ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
npm | GHSA-r683-j2x4-v87g | node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor | node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor | {'CVE-2022-0235'} | 2022-01-18T22:51:22Z | 2022-01-21T23:55:52Z | HIGH | null | {'CWE-173', 'CWE-601', 'CWE-200'} | {'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10', 'https://github.com/node-fetch/node-fetch/pull/1453', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235', 'https://huntr.dev/bounties/d26ab655-38d6-48b3-be15-f9ad6b6ae6f7', 'https://github.com/node-fetch/node-fetch/commit/5c32f00... | null | {'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10', 'https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60'} | {'https://github.com/node-fetch/node-fetch/commit/5c32f002fdd65b1c6a8f1e3620210813d45c7e60', 'https://github.com/node-fetch/node-fetch/commit/36e47e8a6406185921e4985dcbeff140d73eaa10'} |
npm | GHSA-32j9-6qqm-mq9g | Unhandled case in node-lmdb | The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check. | {'CVE-2022-21164'} | 2022-03-30T20:16:16Z | 2022-03-17T00:00:27Z | HIGH | null | {'CWE-241', 'CWE-703'} | {'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a', 'https://snyk.io/vuln/SNYK-JS-NODELMDB-2400723', 'https://github.com/Venemo/node-lmdb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164'} | null | {'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a'} | {'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a'} |
npm | GHSA-j7cg-h9v9-6vqp | "Prototype Pollution in irrelon-path and @irrelon/path" | The package irrelon-path before 4.7.0; the package @irrelon/path before 4.7.0 are vulnerable to Prototype Pollution via the set, unSet, pushVal and pullVal functions. | {'CVE-2020-7708'} | 2021-05-05T21:25:03Z | 2021-05-06T17:29:19Z | CRITICAL | null | {'CWE-915'} | {'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598672', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7708', 'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3', 'https://snyk.io/vuln/SNYK-JS-IRRELONPATH-598673'} | null | {'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3'} | {'https://github.com/Irrelon/irrelon-path/commit/8a126b160c1a854ae511659c111413ad9910ebe3'} |
npm | GHSA-7rg2-qxmf-hhx9 | Session fixation in express-openid-connect | ### Overview
Versions `2.3.0` up to and including `2.5.1` do not regenerate the session id and session cookie when user logs in. This behavior opens up the application to various session fixation vulnerabilities.
### Am I affected?
You are affected by this vulnerability if you are using `express-openid-connect` vers... | {'CVE-2021-41246'} | 2021-12-15T15:28:49Z | 2021-12-09T19:08:58Z | MODERATE | null | {'CWE-384'} | {'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f', 'https://github.com/auth0/express-openid-connect', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7rg2-qxmf-hhx9', 'https://github.com/auth0/express-openid-connect/releases/tag/v2.5.2', 'https:... | null | {'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f'} | {'https://github.com/auth0/express-openid-connect/commit/5ab67ff2bd84f76674066b5e129b43ab5f2f430f'} |
npm | GHSA-5v2h-r2cx-5xgj | Inefficient Regular Expression Complexity in marked | ### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from 'marked';
console.log(marked.parse(`[x]: x
\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\]... | {'CVE-2022-21681'} | 2022-01-14T19:57:17Z | 2022-01-14T21:04:46Z | HIGH | null | {'CWE-1333'} | {'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj', 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681', 'https://github.com/markedjs/marked'} | null | {'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5'} | {'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5'} |
npm | GHSA-c7hr-j4mj-j2w6 | Verification Bypass in jsonwebtoken | Versions 4.2.1 and earlier of `jsonwebtoken` are affected by a verification bypass vulnerability. This is a result of weak validation of the JWT algorithm type, occuring when an attacker is allowed to arbitrarily specify the JWT algorithm.
## Recommendation
Update to version 4.2.2 or later. | {'CVE-2015-9235'} | 2020-08-31T18:07:57Z | 2018-10-09T00:38:30Z | CRITICAL | null | {'CWE-20'} | {'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9235', 'https://www.timmclean.net/2015/02/25/jwt-alg-none.html', 'https://nodesecurity.io/advisories/17', 'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a6... | null | {'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687'} | {'https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687'} |
npm | GHSA-8xxm-h73r-ghfj | Validation bypass in frourio | ## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformer... | {'CVE-2022-23623'} | 2022-02-14T22:32:53Z | 2022-02-07T22:37:45Z | HIGH | null | {'CWE-20'} | {'https://github.com/frouriojs/frourio', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23623', 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af', 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj'} | null | {'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af'} | {'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af'} |
npm | GHSA-f2jw-pr2c-9x96 | Code injection in @rkesters/gnuplot | @rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands. | {'CVE-2021-29369'} | 2022-05-04T03:05:58Z | 2022-02-10T23:41:49Z | CRITICAL | null | {'CWE-77', 'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-29369', 'https://www.npmjs.com/package/@rkesters/gnuplot', 'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de'} | null | {'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de'} | {'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de'} |
npm | GHSA-hpmr-g4pq-jhgp | Denial of service in chrono-node | This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces. | {'CVE-2021-23371'} | 2021-04-23T18:47:21Z | 2021-05-06T15:58:05Z | HIGH | null | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-CHRONONODE-1083228', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23371', 'https://github.com/wanasit/chrono/issues/382', 'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c'} | null | {'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c'} | {'https://github.com/wanasit/chrono/commit/98815b57622443b5c498a427210ebd603d705f4c'} |
npm | GHSA-m9jw-237r-gvfv | SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection. The function `sequelize.json()` incorrectly formatted sub paths for JSON queries, which allows attackers to inject SQL statements and execute arbitrary SQL queries if user input is passed to the query. Exploitation example:
```return User.findAll({
... | {'CVE-2019-10752'} | 2021-08-18T21:54:56Z | 2019-10-25T19:43:16Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/sequelize/sequelize/pull/11329', 'https://www.npmjs.com/advisories/1146', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10752', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-459751,', 'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e90268... | null | {'https://github.com/sequelize/sequelize/commit/9bd0bc1,', 'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e'} | {'https://github.com/sequelize/sequelize/commit/9bd0bc111b6f502223edf7e902680f7cc2ed541e', 'https://github.com/sequelize/sequelize/commit/9bd0bc1,'} |
npm | GHSA-m5h6-hr3q-22h5 | npm Token Leak in npm | Affected versions of the `npm` package include the bearer token of the logged in user in every request made by the CLI, even if the request is not directed towards the user's active registry.
An attacker could create an HTTP server to collect tokens, and by various means including but not limited to install scripts, ... | {'CVE-2016-3956'} | 2020-08-31T18:10:47Z | 2018-07-31T22:58:35Z | HIGH | null | {'CWE-200'} | {'https://github.com/advisories/GHSA-m5h6-hr3q-22h5', 'https://github.com/npm/npm/issues/8380', 'https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3956', 'https://www.npmjs.com/advisories/98', 'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a... | null | {'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29', 'https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401'} | {'https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29', 'https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401'} |
npm | GHSA-r9vm-rhmf-7hxx | OS Command Injection in im-resize | im-resize through 2.3.2 allows remote attackers to execute arbitrary commands via the "exec" argument. The cmd argument used within index.js, can be controlled by user without any sanitization. | {'CVE-2019-10787'} | 2021-03-29T23:01:10Z | 2021-04-13T15:17:06Z | HIGH | null | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-IMRESIZE-544183', 'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10787'} | null | {'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'} | {'https://github.com/Turistforeningen/node-im-resize/commit/de624dacf6a50e39fe3472af1414d44937ce1f03'} |
npm | GHSA-gj77-59wh-66hg | Regular Expression Denial of Service (ReDoS) in Prism | Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS).
### Impact
When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. Do not use the following languages to highlight untrusted text.
- ASCI... | {'CVE-2021-32723'} | 2022-02-08T21:21:38Z | 2021-06-28T18:33:18Z | HIGH | null | {'CWE-400'} | {'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg', 'https://github.com/PrismJS/prism/pull/2688', 'https://github.com/PrismJS/prism/pull/2774', 'https://... | null | {'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018'} | {'https://github.com/PrismJS/prism/commit/d85e30da6755fdbe7f8559f8e75d122297167018'} |
npm | GHSA-9m87-6fj3-c5xh | Untrusted Search Path in PNPM | PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | {'CVE-2022-26183'} | 2022-03-30T21:04:52Z | 2022-03-23T00:00:24Z | HIGH | null | {'CWE-426'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-26183', 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb', 'https://github.com/pnpm/pnpm/releases/tag/v6.15.1', 'https://github.com/pnpm/pnpm'} | null | {'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb'} | {'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb'} |
npm | GHSA-9j49-mfvp-vmhm | Code Injection in pac-resolver | This affects the package pac-resolver before 5.0.0. This can occur when used with untrusted input, due to unsafe PAC file handling. **NOTE:** The fix for this vulnerability is applied in the node-degenerator library, a dependency written by the same maintainer. | {'CVE-2021-23406'} | 2021-08-25T19:28:31Z | 2021-09-02T17:10:06Z | HIGH | null | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1568506', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23406', 'https://snyk.io/vuln/SNYK-JS-PACRESOLVER-1564857', 'https://github.com/TooTallNate/', 'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://github.com/TooTal... | null | {'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e'} | {'https://github.com/TooTallNate/node-degenerator/commit/ccc3445354135398b6eb1a04c7d27c13b833f2d5', 'https://github.com/TooTallNate/node-degenerator/commit/9d25bb67d957bc2e5425fea7bf7a58b3fc64ff9e'} |
npm | GHSA-qr4p-c9wr-phr6 | Prototype pollution in set-in | Prototype pollution vulnerability in 'set-in' versions 1.0.0 through 2.0.0 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28273'} | 2021-03-18T23:53:31Z | 2021-03-19T21:01:46Z | CRITICAL | null | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28273', 'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28273'} | null | {'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88'} | {'https://github.com/ahdinosaur/set-in/commit/e431effa00195a6f06b111e09733cd1445a91a88'} |
npm | GHSA-hp68-xhvj-x6j6 | Insufficient patch for Regular Expression Denial of Service (ReDoS) to jsx-slack v4.5.1 | We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack.
This vulnerability affects to jsx-slack v4.5.1 and earlier versions.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte chara... | {'CVE-2021-43843'} | 2022-01-04T20:19:23Z | 2022-01-06T18:34:18Z | MODERATE | null | {'CWE-400'} | {'https://github.com/yhatt/jsx-slack/security/', 'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6', 'https://github.com/yhatt/jsx-slack/releases/tag/v4.5.2', 'https://github.com/yhatt/jsx-slack/security/advi... | null | {'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc'} | {'https://github.com/yhatt/jsx-slack/commit/46bc88391d89d5fda4ce689e18ca080bcdd29ecc'} |
npm | GHSA-rc77-xxq6-4mff | Command Injection in hot-formula-parser | Versions of `hot-formula-parser` prior to 3.0.1 are vulnerable to Command Injection. The package fails to sanitize values passed to the `parse` function and concatenates it in an `eval` call. If a value of the formula is supplied by user-controlled input it may allow attackers to run arbitrary commands in the server. ... | {'CVE-2020-6836'} | 2021-08-25T21:04:44Z | 2020-05-06T19:32:33Z | CRITICAL | null | {'CWE-94'} | {'https://github.com/handsontable/formula-parser/pull/58', 'https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/', 'https://www.npmjs.com/advisories/1439', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6836', 'https://github.com/handsontable/formula-parser', 'https://github.com/handsontable/for... | null | {'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e'} | {'https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e'} |
npm | GHSA-536q-8gxx-m782 | Cross-Site Scripting in dojo | Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 1.4.2 or later. | {'CVE-2010-2273'} | 2020-08-31T18:42:32Z | 2019-09-11T23:02:57Z | MODERATE | null | {'CWE-79'} | {'http://secunia.com/advisories/38964', 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849', 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273', 'http://secunia.com/advisories/40007', 'https://bugs.dojotoolkit.org/ticket/10773', 'http://bugs.dojotoolkit.org/ticket/10773', 'http://www.gdssecurity.com/l/b/2010/03/12... | null | {'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4'} | {'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4'} |
npm | GHSA-fj93-7wm4-8x2g | Cross-Site Scripting in jquery-mobile | All version of `jquery-mobile` are vulnerable to Cross-Site Scripting. The package checks for content in `location.hash` and if a URL is found it does an XmlHttpRequest (XHR) to the URL and renders the response with `innerHTML`. It fails to validate the `Content-Type` of the response, allowing attackers to include mali... | null | 2021-09-27T21:03:58Z | 2020-09-02T21:22:47Z | HIGH | null | {'CWE-79'} | {'https://gist.github.com/jupenur/e5d0c6f9b58aa81860bf74e010cf1685', 'https://github.com/jquery/jquery-mobile/pull/8649', 'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50', 'https://github.com/jquery/jquery-mobile/', 'https://snyk.io/vuln/SNYK-JS-JQUERYMOBILE-174599', 'https://gi... | null | {'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50'} | {'https://github.com/jquery/jquery-mobile/commit/b0d9cc758a48f13321750d7409fb7655dcdf2b50'} |
npm | GHSA-394c-5j6w-4xmx | Regular Expression Denial of Service (ReDoS) in ua-parser-js | The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). | {'CVE-2020-7793'} | 2021-04-08T21:32:22Z | 2022-02-09T22:46:53Z | HIGH | null | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-1023599', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-1050388', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7793', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1050387', 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b1... | null | {'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18'} | {'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18'} |
npm | GHSA-m33v-338h-4v9f | Path traversal in Node-Red | ### Impact
This vulnerability allows arbitrary path traversal via the Projects API.
If the Projects feature is enabled, a user with `projects.read` permission is able to access any file via the Projects API.
### Patches
The issue has been patched in Node-RED 1.2.8
### Workarounds
The vulnerability applies only to... | {'CVE-2021-21298'} | 2021-02-26T16:23:34Z | 2021-02-26T16:31:23Z | LOW | null | {'CWE-22'} | {'https://www.npmjs.com/package/@node-red/runtime', 'https://github.com/node-red/node-red/security/advisories/GHSA-m33v-338h-4v9f', 'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456', 'https://github.com/node-red/node-red/releases/tag/1.2.8', 'https://nvd.nist.gov/vuln/detail/CVE-202... | null | {'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456'} | {'https://github.com/node-red/node-red/commit/74db3e17d075f23d9c95d7871586cf461524c456'} |
npm | GHSA-vmhw-fhj6-m3g5 | Path Traversal in angular-http-server | Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal.
## Recommendation
Update to version 1.4.4 or later. | null | 2020-08-31T18:31:33Z | 2019-05-31T23:46:33Z | HIGH | null | {'CWE-22'} | {'https://www.npmjs.com/advisories/656', 'https://nodesecurity.io/advisories/656', 'https://hackerone.com/reports/330349', 'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'} | null | {'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'} | {'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'} |
npm | GHSA-f34m-x9pj-62vq | Cross-Site Scripting Vulnerability in @joeattardi/emoji-button | ### Impact
There are two vectors for XSS attacks with versions of @joeattardi/emoji-button before 4.6.2:
- A URL for a custom emoji
- An i18n string
In both of these cases, a value can be crafted such that it can insert a `script` tag into the page and execute malicious code.
### Patches
This vulnerability is fixe... | {'CVE-2021-43785'} | 2021-12-01T14:34:05Z | 2021-12-01T18:29:02Z | HIGH | null | {'CWE-79'} | {'https://github.com/joeattardi/emoji-button', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43785', 'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16', 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e', 'https://github.com/joeattardi/emo... | null | {'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16', 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e'} | {'https://github.com/joeattardi/emoji-button/commit/05970c09180cd27fff493e998ac5bf0468b1bb16', 'https://github.com/joeattardi/emoji-button/commit/fe54bef107eb3f74873a4018f2ff49fa124c6a2e'} |
npm | GHSA-93f3-23rq-pjfp | Sensitive information exposure through logs in npm CLI | Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files. | {'CVE-2020-15095'} | 2021-01-07T23:47:37Z | 2020-07-07T18:56:16Z | LOW | null | {'CWE-532'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15095', 'https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07', 'http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html', 'https://security.gentoo.org/glsa/202101-07', 'http://lists.opensuse.org/opensuse-sec... | null | {'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'} | {'https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc'} |
npm | GHSA-f7r3-p866-q9qr | Denial of Service in ircdkit | Versions of `ircdkit` before 1.0.3 are vulnerable to a remote denial of service.
## Recommendation
Upgrade to version 1.0.4. | null | 2021-08-04T21:22:45Z | 2019-06-03T17:27:49Z | LOW | null | {'CWE-400'} | {'https://github.com/Twipped/ircdkit/issues/1', 'https://www.npmjs.com/advisories/735', 'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c', 'https://snyk.io/vuln/SNYK-JS-IRCDKIT-173688'} | null | {'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c'} | {'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c'} |
npm | GHSA-86wf-436m-h424 | Resource Exhaustion Denial of Service in http-proxy-agent | A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak i... | {'CVE-2019-10196'} | 2021-03-31T21:09:25Z | 2022-01-06T20:30:13Z | MODERATE | null | {'CWE-665'} | {'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb', 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245', 'https://www.npmjs.com/advisories/607', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10196'} | null | {'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb'} | {'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb'} |
npm | GHSA-2mqv-4j3r-vjvp | Open redirect in @auth0/nextjs-auth0 | ### Overview
Versions `<=1.6.1` do not filter out certain `returnTo` parameter values from the login url, which expose the application to an open redirect vulnerability.
### Am I affected?
You are affected by this vulnerability if you are using `@auth0/nextjs-auth0` version `<=1.6.1`.
### How to fix that?
Upgrade to... | {'CVE-2021-43812'} | 2021-12-16T18:42:05Z | 2021-12-16T18:52:21Z | MODERATE | null | {'CWE-601'} | {'https://github.com/auth0/nextjs-auth0', 'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-2mqv-4j3r-vjvp', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43812'} | null | {'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6'} | {'https://github.com/auth0/nextjs-auth0/commit/0bbd9f8a0c93af51f607f28633b5fb18c5e48ad6'} |
npm | GHSA-7r96-8g3x-g36m | Improper Verification of Cryptographic Signature | ### Impact
The `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature of a SHA-512 hash matching the SHA-512 hash of the message even if the signature is invalid.
### Patches
Upgrade to `v7.0.3` immediately to resolve this issue. Since the vulnerability lies within the verificatio... | null | 2022-01-04T19:36:52Z | 2021-06-28T17:16:56Z | CRITICAL | null | {'CWE-347'} | {'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b', 'https://github.com/TogaTech/tEnvoy', 'https://github.com/TogaTech/tEnvoy/security/advisories/GHSA-7r96-8g3x-g36m'} | null | {'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'} | {'https://github.com/TogaTech/tEnvoy/commit/a121b34a45e289d775c62e58841522891dee686b'} |
npm | GHSA-2hwp-g4g7-mwwj | Reflected Cross-Site Scripting in jquery.terminal | Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization.
## Recommendatio... | null | 2020-08-31T18:35:05Z | 2019-05-29T20:25:35Z | MODERATE | null | {'CWE-79'} | {'https://www.npmjs.com/advisories/769', 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'} | null | {'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'} | {'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'} |
npm | GHSA-c56f-grv3-gpfr | Regular expression denial of service in forms | The package forms before 1.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via email validation. | {'CVE-2021-23388'} | 2021-06-02T19:27:50Z | 2021-06-07T22:10:13Z | MODERATE | null | {'CWE-400'} | {'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0', 'https://github.com/caolan/forms/pull/214', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23388', 'https://snyk.io/vuln/SNYK-JS-FORMS-1296389'} | null | {'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0'} | {'https://github.com/caolan/forms/pull/214/commits/d4bd5b5febfe49c1f585f162e04ec810f8dc47a0'} |
npm | GHSA-jgrh-5m3h-9c5f | Web Cache Poisoning in find-my-way | This affects the package find-my-way before 2.2.5, from 3.0.0 and before 3.0.5. It accepts the Accept-Version' header by default, and if versioned routes are not being used, this could lead to a denial of service. Accept-Version can be used as an unkeyed header in a cache poisoning attack. | {'CVE-2020-7764'} | 2020-11-10T20:19:42Z | 2020-11-09T22:17:13Z | MODERATE | null | {'CWE-444'} | {'https://snyk.io/vuln/SNYK-JS-FINDMYWAY-1038269', 'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac', 'https://www.npmjs.com/package/find-my-way', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7764'} | null | {'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac'} | {'https://github.com/delvedor/find-my-way/commit/ab408354690e6b9cf3c4724befb3b3fa4bb90aac'} |
npm | GHSA-8j36-q8x7-pm6q | OS Command Injection in systeminformation | This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands. | {'CVE-2020-7778'} | 2021-04-13T18:32:29Z | 2022-02-09T23:14:11Z | HIGH | null | {'CWE-78'} | {'https://gist.github.com/EffectRenan/b434438938eed0b21b376cedf5c81e80', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1043753', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://nvd.n... | null | {'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8#diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa#diff-970ae648187190f86bafc8f193b7538200eba164... | {'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8#diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc', 'https://github.com/sebhildebrandt/systeminformation/commit/73dce8d717ca9c3b7b0d0688254b8213b957f0fa#diff-970ae648187190f86bafc8f193b7538200eba164... |
npm | GHSA-j3rh-8vwq-wh84 | Use of Cryptographically Weak Pseudo-Random Number Generator in JHipster Kotlin | JHipster Kotlin is using an insecure source of randomness to generate all of it's random values. JHipster Kotlin relies upon apache commons lang3 `RandomStringUtils`.
From the documentation:
> Caveat: Instances of Random, upon which the implementation of this class relies, are not cryptographically secure.
> \- https... | {'CVE-2019-16303'} | 2021-09-22T18:41:06Z | 2020-06-26T16:48:13Z | CRITICAL | null | {'CWE-338'} | {'https://github.com/jhipster/jhipster-kotlin/issues/183', 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16303', 'https://github.com/jhipster/generator-jhipster/issues/10401', 'https://www.jhipster.tech/2019/09/13/jhipster-release-6.... | null | {'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7'} | {'https://github.com/jhipster/generator-jhipster/commit/88448b85fd3e8e49df103f0061359037c2c68ea7'} |
npm | GHSA-j88m-953w-8r2c | Moderate severity vulnerability that affects rendertron | Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs. | {'CVE-2017-18352'} | 2021-09-14T19:19:42Z | 2019-01-07T19:14:21Z | MODERATE | null | {'CWE-79'} | {'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352', 'https://github.com/advisories/GHSA-j88m-953w-8r2c', 'https://bugs.chromiu... | null | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} |
npm | GHSA-6r7x-hc8m-985r | Cross-site Scripting in Joplin | Joplin through 1.0.184 allows Arbitrary File Read via Cross-site Scripting (XSS). | {'CVE-2020-9038'} | 2022-01-04T19:44:56Z | 2020-10-13T17:29:25Z | MODERATE | null | {'CWE-79'} | {'http://packetstormsecurity.com/files/156582/Joplin-Desktop-1.0.184-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9038', 'https://github.com/laurent22/joplin/compare/clipper-1.0.19...clipper-1.0.20', 'https://github.com/laurent22/joplin', 'https://github.com/laurent22/joplin/commit/3db47b575b9... | null | {'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc'} | {'https://github.com/laurent22/joplin/commit/3db47b575b9cb0a765da3d283baa2c065df0d0bc'} |
npm | GHSA-h4j5-c7cj-74xg | Arbitrary Code Injection | This affects the package xmlhttprequest before 1.7.0; all versions of package xmlhttprequest-ssl. Provided requests are sent synchronously (async=False on xhr.open), malicious user input flowing into xhr.send could result in arbitrary code being injected and run. | {'CVE-2020-28502'} | 2021-05-04T18:02:15Z | 2021-05-04T18:02:34Z | HIGH | null | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1082938', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28502', 'https://snyk.io/vuln/SNYK-JS-XMLHTTPREQUEST-1082935', 'https://github.com/driverdan/node-XMLHttpRequest/blob/1.6.0/lib/XMLHttpRequest.js%23L480', 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc24... | null | {'https://github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291', 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6'} | {'https://github.com/mjwwit/node-XMLHttpRequest/commit/ee1e81fc67729c7c0eba5537ed7fe1e30a6b3291', 'https://github.com/driverdan/node-XMLHttpRequest/commit/983cfc244c7567ad6a59e366e55a8037e0497fe6'} |
npm | GHSA-r87w-47m8-22w3 | Template Injection in jsrender | Affected versions of `jsrender` are susceptible to a remote code execution vulnerability when used with server delivered client-side tempates which dynamically embed user input.
## Proof of Concept
```
<POC-REQUEST>
{{for ~x!=1?(constructor.constructor("return arguments.callee.caller")()):~y(10)}}
{{:#data}}
{{/for}... | {'CVE-2016-3942'} | 2021-09-23T21:26:38Z | 2020-09-01T15:24:24Z | MODERATE | null | {'CWE-94'} | {'https://github.com/BorisMoore/jsrender', 'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3942', 'https://snyk.io/vuln/SNYK-DOTNET-JSRENDER-60173', 'https://www.npmjs.com/advisories/97'} | null | {'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6'} | {'https://github.com/BorisMoore/jsrender/commit/f984e139deb0a7648d5b543860ec652c21f6dcf6'} |
npm | GHSA-84cm-v6jp-gjmr | OS command injection in git-diff-apply | In "index.js" file line 240, the run command executes the git command with a user controlled variable called remoteUrl. This affects git-diff-apply all versions prior to 0.22.2. | {'CVE-2019-10776'} | 2021-08-19T17:14:36Z | 2020-02-14T23:09:24Z | CRITICAL | null | {'CWE-78'} | {'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774,', 'https://snyk.io/vuln/SNYK-JS-GITDIFFAPPLY-540774', 'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10776'} | null | {'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5'} | {'https://github.com/kellyselden/git-diff-apply/commit/106d61d3ae723b4257c2a13e67b95eb40a27e0b5'} |
npm | GHSA-72p5-2r6g-fm6v | Moderate severity vulnerability that affects total.js | Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format). | {'CVE-2019-10260'} | 2021-06-11T14:16:33Z | 2019-04-02T15:46:52Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10260', 'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad', 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d', 'https://github.com/advisories/GHSA-72p5-2r6g-fm6v'} | null | {'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad', 'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d'} | {'https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d', 'https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad'} |
npm | GHSA-x2jc-pwfj-h9p3 | SQL Injection in sequelize | Affected versions of `sequelize` use MySQL's backslash-based escape syntax when connecting to SQLite, despite the fact that SQLite uses PostgreSQL's escape syntax, which can result in a SQL Injection vulnerability.
## Recommendation
Update to version 1.7.0-alpha3 or later. | {'CVE-2016-10554'} | 2020-08-31T18:11:14Z | 2019-02-18T23:54:28Z | MODERATE | null | {'CWE-89'} | {'https://github.com/advisories/GHSA-x2jc-pwfj-h9p3', 'https://nodesecurity.io/advisories/113', 'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d', 'https://www.npmjs.com/advisories/113', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10554'} | null | {'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d'} | {'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d'} |
npm | GHSA-6g33-f262-xjp4 | Cryptographically Weak PRNG in randomatic | Affected versions of `randomatic` generate random values using a cryptographically weak psuedo-random number generator. This may result in predictable values instead of random values as intended.
## Recommendation
Update to version 3.0.0 or later. | {'CVE-2017-16028'} | 2021-01-08T20:58:33Z | 2018-10-09T00:57:21Z | LOW | null | {'CWE-330'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-16028', 'https://github.com/advisories/GHSA-6g33-f262-xjp4', 'https://github.com/tableflip/react-native-meteor-oauth/blob/a7eb738b74c469f5db20296b44b7cae4e2337435/src/meteor-oauth.js#L66', 'https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c1821809072... | null | {'https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c182180907227fe1#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'} | {'https://github.com/jonschlinkert/randomatic/commit/4a526959b3a246ae8e4a82f9c182180907227fe1#diff-b9cfc7f2cdf78a7f4b91a753d10865a2'} |
npm | GHSA-mqgv-67vx-g4m5 | Prototype Pollution in js-data | All versions of package js-data prior to 3.0.10 are vulnerable to Prototype Pollution via the deepFillIn function. | {'CVE-2020-28442'} | 2022-02-09T22:45:52Z | 2022-02-09T22:45:52Z | HIGH | null | {'CWE-1321'} | {'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097', 'https://github.com/js-data/js-data/pull/574', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28442', 'https://snyk.io/vuln/SNYK-JS-JSDATA-1023655'} | null | {'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097'} | {'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097'} |
npm | GHSA-747p-jfqv-f43r | Downloads Resources over HTTP in mystem3 | Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`.... | {'CVE-2016-10626'} | 2021-06-11T14:04:48Z | 2019-02-18T23:47:26Z | HIGH | null | {'CWE-311'} | {'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2', 'https://nodesecurity.io/advisories/229', 'https://github.com/advisories/GHSA-747p-jfqv-f43r', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626', 'https://www.npmjs.com/advisories/229'} | null | {'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'} | {'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'} |
npm | GHSA-f5c9-x9j6-87qp | Prototype pollution in dotty | Prototype pollution vulnerability in 'dotty' before version 0.1.1 allows attackers to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25912'} | 2021-02-03T07:41:22Z | 2021-02-05T20:43:08Z | MODERATE | null | {'CWE-400'} | {'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25912', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25912', 'https://www.npmjs.com/package/dotty'} | null | {'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb'} | {'https://github.com/deoxxa/dotty/commit/cd997d37917186c131be71501a698803f2b7ebdb'} |
npm | GHSA-49wp-qq6x-g2rf | Cross-site Request Forgery in fastify-csrf | The package fastify-csrf before 3.0.0 has a set of issues that affect its ability to do CSRF protection.
1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: `cookieOpts: { path: '/', sameSite: true }`
2. The CSRF token was available in the GET query parameter | {'CVE-2020-28482'} | 2021-01-20T19:49:01Z | 2021-01-20T21:30:34Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28482', 'https://github.com/fastify/fastify-csrf/pull/26', 'https://www.npmjs.com/package/fastify-csrf', 'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253', 'https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044'} | null | {'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'} | {'https://github.com/fastify/fastify-csrf/commit/3c9de36e9e73ce0eda9207f84f2ac0243e1f5253'} |
npm | GHSA-xp63-6vf5-xf3v | Command injection in codecov (npm package) | ### Impact
The `upload` method has a command injection vulnerability. Clients of the `codecov-node` library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
A similar CVE was issued: [CVE-2020-7597](https://github.com/advisories/GHSA-5q88-cjfq-g2mh), but the fix wa... | {'CVE-2020-15123'} | 2021-01-07T23:47:13Z | 2020-07-20T17:20:20Z | MODERATE | null | {'CWE-78'} | {'https://lgtm.com/query/7714424068617023832', 'https://github.com/codecov/codecov-node/pull/180', 'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d', 'https://github.com/advisories/GHSA-5q88-cjfq-g2mh', 'https://github.com/codecov/codecov-node/security/advisories/GHSA-xp63-6vf5-x... | null | {'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d'} | {'https://github.com/codecov/codecov-node/commit/c0711c656686e902af2cd92d6aecc8074de4d83d'} |
npm | GHSA-qhv9-728r-6jqg | ReDoS via long string of semicolons in tough-cookie | Affected versions of `tough-cookie` may be vulnerable to regular expression denial of service when long strings of semicolons exist in the `Set-Cookie` header.
## Recommendation
Update to version 2.3.0 or later. | {'CVE-2016-1000232'} | 2021-09-16T19:58:53Z | 2018-10-10T18:57:02Z | MODERATE | null | {'CWE-20'} | {'https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae', 'https://www.npmjs.com/advisories/130', 'https://access.redhat.com/errata/RHSA-2017:2912', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000232', 'https://access.redhat.com/security/cve/cve-2016-1000232', 'https://github.com/sa... | null | {'https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534', 'https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae'} | {'https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae', 'https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534'} |
npm | GHSA-6q4w-3wp4-q5wf | Denial of Service in get-ip-range | The get-ip-range package before 4.0.0 for Node.js is vulnerable to denial of service (DoS) if the range is untrusted input. An attacker could send a large range (such as 128.0.0.0/1) that causes resource exhaustion. Update get-ip-range dependency to 4.0.0 or above.
| {'CVE-2021-27191'} | 2022-05-03T02:57:48Z | 2021-04-13T15:15:57Z | HIGH | null | {'CWE-400'} | {'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://www.npmjs.com/package/get-ip-range', 'https://advisory.checkmarx.net/advisory/CX-2021-4304', 'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27191'} | null | {'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'} | {'https://github.com/JoeScho/get-ip-range/commit/98ca22b815c77273cbab259811ab0976118e13b6'} |
npm | GHSA-5gwh-g79j-vh4q | Command Injection in pdf-image | Versions of `pdf-image` before 2.0.0 are vulnerable to command injection. This vulnerability is exploitable if the attacker has control over the `pdfFilePath` variable passed into `pdf-image`.
## Recommendation
Update to version 2.0.0 or later. | {'CVE-2018-3757'} | 2021-09-24T20:36:09Z | 2020-09-01T20:44:52Z | CRITICAL | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3757', 'https://hackerone.com/reports/340208', 'https://github.com/roest01/node-pdf-image', 'https://www.npmjs.com/advisories/670', 'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83'} | null | {'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83'} | {'https://github.com/roest01/node-pdf-image/commit/54679496a89738443917608c2bbe2f6e5dd20e83'} |
npm | GHSA-x5rq-j2xg-h7qm | Regular Expression Denial of Service (ReDoS) in lodash | lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11. | {'CVE-2019-1010266'} | 2022-03-09T22:54:28Z | 2019-07-19T16:13:07Z | MODERATE | null | {'CWE-400'} | {'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347', 'https://github.com/lodash/lodash/wiki/Changelog', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266', 'https://github.com/lodash/lodash/issues/3359', 'https://snyk.io/vuln/S... | null | {'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347'} | {'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347'} |
npm | GHSA-qjg4-w4c6-f6c6 | Command injection in mversion | ### Impact
This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input.
### Patches
Patched by version 2.0.0. Previous releases are deprecated in npm.
### Workarounds
Make sure to escape git commit messages when using the commitMessage option for the update... | {'CVE-2020-4059'} | 2021-01-08T21:00:24Z | 2020-06-18T19:23:17Z | HIGH | null | {'CWE-77'} | {'https://github.com/mikaelbr/mversion/security/advisories/GHSA-qjg4-w4c6-f6c6', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4059', 'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338'} | null | {'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338'} | {'https://github.com/mikaelbr/mversion/commit/6c76c9efd27c7ff5a5c6f187e8b7a435c4722338'} |
npm | GHSA-hwj9-h5mp-3pm3 | Regular Expression Denial of Service in postcss | The npm package `postcss` from 7.0.0 and before versions 7.0.36 and 8.2.10 is vulnerable to Regular Expression Denial of Service (ReDoS) during source map parsing. | {'CVE-2021-23368'} | 2021-06-15T15:12:13Z | 2021-05-10T15:29:24Z | MODERATE | null | {'CWE-400'} | {'https://lists.apache.org/thread.html/r49afb49b38748897211b1f89c3a64dc27f9049474322b05715695aab@%3Cdev.myfaces.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244795', 'https://lists.apache.org/thread.html/r00158f5d770d75d0655c5eef1bdbc6150531606c8f8bcb778f0627be@%3Cdev.myfaces.apache.org%3E', 'https://... | null | {'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5', 'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4', 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734'} | {'https://github.com/postcss/postcss/commit/8682b1e4e328432ba692bed52326e84439cec9e4', 'https://github.com/postcss/postcss/commit/b6f3e4d5a8d7504d553267f80384373af3a3dec5', 'https://github.com/postcss/postcss/commit/54cbf3c4847eb0fb1501b9d2337465439e849734'} |
npm | GHSA-85cp-p426-42f5 | Prototype Pollution in deep-get-set | All versions of package deep-get-set prior to version 1.1.1 are vulnerable to Prototype Pollution via the main function. | {'CVE-2020-7715'} | 2021-05-05T18:16:57Z | 2021-05-06T18:12:59Z | HIGH | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7715', 'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4', 'https://snyk.io/vuln/SNYK-JS-DEEPGETSET-598666'} | null | {'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4'} | {'https://github.com/acstll/deep-get-set/commit/a127e65bc77ff5707a6a103819e140d11475c5f4'} |
npm | GHSA-fr76-2wp8-fp92 | Insecure template handling in Express-handlebars | Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewh... | {'CVE-2021-32820'} | 2022-02-10T23:35:21Z | 2022-02-10T23:35:21Z | HIGH | null | {'CWE-200'} | {'https://github.com/express-handlebars/express-handlebars#danger-', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820', 'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72', 'https://securitylab.github.com/advisories/GHSL-2021-018-express-handlebars/', 'https://www.... | null | {'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72'} | {'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72'} |
npm | GHSA-h6q6-9hqw-rwfv | Misinterpretation of malicious XML input | ### Impact
xmldom versions 0.4.0 and older do not correctly preserve [system identifiers](https://www.w3.org/TR/2008/REC-xml-20081126/#d0e4313), [FPIs](https://en.wikipedia.org/wiki/Formal_Public_Identifier) or [namespaces](https://www.w3.org/TR/xml-names11/) when repeatedly parsing and serializing maliciously crafted... | {'CVE-2021-21366'} | 2021-03-12T16:21:24Z | 2021-03-12T22:39:39Z | LOW | null | {'CWE-436', 'CWE-115'} | {'https://www.npmjs.com/package/xmldom', 'https://github.com/xmldom/xmldom/releases/tag/0.5.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21366', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-h6q6-9hqw-rwfv', 'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'} | null | {'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'} | {'https://github.com/xmldom/xmldom/commit/d4201b9dfbf760049f457f9f08a3888d48835135'} |
npm | GHSA-pq37-4c4g-v38c | Cross-site Scripting in vditor | vditor prior to version 3.8.11 is vulnerable to cross-site scripting. | {'CVE-2022-0341'} | 2022-03-23T13:54:04Z | 2022-03-15T00:01:02Z | MODERATE | null | {'CWE-79'} | {'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5', 'https://github.com/vanessa219/vditor', 'https://huntr.dev/bounties/fa546b57-bc15-4705-824e-9474b616f628', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341', 'https://github.com/Vanessa219/vditor/issues/1102'} | null | {'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'} | {'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'} |
npm | GHSA-qf8x-vqjv-92gr | Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter | Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL points to before downloading ... | {'CVE-2022-24901'} | 2022-05-04T18:59:46Z | 2022-05-04T18:59:46Z | HIGH | null | {'CWE-287', 'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24901', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr', 'https://github.com/parse-community/parse-server/', 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'} | null | {'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'} | {'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'} |
npm | GHSA-p6h4-93qp-jhcm | Command injection in Parse Server through prototype pollution | ### Impact
This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and an... | {'CVE-2022-24760'} | 2022-04-19T18:24:25Z | 2022-03-11T23:53:23Z | CRITICAL | null | {'CWE-74', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24760', 'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d', 'https://www.huntr.dev/bounties/ac24b343-e7da-4bc7-ab38-4f4f5cc9d099/', 'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-serv... | null | {'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'} | {'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'} |
npm | GHSA-hpfq-8wx8-cgqw | Cross-Site Scripting in ids-enterprise | Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later | null | 2020-08-31T18:41:56Z | 2019-06-13T18:59:18Z | HIGH | null | {'CWE-79'} | {'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4', 'https://github.com/infor-design/enterprise-ng/issues/511', 'https://www.npmjs.com/advisories/957'} | null | {'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'} | {'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'} |
npm | GHSA-vfrc-7r7c-w9mx | Prototype Pollution in highlight.js | ### Impact
Affected versions of this package are vulnerable to Prototype Pollution. A malicious HTML code block can be crafted that will result in prototype pollution of the base object's prototype during highlighting. If you allow users to insert custom HTML code blocks into your page/app via parsing Markdown code ... | {'CVE-2020-26237'} | 2021-01-08T21:00:09Z | 2020-11-24T22:58:41Z | LOW | null | {'CWE-471'} | {'https://www.npmjs.com/package/highlight.js', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00041.html', 'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-vfrc-7r7c-w9mx', 'https://nvd.nist.gov... | null | {'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'} | {'https://github.com/highlightjs/highlight.js/commit/7241013ae011a585983e176ddc0489a7a52f6bb0'} |
npm | GHSA-hfwx-c7q6-g54c | Vulnerability allowing for reading internal HTTP resources | ### Impact
The vulnerability allows for reading and outputting files served by other services on the internal network in which the export server is hosted. If the export server is exposed to the internet, this potentially allows a malicious user to gain read access to internal web-resources.
The impact is limited to ... | null | 2021-03-12T22:32:16Z | 2021-03-12T23:04:46Z | HIGH | null | {'CWE-552'} | {'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6', 'https://github.com/highcharts/node-export-server/blob/master/CHANGELOG.md#210', 'https://www.npmjs.com/package/highcharts-export-server', 'https://github.com/highcharts/node-export-server/security/advisories/GHSA-hfwx-... | null | {'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'} | {'https://github.com/highcharts/node-export-server/commit/53fa992a96785a5a08390e55ec30ea2ad217dfe6'} |
npm | GHSA-896r-f27r-55mw | json-schema is vulnerable to Prototype Pollution | json-schema is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3918'} | 2021-11-19T20:15:58Z | 2021-11-19T20:16:17Z | MODERATE | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa', 'https://huntr.dev/bounties/bb6ccd63-f505-4e3a-b5... | null | {'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'} | {'https://github.com/kriszyp/json-schema/commit/b62f1da1ff5442f23443d6be6a92d00e65cba93a', 'https://github.com/kriszyp/json-schema/commit/22f146111f541d9737e832823699ad3528ca7741', 'https://github.com/kriszyp/json-schema/commit/f6f6a3b02d667aa4ba2d5d50cc19208c4462abfa'} |
npm | GHSA-w8f3-pvx4-4c3h | Prototype Pollution in arr-flatten-unflatten | All versions of package arr-flatten-unflatten up to and including version 1.1.4 are vulnerable to Prototype Pollution via the constructor. | {'CVE-2020-7713'} | 2021-05-05T19:00:34Z | 2021-05-06T18:11:39Z | CRITICAL | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7713', 'https://github.com/Quernest/arr-flatten-unflatten/pull/8', 'https://snyk.io/vuln/SNYK-JS-ARRFLATTENUNFLATTEN-598396', 'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'} | null | {'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'} | {'https://github.com/Quernest/arr-flatten-unflatten/commit/cb4351c75f87a4fbec3b6140c40ee2993f574372'} |
npm | GHSA-j383-35pm-c5h4 | Path Traversal in Grunt | Grunt prior to version 1.5.2 is vulnerable to path traversal. | {'CVE-2022-0436'} | 2022-04-26T21:51:41Z | 2022-04-13T00:00:16Z | MODERATE | null | {'CWE-22'} | {'https://github.com/gruntjs/grunt/pull/1743', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://github.com/gruntjs/grunt', 'https://huntr.dev/... | null | {'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665', 'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c'} | {'https://github.com/gruntjs/grunt/commit/b0ec6e12426fc8d5720dee1702f6a67455c5986c', 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'} |
npm | GHSA-743r-5g92-5vgf | Improper certificate management in AWS IoT Device SDK v2 | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stor... | {'CVE-2021-40829'} | 2022-03-03T05:13:12.773300Z | 2021-11-24T21:11:16Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-p... | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'} |
npm | GHSA-pc58-wgmc-hfjr | Prototype Pollution in mout | This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, lead... | {'CVE-2020-7792'} | 2022-02-09T22:49:10Z | 2022-02-09T22:49:10Z | HIGH | null | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-MOUT-1014544', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792', 'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'} | null | {'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'} | {'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'} |
npm | GHSA-rqff-837h-mm52 | Authorization bypass in url-parse | Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6. | {'CVE-2022-0512'} | 2022-02-24T14:00:06Z | 2022-02-15T00:02:46Z | MODERATE | null | {'CWE-639'} | {'https://github.com/unshiftio/url-parse', 'https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512', 'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'} | null | {'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'} | {'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'} |
npm | GHSA-h6pr-c536-6rjg | Prototype Pollution in object-path-set | The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908 | {'CVE-2021-23507'} | 2022-02-11T16:16:47Z | 2022-02-05T00:00:31Z | HIGH | null | {'CWE-1321'} | {'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576', 'https://github.com/skratchdot/object-path-set/', 'https://nvd.nist.gov/vuln/deta... | null | {'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'} | {'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'} |
npm | GHSA-vpq5-4rc8-c222 | Denial of Service in canvas | Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process.
## Recommendation
Upgrade to version 1.6.10 | null | 2020-08-31T18:36:22Z | 2019-06-05T14:10:45Z | MODERATE | null | null | {'https://hackerone.com/reports/315037', 'https://www.npmjs.com/advisories/804', 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} | null | {'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} | {'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'} |
npm | GHSA-4q97-fh3f-j294 | Prototype Pollution in tiny-conf | All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function. | {'CVE-2020-7724'} | 2021-05-07T21:50:46Z | 2021-05-10T15:59:24Z | CRITICAL | null | {'CWE-1321'} | {'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7724', 'https://snyk.io/vuln/SNYK-JS-TINYCONF-598792'} | null | {'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'} | {'https://github.com/tiny-conf/tiny-conf/commit/1f7be78bc68927996647cd45b4367f8975a3ea05'} |
npm | GHSA-3c6g-pvg8-gqw2 | Command injection in json | This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function. | {'CVE-2020-7712'} | 2022-02-08T22:04:50Z | 2021-05-06T18:11:21Z | HIGH | null | {'CWE-78'} | {'https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59... | null | {'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'} | {'https://github.com/trentm/json/commit/cc4798169f9e0f181f8aa61905b88479badcd483'} |
npm | GHSA-6fw4-hr69-g3rv | Prototype Pollution in property-expr | The package property-expr before 2.0.3 are vulnerable to Prototype Pollution via the setter function. | {'CVE-2020-7707'} | 2021-07-29T22:00:50Z | 2021-05-06T17:29:47Z | CRITICAL | null | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7707', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-598857', 'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7', 'https://snyk.io/vuln/SNYK-JS-PROPERTYEXPR-598800'} | null | {'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'} | {'https://github.com/jquense/expr/commit/df846910915d59f711ce63c1f817815bceab5ff7'} |
npm | GHSA-48ww-j4fc-435p | Command injection in nodemailer | This affects the package nodemailer before 6.4.16. Use of crafted recipient email addresses may result in arbitrary command flag injection in sendmail transport for sending mails. | {'CVE-2020-7769'} | 2021-04-19T22:42:19Z | 2021-05-10T19:16:52Z | CRITICAL | null | {'CWE-88'} | {'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27ebd0/lib/sendmail-transport/index.js%23L75', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1038834', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1039742', 'https://github.com/nodemailer/nodemailer/blob/33b62e2ea6bc9215c99a9bb4bfba94e2fb27e... | null | {'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'} | {'https://github.com/nodemailer/nodemailer/commit/ba31c64c910d884579875c52d57ac45acc47aa54'} |
npm | GHSA-jr3j-whm4-9wwm | Reflected XSS when using flashMessages or languageDictionary | ### Overview
Versions before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's
- `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage`.
- `languageDictionary` feature is utilized and user i... | {'CVE-2021-32641'} | 2021-06-07T18:54:43Z | 2021-06-04T19:10:34Z | HIGH | null | {'CWE-79'} | {'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32641', 'https://github.com/auth0/lock/security/advisories/GHSA-jr3j-whm4-9wwm', 'https://github.com/auth0/lock/releases/tag/v11.30.1'} | null | {'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'} | {'https://github.com/auth0/lock/commit/d139cf01c8234b07caf265e051f39d3eab08f7ed'} |
npm | GHSA-vrw4-w73r-6mm8 | TimelockController vulnerability in OpenZeppelin Contracts | ### Impact
A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to us... | {'CVE-2021-39168'} | 2021-09-13T20:30:25Z | 2021-08-30T16:12:49Z | CRITICAL | null | {'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39168', 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeabl', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431', 'https... | null | {'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'} | {'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5'} |
npm | GHSA-28xr-mwxg-3qc8 | Command injection in simple-git | `simple-git` (maintained as [git-js](https://github.com/steveukx/git-js) named repository on GitHub) is a light weight interface for running git commands in any node.js application.The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.... | {'CVE-2022-24066'} | 2022-05-03T22:29:53Z | 2022-04-02T00:00:13Z | HIGH | null | {'CWE-74', 'CWE-77'} | {'https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306', 'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2434820', 'https://github.com/steveukx/git-js', 'https://gist.github.com/lirantal/a930d902294b833514e821102316426b', 'https://nvd.nist.go... | null | {'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5'} | {'https://github.com/steveukx/git-js/commit/2040de601c894363050fef9f28af367b169a56c5'} |
npm | GHSA-63m4-fhf2-cmf7 | Command Execution in windows-cpu | Version of `windows-cpu` before 0.1.5 will execute arbitrary code passed into the first argument of the `findLoad` method, resulting in remote code execution.
## Proof of Concept
```
var win = require('windows-cpu');
wind.findLoad('foo & calc.exe');
```
## Recommendation
Update to version 0.1.5 or later. | {'CVE-2017-1000219'} | 2021-09-23T21:42:01Z | 2020-09-01T16:43:55Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/KyleRoss/windows-cpu', 'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117', 'https://nodesecurity.io/advisories/336', 'https://www.npmjs.com/advisories/336', 'https://github.com/KyleRoss/windows-cpu/blob/master/index.js#L81', 'https://nvd.nist.gov/vuln/detail/C... | null | {'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'} | {'https://github.com/KyleRoss/windows-cpu/commit/b75e19aa2f7459a9506bceb577ba2341fe273117'} |
npm | GHSA-mv26-cx23-vrfg | Server-Side Request Forgery in @peertube/embed-api | @peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery. | {'CVE-2022-0508'} | 2022-02-09T22:27:07Z | 2022-02-09T00:00:31Z | MODERATE | null | {'CWE-918'} | {'https://huntr.dev/bounties/c3724574-b6c9-430b-849b-40dd2b20f23c', 'https://github.com/chocobozzz/peertube', 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508'} | null | {'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'} | {'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'} |
npm | GHSA-8f89-2fwj-5v5r | Improper Input Validation in klona | Flaw in input validation in npm package klona version 1.1.0 and earlier may allow prototype pollution attack that may result in remote code execution or denial of service of applications using klona. | {'CVE-2020-8125'} | 2021-03-30T16:22:33Z | 2021-04-13T15:41:24Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8125', 'https://hackerone.com/reports/778414', 'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'} | null | {'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'} | {'https://github.com/lukeed/klona/commit/200e8d1fd383a54790ee6fc8228264c21954e38e'} |
npm | GHSA-9wcg-jrwf-8gg7 | Prototype Pollution in express-fileupload | This affects the package express-fileupload before 1.1.8. If the parseNested option is enabled, sending a corrupt HTTP request can lead to denial of service or arbitrary code execution. | {'CVE-2020-7699'} | 2022-05-04T02:19:36Z | 2020-08-05T14:53:16Z | CRITICAL | null | {'CWE-915'} | {'https://github.com/richardgirges/express-fileupload/pull/237', 'https://security.netapp.com/advisory/ntap-20200821-0003/', 'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f', 'https://github.com/richardgirges/express-fileupload/issues/236', 'https://snyk.io/vuln/SNYK... | null | {'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'} | {'https://github.com/richardgirges/express-fileupload/commit/db495357d7557ceb5c034de91a7a574bd12f9b9f'} |
npm | GHSA-cwfw-4gq5-mrqx | Regular Expression Denial of Service (ReDoS) in braces | A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. | {'CVE-2018-1109'} | 2021-03-31T21:35:00Z | 2022-01-06T20:42:03Z | LOW | null | {'CWE-400'} | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451', 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272', 'https://snyk.io/vuln/npm:braces:20180219', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109'} | null | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'} | {'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'} |
npm | GHSA-w7q7-vjp8-7jv4 | SQL Injection in typeorm | Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 0.1.15 | null | 2020-08-31T18:36:13Z | 2019-06-06T15:30:16Z | HIGH | null | {'CWE-89'} | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/800', 'https://hackerone.com/reports/319458'} | null | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'} | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'} |
npm | GHSA-8v67-x8q5-3x3g | Cross-Site Scripting in simditor | Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 2.3.22 or later. | {'CVE-2018-19048'} | 2021-08-04T14:53:05Z | 2019-05-14T04:01:27Z | MODERATE | null | {'CWE-79'} | {'https://www.npmjs.com/advisories/884', 'https://github.com/hkglue/simditor_demo.git', 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048', 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22', 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638', 'h... | null | {'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'} | {'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'} |
npm | GHSA-hqhp-5p83-hx96 | Regular Expression Denial of Service in prismjs | Prism is a lightweight, robust, and elegant syntax highlighting library. The prismjs package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted HTML comment as input may cause an application to consume an excessive amount of CPU. | {'CVE-2021-3801'} | 2022-05-04T03:23:16Z | 2021-09-20T20:44:48Z | MODERATE | null | {'CWE-400'} | {'https://huntr.dev/bounties/8c16ab31-6eb6-46d1-b9a4-387222fe1b8a', 'https://github.com/prismjs/prism', 'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3801'} | null | {'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9'} | {'https://github.com/prismjs/prism/commit/0ff371bb4775a131634f47d0fe85794c547232f9'} |
npm | GHSA-67mm-m3wx-j7fr | Command injection in gitlog | The gitlog function in src/index.ts in gitlog before 4.0.4 has a command injection vulnerability. | {'CVE-2021-26541'} | 2022-04-27T19:13:33Z | 2021-04-13T15:15:29Z | CRITICAL | null | {'CWE-77'} | {'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4', 'https://www.npmjs.com/package/gitlog', 'https://github.com/domharrington/node-gitlog/pull/65', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26541', 'https://advisory.checkmarx.net/advisory/CX-2020-4301', 'https://gi... | null | {'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4'} | {'https://github.com/domharrington/node-gitlog/pull/65/commits/bb22ffb2c907e0284f887ab625e12b88c31f4bf4'} |
npm | GHSA-cgjv-rghq-qhgp | Path Traversal in algo-httpserv | Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to version 1.1.2 or later. | null | 2021-08-17T22:22:48Z | 2019-09-11T23:00:57Z | HIGH | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741', 'https://www.npmjs.com/advisories/889', 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'} | null | {'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'} | {'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'} |
npm | GHSA-vfvf-mqq8-rwqc | Sanitization bypass using HTML Entities in marked | Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured.
## Proof of Concept
This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and inc... | {'CVE-2016-10531'} | 2020-08-31T18:10:54Z | 2019-02-18T23:58:20Z | HIGH | null | {'CWE-79'} | {'https://nodesecurity.io/advisories/101', 'https://github.com/chjj/marked/pull/592', 'https://www.npmjs.com/advisories/101', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10531', 'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523', 'https://github.com/advisories/GHSA-vfvf-mqq8-rwqc'... | null | {'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523'} | {'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523'} |
npm | GHSA-9mx2-prfp-8hqp | Prototype Pollution in simpl-schema | This affects the package simpl-schema before 1.10.2. Attacker controlled input into a schema could result in remote code execution within the scope of the surrounding application. | {'CVE-2020-7742'} | 2021-04-21T20:37:29Z | 2021-05-10T18:38:47Z | HIGH | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7742', 'https://github.com/longshotlabs/simpl-schema/releases/tag/1.10.2', 'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d', 'https://snyk.io/vuln/SNYK-JS-SIMPLSCHEMA-1016157'} | null | {'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d'} | {'https://github.com/longshotlabs/simpl-schema/commit/50128841fa7fc2d137c36a397054279144caea3d'} |
npm | GHSA-5q88-cjfq-g2mh | codecov NPM module allows remote attackers to execute arbitrary commands | codecov-node npm module before 3.6.5 allows remote attackers to execute arbitrary commands.The value provided as part of the gcov-root argument is executed by the exec function within lib/codecov.js. This vulnerability exists due to an incomplete fix of CVE-2020-7596. | {'CVE-2020-7597'} | 2021-08-19T17:22:07Z | 2020-02-19T17:29:39Z | HIGH | null | {'CWE-78'} | {'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f', 'https://snyk.io/vuln/SNYK-JS-CODECOV-548879', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7597'} | null | {'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'} | {'https://github.com/codecov/codecov-node/commit/02cf13d8b93ac547b5b4c2cfe186b7d874fd234f'} |
npm | GHSA-g753-jx37-7xwh | ECDSA signature vulnerability of Minerva timing attack in jsrsasign | ### Impact
ECDSA side-channel attack named [Minerava](https://minerva.crocs.fi.muni.cz/) have been found and it was found that it affects to jsrsasign.
Execution time of thousands signature generation have been observed then EC private key which is scalar value may be recovered since point and scalar multiplication ti... | null | 2021-09-22T18:43:42Z | 2020-06-30T16:05:08Z | MODERATE | null | {'CWE-362'} | {'https://github.com/kjur/jsrsasign/security/advisories/GHSA-g753-jx37-7xwh', 'https://www.npmjs.com/advisories/1505', 'https://snyk.io/vuln/SNYK-JS-JSRSASIGN-561755', 'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73', 'https://github.com/kjur/jsrsasign/issues/411', 'https://github.com... | null | {'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73'} | {'https://github.com/kjur/jsrsasign/commit/9dcb89c57408a3d4b5b66aa9138426bd92819e73'} |
npm | GHSA-2m8v-572m-ff2v | Command Injection Vulnerability | ### Impact
command injection vulnerability
### Patches
Problem was fixed with a parameter check. Please upgrade to version >= 5.3.1
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do onl... | {'CVE-2021-21315'} | 2021-02-16T16:50:49Z | 2021-02-16T16:51:04Z | MODERATE | null | {'CWE-78'} | {'https://security.netapp.com/advisory/ntap-20210312-0007/', 'https://www.npmjs.com/package/systeminformation', 'https://lists.apache.org/thread.html/r8afea9a83ed568f2647cccc6d8d06126f9815715ddf9a4d479b26b05@%3Cissues.cordova.apache.org%3E', 'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f962... | null | {'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525'} | {'https://github.com/sebhildebrandt/systeminformation/commit/07daa05fb06f24f96297abaa30c2ace8bfd8b525'} |
npm | GHSA-9j9m-8wjc-ff96 | Insufficient Session Expiration in apostrophe | Apostrophe CMS versions between 2.63.0 to 3.3.1 affected by an insufficient session expiration vulnerability, which allows unauthenticated remote attackers to hijack recently logged-in users' sessions. | {'CVE-2021-25979'} | 2021-11-19T13:29:28Z | 2021-11-10T17:02:44Z | CRITICAL | null | {'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25979', 'https://github.com/apostrophecms/apostrophe', 'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c'} | null | {'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c'} | {'https://github.com/apostrophecms/apostrophe/commit/c211b211f9f4303a77a307cf41aac9b4ef8d2c7c'} |
npm | GHSA-hfmf-q43v-2ffj | Improper Key Verification in openpgp | Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is ... | {'CVE-2019-9154'} | 2021-08-17T22:08:26Z | 2019-08-23T21:42:18Z | HIGH | null | {'CWE-347'} | {'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/pull/797', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://nvd.nist.gov/vuln/d... | null | {'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1'} | {'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1'} |
npm | GHSA-3j7m-hmh3-9jmp | Cross-Site Scripting in sanitize-html | Affected versions of `sanitize-html` do not sanitize input recursively, which may allow an attacker to execute arbitrary Javascript.
## Recommendation
Update to version 1.4.3 or later. | {'CVE-2016-1000237'} | 2021-08-23T15:18:04Z | 2020-04-16T03:14:47Z | MODERATE | null | {'CWE-79'} | {'https://www.npmjs.com/advisories/135', 'https://github.com/apostrophecms/sanitize-html/issues/29', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000237', 'https://nodesecurity.io/advisories/135', 'https://github.com/punkave/sanitize-html/issues/29', 'https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/m... | null | {'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf'} | {'https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf'} |
npm | GHSA-29mw-wpgm-hmr9 | Regular Expression Denial of Service (ReDoS) in lodash | All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. Steps to reproduce (provided by reporter Liyuan Chen): var lo = require('lodash'); function build_blank (n) { var ret = "1" for (var i = 0; i < n; i++) { ret += " ... | {'CVE-2020-28500'} | 2022-02-08T21:35:28Z | 2022-01-06T20:30:46Z | MODERATE | null | {'CWE-400'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074892', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash', 'https://snyk.io/vuln/SNYK-JS-LODASH-1018905', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074893', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'htt... | null | {'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7'} | {'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7'} |
npm | GHSA-25mp-g6fv-mqxx | Unexpected server crash in Next.js. | Next.js is a React framework. In versions of Next.js prior to 12.0.5 or 11.1.3, invalid or malformed URLs could lead to a server crash. In order to be affected by this issue, the deployment must use Next.js versions above 11.1.0 and below 12.0.5, Node.js above 15.0.0, and next start or a custom server. Deployments on V... | {'CVE-2021-43803'} | 2022-04-07T16:06:54Z | 2021-12-07T21:12:09Z | HIGH | null | {'CWE-20'} | {'https://github.com/vercel/next.js/security/advisories/GHSA-25mp-g6fv-mqxx', 'https://github.com/vercel/next.js/releases/v12.0.5', 'https://github.com/vercel/next.js', 'https://github.com/vercel/next.js/releases/tag/v11.1.3', 'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264', 'https:/... | null | {'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264'} | {'https://github.com/vercel/next.js/commit/6d98b4fb4315dec1badecf0e9bdc212a4272b264'} |
npm | GHSA-xmc8-cjfr-phx3 | Regular Expression Denial of Service in highcharts | Versions of `highcharts` prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service.
## Recommendation
Upgrade to version 6.1.0 or... | {'CVE-2018-20801'} | 2021-09-21T22:36:57Z | 2019-03-18T15:59:32Z | HIGH | null | {'CWE-185'} | {'https://github.com/advisories/GHSA-xmc8-cjfr-phx3', 'https://security.netapp.com/advisory/ntap-20190715-0001/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20801', 'https://github.com/highcharts/highcharts', 'https://snyk.io/vuln/npm:highcharts:20180225', 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e43... | null | {'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa'} | {'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa'} |
npm | GHSA-68gr-cmcp-g3mj | Directory Traversal in lactate | A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read.
Mitigati... | null | 2021-08-16T23:34:10Z | 2019-06-14T16:39:31Z | HIGH | null | {'CWE-22'} | {'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5', 'https://www.npmjs.com/advisories/560', 'https://snyk.io/vuln/npm:lactate:20180123', 'https://hackerone.com/reports/296645'} | null | {'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5'} | {'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5'} |
npm | GHSA-2cf2-2383-h4jv | Improperly Controlled Modification of Dynamically-Determined Object Attributes in querymen | querymen prior to 2.1.4 allows modification of object properties. The parameters of exported function handler(type, name, fn) can be controlled by users without any sanitization. This could be abused for Prototype Pollution attacks. | {'CVE-2020-7600'} | 2021-07-28T18:46:07Z | 2021-05-07T16:16:43Z | MODERATE | null | {'CWE-915'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7600', 'https://snyk.io/vuln/SNYK-JS-QUERYMEN-559867', 'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef'} | null | {'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef'} | {'https://github.com/diegohaz/querymen/commit/1987fefcb3b7508253a29502a008d5063a873cef'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.