ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
npm
GHSA-257v-vj4p-3w2h
Regular Expression Denial of Service (ReDOS)
In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for linearly increasing input lengths for `hwb()` color strings. Strings reaching more than 5000 characters would see several milliseconds of processing time; strings reach...
{'CVE-2021-29060'}
2021-06-30T18:03:29Z
2021-06-22T01:14:09Z
MODERATE
null
{'CWE-770'}
{'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060', 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3', 'https://github.com/Qix-/color-string/releases/tag/1.5.5', 'https://www.npmjs.com/package/color-string', 'ht...
null
{'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'}
{'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'}
npm
GHSA-8px5-63x9-5c7p
Command Injection in pullit
Versions of `pullit` prior to 1.4.0 are vulnerable to Command Injection. The package does not validate input on git branch names and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 1.4.0 or later. ## Credits This vulnerability wa...
null
2022-04-01T19:35:31Z
2020-09-03T16:47:30Z
HIGH
null
{'CWE-77'}
{'https://github.com/jkup/pullit', 'https://github.com/jkup/pullit/issues/23', 'https://hackerone.com/reports/315773', 'https://www.npmjs.com/advisories/1004', 'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'}
null
{'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'}
{'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'}
npm
GHSA-r9w3-g83q-m6hq
Prototype Pollution in deepmerge-ts
deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround.
{'CVE-2022-24802'}
2022-04-13T16:28:10Z
2022-04-01T17:26:03Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24802', 'https://github.com/RebeccaStevens/deepmerge-ts', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b', 'https://github.com/Re...
null
{'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b'}
{'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b'}
npm
GHSA-55xv-f85c-248q
Regular Expression Denial of Service (ReDoS) in jsx-slack
jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack. ### Impact If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources. ```javascript /*...
{'CVE-2021-43838'}
2022-01-04T19:52:06Z
2021-12-17T19:59:02Z
LOW
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43838', 'https://github.com/yhatt/jsx-slack/', 'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'}
null
{'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'}
{'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'}
npm
GHSA-59r9-6jp6-jcm7
XSS vulnerability in GraphQL Playground from untrusted schemas
## GraphQL Playground introspection schema template injection attack: Advisory Statement This is a security advisory for an XSS vulnerability in `graphql-playground`. A similar vulnerability affects `graphiql`, the package from which `graphql-playground` was forked. There is a corresponding `graphiql` [advisory](http...
{'CVE-2021-41249'}
2021-11-04T19:36:13Z
2021-11-08T18:06:09Z
HIGH
null
{'CWE-79'}
{'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41249', 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability', 'https://github.com/graphql/graphql-playground', 'https:/...
null
{'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'}
{'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'}
npm
GHSA-j3f7-7rmc-6wqj
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified eithe...
{'CVE-2021-40831'}
2022-03-03T05:14:12.538986Z
2021-11-24T20:35:03Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.co...
null
{'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d'}
{'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186'}
npm
GHSA-j6px-jwvv-vpwq
Angular Expressions - Remote Code Execution
### Impact The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input. This time, the security of the package could be bypassed by using a more complex payload, using a `.constructor.c...
{'CVE-2021-21277'}
2021-02-01T15:00:53Z
2021-02-01T15:01:26Z
LOW
null
{'CWE-74'}
{'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://www.npmjs.com/package/angular-expressions', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21277', 'https://github.com/peerigon/angular...
null
{'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1'}
{'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1'}
npm
GHSA-9w6v-m7wp-jwg4
Http request which redirect to another hostname do not strip authorization header in @actions/http-client
### Impact If consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname The authorization header will get passed to the other domain. Note that since this library is for actions, t...
{'CVE-2020-11021'}
2021-08-25T21:03:11Z
2020-04-29T17:58:53Z
MODERATE
null
{'CWE-200'}
{'https://github.com/actions/http-client/', 'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4', 'https://github.com/actions/http-client/pull/27', 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021'}
null
{'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'}
{'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'}
npm
GHSA-77xq-cpvg-7xm2
Prototype pollution in @tsed/core
"This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program."
{'CVE-2020-7748'}
2021-04-20T17:41:36Z
2021-05-10T19:07:56Z
MODERATE
null
{'CWE-915'}
{'https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7748', 'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b', 'https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382'}
null
{'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b'}
{'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b'}
npm
GHSA-x55w-vjjp-222r
Inefficient Regular Expression in inflect
inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3820'}
2022-05-04T03:41:09Z
2021-09-29T17:12:19Z
MODERATE
null
{'CWE-400', 'CWE-697', 'CWE-1333'}
{'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a', 'https://github.com/pksunkara/inflect', 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3820'}
null
{'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b'}
{'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b'}
npm
GHSA-g694-m8vq-gv9h
URL Confusion When Scheme Not Supplied in medialize/uri.js
Medialize is a Javascript URL mutation library. When parsing a URL without a scheme and with excessive slashes, like ///www.example.com, URI.js will parse the hostname as null and the path as /www.example.com. Such behaviour is different from that exhibited by browsers, which will parse ///www.example.com as http://www...
{'CVE-2022-1233'}
2022-04-15T02:53:33Z
2022-04-05T00:00:17Z
MODERATE
null
{'CWE-115', 'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1233', 'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277', 'https://github.com/medialize/uri.js', 'https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c'}
null
{'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277'}
{'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277'}
npm
GHSA-hj48-42vr-x3v9
Regular Expression Denial of Service in path-parse
Affected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity.
{'CVE-2021-23343'}
2021-08-10T15:34:57Z
2021-08-10T15:33:47Z
MODERATE
null
{'CWE-400'}
{'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23343', 'https://github.com/jbgutierrez/path-parse', 'https://github.com/jbgutierrez/path-parse/pull/10', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028', 'https://lists.apache...
null
{'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7'}
{'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7'}
npm
GHSA-h5q8-5697-9p9h
Cross-Site Request Forgery in express-cart
The express-cart package through 1.1.10 for Node.js allows CSRF.
{'CVE-2020-22403'}
2021-08-30T17:02:20Z
2021-08-30T17:22:15Z
HIGH
null
{'CWE-352'}
{'https://security.netapp.com/advisory/ntap-20210909-0004/', 'https://hackerone.com/reports/395944', 'https://www.npmjs.com/package/express-cart', 'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb', 'https://github.com/mrvautin/expressCart', 'https://nvd.nist.gov/vuln/detail/CVE-2...
null
{'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb'}
{'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb'}
npm
GHSA-w973-2qcc-p78x
User Impersonation in converse.js
Versions of `converse.js` prior to 1.0.7 for 1.x or 2.0.5 for 2.x are vulnerable to User Impersonation. The package provides an incorrect implementation of [XEP-0280: Message Carbons](https://xmpp.org/extensions/xep-0280.html) that allows a remote attacker to impersonate any user, including contacts, in the vulnerable ...
{'CVE-2017-5858'}
2021-09-28T16:56:35Z
2020-09-11T21:19:09Z
MODERATE
null
{'CWE-20', 'CWE-346'}
{'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572', 'https://www.openwall.com/lists/oss-security/2017/02/09/29', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5858', 'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf', 'http://openwall.com/lists/oss-se...
null
{'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'}
{'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'}
npm
GHSA-hxmg-hm46-cf62
Remote code execution in mongo-express
mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.
{'CVE-2020-24391'}
2021-03-31T20:14:37Z
2021-04-13T15:41:01Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-24391', 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a', 'https://github.com/mongodb-js/query-parser/issues/16'}
null
{'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}
{'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'}
npm
GHSA-4449-hg37-77v8
Command injection in total.js
There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with t...
{'CVE-2020-28494'}
2021-07-28T18:57:23Z
2021-02-05T20:43:27Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672', 'https://www.npmjs.com/package/total.js'}
null
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'}
{'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'}
npm
GHSA-qffw-8wg7-h665
Command injection in git-interface
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would the...
{'CVE-2022-1440'}
2022-04-29T17:22:43Z
2022-04-23T00:03:01Z
CRITICAL
null
{'CWE-78'}
{'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d', 'https://github.com/yarkeev/git-interface'}
null
{'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
{'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}
npm
GHSA-h3rx-g5c9-8q4x
Prototype Pollution in bmoor
The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7736'}
2021-04-22T22:35:49Z
2021-05-10T18:37:26Z
HIGH
null
{'CWE-1321'}
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://www.npmjs.com/package/bmoor', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7736'}
null
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'}
{'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'}
npm
GHSA-qwqc-28w3-fww6
Message Signature Bypass in openpgp
Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). F...
{'CVE-2019-9153'}
2021-08-17T22:06:12Z
2019-08-23T21:42:20Z
HIGH
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://www.npmjs.com/advisories/1160', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult....
null
{'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}
{'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}
npm
GHSA-84fq-6626-w5fg
CORS Token Disclosure in crumb
When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes ...
{'CVE-2014-7193'}
2020-08-31T18:07:28Z
2017-10-24T18:33:36Z
MODERATE
null
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure', 'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4...
null
{'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}
{'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'}
npm
GHSA-xcvv-84j5-jw9h
Prototype Pollution in assign-deep
Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 0.4.7 or later.
{'CVE-2018-3720'}
2020-08-31T18:28:34Z
2018-07-26T15:12:31Z
LOW
null
{'CWE-471'}
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://hackerone.com/reports/310707', 'https://www.npmjs.com/advisories/579', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3720'}
null
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'}
{'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'}
npm
GHSA-c7pp-g2v2-2766
DOM-based XSS in gmail-js
Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor. ## Recommendation Update to version 0.6.5 or later.
{'CVE-2016-1000228'}
2021-09-23T21:31:53Z
2020-09-01T15:32:04Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/125', 'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://github.com/KartikTalwar/gmail.js', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
null
{'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
{'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'}
npm
GHSA-4cpg-3vgw-4877
Prototype pollution in Plist
Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
{'CVE-2022-22912'}
2022-03-23T15:06:35Z
2022-02-18T00:00:33Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/TooTallNate/plist.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52', 'https://github.com/TooTallNate/plist.js/issues/114'}
null
{'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'}
{'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'}
npm
GHSA-c9g6-9335-x697
Improper Input Validation in SocksJS-Node
Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20.
{'CVE-2020-7693'}
2021-04-06T21:47:25Z
2021-04-13T15:27:51Z
MODERATE
null
{'CWE-20'}
{'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16', 'https://www.npmjs.com/package/sockjs', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448', 'https://github.com/andsnw/sockjs-dos-py', 'https://github.com/sockjs/sockjs-node/pul...
null
{'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}
{'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'}
npm
GHSA-pwhf-39xg-4rxw
Script injection
### Impact A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same ...
{'CVE-2021-32660'}
2021-06-04T19:23:33Z
2021-06-04T19:09:35Z
MODERATE
null
{'CWE-77', 'CWE-434'}
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660'}
null
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
{'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'}
npm
GHSA-rj44-gpjc-29r7
[thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values
### Impact Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled) ### Patches [A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0 ### Workarounds By default, EGF parse functions ...
{'CVE-2021-21412'}
2021-03-30T20:20:04Z
2021-04-06T17:22:41Z
MODERATE
null
{'CWE-78'}
{'https://www.npmjs.com/package/@thi.ng/egf', 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412', 'https://github.com/thi-ng/umbrella/commit/88f61656e5...
null
{'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}
{'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'}
npm
GHSA-p4pj-mg4r-x6v4
Denial of Service in uap-core
## Impact Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings. ## Patches Please update uap-core to >= v0.11.0 Downs...
{'CVE-2021-21317'}
2021-02-16T17:45:27Z
2021-02-02T15:46:38Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://www.npmjs.com/package/uap-core', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c', 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4'}
null
{'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'}
{'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'}
npm
GHSA-pfj7-2qfw-vwgm
Path traversal in translator module in NodeBB
### Impact Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory. ### Patches The vulnerability has been patched as of v1.18.5. ### Workarounds Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive th...
{'CVE-2021-43788'}
2021-11-30T14:35:14Z
2021-11-30T22:20:43Z
MODERATE
null
{'CWE-22'}
{'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB'}
null
{'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'}
{'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'}
npm
GHSA-rc8h-3fv6-pxv8
Denial of Service in hapi
Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability. The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers. This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hap...
{'CVE-2015-9241'}
2020-08-31T18:09:46Z
2018-06-07T19:43:15Z
HIGH
null
{'CWE-400'}
{'https://nodesecurity.io/advisories/63', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://nodesecurity.io/advisories/64', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'...
null
{'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'}
{'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'}
npm
GHSA-fxwf-45c7-4ppr
Prototype pollution in object-hierarchy-access
Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28270'}
2022-01-07T16:07:29Z
2021-10-12T16:40:58Z
CRITICAL
null
{'CWE-915', 'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270', 'https://github.com/mjpclab/object-hierarchy-access', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270', 'https://www.whitesourcesoftware.co...
null
{'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'}
{'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'}
npm
GHSA-wxj7-97fp-j53j
Exposure of Resource to Wrong Sphere in Zip-Local
The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory.
{'CVE-2021-23484'}
2022-02-07T21:20:28Z
2022-02-01T00:46:01Z
CRITICAL
null
{'CWE-668', 'CWE-29'}
{'https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477', 'https://github.com/Mostafa-Samir/zip-local/blob/master/main.js%23L365', 'https://github.com/Mostafa-Samir/zip-local', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484', 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}
null
{'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}
{'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}
npm
GHSA-3hjg-vc7r-rcrw
Denial of Service vulnerability in @podium/layout and @podium/proxy
### Impact An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. ### Patches `@podium/layout` which is the main way developers/users are vulnerable to this exploit, has be...
{'CVE-2022-24822'}
2022-04-07T15:20:23Z
2022-04-07T15:20:23Z
HIGH
null
{'CWE-248'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24822', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/releases/tag/v4.6.110', 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw', 'https://github.com/podium-lib/proxy/rel...
null
{'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}
{'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf'}
npm
GHSA-934w-hvj4-7fr6
Path Traversal in jsreport-chrome-pdf
This affects the package jsreport-chrome-pdf before 1.10.0.
{'CVE-2020-7762'}
2021-08-02T15:38:02Z
2021-04-13T15:25:15Z
MODERATE
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762', 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}
null
{'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}
{'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'}
npm
GHSA-4vvg-x86p-mvqc
Leaking of user information on Cross-Domain communication in sysend
### Impact Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted. This is not a big impact because it happens only on the same browser. ### Patches It has been patched in version 1.10.0 ### Workarounds The only workaround is to not send sensitive inf...
{'CVE-2022-24762'}
2022-03-28T17:26:41Z
2022-03-14T22:43:23Z
MODERATE
null
{'CWE-200'}
{'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc', 'https://github.com/jcubic/sysend.js/issues/33', 'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a', 'https://github.com/jcubic/sysend.js/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762', 'https://gith...
null
{'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a'}
{'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a'}
npm
GHSA-9gj3-hwp5-pmwc
XSS in the `altField` option of the Datepicker widget in jquery-ui
### Impact Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { altField: "<img onerror='doEvilThing()' src='/404' />", } ); ``` will call the `doEvi...
{'CVE-2021-41182'}
2021-10-27T17:00:10Z
2021-10-26T14:55:02Z
MODERATE
null
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://github.com/jquery/jquery-ui', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182', 'https://blog.jqueryui.com/2021/10/jq...
null
{'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}
{'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'}
npm
GHSA-cc2p-4jhr-xhhx
False-positive validity for NFT1 genesis transactions in SLPJS
### Impact In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token ty...
{'CVE-2020-15130'}
2021-01-07T23:43:05Z
2020-07-30T14:58:42Z
CRITICAL
null
{'CWE-697'}
{'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx', 'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'}
null
{'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}
{'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'}
npm
GHSA-7r2x-3qcm-8vfw
Downloads Resources over HTTP in herbivore
Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivo...
{'CVE-2016-10665'}
2021-01-08T19:14:20Z
2019-02-18T23:44:36Z
HIGH
null
{'CWE-311'}
{'https://github.com/samatt/herbivore', 'https://nodesecurity.io/advisories/258', 'https://www.npmjs.com/advisories/258', 'https://github.com/advisories/GHSA-7r2x-3qcm-8vfw', 'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10665'}
null
{'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3'}
{'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3'}
npm
GHSA-cph5-m8f7-6c5x
Incorrect Comparison in axios
axios is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3749'}
2021-09-09T13:39:38Z
2021-09-01T18:23:02Z
HIGH
null
{'CWE-400', 'CWE-697'}
{'https://www.npmjs.com/package/axios', 'https://github.com/axios/axios', 'https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apac...
null
{'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929'}
{'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929'}
npm
GHSA-fx7m-j728-mjw3
Moderate severity vulnerability that affects uap-core
An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains ...
{'CVE-2018-20164'}
2021-09-10T20:12:01Z
2019-03-06T17:35:47Z
MODERATE
null
{'CWE-185'}
{'https://github.com/advisories/GHSA-fx7m-j728-mjw3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20164', 'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014', 'https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/', 'https://github.com/ua-parser/uap-core/issues/332', 'https://...
null
{'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014', 'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc'}
{'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc', 'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014'}
npm
GHSA-cv3v-7846-6pxm
Unauthorized File Access in node-git-server
Versions of `node-git-server` prior to 0.6.1 are vulnerable to Unauthorized File Access. It is possible to access any git repository by using absolute paths, which may allow attackers to access private repositories. ## Recommendation Upgrade to version 0.6.1 or later.
null
2021-09-29T19:59:01Z
2020-09-03T21:15:19Z
HIGH
null
{'CWE-552'}
{'https://snyk.io/vuln/SNYK-JS-NODEGITSERVER-474343', 'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43', 'https://github.com/gabrielcsapo/node-git-server/pull/62', 'https://www.npmjs.com/advisories/1214', 'https://github.com/gabrielcsapo/node-git-server'}
null
{'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43'}
{'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43'}
npm
GHSA-j636-crp3-m584
Cross-site Scripting in tableexport.jquery.plugin
There is a cross-site scripting vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. This can result in transmitting cookies to third-party servers and/or sending data from secure sessions to third-party servers.
{'CVE-2022-1291'}
2022-04-22T20:17:22Z
2022-04-11T00:00:22Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1291', 'https://github.com/hhurz/tableexport.jquery.plugin', 'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9', 'https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5'}
null
{'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9'}
{'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9'}
npm
GHSA-h4hr-7fg3-h35w
Denial of service in prismjs
The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the prism-asciidoc, prism-rest, prism-tap and prism-eiffel components.
{'CVE-2021-23341'}
2021-02-24T07:34:23Z
2021-03-01T19:52:33Z
HIGH
null
{'CWE-400'}
{'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609', 'https://github.com/PrismJS/prism/pull/2584', 'https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23341', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583', 'https://github.com/PrismJS/prism/iss...
null
{'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609'}
{'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609'}
npm
GHSA-p3hc-fv2j-rp68
Prototype Pollution in swiper
Versions of the package swiper before 6.5.1 are susceptible to prototype pollution.
{'CVE-2021-23370'}
2021-05-07T17:34:38Z
2021-05-10T15:36:30Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696', 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://github.com/no...
null
{'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178'}
{'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad'}
npm
GHSA-r5fx-8r73-v86c
Cross-Site Scripting in angular
Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled. ## Recommendation Upgrade to version 1.5.0-beta.1 or later.
{'CVE-2019-14863'}
2021-08-19T17:14:00Z
2020-02-14T23:08:49Z
MODERATE
null
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863', 'https://github.com/angular/angular.js/pull/12524', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://nvd.nist.gov/vuln/...
null
{'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82'}
{'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a'}
npm
GHSA-468q-v4jj-485h
Inefficient Regular Expression Complexity in taro
taro is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3804'}
2021-09-20T20:00:02Z
2021-09-20T20:09:59Z
HIGH
null
{'CWE-1333'}
{'https://github.com/nervjs/taro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804', 'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5', 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414'}
null
{'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5'}
{'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5'}
npm
GHSA-rjmf-p882-645m
Improper Certificate Validation
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering...
{'CVE-2021-20327'}
2021-04-12T18:51:10Z
2021-04-12T18:51:17Z
MODERATE
null
{'CWE-295'}
{'https://jira.mongodb.org/browse/NODE-3125', 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b', 'https://www.npmjs.com/advisories/1660', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'}
null
{'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}
{'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'}
npm
GHSA-2q4g-w47c-4674
Unpreventable top-level navigation
### Impact The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites. ### Patches * `11.0.0-beta.1` * `10.0.1` * `9.3.0...
{'CVE-2020-15174'}
2021-11-19T14:44:04Z
2020-10-06T14:24:04Z
HIGH
null
{'CWE-20', 'CWE-693'}
{'https://github.com/electron/electron', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15174', 'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b', 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674'}
null
{'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'}
{'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'}
npm
GHSA-3cqr-58rm-57f8
Arbitrary Code Execution in Handlebars
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's br...
{'CVE-2019-20920'}
2021-04-22T23:38:32Z
2022-02-10T20:38:19Z
HIGH
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/1316', 'https://www.npmjs.com/advisories/1324', 'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920', 'https://www.npmjs.com/package/handl...
null
{'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e'}
{'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e'}
npm
GHSA-2xm2-xj2q-qgpj
receiving subscription objects with deleted session
Original Message: Hi, I create objects with one client with an ACL of all users with a specific column value. Thats working so far. Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them. The client with the deleted session cant create new objects, which...
{'CVE-2020-15270'}
2021-10-06T22:02:05Z
2020-10-27T19:15:19Z
MODERATE
null
{'CWE-672'}
{'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15270', 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'}
null
{'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'}
{'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'}
npm
GHSA-6jqp-j69q-pm62
AWS Lambda parser is vulnerable to Regular Expression Denial of Service
index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string.
{'CVE-2018-7560'}
2022-04-25T22:28:16Z
2018-03-05T19:16:56Z
HIGH
null
{'CWE-20'}
{'https://github.com/myshenin/aws-lambda-multipart-parser', 'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560', 'https://github.com/advisories/GHSA-6jqp-j69q-pm62'}
null
{'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'}
{'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'}
npm
GHSA-g8m7-qhv7-9h5x
Path Traversal in serve-here.js
Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-09-22T18:35:22Z
2019-07-05T21:07:14Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/569966', 'https://www.npmjs.com/advisories/554', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://nodesecurity.io/advisories/554', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/pull/17'}
null
{'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}
{'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}
npm
GHSA-j977-g5vj-j27g
Cross-Site Scripting in scratch-svg-renderer
This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function.
{'CVE-2020-7750'}
2021-01-07T22:49:01Z
2020-11-09T14:21:17Z
HIGH
null
{'CWE-79'}
{'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750', 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497'}
null
{'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90'}
{'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90'}
npm
GHSA-pm9p-9926-w68m
Denial of Service in ecstatic
`ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory. [Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-v...
{'CVE-2016-10703'}
2021-09-16T18:15:09Z
2017-12-28T22:52:47Z
HIGH
null
{'CWE-20'}
{'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/', 'https://advisory.checkmarx.net/advisory/CX-2016-4450', 'https://github.com/advisories/GHSA-pm9p-9926-w68m', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703', 'https://www.npmjs.com/advisories/553', 'https://github.co...
null
{'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}
{'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'}
npm
GHSA-jxwx-85vp-gvwm
Regular Expression Denial of Service in jquery-validation
The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation. The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service) This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen)...
{'CVE-2021-21252'}
2021-01-13T18:21:42Z
2021-01-13T18:21:54Z
MODERATE
null
{'CWE-400'}
{'https://github.com/jquery-validation/jquery-validation/pull/2371', 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm', 'https://security.netapp.com/advisory/ntap-20210219-0005/', 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42c...
null
{'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d'}
{'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d'}
npm
GHSA-w2pf-g6r8-pg22
Placeholder property does not indicate HTML capable, could lead to inadvertent abuse
## Overview Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allo...
{'CVE-2019-20174'}
2021-08-19T16:48:59Z
2020-01-31T17:59:51Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-20174', 'https://auth0.com/docs/security/bulletins/cve-2019-20174', 'https://github.com/auth0/lock/releases/tag/v11.21.0', 'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5', 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'}
null
{'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5'}
{'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5'}
npm
GHSA-p72p-rjr2-r439
Server-Side Request Forgery in terriajs-server
Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-se...
null
2020-08-31T18:35:03Z
2019-05-29T20:24:02Z
HIGH
null
{'CWE-918'}
{'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5', 'https://www.npmjs.com/advisories/768', 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}
null
{'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}
{'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}
npm
GHSA-hwqf-gcqm-7353
Header injection in nodemailer
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
{'CVE-2021-23400'}
2021-06-30T17:38:02Z
2021-12-10T18:56:57Z
MODERATE
null
{'CWE-74'}
{'https://github.com/nodemailer/nodemailer/issues/1289', 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400'}
null
{'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'}
{'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'}
npm
GHSA-r3j7-x2g5-9gx6
Command injection in samba-client
The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec.
{'CVE-2021-27185'}
2022-05-03T03:44:37Z
2021-02-11T20:47:27Z
CRITICAL
null
{'CWE-74', 'CWE-77', 'CWE-78'}
{'https://advisory.checkmarx.net/advisory/CX-2021-4302', 'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0', 'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://github.com/eflexsystems/node-samba-client', 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc8...
null
{'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235'}
{'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235'}
npm
GHSA-3hw5-q855-g6cw
Prototype Pollution in Dojox
The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution. Affected Area: ``` //https://github.com/dojo/dojox/blob/master/jq.js#L442 var tobj = {}; for(var x in props){ // the "tobj" condition avoid copying properties in "props" // inherited from Object.prototype. For example, if o...
{'CVE-2020-5259'}
2021-02-18T19:45:35Z
2020-03-10T18:03:32Z
LOW
null
{'CWE-94'}
{'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw', 'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259'}
null
{'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'}
{'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'}
npm
GHSA-4hpf-3wq7-5rpr
Regular expression deinal of service (ReDoS) in is-my-json-valid
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
{'CVE-2018-1107'}
2021-04-23T20:09:28Z
2022-01-06T20:44:07Z
MODERATE
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1546357', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1107', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://snyk.io/vuln/npm:is-my-json-valid:20180214'}
null
{'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}
{'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}
npm
GHSA-8c8c-4vfj-rrpc
Reflected Cross-Site Scripting in redis-commander
Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander. Mitigating factors: Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0...
null
2022-03-04T22:02:50Z
2020-09-01T19:05:11Z
LOW
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/562', 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14', 'https://hackerone.com/reports/296377', 'https://github.com/joeferner/redis-commander', 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'}
null
{'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'}
{'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'}
npm
GHSA-35g4-qx3c-vjhx
Automatic room upgrade handling can be used maliciously to bridge a room non-consentually
### Impact If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event i...
{'CVE-2021-32659'}
2021-06-16T20:08:37Z
2021-06-21T17:09:22Z
MODERATE
null
{'CWE-306'}
{'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1', 'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32659', 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330', 'https://github.co...
null
{'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'}
{'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'}
npm
GHSA-6vfc-qv3f-vr6c
Uncontrolled Resource Consumption in markdown-it
### Impact Special patterns with length > 50K chars can slow down parser significantly. ```js const md = require('markdown-it')(); md.render(`x ${' '.repeat(150000)} x \nx`); ``` ### Patches Upgrade to v12.3.2+ ### Workarounds No. ### References Fix + test sample: https://github.com/markdown-it/markdown-it/c...
{'CVE-2022-21670'}
2022-01-19T18:25:52Z
2022-01-12T22:20:22Z
MODERATE
null
{'CWE-400'}
{'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101', 'https://github.com/markdown-it/markdown-it', 'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21670'}
null
{'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'}
{'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'}
npm
GHSA-j9xp-92vc-559j
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation If you are using `sequelize` 5.x, upgrade to version 5.8.11 or lat...
{'CVE-2019-10748'}
2021-08-18T22:09:33Z
2019-11-06T17:11:10Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/sequelize/sequelize/commit/a72a3f5,', 'https://www.npmjs.com/advisories/1018', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748', 'https://github.com/sequelize/sequelize/pull/11089,'}
null
{'https://github.com/sequelize/sequelize/commit/a72a3f5,'}
{'https://github.com/sequelize/sequelize/commit/a72a3f5,'}
npm
GHSA-49r3-3h96-rwj6
Cross-Site Scripting in ids-enterprise
Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript. ## Recommendation Upgrade to version 4.18.2 or later
null
2020-08-31T18:41:54Z
2019-06-13T19:09:31Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/956', 'https://github.com/infor-design/enterprise-ng/issues/503', 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}
null
{'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}
{'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}
npm
GHSA-q8pj-2vqx-8ggc
Denial of service in css-what
The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
{'CVE-2021-33587'}
2021-12-02T17:48:49Z
2021-06-07T22:11:39Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33587', 'https://github.com/fb55/css-what', 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655', 'https://github.com/fb55/css-what/releases/tag/v5.0.1', 'https://security.netapp.com/advisory/ntap-20210706-0007/'}
null
{'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655'}
{'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655'}
npm
GHSA-7pr3-p5fm-8r9x
LiveQuery publishes user session tokens in parse-server
### Impact For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload. ### Patch...
{'CVE-2021-41109'}
2021-09-30T16:43:12Z
2021-09-30T17:09:47Z
HIGH
null
{'CWE-200'}
{'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559', 'https://github.com/parse-community/parse-server/releases/tag/4.10.4', 'https://github.com/parse-community/parse-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109', 'https://github.com/parse-community/parse-serve...
null
{'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'}
{'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'}
npm
GHSA-g74r-ffvr-5q9f
Memory Exposure in concat-stream
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()` Versions <1.3.0 are not affected due to not using unguarded Buffer constructor. ## Recommendation Update to version 1.5.2, 1.4.11, 1.3.2 or later. If you are unable to update make sure user ...
null
2020-08-31T18:29:17Z
2019-06-03T17:26:44Z
MODERATE
null
{'CWE-200'}
{'https://github.com/maxogden/concat-stream/pull/47', 'https://nodesecurity.io/advisories/597', 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'}
null
{'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'}
{'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'}
npm
GHSA-5fg8-2547-mr8q
Misinterpretation of malicious XML input
### Impact xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications. ### Patches Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0...
{'CVE-2021-32796'}
2022-01-04T19:36:30Z
2021-08-03T16:57:05Z
MODERATE
null
{'CWE-116'}
{'https://www.npmjs.com/package/@xmldom/xmldom', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b', 'https://github.com/xmldom/xmldom', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://mattermost.com/...
null
{'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}
{'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'}
npm
GHSA-fq6p-x6j3-cmmq
Denial of service in three
This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var tim...
{'CVE-2020-28496'}
2021-02-24T07:40:52Z
2021-03-01T19:57:16Z
HIGH
null
{'CWE-400'}
{'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931'}
null
{'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}
{'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'}
npm
GHSA-8948-ffc6-jg52
Insecure Default Configuration in redbird
Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable. ## Recommendation Upgrade to version 0.9.1 or later.
null
2021-08-04T20:58:53Z
2019-06-06T15:32:21Z
MODERATE
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/828', 'https://github.com/OptimalBits/redbird/pull/207', 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'}
null
{'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}
{'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}
npm
GHSA-mpgr-2cx9-327h
Information disclosure in SSB-DB
### Impact _What kind of vulnerability is it? Who is impacted?_ Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately. **There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.** The `get()` method is supposed to only de...
{'CVE-2020-4045'}
2021-01-08T20:12:11Z
2020-06-11T21:09:04Z
HIGH
null
{'CWE-200'}
{'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}
null
{'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}
{'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'}
npm
GHSA-2598-2f59-rmhq
SQL Injection in sequelize
Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. ## Recommendation Upgrade to version 3.35.1 or later.
{'CVE-2019-10749'}
2021-08-18T22:10:20Z
2019-11-08T17:05:17Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://www.npmjs.com/advisories/1017', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
null
{'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
{'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}
npm
GHSA-cf4h-3jhx-xvhq
Arbitrary Code Execution in underscore
The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized.
{'CVE-2021-23358'}
2021-08-25T17:37:24Z
2021-05-06T16:09:43Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23358', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://github.com/jashkenas/underscore', 'https://www.tenable.com/security/tns-2021-14', 'https://www.debian.org/security/2021/dsa-4883', 'https://github.com/jashkenas/underscore/pull/2...
null
{'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'}
{'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'}
npm
GHSA-4g77-cvgw-grvw
Prototype Pollution in putil-merge
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-J...
{'CVE-2021-23470'}
2022-02-11T16:15:46Z
2022-02-05T00:00:31Z
HIGH
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487', 'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://github.com/panates/putil-merge/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470'}
null
{'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'}
{'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'}
npm
GHSA-cq8r-fc3q-6hg2
Denial of Service (DoS) via the unsetByPath function in jsjoints
The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function.
{'CVE-2020-28479'}
2021-04-06T20:51:59Z
2021-04-13T15:29:40Z
HIGH
null
{'CWE-400'}
{'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479', 'https://snyk.io/vul...
null
{'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}
{'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'}
npm
GHSA-qc22-qwm9-j8rx
Remote Code Execution in npm-groovy-lint
Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable.
null
2021-12-20T16:57:06Z
2021-12-20T16:59:31Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/nvuillam/npm-groovy-lint', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/nvuillam/npm-groovy-lint/issues/194'}
null
{'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}
{'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'}
npm
GHSA-p6jh-p7q8-pcrg
Prototype Pollution in nodee-utils
All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function.
{'CVE-2020-7722'}
2021-05-05T17:59:12Z
2021-05-06T18:26:21Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'}
null
{'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'}
{'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'}
npm
GHSA-566m-qj78-rww5
Regular Expression Denial of Service in postcss
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
{'CVE-2021-23382'}
2022-02-23T20:31:15Z
2022-01-07T00:21:36Z
MODERATE
null
{'CWE-400'}
{'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641', 'https://github.com/postcss/postcss/releases/tag/7.0.36', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382'}
null
{'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'}
{'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'}
npm
GHSA-cqqh-49mx-fq63
Prototype Pollution in merge
merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3645'}
2021-09-13T19:14:06Z
2021-09-13T20:16:54Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/viking04/merge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'}
null
{'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'}
{'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'}
npm
GHSA-265q-28rp-chq5
Insecure Entropy Source - Math.random() in node-uuid
Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's. ## Recommendation Update to version 1.4.4 or later.
{'CVE-2015-8851'}
2021-08-23T15:25:55Z
2020-04-16T03:14:50Z
HIGH
null
{'CWE-331'}
{'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://github.com/broofa/node-uuid/issues/122', 'https://nodesecurity.io/advisories/93', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://www.npmjs.com/advisories/93...
null
{'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'}
{'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'}
npm
GHSA-3xph-cp8f-2229
Prototype Pollution in @fabiocaccamo/utils.js
utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
{'CVE-2021-3815'}
2021-12-13T13:10:41Z
2021-12-10T20:31:32Z
HIGH
null
{'CWE-1321'}
{'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://github.com/fabiocaccamo/utils.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'}
null
{'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}
{'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'}
npm
GHSA-xrjf-phvv-r4vr
Command injection in strapi
When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user...
{'CVE-2022-0764'}
2022-03-09T20:26:21Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-77', 'CWE-78'}
{'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764', 'https...
null
{'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}
{'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}
npm
GHSA-wvh7-5p38-2qfc
Storing Password in Local Storage
The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users...
null
2021-09-22T21:05:43Z
2020-07-23T18:20:10Z
MODERATE
null
{'CWE-256'}
{'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS', 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
null
{'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
{'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'}
npm
GHSA-6m8p-4fxj-pgc2
OS Command Injection in mversion
The issue occurs because tagName user input is formatted inside the exec function is executed without any checks.
{'CVE-2020-7688'}
2021-05-11T19:56:27Z
2021-05-17T21:01:08Z
MODERATE
null
{'CWE-78'}
{'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482', 'https://github.com/418sec/huntr/pull/102', 'https://snyk.io/vuln/SNYK-JS-MVERSION-573174', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688'}
null
{'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}
{'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'}
npm
GHSA-68hw-vfh7-xvg8
Forced Logout in keycloak-connect
Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely. ## Recommendation Upgrade to version 4.4.0 or later.
{'CVE-2019-10157'}
2021-08-16T15:25:07Z
2019-06-13T20:38:09Z
MODERATE
null
{'CWE-287', 'CWE-345'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'http://www.securityfocus.com/bid/108734', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'https://www.npmjs.com/advisories/978', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157', 'https://github.com/keycloak/keycloak-nodejs-connect/commit/55...
null
{'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}
{'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}
npm
GHSA-p6rw-44q7-3fw4
Stored XSS in Jupyter nbdime
### Impact Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected. ### Patches Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package. #### Pytho...
{'CVE-2021-41134'}
2022-03-03T05:14:20.151154Z
2021-11-08T18:09:27Z
HIGH
null
{'CWE-79'}
{'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea', 'https://github.com/jupyter/nbdime', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'}
null
{'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
{'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'}
npm
GHSA-5rwj-j5m3-3chj
Missing Release of Memory after Effective Lifetime in detect-character-encoding
### Impact In detect-character-encoding v0.3.0 and earlier, allocated memory is not released. ### Patches The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1). ### CVSS score [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/...
{'CVE-2021-39176'}
2021-10-21T14:28:07Z
2021-09-01T18:25:16Z
HIGH
null
{'CWE-401'}
{'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://github.com/sonicdoe/detect-character-encoding', 'https://github....
null
{'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'}
{'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'}
npm
GHSA-jf5r-8hm2-f872
Incorrect hostname / protocol due to unstripped leading control characters.
Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL. If url-parse is used in security decisi...
{'CVE-2022-0691'}
2022-03-11T22:47:09Z
2022-02-22T00:00:30Z
MODERATE
null
{'CWE-639'}
{'https://github.com/unshiftio/url-parse', 'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691'}
null
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'}
{'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'}
npm
GHSA-897m-rjf5-jp39
Prototype Pollution in copy-props
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
{'CVE-2020-28503'}
2021-03-24T23:59:08Z
2022-01-06T20:35:05Z
HIGH
null
{'CWE-1321'}
{'https://github.com/gulpjs/copy-props/pull/7', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047', 'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870'}
null
{'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'}
{'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'}
npm
GHSA-9qmh-276g-x5pj
Prototype Pollution in immer
## Overview Affected versions of immer are vulnerable to Prototype Pollution. ## Proof of exploit ``` const {applyPatches, enablePatches} = require("immer"); enablePatches(); let obj = {}; console.log("Before : " + obj.polluted); applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]); /...
{'CVE-2020-28477'}
2021-01-20T21:27:33Z
2021-01-20T21:27:56Z
HIGH
null
{'CWE-471'}
{'https://github.com/immerjs/immer/issues/738', 'https://www.npmjs.com/package/immer', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://nvd.nist.gov/vul...
null
{'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'}
{'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'}
npm
GHSA-35jh-r3h4-6jhm
Command Injection in lodash
`lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
{'CVE-2021-23337'}
2022-02-08T21:35:09Z
2021-05-06T16:05:51Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://github.com/lodash/lodash', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'http...
null
{'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'}
{'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'}
npm
GHSA-9vxc-g2jx-qj3p
API Admin Auth Weakness in tomato
Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less tha...
{'CVE-2013-7379'}
2021-09-23T21:00:28Z
2020-08-31T22:59:07Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://github.com/leizongmin/tomato', 'https://www.npmjs.com/advisories/38', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'http://www.openwall.com/lists/os...
null
{'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}
{'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'}
npm
GHSA-qmw8-3v4g-gwj4
Prefix escape
### Impact By crafting a specific URL, it is possible to escape the prefix of the proxied backend service. If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is. [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://ww...
{'CVE-2021-21321'}
2021-03-02T03:32:13Z
2021-03-03T01:52:05Z
CRITICAL
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
null
{'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
{'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'}
npm
GHSA-h9mj-fghc-664w
Denial of Service in mqtt
Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition. The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor. ## Proof of Concept The following i...
{'CVE-2017-10910'}
2021-09-14T17:16:40Z
2017-12-28T22:51:58Z
MODERATE
null
{'CWE-674'}
{'https://github.com/mqttjs/MQTT.js', 'https://jvn.jp/en/jp/JVN45494523/index.html', 'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://github.com/...
null
{'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}
{'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'}
npm
GHSA-5w9c-rv96-fr7g
Removal of functional code in faker.js
Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/G...
null
2022-03-22T20:33:40Z
2022-03-22T19:28:24Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://www.npmjs.com/package/faker', 'https://www.npmjs.com/package/@faker-js/faker', 'https://github.com/Marak/Faker.js', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/issue...
null
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
{'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'}
npm
GHSA-mmj4-777p-fpq9
Validation bypass in frourio-express
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformer...
{'CVE-2022-23624'}
2022-02-14T22:32:36Z
2022-02-07T22:38:37Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express', 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
null
{'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
{'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}
npm
GHSA-4vmm-mhcq-4x9j
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution. ## Recommendation Update to version 3.1.1 or later.
null
2021-08-16T16:06:38Z
2019-06-14T16:15:14Z
CRITICAL
null
null
{'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://snyk.io/vuln/npm:constantinople:20180421', 'https://www.npmjs.com/advisories/568', 'https://nodesecurity.io/advisories/568', 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'}
null
{'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}
{'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}
npm
GHSA-gpfj-4j6g-c4w9
Clipboard-based DOM-XSS
### Impact A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of Java...
{'CVE-2021-37700'}
2021-08-30T23:16:08Z
2021-08-12T20:42:17Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37700', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://github.com/github/paste-markdown', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4', 'https://github.com/github/paste-markdown/security/advisories/GHSA-g...
null
{'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'}
{'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'}
npm
GHSA-pxcf-v868-m492
Injection and Cross-site Scripting in osm-static-maps
This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which give...
{'CVE-2020-7749'}
2021-08-02T15:31:49Z
2021-05-10T18:43:45Z
HIGH
null
{'CWE-74', 'CWE-79'}
{'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/pull/24', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142', 'https://nvd.nist.gov/vuln/detai...
null
{'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'}
{'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'}