ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
npm
GHSA-xfhp-gmh8-r8v2
Regular Expression Denial of Service (ReDoS)
The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity.
{'CVE-2021-23354'}
2021-03-25T00:17:59Z
2021-03-19T21:22:10Z
HIGH
null
{'CWE-400'}
{'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68', 'https://snyk.io/vuln/SNYK-JS-PRINTF-1072096', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23354', 'https://github.com/adaltas/node-printf/pull/32', 'https://github.com/adaltas/node-printf/issues/31'}
null
{'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'}
{'https://github.com/adaltas/node-printf/commit/a8502e7c9b0b22555696a2d8ef67722086413a68'}
npm
GHSA-x9r5-jxvq-4387
Self XSS on user input in jquery.terminal
### Impact This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees. Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because th...
{'CVE-2021-43862'}
2022-01-06T19:18:42Z
2022-01-06T22:48:56Z
LOW
null
{'CWE-80'}
{'https://github.com/jcubic/jquery.terminal/', 'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862', 'https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1', 'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a91...
null
{'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5'}
{'https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5'}
npm
GHSA-rv49-54qp-fw42
Path Traversal in servey
Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. ## Recommendation Upgrade to the latest version
null
2020-08-31T18:36:18Z
2019-06-06T15:30:20Z
MODERATE
null
{'CWE-22'}
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111', 'https://www.npmjs.com/advisories/802', 'https://hackerone.com/reports/355501'}
null
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}
{'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}
npm
GHSA-qw93-45r3-p66p
Prototype Pollution in merge-options
All versions of `merge-options` are vulnerable to Prototype Pollution ## Recommendation Update to version 1.0.1 or greater.
{'CVE-2018-3752'}
2021-09-16T21:10:31Z
2018-10-09T00:19:57Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3752', 'https://www.npmjs.com/advisories/717', 'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4', 'https://github.com/advisories/GHSA-qw93-45r3-p66p', 'https://github.com/schnittstabil/merge-options', 'https://hackerone.com/repor...
null
{'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4'}
{'https://github.com/schnittstabil/merge-options/commit/d4a93bc2890455e0931ac0779667023e6cb101d4'}
npm
GHSA-9q5w-79cv-947m
Unsafe defaults in `remark-html`
### Impact The documentation of `remark-html` has mentioned that it was safe by default. In practise the default was never safe and had to be opted into. This means arbitrary HTML can be passed through leading to potential XSS attacks. ### Patches The problem has been patched in 13.0.2 and 14.0.1: `remark-html` is n...
{'CVE-2021-39199'}
2021-09-07T19:05:40Z
2021-09-07T23:10:56Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/remarkjs/remark-html/security/advisories/GHSA-9q5w-79cv-947m', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39199', 'https://www.npmjs.com/package/remark-html', 'https://github.com/remarkjs/remark-html', 'https://github.com/remarkjs/remark-html/releases/tag/14.0.1', 'https://github.com/remarkjs/remar...
null
{'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1'}
{'https://github.com/remarkjs/remark-html/commit/b75c9dde582ad87ba498e369c033dc8a350478c1'}
npm
GHSA-wjr4-2jgw-hmv8
Command Injection in whereis
Versions of `whereis` before 0.4.1 are vulnerable to command injection if untrusted user input is passed into `whereis`. ## Recommendation Update to version 0.4.1 or later.
{'CVE-2018-3772'}
2020-08-31T18:29:33Z
2018-07-31T18:28:53Z
HIGH
null
{'CWE-77'}
{'https://github.com/advisories/GHSA-wjr4-2jgw-hmv8', 'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b', 'https://hackerone.com/reports/319476', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3772', 'https://www.npmjs.com/advisories/604'}
null
{'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'}
{'https://github.com/vvo/node-whereis/commit/0f64e3780235004fb6e43bfd153ea3e0e210ee2b'}
npm
GHSA-x5m8-2r8v-8f97
Prototype Pollution in libnested
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
{'CVE-2022-25352'}
2022-03-29T22:05:38Z
2022-03-18T00:01:11Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-LIBNESTED-2342117', 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1', 'https://github.com/dominictarr/libnested', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25352', 'https://github.com/dominictarr/libnested/blob/master/index.js%23L22'}
null
{'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1'}
{'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1'}
npm
GHSA-33f9-j839-rf8h
Prototype Pollution in immer
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if ...
{'CVE-2021-23436'}
2021-09-13T20:27:52Z
2021-09-02T17:17:37Z
CRITICAL
null
{'CWE-843', 'CWE-1321'}
{'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237', 'https://snyk.io/vuln/SNYK-JS-IMMER-1540542', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23436', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579266', 'https://github.com/immerjs/immer'}
null
{'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}
{'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}
npm
GHSA-pgh6-m65r-2rhq
DOS and Open Redirect with user input
### Impact A redirect vulnerability in the `fastify-static` module allows remote attackers to redirect Mozilla Firefox users to arbitrary websites via a double slash `//` followed by a domain: `http://localhost:3000//a//youtube.com/%2e%2e%2f%2e%2e`. A DOS vulnerability is possible if the URL contains invalid characte...
{'CVE-2021-22964'}
2021-10-21T14:57:14Z
2021-10-12T16:04:17Z
HIGH
null
{'CWE-248', 'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22964', 'https://hackerone.com/reports/1361804', 'https://github.com/fastify/fastify-static/security/advisories/GHSA-pgh6-m65r-2rhq', 'https://github.com/fastify/fastify-static', 'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'}
null
{'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'}
{'https://github.com/fastify/fastify-static/commit/c31f17d107cb19a0e96733c80a9abf16c56166d4'}
npm
GHSA-qh7x-j4v8-qw5w
Clipboard-based XSS
### Impact XSS against the user. ### Details jsuites is vulnerable to DOM based XSS if the user can be tricked into copying _anything_ from a malicious and pasting it into the html editor. This is because a part of the clipboard content is directly written to `innerHTML` causing XSS. ### References The Curious Case o...
{'CVE-2021-41086'}
2021-10-21T14:19:54Z
2021-09-22T20:39:26Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/package/jsuites', 'https://github.com/jsuites/jsuites/security/advisories/GHSA-qh7x-j4v8-qw5w', 'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41086', 'https://github.com/jsuites/jsuites/', 'https://github.com/jsui...
null
{'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2'}
{'https://github.com/jsuites/jsuites/commit/d47a6f4e143188dde2742f4cffd313e1068ad3b3', 'https://github.com/jsuites/jsuites/commit/fe1d3cc5e339f2f4da8ed1f9f42271fdf9cbd8d2'}
npm
GHSA-v9w2-v7j9-rjpr
Remote code execution in Eclipse Theia
In Eclipse Theia 0.3.9 to 1.8.1, the "mini-browser" extension allows a user to preview HTML files in an iframe inside the IDE. But with the way it is made it is possible for a previewed HTML file to trigger an RCE. This exploit only happens if a user previews a malicious file.
{'CVE-2021-34435'}
2021-09-13T20:27:30Z
2021-09-02T22:02:36Z
HIGH
null
{'CWE-942', 'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34435', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=568018', 'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5', 'https://github.com/eclipse-theia/theia', 'https://github.com/eclipse-theia/theia/pull/8759'}
null
{'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'}
{'https://github.com/eclipse-theia/theia/commit/0761dcf5fe3c14c27432683d42d2c526ad0cfbd5'}
npm
GHSA-9xr8-8hmc-389f
Cross-Site Scripting in vant
Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.1.8 or later.
null
2021-08-18T22:47:15Z
2019-11-22T13:45:33Z
HIGH
null
{'CWE-79'}
{'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a', 'https://github.com/youzan/vant/issues/4270', 'https://snyk.io/vuln/SNYK-JS-VANT-460461', 'https://www.npmjs.com/advisories/1157'}
null
{'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'}
{'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'}
npm
GHSA-5rqg-jm4f-cqx7
Infinite loop causing Denial of Service in colors
colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomi...
null
2022-01-10T19:56:36Z
2022-01-10T17:29:53Z
HIGH
null
{'CWE-835'}
{'https://github.com/Marak/colors.js', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd', 'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26'}
null
{'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'}
{'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75', 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed18c5cf26', 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'}
npm
GHSA-mmqv-m45h-q2hp
Sandbox Breakout / Arbitrary Code Execution in localeval
All versions of `localeval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through `constructor.constructor`. This may allow attackers to execute arbitrary code in the system. Evaluating the payload ``` constructor.constructor("return proces...
null
2022-03-14T23:59:01Z
2020-09-04T15:22:40Z
CRITICAL
null
null
{'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/issues/9', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335', 'https://github.com/espadrine/localeval'}
null
{'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335', 'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c'}
{'https://github.com/espadrine/localeval/commit/823f112c793b8fae051eeddad61d4ed29804a56c', 'https://github.com/espadrine/localeval/commit/ce985eba77a5f89a7f718727cbaa7fb14da40335'}
npm
GHSA-37q6-576q-vgr7
Missing Origin Validation in parcel-bundler
Versions of `parcel-bundler` before 1.10.0 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. ## Recommendation Up...
{'CVE-2018-14731'}
2021-08-31T20:51:48Z
2018-10-30T20:36:53Z
HIGH
null
{'CWE-200'}
{'https://github.com/parcel-bundler/parcel/issues/1783', 'https://github.com/parcel-bundler/parcel/pull/1794', 'https://github.com/parcel-bundler/parcel', 'https://blog.cal1.cn/post/Sniffing%20Codes%20in%20Hot%20Module%20Reloading%20Messages', 'https://www.npmjs.com/advisories/721', 'https://blog.cal1.cn/post/Sniffing%...
null
{'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}
{'https://github.com/parcel-bundler/parcel/commit/066e0bf6bd26b15c78bd47df023452e4b20073e4'}
npm
GHSA-gg96-f8wr-p89f
Script injection
### Impact A malicious internal actor can potentially upload documentation content with malicious scripts by embedding the script within an `object` element. This may give access to sensitive data when other users visit that same documentation page. The ability to upload malicious content may be limited by internal c...
{'CVE-2021-32661'}
2021-06-04T19:22:48Z
2021-06-04T19:09:26Z
MODERATE
null
{'CWE-77', 'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32661', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/advisories/GHSA-gg96-f8wr-p89f', 'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
null
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
npm
GHSA-2m39-62fm-q8r3
Regular Expression Denial of Service in sshpk
Versions of `sshpk` before 1.13.2 or 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys. ## Recommendation Update to version 1.13.2, 1.14.1 or later.
{'CVE-2018-3737'}
2020-08-31T18:29:38Z
2018-08-15T13:22:23Z
HIGH
null
{'CWE-770'}
{'https://www.npmjs.com/advisories/606', 'https://github.com/advisories/GHSA-2m39-62fm-q8r3', 'https://hackerone.com/reports/319593', 'https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3737', 'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1b...
null
{'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}
{'https://github.com/joyent/node-sshpk/commit/46065d38a5e6d1bccf86d3efb2fb83c14e3f9957'}
npm
GHSA-cr6m-62pq-hmqh
OS Command injection in npm-lockfile
npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5.
{'CVE-2022-0841'}
2022-04-04T21:37:38Z
2022-03-04T00:00:18Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0841', 'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8', 'https://huntr.dev/bounties/4f806dc9-2ecd-4e79-997e-5292f1bea9f1', 'https://github.com/ljharb/npm-lockfile'}
null
{'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8'}
{'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8'}
npm
GHSA-5f38-9jw2-6r6h
Cross-site Scripting in teddy
Teddy is a readable and easy to learn templating language. This affects the package teddy before 0.5.9. A type confusion vulnerability can be used to bypass input sanitization when the model content is an array (instead of a string).
{'CVE-2021-23447'}
2022-05-04T03:42:48Z
2021-10-12T16:22:04Z
MODERATE
null
{'CWE-79', 'CWE-843'}
{'https://github.com/rooseveltframework/teddy', 'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0', 'https://github.com/rooseveltframework/teddy/releases/tag/0.5.9', 'https://github.com/rooseveltframework/teddy/pull/518', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23447', 'htt...
null
{'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}
{'https://github.com/rooseveltframework/teddy/commit/64c556717b4879bf8d4c30067cf6e70d899a3dc0'}
npm
GHSA-4q69-q4q7-x82c
High severity vulnerability that affects rendertron
Rendertron 1.0.0 includes an _ah/stop route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.
{'CVE-2017-18353'}
2021-09-01T17:52:46Z
2019-01-04T17:41:46Z
HIGH
null
null
{'https://github.com/GoogleChrome/rendertron/pull/88', 'https://github.com/GoogleChrome/rendertron', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://github.com/advisories/GHSA-4q69-q4q7-x82c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353', 'https://bugs.chromiu...
null
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
npm
GHSA-qx4v-6gc5-f2vv
Regular Expression Denial of Service
A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.
null
2021-02-25T17:20:28Z
2019-06-20T14:32:56Z
MODERATE
null
{'CWE-400'}
{'https://github.com/standard-things/esm/issues/694', 'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'}
null
{'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'}
{'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'}
npm
GHSA-pgf8-28gg-vpr6
Path traversal
### Impact A malicious actor could read sensitive files from the environment where TechDocs documentation is built and published by setting a particular path for `docs_dir` in `mkdocs.yml`. These files would then be available over the TechDocs backend API. This vulnerability is mitigated by the fact that an attacker ...
{'CVE-2021-32662'}
2021-06-07T18:55:30Z
2021-06-04T19:09:20Z
MODERATE
null
{'CWE-22'}
{'https://github.com/backstage/backstage/releases/tag/release-2021-05-27', 'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208', 'https://github.com/backstage/backstage/security/advisories/GHSA-pgf8-28gg-vpr6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32662'}
null
{'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}
{'https://github.com/backstage/backstage/commit/8cefadca04cbf01d0394b0cb1983247e5f1d6208'}
npm
GHSA-46hv-7769-j7rx
Unauthorized File Access in harp
Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file. ## Recommendation Upgrade to version `0.40.2` or...
{'CVE-2019-5437'}
2021-06-03T17:09:41Z
2019-06-13T16:12:22Z
MODERATE
null
{'CWE-548'}
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210', 'https://www.npmjs.com/advisories/807', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437', 'https://hackerone.com/reports/453820'}
null
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210'}
{'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210'}
npm
GHSA-w457-6q6x-cgp9
Prototype Pollution in handlebars
Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads. ## Recommendation Upgrade to version ...
{'CVE-2019-19919'}
2021-07-26T21:51:06Z
2019-12-26T17:58:13Z
CRITICAL
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-19919', 'https://github.com/wycats/handlebars.js/issues/1558', 'https://www.npmjs.com/advisories/1164', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919', 'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'}
null
{'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'}
{'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'}
npm
GHSA-6jmr-jfh7-xg3h
False-positive validity for NFT1 genesis transactions
### Impact In the npm package named "slp-validate", versions prior to 1.2.2 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group to...
{'CVE-2020-15131'}
2021-01-08T21:00:17Z
2020-07-30T14:58:53Z
CRITICAL
null
{'CWE-697'}
{'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15131', 'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-6jmr-jfh7-xg3h'}
null
{'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'}
{'https://github.com/simpleledger/slp-validate.js/commit/3963cf914afae69084059b82483da916d97af65c'}
npm
GHSA-j59f-6m4q-62h6
Improper Key Verification in ipns
Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid. ## Recommendation Update to version 0.1.3 or later.
null
2021-08-04T21:17:50Z
2019-05-30T17:28:48Z
HIGH
null
{'CWE-287'}
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0', 'https://www.npmjs.com/advisories/693'}
null
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'}
{'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'}
npm
GHSA-55r9-7mf8-m382
Cross-site Scripting in edge.js
Edge is a logical and batteries included template engine for Node.js. This affects the package edge.js before 5.3.2. A type confusion vulnerability can be used to bypass input sanitization when the input to be rendered is an array (instead of a string or a SafeValue), even if {{ }} are used.
{'CVE-2021-23443'}
2022-05-04T03:38:31Z
2021-09-22T20:36:46Z
MODERATE
null
{'CWE-79', 'CWE-843'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23443', 'https://github.com/edge-js/edge', 'https://snyk.io/vuln/SNYK-JS-EDGEJS-1579556', 'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'}
null
{'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'}
{'https://github.com/edge-js/edge/commit/fa2c7fde86327aeae232752e89a6e37e2e469e21'}
npm
GHSA-f2c5-997w-7f5c
Cross-site Scripting in peertube
peertube is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). It was found that one could upload a SVG image and then send the url of that to other users and when they open the link we can get their complete session keys as the session keys stored in local storage and w...
{'CVE-2021-3780'}
2021-09-24T13:07:20Z
2021-09-20T20:42:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6', 'https://github.com/chocobozzz/peertube', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3780', 'https://huntr.dev/bounties/282807a8-4bf5-4fe2-af62-e05f945b3d65'}
null
{'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6'}
{'https://github.com/chocobozzz/peertube/commit/0ea2f79d45b301fcd660efc894469a99b2239bf6'}
npm
GHSA-4gp3-p7ph-x2jr
OS Command Injection in devcert-sanscache
devcert-sanscache before 0.4.7 allows remote attackers to execute arbitrary code or cause a Command Injection via the exec function. The variable `commonName` controlled by user input is used as part of the `exec` function without any sanitization.
{'CVE-2019-10778'}
2021-08-23T15:12:51Z
2020-04-14T23:09:00Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8', 'https://snyk.io/vuln/SNYK-JS-DEVCERTSANSCACHE-540926', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10778'}
null
{'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8'}
{'https://github.com/guybedford/devcert/commit/571f4e6d077f7f21c6aed655ae380d85a7a5d3b8'}
npm
GHSA-3mpr-hq3p-49h9
Prototype Pollution in mixin-deep
Versions of `mixin-deep` before 1.3.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 1.3.1 or later.
{'CVE-2018-3719'}
2020-08-31T18:28:31Z
2018-07-26T15:10:54Z
LOW
null
{'CWE-471'}
{'https://hackerone.com/reports/311236', 'https://www.npmjs.com/advisories/578', 'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c', 'https://github.com/advisories/GHSA-3mpr-hq3p-49h9', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3719'}
null
{'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c'}
{'https://github.com/jonschlinkert/mixin-deep/commit/578b0bc5e74e14de9ef4975f504dc698796bdf9c'}
npm
GHSA-83rx-c8cr-6j8q
Insecure Default Configuration in tesseract.js
Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations. ## Recommendation Upgrade to version 1.0.19 or later.
null
2021-08-04T21:33:58Z
2019-06-05T20:48:55Z
MODERATE
null
{'CWE-829'}
{'https://github.com/naptha/tesseract.js/pull/267', 'https://www.npmjs.com/advisories/792', 'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28', 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085'}
null
{'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28'}
{'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28'}
npm
GHSA-c27r-x354-4m68
HMAC-SHA1 signatures can bypass validation via key confusion
### Impact An attacker can inject an HMAC-SHA1 signature that is valid using only knowledge of the RSA public key. This allows bypassing signature validation. ### Patches Version 2.0.0 has the fix. ### Workarounds The recommendation is to upgrade. In case that is not possible remove the 'http://www.w3.org/2000/09/xml...
null
2020-10-27T20:35:52Z
2020-10-27T20:39:46Z
HIGH
null
{'CWE-287'}
{'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100', 'https://github.com/yaronn/xml-crypto/security/advisories/GHSA-c27r-x354-4m68', 'https://www.npmjs.com/package/xml-crypto'}
null
{'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'}
{'https://github.com/yaronn/xml-crypto/commit/3d9db712e6232c765cd2ad6bd2902b88a0d22100'}
npm
GHSA-h3cq-j957-vhxg
Cross-site Scripting in fullpage.js
using fullpage.js you can create a anchor tag . But when put href in anchor then it does not sanitize the url which allow for a break in the context of anchor element and can add our new element.
{'CVE-2022-1330'}
2022-04-22T20:26:49Z
2022-04-13T00:00:16Z
MODERATE
null
{'CWE-79'}
{'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b', 'https://github.com/alvarotrigo/fullPage.js/pull/4360', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1330', 'https://huntr.dev/bounties/08d2a6d0-772f-4b05-834e-86343f263c35', 'https://github.com/alvarotrigo/fullpage.js'}
null
{'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b'}
{'https://github.com/alvarotrigo/fullpage.js/commit/e7a5db42711700c8a584e61b5e532a64039fe92b'}
npm
GHSA-93q8-gq69-wqmw
Inefficient Regular Expression Complexity in chalk/ansi-regex
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3807'}
2022-04-26T21:00:26Z
2021-09-20T20:20:09Z
HIGH
null
{'CWE-1333'}
{'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-924086311', 'https://github.com/chalk/ansi-regex/issues/38#issuecomment-925924774', 'https://github.com/chalk/ansi-regex/releases/tag/v6.0.1', 'https://www.oracle.com/secur...
null
{'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'}
{'https://github.com/chalk/ansi-regex/commit/8d1d7cdb586269882c4bdc1b7325d0c58c8f76f9'}
npm
GHSA-r6rj-9ch6-g264
Prototype pollution in Merge-deep
The merge-deep library before 3.0.3 for Node.js can be tricked into overwriting properties of Object.prototype or adding new properties to it. These properties are then inherited by every object in the program, thus facilitating prototype-pollution attacks against applications using this library.
{'CVE-2021-26707'}
2021-06-16T19:58:45Z
2021-06-07T22:09:26Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26707', 'https://securitylab.github.com/advisories/GHSL-2020-160-merge-deep/', 'https://www.npmjs.com/package/merge-deep', 'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5', 'https://security.netapp.com/advisory/ntap-20210716-0008/'...
null
{'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'}
{'https://github.com/jonschlinkert/merge-deep/commit/11e5dd56de8a6aed0b1ed022089dbce6968d82a5'}
npm
GHSA-c4qp-h3m6-785f
Downloads Resources over HTTP in ibm_db
Affected versions of `ibm_db` insecurely download resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself...
{'CVE-2016-10577'}
2021-01-08T19:01:22Z
2019-02-18T23:51:59Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-c4qp-h3m6-785f', 'https://nodesecurity.io/advisories/163', 'https://www.npmjs.com/advisories/163', 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577'}
null
{'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'}
{'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'}
npm
GHSA-m7j4-fhg6-xf5v
Prototype pollution in datatables.net
All versions of package datatables.net are vulnerable to Prototype Pollution due to an incomplete fix for https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806.
{'CVE-2020-28458'}
2021-01-08T21:20:46Z
2020-12-17T21:00:50Z
HIGH
null
{'CWE-1321'}
{'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1051961', 'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-598806', 'https://github.com/DataTables/Dist-DataTables/blob/master/js/jquery.dataTables.js%23L2766', 'https://snyk.io/vul...
null
{'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03'}
{'https://github.com/DataTables/DataTablesSrc/commit/a51cbe99fd3d02aa5582f97d4af1615d11a1ea03'}
npm
GHSA-rrrm-qjm4-v8hf
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `block.def` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from "marked"; marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`); ``` _Who is impacted?...
{'CVE-2022-21680'}
2022-01-14T19:56:20Z
2022-01-14T21:04:41Z
HIGH
null
{'CWE-1333'}
{'https://github.com/markedjs/marked/releases/tag/v4.0.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21680', 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0', 'https://github.com/markedjs/marked', 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf'}
null
{'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0'}
{'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0'}
npm
GHSA-xc7v-wxcw-j472
Memory Exposure in tunnel-agent
Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. Proof-of-concept: ```js require('request')({ method: 'GET', uri: 'http://www.example.com', tunnel: true, proxy:{ protocol: 'http:', host:...
null
2020-08-31T18:29:19Z
2019-06-03T17:08:26Z
MODERATE
null
{'CWE-200'}
{'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0', 'https://www.npmjs.com/advisories/598', 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4'}
null
{'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'}
{'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'}
npm
GHSA-rfhr-62xp-2fp2
Open Redirect in trailing-slash
The package trailing-slash before 2.0.1 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as https://example.com//attacker.example/). The vulnerable code is in index.js::createTrailing(), as the web server uses relative URLs instead of absolut...
{'CVE-2021-23387'}
2021-05-27T22:38:20Z
2021-06-08T23:19:21Z
MODERATE
null
{'CWE-601'}
{'https://snyk.io/vuln/SNYK-JS-TRAILINGSLASH-1085707', 'https://github.com/fardog/trailing-slash/blob/f640ece055fe85275c983de5eb94661b95e35670/index.js%23L36', 'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23387'}
null
{'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048'}
{'https://github.com/fardog/trailing-slash/commit/f8e66f1429308247e5a119d430203077d8f05048'}
npm
GHSA-jg8v-48h5-wgxg
Prototype Pollution
This affects the package jszip before 3.7.0. Crafting a new zip file with filenames set to Object prototype values (e.g __proto__, toString, etc) results in a returned object with a modified prototype instance.
{'CVE-2021-23413'}
2021-08-31T20:58:01Z
2021-08-10T16:02:18Z
MODERATE
null
{'CWE-1321'}
{'https://github.com/Stuk/jszip/blob/master/lib/object.js%23L88', 'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36', 'https://github.com/Stuk/jszip', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1251498', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23413', 'https://snyk.io/vuln/SNYK-JS-JSZ...
null
{'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36'}
{'https://github.com/Stuk/jszip/commit/22357494f424178cb416cdb7d93b26dd4f824b36'}
npm
GHSA-cfm4-qjh2-4765
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. ### Patches The issue has ...
{'CVE-2022-24771'}
2022-03-18T23:09:54Z
2022-03-18T23:09:54Z
HIGH
null
{'CWE-347'}
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24771', 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765', 'https://github.com/digitalbazaar/forge', 'https://github.com/digitalbazaar/forge/commit/bb822c0...
null
{'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1', 'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2'}
{'https://github.com/digitalbazaar/forge/commit/bb822c02df0b61211836472e29b9790cc541cdb2', 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}
npm
GHSA-qqgx-2p2h-9c37
Prototype Pollution
### Overview The `ini` npm package before version 1.3.6 has a Prototype Pollution vulnerability. If an attacker submits a malicious INI file to an application that parses it with `ini.parse`, they will pollute the prototype on the application. This can be exploited further depending on the context. ### Patches This ...
{'CVE-2020-7788'}
2021-07-28T21:11:23Z
2020-12-10T16:53:45Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-INI-1048974', 'https://www.npmjs.com/advisories/1589', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00032.html', 'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7788'}
null
{'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1'}
{'https://github.com/npm/ini/commit/56d2805e07ccd94e2ba0984ac9240ff02d44b6f1'}
npm
GHSA-ff5x-w9wg-h275
Holder can generate proof of ownership for credentials it does not control in vp-toolkit
### Impact The [`verifyVerifiablePresentation()`](https://github.com/rabobank-blockchain/vp-toolkit/blob/master/src/service/signers/verifiable-presentation-signer.ts#L97) method check the cryptographic integrity of the Verifiable Presentation, but it does not check if the [`credentialSubject.id`](https://github.com/rab...
null
2020-02-28T16:38:18Z
2020-03-06T01:15:46Z
HIGH
null
null
{'https://github.com/rabobank-blockchain/vp-toolkit/security/advisories/GHSA-ff5x-w9wg-h275', 'https://github.com/rabobank-blockchain/vp-toolkit/issues/14', 'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'}
null
{'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'}
{'https://github.com/rabobank-blockchain/vp-toolkit/commit/18a7db84d3265c6ffa10ef63eb37ae1bd4ba192b'}
npm
GHSA-gm8g-xhh8-rmwr
Prototype Pollution in doc-path
This affects the package doc-path before 2.1.2.
{'CVE-2020-7772'}
2021-04-19T22:22:45Z
2021-05-10T19:17:25Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7772', 'https://snyk.io/vuln/SNYK-JS-DOCPATH-1011952', 'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7', 'https://github.com/mrodrig/doc-path/blob/stable/src/path.js%23L54'}
null
{'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7'}
{'https://github.com/mrodrig/doc-path/commit/3e2bb168cf303bffcd7fae5f8d05e5300c1541c7'}
npm
GHSA-h9jc-284h-533g
Context isolation bypass via contextBridge in Electron
### Impact Apps using both `contextIsolation` and `contextBridge` are affected. This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. ### Workarounds There are no app-side workarounds, you mu...
{'CVE-2020-4077'}
2021-01-07T23:48:28Z
2020-07-07T00:01:10Z
HIGH
null
{'CWE-501'}
{'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4077', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824', 'https://github.com/electron/electron/security/advisories/GHSA-h9jc-284h-533g'}
null
{'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'}
{'https://github.com/electron/electron/commit/b8e347709245d2dc5640fbb3044d9b21b4eaa6b0'}
npm
GHSA-qfxv-qqvg-24pg
OS Command Injection in im-metadata
im-metadata through 3.0.1 allows remote attackers to execute arbitrary commands via the "exec" argument. It is possible to inject arbitrary commands as part of the metadata options which is given to the "exec" function.
{'CVE-2019-10788'}
2021-03-29T22:57:19Z
2021-04-13T15:17:36Z
HIGH
null
{'CWE-78'}
{'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10788', 'https://snyk.io/vuln/SNYK-JS-IMMETADATA-544184'}
null
{'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'}
{'https://github.com/Turistforeningen/node-im-metadata/commit/ea15dddbe0f65694bfde36b78dd488e90f246639'}
npm
GHSA-wpg7-2c88-r8xv
Exposure of Sensitive Information in simple-get
In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.
{'CVE-2022-0355'}
2022-02-03T16:08:56Z
2022-01-28T22:54:16Z
HIGH
null
{'CWE-200'}
{'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355', 'https://huntr.dev/bounties/42c79c23-6646-46c4-871d-219c0d4b4e31', 'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f', 'https://github.com/feross/simple-get/', '...
null
{'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f'}
{'https://github.com/feross/simple-get/commit/e4af095e06cd69a9235013e8507e220a79b9684f'}
npm
GHSA-39qv-prmh-x37f
Prototype Pollution in @strikeentco/set
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
{'CVE-2021-23497'}
2022-02-11T16:16:33Z
2022-02-05T00:00:26Z
HIGH
null
{'CWE-1321'}
{'https://github.com/strikeentco/set/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/', 'https://github.com/strikeentco/set/commit/b2f942c', 'https://snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-2385945', 'https://security.snyk.io/vuln/SNY...
null
{'https://github.com/strikeentco/set/commit/b2f942c'}
{'https://github.com/strikeentco/set/commit/b2f942c'}
npm
GHSA-qr32-j4j6-3m7r
Command Injection in fs-git
Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution. ## Recommendation Update to version 1.0.2 or later.
{'CVE-2017-16087'}
2020-08-31T18:20:27Z
2019-05-29T20:23:00Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/360', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}
null
{'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5'}
{'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5', 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}
npm
GHSA-pvv8-8fx9-h673
Path Traversal in @backstage/plugin-scaffolder-backend
### Impact A malicious actor could read sensitive files from the environment where Scaffolder tasks are run. The attack is executed by crafting a custom Scaffolder template with a `publish:github:pull-request` action using a particular source path. When the template is executed the sensitive files would be included in...
{'CVE-2021-41151'}
2021-10-25T20:07:48Z
2021-10-19T15:28:03Z
MODERATE
null
{'CWE-22'}
{'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006', 'https://github.com/backstage/backstage', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41151', 'https://github.com/backstage/backstage/security/advisories/GHSA-pvv8-8fx9-h673', 'https://github.com/backstage/backstage/releases/tag/r...
null
{'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'}
{'https://github.com/backstage/backstage/commit/6968962c920508eae19a4c1c200fa2c8980a4006'}
npm
GHSA-954c-jjx6-cxv7
Reflected XSS from the callback handler's error query parameter
### Overview Versions before and including `1.4.1` are vulnerable to reflected XSS. An attacker can execute arbitrary code by providing an XSS payload in the `error` query parameter which is then processed by the callback handler as an error message. ### Am I affected? You are affected by this vulnerability if you a...
{'CVE-2021-32702'}
2021-06-28T19:06:42Z
2021-06-28T16:46:41Z
HIGH
null
{'CWE-79'}
{'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf', 'https://www.npmjs.com/package/@auth0/nextjs-auth0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32702', 'https://github.com/auth0/nextjs-auth0/security/advisories/GHSA-954c-jjx6-cxv7'}
null
{'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'}
{'https://github.com/auth0/nextjs-auth0/commit/6996e2528ceed98627caa28abafbc09e90163ccf'}
npm
GHSA-97gv-3p2c-xw7j
Denial of Service and Content Injection in i18n-node-angular
Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions. ## Recommendation Update to version 1.4.0 or late...
{'CVE-2016-10524'}
2022-02-11T17:08:46Z
2019-02-18T23:39:06Z
HIGH
null
{'CWE-74', 'CWE-400'}
{'https://www.npmjs.com/advisories/80', 'https://github.com/oliversalzburg/i18n-node-angular', 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j', 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8', 'https://nodesecurity.io/advisories/80', 'https://nvd.nist.gov/vuln/d...
null
{'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'}
{'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'}
npm
GHSA-fvqr-27wr-82fm
Prototype Pollution in lodash
Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ...
{'CVE-2018-3721'}
2020-08-31T18:28:28Z
2018-07-26T15:14:52Z
LOW
null
{'CWE-471'}
{'https://www.npmjs.com/advisories/577', 'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3721', 'https://security.netapp.com/advisory/ntap-20190919-0004/', 'https://github.com/advisories/GHSA-fvqr-27wr-82fm', 'https://hackerone.com/reports/3...
null
{'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a'}
{'https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a'}
npm
GHSA-6xhg-q9c8-rj32
Credential leak in react-native-fast-image
This affects all versions before version 8.3.0 of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked ...
{'CVE-2020-7696'}
2021-05-10T21:06:00Z
2021-05-18T01:52:54Z
MODERATE
null
{'CWE-200'}
{'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624', 'https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228', 'https://github.com/DylanVann/react-native-fast-image/issues/690', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7696', 'https://github.com/DylanVann/react-na...
null
{'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624'}
{'https://github.com/DylanVann/react-native-fast-image/commit/4a7cd64f5b0aa40b04d63ccb105ee2b511abe624'}
npm
GHSA-3p92-886g-qxpq
Remote Memory Exposure in floody
Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure. .write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory. Proof of Concept: ``` var f = require('floody')(process.stdout); f.write(USERSUPPLIEDINPUT); 'f.stop(); ...
null
2021-08-04T21:27:04Z
2019-06-04T15:42:32Z
MODERATE
null
{'CWE-201'}
{'https://snyk.io/vuln/npm:floody:20160115', 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0', 'https://www.npmjs.com/advisories/601'}
null
{'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'}
{'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'}
npm
GHSA-f98m-q3hr-p5wq
Prototype Pollution in locutus
All versions of package locutus prior to version 2.0.12 are vulnerable to Prototype Pollution via the php.strings.parse_str function.
{'CVE-2020-7719'}
2021-12-14T15:33:28Z
2021-05-06T18:12:22Z
CRITICAL
null
{'CWE-915', 'CWE-20'}
{'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f', 'https://github.com/kvz/locutus', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7719', 'https://github.com/kvz/locutus/pull/418/', 'https://snyk.io/vuln/SNYK-JS-LOCUTUS-598675'}
null
{'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'}
{'https://github.com/locutusjs/locutus/commit/0eb16d8541838e80f3c2340a9ef93ded7c97290f'}
npm
GHSA-4w97-57v2-3w44
False-negative validation results in MINT transactions with invalid baton
### Impact Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result ...
{'CVE-2020-11072'}
2021-01-08T20:17:36Z
2020-05-12T00:45:24Z
CRITICAL
null
{'CWE-697'}
{'https://github.com/simpleledger/slp-validate.js/security/advisories/GHSA-4w97-57v2-3w44', 'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11072', 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-4w97-57v2-...
null
{'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7'}
{'https://github.com/simpleledger/slp-validate/commit/cde95c0c6470dceb4f023cd462f904135ebd73e7'}
npm
GHSA-jc83-cpf9-q7c6
False-negative validation results in MINT transactions with invalid baton
### Impact Users could experience false-negative validation outcomes for [MINT](https://github.com/simpleledger/slp-specifications/blob/master/slp-token-type-1.md#mint---extended-minting-transaction) transaction operations. A poorly implemented SLP wallet could allow spending of the affected tokens which would result ...
{'CVE-2020-11071'}
2021-01-08T20:17:31Z
2020-05-12T00:39:03Z
CRITICAL
null
{'CWE-697'}
{'https://github.com/simpleledger/slpjs/security/advisories/GHSA-jc83-cpf9-q7c6', 'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11071'}
null
{'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754'}
{'https://github.com/simpleledger/slpjs/commit/3671be2ffb6d4cfa94c00c6dc8649d1ba1d75754'}
npm
GHSA-6xv6-jpvw-cx6q
Command injection in bestzip
The package bestzip before 2.1.7 are vulnerable to Command Injection via the options param.
{'CVE-2020-7730'}
2021-05-04T22:37:03Z
2021-05-06T18:27:36Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7730', 'https://snyk.io/vuln/SNYK-JS-BESTZIP-609371', 'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'}
null
{'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'}
{'https://github.com/nfriedly/node-bestzip/commit/45d4a901478c6a8f396c8b959dd6cf8fd3f955b6'}
npm
GHSA-92v9-xh2q-fq9f
Prototype Pollution in @cookiex/deep
The npm @cookiex/deep package before version 0.0.7 has a prototype pollution vulnerability. The global proto object can be polluted using the __proto__ object.
{'CVE-2021-23442'}
2021-09-20T20:12:20Z
2021-09-20T20:12:38Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/tony-tsx/cookiex-deep', 'https://github.com/tony-tsx/cookiex-deep/issues/1', 'https://snyk.io/vuln/SNYK-JS-COOKIEXDEEP-1582793', 'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23442'}
null
{'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88'}
{'https://github.com/tony-tsx/cookiex-deep/commit/b5bea2b7f34a5fa9abb4446cbd038ecdbcd09c88'}
npm
GHSA-f794-r6xc-hf3v
Improper Access Control in passport-oauth2
The passport-oauth2 package before 1.6.1 for Node.js mishandles the error condition of failure to obtain an access token. This is exploitable in certain use cases where an OAuth identity provider uses an HTTP 200 status code for authentication-failure error reports, and an application grants authorization upon simply r...
{'CVE-2021-41580'}
2021-10-06T13:23:09Z
2021-09-29T17:18:32Z
MODERATE
null
{'CWE-287'}
{'https://medium.com/passportjs/no-access-token-no-service-7fb017c9e262', 'https://github.com/jaredhanson/passport-oauth2', 'https://github.com/jaredhanson/passport-oauth2/compare/v1.6.0...v1.6.1', 'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea', 'https://nvd.nist.gov/vu...
null
{'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea'}
{'https://github.com/jaredhanson/passport-oauth2/commit/8e3bcdff145a2219033bd782fc517229fe3e05ea'}
npm
GHSA-m734-r4g6-34f9
NoSQL Injection in loopback-connector-mongodb
Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection. MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a f...
null
2021-08-04T20:47:58Z
2019-06-04T19:36:17Z
HIGH
null
{'CWE-89'}
{'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b', 'https://github.com/strongloop/loopback-connector-mongodb/issues/403', 'https://www.npmjs.com/advisories/696', 'https://github.com/strongloop/loopback-connector-mongodb/pull/452', 'https://loopback.io/doc/en/lb3...
null
{'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'}
{'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'}
npm
GHSA-5q6m-3h65-w53x
Improper Neutralization of Special Elements used in an OS Command.
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoked with user-provided...
{'CVE-2021-24033'}
2021-03-11T22:25:51Z
2021-03-11T22:26:09Z
MODERATE
null
{'CWE-78'}
{'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24033', 'https://www.facebook.com/security/advisories/cve-2021-24033', 'https://github.com/facebook/create-react-app/pull/10644'}
null
{'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}
{'https://github.com/facebook/create-react-app/commit/f5e415f3a5b66f07dcc60aba1b445fa7cda97268'}
npm
GHSA-v2p6-4mp7-3r9v
Regular Expression Denial of Service in underscore.string
Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS). The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs. ## Recommendation Upgra...
null
2020-08-31T18:34:16Z
2019-06-14T16:26:22Z
MODERATE
null
{'CWE-400'}
{'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029', 'https://github.com/epeli/underscore.string/pull/517', 'https://github.com/epeli/underscore.string/issues/510', 'https://www.npmjs.com/advisories/745'}
null
{'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'}
{'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'}
npm
GHSA-6g47-63mv-qpgh
Prototype Pollution in dotty
This affects the package dotty before 0.1.2. A type confusion vulnerability can lead to a bypass of CVE-2021-25912 when the user-provided keys used in the path parameter are arrays.
{'CVE-2021-23624'}
2021-11-04T17:01:59Z
2021-11-08T17:55:48Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-DOTTY-1577292', 'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23624', 'https://github.com/deoxxa/dotty'}
null
{'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
{'https://github.com/deoxxa/dotty/commit/88f61860dcc274a07a263c32cbe9d44c24ef02d7'}
npm
GHSA-vpgw-ffh3-648h
Prototype Pollution in fullpage.js
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability. Javascript is "prototype" language which means when a new "object" is created, it car...
{'CVE-2022-1295'}
2022-04-22T20:20:55Z
2022-04-12T00:00:38Z
HIGH
null
{'CWE-1321'}
{'https://github.com/alvarotrigo/fullpage.js', 'https://huntr.dev/bounties/3b9d450c-24ac-4037-b04d-4d4dafbf593a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295', 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
null
{'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
{'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}
npm
GHSA-p8c3-7rj8-q963
ECDSA signature validation vulnerability by accepting wrong ASN.1 encoding in jsrsasign
### Impact Jsrsasign supports ECDSA signature validation which signature value is represented by ASN.1 DER encoding. This vulnerablity may accept a wrong ASN.1 DER encoded ECDSA signature such as: - wrong multi-byte ASN.1 length of TLV (ex. 0x820045 even though 0x45 is correct) - prepending zeros with ASN.1 INTEGER va...
{'CVE-2020-14966'}
2021-10-06T22:01:36Z
2020-06-26T16:54:15Z
HIGH
null
{'CWE-347'}
{'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14966', 'https://github.com/kjur/jsrsasign/releases/tag/8.0.17', 'https://github.com/kjur/jsrsasign', 'https://github.com/kjur/jsrsasign/issues/437', 'https://github.com/kjur/jsrsasign/security/advisories/GHSA-p8c3-7rj8-q963', 'https://security.netapp.com/adviso...
null
{'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'}
{'https://github.com/kjur/jsrsasign/commit/6087412d072a57074d3c4c1b40bdde0460d53a7f'}
npm
GHSA-cfjh-p3g4-3q2f
VBScript Content Injection in marked
Versions 0.3.2 and earlier of `marked` are affected by a cross-site scripting vulnerability even when `sanitize:true` is set. ## Proof of Concept ( IE10 Compatibility Mode Only ) `[xss link](vbscript:alert(1&#41;)` will get a link `<a href="vbscript:alert(1)">xss link</a>` ## Recommendation Update to version 0....
{'CVE-2015-1370'}
2021-09-09T17:02:02Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/markedjs/marked/issues/492', 'https://github.com/chjj/marked/issues/492', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://nvd.nist.gov/vuln/detail/CVE-2015-1370', 'https://www.npmjs.com/advisories/24/versions', 'http://www.openwall.com/lists/oss-securi...
null
{'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba', 'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1'}
{'https://github.com/markedjs/marked/commit/fc372d1c6293267722e33f2719d57cebd67b3da1', 'https://github.com/evilpacket/marked/commit/3c191144939107c45a7fa11ab6cb88be6694a1ba'}
npm
GHSA-5pm8-492c-92p5
Prototype Pollution in chartkick
Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{"__proto__": {"polluted": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. ...
{'CVE-2019-18841'}
2022-03-03T05:12:51.639263Z
2019-12-02T18:04:11Z
HIGH
null
null
{'https://github.com/ankane/chartkick/commits/master', 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841', 'https://rubygems.org/gems/chartkick/', 'https://github.com/ankane/chartkick.js/issues/117', 'https://chartkick.com', 'https://...
null
{'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'}
{'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'}
npm
GHSA-hxhm-96pp-2m43
Remote Code Execution in Angular Expressions
### Impact The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. * If running angular-expressions in the browser, an attacker could run any browser script when the application co...
{'CVE-2020-5219'}
2021-01-08T20:33:38Z
2020-01-24T15:27:25Z
HIGH
null
{'CWE-74'}
{'https://github.com/peerigon/angular-expressions/security/advisories/GHSA-hxhm-96pp-2m43', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5219', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'}
null
{'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'}
{'https://github.com/peerigon/angular-expressions/commit/061addfb9a9e932a970e5fcb913d020038e65667'}
npm
GHSA-gh88-3pxp-6fm8
Infinite Loop in colors.js
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to h...
{'CVE-2021-23567'}
2022-01-21T21:04:45Z
2022-01-21T23:39:50Z
HIGH
null
{'CWE-835'}
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6%23diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18', 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.j...
null
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
npm
GHSA-7prf-vw4p-qr59
Prototype pollution in supermixer
Prototype pollution in Stampit supermixer allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
{'CVE-2020-24939'}
2021-06-22T15:45:35Z
2021-12-10T19:03:07Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3', 'https://hackerone.com/reports/959987', 'https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24939', 'https://github.com/stampit-org/supermixer/issues/9'}
null
{'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
{'https://github.com/stampit-org/supermixer/commit/94dcc6fc45e0fed96187cb52aaffadf76dbbc0a3'}
npm
GHSA-765h-qjxv-5f44
Prototype Pollution in handlebars
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
{'CVE-2021-23383'}
2021-05-19T21:17:59Z
2022-02-10T23:51:42Z
CRITICAL
null
{'CWE-1321'}
{'https://security.netapp.com/advisory/ntap-20210618-0007/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1279031', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-1279029', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1279032...
null
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
{'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
npm
GHSA-qh73-qc3p-rjv2
Uncaught Exception in fastify-multipart
### Impact This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a `name=constructor` property it is still possible to crash the application. The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116). All users...
{'CVE-2021-23597'}
2022-02-23T22:11:16Z
2022-02-11T18:57:53Z
HIGH
null
{'CWE-400'}
{'https://github.com/fastify/fastify-multipart/pull/116', 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2', 'https://www.fastify.io/docs/latest/Guides/Prototype-Poisoning/', 'https://github.com/fastify/fastify-multipart/releases/tag/v5.3.1', 'https://nvd.nist.gov/vuln/detail/CVE-20...
null
{'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'}
{'https://github.com/fastify/fastify-multipart/commit/a70dc7059a794589bd4fe066453141fc609e6066'}
npm
GHSA-27wq-qx3q-fxm9
Improper Handling of Unexpected Data Type in ced
### Impact In ced v0.1.0, passing data types other than `Buffer` causes the Node.js process to crash. ### Patches The problem has been patched in [ced v1.0.0](https://github.com/sonicdoe/ced/releases/tag/v1.0.0). You can upgrade from v0.1.0 without any breaking changes. ### Workarounds Before passing an argument t...
{'CVE-2021-39131'}
2021-10-21T14:15:51Z
2021-08-23T19:42:28Z
HIGH
null
{'CWE-241'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39131', 'https://github.com/sonicdoe/ced/security/advisories/GHSA-27wq-qx3q-fxm9', 'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3', 'https://github.com/sonicdoe/ced', 'https://github.com/sonicdoe/ced/releases/tag/v1.0.0'}
null
{'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'}
{'https://github.com/sonicdoe/ced/commit/a4d9f10b6bf1cd468d1a5b9a283cdf437f8bb7b3'}
npm
GHSA-rwxp-hwwf-653v
Insecure template handling in express-hbs
express-hbs is an Express handlebars template engine. express-hbs mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewhat restricted...
{'CVE-2021-32817'}
2021-05-17T19:09:07Z
2021-05-17T20:58:51Z
MODERATE
null
{'CWE-200'}
{'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e', 'https://www.npmjs.com/package/express-hbs', 'https://securitylab.github.com/advisories/GHSL-2021-019-express-hbs/', 'https://github.com/TryGhost/express-hbs#%EF%B8%8F-this-creates-a-potential-security-vulnerability', 'https://n...
null
{'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'}
{'https://github.com/TryGhost/express-hbs/commit/ff6fad6e357699412d4e916273314e5e7af1500e'}
npm
GHSA-8v9x-9xqg-r8mr
Prototype pollution in json8-merge-patch
Prototype pollution vulnerability in json8-merge-patch npm package < 1.0.3 may allow attackers to inject or modify methods and properties of the global object constructor.
{'CVE-2020-8268'}
2021-04-19T22:31:31Z
2021-05-10T19:17:15Z
HIGH
null
{'CWE-471', 'CWE-20', 'CWE-1321'}
{'https://hackerone.com/reports/980649', 'https://www.npmjs.com/package/json8-merge-patch', 'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8268', 'https://github.com/sonny...
null
{'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'}
{'https://github.com/sonnyp/JSON8/commit/2e890261b66cbc54ae01d0c79c71b0fd18379e7e#diff-faa7bef039022bc7ca1c613331b2373950ddd3d65ebf25d1699fbdf89773a387'}
npm
GHSA-whgm-jr23-g3j9
Uncontrolled Resource Consumption in ansi-html
This affects all versions of package ansi-html. If an attacker provides a malicious string, it will get stuck processing the input for an extremely long time.
{'CVE-2021-23424'}
2021-09-07T21:02:12Z
2021-09-02T17:15:24Z
HIGH
null
{'CWE-400'}
{'https://github.com/Tjatse/ansi-html', 'https://github.com/ioet/time-tracker-ui/security/advisories/GHSA-4fjc-8q3h-8r69', 'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63', 'https://github.com/Tjatse/ansi-html/issues/19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23424', 'https://s...
null
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'}
{'https://github.com/Tjatse/ansi-html/commit/8142b25bca3133ea060bcc1889277dc482327a63'}
npm
GHSA-689x-x68p-fph3
Cross-site Scripting in vditor
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
{'CVE-2022-0350'}
2022-04-08T22:08:10Z
2022-04-01T00:00:41Z
MODERATE
null
{'CWE-79'}
{'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476', 'https://huntr.dev/bounties/8202aa06-4b49-45ff-aa0f-00982f62005c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350', 'https://github.com/vanessa219/vditor'}
null
{'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}
{'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}
npm
GHSA-j87c-cj65-vmh5
High severity vulnerability that affects rendertron
Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.
{'CVE-2017-18354'}
2021-09-14T19:19:11Z
2019-01-04T17:41:51Z
HIGH
null
{'CWE-22'}
{'https://github.com/GoogleChrome/rendertron/pull/88', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354', 'https://github.com/GoogleChrome/rendertron', 'https://github.com/advisories/GHSA-j87c-cj65-vmh5', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e', 'https://bugs.chromiu...
null
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
{'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
npm
GHSA-vx5c-87qx-cv6c
Arbitrary Code Execution in mathjs
math.js before 3.17.0 had an arbitrary code execution in the JavaScript engine. Creating a typed function with JavaScript code in the name could result arbitrary execution. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2017-1001002'}
2021-06-10T20:06:12Z
2017-12-18T22:27:45Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/advisories/GHSA-vx5c-87qx-cv6c', 'https://github.com/josdejong/mathjs/blob/master/HISTORY.md#2017-11-18-version-3170', 'https://www.npmjs.com/advisories/552', 'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001002'}
null
{'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}
{'https://github.com/josdejong/mathjs/commit/8d2d48d81b3c233fb64eb2ec1d7a9e1cf6a55a90'}
npm
GHSA-xw5p-hw6r-2j98
Denial of service in fastify
A denial of service vulnerability exists in Fastify v2.14.1 and v3.0.0-rc.4 that allows a malicious user to trigger resource exhaustion (when the allErrors option is used) with specially crafted schemas.
{'CVE-2020-8192'}
2020-08-03T21:25:40Z
2020-08-05T14:53:22Z
MODERATE
null
{'CWE-400'}
{'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e', 'https://hackerone.com/reports/903521', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8192'}
null
{'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}
{'https://github.com/fastify/fastify/commit/74c3157ca90c3ffed9e4434f63c2017471ec970e'}
npm
GHSA-r587-7jh2-4qr3
Server secret was included in static assets and served to clients
### Impact Server JWT signing secret was included in static assets and served to clients. This ALLOWS Flood's builtin authentication to be bypassed. Given Flood is granted access to rTorrent's SCGI interface (which is unprotected and ALLOWS arbitrary code execution) and usually wide-ranging privileges to files, along ...
null
2020-08-26T19:32:37Z
2020-08-26T19:32:50Z
CRITICAL
null
null
{'https://github.com/jesec/flood/security/advisories/GHSA-r587-7jh2-4qr3', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca', 'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0'}
null
{'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'}
{'https://github.com/jesec/flood/commit/d137107ac908526d43966607149fbaf00cfcedf0', 'https://github.com/jesec/flood/commit/103f53c8d2963584e41bcf46ccc6fe0fabf179ca'}
npm
GHSA-652h-xwhf-q4h6
OS Command Injection in ssh2
ssh2 is client and server modules written in pure JavaScript for node.js. In ssh2 before version 1.4.0 there is a command injection vulnerability. The issue only exists on Windows. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. This is fixed in ...
{'CVE-2020-26301'}
2021-09-21T14:50:54Z
2021-09-21T16:50:46Z
HIGH
null
{'CWE-78'}
{'https://github.com/mscdex/ssh2', 'https://securitylab.github.com/advisories/GHSL-2020-123-mscdex-ssh2/', 'https://www.npmjs.com/package/ssh2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26301', 'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}
null
{'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}
{'https://github.com/mscdex/ssh2/commit/f763271f41320e71d5cbee02ea5bc6a2ded3ca21'}
npm
GHSA-273r-mgr4-v34f
Uncaught Exception in engine.io
### Impact A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. > RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear > at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14) > at Receiver.startLoop (/.../node_modules...
{'CVE-2022-21676'}
2022-01-21T13:25:59Z
2022-01-13T16:14:17Z
HIGH
null
{'CWE-754'}
{'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/releases/tag/4.1.2', 'https://github.com/socketio/engine.io/releases/tag/5.2.1', 'https://nvd.nist.gov...
null
{'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab', 'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c'}
{'https://github.com/socketio/engine.io/commit/a70800d7e96da32f6e6622804ef659ebc58659db', 'https://github.com/socketio/engine.io/commit/c0e194d44933bd83bf9a4b126fca68ba7bf5098c', 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab'}
npm
GHSA-jp6r-xcjj-5h7r
Cross-Site Scripting in cyberchef
Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's bro...
{'CVE-2019-15532'}
2021-08-17T22:11:11Z
2019-08-27T17:36:32Z
MODERATE
null
{'CWE-79'}
{'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf', 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2', 'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296', 'https://www.npmjs.com/advisories/1149', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532', 'https://github.com/gchq/Cyber...
null
{'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'}
{'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'}
npm
GHSA-5f7m-mmpc-qhh4
Remote Memory Exposure in mysql
Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure. Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password. Only `mysql` running on Node.js versions below 6.0.0 is affected due to a throw added in newer node.js ve...
null
2020-08-31T18:29:28Z
2019-05-23T09:27:00Z
MODERATE
null
{'CWE-201'}
{'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52', 'https://www.npmjs.com/advisories/602', 'https://nodesecurity.io/advisories/602'}
null
{'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}
{'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}
npm
GHSA-jv35-xqg7-f92r
Prototype Pollution
Prototype pollution vulnerability in ‘set-getter’ version 0.1.0 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25949'}
2021-10-21T13:11:54Z
2021-06-21T17:16:09Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25949', 'https://github.com/doowb/set-getter/blob/5bc2750fe1c3db9651d936131be187744111378d/index.js#L56', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25949', 'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4', 'https...
null
{'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'}
{'https://github.com/doowb/set-getter/commit/66eb3f0d4686a4a8c7c3d6f7ecd8e570b580edc4'}
npm
GHSA-mq6c-fh97-4gwv
Denial of Service vulnerability with large JSON payloads in fastify
Affected versions of `fastify` are vulnerable to a denial of service when processing a request with `Content-Type` set to `application/json` and a very large payload. ## Recommendation Update to version 0.38.0 or later.
{'CVE-2018-3711'}
2022-03-01T22:18:16Z
2018-07-18T21:20:34Z
HIGH
null
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3711', 'https://hackerone.com/reports/303632', 'https://www.npmjs.com/advisories/564', 'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76', 'https://github.com/advisories/GHSA-mq6c-fh97-4gwv', 'https://github.com/fastify/fastify/pull/627'}
null
{'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76'}
{'https://github.com/fastify/fastify/commit/fabd2a011f2ffbb877394abe699f549513ffbd76'}
npm
GHSA-74fj-2j2h-c42q
Exposure of sensitive information in follow-redirects
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
{'CVE-2022-0155'}
2022-01-20T15:34:48Z
2022-01-12T22:46:26Z
HIGH
null
{'CWE-359'}
{'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22', 'https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406', 'https://github.com/follow-redirects/follow-redirects/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155'}
null
{'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22'}
{'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22'}
npm
GHSA-43m5-c88r-cjvv
XSS due to lack of CSRF validation for replying/publishing
### Impact Due to lack of CSRF validation, a logged in user is potentially vulnerable to an XSS attack which could allow a third party to post on their behalf on the forum. ### Patches Upgrade to the latest version v0.7.0 ### Workarounds You can cherry-pick the following commit: [https://github.com/psychobunny/nodebb...
{'CVE-2020-15156'}
2021-01-07T23:39:51Z
2020-08-26T18:55:38Z
MODERATE
null
{'CWE-352'}
{'https://www.npmjs.com/package/nodebb-plugin-blog-comments', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/security/advisories/GHSA-43m5-c88r-cjvv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15156', 'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac6...
null
{'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618'}
{'https://github.com/psychobunny/nodebb-plugin-blog-comments/commit/cf43beedb05131937ef46f365ab0a0c6fa6ac618'}
npm
GHSA-qcg2-h349-vwm3
Cross-site Scripting in React Draft Wysiwyg
react-draft-wysiwyg (aka React Draft Wysiwyg) before 1.14.6 allows a javascript: URi in a Link Target of the link decorator in decorators/Link/index.js when a draft is shared across users, leading to XSS.
{'CVE-2021-31712'}
2021-04-26T18:46:48Z
2021-05-06T15:52:35Z
HIGH
null
{'CWE-79'}
{'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380', 'https://github.com/jpuri/react-draft-wysiwyg/pull/1104', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31712', 'https://github.com/jpuri/react-draft-wysiwyg/issues/1102'}
null
{'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380'}
{'https://github.com/jpuri/react-draft-wysiwyg/commit/d2faeb612b53f10dff048de7dc57e1f4044b5380'}
npm
GHSA-f2jv-r9rf-7988
Remote code execution in handlebars when compiling templates
The package handlebars before 4.7.7 are vulnerable to Remote Code Execution (RCE) when selecting certain compiling options to compile templates coming from an untrusted source.
{'CVE-2021-23369'}
2021-04-23T18:55:25Z
2021-05-06T15:57:44Z
CRITICAL
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074952', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427', 'https://security.netapp.com/advisory/ntap-20210604-0008/', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074950', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-10...
null
{'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
{'https://github.com/handlebars-lang/handlebars.js/commit/b6d3de7123eebba603e321f04afdbae608e8fea8', 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}
npm
GHSA-4852-vrh7-28rf
Reflected XSS in GraphQL Playground
### Impact **directly impacted:** - `graphql-playground-html@<1.6.22` - all unsanitized user input for `renderPlaygroundPage()` **all of our consuming packages** of `graphql-playground-html` are impacted: - `graphql-playground-middleware-express@<1.7.16` - unsanitized user input to `expressPlayground()` - `graphql-...
{'CVE-2020-4038'}
2021-11-04T17:11:46Z
2020-06-09T00:24:57Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4038', 'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7', 'https://github.com/prisma-labs/graphql-playground#security-details', 'https://github.com/prisma-labs/graphql-playground/security/advisories/GHSA-4852-vrh7-28rf', 'http...
null
{'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7'}
{'https://github.com/prisma-labs/graphql-playground/commit/bf1883db538c97b076801a60677733816cb3cfb7'}
npm
GHSA-425c-ccf3-3jrr
Critical severity vulnerability that affects slpjs
## Validator parsing discrepancy due to string encoding ### Impact A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the ...
{'CVE-2019-16762'}
2021-01-08T19:57:59Z
2019-11-15T23:10:35Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-16762', 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr', 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701', 'https://github.com/advisories/GHSA-425c-ccf3-3jrr'}
null
{'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701'}
{'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701'}
npm
GHSA-pfv6-prqm-85q8
Prototype Pollution in madlib-object-utils
The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
{'CVE-2022-24279'}
2022-04-22T20:50:33Z
2022-04-16T00:00:26Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24279', 'https://snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-2388572', 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f', 'https://github.com/Qwerios/madlib-object-utils'}
null
{'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'}
{'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'}
npm
GHSA-gxr4-xjj5-5px2
Potential XSS vulnerability in jQuery
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. `.html()`, `.append()`, and others) may execute untrusted code. ### Patches This problem is patched in jQuery 3.5.0. ### Workarounds To workaround the issue without upgrading, adding the follo...
{'CVE-2020-11022'}
2022-02-08T22:06:37Z
2020-04-29T22:18:55Z
MODERATE
null
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QPN2L2XVQGUA2V5HNQJWHK3APSK3VN7K/', 'https://github.com/advisories/GHSA-gxr4-xjj5-5px2', 'https://www.tenable.com/security/tns-2020-11', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00033.html', 'https://lists.f...
null
{'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}
{'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}
npm
GHSA-jw37-5gqr-cf9j
Server-Side Request Forgery in ftp-srv
### Background The FTP protocol creates two connections, one for commands and one for transferring data. This second data connection can be created in two ways, on the server by sending the PASV command, or on the client by sending the PORT command. The PORT command sends the IP and port for the server to connect to ...
{'CVE-2020-15152'}
2021-01-12T19:30:42Z
2020-08-17T21:44:54Z
CRITICAL
null
{'CWE-918'}
{'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3', 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5', 'https://www.npmjs.com/advisories/1445', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15152', 'https://www.npmjs.com/package/ftp-srv', 'https://g...
null
{'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca', 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3', 'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5'}
{'https://github.com/autovance/ftp-srv/commit/5508c2346cf23b24c20070ff2e8a47c647d3d5b5', 'https://github.com/autovance/ftp-srv/commit/e449e75219d918c400dec65b4b0759f60476abca', 'https://github.com/autovance/ftp-srv/commit/fb32b012c3baf48ee804e1dc36544cbba70b00d3'}
npm
GHSA-4fc4-chg7-h8gh
Unprotected dynamically loaded chunks
### Impact All dynamically loaded chunks receive an invalid integrity hash that is ignored by the browser, and therefore the browser cannot validate their integrity. This removes the additional level of protection offered by SRI for such chunks. Top-level chunks are unaffected. ### Patches This issue is patched in v...
{'CVE-2020-15262'}
2021-11-19T14:40:52Z
2020-10-19T20:02:44Z
LOW
null
{'CWE-345'}
{'https://github.com/waysact/webpack-subresource-integrity/issues/131', 'https://github.com/waysact/webpack-subresource-integrity/', 'https://github.com/waysact/webpack-subresource-integrity/security/advisories/GHSA-4fc4-chg7-h8gh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15262', 'https://github.com/waysact/webpack-...
null
{'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'}
{'https://github.com/waysact/webpack-subresource-integrity/commit/3d7090c08c333fcfb10ad9e2d6cf72e2acb7d87f'}