ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-r24h-634p-m72x
|
Validation Bypass in schema-inspector
|
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
|
{'CVE-2019-10781'}
|
2021-08-30T13:35:23Z
|
2020-06-10T20:02:47Z
|
CRITICAL
| null |
{'CWE-668'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10781', 'https://github.com/Atinux/schema-inspector', 'https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970', 'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d'}
| null |
npm
|
GHSA-rj5f-7c8x-gjg4
|
Prototype Pollution in promisehelpers
|
All versions of package promisehelpers up to and including version 0.0.5 are vulnerable to Prototype Pollution via the insert function.
|
{'CVE-2020-7723'}
|
2021-05-05T18:14:15Z
|
2021-05-06T18:26:07Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7723', 'https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686'}
| null |
npm
|
GHSA-8hfj-j24r-96c4
|
Path Traversal: 'dir/../../filename' in moment.locale
|
### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarounds
Sanitize user-provided locale name before passing it to moment.js.
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [moment repo](https://github.com/moment/moment)
|
{'CVE-2022-24785'}
|
2022-04-26T21:00:11.102341Z
|
2022-04-04T21:25:48Z
|
HIGH
| null |
{'CWE-27', 'CWE-22'}
|
{'https://www.tenable.com/security/tns-2022-09', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://github.com/moment/moment', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785'}
| null |
npm
|
GHSA-gh4g-3gm9-5wrq
|
Cross-Site Scripting in shave
|
Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting.
## Recommendation
Upgrade to version 2.5.3 or later.
|
{'CVE-2019-12313'}
|
2021-08-04T16:06:35Z
|
2019-05-29T18:38:08Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12313', 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67', 'https://www.npmjs.com/advisories/822', 'https://github.com/dollarshaveclub/shave/compare/852b537...da7371b'}
| null |
npm
|
GHSA-f9cm-qmx5-m98h
|
Prototype Pollution in merge
|
Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype.
## Recommendation
Update to version 1.2.1 or later.
|
{'CVE-2018-16469'}
|
2020-08-31T18:33:24Z
|
2018-11-01T14:45:42Z
|
LOW
| null |
{'CWE-400'}
|
{'https://www.npmjs.com/advisories/722', 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469', 'https://hackerone.com/reports/381194'}
| null |
npm
|
GHSA-273r-rm8g-7f3x
|
Uncaught Exception in mercurius
|
### Impact
Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler.
### Patches
The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2.
### Workarounds
Use a custom error handler.
### References
See https://github.com/mercurius-js/mercurius/issues/677
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/mercurius-js/mercurius
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
|
{'CVE-2021-43801'}
|
2021-12-13T20:20:28Z
|
2021-12-13T21:33:04Z
|
HIGH
| null |
{'CWE-754'}
|
{'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223', 'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/mercurius-js/mercurius', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801', 'https://github.com/mercurius-js/mercurius/issues/677'}
| null |
npm
|
GHSA-vxr4-rxw7-g7v6
|
Prototype Pollution in comb.
|
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.
|
{'CVE-2021-23561'}
|
2021-12-15T15:22:31Z
|
2021-12-16T14:30:56Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23561', 'https://snyk.io/vuln/SNYK-JS-COMB-1730083', 'https://github.com/C2FO/comb'}
| null |
npm
|
GHSA-7j93-2h6r-hm49
|
Cross-Site Scripting in http-file-server
|
All versions of `http-file-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5458'}
|
2020-08-31T18:47:38Z
|
2019-07-31T04:22:36Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/570563', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5458', 'https://www.npmjs.com/advisories/1110'}
| null |
npm
|
GHSA-8v5f-hp78-jgxq
|
Signature Verification Bypass in jwt-simple
|
Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm).
## Recommendation
Upgrade to version 0.5.3 or later.
| null |
2020-08-31T18:37:26Z
|
2019-06-06T15:30:33Z
|
HIGH
| null |
{'CWE-347'}
|
{'https://www.npmjs.com/advisories/831', 'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}
| null |
npm
|
GHSA-6fmm-47qc-p4m4
|
Unauthorized File Access in harp
|
All versions of `harp` are vulnerable to Unauthorized File Access. If a symlink in the project's base directory points to a file outside of the directory, the file is served. This could allow an attacker to access sensitive files on the server.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
|
{'CVE-2019-5438'}
|
2021-01-08T21:27:28Z
|
2019-06-13T16:12:26Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/816', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5438', 'https://hackerone.com/reports/530289'}
| null |
npm
|
GHSA-w6cx-qg2q-rvq8
|
Path Traversal in @finastra/ssr-pages
|
A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/1
- https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
|
{'CVE-2022-24718'}
|
2022-03-10T15:58:38Z
|
2022-03-01T22:09:18Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8', 'https://github.com/Finastra/ssr-pages/pull/1', 'https://github.com/Finastra/ssr-pages', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718', 'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780'}
| null |
npm
|
GHSA-9vrw-m88g-w75q
|
Denial of Service in @hapi/accept
|
Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services.
## Recommendation
Upgrade to version 3.2.4 or 5.0.1.
| null |
2020-08-31T19:00:40Z
|
2020-09-03T15:45:53Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1475'}
| null |
npm
|
GHSA-h24p-2c3m-5qf4
|
Malicious Package in owl-orchard-apple-sunshine
|
All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T16:14:52Z
|
2020-09-03T23:23:23Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1307'}
| null |
npm
|
GHSA-pf2j-9qmp-jqr2
|
SQL Injection and MAID in TypeORM
|
Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.
|
{'CVE-2020-8158'}
|
2021-04-28T17:29:12Z
|
2021-05-07T16:46:42Z
|
CRITICAL
| null |
{'CWE-471', 'CWE-89'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8158', 'https://hackerone.com/reports/869574'}
| null |
npm
|
GHSA-86mr-6m89-vgj3
|
Buffer Overflow in node-weakauras-parser
|
Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems.
## Recommendation
Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.
| null |
2021-10-04T21:10:07Z
|
2020-09-03T15:51:38Z
|
MODERATE
| null |
{'CWE-120'}
|
{'https://www.npmjs.com/advisories/1504', 'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43', 'https://github.com/Zireael-N/node-weakauras-parser'}
| null |
npm
|
GHSA-m86m-5m44-pc93
|
Denial of Service in grpc-ts-health-check
|
Versions of `grpc-ts-health-check` prior to 2.0.0 are vulnerable to Denial of Service. The package exposes an API endpoint that may allow attackers to set the service's health status to failing. This can lead to Denial of Service as Kubernetes blocks traffic to services with a failing status.
## Recommendation
Upgrade to version 2.0.0 or later.
| null |
2020-08-31T18:47:07Z
|
2020-09-03T19:05:46Z
|
LOW
| null | null |
{'https://www.npmjs.com/advisories/1097'}
| null |
npm
|
GHSA-7w8j-85wm-6xfq
|
Prototype Pollution in jquery-bbq
|
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
|
{'CVE-2021-20086'}
|
2021-05-20T22:53:36Z
|
2021-05-24T19:51:58Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20086'}
| null |
npm
|
GHSA-46q2-93hm-52p5
|
Directory Traversal in serverlyr
|
Affected versions of `serverlyr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16089'}
|
2020-08-31T18:20:34Z
|
2020-09-01T16:53:37Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16089', 'https://www.npmjs.com/advisories/365', 'https://nodesecurity.io/advisories/365', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr'}
| null |
npm
|
GHSA-282f-qqgm-c34q
|
Prototype Pollution in node-jsonpointer
|
This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.
|
{'CVE-2021-23807'}
|
2021-11-08T17:44:31Z
|
2021-11-08T17:44:45Z
|
MODERATE
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23807', 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4', 'https://github.com/janl/node-jsonpointer/pull/51', 'https://github.com/janl/node-jsonpointer'}
| null |
npm
|
GHSA-j336-34q7-cgj3
|
Downloads Resources over HTTP in healthcenter
|
Affected versions of `healthcenter` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `healthcenter`.
## Recommendation
This package has been deprecated, and moved to a new package on npm: [`appmetrics`](https://npmjs.com/package/appmetrics).
In order to mitigate this vulnerability, please install the `appmetrics` package in place of `healthcenter` via the following commands:
```
npm uninstall healthcenter -s
npm install appmetrics -s
```
|
{'CVE-2016-10684'}
|
2021-01-08T18:38:24Z
|
2019-02-18T23:42:06Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/288', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10684', 'https://github.com/advisories/GHSA-j336-34q7-cgj3', 'https://www.npmjs.com/advisories/288'}
| null |
npm
|
GHSA-p3rp-vmj9-gv6v
|
Incorrect sanitisation function leads to `XSS` in mermaid
|
### Impact
Malicious diagrams can contain javascript code that can be run at diagram readers machines.
### Patches
The users should upgrade to version 8.13.8
### Workarounds
You need to upgrade in order to avoid this issue.
|
{'CVE-2021-43861'}
|
2022-01-06T19:02:22Z
|
2022-01-06T19:45:59Z
|
HIGH
| null |
{'CWE-79', 'CWE-20'}
|
{'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v', 'https://github.com/mermaid-js/mermaid/releases/tag/8.13.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43861', 'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83', 'https://github.com/mermaid-js/mermaid'}
| null |
npm
|
GHSA-m5pj-vjjf-4m3h
|
Arbitrary Code Execution in grunt
|
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
|
{'CVE-2020-7729'}
|
2021-05-04T22:57:23Z
|
2021-05-06T18:27:18Z
|
HIGH
| null |
{'CWE-1188'}
|
{'https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729', 'https://snyk.io/vuln/SNYK-JS-GRUNT-597546', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922', 'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249', 'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7', 'https://usn.ubuntu.com/4595-1/'}
| null |
npm
|
GHSA-6xc2-mj39-q599
|
Privilege Escalation in strapi
|
Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token.
## Recommendation
Upgrade to version 3.0.0-beta.17.5 or later.
|
{'CVE-2019-18818'}
|
2022-02-09T18:27:23Z
|
2019-12-02T18:20:41Z
|
HIGH
| null |
{'CWE-640'}
|
{'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html', 'https://github.com/strapi/strapi/pull/4443', 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html', 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818', 'https://github.com/strapi/strapi', 'https://www.npmjs.com/advisories/1311'}
| null |
npm
|
GHSA-r6fw-8m27-43c9
|
Command injection in portkiller
|
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
|
{'CVE-2021-23379'}
|
2021-04-19T21:19:04Z
|
2021-05-06T15:53:20Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://www.npmjs.com/package/portkiller', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23379', 'https://github.com/indatawetrust/portkiller/blob/f1f1c5076d9c5d60e8dd3930e98d665d8191aa7a/index.js%23L10', 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537'}
| null |
npm
|
GHSA-pvmx-g8h5-cprj
|
Advanced Content Filter (ACF) vulnerability allowing to execute JavaScript code using malformed HTML
|
### Affected packages
The vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 Advanced Content Filter (ACF) core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.17.0.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Maurice Dauer ([laytonctf](https://twitter.com/laytonctf)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-41164'}
|
2022-02-08T20:39:22Z
|
2021-11-17T21:55:10Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41164', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-5h5r-23r4-m87h
|
Cross-Site Scripting in gitbook
|
Affected versions of `gitbook` do not properly sanitize user input outside of backticks, which may result in cross-site scripting in the online reader.
## Recommendation
Update to version 3.2.2 or later.
|
{'CVE-2017-16019'}
|
2020-08-31T18:12:55Z
|
2020-09-01T16:04:39Z
|
LOW
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/159', 'https://github.com/GitbookIO/gitbook/issues/1609', 'https://nodesecurity.io/advisories/159', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16019'}
| null |
npm
|
GHSA-ccw5-7vfh-p5hm
|
Directory Traversal in dmmcquay.lab6
|
Affected versions of `dmmcquay.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16208'}
|
2020-08-31T18:22:41Z
|
2020-09-01T18:14:15Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/426', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16208', 'https://www.npmjs.com/advisories/426', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6'}
| null |
npm
|
GHSA-fjqr-fx3f-g4rv
|
Electron protocol handler browser vulnerable to Command Injection
|
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
|
{'CVE-2018-1000118'}
|
2022-04-26T14:35:22Z
|
2018-03-26T16:41:20Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv', 'https://electronjs.org/releases#1.8.2-beta.5', 'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118'}
| null |
npm
|
GHSA-3p8f-j2vw-7hw9
|
Hijacked Environment Variables in mssql-node
|
The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this module is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16059'}
|
2020-08-31T18:24:46Z
|
2018-11-09T17:43:44Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/480', 'https://nodesecurity.io/advisories/480', 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059'}
| null |
npm
|
GHSA-x5x2-mfc7-r22f
|
Directory Traversal in picard
|
Affected versions of `picard` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16194'}
|
2020-08-31T18:23:04Z
|
2018-07-23T20:40:20Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/436', 'https://github.com/advisories/GHSA-x5x2-mfc7-r22f', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16194', 'https://www.npmjs.com/advisories/436'}
| null |
npm
|
GHSA-fr6q-jv7j-35g3
|
Path Traversal in w-zip
|
Path Traversal in NPM w-zip prior to 1.0.12.
|
{'CVE-2022-0401'}
|
2022-02-07T19:12:42Z
|
2022-02-02T00:01:46Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d', 'https://github.com/yuda-lyu/w-zip', 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0401'}
| null |
npm
|
GHSA-3wh2-2pp3-2823
|
Malicious Package in simple-alipay
|
Version 1.0.1 of `simple-alipay` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.1 of this module is found installed you will want to replace it with a version before or after 1.0.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:49Z
|
2020-09-01T20:35:18Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/637'}
| null |
npm
|
GHSA-8h2f-7jc4-7m3m
|
Open Redirect in urijs
|
urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613.
|
{'CVE-2022-0868'}
|
2022-03-14T21:10:46Z
|
2022-03-07T00:00:40Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/medialize/URI.js/releases/tag/v1.19.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868', 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509', 'https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02', 'https://github.com/medialize/uri.js'}
| null |
npm
|
GHSA-jfgq-g48x-jq83
|
Downloads Resources over HTTP in iedriver
|
Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`.
## Recommendation
Update to iedriver version 3.0.0 or greater.
|
{'CVE-2016-10562'}
|
2021-01-08T18:35:18Z
|
2019-02-18T23:54:20Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-jfgq-g48x-jq83', 'https://www.npmjs.com/advisories/174', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562', 'https://nodesecurity.io/advisories/174'}
| null |
npm
|
GHSA-8p52-7cxv-6c95
|
Downloads Resources over HTTP in curses
|
Affected versions of `curses` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `curses`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not been updated since 2013.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10615'}
|
2021-01-08T19:08:24Z
|
2019-02-18T23:56:47Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/215', 'https://nodesecurity.io/advisories/215', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10615', 'https://github.com/advisories/GHSA-8p52-7cxv-6c95'}
| null |
npm
|
GHSA-76qf-6mvw-c5hm
|
Malicious Package in js-base64-int
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:16:45Z
|
2020-09-03T19:45:42Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1128'}
| null |
npm
|
GHSA-856x-cp3q-47vg
|
Insecure Default Configuration in airbrake
|
Affected versions of `airbrake` default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information.
## Recommendation
Update to version 0.4.0 or later, or upgrade from the now-deprecated `airbrake` module to its replacement, [`airbrake-js`](https://www.npmjs.com/package/airbrake-js).
|
{'CVE-2016-10530'}
|
2020-08-31T18:10:42Z
|
2019-02-18T23:58:13Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10530', 'https://www.npmjs.com/advisories/96', 'https://github.com/airbrake/node-airbrake/issues/70', 'https://github.com/advisories/GHSA-856x-cp3q-47vg', 'https://nodesecurity.io/advisories/96'}
| null |
npm
|
GHSA-86ch-6w7v-v6xf
|
Denial of Service in soketi
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simply just crash the server for trying to send a response after the request closed.
All users that run the server are affected by it and it's highly recommended to upgrade to the latest patch.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
Updating to at least 0.24.1 or the latest version.
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
No. Upgrading is the only solution.
### References
_Are there any links users can visit to find out more?_
https://github.com/soketi/soketi/releases/tag/0.24.1
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [the issues board](https://github.com/soketi/soketi/issues)
* Email us at [alex@renoki.org](mailto:alex@renoki.org)
|
{'CVE-2022-21667'}
|
2022-01-18T22:37:17Z
|
2022-01-08T00:24:44Z
|
HIGH
| null |
{'CWE-755'}
|
{'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/releases/tag/0.24.1', 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667', 'https://github.com/soketi/soketi'}
| null |
npm
|
GHSA-wfhx-6pcm-7m55
|
Path Traversal in ponse
|
Versions of `ponse` prior to 2.0.2 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
Upgrade to version 2.0.2 or later.
| null |
2020-08-31T18:43:41Z
|
2020-09-03T16:46:22Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/383112', 'https://www.npmjs.com/advisories/1002'}
| null |
npm
|
GHSA-ff29-f57w-2mm3
|
Downloads Resources over HTTP in geoip-lite-country
|
Affected versions of `geoip-lite-country` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
Update to version 1.1.4 or later.
|
{'CVE-2016-10568'}
|
2021-01-08T18:53:25Z
|
2019-02-18T23:54:03Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/183', 'https://github.com/advisories/GHSA-ff29-f57w-2mm3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10568', 'https://nodesecurity.io/advisories/183'}
| null |
npm
|
GHSA-9qrh-qjmc-5w2p
|
Denial-of-Service when binding invalid parameters in sqlite3
|
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
|
{'CVE-2022-21227'}
|
2022-05-03T02:24:25Z
|
2022-04-28T20:25:23Z
|
HIGH
| null |
{'CWE-248'}
|
{'https://github.com/TryGhost/node-sqlite3', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227', 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a', 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://github.com/TryGhost/node-sqlite3/issues/1440', 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p', 'https://github.com/TryGhost/node-sqlite3/issues/1449', 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645'}
| null |
npm
|
GHSA-wqh4-27cc-j8f2
|
Hijacked Environment Variables in nodeffmpeg
|
The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16069'}
|
2020-08-31T18:25:48Z
|
2018-08-29T23:36:48Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/508', 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2', 'https://nodesecurity.io/advisories/508', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069'}
| null |
npm
|
GHSA-7fm6-gxqg-2pwr
|
Code Injection in total.js
|
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
|
{'CVE-2021-23389'}
|
2021-07-13T19:51:48Z
|
2021-12-10T17:26:06Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607'}
| null |
npm
|
GHSA-qpqh-46qj-vwcw
|
Cross-site Scripting in docsify
|
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
|
{'CVE-2020-7680'}
|
2021-05-10T21:00:22Z
|
2021-05-18T01:53:18Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099', 'http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html', 'https://github.com/docsifyjs/docsify/issues/1126', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://github.com/docsifyjs/docsify/pull/1128', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7680', 'http://seclists.org/fulldisclosure/2021/Feb/71'}
| null |
npm
|
GHSA-v7x3-7hw7-pcjg
|
Moderate severity vulnerability that affects renovate
|
## Go Modules Vulnerability Disclosure
### Impact
Temporary repository tokens were leaked into Pull Requests comments in during certain Go Modules update failure scenarios.
### Patches
The problem has been patched. Self-hosted users should upgrade to v19.38.7 or later.
### Workarounds
Disable Go Modules support.
### References
Blog post: https://renovatebot.com/blog/go-modules-vulnerability-disclosure
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Renovate](http://github.com/renovatebot/renovate)
* Email us at [support@renovatebot.com](mailto:support@renovatebot.com)
| null |
2021-09-20T21:11:50Z
|
2019-10-21T16:02:33Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/renovatebot/renovate/security/advisories/GHSA-v7x3-7hw7-pcjg', 'https://github.com/advisories/GHSA-v7x3-7hw7-pcjg', 'https://github.com/renovatebot/renovate', 'https://snyk.io/vuln/SNYK-JS-RENOVATE-536203'}
| null |
npm
|
GHSA-9c2p-jw8p-f84v
|
SQL Injection in sequelize
|
Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability.
## Proof of Concept
In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped.
Example Query:
```
database.query('SELECT * FROM TestTable WHERE Name IN (:names)', {
replacements: {
names: directCopyOfUserInput
}
});
```
If the user inputs the value of `:names` as:
```
["test", "'); DELETE TestTable WHERE Id = 1 --')"]
```
The resulting SQL statement will be:
```
SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --')
```
As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1.
## Recommendation
Update to version 3.20.0 or later.
|
{'CVE-2016-10556'}
|
2020-08-31T18:10:56Z
|
2019-02-18T23:54:24Z
|
CRITICAL
| null |
{'CWE-89'}
|
{'https://www.npmjs.com/advisories/102', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556', 'https://nodesecurity.io/advisories/102', 'https://github.com/sequelize/sequelize/issues/5671', 'https://github.com/advisories/GHSA-9c2p-jw8p-f84v'}
| null |
npm
|
GHSA-h5mp-5q4p-ggf5
|
Prototype Pollution in lodash.defaultsdeep
|
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later.
| null |
2020-08-31T18:46:09Z
|
2020-09-03T18:07:05Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1068'}
| null |
npm
|
GHSA-776r-w3v9-96mv
|
Directory Traversal in censorify.tanisjr
|
Affected versions of `censorify.tanisjr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16157'}
|
2020-08-31T18:21:34Z
|
2018-07-23T20:46:16Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16157', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr', 'https://nodesecurity.io/advisories/392', 'https://github.com/advisories/GHSA-776r-w3v9-96mv', 'https://www.npmjs.com/advisories/392'}
| null |
npm
|
GHSA-29fh-xcjr-p7rx
|
Malicious Package in web3-eht
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-04T19:10:02Z
|
2020-09-03T17:02:22Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1416'}
| null |
npm
|
GHSA-c3m8-x3cg-qm2c
|
Configuration Override in helmet-csp
|
Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting.
## Recommendation
Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue.
| null |
2021-09-29T18:45:07Z
|
2020-09-03T20:39:53Z
|
MODERATE
| null | null |
{'https://www.npmjs.com/advisories/1176', 'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436', 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a', 'https://github.com/helmetjs/csp/'}
| null |
npm
|
GHSA-m94c-37g6-cjhc
|
Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.
|
### Affected packages
The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected:
* [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects)
* [Link](https://ckeditor.com/cke4/addon/link)
* [Flash](https://ckeditor.com/cke4/addon/flash)
* [Iframe](https://ckeditor.com/cke4/addon/iframe)
* [Forms](https://ckeditor.com/cke4/addon/forms)
* [Page Break](https://ckeditor.com/cke4/addon/pagebreak)
### Impact
A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.16.2.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-37695'}
|
2022-02-08T21:01:39Z
|
2021-08-23T19:42:15Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37695', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-7f63-h6g3-7cwm
|
Cross Site Scripting (XSS) in @finastra/ssr-pages
|
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/2
- https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5
- https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
|
{'CVE-2022-24717'}
|
2022-03-10T15:59:12Z
|
2022-03-01T22:09:25Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717', 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5', 'https://github.com/Finastra/ssr-pages', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/pull/2'}
| null |
npm
|
GHSA-v588-qcp3-jv46
|
Path Traversal in serve
|
Versions of `serve` prior to 7.0.1 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through if the path contains a `/./`, which allows attackers to access hidden folders and files.
## Recommendation
Upgrade to version 7.0.1 or later.
|
{'CVE-2019-5415'}
|
2020-08-31T18:43:59Z
|
2019-03-25T18:03:58Z
|
HIGH
| null |
{'CWE-548'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5415', 'https://www.npmjs.com/advisories/1010', 'https://github.com/advisories/GHSA-v588-qcp3-jv46', 'https://hackerone.com/reports/330724'}
| null |
npm
|
GHSA-4x6v-rwh4-55jw
|
Pomelo allows external control of critical state data
|
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
|
{'CVE-2019-18954'}
|
2021-08-19T16:02:00Z
|
2019-12-02T18:16:34Z
|
MODERATE
| null |
{'CWE-668'}
|
{'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954', 'https://github.com/NetEase/pomelo/issues/1149'}
| null |
npm
|
GHSA-3hq6-rmv7-39vh
|
Injection in op-browser
|
op-browser through 1.0.9 is vulnerable to Command Injection. It allows execution of arbitrary commands via the url function.
|
{'CVE-2020-7625'}
|
2022-02-10T23:45:28Z
|
2022-02-10T23:45:28Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7625', 'https://github.com/hiproxy/open-browser/blob/master/lib/index.js#L75,', 'https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259', 'https://github.com/hiproxy/open-browser/pull/4', 'https://github.com/hiproxy/open-browser/pull/3'}
| null |
npm
|
GHSA-qv2g-99x4-45x6
|
Malicious npm package: discord-fix
|
The npm `discord-fix` package has been identified as malicious and removed from the npm package registry.
## Remediation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-01-29T18:11:36Z
|
2021-01-29T18:12:07Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755', 'https://www.npmjs.com/advisories/1597'}
| null |
npm
|
GHSA-x56r-5r34-qg74
|
Downloads Resources over HTTP in dalek-browser-ie-canary
|
Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`.
## Recommendation
No patch is currently available for this vulnerability, and the package author has marked the package as deprecated.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10612'}
|
2021-01-08T00:47:49Z
|
2019-02-18T23:47:47Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/205', 'https://github.com/advisories/GHSA-x56r-5r34-qg74', 'https://nodesecurity.io/advisories/205', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10612'}
| null |
npm
|
GHSA-hf66-r44g-p7j9
|
Inefficient Regular Expression Complexity in handsontable
|
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.
|
{'CVE-2021-23446'}
|
2021-09-30T16:50:57Z
|
2021-09-30T17:10:46Z
|
HIGH
| null |
{'CWE-1333'}
|
{'https://github.com/handsontable/handsontable', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797', 'https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23446', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795', 'https://github.com/handsontable/handsontable/issues/8752', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794', 'https://github.com/handsontable/handsontable/pull/8742', 'https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793'}
| null |
npm
|
GHSA-j38m-7q52-fgfh
|
Directory Traversal in node-server-forfront
|
Affected versions of `node-server-forfront` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16124'}
|
2020-08-31T18:21:10Z
|
2018-07-23T23:33:42Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/382', 'https://www.npmjs.com/advisories/382', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16124', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront', 'https://github.com/advisories/GHSA-j38m-7q52-fgfh'}
| null |
npm
|
GHSA-94x5-94wf-m445
|
Directory Traversal in gomeplus-h5-proxy
|
Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16037'}
|
2020-08-31T18:20:15Z
|
2018-07-24T15:48:38Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16037', 'https://github.com/advisories/GHSA-94x5-94wf-m445', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy', 'https://www.npmjs.com/advisories/350', 'https://nodesecurity.io/advisories/350'}
| null |
npm
|
GHSA-rh7p-9c79-gpp8
|
Downloads Resources over HTTP in wasdk
|
Affected versions of `wasdk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wasdk`.
## Recommendation
No fix is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit it are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10587'}
|
2021-09-17T18:23:51Z
|
2019-02-18T23:34:44Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/179', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10587', 'https://github.com/advisories/GHSA-rh7p-9c79-gpp8'}
| null |
npm
|
GHSA-m639-9whg-fw97
|
Prototype Pollution in object-extend
|
The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend.
|
{'CVE-2021-23702'}
|
2022-02-28T22:17:42Z
|
2022-02-19T00:01:25Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23702', 'https://github.com/bernhardw/object-extend', 'https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470'}
| null |
npm
|
GHSA-j9pj-hx76-92v6
|
Server-Side Request Forgery in phantomjs-seo
|
This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack.
|
{'CVE-2020-7739'}
|
2021-04-21T20:55:27Z
|
2021-05-10T18:38:21Z
|
HIGH
| null |
{'CWE-918', 'CWE-20'}
|
{'https://github.com/areverberi/phantomjs-seo/blob/083f66892f97d67031668decb917389ffc32a94c/index.js%23L17', 'https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638', 'https://www.npmjs.com/package/phantomjs-seo', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7739'}
| null |
npm
|
GHSA-r2j6-p67h-q639
|
Secret disclosure when containing characters that become URI encoded
|
### Impact
Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL.
### Patches
Fixed in v17.2.3
### Workarounds
Secrets that do not contain characters that become encoded when included in a URL are already masked properly.
|
{'CVE-2020-26226'}
|
2021-01-07T22:41:34Z
|
2020-11-18T21:19:14Z
|
HIGH
| null |
{'CWE-116'}
|
{'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a', 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226'}
| null |
npm
|
GHSA-92xj-mqp7-vmcj
|
Prototype Pollution in node-forge
|
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
|
{'CVE-2020-7720'}
|
2022-01-13T18:24:30Z
|
2020-09-14T21:42:09Z
|
HIGH
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/digitalbazaar/forge', 'https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7720', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed'}
| null |
npm
|
GHSA-675m-85rw-j3w4
|
Prototype Pollution in just-extend
|
Versions of `just-extend` before 4.0.0 are vulnerable to prototype pollution. Provided certain input `just-extend` can add or modify properties of the `Object` prototype. These properties will be present on all objects.
## Recommendation
Update to version `4.0.0` or later.
|
{'CVE-2018-16489'}
|
2020-08-31T18:35:29Z
|
2019-02-07T18:17:12Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-675m-85rw-j3w4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16489', 'https://www.npmjs.com/advisories/780', 'https://hackerone.com/reports/430291'}
| null |
npm
|
GHSA-vwjc-q9px-r9vq
|
Denial of Service in ecstatic
|
Versions of `ecstatic` prior to 1.4.0 are affected by a denial of service vulnerability when certain input strings are sent via the `Last-Modified` or `If-Modified-Since` headers.
Parsing certain inputs with `new Date()` or `Date.parse()` cases v8 to crash. As ecstatic passes the value of the affected headers into one of these functions, sending certain inputs via one of the headers will cause the server to crash.
## Recommendation
Update to version 1.4.0 or later.
|
{'CVE-2015-9242'}
|
2020-08-31T18:09:49Z
|
2018-06-07T19:43:11Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://www.npmjs.com/advisories/64', 'https://github.com/advisories/GHSA-vwjc-q9px-r9vq', 'https://bugs.chromium.org/p/v8/issues/detail?id=4640', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9242'}
| null |
npm
|
GHSA-j7qv-pgf6-hvh4
|
XSS in `*Text` options of the Datepicker widget in jquery-ui
|
### Impact
Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way:
```js
$( "#datepicker" ).datepicker( {
showButtonPanel: true,
showOn: "both",
closeText: "<script>doEvilThing( 'closeText XSS' )</script>",
currentText: "<script>doEvilThing( 'currentText XSS' )</script>",
prevText: "<script>doEvilThing( 'prevText XSS' )</script>",
nextText: "<script>doEvilThing( 'nextText XSS' )</script>",
buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>",
appendText: "<script>doEvilThing( 'appendText XSS' )</script>",
} );
```
will call `doEvilThing` with 6 different parameters coming from all `*Text` options.
### Patches
The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML.
### Workarounds
A workaround is to not accept the value of the `*Text` options from untrusted sources.
### For more information
If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
|
{'CVE-2021-41183'}
|
2021-10-27T17:00:26Z
|
2021-10-26T14:55:21Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://github.com/jquery/jquery-ui/pull/1953', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-contrib-2022-004', 'https://www.tenable.com/security/tns-2022-09', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/jquery/jquery-ui', 'https://www.drupal.org/sa-core-2022-001', 'https://bugs.jqueryui.com/ticket/15284', 'https://www.drupal.org/sa-core-2022-002', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}
| null |
npm
|
GHSA-4rq4-32rv-6wp6
|
Improper Privilege Management in shelljs
|
shelljs is vulnerable to Improper Privilege Management
|
{'CVE-2022-0144'}
|
2022-01-21T21:05:51Z
|
2022-01-21T23:37:28Z
|
HIGH
| null |
{'CWE-269'}
|
{'https://github.com/shelljs/shelljs', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144', 'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'}
| null |
npm
|
GHSA-mj87-8xf8-fp4w
|
Cross-Site Scripting in yui
|
Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url.
## Recommendation
YUI has published their recommendation to fix this issue.
Their recommendation is to:
- Delete self-hosted copies of these files if you are not using them
- Use the Yahoo! CDN hosted files
- Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution).
|
{'CVE-2013-4939'}
|
2020-08-31T18:19:38Z
|
2020-09-01T16:42:51Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://yuilibrary.com/support/20130515-vulnerability/', 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678', 'https://www.npmjs.com/advisories/332', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939', 'https://yuilibrary.com/support/20130515-vulnerability/', 'https://moodle.org/mod/forum/discuss.php?d=232496', 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E'}
| null |
npm
|
GHSA-jpjp-vxv6-59hm
|
Directory Traversal in open-device
|
Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16187'}
|
2020-08-31T18:23:30Z
|
2018-07-23T20:41:11Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device', 'https://www.npmjs.com/advisories/447', 'https://nodesecurity.io/advisories/447', 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187'}
| null |
npm
|
GHSA-cch6-5x4h-6qc5
|
Directory Traversal in tiny-http
|
Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16097'}
|
2020-08-31T18:19:59Z
|
2020-09-01T16:46:04Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/342', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097', 'https://nodesecurity.io/advisories/342'}
| null |
npm
|
GHSA-mpww-j7xj-cj35
|
Downloads Resources over HTTP in native-opencv
|
Affected versions of `native-opencv` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `native-opencv`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2015.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10658'}
|
2021-01-08T18:26:48Z
|
2019-02-18T23:45:07Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/263', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10658', 'https://github.com/advisories/GHSA-mpww-j7xj-cj35', 'https://www.npmjs.com/advisories/263'}
| null |
npm
|
GHSA-cmj2-m9m2-6726
|
Downloads Resources over HTTP in grunt-ccompiler
|
Affected versions of `grunt-ccompiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-ccompiler`.
## Recommendation
No patch is currently available for this vulnerability, and the repository has been deleted from the owner's github account.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10636'}
|
2021-01-08T18:57:39Z
|
2019-02-18T23:47:11Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/239', 'https://github.com/advisories/GHSA-cmj2-m9m2-6726', 'https://www.npmjs.com/advisories/239', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10636'}
| null |
npm
|
GHSA-6494-v9fq-fgq2
|
Keystone is vulnerable to CSV injection
|
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
|
{'CVE-2017-15879'}
|
2022-04-25T22:05:05Z
|
2017-11-16T01:46:50Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15879', 'https://github.com/advisories/GHSA-6494-v9fq-fgq2', 'https://www.exploit-db.com/exploits/43053/', 'https://github.com/keystonejs/keystone/pull/4478', 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}
| null |
npm
|
GHSA-wv83-jrfh-rp33
|
Cross site scripting in kindeditor
|
Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).
|
{'CVE-2021-42227'}
|
2021-10-21T14:56:27Z
|
2021-10-18T19:44:32Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/kindsoft/kindeditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42227', 'https://github.com/kindsoft/kindeditor/issues/336'}
| null |
npm
|
GHSA-7xc4-793x-25jp
|
Malicious Package in bpi66
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:49:13Z
|
2020-09-04T16:48:38Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1374'}
| null |
npm
|
GHSA-78cj-fxph-m83p
|
Regular Expression Denial of Service (ReDoS) in ua-parser-js
|
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
|
{'CVE-2021-27292'}
|
2021-03-24T23:33:16Z
|
2021-05-06T16:11:13Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27292', 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566'}
| null |
npm
|
GHSA-4jwp-vfvf-657p
|
Deserialization of Untrusted Data in bson
|
Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure.
|
{'CVE-2019-2391'}
|
2021-05-07T17:19:18Z
|
2022-02-10T23:30:20Z
|
MODERATE
| null |
{'CWE-502'}
|
{'https://github.com/mongodb/js-bson/releases/tag/v1.1.4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2391'}
| null |
npm
|
GHSA-p5ch-w78f-xh44
|
Cross-site scripting in @atlaskit/editor-core
|
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
|
{'CVE-2019-20903'}
|
2021-04-22T22:45:24Z
|
2022-02-10T20:34:24Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://bitbucket.org/atlassian/atlaskit-mk-2/commits/ca88f616e4', 'https://www.npmjs.com/package/@atlaskit/editor-core', 'https://atlaskit.atlassian.com/packages/editor/editor-core/changelog/113.1.5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20903', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1021244735'}
| null |
npm
|
GHSA-rp28-29ch-gh92
|
Directory Traversal in elding
|
Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
This vulnerability only affects files that have file extensions - i.e. `/etc/passwd` will be treated as a directory, and a read attempt on `/etc/passwd/index.js` will be made and subsequently fail.
Example request:
```
GET /../../../../../../../../../../some_app_dir/secrets.json HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16222'}
|
2021-09-17T18:59:06Z
|
2018-08-06T21:30:15Z
|
MODERATE
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16222', 'https://github.com/advisories/GHSA-rp28-29ch-gh92', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding', 'https://www.npmjs.com/advisories/415'}
| null |
npm
|
GHSA-68cm-mgv7-vg5c
|
Directory Traversal in utahcityfinder
|
Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16173'}
|
2020-08-31T18:24:14Z
|
2018-07-23T20:45:11Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/467', 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16173', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder', 'https://www.npmjs.com/advisories/467'}
| null |
npm
|
GHSA-6jg8-7333-554w
|
Sandbox Breakout in realms-shim
|
Versions of `realms-shim` prior to 1.2.0 are vulnerable to a Sandbox Breakout. `Reflect.construct` can be used on the sandboxed Function constructor to reach the prototypes of the primal Realm, which may allow an attacker to escape the sandbox and execute arbitrary code.
## Recommendation
Upgrade to version 1.2.0 or later.
| null |
2021-09-02T16:40:48Z
|
2019-10-04T17:56:12Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1191', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-471680', 'https://www.npmjs.com/advisories/1182', 'https://github.com/advisories/GHSA-6jg8-7333-554w', 'https://www.npmjs.com/advisories/1181', 'https://github.com/Agoric/realms-shim/', 'https://www.npmjs.com/advisories/1190', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-6jg8-7333-554w', 'https://www.npmjs.com/advisories/1180'}
| null |
npm
|
GHSA-5m9c-634g-47vq
|
Downloads Resources over HTTP in steroids
|
Affected versions of `steroids` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `steroids`.
## Recommendation
This vulnerability was discovered and reported in 2016, yet has not seen a patch issued as of 3/2018.
The best path forward for mitigating this issue is to attempt to use an alternative module that is actively maintained and which provides similar functionality, such as the native PhoneGap API.
|
{'CVE-2016-10581'}
|
2021-01-08T19:50:08Z
|
2019-02-18T23:35:01Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/AppGyver/steroids/blob/master/package.json#L101', 'https://www.npmjs.com/advisories/168', 'https://github.com/advisories/GHSA-5m9c-634g-47vq', 'https://github.com/AppGyver/steroids/blob/master/package.json#L74', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10581', 'https://nodesecurity.io/advisories/168', 'https://github.com/AppGyver/steroids/blob/master/package.json#L103-L104'}
| null |
npm
|
GHSA-gjh4-fcv3-whpq
|
Cross-Site Scripting in webtorrent
|
Versions of `webtorrent` prior to 0.107.6 are vulnerable to Cross-Site Scripting. `webtorrent` servers started with `torrent.createServer()` lists a torrent's title and files in the index page without sanitization. This allows attackers to execute arbitrary JavaScript in the victim's browser through files with names containing the malicious payload. The issue is mitigated due to the fact that the server only allows fetching data pieces from the torrent.
## Recommendation
Upgrade to version 0.107.6 or later.
|
{'CVE-2019-15782'}
|
2021-08-17T22:20:20Z
|
2019-09-04T10:02:50Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/webtorrent/webtorrent/pull/1714', 'https://github.com/webtorrent/webtorrent/compare/v0.107.5...v0.107.6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15782', 'https://hackerone.com/reports/681617', 'https://www.npmjs.com/advisories/1158', 'https://snyk.io/vuln/SNYK-JS-WEBTORRENT-460351'}
| null |
npm
|
GHSA-rwvj-jgc4-fqq5
|
Downloads Resources over HTTP in cobalt-cli
|
Affected versions of `cobalt-cli` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cobalt-cli`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10597'}
|
2021-01-08T01:57:44Z
|
2019-02-18T23:34:05Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://www.npmjs.com/advisories/197', 'https://github.com/advisories/GHSA-rwvj-jgc4-fqq5', 'https://nodesecurity.io/advisories/197', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10597'}
| null |
npm
|
GHSA-qrpm-p2h7-hrv2
|
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
|
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
|
{'CVE-2021-23566'}
|
2022-03-18T13:15:55Z
|
2022-01-21T23:57:06Z
|
MODERATE
| null |
{'CWE-200'}
|
{'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575', 'https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444', 'https://github.com/ai/nanoid', 'https://github.com/ai/nanoid/pull/328', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566', 'https://snyk.io/vuln/SNYK-JS-NANOID-2332193'}
| null |
npm
|
GHSA-44c6-4v22-4mhx
|
Regular Expression Denial of Service (ReDOS)
|
npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity
|
{'CVE-2021-3795'}
|
2021-09-16T17:31:51Z
|
2021-09-20T20:42:25Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7', 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28', 'https://github.com/sindresorhus/semver-regex', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795'}
| null |
npm
|
GHSA-mh5c-679w-hh4r
|
Denial of Service in mongodb
|
Versions of `mongodb` prior to 3.1.13 are vulnerable to Denial of Service. The package fails to properly catch an exception when a collection name is invalid and the DB does not exist, crashing the application.
## Recommendation
Upgrade to version 3.1.13 or later.
| null |
2020-08-31T18:51:01Z
|
2020-09-03T21:12:01Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1203'}
| null |
npm
|
GHSA-wc9v-mj63-m9g5
|
Remote Code Execution in pg
|
Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name.
There are two specific scenarios in which it is likely for an application to be vulnerable:
1. The application executes unsafe, user-supplied sql which contains malicious column names.
2. The application connects to an untrusted database and executes a query returning results which contain a malicious column name.
## Proof of Concept
```
const { Client } = require('pg')
const client = new Client()
client.connect()
const sql = `SELECT 1 AS "\\'/*", 2 AS "\\'*/\n + console.log(process.env)] = null;\n//"`
client.query(sql, (err, res) => {
client.end()
})
```
## Recommendation
* Version 2.x.x: Update to version 2.11.2 or later.
* Version 3.x.x: Update to version 3.6.4 or later.
* Version 4.x.x: Update to version 4.5.7 or later.
* Version 5.x.x: Update to version 5.2.1 or later.
* Version 6.x.x: Update to version 6.4.2 or later. ( Note that versions 6.1.6, 6.2.5, and 6.3.3 are also patched. )
* Version 7.x.x: Update to version 7.1.2 or later. ( Note that version 7.0.2 is also patched. )
|
{'CVE-2017-16082'}
|
2020-08-31T18:26:18Z
|
2018-07-24T19:44:42Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/521', 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082', 'https://nodesecurity.io/advisories/521', 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5'}
| null |
npm
|
GHSA-53xv-c2hx-5w6q
|
Command Injection in node-windows
|
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
|
{'CVE-2021-45459'}
|
2022-03-30T21:13:48Z
|
2022-01-05T20:39:21Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6', 'https://github.com/coreybutler/node-windows', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45459', 'https://security.netapp.com/advisory/ntap-20220107-0004/', 'https://github.com/dwisiswant0/advisory/issues/4'}
| null |
npm
|
GHSA-c9rj-pgxv-84jc
|
Exfiltrates data on installation in cofee-script
|
The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
If you have found `cofee-script` installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history.
Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16206'}
|
2021-09-08T21:59:36Z
|
2018-08-06T20:12:46Z
|
HIGH
| null |
{'CWE-200'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16206', 'https://github.com/advisories/GHSA-c9rj-pgxv-84jc', 'https://nodesecurity.io/advisories/540', 'https://www.npmjs.com/advisories/540'}
| null |
npm
|
GHSA-8gf4-pcj6-54rp
|
Downloads Resources over HTTP in strider-sauce
|
Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`.
## Recommendation
While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number.
In order to resolve the vulnerability, you will need to install the module manually from github:
```
npm install github:Strider-CD/strider-sauce#5ff6d65
```
As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.
|
{'CVE-2016-10611'}
|
2021-06-11T12:35:08Z
|
2019-02-18T23:47:53Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nodesecurity.io/advisories/202', 'https://www.npmjs.com/advisories/202', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611', 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp'}
| null |
npm
|
GHSA-f3pp-32qc-36w4
|
Prototype Pollution in jointjs
|
This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
|
{'CVE-2021-23444'}
|
2021-09-22T14:30:35Z
|
2021-09-22T20:36:34Z
|
MODERATE
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://github.com/clientIO/joint/releases/tag/v3.4.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816', 'https://github.com/clientIO/joint/pull/1514', 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578', 'https://github.com/clientIO/joint'}
| null |
npm
|
GHSA-69rr-wvh9-6c4q
|
Directory Traversal in st
|
Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server.
## Recommendation
Update to version 0.2.5 or later.
|
{'CVE-2014-3744'}
|
2021-09-23T21:00:00Z
|
2020-08-31T22:58:04Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3744', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://github.com/isaacs/st', 'https://github.com/isaacs/st#security-status', 'http://www.securityfocus.com/bid/67389', 'https://nodesecurity.io/advisories/st_directory_traversal', 'https://www.npmjs.com/advisories/36', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
| null |
npm
|
GHSA-2mvq-xp48-4c77
|
Denial of Service in subtext
|
All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
## Recommendation
This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2.
| null |
2021-09-29T18:37:04Z
|
2020-09-03T20:35:29Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/hapijs/subtext', 'https://www.npmjs.com/advisories/1168', 'https://github.com/hapijs/subtext/issues/72'}
| null |
npm
|
GHSA-hpw4-m59j-9p52
|
Directory Traversal in dylmomo
|
Affected versions of `dylmomo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16163'}
|
2020-08-31T18:21:43Z
|
2020-09-01T17:29:13Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo', 'https://nodesecurity.io/advisories/396', 'https://www.npmjs.com/advisories/396', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16163'}
| null |
npm
|
GHSA-j9cf-pr2x-5273
|
Prototype Pollution in dot-object
|
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
|
{'CVE-2019-10793'}
|
2022-02-24T18:17:34Z
|
2022-02-09T22:33:31Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10793', 'https://github.com/rhalff/dot-object', 'https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905', 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'}
| null |
npm
|
GHSA-5x5w-v4xq-p64r
|
Directory Traversal in ewgaddis.lab6
|
Affected versions of `ewgaddis.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16175'}
|
2020-08-31T18:24:09Z
|
2018-07-23T20:44:52Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-5x5w-v4xq-p64r', 'https://nodesecurity.io/advisories/465', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6', 'https://www.npmjs.com/advisories/465', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16175'}
| null |
npm
|
GHSA-8hw9-22v6-9jr9
|
Any logged in user could edit any other logged in user.
|
### Impact
Everyone who is running a12n-server.
A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change.
### Patches
Patched in v0.18.2
|
{'CVE-2021-29452'}
|
2021-04-16T23:04:15Z
|
2021-04-19T15:14:33Z
|
HIGH
| null |
{'CWE-269'}
|
{'https://www.npmjs.com/package/@curveball/a12n-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452', 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.