ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
npm
GHSA-jgpq-g82g-6c39
confinit vulnerable to prototype pollution
confinit through 0.3.0 is vulnerable to Prototype Pollution.The 'setDeepProperty' function could be tricked into adding or modifying properties of 'Object.prototype' using a '__proto__' payload.
{'CVE-2020-7638'}
2021-07-28T23:16:44Z
2020-04-07T15:52:05Z
MODERATE
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-CONFINIT-564433', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7638', 'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
null
{'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
{'https://github.com/davideicardi/confinit/commit/a34e06ca5c1c8b047ef112ef188b2fe30d2a1eab'}
npm
GHSA-gvcj-pfq2-wxj7
High severity vulnerability that affects electron
Untrusted search path vulnerability in Atom Electron before 0.33.5 allows local users to gain privileges via a Trojan horse Node.js module in a parent directory of a directory named on a require line.
{'CVE-2016-1202'}
2021-09-13T12:46:47Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-426'}
{'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d', 'https://github.com/electron/electron', 'https://github.com/advisories/GHSA-gvcj-pfq2-wxj7', 'https://github.com/electron/electron/pull/2976', 'http://jvndb.jvn.jp/jvndb/JVNDB-2016-000054', 'http://jvn.jp/en/jp/JVN00324715/index.ht...
null
{'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}
{'https://github.com/electron/electron/commit/9a2e2b365d061ec10cd861391fd5b1344af7194d'}
npm
GHSA-7w54-gp8x-f33m
Potential exposure of tokens to an Unauthorized Actor
### Impact When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication...
{'CVE-2022-21671'}
2022-01-10T23:18:10Z
2022-01-12T22:44:47Z
HIGH
null
{'CWE-200'}
{'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m', 'https://github.com/replit/crosis', 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671'}
null
{'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'}
{'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'}
npm
GHSA-6hwh-rqwf-cxxr
Improperly Controlled Modification of Dynamically-Determined Object Attributes in vega-util
vega-util prior to 1.13.1 allows manipulation of object prototype. The 'vega.mergeConfig' method within vega-util could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10806'}
2021-07-28T18:36:56Z
2021-05-07T16:32:02Z
MODERATE
null
{'CWE-915', 'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10806', 'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b', 'https://snyk.io/vuln/SNYK-JS-VEGAUTIL-559223'}
null
{'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'}
{'https://github.com/vega/vega/commit/8f33a0b5170d7de4f12fc248ec0901234342367b'}
npm
GHSA-9m6j-fcg5-2442
Path traversal in url-parse
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.
{'CVE-2021-27515'}
2021-05-06T16:31:23Z
2021-05-06T16:10:51Z
HIGH
null
{'CWE-23'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27515', 'https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0', 'https://advisory.checkmarx.net/advisory/CX-2021-4306', 'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0', 'https://github.com/unshiftio/url-parse/pull/197'}
null
{'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'}
{'https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0'}
npm
GHSA-hwch-749c-rv63
Potential Command Injection in hubot-scripts
Versions 2.4.3 and earlier of hubot-scripts are vulnerable to a command injection vulnerablity in the `hubot-scripts/package/src/scripts/email.coffee` module. ### Mitigating Factors The email script is not enabled by default, it has to be manually added to hubot's list of loaded scripts. ## Recommendation Update h...
{'CVE-2013-7378'}
2021-04-12T21:34:54Z
2020-08-31T22:46:38Z
CRITICAL
null
{'CWE-74'}
{'https://nodesecurity.io/advisories/Hubot_Potential_command_injection_in_email.coffee', 'https://www.npmjs.com/advisories/13', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7378', 'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782', 'https://web.archive.org/web/20140731222413/', 'htt...
null
{'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'}
{'https://github.com/github/hubot-scripts/commit/feee5abdb038a229a98969ae443cdb8a61747782'}
npm
GHSA-8vv3-jxm8-f4vf
Prototype Pollution in connie-lang
The package connie-lang before 0.1.1 are vulnerable to Prototype Pollution in the configuration language library used by connie.
{'CVE-2020-7706'}
2021-05-05T21:19:56Z
2021-05-06T17:29:25Z
CRITICAL
null
{'CWE-915'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7706', 'https://snyk.io/vuln/SNYK-JS-CONNIELANG-598853', 'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'}
null
{'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'}
{'https://github.com/mattinsler/connie-lang/commit/ef376d404c712dd28309ba07f28a8f87f24a015a'}
npm
GHSA-5w65-6875-rhq8
Undefined Behavior in sailsjs-cacheman
All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave. ## Recommendation No fix is currently available. Consider using an alternative module until a fi...
null
2020-08-31T18:34:32Z
2019-09-11T23:01:57Z
LOW
null
null
{'https://github.com/gayanhewa/sailsjs-cacheman/pull/10', 'https://www.npmjs.com/advisories/752', 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
null
{'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
{'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}
npm
GHSA-98pq-pmw9-4gpm
SQL Injection in sequelize
Affected versions of `sequelize` are vulnerable to SQL Injection in locations where user input is passed into the `limit` or `order` parameters of `sequelize` query calls, such as `findOne` or `findAll`. ## Recommendation Update to version 3.17.0 or later.
{'CVE-2016-10550'}
2020-08-31T18:11:11Z
2019-02-18T23:54:34Z
HIGH
null
{'CWE-89'}
{'https://github.com/advisories/GHSA-98pq-pmw9-4gpm', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10550', 'https://www.npmjs.com/advisories/112', 'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03', 'https://nodesecurity.io/advisories/112'}
null
{'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03'}
{'https://github.com/sequelize/sequelize/pull/5167/commits/f282d85e60e3df5e57ecdb82adccb4eaef404f03'}
npm
GHSA-w8h4-vw8f-rvvj
Improper Control of Dynamically-Managed Code Resources in config-shield
scripts/cli.js in the GoDaddy node-config-shield (aka Config Shield) package before 0.2.2 for Node.js calls eval when processing a set command. NOTE: the vendor reportedly states that this is not a vulnerability. The set command was not intended for use with untrusted data.
{'CVE-2021-26276'}
2022-04-27T20:27:30Z
2021-04-13T15:30:09Z
MODERATE
null
{'CWE-913'}
{'https://github.com/godaddy/node-config-shield', 'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6', 'https://advisory.checkmarx.net/advisory/CX-2021-4773', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26276'}
null
{'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}
{'https://github.com/godaddy/node-config-shield/commit/cdba5d3a7accd661ffbc52e208153464bd0d9da6'}
npm
GHSA-2mm9-c2fx-c7m4
XSS in docsify
This affects the package docsify before 4.12.0. It is possible to bypass the remediation done by CVE-2020-7680 and execute malicious JavaScript through the following methods 1) When parsing HTML from remote URLs, the HTML code on the main page is sanitized, but this sanitization is not taking place in the sidebar. 2) T...
{'CVE-2021-23342'}
2021-03-15T23:55:40Z
2021-03-01T19:44:27Z
HIGH
null
{'CWE-79'}
{'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe', 'http://seclists.org/fulldisclosure/2021/Feb/71', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23342', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1076593', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scr...
null
{'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'}
{'https://github.com/docsifyjs/docsify/commit/ff2a66f12752471277fe81a64ad6c4b2c08111fe'}
npm
GHSA-cxjc-r2fp-7mq6
XSS in dijit editor's LinkDialog plugin
### Impact XSS possible for users of the Dijit Editor's LinkDialog plugin ### Patches Yes, 1.11.11, 1.12.9, 1.13.8, 1.14.7, 1.15.4, 1.16.3 ### Workarounds Users may apply the patch made in these releases. ### For more information If you have any questions or comments about this advisory, open an issue in [dojo/diji...
{'CVE-2020-4051'}
2021-01-08T20:11:17Z
2020-06-15T21:53:12Z
LOW
null
{'CWE-79'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301', 'https://security.netapp.com/advisory/ntap-20201023-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4051', 'https://github.com/dojo/dijit/security/advisories/GHSA-cxjc-r2fp-7mq6...
null
{'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'}
{'https://github.com/dojo/dijit/commit/462bdcd60d0333315fe69ab4709c894d78f61301'}
npm
GHSA-7375-vjr2-3g7w
Cross-Site Scripting in glance
Versions of `glance` before 3.0.8 are vulnerable to Stored Cross-Site Scripting (XSS). This is only exploitable if the attacker is able to control the name of a file that is served by the `glance` package.
{'CVE-2018-3748'}
2021-09-02T19:13:45Z
2018-09-27T11:37:19Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/310133', 'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533', 'https://www.npmjs.com/advisories/610', 'https://github.com/jarofghosts/glance', 'https://github.com/advisories/GHSA-7375-vjr2-3g7w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3748'}
null
{'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'}
{'https://github.com/jarofghosts/glance/commit/cdc68bb68d785343ddb829f1adc130cdd6169533'}
npm
GHSA-x2fc-mxcx-w4mf
Prototype Pollution in mathjs
The package mathjs before 7.5.1 are vulnerable to Prototype Pollution via the deepExtend function that runs upon configuration updates.
{'CVE-2020-7743'}
2021-04-21T19:47:53Z
2021-05-10T18:39:04Z
HIGH
null
{'CWE-915'}
{'https://github.com/josdejong/mathjs/blob/develop/HISTORY.md#2020-10-10-version-751', 'https://snyk.io/vuln/SNYK-JS-MATHJS-1016401', 'https://www.npmjs.com/package/mathjs', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1017113', 'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e', 'https...
null
{'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'}
{'https://github.com/josdejong/mathjs/commit/ecb80514e80bce4e6ec7e71db8ff79954f07c57e'}
npm
GHSA-gcv8-gh4r-25x6
Authorization Bypass Through User-Controlled Key in urijs
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
{'CVE-2022-0613'}
2022-04-01T18:06:53Z
2022-02-17T00:00:35Z
MODERATE
null
{'CWE-639'}
{'https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083', 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613', 'https://github.com/medialize/uri.js', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedora...
null
{'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'}
{'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'}
npm
GHSA-pw2r-vq6v-hr8c
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
{'CVE-2022-0536'}
2022-02-14T22:27:56Z
2022-02-10T00:00:31Z
MODERATE
null
{'CWE-200'}
{'https://github.com/follow-redirects/follow-redirects', 'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445', 'https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'}
null
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'}
{'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'}
npm
GHSA-9g9w-hmvj-5h57
Prototype Pollution in merge-deep
Versions of `merge-deep` before 3.0.1 are vulnerable to prototype pollution via merging functions. ## Recommendation Update to version 3.0.1 or later.
{'CVE-2018-3722'}
2020-08-31T18:28:36Z
2018-07-26T15:17:15Z
LOW
null
{'CWE-471'}
{'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3722', 'https://www.npmjs.com/advisories/580', 'https://github.com/advisories/GHSA-9g9w-hmvj-5h57', 'https://hackerone.com/reports/310708'}
null
{'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'}
{'https://github.com/jonschlinkert/merge-deep/commit/2c33634da7129a5aefcc262d2fec2e72224404e5'}
npm
GHSA-3q32-j57w-q4w7
Path Traversal in total.js
Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths. The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `...
{'CVE-2019-8903'}
2021-08-31T21:22:06Z
2019-02-20T15:40:13Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-8903', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b', 'https://github.com/advisories/GHSA-3q32-j57w-q4w7', 'https://github.com/totaljs/framework', 'https://www.npmjs.com/advisories/1026', 'https://github.com/totaljs/framework/commit/c3...
null
{'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'}
{'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7', 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'}
npm
GHSA-3j9m-hcv9-rpj8
XSS vulnerability allowing arbitrary JavaScript execution
Today we are releasing Grafana 8.2.3. This patch release includes an important security fix for an issue that affects all Grafana versions from 8.0.0-beta1. [Grafana Cloud](https://grafana.com/cloud) instances have already been patched and an audit did not find any usage of this attack vector. [Grafana Enterprise](htt...
{'CVE-2021-41174'}
2021-11-29T15:05:31Z
2021-11-08T18:13:19Z
MODERATE
null
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20211125-0003/', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', '...
null
{'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82'}
{'https://github.com/grafana/grafana/commit/3cb5214fa45eb5a571fd70d6c6edf0d729983f82', 'https://github.com/grafana/grafana/commit/31b78d51c693d828720a5b285107a50e6024c912', 'https://github.com/grafana/grafana/commit/fb85ed691290d211a5baa44d9a641ab137f0de88'}
npm
GHSA-3crj-w4f5-gwh4
Processing untrusted theming resources might execute arbitrary code (ACE)
### Impact When processing theming resources (i.e. `*.less` files) with less-openui5 that originate from an untrusted source, those resources might contain JavaScript code which will be executed in the context of the build process. While this is a [feature](http://lesscss.org/usage/#less-options-enable-inline-javascri...
{'CVE-2021-21316'}
2021-02-16T17:35:25Z
2021-01-29T20:51:37Z
HIGH
null
{'CWE-74'}
{'https://github.com/SAP/less-openui5/releases/tag/v0.10.0', 'https://github.com/SAP/less-openui5/security/advisories/GHSA-3crj-w4f5-gwh4', 'https://www.npmjs.com/package/less-openui5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21316', 'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e...
null
{'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'}
{'https://github.com/SAP/less-openui5/commit/c0d3a8572974a20ea6cee42da11c614a54f100e8'}
npm
GHSA-p6mc-m468-83gw
Prototype Pollution in lodash
Versions of lodash prior to 4.17.19 are vulnerable to Prototype Pollution. The function zipObjectDeep allows a malicious user to modify the prototype of Object if the property identifiers are user-supplied. Being affected by this issue requires zipping objects based on user-provided property arrays. This vulnerability...
{'CVE-2020-8203'}
2022-02-08T22:04:28Z
2020-07-15T19:15:48Z
HIGH
null
{'CWE-1321', 'CWE-770'}
{'https://hackerone.com/reports/712065', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8203', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/lodash/lodash/issues/4874', 'https://github.com/lodash/lodash', 'https://security.netapp.com/advisory/ntap-20200724-0006/', 'https://www.oracle.com/sec...
null
{'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'}
{'https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12'}
npm
GHSA-cwx2-736x-mf6w
Prototype pollution in object-path
### Impact A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and setting the option `i...
{'CVE-2020-15256'}
2021-11-19T14:05:56Z
2020-10-19T20:55:55Z
HIGH
null
{'CWE-471', 'CWE-20'}
{'https://github.com/mariocasciaro/object-path/security/advisories/GHSA-cwx2-736x-mf6w', 'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15256', 'https://github.com/mariocasciaro/object-path'}
null
{'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'}
{'https://github.com/mariocasciaro/object-path/commit/2be3354c6c46215c7635eb1b76d80f1319403c68'}
npm
GHSA-x949-7cm6-fm6p
Code Injection in md-to-pdf.
The package md-to-pdf before 5.0.0 are vulnerable to Remote Code Execution (RCE) due to utilizing the library gray-matter to parse front matter content, without disabling the JS engine.
{'CVE-2021-23639'}
2021-12-15T15:22:46Z
2021-12-16T14:34:40Z
CRITICAL
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-MDTOPDF-1657880', 'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a', 'https://github.com/simonhaenisch/md-to-pdf/issues/99', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23639', 'https://github.com/simonhaenisch/md-to-pdf'}
null
{'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}
{'https://github.com/simonhaenisch/md-to-pdf/commit/a716259c548c82fa1d3b14a3422e9100619d2d8a'}
npm
GHSA-pg97-ww7h-5mjr
XSS in dojox due to insufficient escape in dojox.xmpp.util.xmlEncode
### Impact _What kind of vulnerability is it? Who is impacted?_ Potential XSS vulnerability for users of `dojox/xmpp` and `dojox/dtl`. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes, patches are available for the 1.11 through 1.16 versions. Users should upgrade to one of these...
{'CVE-2019-10785'}
2021-08-19T17:21:06Z
2020-02-13T22:21:06Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DOJOX-548257,', 'https://github.com/dojo/dojox/pull/315', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00033.html', 'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10785', 'https://snyk.io/vuln/SNYK-JS...
null
{'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}
{'https://github.com/dojo/dojox/commit/abd033a787c718abc1a390f480ac3ea61288e5ee'}
npm
GHSA-3949-f494-cm99
Cross-site Scripting in Prism
### Impact Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites tha...
{'CVE-2022-23647'}
2022-02-22T19:32:18Z
2022-02-22T19:32:18Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23647', 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99', 'https://github.com/PrismJS/prism', 'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c', 'https://github.com/PrismJS/prism/pull/3341'}
null
{'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c'}
{'https://github.com/PrismJS/prism/commit/e002e78c343154e1c0ddf9d6a0bb85689e1a5c7c'}
npm
GHSA-7r28-3m3f-r2pr
Regular Expression Denial of Service (ReDoS)
The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expression that is vulnerable to Regular Expression Denial of Service (ReDoS). If an attacker provides a malicious string, is-svg will get stuck processing the input for a very long time.
{'CVE-2021-28092'}
2021-03-25T00:18:05Z
2021-03-19T21:25:50Z
HIGH
null
{'CWE-400'}
{'https://github.com/sindresorhus/is-svg/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28092', 'https://github.com/sindresorhus/is-svg/releases/tag/v4.2.2', 'https://www.npmjs.com/package/is-svg', 'https://security.netapp.com/advisory/ntap-20210513-0008/', 'https://github.com/sindresorhus/is-svg/commit/01f8a087...
null
{'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}
{'https://github.com/sindresorhus/is-svg/commit/01f8a087fab8a69c3ac9085fbb16035907ab6a5b'}
npm
GHSA-pp7m-6j83-m7r6
Cross-site Scripting in video.js
This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
{'CVE-2021-23414'}
2021-08-31T21:01:29Z
2021-08-10T16:09:36Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429', 'https://github.com/videojs/video.js', 'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23414', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEB...
null
{'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'}
{'https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2'}
npm
GHSA-rf54-44jr-q5vf
Improper Input Validation in url-js
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
{'CVE-2022-25839'}
2022-03-28T22:33:07Z
2022-03-12T00:00:26Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25839', 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0', 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030', 'https://github.com/duzun/URL.js'}
null
{'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}
{'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}
npm
GHSA-x9p2-fxq6-2m5f
Reverse Tabnapping in swagger-ui
Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks. ## Recommendation Upg...
null
2021-08-16T23:44:47Z
2019-06-20T14:33:07Z
MODERATE
null
{'CWE-1022'}
{'https://github.com/swagger-api/swagger-ui/pull/4789', 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf', 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0', 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808', 'https://www.npmjs.com/advisories/975'}
null
{'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}
{'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}
npm
GHSA-jcpv-g9rr-qxrc
Regular Expression Denial of Service in hawk
Versions of `hawk` prior to 3.1.3, or 4.x prior to 4.1.1 are affected by a regular expression denial of service vulnerability related to excessively long headers and URI's. ## Recommendation Update to hawk version 4.1.1 or later.
{'CVE-2016-2515'}
2021-09-14T19:39:20Z
2018-07-31T22:52:00Z
HIGH
null
null
{'https://github.com/advisories/GHSA-jcpv-g9rr-qxrc', 'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa', 'https://github.com/hueniverse/hawk', 'https://bugzilla.redhat.com/show_bug.cgi?id=1309721', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2515', 'https://nodesecurity.io/advisories/7...
null
{'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'}
{'https://github.com/hueniverse/hawk/commit/0833f99ba64558525995a7e21d4093da1f3e15fa'}
npm
GHSA-6rv4-4qv6-88g2
Prototype Pollution in set-or-get
Prototype pollution vulnerability in ‘set-or-get’ version 1.0.0 through 1.2.10 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25913'}
2021-04-12T17:39:01Z
2021-04-12T17:39:19Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25913', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25913', 'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936', 'https://www.npmjs.com/package/set-or-get'}
null
{'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}
{'https://github.com/IonicaBizau/set-or-get.js/commit/82ede5cccb2e8d13e4f62599203a4389f6d8e936'}
npm
GHSA-84g3-cv89-m9gm
Prototype pollution vulnerability in 'patchmerge'
Prototype pollution vulnerability in 'patchmerge' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25916'}
2021-10-06T22:34:42Z
2021-10-13T15:33:20Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25916', 'https://github.com/pjshumphreys/patchmerge', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25916'}
null
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}
{'https://github.com/pjshumphreys/patchmerge/commit/5b383c537eae7a00ebd26d3f7211dac99ddecb12'}
npm
GHSA-pgcr-7wm4-mcv6
Sensitive Data Exposure in pem
Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary d...
null
2021-08-04T21:28:00Z
2019-06-04T15:42:45Z
CRITICAL
null
{'CWE-200'}
{'https://github.com/Dexus/pem/pull/217', 'https://snyk.io/vuln/SNYK-JS-PEM-173687', 'https://www.npmjs.com/advisories/723', 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}
null
{'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}
{'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}
npm
GHSA-cxm3-v4mv-6mh8
Cross-site Scripting in vditor
vditor does not filter user input
{'CVE-2021-4103'}
2022-01-28T21:55:58Z
2022-01-28T22:04:11Z
MODERATE
null
{'CWE-79'}
{'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d', 'https://github.com/vanessa219/vditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103', 'https://huntr.dev/bounties/67b980af-7357-4879-9448-a926c6474225', 'https://github.com/Vanessa219/vditor/issues/1133'}
null
{'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}
{'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}
npm
GHSA-8mrf-64fw-2x75
Command injection in fs-path
fs-path node module before 0.0.25 is vulnerable to command injection by way of user-supplied inputs via the `copy`, `copySync`, `remove`, and `removeSync` methods.
{'CVE-2020-8298'}
2021-03-25T21:05:18Z
2021-03-25T21:06:41Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8298', 'https://hackerone.com/reports/324491', 'https://github.com/pillys/fs-path/pull/6', 'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}
null
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}
{'https://github.com/pillys/fs-path/commit/88ff5ee51046bb2c5d5e9c5afe6819b032092ce7'}
npm
GHSA-xfhh-g9f5-x4m4
Resource exhaustion in socket.io-parser
The `socket.io-parser` npm package before versions 3.3.2 and 3.4.1 allows attackers to cause a denial of service (memory consumption) via a large packet because a concatenation approach is used.
{'CVE-2020-36049'}
2021-06-30T16:53:56Z
2021-06-30T16:51:31Z
HIGH
null
{'CWE-400'}
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55', 'https://github.com/bcaller/kill-engine-io', 'https://github.com/socketio/socket.io-parser/releases/tag/3.4.1', 'https://blog.caller.xyz/socketio-engineio-dos/', 'https://github.com/socketio/socket.io-parser/releases/tag/3....
null
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'}
{'https://github.com/socketio/socket.io-parser/commit/dcb942d24db97162ad16a67c2a0cf30875342d55'}
npm
GHSA-8g7p-74h8-hg48
Denial of Service in https-proxy-agent
Versions of `https-proxy-agent` before 2.2.0 are vulnerable to denial of service. This is due to unsanitized options (proxy.auth) being passed to `Buffer()`. ## Recommendation Update to version 2.2.0 or later.
{'CVE-2018-3739'}
2021-09-07T19:45:18Z
2018-07-27T17:04:52Z
CRITICAL
null
{'CWE-400', 'CWE-125'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3736', 'https://www.npmjs.com/advisories/593', 'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07', 'https://github.com/advisories/GHSA-8g7p-74h8-hg48', 'https://github.com/TooTallNate/node-https-proxy-agent', 'https://hacke...
null
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/1c24219df87524e6ed973127e81f30801d658f07'}
npm
GHSA-qxg5-2qff-p49r
Passing in a non-string 'html' argument can lead to unsanitized output
A type-confusion vulnerability can cause `striptags` to concatenate unsanitized strings when an array-like object is passed in as the `html` parameter. This can be abused by an attacker who can control the shape of their input, e.g. if query parameters are passed directly into the function. ### Impact XSS ### Patche...
{'CVE-2021-32696'}
2021-06-18T19:31:21Z
2021-06-18T19:31:35Z
MODERATE
null
{'CWE-241', 'CWE-79', 'CWE-843'}
{'https://www.npmjs.com/package/striptags', 'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca', 'https://github.com/ericnorris/striptags/security/advisories/GHSA-qxg5-2qff-p49r', 'https://github.com/ericnorris/striptags/releases/tag/v3.2.0', 'https://nvd.nist.gov/vuln/detail/CVE-2...
null
{'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'}
{'https://github.com/ericnorris/striptags/commit/f252a6b0819499cd65403707ebaf5cc925f2faca'}
npm
GHSA-8v63-cqqc-6r2c
Prototype Pollution in object-path
object-path is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
{'CVE-2021-3805'}
2021-09-20T20:13:12Z
2021-09-20T20:46:43Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3805', 'https://huntr.dev/bounties/571e3baf-7c46-46e3-9003-ba7e4e623053', 'https://github.com/mariocasciaro/object-path'}
null
{'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
{'https://github.com/mariocasciaro/object-path/commit/4f0903fd7c832d12ccbe0d9c3d7e25d985e9e884'}
npm
GHSA-w7q9-p3jq-fmhm
Uncontrolled resource consumption in jpeg-js
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
{'CVE-2020-8175'}
2020-07-27T15:48:40Z
2020-07-27T15:46:57Z
MODERATE
null
{'CWE-400'}
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8175', 'https://hackerone.com/reports/842462'}
null
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}
{'https://github.com/eugeneware/jpeg-js/commit/135705b1510afb6cb4275a4655d92c58f6843e79'}
npm
GHSA-h47j-hc6x-h3qq
Remote Code Execution Vulnerability in NPM mongo-express
### Impact Remote code execution on the host machine by any authenticated user. ### Proof Of Concept Launching mongo-express on a Mac, pasting the following into the "create index" field will pop open the Mac calculator: ```javascript this.constructor.constructor("return process")().mainModule.require('child_proces...
{'CVE-2019-10758'}
2019-12-30T19:29:02Z
2019-12-30T19:30:31Z
HIGH
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10758', 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq', 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215', 'https://github.com/mongo-ex...
null
{'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}
{'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}
npm
GHSA-pjh3-jv7w-9jpr
Command Injection in gm
Versions of `gm` prior to 1.21.1 are affected by a command injection vulnerability. The vulnerability is triggered when user input is passed into `gm.compare()`, which fails to sanitize input correctly before calling the graphics magic binary. ## Recommendation Update to version 1.21.1 or later.
{'CVE-2015-7982'}
2021-09-23T21:23:47Z
2020-09-01T15:18:55Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31', 'https://github.com/aheckmann/gm', 'https://www.npmjs.com/advisories/54', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7982'}
null
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'}
{'https://github.com/aheckmann/gm/commit/5f5c77490aa84ed313405c88905eb4566135be31'}
npm
GHSA-4fc4-4p5g-6w89
Cross-site Scripting in CKEditor4
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitiza...
{'CVE-2022-24728'}
2022-03-30T20:05:59Z
2022-03-16T22:47:55Z
MODERATE
null
{'CWE-79'}
{'https://securitylab.github.com/advisories/GHSL-2022-009_ckeditor4/', 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949', 'https://ckeditor.com/cke4/release/CKEditor-4.18.0', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728', 'https://github.com/ckeditor/ckeditor4/security/advisori...
null
{'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}
{'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}
npm
GHSA-49rv-g7w5-m8xx
Cross-Site Scripting in @novnc/novnc
Versions of `@novnc/novnc` prior to 0.6.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to validate input from the remote VNC server such as the VNC server name. This allows an attacker in control of the remote server to execute arbitrary JavaScript in the noVNC web page. It affects any users of `incl...
{'CVE-2017-18635'}
2021-09-23T19:08:01Z
2020-08-28T21:24:59Z
MODERATE
null
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2021/12/msg00024.html', 'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534', 'https://github.com/novnc/noVNC/issues/748', 'https://access.redhat.com/errata/RHSA-2020:0754', 'https://www.shielder.it/blog...
null
{'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}
{'https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534'}
npm
GHSA-xwg4-93c6-3h42
Directory Traversal in send
Versions 0.8.3 and earlier of `send` are affected by a directory traversal vulnerability. When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, `static(_dirname + '/...
{'CVE-2014-6394'}
2021-09-22T17:58:56Z
2017-10-24T18:33:36Z
LOW
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-xwg4-93c6-3h42', 'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a', 'http://www.securityfocus.com/bid/70100', 'http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140020.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=114606...
null
{'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}
{'https://github.com/visionmedia/send/commit/9c6ca9b2c0b880afd3ff91ce0d211213c5fa5f9a'}
npm
GHSA-r5cq-9537-9rpf
Prototype Pollution in mixme
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
{'CVE-2021-28860'}
2021-12-13T21:33:52Z
2022-02-10T23:52:01Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/adaltas/node-mixme/issues/1', 'https://www.npmjs.com/~david', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860', 'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028', 'https://github.com/adaltas/node-mixme', 'https://github.com/adaltas/node-mixme/security/advisori...
null
{'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028'}
{'https://github.com/adaltas/node-mixme/commit/cfd5fbfc32368bcf7e06d1c5985ea60e34cd4028'}
npm
GHSA-7c7g-72q7-4xhm
Prototype pollution vulnerability in 'deepref'
Prototype pollution vulnerability in 'deepref' versions 1.1.1 through 1.2.1 allows attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2020-28274'}
2021-10-08T22:15:48Z
2021-10-12T16:27:35Z
CRITICAL
null
null
{'https://github.com/isaymatato/deepref', 'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28274', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28274'}
null
{'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}
{'https://github.com/isaymatato/deepref/commit/24935e6a1060cb09c641d3075982f0b44cfca4c2'}
npm
GHSA-9534-h433-2rjf
Improperly Controlled Modification of Dynamically-Determined Object Attributes in utilitify
utilitify prior to 1.0.3 allows modification of object properties. The merge method could be tricked into adding or modifying properties of the Object.prototype.
{'CVE-2019-10808'}
2021-07-28T18:40:29Z
2021-05-07T16:28:47Z
HIGH
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-UTILITIFY-559497', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10808', 'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
null
{'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
{'https://github.com/xcritical-software/utilitify/commit/88d6e27009823338bf319ffb768fe6b08e8ad2d1,'}
npm
GHSA-3329-pjwv-fjpg
Hostname spoofing via backslashes in URL
### Impact If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allo...
{'CVE-2020-26291'}
2021-01-08T20:55:21Z
2020-12-30T23:40:48Z
MODERATE
null
{'CWE-20'}
{'https://www.npmjs.com/package/urijs', 'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26291', 'https://github.com/medialize/URI.js/releases/tag/v1.19.4', 'https://www.npmjs.com/advisories/1595', 'https://github.com/medialize/URI.js/secu...
null
{'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'}
{'https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155'}
npm
GHSA-vgrx-w6rg-8fqf
Forgeable Public/Private Tokens in jwt-simple
Affected versions of the `jwt-simple` package allow users to select what algorithm the server will use to verify a provided JWT. A malicious actor can use this behaviour to arbitrarily modify the contents of a JWT while still passing verification. For the common use case of the JWT, the end result is a complete authent...
{'CVE-2016-10555'}
2020-08-31T18:10:20Z
2018-11-06T23:12:07Z
CRITICAL
null
{'CWE-20'}
{'https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/', 'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10555', 'https://www.npmjs.com/advisories/87', 'https://github.com/hokaccha/node-jwt-simpl...
null
{'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}
{'https://github.com/hokaccha/node-jwt-simple/commit/957957cfa44474049b4603b293569588ee9ffd97'}
npm
GHSA-7x7c-qm48-pq9c
Cross-site Scripting in karma
karma prior to version 6.3.14 contains a cross-site scripting vulnerability.
{'CVE-2022-0437'}
2022-02-11T19:59:48Z
2022-02-06T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/karma-runner/karma/releases/tag/v6.3.14', 'https://huntr.dev/bounties/64b67ea1-5487-4382-a5f6-e8a95f798885', 'https://github.com/karma-runner/karma/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0437', 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}
null
{'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}
{'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}
npm
GHSA-qm28-7hqv-wg5j
OS Command Injection in ng-packagr
The package ng-packagr before 10.1.1 are vulnerable to Command Injection via the styleIncludePaths option.
{'CVE-2020-7735'}
2021-10-05T16:28:05Z
2021-05-07T16:47:32Z
MODERATE
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-NGPACKAGR-1012427', 'https://github.com/ng-packagr/ng-packagr', 'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7735'}
null
{'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d'}
{'https://github.com/ng-packagr/ng-packagr/commit/bda0fff3443301f252930a73fdc8fb9502de596d'}
npm
GHSA-vwjj-2852-3765
Cross-Site Scripting in forms
Affected versions of `forms` do not properly escape HTML in generated forms, which may result in cross-site scripting. ## Recommendation Update to version 1.3.0 or later.
{'CVE-2017-16015'}
2020-08-31T18:12:53Z
2018-11-09T17:46:27Z
MODERATE
null
{'CWE-80'}
{'https://github.com/advisories/GHSA-vwjj-2852-3765', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16015', 'https://www.npmjs.com/advisories/158', 'https://nodesecurity.io/advisories/158', 'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}
null
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}
{'https://github.com/caolan/forms/commit/bc01e534a0ff863dedb2026a50bd03153bbc6a5d'}
npm
GHSA-gpqq-952q-5327
XSS in the `of` option of the `.position()` util in jquery-ui
### Impact Accepting the value of the `of` option of the [`.position()`](https://api.jqueryui.com/position/) util from untrusted sources may execute untrusted code. For example, invoking the following code: ```js $( "#element" ).position( { my: "left top", at: "right bottom", of: "<img onerror='window.globalOf=true'...
{'CVE-2021-41184'}
2021-10-27T16:59:45Z
2021-10-26T14:55:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://github.com/jquery/jquery-ui', 'https://security.netapp.com/advisory/ntap-20211118-0004/', '...
null
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}
{'https://github.com/jquery/jquery-ui/commit/effa323f1505f2ce7a324e4f429fa9032c72f280'}
npm
GHSA-qmm9-x5gr-4gfm
Open Redirect in hekto
Versions of `hekto` before 0.2.4 are vulnerable to open redirect when a domain name is used as part of the `.html` filename. ## Recommendation Update to version 0.2.4 or later.
{'CVE-2018-3743'}
2020-08-31T18:32:05Z
2018-07-18T21:20:12Z
LOW
null
{'CWE-601'}
{'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46', 'https://github.com/advisories/GHSA-qmm9-x5gr-4gfm', 'https://github.com/herber/hekto/pull/3', 'https://www.npmjs.com/advisories/669', 'https://hackerone.com/reports/320693', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3743'}
null
{'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}
{'https://github.com/herber/hekto/commit/1e5c75f8259ba0daf9b2600db3c246cda1934c46'}
npm
GHSA-2pqj-h3vj-pqgw
Cross-Site Scripting in jquery
Affected versions of `jquery` are vulnerable to cross-site scripting. This occurs because the main `jquery` function uses a regular expression to differentiate between HTML and selectors, but does not properly anchor the regular expression. The result is that `jquery` may interpret HTML as selectors when given certain ...
{'CVE-2012-6708'}
2022-03-03T05:13:33.982770Z
2020-09-01T16:41:46Z
HIGH
null
{'CWE-79', 'CWE-64'}
{'http://packetstormsecurity.com/files/161972/Linksys-EA7500-2.0.8.194281-Cross-Site-Scripting.html', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d', 'https://l...
null
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}
{'https://github.com/jquery/jquery/commit/05531fc4080ae24070930d15ae0cea7ae056457d'}
npm
GHSA-r92x-f52r-x54g
regular expression denial of service (ReDoS)
date-and-time is an npm package for manipulating date and time. In date-and-time before version 0.14.2, there a regular expression involved in parsing which can be exploited to to cause a denial of service. This is fixed in version 0.14.2.
{'CVE-2020-26289'}
2021-01-07T22:33:12Z
2020-12-24T20:49:02Z
HIGH
null
{'CWE-400'}
{'https://github.com/knowledgecode/date-and-time/security/advisories/GHSA-r92x-f52r-x54g', 'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26289', 'https://www.npmjs.com/package/date-and-time', 'https://www.npmjs.com/advisories...
null
{'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a'}
{'https://github.com/knowledgecode/date-and-time/commit/9e4b501eacddccc8b1f559fb414f48472ee17c2a'}
npm
GHSA-xh2p-7p87-fhgh
Incorrect TCR calculation in batchLiquidateTroves() during Recovery Mode
TCR is temporarily miscalculated in the `batchLiquidateTroves` function during Recovery Mode. The bug lies in [`batchLiquidateTroves` of `TroveManager`](https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722). When calculating system's entire c...
null
2021-07-29T20:43:48Z
2021-08-05T16:56:58Z
LOW
null
{'CWE-682'}
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905', 'https://github.com/liquity/dev/blob/7c83ea11378454629618b3808b16fbfda69ee3e5/packages/contracts/contracts/TroveManager.sol#L722', 'https://www.npmjs.com/package/@liquity/contracts', 'https://github.com/liquity/dev/security/advisories/GH...
null
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905'}
{'https://github.com/liquity/dev/commit/c69d0bae30b5457e89724d880851a03ba7477905'}
npm
GHSA-rp2c-jrgp-cvr8
Code injection in plupload
This affects the package plupload before 2.3.9. A file name containing JavaScript code could be uploaded and run. An attacker would need to trick a user to upload this kind of file.
{'CVE-2021-23562'}
2021-12-06T22:08:43Z
2021-12-16T15:32:31Z
MODERATE
null
{'CWE-434', 'CWE-75'}
{'https://github.com/moxiecode/plupload', 'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb', 'https://snyk.io/vuln/SNYK-JS-PLUPLOAD-1583909', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23562', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMOXIECODE-2306664', 'https://snyk.io...
null
{'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}
{'https://github.com/moxiecode/plupload/commit/d12175d4b5fa799b994ee1bb17bfbeec55b386fb'}
npm
GHSA-x2w5-725j-gf2g
Prototype Pollution in convict
An attacker can inject attributes that are used in other components and override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not random users. So it's unlikely...
{'CVE-2022-22143'}
2022-04-20T16:21:03Z
2022-04-20T16:21:03Z
HIGH
null
{'CWE-1321'}
{'https://github.com/mozilla/node-convict/blob/5eb1314f85346760a3c31cb14510f2f0af11d0d3/packages/convict/src/main.js%23L569', 'https://github.com/mozilla/node-convict/', 'https://snyk.io/vuln/SNYK-JS-CONVICT-2340604', 'https://www.huntr.dev/bounties/1-npm-convict/', 'https://github.com/mozilla/node-convict/releases/tag...
null
{'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880'}
{'https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880'}
npm
GHSA-hf2m-j98r-4fqw
API token verification can be bypassed in NodeBB
### Impact Incorrect logic present in the token verification step unintentionally allowed master token access to the API. ### Patches The vulnerability has been patch as of v1.18.5. ### Workarounds Cherry-pick commit hash 04dab1d550cdebf4c1567bca9a51f8b9ca48a500 to receive this patch in lieu of a full upgrade. ### F...
{'CVE-2021-43786'}
2021-12-01T15:06:58Z
2021-11-30T22:21:05Z
CRITICAL
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43786', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-hf2m-j98r-4fqw', 'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500', 'https://github.com/NodeBB/NodeBB'}
null
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'}
{'https://github.com/NodeBB/NodeBB/commit/04dab1d550cdebf4c1567bca9a51f8b9ca48a500'}
npm
GHSA-v88g-cgmw-v5xw
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service...
{'CVE-2020-15366'}
2021-05-10T21:23:41Z
2022-02-10T23:30:59Z
MODERATE
null
{'CWE-915'}
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f', 'https://hackerone.com/bugs?subject=user&report_id=894259', 'https://github.com/ajv-validator/ajv/releases/tag/v6.12.3', 'https://github.com/ajv-validator/ajv/tags', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366'}
null
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f'}
{'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f'}
npm
GHSA-jxfh-8wgv-vfr2
Prototype pollution in dojo
In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. An attacker manipulates these attributes to overwrite, or pollute, a JavaScript a...
{'CVE-2020-5258'}
2022-02-08T22:06:45Z
2020-03-10T18:03:14Z
HIGH
null
{'CWE-74', 'CWE-94', 'CWE-1321'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r665fcc152bd0fec9f71511a6c2435ff24d3a71386b01b1a6df326fd3@%3Cusers.qpid.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00012.html', 'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa6...
null
{'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d'}
{'https://github.com/dojo/dojo/commit/20a00afb68f5587946dc76fbeaa68c39bda2171d'}
npm
GHSA-832h-xg76-4gv6
ReDoS in brace-expansion
Affected versions of `brace-expansion` are vulnerable to a regular expression denial of service condition. ## Proof of Concept ``` var expand = require('brace-expansion'); expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}'); ``` ## Recommendation Update t...
{'CVE-2017-18077'}
2021-09-03T22:10:24Z
2018-01-29T15:50:46Z
HIGH
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/338', 'https://github.com/juliangruber/brace-expansion/issues/33', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18077', 'https://nodesecurity.io/advisories/338', 'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3', 'https://github.c...
null
{'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3'}
{'https://github.com/juliangruber/brace-expansion/pull/35/commits/b13381281cead487cbdbfd6a69fb097ea5e456c3'}
npm
GHSA-5jpf-pj32-xx53
Authorization header is not sanitized in an error object in auth0
### Overview Versions before and including `2.27.0` use a block list of specific keys that should be sanitized from the request object contained in the error object. When a request to Auth0 management API fails, the key for `Authorization` header is not sanitized and the `Authorization` header value can be logged expo...
{'CVE-2020-15125'}
2021-01-07T23:44:25Z
2020-07-29T16:26:22Z
HIGH
null
{'CWE-209'}
{'https://github.com/auth0/node-auth0/tree/v2.27.1', 'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c', 'https://github.com/auth0/node-auth0/pull/507', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15125', 'https://github.com/auth0/node-auth0/security/advisories/GHSA-5jpf-pj32...
null
{'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c'}
{'https://github.com/auth0/node-auth0/pull/507/commits/62ca61b3348ec8e74d7d00358661af1a8bc98a3c'}
npm
GHSA-43ch-2h55-2vj7
Server-Side Request Forgery in private-ip
Insufficient RegEx in private-ip npm package v1.0.5 and below insufficiently filters reserved IP ranges resulting in indeterminate SSRF. An attacker can perform a large range of requests to ARIN reserved IP ranges, resulting in an indeterminable number of critical attack vectors, allowing remote attackers to request se...
{'CVE-2020-28360'}
2021-03-29T21:49:55Z
2021-04-13T15:18:17Z
CRITICAL
null
{'CWE-918'}
{'https://github.com/frenchbread/private-ip', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28360', 'https://www.npmjs.com/package/private-ip', 'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9', 'https://johnjhacking.com/blog/cve-2020-28360/'}
null
{'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}
{'https://github.com/frenchbread/private-ip/commit/840664c4b9ba7888c41cfee9666e9a593db133e9'}
npm
GHSA-xf7w-r453-m56c
Arbitrary File Overwrite in fstream
Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vul...
{'CVE-2019-13173'}
2021-08-04T20:12:16Z
2019-05-30T17:19:34Z
HIGH
null
{'CWE-59'}
{'https://www.npmjs.com/advisories/886', 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html', 'https://usn.ubuntu.com/4123-1/', 'http://lists.opensuse.org/opensus...
null
{'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}
{'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}
npm
GHSA-xqp8-w826-hh6x
Crash server with query parameter
### Impact Parse Server crashes when if a query request contains an invalid value for the `explain` option. This is due to a bug in the MongoDB Node.js driver which throws an exception that Parse Server cannot catch. ### Patches Upgrade to Parse Server 4.10.3
{'CVE-2021-39187'}
2021-09-03T20:35:12Z
2021-09-02T16:51:14Z
HIGH
null
{'CWE-74', 'CWE-20', 'CWE-755'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39187', 'https://jira.mongodb.org/browse/NODE-3463', 'https://github.com/parse-community/parse-server', 'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec', 'https://github.com/parse-community/parse-server/security/advisories/GHSA...
null
{'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec'}
{'https://github.com/parse-community/parse-server/commit/308668c89474223e2448be92d6823b52c1c313ec'}
npm
GHSA-gmjw-49p4-pcfm
Prototype poisoning
### Impact The issue is as follows: when `msgpack5` decodes a map containing a key `"__proto__"`, it assigns the decoded value to `__proto__`. As you are no doubt aware, `Object.prototype.__proto__` is an accessor property for the receiver's prototype. If the value corresponding to the key `__proto__` decodes to a...
{'CVE-2021-21368'}
2021-03-12T16:57:44Z
2021-03-12T22:44:17Z
MODERATE
null
{'CWE-915'}
{'https://www.npmjs.com/package/msgpack5', 'https://github.com/mcollina/msgpack5/security/advisories/GHSA-gmjw-49p4-pcfm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21368', 'https://github.com/mcollina/msgpack5/releases/tag/v5.2.1', 'https://github.com/mcollina/msgpack5/releases/tag/v4.5.1', 'https://github.com/mcolli...
null
{'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8'}
{'https://github.com/mcollina/msgpack5/commit/d4e6cb956ae51c8bb2828e71c7c1107c340cf1e8'}
npm
GHSA-236h-rqv8-8q73
GraphQL: Security breach on Viewer query
### Impact An authenticated user using the viewer GraphQL query can bypass all read security on his User object and can also bypass all objects linked via relation or Pointer on his User object. ### Patches This vulnerability has been patched in Parse Server 4.3.0. ### Workarounds No ### References See [commit 78239...
{'CVE-2020-15126'}
2021-01-07T23:46:50Z
2020-07-22T23:06:47Z
HIGH
null
{'CWE-863'}
{'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa', 'https://github.com/parse-community/parse-server/security/advisories/GHSA-236h-rqv8-8q73', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15126', 'https://github.com/parse-community/parse-server/blob/master/CHANGELOG.md#430'...
null
{'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
{'https://github.com/parse-community/parse-server/commit/78239ac9071167fdf243c55ae4bc9a2c0b0d89aa'}
npm
GHSA-7wwv-vh3v-89cq
ReDOS vulnerabities: multiple grammars
### Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking) [oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS): > The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expres...
null
2022-05-03T08:27:45Z
2020-12-04T16:47:20Z
MODERATE
null
{'CWE-400', 'CWE-20'}
{'https://www.npmjs.com/package/@highlightjs/cdn-assets', 'https://github.com/highlightjs/highlight.js/security/advisories/GHSA-7wwv-vh3v-89cq', 'https://www.npmjs.com/package/highlight.js', 'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c'}
null
{'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c'}
{'https://github.com/highlightjs/highlight.js/commit/373b9d862401162e832ce77305e49b859e110f9c'}
npm
GHSA-8462-q7x7-g2x4
High severity vulnerability that affects bson
The MongoDB bson JavaScript module (also known as js-bson) versions 0.5.0 to 1.0.x before 1.0.5 is vulnerable to a Regular Expression Denial of Service (ReDoS) in lib/bson/decimal128.js. The flaw is triggered when the Decimal128.fromString() function is called to parse a long untrusted string.
{'CVE-2018-13863'}
2021-09-03T22:29:39Z
2018-09-17T20:44:58Z
HIGH
null
{'CWE-400', 'CWE-185'}
{'https://github.com/mongodb/js-bson', 'https://github.com/advisories/GHSA-8462-q7x7-g2x4', 'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a', 'https://snyk.io/vuln/npm:bson:20180225', 'https://nvd.nist.gov/vuln/detail/CVE-2018-13863'}
null
{'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a'}
{'https://github.com/mongodb/js-bson/commit/bd61c45157c53a1698ff23770160cf4783e9ea4a'}
npm
GHSA-xmh9-rg6f-j3mr
Verification flaw in Solid identity-token-verifier
### Impact #### Severity Any Pod on a Solid server using a vulnerable version of the identity-token-verifier library is at risk of a spoofed Demonstration of Proof-of-Possession (DPoP) token binding. This vulnerability could give total and complete access to a targeted Pod. #### Summary A verification flaw in the impl...
null
2021-03-10T04:01:48Z
2021-03-12T22:39:01Z
MODERATE
null
{'CWE-290'}
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c', 'https://www.npmjs.com/package/@solid/identity-token-verifier', 'https://github.com/solid/identity-token-verifier/releases/tag/0.5.2', 'https://github.com/solid/identity-token-verifier/security/advisories/GHSA-xmh9-rg6f...
null
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c'}
{'https://github.com/solid/identity-token-verifier/commit/fbdeb4aa8c12694b3744cd0454acb826817d9e6c'}
npm
GHSA-6gg3-pmm7-97xc
DOM-based XSS in auth0-lock
### Overview Versions before and including `11.25.1` are using `dangerouslySetInnerHTML` to display an informational message when used with a Passwordless or Enterprise connection. - For Passwordless connection, the value of the input (email or phone number) is displayed back to the user while waiting for verification...
{'CVE-2020-15119'}
2021-01-07T23:40:43Z
2020-08-19T21:05:03Z
LOW
null
{'CWE-79'}
{'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b', 'https://github.com/auth0/lock/security/advisories/GHSA-6gg3-pmm7-97xc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15119'}
null
{'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}
{'https://github.com/auth0/lock/commit/3711fb5b42afd40073a61a58759251f51e768b1b'}
npm
GHSA-fg5w-w99f-rj6w
Command Injection in @ronomon/opened
The @ronomon/opened library before 1.5.2 is vulnerable to a command injection vulnerability which would allow a remote attacker to execute commands on the system if the library was used with untrusted input.
{'CVE-2021-29300'}
2021-05-28T16:56:53Z
2021-06-08T23:15:35Z
CRITICAL
null
{'CWE-77'}
{'https://advisory.checkmarx.net/advisory/CX-2021-4775', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29300', 'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'}
null
{'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'}
{'https://github.com/ronomon/opened/commit/7effe011d4fea8fac7f78c00615e0a6e69af68ec'}
npm
GHSA-6fc8-4gx4-v693
ReDoS in Sec-Websocket-Protocol header
### Impact A specially crafted value of the `Sec-Websocket-Protocol` header can be used to significantly slow down a ws server. ### Proof of concept ```js for (const length of [1000, 2000, 4000, 8000, 16000, 32000]) { const value = 'b' + ' '.repeat(length) + 'x'; const start = process.hrtime.bigint(); value.t...
{'CVE-2021-32640'}
2021-10-06T22:05:51Z
2021-05-28T19:19:03Z
MODERATE
null
{'CWE-345', 'CWE-400'}
{'https://github.com/websockets/ws', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32640', 'https://lists.apache.org/thread.html/rdfa7b6253c4d6271e31566ecd5f30b7ce1b8fb2c89d52b8c4e0f4e30@%3Ccommits.tinkerpop.apache.org%3E', 'https://github.com/websockets/ws/security/advisories/GHSA-6fc8-4gx4-v693', 'https://github.com/web...
null
{'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'}
{'https://github.com/websockets/ws/commit/00c425ec77993773d823f018f64a5c44e17023ff'}
npm
GHSA-9r27-994c-4xch
discord-html not escaping HTML code blocks when lacking a language identifier
### Impact Any website using discord-markdown with user-generated markdown is vulnerable to having code injected into the page where the markdown is displayed. ### Patches This has been patched in version 2.3.1 ### Workarounds Escape the characters `&lt;&gt;&amp;` before sending plain code blocks to discord-markdown....
null
2020-02-21T20:20:53Z
2020-02-24T17:34:02Z
HIGH
null
null
{'https://github.com/brussell98/discord-markdown/security/advisories/GHSA-9r27-994c-4xch', 'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7', 'https://github.com/brussell98/discord-markdown/issues/13'}
null
{'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'}
{'https://github.com/brussell98/discord-markdown/commit/7ce2eb66520815dcf5e97ef2bc8a2d5979da66e7'}
npm
GHSA-582f-p4pg-xc74
Regular Expression Denial of Service in csv-parse
Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option. ## Recommendation U...
{'CVE-2019-17592'}
2022-01-04T19:51:33Z
2019-10-15T20:06:16Z
HIGH
null
{'CWE-400', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17592', 'https://github.com/adaltas/node-csv-parse', 'https://www.npmjs.com/advisories/1171', 'https://github.com/adaltas/node-csv-parse/commit/...
null
{'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a'}
{'https://github.com/adaltas/node-csv-parse/commit/b9d35940c6815cdf1dfd6b21857a1f6d0fd51e4a'}
npm
GHSA-3wj8-vp9h-rm6m
Remote Code Execution (RCE)
The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.
{'CVE-2021-23344'}
2021-03-12T22:42:43Z
2021-03-19T21:32:20Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23344', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1077069', 'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'}
null
{'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'}
{'https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04'}
npm
GHSA-vh5w-fg69-rc8m
Improper Input Validation in Google Closure Library
A URL parsing issue in goog.uri of the Google Closure Library versions up to and including v20200224 allows an attacker to send malicious URLs to be parsed by the library and return the wrong authority. Mitigation -- update your library to version v20200315.
{'CVE-2020-8910'}
2021-05-06T20:57:55Z
2021-05-07T16:06:34Z
MODERATE
null
{'CWE-20'}
{'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8910', 'https://github.com/google/closure-library/releases/tag/v20200315'}
null
{'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9'}
{'https://github.com/google/closure-library/commit/294fc00b01d248419d8f8de37580adf2a0024fc9'}
npm
GHSA-5xjx-4xcm-hpcm
Prototype Pollution in ts-nodash
`ts-nodash` before version 1.2.7 is vulnerable to Prototype Pollution via the Merge() function due to lack of validation input.
{'CVE-2021-23403'}
2021-12-10T18:53:36Z
2021-12-10T18:53:42Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23403', 'https://github.com/BadOPCode/NoDash/blob/master/src/Merge.ts', 'https://snyk.io/vuln/SNYK-JS-TSNODASH-1311009'}
null
{'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'}
{'https://github.com/BadOPCode/NoDash/commit/b9cc2b3b49f6cd5228e406bc57e17a28b998fea5'}
npm
GHSA-c6rp-xvqv-mwmf
Cross-site Scripting in epubjs
managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.
{'CVE-2021-33040'}
2022-01-19T14:07:11Z
2022-01-21T23:52:17Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33040', 'https://github.com/futurepress/epub.js/blob/5c7f21d648d9d20d44c6c365d164b16871847023/src/managers/views/iframe.js#L373', 'https://github.com/futurepress/epub.js/compare/v0.3.88...v0.3.89', 'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96...
null
{'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e'}
{'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e'}
npm
GHSA-q26w-wjj2-22vv
Cross-site scripting in Joplin
Joplin allows XSS via a LINK element in a note.
{'CVE-2020-28249'}
2021-04-20T19:38:53Z
2021-05-10T18:47:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28249', 'https://github.com/fhlip0/JopinXSS', 'https://www.npmjs.com/package/joplin', 'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13', 'https://github.com/laurent22/joplin/releases/tag/v1.3.11'}
null
{'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'}
{'https://github.com/laurent22/joplin/commit/fd90a490c0e5cacd17bfe0ffc422be1d2a9b1c13'}
npm
GHSA-8f9f-pc5v-9r5h
Malicious takeover of previously owned ENS names
### Impact A user who owns an ENS domain can set a "trapdoor", allowing them to transfer ownership to another user, and later regain ownership without the new owner's consent or awareness. ### Patches A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. The registry is newly dep...
{'CVE-2020-5232'}
2021-01-08T20:31:45Z
2020-01-30T23:55:04Z
CRITICAL
null
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5232', 'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf', 'https://github.com/ensdomains/ens/security/advisories/GHSA-8f9f-pc5v-9r5h'}
null
{'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf'}
{'https://github.com/ensdomains/ens/commit/36e10e71fcddcade88646821e0a57cc6c19e1ecf'}
npm
GHSA-r628-mhmh-qjhw
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `node-tar` aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent...
{'CVE-2021-32803'}
2021-08-30T23:14:33Z
2021-08-03T19:00:40Z
HIGH
null
{'CWE-23', 'CWE-22'}
{'https://github.com/npm/node-tar/security/advisories/GHSA-r628-mhmh-qjhw', 'https://github.com/npm/node-tar', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32803', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf...
null
{'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'}
{'https://github.com/npm/node-tar/commit/9dbdeb6df8e9dbd96fa9e84341b9d74734be6c20'}
npm
GHSA-62gr-4qp9-h98f
Regular Expression Denial of Service in Handlebars
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
{'CVE-2019-20922'}
2021-04-22T23:31:21Z
2022-02-10T20:38:22Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/1300', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922', 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388', 'https://www.npmjs.com/package/handlebars'}
null
{'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b'}
{'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b'}
npm
GHSA-g6ww-v8xp-vmwg
Prototype pollution in pathval
A prototype pollution vulnerability affects all versions of package pathval under 1.1.1.
{'CVE-2020-7751'}
2022-04-18T21:58:49Z
2022-02-10T20:21:24Z
HIGH
null
{'CWE-20', 'CWE-1321'}
{'https://github.com/chaijs/pathval', 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a', 'https://github.com/chaijs/pathval/pull/58/files', 'https://snyk.io/vuln/SNYK-JS-PATHVAL-596926', 'https://github.com/chaijs/pathval/releases/tag/v1.1.1', 'https://nvd.nist.gov/vuln/detail...
null
{'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a'}
{'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a'}
Hex
GHSA-5653-437f-5hmc
Denial of service
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This...
{'CVE-2019-16764'}
2022-04-12T21:29:30Z
2022-04-12T21:29:30Z
MODERATE
null
{'CWE-400'}
{'http://erlang.org/doc/efficiency_guide/commoncaveats.html#list_to_atom-1', 'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf', 'https://github.com/pow-auth/pow_assent', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764', 'https://github.com/pow-auth/pow_assent/security/advisories/...
null
{'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf'}
{'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf'}
Hex
GHSA-2xxx-fhc8-9qvq
Missing `is_nil` requirement
Ecto will not raise on queries with non-explicit nil comparisons (ie if they aren't checked with `is_nil`).
null
2022-04-12T19:42:45Z
2022-04-12T19:42:45Z
MODERATE
null
null
{'https://github.com/elixir-ecto/ecto/pull/2125', 'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250', 'https://groups.google.com/forum/#!topic/elixir-ecto/0m4NPfg_MMU', 'https://github.com/elixir-ecto/ecto'}
null
{'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250'}
{'https://github.com/elixir-ecto/ecto/commit/db55b0cba6525c24ebddc88ef9ae0c1c00620250'}
Hex
GHSA-w98m-2xqg-9cvj
Remote Code Execution in paginator
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. ### Impact There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function...
{'CVE-2020-15150'}
2022-04-12T19:36:39Z
2022-04-12T19:36:39Z
CRITICAL
null
null
{'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj', 'https://hex.pm/packages/paginator', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15150', 'https://github.com/duffelhq/paginator/blob/ccf0f37fa96347cc8c8a7e9eb2c64462cec4b2dc/README.md#security-considerations', 'https://github.com/duffelhq/...
null
{'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8'}
{'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8'}
Hex
GHSA-j3gg-r6gp-95q2
XSS in HEEx class attributes
The `class` attribute was not protected against XSS attacks when using HEEx.
null
2022-04-12T20:22:57Z
2022-04-12T20:22:57Z
MODERATE
null
{'CWE-79'}
{'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620', 'https://github.com/phoenixframework/phoenix_html'}
null
{'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620'}
{'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620'}
Hex
GHSA-v2wf-c3j6-wpvw
Session fixation
### Impact The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability. ### Workarounds Call `Plug.Conn.configure_ses...
{'CVE-2020-5205'}
2022-04-12T21:27:49Z
2022-04-12T21:27:49Z
MODERATE
null
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5205', 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f', 'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw', 'https://github.com/danschultzer/pow', 'https://github.com/danschultzer/pow/blob/master/CHANGELOG.md#v1...
null
{'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f'}
{'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f'}
Hex
GHSA-9h73-w7ch-rh73
Header Injection
Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1....
{'CVE-2018-1000883'}
2022-04-12T21:26:27Z
2022-04-12T21:26:27Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883', 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml', 'https://github.com/elixir-plug/plug', 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}
null
{'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}
{'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}
Packagist
GHSA-2ccx-2gf3-8xvv
.dev domains and some reverse proxy setups were treated as local in Kirby
### Impact #### About our registration block In order to protect new installations on public servers that don't have an admin account for the Panel yet, we block account registration there by default. This is a security feature, which we implemented years ago in Kirby 2. It helps to avoid that you forget registering ...
{'CVE-2020-26253'}
2021-07-02T16:52:32Z
2021-01-14T19:15:19Z
MODERATE
null
{'CWE-346'}
{'https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa', 'https://github.com/getkirby/kirby/security/advisories/GHSA-2ccx-2gf3-8xvv', 'https://packagist.org/packages/getkirby/panel', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26253', 'https://packagist.org/packages/getkirby/cms', 'https:...
null
{'https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa'}
{'https://github.com/getkirby-v2/panel/commit/7f9ac1876bacb89fd8f142f5e561a02ebb725baa'}
Packagist
GHSA-vvmr-8829-6whx
CSRF token missing in Symfony
Description ----------- The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the conf...
{'CVE-2022-23601'}
2022-02-07T22:11:10Z
2022-02-01T00:46:57Z
HIGH
null
{'CWE-352'}
{'https://github.com/symfony/symfony/', 'https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50', 'https://github.com/symfony/symfony/security/advisories/GHSA-vvmr-8829-6whx', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23601'}
null
{'https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50'}
{'https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50'}
Packagist
GHSA-26rr-v2j2-25fh
Layout XML Arbitrary Code Fix
### Impact Layout XML enabled admin users to execute arbitrary commands via block methods.
{'CVE-2021-32758'}
2021-08-30T16:42:41Z
2021-08-30T17:20:52Z
HIGH
null
{'CWE-91'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32758', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-26rr-v2j2-25fh', 'https://github.com/OpenMage/magento-lts/commit/b99307d00b59c4a226a1e3e4083f02cf2fc8fce7', 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/OpenMage/...
null
{'https://github.com/OpenMage/magento-lts/commit/b99307d00b59c4a226a1e3e4083f02cf2fc8fce7'}
{'https://github.com/OpenMage/magento-lts/commit/b99307d00b59c4a226a1e3e4083f02cf2fc8fce7'}
Packagist
GHSA-8c76-mxv5-w4g8
Stored Cross-site Scripting in Microweber
Microweber 1.2.11 and prior contains multiple stored cross-site scripting vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods.
{'CVE-2022-0954'}
2022-03-28T17:25:37Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/b99517c0-37fc-4efa-ab1a-3591da7f4d26', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0954', 'https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7'}
{'https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7'}
Packagist
GHSA-h86j-6h6m-qjqw
Cross-Site Request Forgery in remdex/livehelperchat
An attacker is able to log out a user if a logged-in user visits the attacker's website. While this cannot harm a user's account, it can be a great annoyance and is a valid CSRF.
{'CVE-2021-4049'}
2021-12-09T17:55:01Z
2021-12-10T20:26:34Z
LOW
null
{'CWE-352'}
{'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/62408fa4-2c16-4fcd-8b34-41fcdccb779e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4049'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57'}
{'https://github.com/livehelperchat/livehelperchat/commit/e7fe1aa6a087d4d21b2e8a0dadd2e08f42acbb57'}
Packagist
GHSA-5mv2-rx3q-4w2v
Code injection in Twig
# Description When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. # Resolution We now disallow calling non Closure in the `sort` filter like we already did for some other filters. # Credits We would like to thank Marlon ...
{'CVE-2022-23614'}
2022-02-11T19:16:32Z
2022-02-10T22:21:48Z
HIGH
null
{'CWE-74'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PECHIY2XLWUH2WLCNPDGNFMPHPRPCEDZ/', 'https://www.debian.org/security/2022/dsa-5107', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23614', 'https://github.com/twigphp/Twig/', 'https://github.com/twigphp/Twig/commit/22b9dc3c03e...
null
{'https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9', 'https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5'}
{'https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9', 'https://github.com/twigphp/Twig/commit/2eb33080558611201b55079d07ac88f207b466d5'}
Packagist
GHSA-cpxc-67rc-c775
Cross Site Scripting in baserCMS
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS). * Impact: XSS via Arbitrary script execution. * Attack vector is: Administrator must be logged in. * Components are: content_fields.php, content_info.php, content_options.php, content_related.php, index_list_tree.php, jquery.bcTree.js * Tested baser...
{'CVE-2020-15154'}
2021-01-07T23:39:30Z
2020-08-28T20:48:12Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15154', 'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-cpxc-67rc-c775', 'https://github.com/baserproject/basercms/commit/7f4b905b90954e394ec10dd35bad2a5dec505371'}
null
{'https://github.com/baserproject/basercms/commit/7f4b905b90954e394ec10dd35bad2a5dec505371'}
{'https://github.com/baserproject/basercms/commit/7f4b905b90954e394ec10dd35bad2a5dec505371'}