'CWE-400'} | {'https://security.netapp.com/advisory/ntap-20210702-0007/', 'https://github.com/sindresorhus/trim-newlines/releases/tag/v4.0.1', 'https://github.com/sindresorhus/trim-newlines', 'https://www.npmjs.com/package/trim-newlines', 'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91... | null | {'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'} | {'https://github.com/sindresorhus/trim-newlines/commit/25246c6ce5eea1c82d448998733a6302a4350d91'} |
npm | GHSA-72mh-269x-7mh5 | Improper Certificate Validation in xmlhttprequest-ssl | The xmlhttprequest-ssl package before 1.6.1 for Node.js disables SSL certificate validation by default, because rejectUnauthorized (when the property exists but is undefined) is considered to be false within the https.request function of Node.js. In other words, no certificate is ever rejected. | {'CVE-2021-31597'} | 2021-05-20T21:59:29Z | 2021-05-24T19:52:55Z | CRITICAL | null | {'CWE-295'} | {'https://github.com/mjwwit/node-XMLHttpRequest/compare/v1.6.0...1.6.1', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31597', 'https://security.netapp.com/advisory/ntap-20210618-0004/', 'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2', 'https://people.kingsds.network/wesgarl... | null | {'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'} | {'https://github.com/mjwwit/node-XMLHttpRequest/commit/bf53329b61ca6afc5d28f6b8d2dc2e3ca740a9b2'} |
npm | GHSA-6qpr-9mc5-7gch | Command Injection in async-git | The package async-git before 1.13.2 are vulnerable to Command Injection via shell meta-characters (back-ticks). For example: git.reset('atouch HACKEDb') | {'CVE-2020-28490'} | 2021-03-18T22:57:13Z | 2021-04-12T19:50:20Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d', 'https://www.npmjs.com/package/async-git', 'https://snyk.io/vuln/SNYK-JS-ASYNCGIT-1064877', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28490', 'https://github.com/omrilotan/async-git/pull/14'} | null | {'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'} | {'https://github.com/omrilotan/async-git/commit/d1950a5021f4e19d92f347614be0d85ce991510d'} |
npm | GHSA-3jfq-g458-7qm9 | Arbitrary File Creation/Overwrite due to insufficient absolute path sanitization | ### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
`node-tar` aims to prevent extraction of absolute file paths by turning absolute paths into relative paths when the `preservePaths` flag is not set to `true`. This is achieved by stripping the absolute path root from any absolute f... | {'CVE-2021-32804'} | 2021-08-30T23:14:50Z | 2021-08-03T19:06:36Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32804', 'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4', 'https://github.com/npm/node-tar', 'https://github.com/npm/node-tar/security/advisories/GHSA-3jfq-g458-7qm9', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmj... | null | {'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'} | {'https://github.com/npm/node-tar/commit/1f036ca23f64a547bdd6c79c1a44bc62e8115da4'} |
npm | GHSA-8fr3-hfg3-gpgp | Open Redirect in node-forge | parseUrl functionality in node-forge mishandles certain uses of backslash such as https:/\/\/\ and interprets the URI as a relative path. | {'CVE-2022-0122'} | 2022-01-13T18:49:59Z | 2022-01-21T23:36:19Z | MODERATE | null | {'CWE-601'} | {'https://huntr.dev/bounties/41852c50-3c6d-4703-8c55-4db27164a4ae', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'} | null | {'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'} | {'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.