ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
npm | GHSA-257v-vj4p-3w2h | Regular Expression Denial of Service (ReDOS) | In the npm package `color-string`, there is a ReDos (Regular Expression Denial of Service) vulnerability regarding an exponential time complexity for
linearly increasing input lengths for `hwb()` color strings.
Strings reaching more than 5000 characters would see several
milliseconds of processing time; strings reach... | {'CVE-2021-29060'} | 2021-06-30T18:03:29Z | 2021-06-22T01:14:09Z | MODERATE | null | {'CWE-770'} | {'https://github.com/yetingli/SaveResults/blob/main/js/color-string.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29060', 'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3', 'https://github.com/Qix-/color-string/releases/tag/1.5.5', 'https://www.npmjs.com/package/color-string', 'ht... | null | {'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'} | {'https://github.com/Qix-/color-string/commit/0789e21284c33d89ebc4ab4ca6f759b9375ac9d3'} |
npm | GHSA-8px5-63x9-5c7p | Command Injection in pullit | Versions of `pullit` prior to 1.4.0 are vulnerable to Command Injection. The package does not validate input on git branch names and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system.
## Recommendation
Upgrade to version 1.4.0 or later.
## Credits
This vulnerability wa... | null | 2022-04-01T19:35:31Z | 2020-09-03T16:47:30Z | HIGH | null | {'CWE-77'} | {'https://github.com/jkup/pullit', 'https://github.com/jkup/pullit/issues/23', 'https://hackerone.com/reports/315773', 'https://www.npmjs.com/advisories/1004', 'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'} | null | {'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'} | {'https://github.com/jkup/pullit/commit/4fec455774ee08f4dce0ef2ef934ffcc37219bfb'} |
npm | GHSA-r9w3-g83q-m6hq | Prototype Pollution in deepmerge-ts | deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround. | {'CVE-2022-24802'} | 2022-04-13T16:28:10Z | 2022-04-01T17:26:03Z | HIGH | null | {'CWE-915', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24802', 'https://github.com/RebeccaStevens/deepmerge-ts', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b', 'https://github.com/Re... | null | {'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b'} | {'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72', 'https://github.com/RebeccaStevens/deepmerge-ts/commit/d637db7e4fb2bfb113cb4bc1c85a125936d7081b'} |
npm | GHSA-55xv-f85c-248q | Regular Expression Denial of Service (ReDoS) in jsx-slack | jsx-slack v4.5.1 and earlier versions are vulnerable to a regular expression denial-of-service (ReDoS) attack.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag, an internal regular expression for escaping characters may consume an excessive amount of computing resources.
```javascript
/*... | {'CVE-2021-43838'} | 2022-01-04T19:52:06Z | 2021-12-17T19:59:02Z | LOW | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43838', 'https://github.com/yhatt/jsx-slack/', 'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d', 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'} | null | {'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'} | {'https://github.com/yhatt/jsx-slack/commit/36e4a10405e4c7745333e245fcc5029c02c7065d'} |
npm | GHSA-59r9-6jp6-jcm7 | XSS vulnerability in GraphQL Playground from untrusted schemas | ## GraphQL Playground introspection schema template injection attack: Advisory Statement
This is a security advisory for an XSS vulnerability in `graphql-playground`.
A similar vulnerability affects `graphiql`, the package from which `graphql-playground` was forked. There is a corresponding `graphiql` [advisory](http... | {'CVE-2021-41249'} | 2021-11-04T19:36:13Z | 2021-11-08T18:06:09Z | HIGH | null | {'CWE-79'} | {'https://github.com/graphql/graphiql/security/advisories/GHSA-x4r7-m2q9-69c8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41249', 'https://github.com/graphql/graphiql/blob/main/docs/security/2021-introspection-schema-xss.md#2-more-details-on-the-vulnerability', 'https://github.com/graphql/graphql-playground', 'https:/... | null | {'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'} | {'https://github.com/graphql/graphql-playground/commit/b8a956006835992f12c46b90384a79ab82bcadad'} |
npm | GHSA-j3f7-7rmc-6wqj | Improper certificate management in AWS IoT Device SDK v2 | The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on macOS systems. Additionally, SNI validation is also not enabled when the CA has been “overridden”. TLS handshakes will thus succeed if the peer can be verified eithe... | {'CVE-2021-40831'} | 2022-03-03T05:14:12.538986Z | 2021-11-24T20:35:03Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.co... | null | {'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d'} | {'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/22f1989f5bdb0bdd9c912a5a2d255ee6c0854f68', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/5aef82573202309063eb540b72cee0e565f85a2d', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/46375e9b1bfb34109b9ff3b1eff9c770f9daa186'} |
npm | GHSA-j6px-jwvv-vpwq | Angular Expressions - Remote Code Execution | ### Impact
The vulnerability, reported by GoSecure Inc, allows Remote Code Execution, if you call `expressions.compile(userControlledInput)` where `userControlledInput` is text that comes from user input.
This time, the security of the package could be bypassed by using a more complex payload, using a `.constructor.c... | {'CVE-2021-21277'} | 2021-02-01T15:00:53Z | 2021-02-01T15:01:26Z | LOW | null | {'CWE-74'} | {'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1', 'http://blog.angularjs.org/2016/09/angular-16-expression-sandbox-removal.html', 'https://www.npmjs.com/package/angular-expressions', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21277', 'https://github.com/peerigon/angular... | null | {'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1'} | {'https://github.com/peerigon/angular-expressions/commit/07edb62902b1f6127b3dcc013da61c6316dd0bf1'} |
npm | GHSA-9w6v-m7wp-jwg4 | Http request which redirect to another hostname do not strip authorization header in @actions/http-client | ### Impact
If consumers of the http-client:
1. make an http request with an authorization header
2. that request leads to a redirect (302) and
3. the redirect url redirects to another domain or hostname
The authorization header will get passed to the other domain.
Note that since this library is for actions, t... | {'CVE-2020-11021'} | 2021-08-25T21:03:11Z | 2020-04-29T17:58:53Z | MODERATE | null | {'CWE-200'} | {'https://github.com/actions/http-client/', 'https://github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4', 'https://github.com/actions/http-client/pull/27', 'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11021'} | null | {'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'} | {'https://github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53a'} |
npm | GHSA-77xq-cpvg-7xm2 | Prototype pollution in @tsed/core | "This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program." | {'CVE-2020-7748'} | 2021-04-20T17:41:36Z | 2021-05-10T19:07:56Z | MODERATE | null | {'CWE-915'} | {'https://github.com/TypedProject/tsed/blob/production/packages/core/src/utils/deepExtends.ts%23L36', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7748', 'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b', 'https://snyk.io/vuln/SNYK-JS-TSEDCORE-1019382'} | null | {'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b'} | {'https://github.com/TypedProject/tsed/commit/1395773ddac35926cf058fc6da9fb8e82266761b'} |
npm | GHSA-x55w-vjjp-222r | Inefficient Regular Expression in inflect | inflect is customizable inflections for nodejs. inflect is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3820'} | 2022-05-04T03:41:09Z | 2021-09-29T17:12:19Z | MODERATE | null | {'CWE-400', 'CWE-697', 'CWE-1333'} | {'https://huntr.dev/bounties/4612b31a-072b-4f61-a916-c7e4cbc2042a', 'https://github.com/pksunkara/inflect', 'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3820'} | null | {'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b'} | {'https://github.com/pksunkara/inflect/commit/a9a0a8e9561c3487854c7cae42565d9652ec858b'} |
npm | GHSA-g694-m8vq-gv9h | URL Confusion When Scheme Not Supplied in medialize/uri.js | Medialize is a Javascript URL mutation library. When parsing a URL without a scheme and with excessive slashes, like ///www.example.com, URI.js will parse the hostname as null and the path as /www.example.com. Such behaviour is different from that exhibited by browsers, which will parse ///www.example.com as http://www... | {'CVE-2022-1233'} | 2022-04-15T02:53:33Z | 2022-04-05T00:00:17Z | MODERATE | null | {'CWE-115', 'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1233', 'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277', 'https://github.com/medialize/uri.js', 'https://huntr.dev/bounties/228d5548-1109-49f8-8aee-91038e88371c'} | null | {'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277'} | {'https://github.com/medialize/uri.js/commit/88805fd3da03bd7a5e60947adb49d182011f1277'} |
npm | GHSA-hj48-42vr-x3v9 | Regular Expression Denial of Service in path-parse | Affected versions of npm package `path-parse` are vulnerable to Regular Expression Denial of Service (ReDoS) via splitDeviceRe, splitTailRe, and splitPathRe regular expressions. ReDoS exhibits polynomial worst-case time complexity. | {'CVE-2021-23343'} | 2021-08-10T15:34:57Z | 2021-08-10T15:33:47Z | MODERATE | null | {'CWE-400'} | {'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23343', 'https://github.com/jbgutierrez/path-parse', 'https://github.com/jbgutierrez/path-parse/pull/10', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1279028', 'https://lists.apache... | null | {'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7'} | {'https://github.com/jbgutierrez/path-parse/commit/eca63a7b9a473bf6978a2f5b7b3343662d1506f7'} |
npm | GHSA-h5q8-5697-9p9h | Cross-Site Request Forgery in express-cart | The express-cart package through 1.1.10 for Node.js allows CSRF. | {'CVE-2020-22403'} | 2021-08-30T17:02:20Z | 2021-08-30T17:22:15Z | HIGH | null | {'CWE-352'} | {'https://security.netapp.com/advisory/ntap-20210909-0004/', 'https://hackerone.com/reports/395944', 'https://www.npmjs.com/package/express-cart', 'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb', 'https://github.com/mrvautin/expressCart', 'https://nvd.nist.gov/vuln/detail/CVE-2... | null | {'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb'} | {'https://github.com/mrvautin/expressCart/commit/cd3ba1bc609c2f2946bfbc7ee2fccf3483eb71fb'} |
npm | GHSA-w973-2qcc-p78x | User Impersonation in converse.js | Versions of `converse.js` prior to 1.0.7 for 1.x or 2.0.5 for 2.x are vulnerable to User Impersonation. The package provides an incorrect implementation of [XEP-0280: Message Carbons](https://xmpp.org/extensions/xep-0280.html) that allows a remote attacker to impersonate any user, including contacts, in the vulnerable ... | {'CVE-2017-5858'} | 2021-09-28T16:56:35Z | 2020-09-11T21:19:09Z | MODERATE | null | {'CWE-20', 'CWE-346'} | {'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572', 'https://www.openwall.com/lists/oss-security/2017/02/09/29', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5858', 'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf', 'http://openwall.com/lists/oss-se... | null | {'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'} | {'https://github.com/jcbrand/converse.js/commit/42f249cabbbf5c026398e6d3b350f6f9536ea572'} |
npm | GHSA-hxmg-hm46-cf62 | Remote code execution in mongo-express | mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769. | {'CVE-2020-24391'} | 2021-03-31T20:14:37Z | 2021-04-13T15:41:01Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-24391', 'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a', 'https://github.com/mongodb-js/query-parser/issues/16'} | null | {'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'} | {'https://github.com/mongo-express/mongo-express/commit/3a26b079e7821e0e209c3ee0cc2ae15ad467b91a'} |
npm | GHSA-4449-hg37-77v8 | Command injection in total.js | There is a command injection vulnerability that affects the package total.js before version 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with t... | {'CVE-2020-28494'} | 2021-07-28T18:57:23Z | 2021-02-05T20:43:27Z | HIGH | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-28494', 'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672', 'https://www.npmjs.com/package/total.js'} | null | {'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'} | {'https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5'} |
npm | GHSA-qffw-8wg7-h665 | Command injection in git-interface | A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would the... | {'CVE-2022-1440'} | 2022-04-29T17:22:43Z | 2022-04-23T00:03:01Z | CRITICAL | null | {'CWE-78'} | {'https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440', 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d', 'https://github.com/yarkeev/git-interface'} | null | {'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'} | {'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'} |
npm | GHSA-h3rx-g5c9-8q4x | Prototype Pollution in bmoor | The package bmoor before 0.8.12 are vulnerable to Prototype Pollution via the set function. | {'CVE-2020-7736'} | 2021-04-22T22:35:49Z | 2021-05-10T18:37:26Z | HIGH | null | {'CWE-1321'} | {'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5', 'https://www.npmjs.com/package/bmoor', 'https://snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7736'} | null | {'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'} | {'https://github.com/b-heilman/bmoor/commit/7d4a086a1dc3ef11ed0b323824d02348734b7da5'} |
npm | GHSA-qwqc-28w3-fww6 | Message Signature Bypass in openpgp | Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). F... | {'CVE-2019-9153'} | 2021-08-17T22:06:12Z | 2019-08-23T21:42:20Z | HIGH | null | {'CWE-347'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-9153', 'https://www.npmjs.com/advisories/1160', 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://sec-consult.... | null | {'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'} | {'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'} |
npm | GHSA-84fq-6626-w5fg | CORS Token Disclosure in crumb | When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes ... | {'CVE-2014-7193'} | 2020-08-31T18:07:28Z | 2017-10-24T18:33:36Z | MODERATE | null | {'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2014-7193', 'https://nodesecurity.io/advisories/crumb_cors_token_disclosure', 'https://github.com/advisories/GHSA-84fq-6626-w5fg', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4... | null | {'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'} | {'https://github.com/hapijs/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c', 'https://github.com/spumko/crumb/commit/5e6d4f5c81677fe9e362837ffd4a02394303db3c'} |
npm | GHSA-xcvv-84j5-jw9h | Prototype Pollution in assign-deep | Versions of `assign-deep` before 0.4.7 are vulnerable to prototype pollution via merging functions.
## Recommendation
Update to version 0.4.7 or later. | {'CVE-2018-3720'} | 2020-08-31T18:28:34Z | 2018-07-26T15:12:31Z | LOW | null | {'CWE-471'} | {'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11', 'https://github.com/advisories/GHSA-xcvv-84j5-jw9h', 'https://hackerone.com/reports/310707', 'https://www.npmjs.com/advisories/579', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3720'} | null | {'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'} | {'https://github.com/jonschlinkert/assign-deep/commit/19953a8c089b0328c470acaaaf6accdfcb34da11'} |
npm | GHSA-c7pp-g2v2-2766 | DOM-based XSS in gmail-js | Affected versions of `gmail-js` are vulnerable to cross-site scripting in the `tools.parse_response`, `helper.get.visible_emails_post`, and `helper.get.email_data_post` functions, which pass user input directly into the Function constructor.
## Recommendation
Update to version 0.6.5 or later. | {'CVE-2016-1000228'} | 2021-09-23T21:31:53Z | 2020-09-01T15:32:04Z | HIGH | null | {'CWE-79'} | {'https://www.npmjs.com/advisories/125', 'https://github.com/KartikTalwar/gmail.js/issues/281', 'https://github.com/KartikTalwar/gmail.js', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000228', 'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'} | null | {'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'} | {'https://github.com/KartikTalwar/gmail.js/commit/a83436f499f9c01b04280af945a5a81137b6baf1'} |
npm | GHSA-4cpg-3vgw-4877 | Prototype pollution in Plist | Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution. | {'CVE-2022-22912'} | 2022-03-23T15:06:35Z | 2022-02-18T00:00:33Z | CRITICAL | null | {'CWE-1321'} | {'https://github.com/TooTallNate/plist.js', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912', 'https://github.com/TooTallNate/plist.js/pull/118', 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52', 'https://github.com/TooTallNate/plist.js/issues/114'} | null | {'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'} | {'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6be0c9e0c4773226d14b4758de52'} |
npm | GHSA-c9g6-9335-x697 | Improper Input Validation in SocksJS-Node | Incorrect handling of Upgrade header with the value websocket leads in crashing of containers hosting sockjs apps. This affects the package sockjs before 0.3.20. | {'CVE-2020-7693'} | 2021-04-06T21:47:25Z | 2021-04-13T15:27:51Z | MODERATE | null | {'CWE-20'} | {'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16', 'https://www.npmjs.com/package/sockjs', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7693', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-575448', 'https://github.com/andsnw/sockjs-dos-py', 'https://github.com/sockjs/sockjs-node/pul... | null | {'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'} | {'https://github.com/sockjs/sockjs-node/commit/dd7e642cd69ee74385825816d30642c43e051d16'} |
npm | GHSA-pwhf-39xg-4rxw | Script injection | ### Impact
A malicious internal actor is able to upload documentation content with malicious scripts. These scripts would normally be sanitized by the TechDocs frontend, but by tricking a user to visit the content via the TechDocs API, the content sanitazion will be bypassed. If the TechDocs API is hosted on the same ... | {'CVE-2021-32660'} | 2021-06-04T19:23:33Z | 2021-06-04T19:09:35Z | MODERATE | null | {'CWE-77', 'CWE-434'} | {'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c', 'https://github.com/backstage/backstage/releases/tag/release-2021-06-03', 'https://github.com/backstage/backstage/security/advisories/GHSA-pwhf-39xg-4rxw', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32660'} | null | {'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'} | {'https://github.com/backstage/backstage/commit/aad98c544e59369901fe9e0a85f6357644dceb5c'} |
npm | GHSA-rj44-gpjc-29r7 | [thi.ng/egf] Potential arbitrary code execution of `#gpg`-tagged property values | ### Impact
Potential for arbitrary code execution in `#gpg`-tagged property values (only if `decrypt: true` option is enabled)
### Patches
[A fix](https://github.com/thi-ng/umbrella/commit/3e14765d6bfd8006742c9e7860bc7d58ae94dfa5) has already been released as v0.4.0
### Workarounds
By default, EGF parse functions ... | {'CVE-2021-21412'} | 2021-03-30T20:20:04Z | 2021-04-06T17:22:41Z | MODERATE | null | {'CWE-78'} | {'https://www.npmjs.com/package/@thi.ng/egf', 'https://github.com/thi-ng/umbrella/blob/develop/packages/egf/CHANGELOG.md#040-2021-03-27', 'https://github.com/thi-ng/umbrella/security/advisories/GHSA-rj44-gpjc-29r7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21412', 'https://github.com/thi-ng/umbrella/commit/88f61656e5... | null | {'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'} | {'https://github.com/thi-ng/umbrella/commit/88f61656e5f5cfba960013b8133186389efaf243'} |
npm | GHSA-p4pj-mg4r-x6v4 | Denial of Service in uap-core | ## Impact
Some regexes are vulnerable to regular expression denial of service (REDoS) due to overlapping capture groups. This allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to maliciously crafted long strings.
## Patches
Please update uap-core to >= v0.11.0
Downs... | {'CVE-2021-21317'} | 2021-02-16T17:45:27Z | 2021-02-02T15:46:38Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21317', 'https://www.npmjs.com/package/uap-core', 'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c', 'https://github.com/ua-parser/uap-core/security/advisories/GHSA-p4pj-mg4r-x6v4'} | null | {'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'} | {'https://github.com/ua-parser/uap-core/commit/dc9925d458214cfe87b93e35346980612f6ae96c'} |
npm | GHSA-pfj7-2qfw-vwgm | Path traversal in translator module in NodeBB | ### Impact
Prior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory.
### Patches
The vulnerability has been patched as of v1.18.5.
### Workarounds
Cherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive th... | {'CVE-2021-43788'} | 2021-11-30T14:35:14Z | 2021-11-30T22:20:43Z | MODERATE | null | {'CWE-22'} | {'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-pfj7-2qfw-vwgm', 'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43788', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB'} | null | {'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'} | {'https://github.com/NodeBB/NodeBB/commit/c8b2fc46dc698db687379106b3f01c71b80f495f'} |
npm | GHSA-rc8h-3fv6-pxv8 | Denial of Service in hapi | Versions of `hapi` prior to 11.1.3 are affected by a denial of service vulnerability.
The vulnerability is triggered when certain input is passed into the If-Modified-Since or Last-Modified headers.
This causes an 'illegal access' exception to be raised, and instead of sending a HTTP 500 error back to the sender, hap... | {'CVE-2015-9241'} | 2020-08-31T18:09:46Z | 2018-06-07T19:43:15Z | HIGH | null | {'CWE-400'} | {'https://nodesecurity.io/advisories/63', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://github.com/advisories/GHSA-rc8h-3fv6-pxv8', 'https://nodesecurity.io/advisories/64', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9241', 'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'... | null | {'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'} | {'https://github.com/hapijs/hapi/commit/aab2496e930dce5ee1ab28eecec94e0e45f03580'} |
npm | GHSA-fxwf-45c7-4ppr | Prototype pollution in object-hierarchy-access | Overview:Prototype pollution vulnerability in ‘object-hierarchy-access’ versions 0.2.0 through 0.32.0 allows attacker to cause a denial of service and may lead to remote code execution. | {'CVE-2020-28270'} | 2022-01-07T16:07:29Z | 2021-10-12T16:40:58Z | CRITICAL | null | {'CWE-915', 'CWE-1321'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28270', 'https://github.com/mjpclab/object-hierarchy-access', 'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28270', 'https://www.whitesourcesoftware.co... | null | {'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'} | {'https://github.com/mjpclab/object-hierarchy-access/commit/7b1aa134a8bc4a376296bcfac5c3463aef2b7572'} |
npm | GHSA-wxj7-97fp-j53j | Exposure of Resource to Wrong Sphere in Zip-Local | The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory. | {'CVE-2021-23484'} | 2022-02-07T21:20:28Z | 2022-02-01T00:46:01Z | CRITICAL | null | {'CWE-668', 'CWE-29'} | {'https://snyk.io/vuln/SNYK-JS-ZIPLOCAL-2327477', 'https://github.com/Mostafa-Samir/zip-local/blob/master/main.js%23L365', 'https://github.com/Mostafa-Samir/zip-local', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484', 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'} | null | {'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'} | {'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'} |
npm | GHSA-3hjg-vc7r-rcrw | Denial of Service vulnerability in @podium/layout and @podium/proxy | ### Impact
An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server.
All Podium layouts that include podlets with proxy endpoints are affected.
### Patches
`@podium/layout` which is the main way developers/users are vulnerable to this exploit, has be... | {'CVE-2022-24822'} | 2022-04-07T15:20:23Z | 2022-04-07T15:20:23Z | HIGH | null | {'CWE-248'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24822', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/releases/tag/v4.6.110', 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw', 'https://github.com/podium-lib/proxy/rel... | null | {'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf', 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'} | {'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039', 'https://github.com/podium-lib/proxy/commit/9698a40df081217ce142d4de71f929baaa339cdf'} |
npm | GHSA-934w-hvj4-7fr6 | Path Traversal in jsreport-chrome-pdf | This affects the package jsreport-chrome-pdf before 1.10.0. | {'CVE-2020-7762'} | 2021-08-02T15:38:02Z | 2021-04-13T15:25:15Z | MODERATE | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-JS-JSREPORTCHROMEPDF-1037310', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7762', 'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'} | null | {'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'} | {'https://github.com/jsreport/jsreport-chrome-pdf/commit/6750b2f77d05cb843aefc1c4a98097a3bd33a6a2'} |
npm | GHSA-4vvg-x86p-mvqc | Leaking of user information on Cross-Domain communication in sysend | ### Impact
Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted.
This is not a big impact because it happens only on the same browser.
### Patches
It has been patched in version 1.10.0
### Workarounds
The only workaround is to not send sensitive inf... | {'CVE-2022-24762'} | 2022-03-28T17:26:41Z | 2022-03-14T22:43:23Z | MODERATE | null | {'CWE-200'} | {'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc', 'https://github.com/jcubic/sysend.js/issues/33', 'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a', 'https://github.com/jcubic/sysend.js/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762', 'https://gith... | null | {'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a'} | {'https://github.com/jcubic/sysend.js/commit/a24f4b776fb18191ae0f7e3d90c2c7bec459431a'} |
npm | GHSA-9gj3-hwp5-pmwc | XSS in the `altField` option of the Datepicker widget in jquery-ui | ### Impact
Accepting the value of the `altField` option of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
```js
$( "#datepicker" ).datepicker( {
altField: "<img onerror='doEvilThing()' src='/404' />",
} );
```
will call the `doEvi... | {'CVE-2021-41182'} | 2021-10-27T17:00:10Z | 2021-10-26T14:55:02Z | MODERATE | null | {'CWE-79'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://github.com/jquery/jquery-ui', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41182', 'https://blog.jqueryui.com/2021/10/jq... | null | {'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'} | {'https://github.com/jquery/jquery-ui/pull/1954/commits/6809ce843e5ac4128108ea4c15cbc100653c2b63'} |
npm | GHSA-cc2p-4jhr-xhhx | False-positive validity for NFT1 genesis transactions in SLPJS | ### Impact
In the npm package named "slpjs", versions prior to 0.27.4 are vulnerable to false-positive validation outcomes for the NFT1 Child Genesis transaction type. A poorly implemented SLP wallet or opportunistic attacker could create a seemingly valid NFT1 child token without burning any of the NFT1 Group token ty... | {'CVE-2020-15130'} | 2021-01-07T23:43:05Z | 2020-07-30T14:58:42Z | CRITICAL | null | {'CWE-697'} | {'https://github.com/simpleledger/slpjs/security/advisories/GHSA-cc2p-4jhr-xhhx', 'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15130'} | null | {'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'} | {'https://github.com/simpleledger/slpjs/commit/290c20e8bff13ac81459d43e54cac232b5e3456c'} |
npm | GHSA-7r2x-3qcm-8vfw | Downloads Resources over HTTP in herbivore | Affected versions of `herbivore` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `herbivo... | {'CVE-2016-10665'} | 2021-01-08T19:14:20Z | 2019-02-18T23:44:36Z | HIGH | null | {'CWE-311'} | {'https://github.com/samatt/herbivore', 'https://nodesecurity.io/advisories/258', 'https://www.npmjs.com/advisories/258', 'https://github.com/advisories/GHSA-7r2x-3qcm-8vfw', 'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10665'} | null | {'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3'} | {'https://github.com/samatt/Herbivore/commit/0a041defc3463e99948e5d2064aef54b2128c5a3'} |
npm | GHSA-cph5-m8f7-6c5x | Incorrect Comparison in axios | axios is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3749'} | 2021-09-09T13:39:38Z | 2021-09-01T18:23:02Z | HIGH | null | {'CWE-400', 'CWE-697'} | {'https://www.npmjs.com/package/axios', 'https://github.com/axios/axios', 'https://lists.apache.org/thread.html/r216f0fd0a3833856d6a6a1fada488cadba45f447d87010024328ccf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3ae6d2654f92c5851bdb73b35e96b0e4e3da39f28ac7a1b15ae3aab8@%3Ccommits.druid.apac... | null | {'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929'} | {'https://github.com/axios/axios/commit/5b457116e31db0e88fede6c428e969e87f290929'} |
npm | GHSA-fx7m-j728-mjw3 | Moderate severity vulnerability that affects uap-core | An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains ... | {'CVE-2018-20164'} | 2021-09-10T20:12:01Z | 2019-03-06T17:35:47Z | MODERATE | null | {'CWE-185'} | {'https://github.com/advisories/GHSA-fx7m-j728-mjw3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20164', 'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014', 'https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/', 'https://github.com/ua-parser/uap-core/issues/332', 'https://... | null | {'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014', 'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc'} | {'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc', 'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014'} |
npm | GHSA-cv3v-7846-6pxm | Unauthorized File Access in node-git-server | Versions of `node-git-server` prior to 0.6.1 are vulnerable to Unauthorized File Access. It is possible to access any git repository by using absolute paths, which may allow attackers to access private repositories.
## Recommendation
Upgrade to version 0.6.1 or later. | null | 2021-09-29T19:59:01Z | 2020-09-03T21:15:19Z | HIGH | null | {'CWE-552'} | {'https://snyk.io/vuln/SNYK-JS-NODEGITSERVER-474343', 'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43', 'https://github.com/gabrielcsapo/node-git-server/pull/62', 'https://www.npmjs.com/advisories/1214', 'https://github.com/gabrielcsapo/node-git-server'} | null | {'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43'} | {'https://github.com/gabrielcsapo/node-git-server/commit/ac26650f69bc445d71e4f2c55328676d10a4be43'} |
npm | GHSA-j636-crp3-m584 | Cross-site Scripting in tableexport.jquery.plugin | There is a cross-site scripting vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. This can result in transmitting cookies to third-party servers and/or sending data from secure sessions to third-party servers. | {'CVE-2022-1291'} | 2022-04-22T20:17:22Z | 2022-04-11T00:00:22Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1291', 'https://github.com/hhurz/tableexport.jquery.plugin', 'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9', 'https://huntr.dev/bounties/49a14371-6058-47dd-9801-ec38a7459fc5'} | null | {'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9'} | {'https://github.com/hhurz/tableexport.jquery.plugin/commit/dcbaee23cf98328397a153e71556f75202988ec9'} |
npm | GHSA-h4hr-7fg3-h35w | Denial of service in prismjs | The package prismjs before 1.23.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the prism-asciidoc, prism-rest, prism-tap and prism-eiffel components. | {'CVE-2021-23341'} | 2021-02-24T07:34:23Z | 2021-03-01T19:52:33Z | HIGH | null | {'CWE-400'} | {'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609', 'https://github.com/PrismJS/prism/pull/2584', 'https://snyk.io/vuln/SNYK-JS-PRISMJS-1076581', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23341', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1076583', 'https://github.com/PrismJS/prism/iss... | null | {'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609'} | {'https://github.com/PrismJS/prism/commit/c2f6a64426f44497a675cb32dccb079b3eff1609'} |
npm | GHSA-p3hc-fv2j-rp68 | Prototype Pollution in swiper | Versions of the package swiper before 6.5.1 are susceptible to prototype pollution. | {'CVE-2021-23370'} | 2021-05-07T17:34:38Z | 2021-05-10T15:36:30Z | CRITICAL | null | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1244696', 'https://snyk.io/vuln/SNYK-JS-SWIPER-1088062', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23370', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1244698', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://github.com/no... | null | {'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad', 'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178'} | {'https://github.com/nolimits4web/swiper/commit/9dad2739b7474f383474773d5ab898a0c29ac178', 'https://github.com/nolimits4web/Swiper/commit/ec358deab79a8cd2529465f07a0ead5dbcc264ad'} |
npm | GHSA-r5fx-8r73-v86c | Cross-Site Scripting in angular | Versions of `angular` prior to 1.5.0-beta.1 are vulnerable to Cross-Site Scripting. The package fails to sanitize `xlink:href` attributes, which may allow attackers to execute arbitrary JavaScript in a victim's browser if the value is user-controlled.
## Recommendation
Upgrade to version 1.5.0-beta.1 or later. | {'CVE-2019-14863'} | 2021-08-19T17:14:00Z | 2020-02-14T23:08:49Z | MODERATE | null | {'CWE-79'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14863', 'https://github.com/angular/angular.js/pull/12524', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://nvd.nist.gov/vuln/... | null | {'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a', 'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82'} | {'https://github.com/angular/angular.js/commit/35a21532b73d5bd84b4325211c563e6a3e2dde82', 'https://github.com/angular/angular.js/commit/f33ce173c90736e349cf594df717ae3ee41e0f7a'} |
npm | GHSA-468q-v4jj-485h | Inefficient Regular Expression Complexity in taro | taro is vulnerable to Inefficient Regular Expression Complexity | {'CVE-2021-3804'} | 2021-09-20T20:00:02Z | 2021-09-20T20:09:59Z | HIGH | null | {'CWE-1333'} | {'https://github.com/nervjs/taro', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3804', 'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5', 'https://huntr.dev/bounties/0ebe85e6-cc85-42b8-957e-18d8df277414'} | null | {'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5'} | {'https://github.com/nervjs/taro/commit/acadb6c826ba57f2030a626f1de4f7b4608fcdb5'} |
npm | GHSA-rjmf-p882-645m | Improper Certificate Validation | A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node.js driver and the KMS service rendering... | {'CVE-2021-20327'} | 2021-04-12T18:51:10Z | 2021-04-12T18:51:17Z | MODERATE | null | {'CWE-295'} | {'https://jira.mongodb.org/browse/NODE-3125', 'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b', 'https://www.npmjs.com/advisories/1660', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20327'} | null | {'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'} | {'https://github.com/mongodb/libmongocrypt/commit/76365515ff8754b9f705e56428dd0d7efa7f541b'} |
npm | GHSA-2q4g-w47c-4674 | Unpreventable top-level navigation | ### Impact
The `will-navigate` event that apps use to prevent navigations to unexpected destinations [as per our security recommendations](https://www.electronjs.org/docs/tutorial/security) can be bypassed when a sub-frame performs a top-frame navigation across sites.
### Patches
* `11.0.0-beta.1`
* `10.0.1`
* `9.3.0... | {'CVE-2020-15174'} | 2021-11-19T14:44:04Z | 2020-10-06T14:24:04Z | HIGH | null | {'CWE-20', 'CWE-693'} | {'https://github.com/electron/electron', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15174', 'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b', 'https://github.com/electron/electron/security/advisories/GHSA-2q4g-w47c-4674'} | null | {'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'} | {'https://github.com/electron/electron/commit/18613925610ba319da7f497b6deed85ad712c59b'} |
npm | GHSA-3cqr-58rm-57f8 | Arbitrary Code Execution in Handlebars | Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's br... | {'CVE-2019-20920'} | 2021-04-22T23:38:32Z | 2022-02-10T20:38:19Z | HIGH | null | {'CWE-94'} | {'https://www.npmjs.com/advisories/1316', 'https://www.npmjs.com/advisories/1324', 'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920', 'https://www.npmjs.com/package/handl... | null | {'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e'} | {'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e'} |
npm | GHSA-2xm2-xj2q-qgpj | receiving subscription objects with deleted session | Original Message:
Hi,
I create objects with one client with an ACL of all users with a specific column value. Thats working so far.
Then I deleted the session object from one user to look if he can receive subscription objects and he can receive them.
The client with the deleted session cant create new objects, which... | {'CVE-2020-15270'} | 2021-10-06T22:02:05Z | 2020-10-27T19:15:19Z | MODERATE | null | {'CWE-672'} | {'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2xm2-xj2q-qgpj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15270', 'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'} | null | {'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'} | {'https://github.com/parse-community/parse-server/commit/78b59fb26b1c36e3cdbd42ba9fec025003267f58'} |
npm | GHSA-6jqp-j69q-pm62 | AWS Lambda parser is vulnerable to Regular Expression Denial of Service | index.js in the aws-lambda-multipart-parser NPM package before 0.1.2 has a Regular Expression Denial of Service (ReDoS) issue via a crafted multipart/form-data boundary string. | {'CVE-2018-7560'} | 2022-04-25T22:28:16Z | 2018-03-05T19:16:56Z | HIGH | null | {'CWE-20'} | {'https://github.com/myshenin/aws-lambda-multipart-parser', 'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e', 'https://nvd.nist.gov/vuln/detail/CVE-2018-7560', 'https://github.com/advisories/GHSA-6jqp-j69q-pm62'} | null | {'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'} | {'https://github.com/myshenin/aws-lambda-multipart-parser/commit/56ccb03af4dddebc2b2defb348b6558783d5757e'} |
npm | GHSA-g8m7-qhv7-9h5x | Path Traversal in serve-here.js | Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 1.2.0 or later. | null | 2021-09-22T18:35:22Z | 2019-07-05T21:07:14Z | HIGH | null | {'CWE-22'} | {'https://hackerone.com/reports/569966', 'https://www.npmjs.com/advisories/554', 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2', 'https://nodesecurity.io/advisories/554', 'https://hackerone.com/reports/296254', 'https://github.com/vivaxy/here/pull/17'} | null | {'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'} | {'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'} |
npm | GHSA-j977-g5vj-j27g | Cross-Site Scripting in scratch-svg-renderer | This affects the package scratch-svg-renderer before 0.2.0-prerelease.20201019174008. The loadString function does not escape SVG properly, which can be used to inject arbitrary elements into the DOM via the _transformMeasurements function. | {'CVE-2020-7750'} | 2021-01-07T22:49:01Z | 2020-11-09T14:21:17Z | HIGH | null | {'CWE-79'} | {'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7750', 'https://snyk.io/vuln/SNYK-JS-SCRATCHSVGRENDERER-1020497'} | null | {'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90'} | {'https://github.com/LLK/scratch-svg-renderer/commit/9ebf57588aa596c4fa3bb64209e10ade395aee90'} |
npm | GHSA-pm9p-9926-w68m | Denial of Service in ecstatic | `ecstatic`, a simple static file server middleware, is vulnerable to denial of service. If a payload with a large number of null bytes (`%00`) is provided by an attacker it can crash ecstatic by running it out of memory.
[Results from the original advisory](https://www.checkmarx.com/advisories/denial-of-service-dos-v... | {'CVE-2016-10703'} | 2021-09-16T18:15:09Z | 2017-12-28T22:52:47Z | HIGH | null | {'CWE-20'} | {'https://www.checkmarx.com/advisories/denial-of-service-dos-vulnerability-in-ecstatic-npm-package/', 'https://advisory.checkmarx.net/advisory/CX-2016-4450', 'https://github.com/advisories/GHSA-pm9p-9926-w68m', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10703', 'https://www.npmjs.com/advisories/553', 'https://github.co... | null | {'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'} | {'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01#diff-b2b5a88fb51675f1aa1065c093dce1ee', 'https://github.com/jfhbrook/node-ecstatic/commit/71ce93988ead4b561a8592168c72143907189f01'} |
npm | GHSA-jxwx-85vp-gvwm | Regular Expression Denial of Service in jquery-validation | The GitHub Security Lab team has identified potential security vulnerabilities in jquery.validation.
The project contains one or more regular expressions that are vulnerable to ReDoS (Regular Expression Denial of Service)
This issue was discovered and reported by GitHub team member @erik-krogh (Erik Krogh Kristensen)... | {'CVE-2021-21252'} | 2021-01-13T18:21:42Z | 2021-01-13T18:21:54Z | MODERATE | null | {'CWE-400'} | {'https://github.com/jquery-validation/jquery-validation/pull/2371', 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-jxwx-85vp-gvwm', 'https://security.netapp.com/advisory/ntap-20210219-0005/', 'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42c... | null | {'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d'} | {'https://github.com/jquery-validation/jquery-validation/commit/5d8f29eef363d043a8fec4eb86d42cadb5fa5f7d'} |
npm | GHSA-w2pf-g6r8-pg22 | Placeholder property does not indicate HTML capable, could lead to inadvertent abuse | ## Overview
Auth0 Lock version 11.20.4 and earlier did not properly sanitize the generated HTML code. Customers using the `additionalSignUpFields` customization option to add a checkbox to the sign-up dialog that are passing a `placeholder` property obtained from an untrusted source (e.g. a query parameter) could allo... | {'CVE-2019-20174'} | 2021-08-19T16:48:59Z | 2020-01-31T17:59:51Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-20174', 'https://auth0.com/docs/security/bulletins/cve-2019-20174', 'https://github.com/auth0/lock/releases/tag/v11.21.0', 'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5', 'https://github.com/auth0/lock/security/advisories/GHSA-w2pf-g6r8-pg22'} | null | {'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5'} | {'https://github.com/auth0/lock/commit/6c15e5659c21cd814ea119af5c51b61399598dd5'} |
npm | GHSA-p72p-rjr2-r439 | Server-Side Request Forgery in terriajs-server | Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-se... | null | 2020-08-31T18:35:03Z | 2019-05-29T20:24:02Z | HIGH | null | {'CWE-918'} | {'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5', 'https://www.npmjs.com/advisories/768', 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'} | null | {'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'} | {'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'} |
npm | GHSA-hwqf-gcqm-7353 | Header injection in nodemailer | The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object. | {'CVE-2021-23400'} | 2021-06-30T17:38:02Z | 2021-12-10T18:56:57Z | MODERATE | null | {'CWE-74'} | {'https://github.com/nodemailer/nodemailer/issues/1289', 'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737', 'https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23400'} | null | {'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'} | {'https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f'} |
npm | GHSA-r3j7-x2g5-9gx6 | Command injection in samba-client | The samba-client package before 4.0.0 for Node.js allows command injection because of the use of process.exec. | {'CVE-2021-27185'} | 2022-05-03T03:44:37Z | 2021-02-11T20:47:27Z | CRITICAL | null | {'CWE-74', 'CWE-77', 'CWE-78'} | {'https://advisory.checkmarx.net/advisory/CX-2021-4302', 'https://github.com/eflexsystems/node-samba-client/releases/tag/4.0.0', 'https://security.netapp.com/advisory/ntap-20210319-0002/', 'https://github.com/eflexsystems/node-samba-client', 'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc8... | null | {'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235'} | {'https://github.com/eflexsystems/node-samba-client/commit/5bc3bbad9b8d02243bc861a11ec73f788fbb1235'} |
npm | GHSA-3hw5-q855-g6cw | Prototype Pollution in Dojox | The Dojox jQuery wrapper `jqMix` mixin method is vulnerable to Prototype Pollution.
Affected Area:
```
//https://github.com/dojo/dojox/blob/master/jq.js#L442
var tobj = {};
for(var x in props){
// the "tobj" condition avoid copying properties in "props"
// inherited from Object.prototype. For example, if o... | {'CVE-2020-5259'} | 2021-02-18T19:45:35Z | 2020-03-10T18:03:32Z | LOW | null | {'CWE-94'} | {'https://github.com/dojo/dojox/security/advisories/GHSA-3hw5-q855-g6cw', 'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5259'} | null | {'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'} | {'https://github.com/dojo/dojox/commit/47d1b302b5b23d94e875b77b9b9a8c4f5622c9da'} |
npm | GHSA-4hpf-3wq7-5rpr | Regular expression deinal of service (ReDoS) in is-my-json-valid | It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated. | {'CVE-2018-1107'} | 2021-04-23T20:09:28Z | 2022-01-06T20:44:07Z | MODERATE | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1546357', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1107', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://snyk.io/vuln/npm:is-my-json-valid:20180214'} | null | {'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'} | {'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'} |
npm | GHSA-8c8c-4vfj-rrpc | Reflected Cross-Site Scripting in redis-commander | Affected versions of `redis-commander` contain a cross-site scripting vulnerability in the `highlighterId` paramter of the clipboard.swf component on hosts serving Redis Commander.
Mitigating factors:
Flash must be installed / enabled for this to work. The below proof of concept was verified to work using Firefox 57.0... | null | 2022-03-04T22:02:50Z | 2020-09-01T19:05:11Z | LOW | null | {'CWE-79'} | {'https://www.npmjs.com/advisories/562', 'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14', 'https://hackerone.com/reports/296377', 'https://github.com/joeferner/redis-commander', 'https://github.com/joeferner/redis-commander/releases/tag/v0.5.0'} | null | {'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'} | {'https://github.com/joeferner/redis-commander/commit/1a483ebb3a706cf199dd283cf0aead96606adb14'} |
npm | GHSA-35g4-qx3c-vjhx | Automatic room upgrade handling can be used maliciously to bridge a room non-consentually | ### Impact
If a bridge has room upgrade handling turned on in the configuration (the `roomUpgradeOpts` key when instantiating a new `Bridge` instance.), any `m.room.tombstone` event it encounters will be used to unbridge the current room and bridge into the target room. However, the target room `m.room.create` event i... | {'CVE-2021-32659'} | 2021-06-16T20:08:37Z | 2021-06-21T17:09:22Z | MODERATE | null | {'CWE-306'} | {'https://github.com/matrix-org/matrix-appservice-bridge/releases/tag/2.6.1', 'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32659', 'https://github.com/matrix-org/matrix-appservice-bridge/pull/330', 'https://github.co... | null | {'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'} | {'https://github.com/matrix-org/matrix-appservice-bridge/commit/b69e745584a34fcfd858df33e4631e420da07b9f'} |
npm | GHSA-6vfc-qv3f-vr6c | Uncontrolled Resource Consumption in markdown-it | ### Impact
Special patterns with length > 50K chars can slow down parser significantly.
```js
const md = require('markdown-it')();
md.render(`x ${' '.repeat(150000)} x \nx`);
```
### Patches
Upgrade to v12.3.2+
### Workarounds
No.
### References
Fix + test sample: https://github.com/markdown-it/markdown-it/c... | {'CVE-2022-21670'} | 2022-01-19T18:25:52Z | 2022-01-12T22:20:22Z | MODERATE | null | {'CWE-400'} | {'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101', 'https://github.com/markdown-it/markdown-it', 'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21670'} | null | {'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'} | {'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'} |
npm | GHSA-j9xp-92vc-559j | SQL Injection in sequelize | Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
If you are using `sequelize` 5.x, upgrade to version 5.8.11 or lat... | {'CVE-2019-10748'} | 2021-08-18T22:09:33Z | 2019-11-06T17:11:10Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/sequelize/sequelize/commit/a72a3f5,', 'https://www.npmjs.com/advisories/1018', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748', 'https://github.com/sequelize/sequelize/pull/11089,'} | null | {'https://github.com/sequelize/sequelize/commit/a72a3f5,'} | {'https://github.com/sequelize/sequelize/commit/a72a3f5,'} |
npm | GHSA-49r3-3h96-rwj6 | Cross-Site Scripting in ids-enterprise | Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript.
## Recommendation
Upgrade to version 4.18.2 or later | null | 2020-08-31T18:41:54Z | 2019-06-13T19:09:31Z | HIGH | null | {'CWE-79'} | {'https://www.npmjs.com/advisories/956', 'https://github.com/infor-design/enterprise-ng/issues/503', 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'} | null | {'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'} | {'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'} |
npm | GHSA-q8pj-2vqx-8ggc | Denial of service in css-what | The css-what package 4.0.0 through 5.0.0 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input. | {'CVE-2021-33587'} | 2021-12-02T17:48:49Z | 2021-06-07T22:11:39Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33587', 'https://github.com/fb55/css-what', 'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655', 'https://github.com/fb55/css-what/releases/tag/v5.0.1', 'https://security.netapp.com/advisory/ntap-20210706-0007/'} | null | {'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655'} | {'https://github.com/fb55/css-what/commit/4cdaacfd0d4b6fd00614be030da0dea6c2994655'} |
npm | GHSA-7pr3-p5fm-8r9x | LiveQuery publishes user session tokens in parse-server | ### Impact
For regular (non-LiveQuery) queries, the session token is removed from the response, but for LiveQuery payloads it is currently not. If a user has a LiveQuery subscription on the `Parse.User` class, all session tokens created during user sign-ups will be broadcast as part of the LiveQuery payload.
### Patch... | {'CVE-2021-41109'} | 2021-09-30T16:43:12Z | 2021-09-30T17:09:47Z | HIGH | null | {'CWE-200'} | {'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559', 'https://github.com/parse-community/parse-server/releases/tag/4.10.4', 'https://github.com/parse-community/parse-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41109', 'https://github.com/parse-community/parse-serve... | null | {'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'} | {'https://github.com/parse-community/parse-server/commit/4ac4b7f71002ed4fbedbb901db1f6ed1e9ac5559'} |
npm | GHSA-g74r-ffvr-5q9f | Memory Exposure in concat-stream | Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()`
Versions <1.3.0 are not affected due to not using unguarded Buffer constructor.
## Recommendation
Update to version 1.5.2, 1.4.11, 1.3.2 or later.
If you are unable to update make sure user ... | null | 2020-08-31T18:29:17Z | 2019-06-03T17:26:44Z | MODERATE | null | {'CWE-200'} | {'https://github.com/maxogden/concat-stream/pull/47', 'https://nodesecurity.io/advisories/597', 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85', 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e', 'https://www.npmjs.com/advisories/597'} | null | {'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'} | {'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'} |
npm | GHSA-5fg8-2547-mr8q | Misinterpretation of malicious XML input | ### Impact
xmldom versions 0.6.0 and older do not correctly escape special characters when serializing elements removed from their ancestor. This may lead to unexpected syntactic changes during XML processing in some downstream applications.
### Patches
Update to one of the fixed versions of `@xmldom/xmldom` (`>=0.7.0... | {'CVE-2021-32796'} | 2022-01-04T19:36:30Z | 2021-08-03T16:57:05Z | MODERATE | null | {'CWE-116'} | {'https://www.npmjs.com/package/@xmldom/xmldom', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32796', 'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b', 'https://github.com/xmldom/xmldom', 'https://github.com/xmldom/xmldom/security/advisories/GHSA-5fg8-2547-mr8q', 'https://mattermost.com/... | null | {'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'} | {'https://github.com/xmldom/xmldom/commit/7b4b743917a892d407356e055b296dcd6d107e8b'} |
npm | GHSA-fq6p-x6j3-cmmq | Denial of service in three | This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var tim... | {'CVE-2020-28496'} | 2021-02-24T07:40:52Z | 2021-03-01T19:57:16Z | HIGH | null | {'CWE-400'} | {'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28496', 'https://github.com/mrdoob/three.js/issues/21132', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972', 'https://snyk.io/vuln/SNYK-JS-THREE-1064931'} | null | {'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'} | {'https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e'} |
npm | GHSA-8948-ffc6-jg52 | Insecure Default Configuration in redbird | Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable.
## Recommendation
Upgrade to version 0.9.1 or later. | null | 2021-08-04T20:58:53Z | 2019-06-06T15:32:21Z | MODERATE | null | {'CWE-20'} | {'https://www.npmjs.com/advisories/828', 'https://github.com/OptimalBits/redbird/pull/207', 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516', 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'} | null | {'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'} | {'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'} |
npm | GHSA-mpgr-2cx9-327h | Information disclosure in SSB-DB | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Servers running SSB-DB 20.0.0 (which is packaged with SSB-Server 16.0.0) must upgrade immediately.
**There is no evidence that other SSB apps are vulnerable or that this problem has been exploited in the wild.**
The `get()` method is supposed to only de... | {'CVE-2020-4045'} | 2021-01-08T20:12:11Z | 2020-06-11T21:09:04Z | HIGH | null | {'CWE-200'} | {'https://github.com/ssbc/ssb-db/security/advisories/GHSA-mpgr-2cx9-327h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4045', 'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'} | null | {'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'} | {'https://github.com/ssbc/ssb-db/commit/43334d0871c9cc6220e0f6d6338499060f7761d4'} |
npm | GHSA-2598-2f59-rmhq | SQL Injection in sequelize | Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
Upgrade to version 3.35.1 or later. | {'CVE-2019-10749'} | 2021-08-18T22:10:20Z | 2019-11-08T17:05:17Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10749', 'https://www.npmjs.com/advisories/1017', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222', 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'} | null | {'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'} | {'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'} |
npm | GHSA-cf4h-3jhx-xvhq | Arbitrary Code Execution in underscore | The package `underscore` from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Execution via the template function, particularly when a variable property is passed as an argument as it is not sanitized. | {'CVE-2021-23358'} | 2021-08-25T17:37:24Z | 2021-05-06T16:09:43Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23358', 'https://github.com/jashkenas/underscore/blob/master/modules/template.js%23L71', 'https://github.com/jashkenas/underscore', 'https://www.tenable.com/security/tns-2021-14', 'https://www.debian.org/security/2021/dsa-4883', 'https://github.com/jashkenas/underscore/pull/2... | null | {'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'} | {'https://github.com/jashkenas/underscore/commit/4c73526d43838ad6ab43a6134728776632adeb66'} |
npm | GHSA-4g77-cvgw-grvw | Prototype Pollution in putil-merge | This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-J... | {'CVE-2021-23470'} | 2022-02-11T16:15:46Z | 2022-02-05T00:00:31Z | HIGH | null | {'CWE-1321'} | {'https://snyk.io/vuln/SNYK-JS-PUTILMERGE-2391487', 'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5', 'https://github.com/panates/putil-merge/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470'} | null | {'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'} | {'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'} |
npm | GHSA-cq8r-fc3q-6hg2 | Denial of Service (DoS) via the unsetByPath function in jsjoints | The package jointjs before 3.3.0 are vulnerable to Denial of Service (DoS) via the unsetByPath function. | {'CVE-2020-28479'} | 2021-04-06T20:51:59Z | 2021-04-13T15:29:40Z | HIGH | null | {'CWE-400'} | {'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1062038', 'https://github.com/clientIO/joint/releases/tag/v3.3.0', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1062040', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28479', 'https://snyk.io/vul... | null | {'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'} | {'https://github.com/clientIO/joint/commit/ec7ab01b512a3c06a9944a25d50f255bf07c3499'} |
npm | GHSA-qc22-qwm9-j8rx | Remote Code Execution in npm-groovy-lint | Versions of npm-groovy-lint prior to 9.1.0 bundle vulnerable versions of the Log4j library which are subject to remote code execution via jndi rendering. As a result npm-groovy-lint prior to 9.1.0 is also vulnerable. | null | 2021-12-20T16:57:06Z | 2021-12-20T16:59:31Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/nvuillam/npm-groovy-lint', 'https://github.com/nvuillam/npm-groovy-lint/pull/195', 'https://github.com/advisories/GHSA-jfh8-c2jp-5v3q', 'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7', 'https://github.com/nvuillam/npm-groovy-lint/issues/194'} | null | {'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'} | {'https://github.com/nvuillam/npm-groovy-lint/commit/0b664519019442052e0190170c2b1c5aff7d72e7'} |
npm | GHSA-p6jh-p7q8-pcrg | Prototype Pollution in nodee-utils | All versions of package nodee-utils below version 1.2.3 are vulnerable to Prototype Pollution via the deepSet function. | {'CVE-2020-7722'} | 2021-05-05T17:59:12Z | 2021-05-06T18:26:21Z | CRITICAL | null | {'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7722', 'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c', 'https://snyk.io/vuln/SNYK-JS-NODEEUTILS-598679'} | null | {'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'} | {'https://github.com/nodee-apps/utils/commit/52460d936c52f03c9907bc99ac5e890970cef83c'} |
npm | GHSA-566m-qj78-rww5 | Regular Expression Denial of Service in postcss | The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*). | {'CVE-2021-23382'} | 2022-02-23T20:31:15Z | 2022-01-07T00:21:36Z | MODERATE | null | {'CWE-400'} | {'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1255641', 'https://github.com/postcss/postcss/releases/tag/7.0.36', 'https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382'} | null | {'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'} | {'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'} |
npm | GHSA-cqqh-49mx-fq63 | Prototype Pollution in merge | merge is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | {'CVE-2021-3645'} | 2021-09-13T19:14:06Z | 2021-09-13T20:16:54Z | MODERATE | null | {'CWE-915', 'CWE-1321'} | {'https://github.com/viking04/merge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3645', 'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6', 'https://huntr.dev/bounties/ef387a9e-ca3c-4c21-80e3-d34a6a896262'} | null | {'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'} | {'https://github.com/viking04/merge/commit/baba40332080b38b33840d2614df6d4142dedaf6'} |
npm | GHSA-265q-28rp-chq5 | Insecure Entropy Source - Math.random() in node-uuid | Affected versions of `node-uuid` consistently fall back to using `Math.random` as an entropy source instead of `crypto`, which may result in guessable UUID's.
## Recommendation
Update to version 1.4.4 or later. | {'CVE-2015-8851'} | 2021-08-23T15:25:55Z | 2020-04-16T03:14:50Z | HIGH | null | {'CWE-331'} | {'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d', 'https://github.com/broofa/node-uuid/issues/122', 'https://nodesecurity.io/advisories/93', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8851', 'https://bugzilla.redhat.com/show_bug.cgi?id=1327056', 'https://www.npmjs.com/advisories/93... | null | {'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'} | {'https://github.com/broofa/node-uuid/commit/672f3834ed02c798aa021c618d0a5666c8da000d'} |
npm | GHSA-3xph-cp8f-2229 | Prototype Pollution in @fabiocaccamo/utils.js | utils.js is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). | {'CVE-2021-3815'} | 2021-12-13T13:10:41Z | 2021-12-10T20:31:32Z | HIGH | null | {'CWE-1321'} | {'https://huntr.dev/bounties/20f48c63-f078-4173-bcac-a9f34885f2c0', 'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a', 'https://github.com/fabiocaccamo/utils.js', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3815'} | null | {'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'} | {'https://github.com/fabiocaccamo/utils.js/commit/102efafb291ce1916985514440d3bf8a6826890a'} |
npm | GHSA-xrjf-phvv-r4vr | Command injection in strapi | When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user... | {'CVE-2022-0764'} | 2022-03-09T20:26:21Z | 2022-02-27T00:00:15Z | MODERATE | null | {'CWE-77', 'CWE-78'} | {'https://huntr.dev/bounties/001d1c29-805a-4035-93bb-71a0e81da3e5', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764', 'https... | null | {'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'} | {'https://www.github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c', 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'} |
npm | GHSA-wvh7-5p38-2qfc | Storing Password in Local Storage | The `setPassword` method (http://parseplatform.org/Parse-SDK-JS/api/2.9.1/Parse.User.html#setPassword) stores the user's password in localStorage as raw text making it vulnerable to anyone with access to your localStorage. We believe this is the only time that password is stored at all. In the documentation under Users... | null | 2021-09-22T21:05:43Z | 2020-07-23T18:20:10Z | MODERATE | null | {'CWE-256'} | {'https://github.com/parse-community/Parse-SDK-JS/security/advisories/GHSA-wvh7-5p38-2qfc', 'https://github.com/parse-community/Parse-SDK-JS', 'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} | null | {'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} | {'https://github.com/parse-community/Parse-SDK-JS/commit/d1106174571b699f972929dd7cbb8e45b5283cbb'} |
npm | GHSA-6m8p-4fxj-pgc2 | OS Command Injection in mversion | The issue occurs because tagName user input is formatted inside the exec function is executed without any checks. | {'CVE-2020-7688'} | 2021-05-11T19:56:27Z | 2021-05-17T21:01:08Z | MODERATE | null | {'CWE-78'} | {'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482', 'https://github.com/418sec/huntr/pull/102', 'https://snyk.io/vuln/SNYK-JS-MVERSION-573174', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7688'} | null | {'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'} | {'https://github.com/mikaelbr/mversion/commit/b7a8b32600e60759a7ad3921ec4a2750bf173482'} |
npm | GHSA-68hw-vfh7-xvg8 | Forced Logout in keycloak-connect | Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely.
## Recommendation
Upgrade to version 4.4.0 or later. | {'CVE-2019-10157'} | 2021-08-16T15:25:07Z | 2019-06-13T20:38:09Z | MODERATE | null | {'CWE-287', 'CWE-345'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157', 'http://www.securityfocus.com/bid/108734', 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920', 'https://www.npmjs.com/advisories/978', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157', 'https://github.com/keycloak/keycloak-nodejs-connect/commit/55... | null | {'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'} | {'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'} |
npm | GHSA-p6rw-44q7-3fw4 | Stored XSS in Jupyter nbdime | ### Impact
Improper handling of user controlled input caused a stored cross-site scripting (XSS) vulnerability. All previous versions of nbdime are affected.
### Patches
Security patches will be released for each of the major versions of the nbdime packages since version 1.x of the nbdime python package.
#### Pytho... | {'CVE-2021-41134'} | 2022-03-03T05:14:20.151154Z | 2021-11-08T18:09:27Z | HIGH | null | {'CWE-79'} | {'https://github.com/jupyter/nbdime/security/advisories/GHSA-p6rw-44q7-3fw4', 'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea', 'https://github.com/jupyter/nbdime', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41134'} | null | {'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'} | {'https://github.com/jupyter/nbdime/commit/e44a5cc7677f24b45ebafc756db49058c2f750ea'} |
npm | GHSA-5rwj-j5m3-3chj | Missing Release of Memory after Effective Lifetime in detect-character-encoding | ### Impact
In detect-character-encoding v0.3.0 and earlier, allocated memory is not released.
### Patches
The problem has been patched in [detect-character-encoding v0.3.1](https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1).
### CVSS score
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/RL:O/... | {'CVE-2021-39176'} | 2021-10-21T14:28:07Z | 2021-09-01T18:25:16Z | HIGH | null | {'CWE-401'} | {'https://github.com/sonicdoe/detect-character-encoding/releases/tag/v0.3.1', 'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588', 'https://github.com/sonicdoe/detect-character-encoding/pull/6', 'https://github.com/sonicdoe/detect-character-encoding', 'https://github.... | null | {'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'} | {'https://github.com/sonicdoe/detect-character-encoding/commit/d44356927b92e3b13e178071bf6d7c671766f588'} |
npm | GHSA-jf5r-8hm2-f872 | Incorrect hostname / protocol due to unstripped leading control characters. | Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.
If url-parse is used in security decisi... | {'CVE-2022-0691'} | 2022-03-11T22:47:09Z | 2022-02-22T00:00:30Z | MODERATE | null | {'CWE-639'} | {'https://github.com/unshiftio/url-parse', 'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63', 'https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691'} | null | {'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'} | {'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'} |
npm | GHSA-897m-rjf5-jp39 | Prototype Pollution in copy-props | The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality. | {'CVE-2020-28503'} | 2021-03-24T23:59:08Z | 2022-01-06T20:35:05Z | HIGH | null | {'CWE-1321'} | {'https://github.com/gulpjs/copy-props/pull/7', 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088047', 'https://snyk.io/vuln/SNYK-JS-COPYPROPS-1082870'} | null | {'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'} | {'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'} |
npm | GHSA-9qmh-276g-x5pj | Prototype Pollution in immer | ## Overview
Affected versions of immer are vulnerable to Prototype Pollution.
## Proof of exploit
```
const {applyPatches, enablePatches} = require("immer");
enablePatches();
let obj = {};
console.log("Before : " + obj.polluted);
applyPatches({}, [ { op: 'add', path: [ "__proto__", "polluted" ], value: "yes" } ]);
/... | {'CVE-2020-28477'} | 2021-01-20T21:27:33Z | 2021-01-20T21:27:56Z | HIGH | null | {'CWE-471'} | {'https://github.com/immerjs/immer/issues/738', 'https://www.npmjs.com/package/immer', 'https://github.com/immerjs/immer/blob/master/src/plugins/patches.ts%23L213', 'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5', 'https://snyk.io/vuln/SNYK-JS-IMMER-1019369', 'https://nvd.nist.gov/vul... | null | {'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'} | {'https://github.com/immerjs/immer/commit/da2bd4fa0edc9335543089fe7d290d6a346c40c5'} |
npm | GHSA-35jh-r3h4-6jhm | Command Injection in lodash | `lodash` versions prior to 4.17.21 are vulnerable to Command Injection via the template function. | {'CVE-2021-23337'} | 2022-02-08T21:35:09Z | 2021-05-06T16:05:51Z | HIGH | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23337', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929', 'https://github.com/lodash/lodash', 'https://security.netapp.com/advisory/ntap-20210312-0006/', 'http... | null | {'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'} | {'https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c'} |
npm | GHSA-9vxc-g2jx-qj3p | API Admin Auth Weakness in tomato | Versions of `tomato` prior to 0.0.6 are affected by a somewhat complex authentication bypass vulnerability in the admin service when only a single access key is configured on the server. The vulnerability allows an attacker to guess the password for the admin service, no matter how complex that password is, in less tha... | {'CVE-2013-7379'} | 2021-09-23T21:00:28Z | 2020-08-31T22:59:07Z | CRITICAL | null | {'CWE-287'} | {'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c', 'https://github.com/leizongmin/tomato', 'https://www.npmjs.com/advisories/38', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7379', 'https://nodesecurity.io/advisories/Tomato_API_Admin_Auth_Weakness', 'http://www.openwall.com/lists/os... | null | {'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'} | {'https://github.com/leizongmin/tomato/commit/9e427d524e04a905312a3294c85e939ed7d57b8c'} |
npm | GHSA-qmw8-3v4g-gwj4 | Prefix escape | ### Impact
By crafting a specific URL, it is possible to escape the prefix of the proxied backend service.
If the base url of the proxied server is `/pub/`, a user expect that accessing `/priv` on the target service would not be possible. Unfortunately, it is.
[CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N](https://ww... | {'CVE-2021-21321'} | 2021-03-02T03:32:13Z | 2021-03-03T01:52:05Z | CRITICAL | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21321', 'https://www.npmjs.com/package/fastify-reply-from', 'https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-qmw8-3v4g-gwj4', 'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} | null | {'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} | {'https://github.com/fastify/fastify-reply-from/commit/dea227dda606900cc01870d08541b4dcc69d3889'} |
npm | GHSA-h9mj-fghc-664w | Denial of Service in mqtt | Affected versions of `mqtt` do not properly handle PUBLISH packets returning from the server, leading to a Denial of Service condition.
The vulnerability is completely mitigated if the only connected servers are trusted, guaranteed not to be under the control of a malicious actor.
## Proof of Concept
The following i... | {'CVE-2017-10910'} | 2021-09-14T17:16:40Z | 2017-12-28T22:51:58Z | MODERATE | null | {'CWE-674'} | {'https://github.com/mqttjs/MQTT.js', 'https://jvn.jp/en/jp/JVN45494523/index.html', 'https://github.com/advisories/GHSA-h9mj-fghc-664w', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/357.json', 'https://nvd.nist.gov/vuln/detail/CVE-2017-10910', 'https://www.npmjs.com/advisories/555', 'https://github.com/... | null | {'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'} | {'https://github.com/mqttjs/MQTT.js/commit/403ba53b838f2d319a0c0505a045fe00239e9923'} |
npm | GHSA-5w9c-rv96-fr7g | Removal of functional code in faker.js | Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/G... | null | 2022-03-22T20:33:40Z | 2022-03-22T19:28:24Z | HIGH | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23567', 'https://github.com/advisories/GHSA-gh88-3pxp-6fm8', 'https://www.npmjs.com/package/faker', 'https://www.npmjs.com/package/@faker-js/faker', 'https://github.com/Marak/Faker.js', 'https://github.com/Marak/colors.js/issues/285', 'https://github.com/Marak/colors.js/issue... | null | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} | {'https://github.com/Marak/colors.js/commit/074a0f8ed0c31c35d13d28632bd8a049ff136fb6#diff-92bbac9a308cd5fcf9db165841f2d90ce981baddcb2b1e26cfff170929af3bd1R18'} |
npm | GHSA-mmj4-777p-fpq9 | Validation bypass in frourio-express | ## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformer... | {'CVE-2022-23624'} | 2022-02-14T22:32:36Z | 2022-02-07T22:38:37Z | HIGH | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23624', 'https://github.com/frouriojs/frourio-express', 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9', 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'} | null | {'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'} | {'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'} |
npm | GHSA-4vmm-mhcq-4x9j | Sandbox Bypass Leading to Arbitrary Code Execution in constantinople | Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution.
## Recommendation
Update to version 3.1.1 or later. | null | 2021-08-16T16:06:38Z | 2019-06-14T16:15:14Z | CRITICAL | null | null | {'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f', 'https://snyk.io/vuln/npm:constantinople:20180421', 'https://www.npmjs.com/advisories/568', 'https://nodesecurity.io/advisories/568', 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'} | null | {'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'} | {'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'} |
npm | GHSA-gpfj-4j6g-c4w9 | Clipboard-based DOM-XSS | ### Impact
A self Cross-Site Scripting vulnerability exists in the @github/paste-markdown library. If the clipboard data contains the string `<table>`, a **div** is dynamically created, and the clipboard content is copied into its **innerHTML** property without any sanitization, resulting in improper execution of Java... | {'CVE-2021-37700'} | 2021-08-30T23:16:08Z | 2021-08-12T20:42:17Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37700', 'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30', 'https://github.com/github/paste-markdown', 'https://github.com/github/paste-markdown/releases/tag/v0.3.4', 'https://github.com/github/paste-markdown/security/advisories/GHSA-g... | null | {'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'} | {'https://github.com/github/paste-markdown/commit/32b7ea3f29ae8f256f9d19768387be42678ddf30'} |
npm | GHSA-pxcf-v868-m492 | Injection and Cross-site Scripting in osm-static-maps | This affects all versions of package osm-static-maps under 3.9.0. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page which give... | {'CVE-2020-7749'} | 2021-08-02T15:31:49Z | 2021-05-10T18:43:45Z | HIGH | null | {'CWE-74', 'CWE-79'} | {'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0', 'https://snyk.io/vuln/SNYK-JS-OSMSTATICMAPS-609637', 'https://github.com/jperelli/osm-static-maps/pull/24', 'https://github.com/jperelli/osm-static-maps/blob/master/src/template.html%23L142', 'https://nvd.nist.gov/vuln/detai... | null | {'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'} | {'https://github.com/jperelli/osm-static-maps/commit/97355d29e08753d1cfe99b1281dbaa06f4e651b0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.