ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
npm | GHSA-xfhp-gmh8-r8v2 | Regular Expression Denial of Service (ReDoS) | The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity. | {'CVE-2021-23354'} | 2021-03-25T00:17:59Z | 2021-03-19T21:22:10Z | HIGH | null | {'CWE-400'} | {'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68', 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354', 'https://github.com/adaltas/node-printf/pull/32', 'https://github.com/adaltas/node-printf/issues/31'} | null | {'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'} | {'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'} |
npm | GHSA-x9r5-jxvq-4387 | Self XSS on user input in jquery.terminal | ### Impact
This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees.
Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because th... | {'CVE-2021-43862'} | 2022-01-06T19:18:42Z | 2022-01-06T22:48:56Z | LOW | null | {'CWE-80'} | {'https://github.com/jcubic/jquery.terminal/', 'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862', 'https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1', 'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a91... | null | {'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5'} | {'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5'} |
npm | GHSA-rv49-54qp-fw42 | Path Traversal in servey | Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths.
## Recommendation
Upgrade to the latest version | null | 2020-08-31T18:36:18Z | 2019-06-06T15:30:20Z | MODERATE | null | {'CWE-22'} | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/802', 'https://hackerone.com/reports/355501'} | null | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'} | {'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'} |
npm | GHSA-qw93-45r3-p66p | Prototype Pollution in merge-options | All versions of `merge-options` are vulnerable to Prototype Pollution
## Recommendation
Update to version 1.0.1 or greater. | {'CVE-2018-3752'} | 2021-09-16T21:10:31Z | 2018-10-09T00:19:57Z | CRITICAL | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3752', 'https://www.npmjs.com/advisories/717', 'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4', 'https://github.com/advisories/GHSA-qw93-45r3-p66p', 'https://github.com/schnittstabil/merge-options', 'https://hackerone.com/repor... | null | {'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4'} | {'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4'} |
npm | GHSA-9q5w-79cv-947m | Unsafe defaults in `remark-html` | ### Impact
The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks.
### Patches
The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is n... | {'CVE-2021-39199'} | 2021-09-07T19:05:40Z | 2021-09-07T23:10:56Z | CRITICAL | null | {'CWE-79'} | {'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199', 'https://www.npmjs.com/package/remark-html', 'https://github.com/remarkjs/remark-html', 'https://github.com/remarkjs/remark-html/releases/tag/14.0.1', 'https://github.com/remarkjs/remar... | null | {'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1'} | {'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1'} |
npm | GHSA-wjr4-2jgw-hmv8 | Command Injection in whereis | Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`.
## Recommendation
Update to version 0.4.1 or later. | {'CVE-2018-3772'} | 2020-08-31T18:29:33Z | 2018-07-31T18:28:53Z | HIGH | null | {'CWE-77'} | {'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8', 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b', 'https://hackerone.com/reports/319476', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3772', 'https://www.npmjs.com/advisories/604'} | null | {'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'} | {'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'} |
npm | GHSA-x5m8-2r8v-8f97 | Prototype Pollution in libnested | The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930) | {'CVE-2022-25352'} | 2022-03-29T22:05:38Z | 2022-03-18T00:01:11Z | CRITICAL | null | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117', 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1', 'https://github.com/dominictarr/libnested', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25352', 'https://github.com/dominictarr/libnested/blob/master/index.js%23L22'} | null | {'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1'} | {'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1'} |
npm | GHSA-33f9-j839-rf8h | Prototype Pollution in immer | This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if ... | {'CVE-2021-23436'} | 2021-09-13T20:27:52Z | 2021-09-02T17:17:37Z | CRITICAL | null | {'CWE-843', 'CWE-1321'} | {'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237', 'https://snyk.io/vuln/SNYK-JS-IMMER-1540542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266', 'https://github.com/immerjs/immer'} | null | {'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'} | {'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'} |
npm | GHSA-pgh6-m65r-2rhq | DOS and Open Redirect with user input | ### Impact
A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`.
A DOS vulnerability is possible if the URL contains invalid characte... | {'CVE-2021-22964'} | 2021-10-21T14:57:14Z | 2021-10-12T16:04:17Z | HIGH | null | {'CWE-248', 'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22964', 'https://hackerone.com/reports/1361804', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq', 'https://github.com/fastify/fastify-static', 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'} | null | {'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'} | {'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'} |
npm | GHSA-qh7x-j4v8-qw5w | Clipboard-based XSS | ### Impact
XSS against the user.
### Details
jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS.
### References
The Curious Case o... | {'CVE-2021-41086'} | 2021-10-21T14:19:54Z | 2021-09-22T20:39:26Z | HIGH | null | {'CWE-79'} | {'https://www.npmjs.com/package/jsuites', 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w', 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086', 'https://github.com/jsuites/jsuites/', 'https://github.com/jsui... | null | {'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2'} | {'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2'} |
npm | GHSA-v9w2-v7j9-rjpr | Remote code execution in Eclipse Theia | In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file. | {'CVE-2021-34435'} | 2021-09-13T20:27:30Z | 2021-09-02T22:02:36Z | HIGH | null | {'CWE-942', 'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-34435', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018', 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5', 'https://github.com/eclipse-theia/theia', 'https://github.com/eclipse-theia/theia/pull/8759'} | null | {'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'} | {'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'} |
npm | GHSA-9xr8-8hmc-389f | Cross-Site Scripting in vant | Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
Upgrade to version 2.1.8 or later. | null | 2021-08-18T22:47:15Z | 2019-11-22T13:45:33Z | HIGH | null | {'CWE-79'} | {'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a', 'https://github.com/youzan/vant/issues/4270', 'https://snyk.io/vuln/SNYK-JS-VANT-460461', 'https://www.npmjs.com/advisories/1157'} | null | {'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'} | {'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'} |
npm | GHSA-5rqg-jm4f-cqx7 | Infinite loop causing Denial of Service in colors | colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomi... | null | 2022-01-10T19:56:36Z | 2022-01-10T17:29:53Z | HIGH | null | {'CWE-835'} | {'https://github.com/Marak/colors.js', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd', 'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26'} | null | {'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'} | {'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'} |
npm | GHSA-mmqv-m45h-q2hp | Sandbox Breakout / Arbitrary Code Execution in localeval | All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload
```
constructor.constructor("return proces... | null | 2022-03-14T23:59:01Z | 2020-09-04T15:22:40Z | CRITICAL | null | null | {'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/issues/9', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335', 'https://github.com/espadrine/localeval'} | null | {'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335', 'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c'} | {'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335'} |
npm | GHSA-37q6-576q-vgr7 | Missing Origin Validation in parcel-bundler | Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated.
## Recommendation
Up... | {'CVE-2018-14731'} | 2021-08-31T20:51:48Z | 2018-10-30T20:36:53Z | HIGH | null | {'CWE-200'} | {'https://github.com/parcel-bundler/parcel/issues/1783', 'https://github.com/parcel-bundler/parcel/pull/1794', 'https://github.com/parcel-bundler/parcel', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://www.npmjs.com/advisories/721', 'https://blog.cal1.cn/post/Sniffing%... | null | {'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'} | {'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'} |
npm | GHSA-gg96-f8wr-p89f | Script injection | ### Impact
A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page.
The ability to upload malicious content may be limited by internal c... | {'CVE-2021-32661'} | 2021-06-04T19:22:48Z | 2021-06-04T19:09:26Z | MODERATE | null | {'CWE-77', 'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32661', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'} | null | {'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'} | {'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'} |
npm | GHSA-2m39-62fm-q8r3 | Regular Expression Denial of Service in sshpk | Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
## Recommendation
Update to version 1.13.2, 1.14.1 or later. | {'CVE-2018-3737'} | 2020-08-31T18:29:38Z | 2018-08-15T13:22:23Z | HIGH | null | {'CWE-770'} | {'https://www.npmjs.com/advisories/606', 'https://github.com/advisories/GHSA-2m39-62fm-q8r3', 'https://hackerone.com/reports/319593', 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737', 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1b... | null | {'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'} | {'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'} |
npm | GHSA-cr6m-62pq-hmqh | OS Command injection in npm-lockfile | npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5. | {'CVE-2022-0841'} | 2022-04-04T21:37:38Z | 2022-03-04T00:00:18Z | CRITICAL | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0841', 'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8', 'https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1', 'https://github.com/ljharb/npm-lockfile'} | null | {'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8'} | {'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8'} |
npm | GHSA-5f38-9jw2-6r6h | Cross-site Scripting in teddy | Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string). | {'CVE-2021-23447'} | 2022-05-04T03:42:48Z | 2021-10-12T16:22:04Z | MODERATE | null | {'CWE-79', 'CWE-843'} | {'https://github.com/rooseveltframework/teddy', 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0', 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9', 'https://github.com/rooseveltframework/teddy/pull/518', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447', 'htt... | null | {'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'} | {'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'} |
npm | GHSA-4q69-q4q7-x82c | High severity vulnerability that affects rendertron | Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application. | {'CVE-2017-18353'} | 2021-09-01T17:52:46Z | 2019-01-04T17:41:46Z | HIGH | null | null | {'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://github.com/advisories/GHSA-4q69-q4q7-x82c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353', 'https://bugs.chromiu... | null | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} |
npm | GHSA-qx4v-6gc5-f2vv | Regular Expression Denial of Service | A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop. | null | 2021-02-25T17:20:28Z | 2019-06-20T14:32:56Z | MODERATE | null | {'CWE-400'} | {'https://github.com/standard-things/esm/issues/694', 'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'} | null | {'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'} | {'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'} |
npm | GHSA-pgf8-28gg-vpr6 | Path traversal | ### Impact
A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API.
This vulnerability is mitigated by the fact that an attacker ... | {'CVE-2021-32662'} | 2021-06-07T18:55:30Z | 2021-06-04T19:09:20Z | MODERATE | null | {'CWE-22'} | {'https://github.com/backstage/backstage/releases/tag/release-2021-05-27', 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208', 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32662'} | null | {'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'} | {'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'} |
npm | GHSA-46hv-7769-j7rx | Unauthorized File Access in harp | Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file.
## Recommendation
Upgrade to version `0.40.2` or... | {'CVE-2019-5437'} | 2021-06-03T17:09:41Z | 2019-06-13T16:12:22Z | MODERATE | null | {'CWE-548'} | {'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210', 'https://www.npmjs.com/advisories/807', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437', 'https://hackerone.com/reports/453820'} | null | {'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210'} | {'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210'} |
npm | GHSA-w457-6q6x-cgp9 | Prototype Pollution in handlebars | Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads.
## Recommendation
Upgrade to version ... | {'CVE-2019-19919'} | 2021-07-26T21:51:06Z | 2019-12-26T17:58:13Z | CRITICAL | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-19919', 'https://github.com/wycats/handlebars.js/issues/1558', 'https://www.npmjs.com/advisories/1164', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919', 'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'} | null | {'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'} | {'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'} |
npm | GHSA-6jmr-jfh7-xg3h | False-positive validity for NFT1 genesis transactions | ### Impact
In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group to... | {'CVE-2020-15131'} | 2021-01-08T21:00:17Z | 2020-07-30T14:58:53Z | CRITICAL | null | {'CWE-697'} | {'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'} | null | {'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'} | {'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'} |
npm | GHSA-j59f-6m4q-62h6 | Improper Key Verification in ipns | Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid.
## Recommendation
Update to version 0.1.3 or later. | null | 2021-08-04T21:17:50Z | 2019-05-30T17:28:48Z | HIGH | null | {'CWE-287'} | {'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0', 'https://www.npmjs.com/advisories/693'} | null | {'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'} | {'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'} |
npm | GHSA-55r9-7mf8-m382 | Cross-site Scripting in edge.js | Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used. | {'CVE-2021-23443'} | 2022-05-04T03:38:31Z | 2021-09-22T20:36:46Z | MODERATE | null | {'CWE-79', 'CWE-843'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23443', 'https://github.com/edge-js/edge', 'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556', 'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'} | null | {'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'} | {'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'} |
npm | GHSA-f2c5-997w-7f5c | Cross-site Scripting in peertube | peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and w... | {'CVE-2021-3780'} | 2021-09-24T13:07:20Z | 2021-09-20T20:42:41Z | MODERATE | null | {'CWE-79'} | {'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6', 'https://github.com/chocobozzz/peertube', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780', 'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65'} | null | {'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6'} | {'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6'} |
npm | GHSA-4gp3-p7ph-x2jr | OS Command Injection in devcert-sanscache | devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization. | {'CVE-2019-10778'} | 2021-08-23T15:12:51Z | 2020-04-14T23:09:00Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8', 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778'} | null | {'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8'} | {'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8'} |
npm | GHSA-3mpr-hq3p-49h9 | Prototype Pollution in mixin-deep | Versions of `mixin-deep` before 1.3.1 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 1.3.1 or later. | {'CVE-2018-3719'} | 2020-08-31T18:28:31Z | 2018-07-26T15:10:54Z | LOW | null | {'CWE-471'} | {'https://hackerone.com/reports/311236', 'https://www.npmjs.com/advisories/578', 'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c', 'https://github.com/advisories/GHSA-3mpr-hq3p-49h9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3719'} | null | {'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c'} | {'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c'} |
npm | GHSA-83rx-c8cr-6j8q | Insecure Default Configuration in tesseract.js | Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations.
## Recommendation
Upgrade to version 1.0.19 or later. | null | 2021-08-04T21:33:58Z | 2019-06-05T20:48:55Z | MODERATE | null | {'CWE-829'} | {'https://github.com/naptha/tesseract.js/pull/267', 'https://www.npmjs.com/advisories/792', 'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28', 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085'} | null | {'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28'} | {'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28'} |
npm | GHSA-c27r-x354-4m68 | HMAC-SHA1 signatures can bypass validation via key confusion | ### Impact
An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation.
### Patches
Version 2.0.0 has the fix.
### Workarounds
The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xml... | null | 2020-10-27T20:35:52Z | 2020-10-27T20:39:46Z | HIGH | null | {'CWE-287'} | {'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100', 'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68', 'https://www.npmjs.com/package/xml-crypto'} | null | {'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'} | {'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'} |
npm | GHSA-h3cq-j957-vhxg | Cross-site Scripting in fullpage.js | using fullpage.js you can create a anchor tag . But when put href in anchor then it does not sanitize the url which allow for a break in the context of anchor element and can add our new element. | {'CVE-2022-1330'} | 2022-04-22T20:26:49Z | 2022-04-13T00:00:16Z | MODERATE | null | {'CWE-79'} | {'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b', 'https://github.com/alvarotrigo/fullPage.js/pull/4360', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1330', 'https://huntr.dev/bounties/08d2a6d0-772f-4b05-834e-86343f263c35', 'https://github.com/alvarotrigo/fullpage.js'} | null | {'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b'} | {'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b'} |
npm | GHSA-93q8-gq69-wqmw | Inefficient Regular Expression Complexity in chalk/ansi-regex | ansi-regex is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3807'} | 2022-04-26T21:00:26Z | 2021-09-20T20:20:09Z | HIGH | null | {'CWE-1333'} | {'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774', 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1', 'https://www.oracle.com/secur... | null | {'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'} | {'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'} |
npm | GHSA-r6rj-9ch6-g264 | Prototype pollution in Merge-deep | The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library. | {'CVE-2021-26707'} | 2021-06-16T19:58:45Z | 2021-06-07T22:09:26Z | CRITICAL | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26707', 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/', 'https://www.npmjs.com/package/merge-deep', 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5', 'https://security.netapp.com/advisory/ntap-20210716-0008/'... | null | {'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'} | {'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'} |
npm | GHSA-c4qp-h3m6-785f | Downloads Resources over HTTP in ibm_db | Affected versions of `ibm_db` insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself... | {'CVE-2016-10577'} | 2021-01-08T19:01:22Z | 2019-02-18T23:51:59Z | HIGH | null | {'CWE-311'} | {'https://github.com/advisories/GHSA-c4qp-h3m6-785f', 'https://nodesecurity.io/advisories/163', 'https://www.npmjs.com/advisories/163', 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577'} | null | {'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'} | {'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'} |
npm | GHSA-m7j4-fhg6-xf5v | Prototype pollution in datatables.net | All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806. | {'CVE-2020-28458'} | 2021-01-08T21:20:46Z | 2020-12-17T21:00:50Z | HIGH | null | {'CWE-1321'} | {'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806', 'https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766', 'https://snyk.io/vul... | null | {'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03'} | {'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03'} |
npm | GHSA-rrrm-qjm4-v8hf | Inefficient Regular Expression Complexity in marked | ### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `block.def` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from "marked";
marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`);
```
_Who is impacted?... | {'CVE-2022-21680'} | 2022-01-14T19:56:20Z | 2022-01-14T21:04:41Z | HIGH | null | {'CWE-1333'} | {'https://github.com/markedjs/marked/releases/tag/v4.0.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21680', 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0', 'https://github.com/markedjs/marked', 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf'} | null | {'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0'} | {'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0'} |
npm | GHSA-xc7v-wxcw-j472 | Memory Exposure in tunnel-agent | Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure.
This is exploitable if user supplied input is provided to the auth value and is a number.
Proof-of-concept:
```js
require('request')({
method: 'GET',
uri: 'http://www.example.com',
tunnel: true,
proxy:{
protocol: 'http:',
host:... | null | 2020-08-31T18:29:19Z | 2019-06-03T17:08:26Z | MODERATE | null | {'CWE-200'} | {'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0', 'https://www.npmjs.com/advisories/598', 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4'} | null | {'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'} | {'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'} |
npm | GHSA-rfhr-62xp-2fp2 | Open Redirect in trailing-slash | The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolut... | {'CVE-2021-23387'} | 2021-05-27T22:38:20Z | 2021-06-08T23:19:21Z | MODERATE | null | {'CWE-601'} | {'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707', 'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36', 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387'} | null | {'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048'} | {'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048'} |
npm | GHSA-jg8v-48h5-wgxg | Prototype Pollution | This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance. | {'CVE-2021-23413'} | 2021-08-31T20:58:01Z | 2021-08-10T16:02:18Z | MODERATE | null | {'CWE-1321'} | {'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88', 'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36', 'https://github.com/Stuk/jszip', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23413', 'https://snyk.io/vuln/SNYK-JS-JSZ... | null | {'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36'} | {'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36'} |
npm | GHSA-cfm4-qjh2-4765 | Improper Verification of Cryptographic Signature in node-forge | ### Impact
RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.
### Patches
The issue has ... | {'CVE-2022-24771'} | 2022-03-18T23:09:54Z | 2022-03-18T23:09:54Z | HIGH | null | {'CWE-347'} | {'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24771', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c0... | null | {'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'} | {'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'} |
npm | GHSA-qqgx-2p2h-9c37 | Prototype Pollution | ### Overview
The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability.
If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context.
### Patches
This ... | {'CVE-2020-7788'} | 2021-07-28T21:11:23Z | 2020-12-10T16:53:45Z | HIGH | null | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-INI-1048974', 'https://www.npmjs.com/advisories/1589', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html', 'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7788'} | null | {'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1'} | {'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1'} |
npm | GHSA-ff5x-w9wg-h275 | Holder can generate proof of ownership for credentials it does not control in vp-toolkit | ### Impact
The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rab... | null | 2020-02-28T16:38:18Z | 2020-03-06T01:15:46Z | HIGH | null | null | {'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'} | null | {'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'} | {'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'} |
npm | GHSA-gm8g-xhh8-rmwr | Prototype Pollution in doc-path | This affects the package doc-path before 2.1.2. | {'CVE-2020-7772'} | 2021-04-19T22:22:45Z | 2021-05-10T19:17:25Z | CRITICAL | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7772', 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952', 'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7', 'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54'} | null | {'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7'} | {'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7'} |
npm | GHSA-h9jc-284h-533g | Context isolation bypass via contextBridge in Electron | ### Impact
Apps using both `contextIsolation` and `contextBridge` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you mu... | {'CVE-2020-4077'} | 2021-01-07T23:48:28Z | 2020-07-07T00:01:10Z | HIGH | null | {'CWE-501'} | {'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824', 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g'} | null | {'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'} | {'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'} |
npm | GHSA-qfxv-qqvg-24pg | OS Command Injection in im-metadata | im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function. | {'CVE-2019-10788'} | 2021-03-29T22:57:19Z | 2021-04-13T15:17:36Z | HIGH | null | {'CWE-78'} | {'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788', 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'} | null | {'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'} | {'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'} |
npm | GHSA-wpg7-2c88-r8xv | Exposure of Sensitive Information in simple-get | In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party. | {'CVE-2022-0355'} | 2022-02-03T16:08:56Z | 2022-01-28T22:54:16Z | HIGH | null | {'CWE-200'} | {'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355', 'https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31', 'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f', 'https://github.com/feross/simple-get/', '... | null | {'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f'} | {'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f'} |
npm | GHSA-39qv-prmh-x37f | Prototype Pollution in @strikeentco/set | This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821 | {'CVE-2021-23497'} | 2022-02-11T16:16:33Z | 2022-02-05T00:00:26Z | HIGH | null | {'CWE-1321'} | {'https://github.com/strikeentco/set/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/strikeentco/set/commit/b2f942c', 'https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945', 'https://security.snyk.io/vuln/SNY... | null | {'https://github.com/strikeentco/set/commit/b2f942c'} | {'https://github.com/strikeentco/set/commit/b2f942c'} |
npm | GHSA-qr32-j4j6-3m7r | Command Injection in fs-git | Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution.
## Recommendation
Update to version 1.0.2 or later. | {'CVE-2017-16087'} | 2020-08-31T18:20:27Z | 2019-05-29T20:23:00Z | HIGH | null | {'CWE-77'} | {'https://www.npmjs.com/advisories/360', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'} | null | {'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5'} | {'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'} |
npm | GHSA-pvv8-8fx9-h673 | Path Traversal in @backstage/plugin-scaffolder-backend | ### Impact
A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in... | {'CVE-2021-41151'} | 2021-10-25T20:07:48Z | 2021-10-19T15:28:03Z | MODERATE | null | {'CWE-22'} | {'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006', 'https://github.com/backstage/backstage', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151', 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673', 'https://github.com/backstage/backstage/releases/tag/r... | null | {'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'} | {'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'} |
npm | GHSA-954c-jjx6-cxv7 | Reflected XSS from the callback handler's error query parameter | ### Overview
Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message.
### Am I affected?
You are affected by this vulnerability if you a... | {'CVE-2021-32702'} | 2021-06-28T19:06:42Z | 2021-06-28T16:46:41Z | HIGH | null | {'CWE-79'} | {'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf', 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7'} | null | {'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'} | {'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'} |
npm | GHSA-97gv-3p2c-xw7j | Denial of Service and Content Injection in i18n-node-angular | Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions.
## Recommendation
Update to version 1.4.0 or late... | {'CVE-2016-10524'} | 2022-02-11T17:08:46Z | 2019-02-18T23:39:06Z | HIGH | null | {'CWE-74', 'CWE-400'} | {'https://www.npmjs.com/advisories/80', 'https://github.com/oliversalzburg/i18n-node-angular', 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j', 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8', 'https://nodesecurity.io/advisories/80', 'https://nvd.nist.gov/vuln/d... | null | {'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'} | {'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'} |
npm | GHSA-fvqr-27wr-82fm | Prototype Pollution in lodash | Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution.
The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
... | {'CVE-2018-3721'} | 2020-08-31T18:28:28Z | 2018-07-26T15:14:52Z | LOW | null | {'CWE-471'} | {'https://www.npmjs.com/advisories/577', 'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3721', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/advisories/GHSA-fvqr-27wr-82fm', 'https://hackerone.com/reports/3... | null | {'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a'} | {'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a'} |
npm | GHSA-6xhg-q9c8-rj32 | Credential leak in react-native-fast-image | This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked ... | {'CVE-2020-7696'} | 2021-05-10T21:06:00Z | 2021-05-18T01:52:54Z | MODERATE | null | {'CWE-200'} | {'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624', 'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228', 'https://github.com/DylanVann/react-native-fast-image/issues/690', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696', 'https://github.com/DylanVann/react-na... | null | {'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624'} | {'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624'} |
npm | GHSA-3p92-886g-qxpq | Remote Memory Exposure in floody | Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure.
.write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory.
Proof of Concept:
```
var f = require('floody')(process.stdout);
f.write(USERSUPPLIEDINPUT);
'f.stop();
... | null | 2021-08-04T21:27:04Z | 2019-06-04T15:42:32Z | MODERATE | null | {'CWE-201'} | {'https://snyk.io/vuln/npm:floody:20160115', 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0', 'https://www.npmjs.com/advisories/601'} | null | {'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'} | {'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'} |
npm | GHSA-f98m-q3hr-p5wq | Prototype Pollution in locutus | All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function. | {'CVE-2020-7719'} | 2021-12-14T15:33:28Z | 2021-05-06T18:12:22Z | CRITICAL | null | {'CWE-915', 'CWE-20'} | {'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f', 'https://github.com/kvz/locutus', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7719', 'https://github.com/kvz/locutus/pull/418/', 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675'} | null | {'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'} | {'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'} |
npm | GHSA-4w97-57v2-3w44 | False-negative validation results in MINT transactions with invalid baton | ### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result ... | {'CVE-2020-11072'} | 2021-01-08T20:17:36Z | 2020-05-12T00:45:24Z | CRITICAL | null | {'CWE-697'} | {'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11072', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-... | null | {'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7'} | {'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7'} |
npm | GHSA-jc83-cpf9-q7c6 | False-negative validation results in MINT transactions with invalid baton | ### Impact
Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result ... | {'CVE-2020-11071'} | 2021-01-08T20:17:31Z | 2020-05-12T00:39:03Z | CRITICAL | null | {'CWE-697'} | {'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6', 'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11071'} | null | {'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754'} | {'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754'} |
npm | GHSA-6xv6-jpvw-cx6q | Command injection in bestzip | The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param. | {'CVE-2020-7730'} | 2021-05-04T22:37:03Z | 2021-05-06T18:27:36Z | CRITICAL | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7730', 'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371', 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'} | null | {'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'} | {'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'} |
npm | GHSA-92v9-xh2q-fq9f | Prototype Pollution in @cookiex/deep | The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object. | {'CVE-2021-23442'} | 2021-09-20T20:12:20Z | 2021-09-20T20:12:38Z | HIGH | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/tony-tsx/cookiex-deep', 'https://github.com/tony-tsx/cookiex-deep/issues/1', 'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793', 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442'} | null | {'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88'} | {'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88'} |
npm | GHSA-f794-r6xc-hf3v | Improper Access Control in passport-oauth2 | The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply r... | {'CVE-2021-41580'} | 2021-10-06T13:23:09Z | 2021-09-29T17:18:32Z | MODERATE | null | {'CWE-287'} | {'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262', 'https://github.com/jaredhanson/passport-oauth2', 'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1', 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea', 'https://nvd.nist.gov/vu... | null | {'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea'} | {'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea'} |
npm | GHSA-m734-r4g6-34f9 | NoSQL Injection in loopback-connector-mongodb | Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection.
MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a f... | null | 2021-08-04T20:47:58Z | 2019-06-04T19:36:17Z | HIGH | null | {'CWE-89'} | {'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b', 'https://github.com/strongloop/loopback-connector-mongodb/issues/403', 'https://www.npmjs.com/advisories/696', 'https://github.com/strongloop/loopback-connector-mongodb/pull/452', 'https://loopback.io/doc/en/lb3... | null | {'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'} | {'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'} |
npm | GHSA-5q6m-3h65-w53x | Improper Neutralization of Special Elements used in an OS Command. | react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided... | {'CVE-2021-24033'} | 2021-03-11T22:25:51Z | 2021-03-11T22:26:09Z | MODERATE | null | {'CWE-78'} | {'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://www.facebook.com/security/advisories/cve-2021-24033', 'https://github.com/facebook/create-react-app/pull/10644'} | null | {'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'} | {'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'} |
npm | GHSA-v2p6-4mp7-3r9v | Regular Expression Denial of Service in underscore.string | Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS).
The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs.
## Recommendation
Upgra... | null | 2020-08-31T18:34:16Z | 2019-06-14T16:26:22Z | MODERATE | null | {'CWE-400'} | {'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/pull/517', 'https://github.com/epeli/underscore.string/issues/510', 'https://www.npmjs.com/advisories/745'} | null | {'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'} | {'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'} |
npm | GHSA-6g47-63mv-qpgh | Prototype Pollution in dotty | This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays. | {'CVE-2021-23624'} | 2021-11-04T17:01:59Z | 2021-11-08T17:55:48Z | MODERATE | null | {'CWE-843', 'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/deoxxa/dotty'} | null | {'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'} | {'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'} |
npm | GHSA-vpgw-ffh3-648h | Prototype Pollution in fullpage.js | fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.
Javascript is "prototype" language which means when a new "object" is created, it car... | {'CVE-2022-1295'} | 2022-04-22T20:20:55Z | 2022-04-12T00:00:38Z | HIGH | null | {'CWE-1321'} | {'https://github.com/alvarotrigo/fullpage.js', 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'} | null | {'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'} | {'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'} |
npm | GHSA-p8c3-7rj8-q963 | ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign | ### Impact
Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as:
- wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct)
- prepending zeros with ASN.1 INTEGER va... | {'CVE-2020-14966'} | 2021-10-06T22:01:36Z | 2020-06-26T16:54:15Z | HIGH | null | {'CWE-347'} | {'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/issues/437', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://security.netapp.com/adviso... | null | {'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'} | {'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'} |
npm | GHSA-cfjh-p3g4-3q2f | VBScript Content Injection in marked | Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set.
## Proof of Concept ( IE10 Compatibility Mode Only )
`[xss link](vbscript:alert(1))`
will get a link
`<a href="vbscript:alert(1)">xss link</a>`
## Recommendation
Update to version 0.... | {'CVE-2015-1370'} | 2021-09-09T17:02:02Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-79'} | {'https://github.com/markedjs/marked/issues/492', 'https://github.com/chjj/marked/issues/492', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370', 'https://www.npmjs.com/advisories/24/versions', 'http://www.openwall.com/lists/oss-securi... | null | {'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'} | {'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'} |
npm | GHSA-5pm8-492c-92p5 | Prototype Pollution in chartkick | Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server.
... | {'CVE-2019-18841'} | 2022-03-03T05:12:51.639263Z | 2019-12-02T18:04:11Z | HIGH | null | null | {'https://github.com/ankane/chartkick/commits/master', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://rubygems.org/gems/chartkick/', 'https://github.com/ankane/chartkick.js/issues/117', 'https://chartkick.com', 'https://... | null | {'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'} | {'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'} |
npm | GHSA-hxhm-96pp-2m43 | Remote Code Execution in Angular Expressions | ### Impact
The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input.
* If running angular-expressions in the browser, an attacker could run any browser script when the application co... | {'CVE-2020-5219'} | 2021-01-08T20:33:38Z | 2020-01-24T15:27:25Z | HIGH | null | {'CWE-74'} | {'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'} | null | {'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'} | {'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'} |
npm | GHSA-gh88-3pxp-6fm8 | Infinite Loop in colors.js | The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to h... | {'CVE-2021-23567'} | 2022-01-21T21:04:45Z | 2022-01-21T23:39:50Z | HIGH | null | {'CWE-835'} | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.j... | null | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} |
npm | GHSA-7prf-vw4p-qr59 | Prototype pollution in supermixer | Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation. | {'CVE-2020-24939'} | 2021-06-22T15:45:35Z | 2021-12-10T19:03:07Z | HIGH | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3', 'https://hackerone.com/reports/959987', 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/stampit-org/supermixer/issues/9'} | null | {'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'} | {'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'} |
npm | GHSA-765h-qjxv-5f44 | Prototype Pollution in handlebars | The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source. | {'CVE-2021-23383'} | 2021-05-19T21:17:59Z | 2022-02-10T23:51:42Z | CRITICAL | null | {'CWE-1321'} | {'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032... | null | {'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'} | {'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'} |
npm | GHSA-qh73-qc3p-rjv2 | Uncaught Exception in fastify-multipart | ### Impact
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a `name=constructor` property it is still possible to crash the application.
The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116).
All users... | {'CVE-2021-23597'} | 2022-02-23T22:11:16Z | 2022-02-11T18:57:53Z | HIGH | null | {'CWE-400'} | {'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2', 'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-20... | null | {'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'} | {'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'} |
npm | GHSA-27wq-qx3q-fxm9 | Improper Handling of Unexpected Data Type in ced | ### Impact
In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash.
### Patches
The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes.
### Workarounds
Before passing an argument t... | {'CVE-2021-39131'} | 2021-10-21T14:15:51Z | 2021-08-23T19:42:28Z | HIGH | null | {'CWE-241'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced', 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'} | null | {'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'} | {'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'} |
npm | GHSA-rwxp-hwwf-653v | Insecure template handling in express-hbs | express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted... | {'CVE-2021-32817'} | 2021-05-17T19:09:07Z | 2021-05-17T20:58:51Z | MODERATE | null | {'CWE-200'} | {'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://www.npmjs.com/package/express-hbs', 'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://n... | null | {'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'} | {'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'} |
npm | GHSA-8v9x-9xqg-r8mr | Prototype pollution in json8-merge-patch | Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor. | {'CVE-2020-8268'} | 2021-04-19T22:31:31Z | 2021-05-10T19:17:15Z | HIGH | null | {'CWE-471', 'CWE-20', 'CWE-1321'} | {'https://hackerone.com/reports/980649', 'https://www.npmjs.com/package/json8-merge-patch', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268', 'https://github.com/sonny... | null | {'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'} | {'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'} |
npm | GHSA-whgm-jr23-g3j9 | Uncontrolled Resource Consumption in ansi-html | This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time. | {'CVE-2021-23424'} | 2021-09-07T21:02:12Z | 2021-09-02T17:15:24Z | HIGH | null | {'CWE-400'} | {'https://github.com/Tjatse/ansi-html', 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69', 'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424', 'https://s... | null | {'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'} | {'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'} |
npm | GHSA-689x-x68p-fph3 | Cross-site Scripting in vditor | Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13. | {'CVE-2022-0350'} | 2022-04-08T22:08:10Z | 2022-04-01T00:00:41Z | MODERATE | null | {'CWE-79'} | {'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476', 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://github.com/vanessa219/vditor'} | null | {'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'} | {'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'} |
npm | GHSA-j87c-cj65-vmh5 | High severity vulnerability that affects rendertron | Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker. | {'CVE-2017-18354'} | 2021-09-14T19:19:11Z | 2019-01-04T17:41:51Z | HIGH | null | {'CWE-22'} | {'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354', 'https://github.com/GoogleChrome/rendertron', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://bugs.chromiu... | null | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} | {'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'} |
npm | GHSA-vx5c-87qx-cv6c | Arbitrary Code Execution in mathjs | math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution.
## Recommendation
Update to version 3.17.0 or later. | {'CVE-2017-1001002'} | 2021-06-10T20:06:12Z | 2017-12-18T22:27:45Z | CRITICAL | null | {'CWE-94'} | {'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/552', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'} | null | {'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'} | {'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'} |
npm | GHSA-xw5p-hw6r-2j98 | Denial of service in fastify | A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas. | {'CVE-2020-8192'} | 2020-08-03T21:25:40Z | 2020-08-05T14:53:22Z | MODERATE | null | {'CWE-400'} | {'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e', 'https://hackerone.com/reports/903521', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192'} | null | {'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'} | {'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'} |
npm | GHSA-r587-7jh2-4qr3 | Server secret was included in static assets and served to clients | ### Impact
Server JWT signing secret was included in static assets and served to clients.
This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along ... | null | 2020-08-26T19:32:37Z | 2020-08-26T19:32:50Z | CRITICAL | null | null | {'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'} | null | {'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'} | {'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'} |
npm | GHSA-652h-xwhf-q4h6 | OS Command Injection in ssh2 | ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in ... | {'CVE-2020-26301'} | 2021-09-21T14:50:54Z | 2021-09-21T16:50:46Z | HIGH | null | {'CWE-78'} | {'https://github.com/mscdex/ssh2', 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/', 'https://www.npmjs.com/package/ssh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'} | null | {'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'} | {'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'} |
npm | GHSA-273r-mgr4-v34f | Uncaught Exception in engine.io | ### Impact
A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process.
> RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear
> at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14)
> at Receiver.startLoop (/.../node_modules... | {'CVE-2022-21676'} | 2022-01-21T13:25:59Z | 2022-01-13T16:14:17Z | HIGH | null | {'CWE-754'} | {'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/releases/tag/4.1.2', 'https://github.com/socketio/engine.io/releases/tag/5.2.1', 'https://nvd.nist.gov... | null | {'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c'} | {'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab'} |
npm | GHSA-jp6r-xcjj-5h7r | Cross-Site Scripting in cyberchef | Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's bro... | {'CVE-2019-15532'} | 2021-08-17T22:11:11Z | 2019-08-27T17:36:32Z | MODERATE | null | {'CWE-79'} | {'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf', 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2', 'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296', 'https://www.npmjs.com/advisories/1149', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532', 'https://github.com/gchq/Cyber... | null | {'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'} | {'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'} |
npm | GHSA-5f7m-mmpc-qhh4 | Remote Memory Exposure in mysql | Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure.
Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password.
Only `mysql` running on Node.js versions below 6.0.0 is affected due to a throw added in newer node.js ve... | null | 2020-08-31T18:29:28Z | 2019-05-23T09:27:00Z | MODERATE | null | {'CWE-201'} | {'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52', 'https://www.npmjs.com/advisories/602', 'https://nodesecurity.io/advisories/602'} | null | {'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'} | {'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'} |
npm | GHSA-jv35-xqg7-f92r | Prototype Pollution | Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2021-25949'} | 2021-10-21T13:11:54Z | 2021-06-21T17:16:09Z | CRITICAL | null | {'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949', 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25949', 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4', 'https... | null | {'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'} | {'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'} |
npm | GHSA-mq6c-fh97-4gwv | Denial of Service vulnerability with large JSON payloads in fastify | Affected versions of `fastify` are vulnerable to a denial of service when processing a request with `Content-Type` set to `application/json` and a very large payload.
## Recommendation
Update to version 0.38.0 or later. | {'CVE-2018-3711'} | 2022-03-01T22:18:16Z | 2018-07-18T21:20:34Z | HIGH | null | {'CWE-770'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-3711', 'https://hackerone.com/reports/303632', 'https://www.npmjs.com/advisories/564', 'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76', 'https://github.com/advisories/GHSA-mq6c-fh97-4gwv', 'https://github.com/fastify/fastify/pull/627'} | null | {'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76'} | {'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76'} |
npm | GHSA-74fj-2j2h-c42q | Exposure of sensitive information in follow-redirects | follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor | {'CVE-2022-0155'} | 2022-01-20T15:34:48Z | 2022-01-12T22:46:26Z | HIGH | null | {'CWE-359'} | {'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22', 'https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406', 'https://github.com/follow-redirects/follow-redirects/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155'} | null | {'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22'} | {'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22'} |
npm | GHSA-43m5-c88r-cjvv | XSS due to lack of CSRF validation for replying/publishing | ### Impact
Due to lack of CSRF validation, a logged in user is potentially vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum.
### Patches
Upgrade to the latest version v0.7.0
### Workarounds
You can cherry-pick the following commit: [https://github.com/psychobunny/nodebb... | {'CVE-2020-15156'} | 2021-01-07T23:39:51Z | 2020-08-26T18:55:38Z | MODERATE | null | {'CWE-352'} | {'https://www.npmjs.com/package/nodebb-plugin-blog-comments', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/security/advisories/GHSA-43m5-c88r-cjvv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15156', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac6... | null | {'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618'} | {'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618'} |
npm | GHSA-qcg2-h349-vwm3 | Cross-site Scripting in React Draft Wysiwyg | react-draft-wysiwyg (aka React Draft Wysiwyg) before 1.14.6 allows a javascript: URi in a Link Target of the link decorator in decorators/Link/index.js when a draft is shared across users, leading to XSS. | {'CVE-2021-31712'} | 2021-04-26T18:46:48Z | 2021-05-06T15:52:35Z | HIGH | null | {'CWE-79'} | {'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380', 'https://github.com/jpuri/react-draft-wysiwyg/pull/1104', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31712', 'https://github.com/jpuri/react-draft-wysiwyg/issues/1102'} | null | {'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380'} | {'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380'} |
npm | GHSA-f2jv-r9rf-7988 | Remote code execution in handlebars when compiling templates | The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source. | {'CVE-2021-23369'} | 2021-04-23T18:55:25Z | 2021-05-06T15:57:44Z | CRITICAL | null | {'CWE-94'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://security.netapp.com/advisory/ntap-20210604-0008/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-10... | null | {'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'} | {'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'} |
npm | GHSA-4852-vrh7-28rf | Reflected XSS in GraphQL Playground | ### Impact
**directly impacted:**
- `graphql-playground-html@<1.6.22` - all unsanitized user input for `renderPlaygroundPage()`
**all of our consuming packages** of `graphql-playground-html` are impacted:
- `graphql-playground-middleware-express@<1.7.16` - unsanitized user input to `expressPlayground()`
- `graphql-... | {'CVE-2020-4038'} | 2021-11-04T17:11:46Z | 2020-06-09T00:24:57Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-4038', 'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7', 'https://github.com/prisma-labs/graphql-playground#security-details', 'https://github.com/prisma-labs/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf', 'http... | null | {'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7'} | {'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7'} |
npm | GHSA-425c-ccf3-3jrr | Critical severity vulnerability that affects slpjs | ## Validator parsing discrepancy due to string encoding
### Impact
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the ... | {'CVE-2019-16762'} | 2021-01-08T19:57:59Z | 2019-11-15T23:10:35Z | CRITICAL | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-16762', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr', 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701', 'https://github.com/advisories/GHSA-425c-ccf3-3jrr'} | null | {'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701'} | {'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701'} |
npm | GHSA-pfv6-prqm-85q8 | Prototype Pollution in madlib-object-utils | The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676) | {'CVE-2022-24279'} | 2022-04-22T20:50:33Z | 2022-04-16T00:00:26Z | HIGH | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24279', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572', 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f', 'https://github.com/Qwerios/madlib-object-utils'} | null | {'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'} | {'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'} |
npm | GHSA-gxr4-xjj5-5px2 | Potential XSS vulnerability in jQuery | ### Impact
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code.
### Patches
This problem is patched in jQuery 3.5.0.
### Workarounds
To workaround the issue without upgrading, adding the follo... | {'CVE-2020-11022'} | 2022-02-08T22:06:37Z | 2020-04-29T22:18:55Z | MODERATE | null | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://github.com/advisories/GHSA-gxr4-xjj5-5px2', 'https://www.tenable.com/security/tns-2020-11', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://lists.f... | null | {'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'} | {'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'} |
npm | GHSA-jw37-5gqr-cf9j | Server-Side Request Forgery in ftp-srv | ### Background
The FTP protocol creates two connections, one for commands and one for transferring data.
This second data connection can be created in two ways, on the server by sending the PASV command, or on the client by sending the PORT command.
The PORT command sends the IP and port for the server to connect to ... | {'CVE-2020-15152'} | 2021-01-12T19:30:42Z | 2020-08-17T21:44:54Z | CRITICAL | null | {'CWE-918'} | {'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3', 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5', 'https://www.npmjs.com/advisories/1445', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15152', 'https://www.npmjs.com/package/ftp-srv', 'https://g... | null | {'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca', 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3', 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5'} | {'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5', 'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca', 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3'} |
npm | GHSA-4fc4-chg7-h8gh | Unprotected dynamically loaded chunks | ### Impact
All dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected.
### Patches
This issue is patched in v... | {'CVE-2020-15262'} | 2021-11-19T14:40:52Z | 2020-10-19T20:02:44Z | LOW | null | {'CWE-345'} | {'https://github.com/waysact/webpack-subresource-integrity/issues/131', 'https://github.com/waysact/webpack-subresource-integrity/', 'https://github.com/waysact/webpack-subresource-integrity/security/advisories/GHSA-4fc4-chg7-h8gh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15262', 'https://github.com/waysact/webpack-... | null | {'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'} | {'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.