ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-r24h-634p-m72x
Validation Bypass in schema-inspector
In schema-inspector before 1.6.9, a maliciously crafted JavaScript object can bypass the `sanitize()` and the `validate()` function used within schema-inspector.
{'CVE-2019-10781'}
2021-08-30T13:35:23Z
2020-06-10T20:02:47Z
CRITICAL
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10781', 'https://github.com/Atinux/schema-inspector', 'https://snyk.io/vuln/SNYK-JS-SCHEMAINSPECTOR-536970', 'https://github.com/Atinux/schema-inspector/commit/345a7b2eed11bb6128421150d65f4f83fdbb737d'}
null
npm
GHSA-rj5f-7c8x-gjg4
Prototype Pollution in promisehelpers
All versions of package promisehelpers up to and including version 0.0.5 are vulnerable to Prototype Pollution via the insert function.
{'CVE-2020-7723'}
2021-05-05T18:14:15Z
2021-05-06T18:26:07Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7723', 'https://snyk.io/vuln/SNYK-JS-PROMISEHELPERS-598686'}
null
npm
GHSA-8hfj-j24r-96c4
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarounds Sanitize user-provided locale name before passing it to moment.js. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [moment repo](https://github.com/moment/moment)
{'CVE-2022-24785'}
2022-04-26T21:00:11.102341Z
2022-04-04T21:25:48Z
HIGH
null
{'CWE-27', 'CWE-22'}
{'https://www.tenable.com/security/tns-2022-09', 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4', 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5', 'https://github.com/moment/moment', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785'}
null
npm
GHSA-gh4g-3gm9-5wrq
Cross-Site Scripting in shave
Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting. ## Recommendation Upgrade to version 2.5.3 or later.
{'CVE-2019-12313'}
2021-08-04T16:06:35Z
2019-05-29T18:38:08Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12313', 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67', 'https://www.npmjs.com/advisories/822', 'https://github.com/dollarshaveclub/shave/compare/852b537...da7371b'}
null
npm
GHSA-f9cm-qmx5-m98h
Prototype Pollution in merge
Versions of `merge` before 1.2.1 are vulnerable to prototype pollution. The `merge.recursive` function can be tricked into adding or modifying properties of the Object prototype. ## Recommendation Update to version 1.2.1 or later.
{'CVE-2018-16469'}
2020-08-31T18:33:24Z
2018-11-01T14:45:42Z
LOW
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/722', 'https://github.com/advisories/GHSA-f9cm-qmx5-m98h', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16469', 'https://hackerone.com/reports/381194'}
null
npm
GHSA-273r-rm8g-7f3x
Uncaught Exception in mercurius
### Impact Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. ### Patches The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. ### Workarounds Use a custom error handler. ### References See https://github.com/mercurius-js/mercurius/issues/677 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/mercurius-js/mercurius * Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
{'CVE-2021-43801'}
2021-12-13T20:20:28Z
2021-12-13T21:33:04Z
HIGH
null
{'CWE-754'}
{'https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223', 'https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x', 'https://github.com/mercurius-js/mercurius', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43801', 'https://github.com/mercurius-js/mercurius/issues/677'}
null
npm
GHSA-vxr4-rxw7-g7v6
Prototype Pollution in comb.
All versions of package comb are vulnerable to Prototype Pollution via the deepMerge() function.
{'CVE-2021-23561'}
2021-12-15T15:22:31Z
2021-12-16T14:30:56Z
MODERATE
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23561', 'https://snyk.io/vuln/SNYK-JS-COMB-1730083', 'https://github.com/C2FO/comb'}
null
npm
GHSA-7j93-2h6r-hm49
Cross-Site Scripting in http-file-server
All versions of `http-file-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5458'}
2020-08-31T18:47:38Z
2019-07-31T04:22:36Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/570563', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5458', 'https://www.npmjs.com/advisories/1110'}
null
npm
GHSA-8v5f-hp78-jgxq
Signature Verification Bypass in jwt-simple
Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm). ## Recommendation Upgrade to version 0.5.3 or later.
null
2020-08-31T18:37:26Z
2019-06-06T15:30:33Z
HIGH
null
{'CWE-347'}
{'https://www.npmjs.com/advisories/831', 'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}
null
npm
GHSA-6fmm-47qc-p4m4
Unauthorized File Access in harp
All versions of `harp` are vulnerable to Unauthorized File Access. If a symlink in the project's base directory points to a file outside of the directory, the file is served. This could allow an attacker to access sensitive files on the server. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
{'CVE-2019-5438'}
2021-01-08T21:27:28Z
2019-06-13T16:12:26Z
MODERATE
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/816', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5438', 'https://hackerone.com/reports/530289'}
null
npm
GHSA-w6cx-qg2q-rvq8
Path Traversal in @finastra/ssr-pages
A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/1 - https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
{'CVE-2022-24718'}
2022-03-10T15:58:38Z
2022-03-01T22:09:18Z
HIGH
null
{'CWE-22'}
{'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8', 'https://github.com/Finastra/ssr-pages/pull/1', 'https://github.com/Finastra/ssr-pages', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718', 'https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780'}
null
npm
GHSA-9vrw-m88g-w75q
Denial of Service in @hapi/accept
Versions of `@hapi/accept` prior to 3.2.4 or 5.0.1 are vulnerable to Denial of Service. The Accept-Encoding HTTP header parser has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. Because hapi rethrows system errors (as opposed to catching expected application errors), the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 3.2.4 or 5.0.1.
null
2020-08-31T19:00:40Z
2020-09-03T15:45:53Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1475'}
null
npm
GHSA-h24p-2c3m-5qf4
Malicious Package in owl-orchard-apple-sunshine
All versions of `owl-orchard-apple-sunshine` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T16:14:52Z
2020-09-03T23:23:23Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1307'}
null
npm
GHSA-pf2j-9qmp-jqr2
SQL Injection and MAID in TypeORM
Prototype pollution vulnerability in the TypeORM package < 0.2.25 may allow attackers to add or modify Object properties leading to further denial of service or SQL injection attacks.
{'CVE-2020-8158'}
2021-04-28T17:29:12Z
2021-05-07T16:46:42Z
CRITICAL
null
{'CWE-471', 'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8158', 'https://hackerone.com/reports/869574'}
null
npm
GHSA-86mr-6m89-vgj3
Buffer Overflow in node-weakauras-parser
Affected versions of `node-weakauras-parser` are vulnerable to a Buffer Overflow. The `encode_weakaura` function fails to properly validate the input size. A buffer of 13835058055282163711 bytes causes an overflow on 64-bit systems. ## Recommendation Upgrade to versions 1.0.5, 2.0.2, 3.0.1 or later.
null
2021-10-04T21:10:07Z
2020-09-03T15:51:38Z
MODERATE
null
{'CWE-120'}
{'https://www.npmjs.com/advisories/1504', 'https://github.com/Zireael-N/node-weakauras-parser/commit/bc146da09db689e554d28e948f1cf1c138f09f69#diff-023afe6291ac9ada88788108cb3367b3R38-R43', 'https://github.com/Zireael-N/node-weakauras-parser'}
null
npm
GHSA-m86m-5m44-pc93
Denial of Service in grpc-ts-health-check
Versions of `grpc-ts-health-check` prior to 2.0.0 are vulnerable to Denial of Service. The package exposes an API endpoint that may allow attackers to set the service's health status to failing. This can lead to Denial of Service as Kubernetes blocks traffic to services with a failing status. ## Recommendation Upgrade to version 2.0.0 or later.
null
2020-08-31T18:47:07Z
2020-09-03T19:05:46Z
LOW
null
null
{'https://www.npmjs.com/advisories/1097'}
null
npm
GHSA-7w8j-85wm-6xfq
Prototype Pollution in jquery-bbq
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
{'CVE-2021-20086'}
2021-05-20T22:53:36Z
2021-05-24T19:51:58Z
HIGH
null
{'CWE-1321'}
{'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-bbq.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20086'}
null
npm
GHSA-46q2-93hm-52p5
Directory Traversal in serverlyr
Affected versions of `serverlyr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16089'}
2020-08-31T18:20:34Z
2020-09-01T16:53:37Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16089', 'https://www.npmjs.com/advisories/365', 'https://nodesecurity.io/advisories/365', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverlyr'}
null
npm
GHSA-282f-qqgm-c34q
Prototype Pollution in node-jsonpointer
This affects the package `jsonpointer` before `5.0.0`. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.
{'CVE-2021-23807'}
2021-11-08T17:44:31Z
2021-11-08T17:44:45Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-JSONPOINTER-1577288', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23807', 'https://github.com/janl/node-jsonpointer/commit/a0345f3550cd9c4d89f33b126390202b89510ad4', 'https://github.com/janl/node-jsonpointer/pull/51', 'https://github.com/janl/node-jsonpointer'}
null
npm
GHSA-j336-34q7-cgj3
Downloads Resources over HTTP in healthcenter
Affected versions of `healthcenter` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `healthcenter`. ## Recommendation This package has been deprecated, and moved to a new package on npm: [`appmetrics`](https://npmjs.com/package/appmetrics). In order to mitigate this vulnerability, please install the `appmetrics` package in place of `healthcenter` via the following commands: ``` npm uninstall healthcenter -s npm install appmetrics -s ```
{'CVE-2016-10684'}
2021-01-08T18:38:24Z
2019-02-18T23:42:06Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/288', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10684', 'https://github.com/advisories/GHSA-j336-34q7-cgj3', 'https://www.npmjs.com/advisories/288'}
null
npm
GHSA-p3rp-vmj9-gv6v
Incorrect sanitisation function leads to `XSS` in mermaid
### Impact Malicious diagrams can contain javascript code that can be run at diagram readers machines. ### Patches The users should upgrade to version 8.13.8 ### Workarounds You need to upgrade in order to avoid this issue.
{'CVE-2021-43861'}
2022-01-06T19:02:22Z
2022-01-06T19:45:59Z
HIGH
null
{'CWE-79', 'CWE-20'}
{'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v', 'https://github.com/mermaid-js/mermaid/releases/tag/8.13.8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43861', 'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83', 'https://github.com/mermaid-js/mermaid'}
null
npm
GHSA-m5pj-vjjf-4m3h
Arbitrary Code Execution in grunt
The package grunt before 1.3.0 are vulnerable to Arbitrary Code Execution due to the default usage of the function load() instead of its secure replacement safeLoad() of the package js-yaml inside grunt.file.readYAML.
{'CVE-2020-7729'}
2021-05-04T22:57:23Z
2021-05-06T18:27:18Z
HIGH
null
{'CWE-1188'}
{'https://lists.debian.org/debian-lts-announce/2020/09/msg00008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7729', 'https://snyk.io/vuln/SNYK-JS-GRUNT-597546', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-607922', 'https://github.com/gruntjs/grunt/blob/master/lib/grunt/file.js%23L249', 'https://github.com/gruntjs/grunt/commit/e350cea1724eb3476464561a380fb6a64e61e4e7', 'https://usn.ubuntu.com/4595-1/'}
null
npm
GHSA-6xc2-mj39-q599
Privilege Escalation in strapi
Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token. ## Recommendation Upgrade to version 3.0.0-beta.17.5 or later.
{'CVE-2019-18818'}
2022-02-09T18:27:23Z
2019-12-02T18:20:41Z
HIGH
null
{'CWE-640'}
{'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html', 'https://github.com/strapi/strapi/pull/4443', 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html', 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5', 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html', 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818', 'https://github.com/strapi/strapi', 'https://www.npmjs.com/advisories/1311'}
null
npm
GHSA-r6fw-8m27-43c9
Command injection in portkiller
This affects all versions of package portkiller. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
{'CVE-2021-23379'}
2021-04-19T21:19:04Z
2021-05-06T15:53:20Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/package/portkiller', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23379', 'https://github.com/indatawetrust/portkiller/blob/f1f1c5076d9c5d60e8dd3930e98d665d8191aa7a/index.js%23L10', 'https://snyk.io/vuln/SNYK-JS-PORTKILLER-1078537'}
null
npm
GHSA-pvmx-g8h5-cprj
Advanced Content Filter (ACF) vulnerability allowing to execute JavaScript code using malformed HTML
### Affected packages The vulnerability has been discovered in the Advanced Content Filter (ACF) module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 Advanced Content Filter (ACF) core module. The vulnerability allowed to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. It affects all users using the CKEditor 4 at version < 4.17.0. ### Patches The problem has been recognized and patched. The fix will be available in version 4.17.0. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Maurice Dauer ([laytonctf](https://twitter.com/laytonctf)) for recognizing and reporting this vulnerability.
{'CVE-2021-41164'}
2022-02-08T20:39:22Z
2021-11-17T21:55:10Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41164', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/ckeditor/ckeditor4/blob/major/CHANGES.md#ckeditor-417', 'https://www.drupal.org/sa-core-2021-011', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-pvmx-g8h5-cprj', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-5h5r-23r4-m87h
Cross-Site Scripting in gitbook
Affected versions of `gitbook` do not properly sanitize user input outside of backticks, which may result in cross-site scripting in the online reader. ## Recommendation Update to version 3.2.2 or later.
{'CVE-2017-16019'}
2020-08-31T18:12:55Z
2020-09-01T16:04:39Z
LOW
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/159', 'https://github.com/GitbookIO/gitbook/issues/1609', 'https://nodesecurity.io/advisories/159', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16019'}
null
npm
GHSA-ccw5-7vfh-p5hm
Directory Traversal in dmmcquay.lab6
Affected versions of `dmmcquay.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16208'}
2020-08-31T18:22:41Z
2020-09-01T18:14:15Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/426', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16208', 'https://www.npmjs.com/advisories/426', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dmmcquay.lab6'}
null
npm
GHSA-fjqr-fx3f-g4rv
Electron protocol handler browser vulnerable to Command Injection
Github Electron version Electron 1.8.2-beta.4 and earlier contains a Command Injection vulnerability in Protocol Handler that can result in command execute. This attack appear to be exploitable via the victim opening an electron protocol handler in their browser. This vulnerability appears to have been fixed in Electron 1.8.2-beta.5. This issue is due to an incomplete fix for CVE-2018-1000006, specifically the black list used was not case insensitive allowing an attacker to potentially bypass it.
{'CVE-2018-1000118'}
2022-04-26T14:35:22Z
2018-03-26T16:41:20Z
HIGH
null
{'CWE-78'}
{'https://github.com/advisories/GHSA-fjqr-fx3f-g4rv', 'https://electronjs.org/releases#1.8.2-beta.5', 'https://github.com/electron/electron/commit/ce361a12e355f9e1e99c989f1ea056c9e502dbe7', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000118'}
null
npm
GHSA-3p8f-j2vw-7hw9
Hijacked Environment Variables in mssql-node
The `mssql-node` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this module is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16059'}
2020-08-31T18:24:46Z
2018-11-09T17:43:44Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/480', 'https://nodesecurity.io/advisories/480', 'https://github.com/advisories/GHSA-3p8f-j2vw-7hw9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16059'}
null
npm
GHSA-x5x2-mfc7-r22f
Directory Traversal in picard
Affected versions of `picard` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16194'}
2020-08-31T18:23:04Z
2018-07-23T20:40:20Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/436', 'https://github.com/advisories/GHSA-x5x2-mfc7-r22f', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/picard', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16194', 'https://www.npmjs.com/advisories/436'}
null
npm
GHSA-fr6q-jv7j-35g3
Path Traversal in w-zip
Path Traversal in NPM w-zip prior to 1.0.12.
{'CVE-2022-0401'}
2022-02-07T19:12:42Z
2022-02-02T00:01:46Z
CRITICAL
null
{'CWE-22'}
{'https://huntr.dev/bounties/d93259aa-ad03-43d6-8846-a00b9f58876d', 'https://github.com/yuda-lyu/w-zip', 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0401'}
null
npm
GHSA-3wh2-2pp3-2823
Malicious Package in simple-alipay
Version 1.0.1 of `simple-alipay` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.1 of this module is found installed you will want to replace it with a version before or after 1.0.1. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:49Z
2020-09-01T20:35:18Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/637'}
null
npm
GHSA-8h2f-7jc4-7m3m
Open Redirect in urijs
urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613.
{'CVE-2022-0868'}
2022-03-14T21:10:46Z
2022-03-07T00:00:40Z
MODERATE
null
{'CWE-601'}
{'https://github.com/medialize/URI.js/releases/tag/v1.19.10', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868', 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509', 'https://huntr.dev/bounties/5f4db013-64bd-4a6b-9dad-870c296b0b02', 'https://github.com/medialize/uri.js'}
null
npm
GHSA-jfgq-g48x-jq83
Downloads Resources over HTTP in iedriver
Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`. ## Recommendation Update to iedriver version 3.0.0 or greater.
{'CVE-2016-10562'}
2021-01-08T18:35:18Z
2019-02-18T23:54:20Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-jfgq-g48x-jq83', 'https://www.npmjs.com/advisories/174', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562', 'https://nodesecurity.io/advisories/174'}
null
npm
GHSA-8p52-7cxv-6c95
Downloads Resources over HTTP in curses
Affected versions of `curses` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `curses`. ## Recommendation No patch is currently available for this vulnerability, and the package has not been updated since 2013. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10615'}
2021-01-08T19:08:24Z
2019-02-18T23:56:47Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/215', 'https://nodesecurity.io/advisories/215', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10615', 'https://github.com/advisories/GHSA-8p52-7cxv-6c95'}
null
npm
GHSA-76qf-6mvw-c5hm
Malicious Package in js-base64-int
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:16:45Z
2020-09-03T19:45:42Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1128'}
null
npm
GHSA-856x-cp3q-47vg
Insecure Default Configuration in airbrake
Affected versions of `airbrake` default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information. ## Recommendation Update to version 0.4.0 or later, or upgrade from the now-deprecated `airbrake` module to its replacement, [`airbrake-js`](https://www.npmjs.com/package/airbrake-js).
{'CVE-2016-10530'}
2020-08-31T18:10:42Z
2019-02-18T23:58:13Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10530', 'https://www.npmjs.com/advisories/96', 'https://github.com/airbrake/node-airbrake/issues/70', 'https://github.com/advisories/GHSA-856x-cp3q-47vg', 'https://nodesecurity.io/advisories/96'}
null
npm
GHSA-86ch-6w7v-v6xf
Denial of Service in soketi
### Impact _What kind of vulnerability is it? Who is impacted?_ There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simply just crash the server for trying to send a response after the request closed. All users that run the server are affected by it and it's highly recommended to upgrade to the latest patch. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Updating to at least 0.24.1 or the latest version. ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ No. Upgrading is the only solution. ### References _Are there any links users can visit to find out more?_ https://github.com/soketi/soketi/releases/tag/0.24.1 ### For more information If you have any questions or comments about this advisory: * Open an issue in [the issues board](https://github.com/soketi/soketi/issues) * Email us at [alex@renoki.org](mailto:alex@renoki.org)
{'CVE-2022-21667'}
2022-01-18T22:37:17Z
2022-01-08T00:24:44Z
HIGH
null
{'CWE-755'}
{'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf', 'https://github.com/soketi/soketi/releases/tag/0.24.1', 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667', 'https://github.com/soketi/soketi'}
null
npm
GHSA-wfhx-6pcm-7m55
Path Traversal in ponse
Versions of `ponse` prior to 2.0.2 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation Upgrade to version 2.0.2 or later.
null
2020-08-31T18:43:41Z
2020-09-03T16:46:22Z
HIGH
null
{'CWE-22'}
{'https://hackerone.com/reports/383112', 'https://www.npmjs.com/advisories/1002'}
null
npm
GHSA-ff29-f57w-2mm3
Downloads Resources over HTTP in geoip-lite-country
Affected versions of `geoip-lite-country` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation Update to version 1.1.4 or later.
{'CVE-2016-10568'}
2021-01-08T18:53:25Z
2019-02-18T23:54:03Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/183', 'https://github.com/advisories/GHSA-ff29-f57w-2mm3', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10568', 'https://nodesecurity.io/advisories/183'}
null
npm
GHSA-9qrh-qjmc-5w2p
Denial-of-Service when binding invalid parameters in sqlite3
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade to v5.0.3 or later. Ensure there is sufficient sanitization in the parent application to protect against invalid values being supplied to binding parameters as a workaround.
{'CVE-2022-21227'}
2022-05-03T02:24:25Z
2022-04-28T20:25:23Z
HIGH
null
{'CWE-248'}
{'https://github.com/TryGhost/node-sqlite3', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2805470', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227', 'https://github.com/TryGhost/node-sqlite3/commit/593c9d498be2510d286349134537e3bf89401c4a', 'https://security.snyk.io/vuln/SNYK-JS-SQLITE3-2388645', 'https://github.com/TryGhost/node-sqlite3/issues/1440', 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p', 'https://github.com/TryGhost/node-sqlite3/issues/1449', 'https://snyk.io/vuln/SNYK-JS-SQLITE3-2388645'}
null
npm
GHSA-wqh4-27cc-j8f2
Hijacked Environment Variables in nodeffmpeg
The `nodeffmpeg` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16069'}
2020-08-31T18:25:48Z
2018-08-29T23:36:48Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/508', 'https://github.com/advisories/GHSA-wqh4-27cc-j8f2', 'https://nodesecurity.io/advisories/508', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16069'}
null
npm
GHSA-7fm6-gxqg-2pwr
Code Injection in total.js
The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.
{'CVE-2021-23389'}
2021-07-13T19:51:48Z
2021-12-10T17:26:06Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631', 'https://github.com/totaljs/framework/commit/887b0fa9e162ef7a2dd9cec20a5ca122726373b3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23389', 'https://snyk.io/vuln/SNYK-JS-TOTALJS-1088607'}
null
npm
GHSA-qpqh-46qj-vwcw
Cross-site Scripting in docsify
docsify prior to 4.11.4 is susceptible to Cross-site Scripting (XSS). Docsify.js uses fragment identifiers (parameters after # sign) to load resources from server-side .md files. Due to lack of validation here, it is possible to provide external URLs after the /#/ (domain.com/#//attacker.com) and render arbitrary JavaScript/HTML inside docsify page.
{'CVE-2020-7680'}
2021-05-10T21:00:22Z
2021-05-18T01:53:18Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DOCSIFY-567099', 'http://packetstormsecurity.com/files/158515/Docsify.js-4.11.4-Cross-Site-Scripting.html', 'https://github.com/docsifyjs/docsify/issues/1126', 'http://packetstormsecurity.com/files/161495/docsify-4.11.6-Cross-Site-Scripting.html', 'https://github.com/docsifyjs/docsify/pull/1128', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7680', 'http://seclists.org/fulldisclosure/2021/Feb/71'}
null
npm
GHSA-v7x3-7hw7-pcjg
Moderate severity vulnerability that affects renovate
## Go Modules Vulnerability Disclosure ### Impact Temporary repository tokens were leaked into Pull Requests comments in during certain Go Modules update failure scenarios. ### Patches The problem has been patched. Self-hosted users should upgrade to v19.38.7 or later. ### Workarounds Disable Go Modules support. ### References Blog post: https://renovatebot.com/blog/go-modules-vulnerability-disclosure ### For more information If you have any questions or comments about this advisory: * Open an issue in [Renovate](http://github.com/renovatebot/renovate) * Email us at [support@renovatebot.com](mailto:support@renovatebot.com)
null
2021-09-20T21:11:50Z
2019-10-21T16:02:33Z
MODERATE
null
{'CWE-200'}
{'https://github.com/renovatebot/renovate/security/advisories/GHSA-v7x3-7hw7-pcjg', 'https://github.com/advisories/GHSA-v7x3-7hw7-pcjg', 'https://github.com/renovatebot/renovate', 'https://snyk.io/vuln/SNYK-JS-RENOVATE-536203'}
null
npm
GHSA-9c2p-jw8p-f84v
SQL Injection in sequelize
Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability. ## Proof of Concept In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. Example Query: ``` database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { replacements: { names: directCopyOfUserInput } }); ``` If the user inputs the value of `:names` as: ``` ["test", "'); DELETE TestTable WHERE Id = 1 --')"] ``` The resulting SQL statement will be: ``` SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --') ``` As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1. ## Recommendation Update to version 3.20.0 or later.
{'CVE-2016-10556'}
2020-08-31T18:10:56Z
2019-02-18T23:54:24Z
CRITICAL
null
{'CWE-89'}
{'https://www.npmjs.com/advisories/102', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556', 'https://nodesecurity.io/advisories/102', 'https://github.com/sequelize/sequelize/issues/5671', 'https://github.com/advisories/GHSA-9c2p-jw8p-f84v'}
null
npm
GHSA-h5mp-5q4p-ggf5
Prototype Pollution in lodash.defaultsdeep
Versions of `lodash.defaultsdeep` before 4.6.1 are vulnerable to prototype pollution. The function `mergeWith` may allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2020-08-31T18:46:09Z
2020-09-03T18:07:05Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1068'}
null
npm
GHSA-776r-w3v9-96mv
Directory Traversal in censorify.tanisjr
Affected versions of `censorify.tanisjr` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16157'}
2020-08-31T18:21:34Z
2018-07-23T20:46:16Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16157', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/censorify.tanisjr', 'https://nodesecurity.io/advisories/392', 'https://github.com/advisories/GHSA-776r-w3v9-96mv', 'https://www.npmjs.com/advisories/392'}
null
npm
GHSA-29fh-xcjr-p7rx
Malicious Package in web3-eht
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T19:10:02Z
2020-09-03T17:02:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1416'}
null
npm
GHSA-c3m8-x3cg-qm2c
Configuration Override in helmet-csp
Versions of `helmet-csp` before to 2.9.1 are vulnerable to a Configuration Override affecting the application's Content Security Policy (CSP). The package's browser sniffing for Firefox deletes the `default-src` CSP policy, which is the fallback policy. This allows an attacker to remove an application's default CSP, possibly rendering the application vulnerable to Cross-Site Scripting. ## Recommendation Upgrade to version 2.9.1 or later. Setting the `browserSniff` configuration to `false` in vulnerable versions also mitigates the issue.
null
2021-09-29T18:45:07Z
2020-09-03T20:39:53Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/1176', 'https://snyk.io/vuln/SNYK-JS-HELMETCSP-469436', 'https://github.com/helmetjs/csp/commit/67a69baafa8198a154f0505a0cf0875f76f6186a', 'https://github.com/helmetjs/csp/'}
null
npm
GHSA-m94c-37g6-cjhc
Fake objects feature vulnerability allowing to execute JavaScript code using malformed HTML.
### Affected packages The vulnerability has been discovered in [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin. All plugins with [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) plugin dependency are affected: * [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) * [Link](https://ckeditor.com/cke4/addon/link) * [Flash](https://ckeditor.com/cke4/addon/flash) * [Iframe](https://ckeditor.com/cke4/addon/iframe) * [Forms](https://ckeditor.com/cke4/addon/forms) * [Page Break](https://ckeditor.com/cke4/addon/pagebreak) ### Impact A potential vulnerability has been discovered in CKEditor 4 [Fake Objects](https://ckeditor.com/cke4/addon/fakeobjects) package. The vulnerability allowed to inject malformed Fake Objects HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version < 4.16.2. ### Patches The problem has been recognized and patched. The fix will be available in version 4.16.2. ### For more information Email us at security@cksource.com if you have any questions or comments about this advisory. ### Acknowledgements The CKEditor 4 team would like to thank Mika Kulmala ([kulmik](https://github.com/kulmik)) for recognizing and reporting this vulnerability.
{'CVE-2021-37695'}
2022-02-08T21:01:39Z
2021-08-23T19:42:15Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37695', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://github.com/ckeditor/ckeditor4/commit/de3c001540715f9c3801aaa38a1917de46cfcf58', 'https://lists.debian.org/debian-lts-announce/2021/11/msg00007.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
null
npm
GHSA-7f63-h6g3-7cwm
Cross Site Scripting (XSS) in @finastra/ssr-pages
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/2 - https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5 - https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073
{'CVE-2022-24717'}
2022-03-10T15:59:12Z
2022-03-01T22:09:25Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717', 'https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da7876a5', 'https://github.com/Finastra/ssr-pages', 'https://github.com/Finastra/ssr-pages/commit/98abc59e28fec48246be0d59ac144675d6361073', 'https://github.com/Finastra/ssr-pages/pull/2'}
null
npm
GHSA-v588-qcp3-jv46
Path Traversal in serve
Versions of `serve` prior to 7.0.1 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through if the path contains a `/./`, which allows attackers to access hidden folders and files. ## Recommendation Upgrade to version 7.0.1 or later.
{'CVE-2019-5415'}
2020-08-31T18:43:59Z
2019-03-25T18:03:58Z
HIGH
null
{'CWE-548'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5415', 'https://www.npmjs.com/advisories/1010', 'https://github.com/advisories/GHSA-v588-qcp3-jv46', 'https://hackerone.com/reports/330724'}
null
npm
GHSA-4x6v-rwh4-55jw
Pomelo allows external control of critical state data
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.
{'CVE-2019-18954'}
2021-08-19T16:02:00Z
2019-12-02T18:16:34Z
MODERATE
null
{'CWE-668'}
{'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954', 'https://github.com/NetEase/pomelo/issues/1149'}
null
npm
GHSA-3hq6-rmv7-39vh
Injection in op-browser
op-browser through 1.0.9 is vulnerable to Command Injection. It allows execution of arbitrary commands via the url function.
{'CVE-2020-7625'}
2022-02-10T23:45:28Z
2022-02-10T23:45:28Z
CRITICAL
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7625', 'https://github.com/hiproxy/open-browser/blob/master/lib/index.js#L75,', 'https://snyk.io/vuln/SNYK-JS-OPBROWSER-564259', 'https://github.com/hiproxy/open-browser/pull/4', 'https://github.com/hiproxy/open-browser/pull/3'}
null
npm
GHSA-qv2g-99x4-45x6
Malicious npm package: discord-fix
The npm `discord-fix` package has been identified as malicious and removed from the npm package registry. ## Remediation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-01-29T18:11:36Z
2021-01-29T18:12:07Z
CRITICAL
null
{'CWE-506'}
{'https://blog.sonatype.com/sonatype-spots-more-discord-malware-in-npm?hs_preview=BbDPGbfh-40737456755', 'https://www.npmjs.com/advisories/1597'}
null
npm
GHSA-x56r-5r34-qg74
Downloads Resources over HTTP in dalek-browser-ie-canary
Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`. ## Recommendation No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10612'}
2021-01-08T00:47:49Z
2019-02-18T23:47:47Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/205', 'https://github.com/advisories/GHSA-x56r-5r34-qg74', 'https://nodesecurity.io/advisories/205', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10612'}
null
npm
GHSA-hf66-r44g-p7j9
Inefficient Regular Expression Complexity in handsontable
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.
{'CVE-2021-23446'}
2021-09-30T16:50:57Z
2021-09-30T17:10:46Z
HIGH
null
{'CWE-1333'}
{'https://github.com/handsontable/handsontable', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797', 'https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23446', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795', 'https://github.com/handsontable/handsontable/issues/8752', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794', 'https://github.com/handsontable/handsontable/pull/8742', 'https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793'}
null
npm
GHSA-j38m-7q52-fgfh
Directory Traversal in node-server-forfront
Affected versions of `node-server-forfront` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16124'}
2020-08-31T18:21:10Z
2018-07-23T23:33:42Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/382', 'https://www.npmjs.com/advisories/382', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16124', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-server-forfront', 'https://github.com/advisories/GHSA-j38m-7q52-fgfh'}
null
npm
GHSA-94x5-94wf-m445
Directory Traversal in gomeplus-h5-proxy
Affected versions of `gomeplus-h5-proxy` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16037'}
2020-08-31T18:20:15Z
2018-07-24T15:48:38Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16037', 'https://github.com/advisories/GHSA-94x5-94wf-m445', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/gomeplus-h5-proxy', 'https://www.npmjs.com/advisories/350', 'https://nodesecurity.io/advisories/350'}
null
npm
GHSA-rh7p-9c79-gpp8
Downloads Resources over HTTP in wasdk
Affected versions of `wasdk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wasdk`. ## Recommendation No fix is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit it are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10587'}
2021-09-17T18:23:51Z
2019-02-18T23:34:44Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/179', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10587', 'https://github.com/advisories/GHSA-rh7p-9c79-gpp8'}
null
npm
GHSA-m639-9whg-fw97
Prototype Pollution in object-extend
The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend.
{'CVE-2021-23702'}
2022-02-28T22:17:42Z
2022-02-19T00:01:25Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23702', 'https://github.com/bernhardw/object-extend', 'https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470'}
null
npm
GHSA-j9pj-hx76-92v6
Server-Side Request Forgery in phantomjs-seo
This affects all versions of package phantomjs-seo. It is possible for an attacker to craft a url that will be passed to a PhantomJS instance allowing for an SSRF attack.
{'CVE-2020-7739'}
2021-04-21T20:55:27Z
2021-05-10T18:38:21Z
HIGH
null
{'CWE-918', 'CWE-20'}
{'https://github.com/areverberi/phantomjs-seo/blob/083f66892f97d67031668decb917389ffc32a94c/index.js%23L17', 'https://snyk.io/vuln/SNYK-JS-PHANTOMJSSEO-609638', 'https://www.npmjs.com/package/phantomjs-seo', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7739'}
null
npm
GHSA-r2j6-p67h-q639
Secret disclosure when containing characters that become URI encoded
### Impact Secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. ### Patches Fixed in v17.2.3 ### Workarounds Secrets that do not contain characters that become encoded when included in a URL are already masked properly.
{'CVE-2020-26226'}
2021-01-07T22:41:34Z
2020-11-18T21:19:14Z
HIGH
null
{'CWE-116'}
{'https://github.com/semantic-release/semantic-release/commit/ca90b34c4a9333438cc4d69faeb43362bb991e5a', 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26226'}
null
npm
GHSA-92xj-mqp7-vmcj
Prototype Pollution in node-forge
The package node-forge before 0.10.0 is vulnerable to Prototype Pollution via the util.setPath function. Note: Version 0.10.0 is a breaking change removing the vulnerable functions.
{'CVE-2020-7720'}
2022-01-13T18:24:30Z
2020-09-14T21:42:09Z
HIGH
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/digitalbazaar/forge', 'https://snyk.io/vuln/SNYK-JS-NODEFORGE-598677', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7720', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-609293', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md', 'https://github.com/digitalbazaar/forge/blob/master/CHANGELOG.md#removed'}
null
npm
GHSA-675m-85rw-j3w4
Prototype Pollution in just-extend
Versions of `just-extend` before 4.0.0 are vulnerable to prototype pollution. Provided certain input `just-extend` can add or modify properties of the `Object` prototype. These properties will be present on all objects. ## Recommendation Update to version `4.0.0` or later.
{'CVE-2018-16489'}
2020-08-31T18:35:29Z
2019-02-07T18:17:12Z
MODERATE
null
{'CWE-400'}
{'https://github.com/advisories/GHSA-675m-85rw-j3w4', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16489', 'https://www.npmjs.com/advisories/780', 'https://hackerone.com/reports/430291'}
null
npm
GHSA-vwjc-q9px-r9vq
Denial of Service in ecstatic
Versions of `ecstatic` prior to 1.4.0 are affected by a denial of service vulnerability when certain input strings are sent via the `Last-Modified` or `If-Modified-Since` headers. Parsing certain inputs with `new Date()` or `Date.parse()` cases v8 to crash. As ecstatic passes the value of the affected headers into one of these functions, sending certain inputs via one of the headers will cause the server to crash. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2015-9242'}
2020-08-31T18:09:49Z
2018-06-07T19:43:11Z
HIGH
null
{'CWE-400'}
{'https://nodesecurity.io/advisories/64', 'https://github.com/jfhbrook/node-ecstatic/pull/179', 'https://www.npmjs.com/advisories/64', 'https://github.com/advisories/GHSA-vwjc-q9px-r9vq', 'https://bugs.chromium.org/p/v8/issues/detail?id=4640', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9242'}
null
npm
GHSA-j7qv-pgf6-hvh4
XSS in `*Text` options of the Datepicker widget in jquery-ui
### Impact Accepting the value of various `*Text` options of the Datepicker widget from untrusted sources may execute untrusted code. For example, initializing the datepicker in the following way: ```js $( "#datepicker" ).datepicker( { showButtonPanel: true, showOn: "both", closeText: "<script>doEvilThing( 'closeText XSS' )</script>", currentText: "<script>doEvilThing( 'currentText XSS' )</script>", prevText: "<script>doEvilThing( 'prevText XSS' )</script>", nextText: "<script>doEvilThing( 'nextText XSS' )</script>", buttonText: "<script>doEvilThing( 'buttonText XSS' )</script>", appendText: "<script>doEvilThing( 'appendText XSS' )</script>", } ); ``` will call `doEvilThing` with 6 different parameters coming from all `*Text` options. ### Patches The issue is fixed in jQuery UI 1.13.0. The values passed to various `*Text` options are now always treated as pure text, not HTML. ### Workarounds A workaround is to not accept the value of the `*Text` options from untrusted sources. ### For more information If you have any questions or comments about this advisory, search for a relevant issue in [the jQuery UI repo](https://github.com/jquery/jquery-ui/issues). If you don't find an answer, open a new issue.
{'CVE-2021-41183'}
2021-10-27T17:00:26Z
2021-10-26T14:55:21Z
MODERATE
null
{'CWE-79'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SNXA7XRKGINWSUIPIZ6ZBCTV6N3KSHES/', 'https://github.com/jquery/jquery-ui/pull/1953', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41183', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O74SXYY7RGXREQDQUDQD4BPJ4QQTD2XQ/', 'https://security.netapp.com/advisory/ntap-20211118-0004/', 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-j7qv-pgf6-hvh4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NXIUUBRVLA4E7G7MMIKCEN75YN7UFERW/', 'https://www.drupal.org/sa-contrib-2022-004', 'https://www.tenable.com/security/tns-2022-09', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/jquery/jquery-ui', 'https://www.drupal.org/sa-core-2022-001', 'https://bugs.jqueryui.com/ticket/15284', 'https://www.drupal.org/sa-core-2022-002', 'https://blog.jqueryui.com/2021/10/jquery-ui-1-13-0-released/', 'https://lists.debian.org/debian-lts-announce/2022/01/msg00014.html'}
null
npm
GHSA-4rq4-32rv-6wp6
Improper Privilege Management in shelljs
shelljs is vulnerable to Improper Privilege Management
{'CVE-2022-0144'}
2022-01-21T21:05:51Z
2022-01-21T23:37:28Z
HIGH
null
{'CWE-269'}
{'https://github.com/shelljs/shelljs', 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144', 'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'}
null
npm
GHSA-mj87-8xf8-fp4w
Cross-Site Scripting in yui
Affected versions of `yui` are vulnerable to cross-site scripting in the `uploader.swf` and `io.swf` utilities, via script injection in the url. ## Recommendation YUI has published their recommendation to fix this issue. Their recommendation is to: - Delete self-hosted copies of these files if you are not using them - Use the Yahoo! CDN hosted files - Use the patched files provided on the YUI Library [here](https://yuilibrary.com/support/20130515-vulnerability/#resolution).
{'CVE-2013-4939'}
2020-08-31T18:19:38Z
2020-09-01T16:42:51Z
MODERATE
null
{'CWE-79'}
{'http://yuilibrary.com/support/20130515-vulnerability/', 'https://lists.apache.org/thread.html/d8b9403dbab85a51255614949938b619bd03b1c944c76c48c6996a0e@%3Cdev.zookeeper.apache.org%3E', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-39678', 'https://www.npmjs.com/advisories/332', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4939', 'https://yuilibrary.com/support/20130515-vulnerability/', 'https://moodle.org/mod/forum/discuss.php?d=232496', 'https://lists.apache.org/thread.html/72837f969cdf9b63a7e7337edd069fa3b3950eea7c997cc2ff61aa0c@%3Cissues.zookeeper.apache.org%3E'}
null
npm
GHSA-jpjp-vxv6-59hm
Directory Traversal in open-device
Affected versions of `open-device` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16187'}
2020-08-31T18:23:30Z
2018-07-23T20:41:11Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/open-device', 'https://www.npmjs.com/advisories/447', 'https://nodesecurity.io/advisories/447', 'https://github.com/advisories/GHSA-jpjp-vxv6-59hm', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16187'}
null
npm
GHSA-cch6-5x4h-6qc5
Directory Traversal in tiny-http
Affected versions of `tiny-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16097'}
2020-08-31T18:19:59Z
2020-09-01T16:46:04Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/342', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/tiny-http', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16097', 'https://nodesecurity.io/advisories/342'}
null
npm
GHSA-mpww-j7xj-cj35
Downloads Resources over HTTP in native-opencv
Affected versions of `native-opencv` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `native-opencv`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2015. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10658'}
2021-01-08T18:26:48Z
2019-02-18T23:45:07Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/263', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10658', 'https://github.com/advisories/GHSA-mpww-j7xj-cj35', 'https://www.npmjs.com/advisories/263'}
null
npm
GHSA-cmj2-m9m2-6726
Downloads Resources over HTTP in grunt-ccompiler
Affected versions of `grunt-ccompiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-ccompiler`. ## Recommendation No patch is currently available for this vulnerability, and the repository has been deleted from the owner's github account. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10636'}
2021-01-08T18:57:39Z
2019-02-18T23:47:11Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/239', 'https://github.com/advisories/GHSA-cmj2-m9m2-6726', 'https://www.npmjs.com/advisories/239', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10636'}
null
npm
GHSA-6494-v9fq-fgq2
Keystone is vulnerable to CSV injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in admin/server/api/download.js and lib/list/getCSVData.js in KeystoneJS before 4.0.0-beta.7 via a value that is mishandled in a CSV export.
{'CVE-2017-15879'}
2022-04-25T22:05:05Z
2017-11-16T01:46:50Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-15879', 'https://github.com/advisories/GHSA-6494-v9fq-fgq2', 'https://www.exploit-db.com/exploits/43053/', 'https://github.com/keystonejs/keystone/pull/4478', 'https://packetstormsecurity.com/files/144755/KeystoneJS-4.0.0-beta.5-Unauthenticated-CSV-Injection.html'}
null
npm
GHSA-wv83-jrfh-rp33
Cross site scripting in kindeditor
Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).
{'CVE-2021-42227'}
2021-10-21T14:56:27Z
2021-10-18T19:44:32Z
MODERATE
null
{'CWE-79'}
{'https://github.com/kindsoft/kindeditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42227', 'https://github.com/kindsoft/kindeditor/issues/336'}
null
npm
GHSA-7xc4-793x-25jp
Malicious Package in bpi66
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:49:13Z
2020-09-04T16:48:38Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1374'}
null
npm
GHSA-78cj-fxph-m83p
Regular Expression Denial of Service (ReDoS) in ua-parser-js
ua-parser-js >= 0.7.14, fixed in 0.7.24, uses a regular expression which is vulnerable to denial of service. If an attacker sends a malicious User-Agent header, ua-parser-js will get stuck processing it for an extended period of time.
{'CVE-2021-27292'}
2021-03-24T23:33:16Z
2021-05-06T16:11:13Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27292', 'https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14', 'https://gist.github.com/b-c-ds/6941d80d6b4e694df4bc269493b7be76', 'https://github.com/faisalman/ua-parser-js/commit/809439e20e273ce0d25c1d04e111dcf6011eb566'}
null
npm
GHSA-4jwp-vfvf-657p
Deserialization of Untrusted Data in bson
Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure.
{'CVE-2019-2391'}
2021-05-07T17:19:18Z
2022-02-10T23:30:20Z
MODERATE
null
{'CWE-502'}
{'https://github.com/mongodb/js-bson/releases/tag/v1.1.4', 'https://nvd.nist.gov/vuln/detail/CVE-2019-2391'}
null
npm
GHSA-p5ch-w78f-xh44
Cross-site scripting in @atlaskit/editor-core
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
{'CVE-2019-20903'}
2021-04-22T22:45:24Z
2022-02-10T20:34:24Z
MODERATE
null
{'CWE-79'}
{'https://bitbucket.org/atlassian/atlaskit-mk-2/commits/ca88f616e4', 'https://www.npmjs.com/package/@atlaskit/editor-core', 'https://atlaskit.atlassian.com/packages/editor/editor-core/changelog/113.1.5', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20903', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1021244735'}
null
npm
GHSA-rp28-29ch-gh92
Directory Traversal in elding
Affected versions of `elding` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. This vulnerability only affects files that have file extensions - i.e. `/etc/passwd` will be treated as a directory, and a read attempt on `/etc/passwd/index.js` will be made and subsequently fail. Example request: ``` GET /../../../../../../../../../../some_app_dir/secrets.json HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16222'}
2021-09-17T18:59:06Z
2018-08-06T21:30:15Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16222', 'https://github.com/advisories/GHSA-rp28-29ch-gh92', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/elding', 'https://www.npmjs.com/advisories/415'}
null
npm
GHSA-68cm-mgv7-vg5c
Directory Traversal in utahcityfinder
Affected versions of `utahcityfinder` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16173'}
2020-08-31T18:24:14Z
2018-07-23T20:45:11Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/467', 'https://github.com/advisories/GHSA-68cm-mgv7-vg5c', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16173', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/utahcityfinder', 'https://www.npmjs.com/advisories/467'}
null
npm
GHSA-6jg8-7333-554w
Sandbox Breakout in realms-shim
Versions of `realms-shim` prior to 1.2.0 are vulnerable to a Sandbox Breakout. `Reflect.construct` can be used on the sandboxed Function constructor to reach the prototypes of the primal Realm, which may allow an attacker to escape the sandbox and execute arbitrary code. ## Recommendation Upgrade to version 1.2.0 or later.
null
2021-09-02T16:40:48Z
2019-10-04T17:56:12Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1191', 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-471680', 'https://www.npmjs.com/advisories/1182', 'https://github.com/advisories/GHSA-6jg8-7333-554w', 'https://www.npmjs.com/advisories/1181', 'https://github.com/Agoric/realms-shim/', 'https://www.npmjs.com/advisories/1190', 'https://github.com/Agoric/realms-shim/security/advisories/GHSA-6jg8-7333-554w', 'https://www.npmjs.com/advisories/1180'}
null
npm
GHSA-5m9c-634g-47vq
Downloads Resources over HTTP in steroids
Affected versions of `steroids` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `steroids`. ## Recommendation This vulnerability was discovered and reported in 2016, yet has not seen a patch issued as of 3/2018. The best path forward for mitigating this issue is to attempt to use an alternative module that is actively maintained and which provides similar functionality, such as the native PhoneGap API.
{'CVE-2016-10581'}
2021-01-08T19:50:08Z
2019-02-18T23:35:01Z
HIGH
null
{'CWE-311'}
{'https://github.com/AppGyver/steroids/blob/master/package.json#L101', 'https://www.npmjs.com/advisories/168', 'https://github.com/advisories/GHSA-5m9c-634g-47vq', 'https://github.com/AppGyver/steroids/blob/master/package.json#L74', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10581', 'https://nodesecurity.io/advisories/168', 'https://github.com/AppGyver/steroids/blob/master/package.json#L103-L104'}
null
npm
GHSA-gjh4-fcv3-whpq
Cross-Site Scripting in webtorrent
Versions of `webtorrent` prior to 0.107.6 are vulnerable to Cross-Site Scripting. `webtorrent` servers started with `torrent.createServer()` lists a torrent's title and files in the index page without sanitization. This allows attackers to execute arbitrary JavaScript in the victim's browser through files with names containing the malicious payload. The issue is mitigated due to the fact that the server only allows fetching data pieces from the torrent. ## Recommendation Upgrade to version 0.107.6 or later.
{'CVE-2019-15782'}
2021-08-17T22:20:20Z
2019-09-04T10:02:50Z
MODERATE
null
{'CWE-79'}
{'https://github.com/webtorrent/webtorrent/pull/1714', 'https://github.com/webtorrent/webtorrent/compare/v0.107.5...v0.107.6', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15782', 'https://hackerone.com/reports/681617', 'https://www.npmjs.com/advisories/1158', 'https://snyk.io/vuln/SNYK-JS-WEBTORRENT-460351'}
null
npm
GHSA-rwvj-jgc4-fqq5
Downloads Resources over HTTP in cobalt-cli
Affected versions of `cobalt-cli` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cobalt-cli`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10597'}
2021-01-08T01:57:44Z
2019-02-18T23:34:05Z
HIGH
null
{'CWE-269', 'CWE-311'}
{'https://www.npmjs.com/advisories/197', 'https://github.com/advisories/GHSA-rwvj-jgc4-fqq5', 'https://nodesecurity.io/advisories/197', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10597'}
null
npm
GHSA-qrpm-p2h7-hrv2
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
{'CVE-2021-23566'}
2022-03-18T13:15:55Z
2022-01-21T23:57:06Z
MODERATE
null
{'CWE-200'}
{'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575', 'https://gist.github.com/artalar/bc6d1eb9a3477d15d2772e876169a444', 'https://github.com/ai/nanoid', 'https://github.com/ai/nanoid/pull/328', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2332550', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566', 'https://snyk.io/vuln/SNYK-JS-NANOID-2332193'}
null
npm
GHSA-44c6-4v22-4mhx
Regular Expression Denial of Service (ReDOS)
npm `semver-regex` is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3795'}
2021-09-16T17:31:51Z
2021-09-20T20:42:25Z
MODERATE
null
{'CWE-400'}
{'https://github.com/sindresorhus/semver-regex/commit/11c66245f4e1976dccc52977ed183696a21a3fd7', 'https://huntr.dev/bounties/006624e3-35ac-448f-aab9-7b5183f30e28', 'https://github.com/sindresorhus/semver-regex', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3795'}
null
npm
GHSA-mh5c-679w-hh4r
Denial of Service in mongodb
Versions of `mongodb` prior to 3.1.13 are vulnerable to Denial of Service. The package fails to properly catch an exception when a collection name is invalid and the DB does not exist, crashing the application. ## Recommendation Upgrade to version 3.1.13 or later.
null
2020-08-31T18:51:01Z
2020-09-03T21:12:01Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1203'}
null
npm
GHSA-wc9v-mj63-m9g5
Remote Code Execution in pg
Affected versions of `pg` contain a remote code execution vulnerability that occurs when the remote database or query specifies a crafted column name. There are two specific scenarios in which it is likely for an application to be vulnerable: 1. The application executes unsafe, user-supplied sql which contains malicious column names. 2. The application connects to an untrusted database and executes a query returning results which contain a malicious column name. ## Proof of Concept ``` const { Client } = require('pg') const client = new Client() client.connect() const sql = `SELECT 1 AS "\\'/*", 2 AS "\\'*/\n + console.log(process.env)] = null;\n//"` client.query(sql, (err, res) => { client.end() }) ``` ## Recommendation * Version 2.x.x: Update to version 2.11.2 or later. * Version 3.x.x: Update to version 3.6.4 or later. * Version 4.x.x: Update to version 4.5.7 or later. * Version 5.x.x: Update to version 5.2.1 or later. * Version 6.x.x: Update to version 6.4.2 or later. ( Note that versions 6.1.6, 6.2.5, and 6.3.3 are also patched. ) * Version 7.x.x: Update to version 7.1.2 or later. ( Note that version 7.0.2 is also patched. )
{'CVE-2017-16082'}
2020-08-31T18:26:18Z
2018-07-24T19:44:42Z
HIGH
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/521', 'https://node-postgres.com/announcements#2017-08-12-code-execution-vulnerability', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16082', 'https://nodesecurity.io/advisories/521', 'https://github.com/advisories/GHSA-wc9v-mj63-m9g5'}
null
npm
GHSA-53xv-c2hx-5w6q
Command Injection in node-windows
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
{'CVE-2021-45459'}
2022-03-30T21:13:48Z
2022-01-05T20:39:21Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6', 'https://github.com/coreybutler/node-windows', 'https://nvd.nist.gov/vuln/detail/CVE-2021-45459', 'https://security.netapp.com/advisory/ntap-20220107-0004/', 'https://github.com/dwisiswant0/advisory/issues/4'}
null
npm
GHSA-c9rj-pgxv-84jc
Exfiltrates data on installation in cofee-script
The `cofee-script` package is a piece of malware that steals sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `cofee-script` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16206'}
2021-09-08T21:59:36Z
2018-08-06T20:12:46Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16206', 'https://github.com/advisories/GHSA-c9rj-pgxv-84jc', 'https://nodesecurity.io/advisories/540', 'https://www.npmjs.com/advisories/540'}
null
npm
GHSA-8gf4-pcj6-54rp
Downloads Resources over HTTP in strider-sauce
Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`. ## Recommendation While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number. In order to resolve the vulnerability, you will need to install the module manually from github: ``` npm install github:Strider-CD/strider-sauce#5ff6d65 ``` As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.
{'CVE-2016-10611'}
2021-06-11T12:35:08Z
2019-02-18T23:47:53Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/202', 'https://www.npmjs.com/advisories/202', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611', 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp'}
null
npm
GHSA-f3pp-32qc-36w4
Prototype Pollution in jointjs
This affects the package jointjs before 3.4.2. A type confusion vulnerability can lead to a bypass of CVE-2020-28480 when the user-provided keys used in the path parameter are arrays in the setByPath function.
{'CVE-2021-23444'}
2021-09-22T14:30:35Z
2021-09-22T20:36:34Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://github.com/clientIO/joint/releases/tag/v3.4.2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1655816', 'https://github.com/clientIO/joint/pull/1514', 'https://github.com/clientIO/joint/commit/e5bf89efef6d5ea572d66870ffd86560de7830a8', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1655817', 'https://snyk.io/vuln/SNYK-JS-JOINTJS-1579578', 'https://github.com/clientIO/joint'}
null
npm
GHSA-69rr-wvh9-6c4q
Directory Traversal in st
Versions of `st` prior to 0.2.5 are affected by a directory traversal vulnerability. Vulnerable versions fail to properly handle URL encoded dots, which caused `%2e` to be interpreted as `.` by the filesystem, resulting the potential for an attacker to read sensitive files on the server. ## Recommendation Update to version 0.2.5 or later.
{'CVE-2014-3744'}
2021-09-23T21:00:00Z
2020-08-31T22:58:04Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-3744', 'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://github.com/isaacs/st', 'https://github.com/isaacs/st#security-status', 'http://www.securityfocus.com/bid/67389', 'https://nodesecurity.io/advisories/st_directory_traversal', 'https://www.npmjs.com/advisories/36', 'http://www.openwall.com/lists/oss-security/2014/05/13/1'}
null
npm
GHSA-2mvq-xp48-4c77
Denial of Service in subtext
All versions of `subtext` are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service. ## Recommendation This package is not actively maintained and has been moved to `@hapi/subtext` where version 6.1.2.
null
2021-09-29T18:37:04Z
2020-09-03T20:35:29Z
HIGH
null
{'CWE-400'}
{'https://github.com/hapijs/subtext', 'https://www.npmjs.com/advisories/1168', 'https://github.com/hapijs/subtext/issues/72'}
null
npm
GHSA-hpw4-m59j-9p52
Directory Traversal in dylmomo
Affected versions of `dylmomo` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16163'}
2020-08-31T18:21:43Z
2020-09-01T17:29:13Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/dylmomo', 'https://nodesecurity.io/advisories/396', 'https://www.npmjs.com/advisories/396', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16163'}
null
npm
GHSA-j9cf-pr2x-5273
Prototype Pollution in dot-object
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
{'CVE-2019-10793'}
2022-02-24T18:17:34Z
2022-02-09T22:33:31Z
MODERATE
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10793', 'https://github.com/rhalff/dot-object', 'https://snyk.io/vuln/SNYK-JS-DOTOBJECT-548905', 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'}
null
npm
GHSA-5x5w-v4xq-p64r
Directory Traversal in ewgaddis.lab6
Affected versions of `ewgaddis.lab6` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16175'}
2020-08-31T18:24:09Z
2018-07-23T20:44:52Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-5x5w-v4xq-p64r', 'https://nodesecurity.io/advisories/465', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ewgaddis.lab6', 'https://www.npmjs.com/advisories/465', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16175'}
null
npm
GHSA-8hw9-22v6-9jr9
Any logged in user could edit any other logged in user.
### Impact Everyone who is running a12n-server. A new HAL-Form was added to allow editing users. This feature should only have been accessible to admins. Unfortunately, privileges were incorrectly checked allowing any logged in user to make this change. ### Patches Patched in v0.18.2
{'CVE-2021-29452'}
2021-04-16T23:04:15Z
2021-04-19T15:14:33Z
HIGH
null
{'CWE-269'}
{'https://www.npmjs.com/package/@curveball/a12n-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29452', 'https://github.com/curveball/a12n-server/security/advisories/GHSA-8hw9-22v6-9jr9'}
null