ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-v659-54cx-g4qr
Prototype Pollution in deep-override
Prototype pollution vulnerability in 'deep-override' versions 1.0.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25941'}
2021-05-25T20:44:52Z
2021-05-17T20:57:25Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25941', 'https://github.com/ASaiAnudeep/deep-override/commit/2aced17651fb684959a6e04b1465a8329b3d5268', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25941'}
null
npm
GHSA-q5mq-6fjg-4mw8
SQL Injection in thinkjs
SQL injection vulnerability in the model.increment and model.decrement function in ThinkJS 3.2.10 allows remote attackers to execute arbitrary SQL commands via the step parameter.
{'CVE-2020-21176'}
2021-11-19T20:42:27Z
2021-11-19T20:42:32Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-21176', 'https://github.com/thinkjs/thinkjs', 'https://blog.jiguang.xyz/posts/thinkjs-sql-injection/'}
null
npm
GHSA-8h55-49jm-739x
Directory Traversal in easyquick
Affected versions of `easyquick` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16109'}
2020-08-31T18:20:48Z
2018-08-29T23:21:46Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16109', 'https://github.com/advisories/GHSA-8h55-49jm-739x', 'https://www.npmjs.com/advisories/373', 'https://nodesecurity.io/advisories/373', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/easyquick'}
null
npm
GHSA-gpg2-7r7j-4pm9
Malicious Package in buffer-xob
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:05:05Z
2020-09-03T22:09:56Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1249'}
null
npm
GHSA-hf5h-hh56-3vrg
Denial of Service in uws
Affected versions of `uws` do not properly handle large websocket messages when `permessage-deflate` is enabled, which may result in a denial of service condition. If `uws` recieves a 256Mb websocket message when `permessage-deflate` is enabled, the server will compress the message prior to executing the length check, and subsequently extract the message prior to processing. This can result in a situation where an excessively large websocket message passes the length checks, yet still gets cast from a Buffer to a string, which will exceed v8's maximum string size and crash the process. ## Recommendation Update to version 0.10.9 or later. Alternatively, disable `permessage-deflate`.
{'CVE-2016-10544'}
2020-08-31T18:12:32Z
2020-09-01T16:02:29Z
HIGH
null
{'CWE-400'}
{'https://github.com/uWebSockets/uWebSockets/commit/37deefd01f0875e133ea967122e3a5e421b8fcd9', 'https://nodesecurity.io/advisories/149', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10544', 'https://www.npmjs.com/advisories/149'}
null
npm
GHSA-2jpm-827p-j44g
Stored XSS in TimelineJS3
### Impact TimelineJS renders some user data as HTML. An attacker could implement an XSS exploit with maliciously crafted content in a number of data fields. This risk is present whether the source data for the timeline is stored on Google Sheets or in a JSON configuration file. Most TimelineJS users configure their timeline with a Google Sheets document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if they grant public write access to the document. Some TimelineJS users configure their timeline with a JSON document. Those users are exposed to this vulnerability if they grant write access to the document to a malicious inside attacker, if the access of a trusted user is compromised, or if write access to the system hosting that document is otherwise compromised. Although the vulnerability has a [CVSS v3.1 base score of 7.2](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), this vulnerability has a severity of Moderate due to the likeliness of exploitation. ### Patches Version 3.7.0 of TimelineJS addresses this in two ways. 1. For content which is intended to support limited HTML markup for styling and linking, that content is "sanitized" before being added to the DOM. 1. For content intended for simple text display, all markup is stripped. Very few users of TimelineJS actually install the TimelineJS code on their server. Most users publish a timeline using a URL hosted on systems we control. The fix for this issue is published to our system such that **those users will automatically begin using the new code**. The only exception would be users who have deliberately edited the embed URL to "pin" their timeline to an earlier version of the code. Some users of TimelineJS use it as a part of a [wordpress plugin](https://wordpress.org/plugins/knight-lab-timelinejs/). Version 3.7.0.0 of that plugin and newer integrate the updated code. Users are encouraged to update the plugin rather than manually update the embedded version of TimelineJS. ### Workarounds To exploit this vulnerability, the attacker must have write access to the data source for the Timeline or the server which embeds the timeline. Thus, the only workaround is appropriate attention to securing write access to the Google Sheet or JSON file which serves as the data source. ### References For more about the release of TimelineJS which addresses this vulnerability, see the [Knight Lab website](https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html). A technical write-up of this vulnerability is available [here](https://zanderwork.com/blog/cve-2020-15092/). ### Acknowledgements This vulnerability was discovered by Zander Work ([@captainGeech42](https://twitter.com/captainGeech42)) of Oregon State University. ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](https://github.com/NUKnightLab/TimelineJS3/issues) * File a support request in our [helpdesk system](https://knightlab.zendesk.com/hc/en-us/requests/new)
{'CVE-2020-15092'}
2021-01-07T23:47:19Z
2020-07-09T18:28:07Z
HIGH
null
{'CWE-79'}
{'https://github.com/NUKnightLab/TimelineJS3/security/advisories/GHSA-2jpm-827p-j44g', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15092', 'https://knightlab.northwestern.edu/2020/07/09/timelinejs-update/index.html', 'https://knightlab.northwestern.edu/posts/'}
null
npm
GHSA-c9f4-xj24-8jqx
Regular Expression Denial of Service in uglify-js
Versions of `uglify-js` prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the `parse()` method. ### Proof of Concept ``` var u = require('uglify-js'); var genstr = function (len, chr) { var result = ""; for (i=0; i<=len; i++) { result = result + chr; } return result; } u.parse("var a = " + genstr(process.argv[2], "1") + ".1ee7;"); ``` ### Results ``` $ time node test.js 10000 real 0m1.091s user 0m1.047s sys 0m0.039s $ time node test.js 80000 real 0m6.486s user 0m6.229s sys 0m0.094s ``` ## Recommendation Update to version 2.6.0 or later.
{'CVE-2015-8858'}
2021-09-08T21:59:09Z
2017-10-24T18:33:36Z
HIGH
null
null
{'https://www.npmjs.com/advisories/48', 'https://github.com/advisories/GHSA-c9f4-xj24-8jqx', 'http://www.securityfocus.com/bid/96409', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8858', 'https://nodesecurity.io/advisories/48', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-mmhj-4w6j-76h7
Misuse of `Reference` and other transferable APIs may lead to access to nodejs isolate
Versions of `isolated-vm` before v4.0.0, and especially before v3.0.0, have API pitfalls which may make it easy for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate. `Reference` objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a `Reference` instance to an attacker they would be able to use it to acquire a `Reference` to the nodejs context's `Function` object. Similar application-specific attacks could be possible by modifying the local prototype of other API objects. Access to `NativeModule` objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API this would allow for arbitrary code execution. To address these issues the following changes were made in v4.0.0: - Documentation was updated with more explicit guidelines on building secure applications. - `Reference` instances will no longer follow prototype chains by default, nor will they invoke accessors or proxies. - All `isolated-vm` API prototypes are now immutable. - `NativeModule` constructor may only be invoked from a nodejs isolate.
{'CVE-2021-21413'}
2021-03-30T22:27:45Z
2021-04-06T17:22:55Z
HIGH
null
{'CWE-913'}
{'https://github.com/laverdet/isolated-vm/commit/2646e6c1558bac66285daeab54c7d490ed332b15', 'https://github.com/laverdet/isolated-vm/blob/main/CHANGELOG.md#v400', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21413', 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-mmhj-4w6j-76h7', 'https://github.com/laverdet/isolated-vm/commit/27151bfecc260e96714443613880e3b2e6596704'}
null
npm
GHSA-p92x-r36w-9395
Type confusion in mpath
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input.
{'CVE-2021-23438'}
2021-09-13T20:27:08Z
2021-09-02T22:02:25Z
CRITICAL
null
{'CWE-843'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1579548', 'https://github.com/aheckmann/mpath/commit/89402d2880d4ea3518480a8c9847c541f2d824fc', 'https://github.com/aheckmann/mpath', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23438', 'https://snyk.io/vuln/SNYK-JS-MPATH-1577289'}
null
npm
GHSA-gqfv-g9f6-3v3m
Directory Traversal in serveryaozeyan
Affected versions of `serveryaozeyan` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16096'}
2020-08-31T18:20:22Z
2020-09-01T16:50:23Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/355', 'https://nodesecurity.io/advisories/355', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serveryaozeyan', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16096'}
null
npm
GHSA-xrr6-6ww3-f3qm
Sandbox Breakout / Arbitrary Code Execution in value-censorship
All versions of `value-censorship` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to validate async function constructors allowing attackers to execute arbitrary code. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:39:27Z
2020-09-02T21:25:58Z
MODERATE
null
null
{'https://www.npmjs.com/advisories/888'}
null
npm
GHSA-c6h4-gc3f-hgjq
Prototype Pollution in js-data
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
{'CVE-2021-23574'}
2022-01-13T18:28:50Z
2022-01-06T21:58:56Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23574', 'https://github.com/js-data/js-data/issues/577', 'https://github.com/js-data/js-data/issues/576', 'https://snyk.io/vuln/SNYK-JS-JSDATA-1584361', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790', 'https://github.com/js-data/js-data', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791', 'https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472'}
null
npm
GHSA-f64g-whxf-w8f2
Malicious Package in buffar-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:56:59Z
2020-09-03T21:44:06Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1236'}
null
npm
GHSA-c2v2-7rcg-2ch7
Regular Expression Denial of Service in ansi2html
The `ansi2html` package is affected by a regular expression denial of service vulnerability when certain types of user input is passed in. ## Proof of concept ``` var ansi2html = require('ansi2html') var start = process.hrtime(); ansi2html("[1111111111111111111111;0000000000000000000000"); console.log(process.hrtime(start)); start = process.hrtime(); ansi2html("[1111111111111111111111;00000000000000000000000"); console.log(process.hrtime(start)); start = process.hrtime(); ansi2html("[1111111111111111111111;000000000000000000000000"); console.log(process.hrtime(start)); start = process.hrtime(); ansi2html("[1111111111111111111111;0000000000000000000000000000"); console.log(process.hrtime(start)); ``` Results of the above ``` 00:29:53-adam_baldwin~/tmp$ node test [ 0, 119615367 ] [ 0, 149934565 ] [ 0, 233325677 ] [ 3, 46582479 ] ``` ## Recommendation At the time of this writing, February 2018, all versions of `ansi2html` remain vulnerable, and the package has not been updated for 4 years. In order to use this package safely, it is necessary to avoid passing user input to the package, or to limit the size of the input string to a size with a parse time you find acceptable. Unfortunately, the match time grows at quite a small character count, so it is unlikely for it to both allow strings of a useful size while protecting against the denial of service attack. In the case that user input of significant length must be parsed by ansi2html, the best mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.][available on npm](https://www.npmjs.com/search?q=ansi+html)
{'CVE-2015-9239'}
2021-01-14T15:58:08Z
2020-09-01T15:17:48Z
HIGH
null
{'CWE-400'}
{'https://www.npmjs.com/advisories/51', 'https://nodesecurity.io/advisories/51', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9239'}
null
npm
GHSA-8v3j-jfg3-v3fv
Prototype Pollution in Sails.js
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
{'CVE-2021-44908'}
2022-03-29T21:42:43Z
2022-03-18T00:01:11Z
MODERATE
null
{'CWE-1321'}
{'https://github.com/balderdashy/sails/issues/7209', 'https://github.com/balderdashy/sails/blob/master/lib/app/private/controller/load-action-modules.js#L32', 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358', 'https://github.com/balderdashy/sails', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908', 'https://github.com/Marynk/JavaScript-vulnerability-detection/blob/main/sailsJS%20PoC.zip'}
null
npm
GHSA-c9j3-wqph-5xx9
Command Injection in egg-scripts
Versions of `egg-scripts` before 2.8.1 are vulnerable to command injection. This is only exploitable if a malicious argument is provided on the command line. Example: `eggctl start --daemon --stderr='/tmp/eggctl_stderr.log; touch /tmp/malicious'` ## Recommendation Update to version 2.8.1 or later.
{'CVE-2018-3786'}
2020-08-31T18:32:59Z
2018-09-17T20:43:34Z
LOW
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/694', 'https://hackerone.com/reports/388936', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3786', 'https://github.com/eggjs/egg-scripts/blob/2.8.1/History.md', 'https://github.com/advisories/GHSA-c9j3-wqph-5xx9', 'https://github.com/eggjs/egg-scripts/pull/26'}
null
npm
GHSA-94jq-q5v2-76wj
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stores on Windows. This issue has been addressed in aws-c-io submodule versions 0.9.13 onward. This issue affects: Amazon Web Services AWS IoT Device SDK v2 for Java versions prior to 1.3.3 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Python versions prior to 1.5.18 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for C++ versions prior to 1.12.7 on Microsoft Windows. Amazon Web Services AWS IoT Device SDK v2 for Node.js versions prior to 1.5.3 on Microsoft Windows.
{'CVE-2021-40828'}
2022-03-03T05:13:50.572827Z
2021-11-24T21:02:24Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40828', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-cpp-v2'}
null
npm
GHSA-7p99-3798-f85c
URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
### Impact Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route. If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//google.com` will be redirected to `google.com` after login because the original url reported by the Express framework is not properly sanitised. ### Am I affected? You are affected by this vulnerability if you are using the `requiresAuth` middleware on a catch all route or the default `authRequired` option and `express-openid-connect` version `<=2.7.1`. ### How to fix that? Upgrade to version `>=2.7.2` ### Will this update impact my users? The fix provided in the patch will not affect your users.
{'CVE-2022-24794'}
2022-03-31T22:44:47Z
2022-03-31T22:44:47Z
HIGH
null
{'CWE-601'}
{'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24794', 'https://github.com/auth0/express-openid-connect', 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c'}
null
npm
GHSA-x9gm-qxhh-rf75
Malicious Package in cordova-plugin-china-picker
Version 1.0.910 of `cordova-plugin-china-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.910 of this module is found installed you will want to replace it with a version before or after 1.0.910. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T17:04:30Z
2020-09-01T19:51:28Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/advisories/GHSA-x9gm-qxhh-rf75', 'https://snyk.io/vuln/SNYK-JS-CORDOVAPLUGINCHINAPICKER-451001', 'https://git.oschina.net/BlankTrack/ChinaPicker.git', 'https://www.npmjs.com/advisories/622'}
null
npm
GHSA-cmch-296j-wfvw
Arbitrary File Write in iobroker.js-controller
Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/<adapter-name>` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default. ## Recommendation Upgrade to version 2.0.25 or later.
{'CVE-2019-10767'}
2021-08-19T15:11:15Z
2019-12-02T18:06:14Z
HIGH
null
{'CWE-22'}
{'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda', 'https://www.npmjs.com/advisories/1419', 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}
null
npm
GHSA-x6gq-467r-hwcc
Malicious Package in soket.js
All versions of `soket.js` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:29:35Z
2020-09-01T21:14:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/687'}
null
npm
GHSA-p6mr-pxg4-68hx
Symlink Arbitrary File Overwrite in bower
Versions of `bower` prior to 1.8.8 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `bower` does not verify that extracted symbolic links do not resolve to targets outside of the extraction root directory. ## Recommendation Update to version 1.8.8 or later
{'CVE-2019-5484'}
2020-08-31T18:35:19Z
2019-09-17T23:21:34Z
HIGH
null
{'CWE-22'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/487.json', 'https://hackerone.com/reports/473811', 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E', 'https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction', 'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3', 'https://www.npmjs.com/advisories/776', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5484'}
null
npm
GHSA-58qp-5328-v7mh
Improper Input Validation and Loop with Unreachable Exit Condition ('Infinite Loop') in cumulative-distribution-function
### Impact * Apps using this library on improper data may crash or go into an infinite-loop * In the case of a nodejs server-app using this library to act on invalid non-numeric data, the nodejs server may crash. This may affect other users of this server and/or require the server to be rebooted for proper operation. * In the case of a browser app using this library to act on invalid non-numeric data, that browser may crash or lock up. A flaw enabling an infinite-loop was discovered in the code for evaluating the cumulative-distribution-function of input data. Although the documentation explains that numeric data is required, some users may confuse an array of strings like ["1","2","3","4","5"] for numeric data [1,2,3,4,5] when it is in fact string data. An infinite loop is possible when the cumulative-distribution-function is evaluated for a given point when the input data is string data rather than type `number`. This vulnerability enables an infinite-cpu-loop denial-of-service-attack on any app using npm:cumulative-distribution-function v1.0.3 or earlier if the attacker can supply malformed data to the library. The vulnerability could also manifest if a data source to be analyzed changes data type from Arrays of number (proper) to Arrays of string (invalid, but undetected by earlier version of the library). ### Patches Users should upgrade to at least v2.0.0, or the latest version. Tests for several types of invalid data have been created, and version 2.0.0 has been tested to reject this invalid data by throwing a `TypeError()` instead of processing it. Developers using this library may wish to adjust their app's code slightly to better tolerate or handle this TypeError. Apps performing proper numeric data validation before sending data to this library should be mostly unaffected by this patch. ### Workarounds The vulnerability can be mitigated in older versions by ensuring that only finite numeric data of type `Array[number]` or `number` is passed to `cumulative-distribution-function` and its `f(x)` function, respectively. ### For more information If you have any questions or comments about this advisory: * Open an issue in the Github repository at https://github.com/DrPaulBrewer/cumulative-distribution-function
{'CVE-2021-29486'}
2021-04-30T17:36:06Z
2021-05-04T17:43:36Z
HIGH
null
{'CWE-835', 'CWE-20'}
{'https://github.com/DrPaulBrewer/cumulative-distribution-function/pull/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29486', 'https://www.npmjs.com/package/cumulative-distribution-function', 'https://github.com/DrPaulBrewer/cumulative-distribution-function/security/advisories/GHSA-58qp-5328-v7mh', 'https://github.com/DrPaulBrewer/cumulative-distribution-function/issues/7'}
null
npm
GHSA-qhm8-m2c4-9mw7
Downloads Resources over HTTP in qbs
Affected versions of `qbs` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `qbs`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10656'}
2021-01-08T01:58:31Z
2019-02-18T23:45:11Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-qhm8-m2c4-9mw7', 'https://nodesecurity.io/advisories/266', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10656', 'https://www.npmjs.com/advisories/266'}
null
npm
GHSA-cgqv-x5cx-xvqh
Arbitrary Code Injection in pouchdb
Affected versions of `pouchdb` do not properly sandbox the code execution engine which executes the map/reduce functions for temporary views and design documents. Under certain circumstances, an attacker could uses this to run arbitrary code on the server. ## Recommendation Update to version 6.0.5 or later.
{'CVE-2016-10546'}
2020-08-31T18:12:18Z
2018-07-26T16:22:08Z
CRITICAL
null
{'CWE-94'}
{'https://www.npmjs.com/advisories/143', 'https://github.com/advisories/GHSA-cgqv-x5cx-xvqh', 'https://nodesecurity.io/advisories/143', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10546'}
null
npm
GHSA-ff6r-5jwm-8292
Regular Expression Denial of Service in no-case
Affected versions of `no-case` are vulnerable to a regular expression denial of service when parsing untrusted user input. ## Recommendation Update to version 2.3.2 or later.
{'CVE-2017-16099'}
2020-08-31T18:26:35Z
2018-07-24T19:51:16Z
HIGH
null
{'CWE-400'}
{'https://nodesecurity.io/advisories/529', 'https://github.com/advisories/GHSA-ff6r-5jwm-8292', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16099', 'https://www.npmjs.com/advisories/529', 'https://github.com/blakeembrey/no-case/issues/17'}
null
npm
GHSA-grv5-w5vr-8h98
Path Traversal in droppy
This affects all versions of package droppy. It is possible to traverse directories to fetch configuration files from a droopy server.
{'CVE-2020-7757'}
2021-04-20T19:42:45Z
2021-05-10T18:47:29Z
MODERATE
null
{'CWE-22'}
{'https://github.com/silverwind/droppy/blob/master/server/server.js%23L845', 'https://snyk.io/vuln/SNYK-JS-DROPPY-1023656', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7757'}
null
npm
GHSA-4r4m-hjwj-43p8
Insecure Defaults Allow MITM Over TLS in engine.io-client
Affected versions of `engine.io-client` do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks. The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, such as undefined or null, certificate verification will be disabled. ## Recommendation Update to version 1.6.9 or later. If you are unable to upgrade, ensure all calls to socket.io to have a `rejectedUnauthorized: true` flag.
{'CVE-2016-10536'}
2020-08-31T18:10:49Z
2019-02-18T23:39:50Z
MODERATE
null
{'CWE-300'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10536', 'https://www.npmjs.com/advisories/99', 'https://nodesecurity.io/advisories/99', 'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800e2f7ff5c1', 'https://github.com/advisories/GHSA-4r4m-hjwj-43p8', 'https://www.cigital.com/blog/node-js-socket-io/'}
null
npm
GHSA-7jvx-f994-rfw2
materialize-css vulnerable to cross-site Scripting (XSS) due to improper escape of user input
All versions of package materialize-css are vulnerable to Cross-site Scripting (XSS) due to improper escape of user input (such as &lt;not-a-tag /&gt;) that is being parsed as HTML/JavaScript, and inserted into the Document Object Model (DOM). This vulnerability can be exploited when the user-input is provided to the autocomplete component.
{'CVE-2022-25349'}
2022-05-03T21:09:12Z
2022-05-03T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-MATERIALIZECSS-2324800', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2766498', 'https://github.com/Dogfalo/materialize', 'https://github.com/Dogfalo/materialize/blob/v1-dev/js/autocomplete.js%23L285%20', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25349'}
null
npm
GHSA-fg47-3c2x-m2wr
TimelockController vulnerability in OpenZeppelin Contracts
### Impact A vulnerability in `TimelockController` allowed an actor with the executor role to take immediate control of the timelock, by resetting the delay to 0 and escalating privileges, thus gaining unrestricted access to assets held in the contract. Instances with the executor role set to "open" allow anyone to use the executor role, thus leaving the timelock at risk of being taken over by an attacker. ### Patches A fix is included in the following releases of `@openzeppelin/contracts` and `@openzeppelin/contracts-upgradeable`: - 4.3.1 - 3.4.2 - 3.4.2-solc-0.7 Deployed instances of `TimelockController` should be replaced with a fixed version by migrating all assets, ownership, and roles. ### Workarounds Revoke the executor role from accounts not strictly under the team's control. We recommend revoking all executors that are not also proposers. When applying this mitigation, ensure there is at least one proposer and executor remaining. ### References [Post-mortem](https://forum.openzeppelin.com/t/timelockcontroller-vulnerability-postmortem/14958). ### Credits The issue was identified by an anonymous white hat hacker through [Immunefi](https://immunefi.com/). ### For more information If you have any questions or comments about this advisory, or need assistance executing the mitigation, email us at security@openzeppelin.com.
{'CVE-2021-39167'}
2021-09-13T20:30:10Z
2021-08-30T16:12:38Z
CRITICAL
null
{'CWE-269'}
{'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-fg47-3c2x-m2wr', 'https://github.com/OpenZeppelin/openzeppelin-contracts', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39167', 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/cec4f2ef57495d8b1742d62846da212515d99dd5', 'https://github.com/OpenZeppelin/openzeppelin-contracts/blob/master/CHANGELOG.md#431'}
null
npm
GHSA-jf85-cpcp-j695
Prototype Pollution in lodash
Versions of `lodash` before 4.17.12 are vulnerable to Prototype Pollution. The function `defaultsDeep` allows a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.17.12 or later.
{'CVE-2019-10744'}
2021-08-17T17:55:46Z
2019-07-10T19:45:23Z
CRITICAL
null
{'CWE-20'}
{'https://www.npmjs.com/advisories/1065', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://support.f5.com/csp/article/K47105354?utm_source=f5support&amp;utm_medium=RSS', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10744', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://github.com/lodash/lodash/pull/4336', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20191004-0005/', 'https://snyk.io/vuln/SNYK-JS-LODASH-450202'}
null
npm
GHSA-q5pq-pgrv-fh89
Critical severity vulnerability that affects dns-sync
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.
{'CVE-2014-9682'}
2021-09-16T19:33:41Z
2017-10-24T18:33:36Z
CRITICAL
null
{'CWE-77'}
{'https://github.com/skoranga/node-dns-sync/issues/1', 'https://github.com/advisories/GHSA-q5pq-pgrv-fh89', 'https://github.com/skoranga/node-dns-sync/commit/d9abaae384b198db1095735ad9c1c73d7b890a0d', 'http://www.openwall.com/lists/oss-security/2014/11/11/6', 'https://nvd.nist.gov/vuln/detail/CVE-2014-9682', 'https://github.com/skoranga/node-dns-sync'}
null
npm
GHSA-5fm9-jmv7-fcx5
Malicious Package in asynnc
All versions of `asynnc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:47:05Z
2020-09-02T18:35:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/842'}
null
npm
GHSA-87qw-7v97-w34r
Malicious Package in asinc
All versions of `asinc` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:46:36Z
2020-09-02T18:33:18Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/840'}
null
npm
GHSA-46m8-42hm-wvvw
Cross-Site Scripting in emojione
Affected versions of `emojione` are vulnerable to cross-site scripting when user input is passed into the `toShort()`, `shortnameToImage()`, `unicodeToImage()`, and `toImage()` functions. ## Recommendation Update to version 1.3.1 or later.
{'CVE-2016-1000231'}
2021-09-23T21:33:00Z
2020-09-01T15:34:16Z
HIGH
null
{'CWE-79'}
{'https://github.com/Ranks/emojione/issues/61', 'https://github.com/Ranks/emojione/', 'https://www.npmjs.com/advisories/129', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000231'}
null
npm
GHSA-m852-866j-69j8
Malicious Package in eslint-config-airbnb-standard
Version 2.0.0 of `eslint-config-airbnb-standard` was published with a bundled version of `eslint-scope` that was found to contain malicious code. This code would read the users `.npmrc` file and send it's contents to a remote server. ## Recommendation The best course of action if you found this package installed in your environment is to revoke all your npm tokens and use a different version of the module. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
null
2021-10-01T13:27:58Z
2020-09-01T20:47:01Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/675'}
null
npm
GHSA-wh87-3959-vfrq
Malicious Package in buffer-hor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T20:58:37Z
2020-09-03T21:51:58Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1242'}
null
npm
GHSA-62g9-6hw5-rwfp
Path Traversal in resolve-path
Versions of `resolve-path` before 1.4.0 are vulnerable to path traversal. `resolve-path` relative path resolving suffers from a lack of file path sanitization for windows based paths. ## Recommendation Update to version 1.4.0 or later.
{'CVE-2018-3732'}
2020-08-31T18:28:19Z
2018-07-18T21:20:25Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/573', 'https://github.com/pillarjs/resolve-path/commit/fe5b8052cafd35fcdafe9210e100e9050b37d2a0', 'https://hackerone.com/reports/315760', 'https://github.com/advisories/GHSA-62g9-6hw5-rwfp', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3732'}
null
npm
GHSA-wvhm-4hhf-97x9
Cross-Site Scripting in Prism
### Impact The easing preview of the Previewers plugin has an XSS vulnerability that allows attackers to execute arbitrary code in Safari and Internet Explorer. This impacts all Safari and Internet Explorer users of Prism >=v1.1.0 that use the _Previewers_ plugin (>=v1.10.0) or the _Previewer: Easing_ plugin (v1.1.0 to v1.9.0). ### Patches This problem is patched in v1.21.0. ### Workarounds To workaround the issue without upgrading, [disable the easing preview](https://prismjs.com/plugins/previewers/#disabling-a-previewer) on all impacted code blocks. You need Prism v1.10.0 or newer to apply this workaround. ### References The vulnerability was introduced by this [commit](https://github.com/PrismJS/prism/commit/4303c940d3d3a20e8ce7635bf23331c75060f5c5) on Sep 29, 2015 and fixed by [Masato Kinugawa](https://twitter.com/kinugawamasato) (#2506). ### For more information If you have any questions or comments about this advisory, please [open an issue](https://github.com/PrismJS/prism/issues).
{'CVE-2020-15138'}
2021-01-07T23:41:49Z
2020-08-07T22:28:30Z
HIGH
null
{'CWE-79'}
{'https://prismjs.com/plugins/previewers/#disabling-a-previewer', 'https://github.com/PrismJS/prism/pull/2506/commits/7bd7de05edf71112a3a77f87901a2409c9c5c20c', 'https://github.com/PrismJS/prism/security/advisories/GHSA-wvhm-4hhf-97x9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15138'}
null
npm
GHSA-pr34-8jfr-xhv8
Downloads Resources over HTTP in selenium-wrapper
Affected versions of `selenium-wrapper` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-wrapper`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10628'}
2021-01-08T18:20:00Z
2019-02-18T23:47:21Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/224', 'https://nodesecurity.io/advisories/224', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10628', 'https://github.com/advisories/GHSA-pr34-8jfr-xhv8'}
null
npm
GHSA-57f3-gghm-9mhc
Regular Expression Denial of Service (ReDoS)
This affects the package jspdf before 2.3.1. ReDoS is possible via the addImage function.
{'CVE-2021-23353'}
2021-03-25T00:18:05Z
2021-03-12T21:28:46Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBMRRIO-1083288', 'https://github.com/MrRio/jsPDF/commit/d8bb3b39efcd129994f7a3b01b632164144ec43e', 'https://github.com/MrRio/jsPDF/pull/3091', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1083286', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1083289', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1083287', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23353', 'https://snyk.io/vuln/SNYK-JS-JSPDF-1073626'}
null
npm
GHSA-hg78-c92r-hvwr
Denial of Service in mqtt
Affected versions of `mqtt` will cause the node process to crash when receiving specially crafted MQTT packets, making the application vulnerable to a denial of service condition. ## Recommendation Update to v1.0.0 or later
{'CVE-2016-1000242'}
2021-09-23T21:37:37Z
2020-09-01T16:01:24Z
HIGH
null
{'CWE-248'}
{'https://snyk.io/vuln/npm:mqtt:20160817', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000242', 'https://github.com/mqttjs/MQTT.js', 'https://www.npmjs.com/advisories/140', 'https://github.com/mqttjs/MQTT.js/blob/388a084d7803934b18b43c1146c817deaa1396b1/lib/parse.js#L230'}
null
npm
GHSA-c78w-2gw7-gjv3
XSS in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in: the core parser and `media` plugin. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.9 or lower and TinyMCE 5.2.1 or lower. ### Patches This vulnerability has been patched in TinyMCE 4.9.10 and 5.2.2 by improved HTML parsing and sanitization logic. ### Workarounds The workarounds available are: - disable the media plugin and manually sanitize CDATA content (see below) or - upgrade to either TinyMCE 4.9.10 or TinyMCE 5.2.2 #### Example: Manually strip CDATA elements ```js setup: function(editor) { editor.on('PreInit', function() { editor.parser.addNodeFilter('#cdata', function(nodes) { for (var i = 0; i < nodes.length; i++) { nodes[i].remove(); } }); }); } ``` ### Acknowledgements Tiny Technologies would like to thank Michał Bentkowski and [intivesec](https://github.com/intivesec) for discovering these vulnerabilities. ### References https://www.tiny.cloud/docs/release-notes/release-notes522/#securityfixes ### For more information If you have any questions or comments about this advisory: * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues) * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
{'CVE-2019-1010091'}
2021-01-14T17:50:10Z
2020-05-11T20:00:15Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce/issues/4394', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-c78w-2gw7-gjv3', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010091'}
null
npm
GHSA-m8pw-hgvj-cwcm
Directory Traversal in sgqserve
Affected versions of `sgqserve` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16215'}
2020-08-31T18:22:25Z
2020-09-01T18:08:55Z
HIGH
null
{'CWE-22'}
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/sgqserve', 'https://www.npmjs.com/advisories/419', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16215', 'https://nodesecurity.io/advisories/419'}
null
npm
GHSA-gjph-xf5q-6mfq
Denial of Service in @hapi/ammo
Versions of `@hapi/ammo` prior to 3.1.2 or 5.0.1 are vulnerable to Denial of Service. The Range HTTP header parser has a vulnerability which will cause the function to throw a system error if the header is set to an invalid value. Because hapi is not expecting the function to ever throw, the error is thrown all the way up the stack. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation Upgrade to version 3.1.2 or 5.0.1.
null
2020-08-31T19:00:37Z
2020-09-03T15:46:02Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1474'}
null
npm
GHSA-wp7m-mrvf-599c
Command Injection in node-df
All versions of `node-df` are vulnerable to Command Injection. The package fails to sanitize filenames passed to the `file` option. If this value is user-controlled it may allow attackers to run arbitrary commands in the server. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-15597'}
2021-11-01T14:12:07Z
2020-02-14T23:09:10Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/adriano-di-giovanni/node-df', 'https://www.npmjs.com/advisories/1431', 'https://nvd.nist.gov/vuln/detail/CVE-2019-15597', 'https://hackerone.com/reports/703412'}
null
npm
GHSA-x7m2-6g99-84w5
Arbitrary File Read in Snyk Broker
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
{'CVE-2020-7652'}
2021-08-25T21:46:46Z
2020-06-03T22:02:24Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7652', 'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570611', 'https://updates.snyk.io/snyk-broker-security-fixes-152338', 'https://github.com/snyk/broker'}
null
npm
GHSA-w8hg-mxvh-9h57
Malicious Package in angular-bmap
Version 0.0.9 of `angular-bmap` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 0.0.9 of this module is found installed you will want to replace it with a version before or after 0.0.9. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2021-09-24T14:49:19Z
2020-09-01T19:42:49Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/shenfw1987/angular-bmap', 'https://www.npmjs.com/advisories/614', 'https://snyk.io/vuln/SNYK-JS-ANGULARBMAP-451017'}
null
npm
GHSA-6898-wx94-8jq8
Potential Command Injection in libnotify
Versions 1.0.3 and earlier of libnotify are affected by a shell command injection vulnerability. This may result in execution of arbitrary shell commands, if user input is passed into libnotify.notify. Untrusted input passed in the call to libnotify.notify could result in execution of shell commands. Callers may be unaware of this. ### Example ``` var libnotify = require('libnotify') libnotify.notify('UNTRUSTED INPUT', { title: \"\" }, function () { console.log(arguments); }) ``` Special thanks to Neal Poole for submitting the pull request to fix this issue. ## Recommendation Update to version 1.0.4 or greater
{'CVE-2013-7381'}
2021-09-23T20:55:29Z
2020-08-31T22:50:48Z
CRITICAL
null
{'CWE-74'}
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/libnotify_potential_command_injection_in_libnotify.notify', 'https://github.com/mytrile/node-libnotify', 'https://nvd.nist.gov/vuln/detail/CVE-2013-7381', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://www.npmjs.com/advisories/20', 'https://github.com/mytrile/node-libnotify/commit/dfe7801d73a0dda10663a0ff3d0ec8b4d5f0d448'}
null
npm
GHSA-5w8q-x7hc-jhp6
Directory Traversal in node-simple-router
Affected versions of `node-simple-router` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation Update to v0.10.1 or later.
{'CVE-2017-16083'}
2020-08-31T18:20:18Z
2018-07-24T19:42:39Z
HIGH
null
{'CWE-22'}
{'https://github.com/sandy98/node-simple-router/commit/dfdd52e2e80607af433097d940b3834fd96df488', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/node-simple-router', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16083', 'https://nodesecurity.io/advisories/352', 'https://github.com/advisories/GHSA-5w8q-x7hc-jhp6', 'https://www.npmjs.com/advisories/352'}
null
npm
GHSA-wpgh-hmv4-r3v5
Prototype pollution in safe-obj
Prototype pollution vulnerability in 'safe-obj' versions 1.0.0 through 1.0.2 allows an attacker to cause a denial of service and may lead to remote code execution.
{'CVE-2021-25928'}
2021-05-20T21:52:15Z
2021-06-21T17:18:20Z
CRITICAL
null
{'CWE-1321'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25928', 'https://github.com/mantacode/safe-obj/blob/6ab63529182b6cf11704ac84f10800290afd3f9f/lib/index.js#L122', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25928'}
null
npm
GHSA-w725-67p7-xv22
Command Injection in local-devices
Versions of `local-devices` prior to 3.0.0 are vulnerable to Command Injection. The package does not validate input on ip addresses and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. ## Recommendation Upgrade to version 3.0.0 or later.
null
2021-09-28T17:35:44Z
2020-09-03T17:05:04Z
HIGH
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1020', 'https://github.com/DylanPiercey/local-devices/pull/16', 'https://github.com/DylanPiercey/local-devices'}
null
npm
GHSA-89mq-4x47-5v83
Prototype Pollution in angular
Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality.
{'CVE-2019-10768'}
2022-01-04T19:51:20Z
2019-11-20T15:29:43Z
HIGH
null
{'CWE-915', 'CWE-20'}
{'https://github.com/angular/angular.js', 'https://www.npmjs.com/advisories/1343', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768', 'https://github.com/angular/angular.js/pull/16913', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}
null
npm
GHSA-hmw2-mvvh-jf5j
OS Command Injection in enpeem
enpeem through 2.2.0 allows execution of arbitrary commands. The &quot;options.dir&quot; argument is provided to the &quot;exec&quot; function without any sanitization.
{'CVE-2019-10801'}
2021-04-08T22:25:20Z
2021-04-13T15:22:47Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10801', 'https://snyk.io/vuln/SNYK-JS-ENPEEM-559007', 'https://github.com/balderdashy/enpeem/blob/master/index.js#L114'}
null
npm
GHSA-hqw4-8893-j4h7
Directory Traversal in simple-npm-registry
Affected versions of `simple-npm-registry` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16132'}
2020-08-31T18:23:41Z
2018-07-23T20:49:28Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-hqw4-8893-j4h7', 'https://www.npmjs.com/advisories/452', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/simple-npm-registry', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16132', 'https://nodesecurity.io/advisories/452'}
null
npm
GHSA-22h7-7wwg-qmgg
Prototype Pollution in @hapi/hoek
Versions of `@hapi/hoek` prior to 8.5.1 and 9.0.3 are vulnerable to Prototype Pollution. The `clone` function fails to prevent the modification of the Object prototype when passed specially-crafted input. Attackers may use this to change existing properties that exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances. This issue __does not__ affect hapi applications since the framework protects against such malicious inputs. Applications that use `@hapi/hoek` outside of the hapi ecosystem may be vulnerable. ## Recommendation Update to version 8.5.1, 9.0.3 or later.
null
2020-08-31T19:00:24Z
2020-09-04T17:56:39Z
LOW
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1468'}
null
npm
GHSA-4r9c-jghc-cx5m
Cross-site Scripting in apostrophe
Apostrophe CMS versions between 2.63.0 to 3.3.1 are vulnerable to Stored XSS where an editor uploads an SVG file that contains malicious JavaScript onto the Images module, which triggers XSS once viewed.
{'CVE-2021-25978'}
2021-11-08T21:26:37Z
2021-11-10T16:45:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/apostrophecms/apostrophe/commit/c8b94ee9c79468f1ce28e31966cb0e0839165e59', 'https://github.com/apostrophecms/apostrophe', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25978'}
null
npm
GHSA-3v6h-hqm4-2rg6
Arbitrary File Write in adm-zip
Versions of `adm-zip` before 0.4.9 are vulnerable to arbitrary file write when used to extract a specifically crafted archive that contains path traversal filenames (`../../file.txt` for example). ## Recommendation Update to version 0.4.9 or later.
{'CVE-2018-1002204'}
2020-08-31T18:43:24Z
2018-07-27T17:07:14Z
HIGH
null
{'CWE-22'}
{'https://github.com/cthackers/adm-zip/pull/212', 'https://github.com/snyk/zip-slip-vulnerability', 'https://github.com/cthackers/adm-zip/commit/62f64004fefb894c523a7143e8a88ebe6c84df25', 'https://snyk.io/research/zip-slip-vulnerability', 'https://www.npmjs.com/advisories/681', 'http://www.securityfocus.com/bid/107001', 'https://www.npmjs.com/advisories/994', 'https://hackerone.com/reports/362118', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002204', 'https://snyk.io/vuln/npm:adm-zip:20180415', 'https://github.com/advisories/GHSA-3v6h-hqm4-2rg6'}
null
npm
GHSA-mjjq-c88q-qhr6
Cross-Site Scripting in dompurify
Versions of `dompurify` prior to 2.0.7 are vulnerable to Cross-Site Scripting (XSS). It is possible to bypass the package sanitization through Mutation XSS, which may allow an attacker to execute arbitrary JavaScript in a victim's browser. ## Recommendation Upgrade to version 2.0.7 or later.
null
2021-09-29T20:13:06Z
2020-09-03T21:22:00Z
CRITICAL
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1223', 'https://github.com/cure53/DOMPurify', 'https://github.com/cure53/DOMPurify/releases/tag/2.0.7'}
null
npm
GHSA-4hq8-v42x-9wx3
Malicious Package in bs85check
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:56:40Z
2020-09-04T16:51:52Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1379'}
null
npm
GHSA-qmhf-qg6f-pc4v
Directory Traversal in fbr-client
Affected versions of `fbr-client` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16217'}
2020-08-31T18:23:35Z
2018-07-23T20:39:51Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-qmhf-qg6f-pc4v', 'https://www.npmjs.com/advisories/449', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/fbr-client', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16217', 'https://nodesecurity.io/advisories/449'}
null
npm
GHSA-662x-fhqg-9p8v
Regular Expression Denial of Service in ua-parser-js
The package ua-parser-js before 0.7.22 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex for Redmi Phones and Mi Pad Tablets UA.
{'CVE-2020-7733'}
2021-05-03T19:19:25Z
2021-05-07T16:18:19Z
HIGH
null
{'CWE-400'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-674665', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBFAISALMAN-674666', 'https://github.com/faisalman/ua-parser-js/commit/233d3bae22a795153a7e6638887ce159c63e557d', 'https://snyk.io/vuln/SNYK-JS-UAPARSERJS-610226', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7733'}
null
npm
GHSA-7hx8-2rxv-66xv
Denial of Service in hapi
All Versions of `hapi` are vulnerable to Denial of Service. The CORS request handler has a vulnerability which will cause the function to throw a system error if the header contains some invalid values. If no unhandled exception handler is available, the application will exist, allowing an attacker to shut down services. ## Recommendation This package is deprecated and is now maintained as `@hapi/hapi`. Please update your dependencies to use `@hapi/hapi`.
null
2020-08-31T19:00:54Z
2020-09-03T15:48:00Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1481'}
null
npm
GHSA-9px9-f7jw-fwhj
Command Injection in priest-runner
All versions of `priest-runner` are vulnerable to Command Injection. The package fails to sanitize input and passes it directly to a `spawn` call, which may allow attackers to execute arbitrary code in the system. The `PriestController.prototype.createChild ` function is vulnerable since the `spawn` parameters come from a POST request body. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T19:01:15Z
2020-09-03T15:49:37Z
CRITICAL
null
{'CWE-77'}
{'https://www.npmjs.com/advisories/1492'}
null
npm
GHSA-vvf2-ppj9-pp49
Inefficient Regular Expression Complexity in vuelidate
vuelidate is a simple, lightweight model-based validation for Vue.js 2.x & 3.0. A ReDoS (regular expression denial of service) flaw was found in the `@vuelidate/validators` package. An attacker that is able to provide crafted input to the url(input) function may cause an application to consume an excessive amount of CPU.
{'CVE-2021-3794'}
2022-05-04T03:24:54Z
2021-09-20T20:42:06Z
HIGH
null
{'CWE-400', 'CWE-697'}
{'https://github.com/vuelidate/vuelidate/commit/1f0ca31c30e5032f00dbd14c4791b5ee7928f71d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3794', 'https://huntr.dev/bounties/d8201b98-fb91-4c12-a6f7-181b4a20d9b7', 'https://github.com/vuelidate/vuelidate'}
null
npm
GHSA-69r7-cw26-px6h
Downloads Resources over HTTP in google-closure-tools-latest
Affected versions of `google-closure-tools-latest` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `google-closure-tools-latest`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, and instead install the [closure compiler](https://github.com/google/closure-compiler) manually. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10677'}
2021-01-08T19:45:57Z
2019-02-18T23:42:14Z
HIGH
null
{'CWE-311'}
{'https://nodesecurity.io/advisories/274', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10677', 'https://github.com/advisories/GHSA-69r7-cw26-px6h', 'https://www.npmjs.com/advisories/274'}
null
npm
GHSA-49x3-8228-3w3m
Inefficient Regular Expression Complexity in code-server
code-server is vulnerable to Inefficient Regular Expression Complexity
{'CVE-2021-3810'}
2021-09-20T18:59:46Z
2021-09-20T20:18:39Z
HIGH
null
{'CWE-1333'}
{'https://github.com/cdr/code-server', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3810', 'https://github.com/cdr/code-server/commit/ca617df135e78833f93c8320cb2d2cf8bba809f5', 'https://huntr.dev/bounties/38888513-30fc-4d8f-805d-34070d60e223'}
null
npm
GHSA-frxq-v7fm-m4pv
Malicious Package in requuest
All versions of `requuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:04:59Z
2020-09-02T20:27:53Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/859'}
null
npm
GHSA-qrmc-fj45-qfc2
Prototype Pollution in extend
Versions of `extend` prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The `extend()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects. ## Recommendation If you're using `extend` 3.x upgrade to 3.0.2 or later. If you're using `extend` 2.x upgrade to 2.0.2 or later.
{'CVE-2018-16492'}
2020-08-31T18:43:30Z
2019-02-07T18:03:28Z
MODERATE
null
{'CWE-400'}
{'https://hackerone.com/reports/381185', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16492', 'https://github.com/advisories/GHSA-qrmc-fj45-qfc2', 'https://www.npmjs.com/advisories/996'}
null
npm
GHSA-7r8m-45gc-m2c8
Downloads Resources over HTTP in mongodb-instance
Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`. ## Recommendation Update to version 0.0.3 or later.
{'CVE-2016-10572'}
2021-01-08T19:14:34Z
2019-02-18T23:52:14Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/235', 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8', 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)', 'https://nodesecurity.io/advisories/235', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'}
null
npm
GHSA-8hq2-fcqm-39hq
Malicious Package in rimrafall
Version 1.0.0 of `rimrafall` contains malicious code as a preinstall script. The package attempts to remove all files in the system's root folder. ## Recommendation If you installed this package it is likely your machine was erased. If not, remove the package from your system and verify if any files were deleted.
null
2021-09-30T21:57:22Z
2020-09-02T21:46:05Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/913'}
null
npm
GHSA-r3xc-47qg-h929
Cross-Site Scripting in @ionic/core
Versions of `@ionic/core` prior to 4.0.3, 4.1.3, 4.2.1 or 4.3.1 are vulnerable to Cross-Site Scripting (XSS). The package uses the unsafe `innerHTML` function without sanitizing input, which may allow attackers to execute arbitrary JavaScript on the victim's browser. This issue affects the components: - `<ion-alert>.message` - `<ion-searchbar>.placeholder` - `<ion-infinite-scroll-content>.loadingText` - `<ion-refresher-content>.pullingText` - `<ion-refresher-content>.refershingText` ## Recommendation - If you are using @ionic/core 4.0.x, upgrade to 4.0.3 or later. - If you are using @ionic/core 4.1.x, upgrade to 4.1.3 or later. - If you are using @ionic/core 4.2.x, upgrade to 4.2.1 or later. - If you are using @ionic/core 4.3.x, upgrade to 4.3.1 or later.
null
2021-09-28T17:38:45Z
2020-09-03T17:06:09Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/1023', 'https://github.com/ionic-team/ionic/issues/18065', 'https://github.com/ionic-team/ionic'}
null
npm
GHSA-pj97-j597-ppm7
Malicious Package in rqeuest
All versions of `rqeuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-09-30T20:30:01Z
2020-09-02T21:15:22Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/870'}
null
npm
GHSA-vpf5-82c8-9v36
Prototype Pollution in algoliasearch-helper
The package algoliasearch-helper before 3.6.2 are vulnerable to Prototype Pollution due to use of the merge function in src/SearchParameters/index.jsSearchParameters._parseNumbers without any protection against prototype properties. Note that this vulnerability is only exploitable if the implementation allows users to define arbitrary search patterns.
{'CVE-2021-23433'}
2021-11-24T19:00:33Z
2021-11-23T21:15:35Z
MODERATE
null
{'CWE-915', 'CWE-1321'}
{'https://github.com/algolia/algoliasearch-helper-js/blob/3.5.5/src/SearchParameters/index.js%23L291', 'https://snyk.io/vuln/SNYK-JS-ALGOLIASEARCHHELPER-1570421', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23433', 'https://github.com/algolia/algoliasearch-helper-js/commit/4ff542b70b92a6b81cce8b9255700b0bc0817edd', 'https://github.com/algolia/algoliasearch-helper-js'}
null
npm
GHSA-fmrr-mx6j-h3h5
Prototype Pollution in confucious
All versions of package confucious up to and including version 0.0.12 are vulnerable to Prototype Pollution via the set function.
{'CVE-2020-7714'}
2021-05-05T18:50:23Z
2021-05-06T18:12:09Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-CONFUCIOUS-598665', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7714'}
null
npm
GHSA-wfjh-3hq2-r276
Malicious Package in node-spdy
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server. ## Recommendation Remove the package from your environment. There are no indications of further compromise.
null
2021-09-30T20:27:36Z
2020-09-03T19:56:48Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1138'}
null
npm
GHSA-377f-vvrc-9wgg
Malicious Package in zemen
Version 0.0.5 of `zemen` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2021-09-30T20:07:38Z
2020-09-03T19:09:07Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1101'}
null
npm
GHSA-vm5j-vqr6-v7v8
OS Command Injection in pixl-class
pixl-class prior to 1.0.3 allows execution of arbitrary commands. The members argument of the create function can be controlled by users without any sanitization.
{'CVE-2020-7640'}
2021-05-25T20:40:19Z
2021-12-10T20:04:56Z
HIGH
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-PIXLCLASS-564968', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7640', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8,', 'https://github.com/jhuckaby/pixl-class/commit/47677a3638e3583e42f3a05cc7f0b30293d2acc8'}
null
npm
GHSA-gfm8-g3vm-53jh
Malicious Package in leetlog
Versions 0.1.2 and 0.1.3 of `leetlog` contain malicious code. The package adds an arbitrary hardcoded SSH key identified as `hacker@evilmachine` to the system's `authorized_keys` ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T17:16:55Z
2020-09-03T17:21:19Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1041'}
null
npm
GHSA-q8xg-8xwf-m598
Machine-In-The-Middle in lix
All versions of `lix` are vulnerable to Machine-In-The-Middle. The package accepts downloads with `http` and follows `location` header redirects for package downloads. This allows for an attacker in a privileged network position to intercept a lix package installation and redirect the download to a malicious source. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-10800'}
2021-09-16T20:39:54Z
2020-04-16T03:14:59Z
HIGH
null
{'CWE-544', 'CWE-639'}
{'https://www.npmjs.com/advisories/1306', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10800', 'https://github.com/lix-pm/lix.client'}
null
npm
GHSA-58v4-qwx5-7f59
SQL Injection in knex
knex.js versions before 0.19.5 are vulnerable to SQL Injection attack. Identifiers are escaped incorrectly as part of the MSSQL dialect, allowing attackers to craft a malicious query to the host DB.
{'CVE-2019-10757'}
2021-08-18T21:50:50Z
2019-10-21T16:12:13Z
CRITICAL
null
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-KNEX-471962', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10757'}
null
npm
GHSA-2h3h-q99f-3fhc
UNIX Symbolic Link (Symlink) Following in @npmcli/arborist
### Impact Arbitrary File Creation, Arbitrary File Overwrite, Arbitrary Code Execution `@npmcli/arborist`, the library that calculates dependency trees and manages the `node_modules` folder hierarchy for the npm command line interface, aims to guarantee that package dependency contracts will be met, and the extraction of package contents will always be performed into the expected folder. This is, in part, accomplished by resolving dependency specifiers defined in `package.json` manifests for dependencies with a specific name, and nesting folders to resolve conflicting dependencies. When multiple dependencies differ only in the case of their name, Arborist's internal data structure saw them as separate items that could coexist within the same level in the `node_modules` hierarchy. However, on case-insensitive file systems (such as macOS and Windows), this is not the case. Combined with a symlink dependency such as `file:/some/path`, this allowed an attacker to create a situation in which arbitrary contents could be written to any location on the filesystem. For example, a package `pwn-a` could define a dependency in their `package.json` file such as `"foo": "file:/some/path"`. Another package, `pwn-b` could define a dependency such as `FOO: "file:foo.tgz"`. On case-insensitive file systems, if `pwn-a` was installed, and then `pwn-b` was installed afterwards, the contents of `foo.tgz` would be written to `/some/path`, and any existing contents of `/some/path` would be removed. Anyone using npm v7.20.6 or earlier on a case-insensitive filesystem is potentially affected. ### Patches 2.8.2 (included in npm v7.20.7 and above) ### Fix and Caveats There are two parts to the fix: 1. Immediately prior to extraction, if the target folder is not a directory, it is moved aside. (If the installation fails, filesystem entries moved aside in this manner are moved back as part of the rollback process.) 2. The `children` map that represents child nodes in the tree is replaced with a case-insensitive map object, such that `node.children.get('foo')` and `node.children.get('FOO')` will return the same object, enabling Arborist to detect and handle this class of tree collision. This second item imposes a caveat on case _sensitive_ filesystems where two packages with names which differ only in case may already exist at the same level in the tree, causing unpredictable behavior in this rare edge case. Note that in such cases, the `package-lock.json` already creates a situation which is hazardous to use on case-sensitive filesystems, and will likely lead to other problems. If affected by this caveat, please run `npm update` to rebuild your tree and generate a new `package-lock.json` file.
{'CVE-2021-39134'}
2021-08-31T16:51:31Z
2021-08-31T16:04:03Z
MODERATE
null
{'CWE-61', 'CWE-59'}
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/arborist/security/advisories/GHSA-2h3h-q99f-3fhc', 'https://github.com/npm/arborist', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.npmjs.com/package/@npmcli/arborist', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39134'}
null
npm
GHSA-m7mf-vm62-7x3q
Insecure template handling in haml-coffee
haml-coffee is a JavaScript templating solution. haml-coffee mixes pure template data with engine configuration options through the Express render API. More specifically, haml-coffee supports overriding a series of HTML helper functions through its configuration options. A vulnerable application that passes user controlled request objects to the haml-coffee template engine may introduce RCE vulnerabilities. Additionally control over the escapeHtml parameter through template configuration pollution ensures that haml-coffee would not sanitize template inputs that may result in reflected Cross Site Scripting attacks against downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of haml-coffee is currently 1.14.1. For complete details refer to the referenced GHSL-2021-025.
{'CVE-2021-32818'}
2021-05-17T19:07:00Z
2021-05-17T20:58:21Z
HIGH
null
{'CWE-79'}
{'https://securitylab.github.com/advisories/GHSL-2021-025-haml-coffee/', 'https://www.npmjs.com/package/haml-coffee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32818'}
null
npm
GHSA-q42p-pg8m-cqh6
Prototype Pollution in handlebars
Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. ## Recommendation For handlebars 4.1.x upgrade to 4.1.2 or later. For handlebars 4.0.x upgrade to 4.0.14 or later.
null
2021-08-04T20:54:05Z
2019-06-05T14:07:48Z
HIGH
null
{'CWE-471'}
{'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86', 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692', 'https://github.com/handlebars-lang/handlebars.js/issues/1495', 'https://www.npmjs.com/advisories/755'}
null
npm
GHSA-6pq3-928q-x6w6
Prototype Pollution
All versions of `utils-extend` are vulnerable to prototype pollution. The `extend` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2020-8147'}
2021-06-07T22:49:29Z
2020-09-03T15:51:28Z
HIGH
null
{'CWE-471'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8147', 'https://www.npmjs.com/advisories/1502', 'https://hackerone.com/reports/801522'}
null
npm
GHSA-w32g-5hqp-gg6q
Cross-Site Scripting in mermaid
Versions of `mermaid` prior to 8.2.3 are vulnerable to Cross-Site Scripting. If malicious input such as `A["<img src=invalid onerror=alert('XSS')></img>"] ` is provided to the application, it will execute the code instead of rendering it as text due to improper output encoding. ## Recommendation Upgrade to version 8.2.3 or later
null
2021-09-27T13:34:07Z
2020-09-02T15:41:41Z
HIGH
null
{'CWE-79'}
{'https://github.com/knsv/mermaid', 'https://github.com/knsv/mermaid/issues/847', 'https://www.npmjs.com/advisories/751'}
null
npm
GHSA-pc7q-c837-3wjq
Malicious Package in wallet-address-validtaor
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-04T15:56:21Z
2020-09-03T17:02:58Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1413'}
null
npm
GHSA-2vqv-hp3p-fmv8
Downloads Resources over HTTP in webdriver-launcher
Affected versions of `webdriver-launcher` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdriver-launcher`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2011. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10651'}
2021-01-08T20:06:08Z
2019-02-18T23:47:03Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-2vqv-hp3p-fmv8', 'https://www.npmjs.com/advisories/246', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10651', 'https://nodesecurity.io/advisories/246'}
null
npm
GHSA-9xv2-548x-5h79
Arbitrary File Read in Snyk Broker
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
{'CVE-2020-7648'}
2021-07-29T17:46:59Z
2020-06-03T22:02:19Z
MODERATE
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570607', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7648', 'https://updates.snyk.io/snyk-broker-security-fixes-152338'}
null
npm
GHSA-w4vp-3mq7-7v82
Cross-Site Scripting in lazysizes
Versions of `lazysizes` prior to 5.2.1-rc1 are vulnerable to Cross-Site Scripting. The `video-embed` plugin fails to sanitize the following attributes: data-vimeo, `data-vimeoparams`, `data-youtube` and `data-ytparams`. This allows attackers to execute arbitrary JavaScript in a victim's browser if the attacker has control over the vulnerable attributes. ## Recommendation Upgrade to version 5.2.1-rc1 or later.
null
2020-08-31T19:01:17Z
2020-09-03T15:49:48Z
HIGH
null
{'CWE-79'}
{'https://github.com/aFarkas/lazysizes/issues/764', 'https://www.npmjs.com/advisories/1493'}
null
npm
GHSA-g4xj-wcq6-qwx5
Code injection in mock2easy
This affects all versions up to and including version 0.0.24 of package mock2easy. a malicious user could inject commands through the _data variable: Affected Area require('../server/getJsonByCurl')(mock2easy, function (error, stdout) { if (error) { return res.json(500, error); } res.json(JSON.parse(stdout)); }, '', _data.interfaceUrl, query, _data.cookie,_data.interfaceType);
{'CVE-2020-7697'}
2021-05-06T18:23:33Z
2021-05-06T18:25:58Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7697', 'https://www.npmjs.com/package/mock2easy', 'https://snyk.io/vuln/SNYK-JS-MOCK2EASY-572312'}
null
npm
GHSA-mpp5-2x55-49xw
XSS in svg2png (NPM package)
svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document.
{'CVE-2020-11887'}
2021-05-25T19:52:21Z
2022-01-06T19:45:13Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11887', 'https://github.com/domenic/svg2png/issues/117'}
null
npm
GHSA-jmqm-f2gx-4fjv
Sensitive information exposure through logs in npm-registry-fetch
Affected versions of `npm-registry-fetch` are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>`. The password value is not redacted and is printed to stdout and also to any generated log files.
null
2021-09-22T19:00:07Z
2020-07-07T18:59:10Z
MODERATE
null
{'CWE-352'}
{'https://snyk.io/vuln/SNYK-JS-NPMREGISTRYFETCH-575432', 'https://github.com/npm/npm-registry-fetch/security/advisories/GHSA-jmqm-f2gx-4fjv', 'https://github.com/npm/npm-registry-fetch', 'https://github.com/npm/npm-registry-fetch/pull/29', 'https://github.com/npm/npm-registry-fetch/commit/18bf9b97fb1deecdba01ffb05580370846255c88'}
null
npm
GHSA-w3w8-37jv-2c58
Cross-Site Scripting in mustache
Versions of `mustache` prior to 2.2.1 are affected by a cross-site scripting vulnerability when attributes in mustache templates are not quoted. ### Example Template: ```<a href={{foo}}/>``` Input: ```{ 'foo' : 'test.com onload=alert(1)'}``` Rendered result: ```<a href=test.com onload=alert(1)/>``` ## Recommendation Update to version 2.2.1 or later. Alternatively, ensure that all attributes in hmustache templates are encapsulated with quotes.
{'CVE-2015-8862'}
2021-09-20T22:34:08Z
2017-10-24T18:33:36Z
HIGH
null
{'CWE-79'}
{'https://nodesecurity.io/advisories/62', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8862', 'https://www.npmjs.com/advisories/62', 'https://github.com/janl/mustache.js/commit/378bcca8a5cfe4058f294a3dbb78e8755e8e0da5', 'https://www.tenable.com/security/tns-2016-18', 'https://github.com/janl/mustache.js', 'http://www.securityfocus.com/bid/96436', 'https://github.com/advisories/GHSA-w3w8-37jv-2c58', 'http://www.openwall.com/lists/oss-security/2016/04/20/11'}
null
npm
GHSA-pqpp-2363-649v
Cross-Site Scripting in buttle
All versions of `buttle` are vulnerable to Cross-Site Scripting. Due to misconfiguration of its rendering engine, `buttle` does not sanitize the HTML output allowing attackers to run arbitrary JavaScript when processing malicious markdown files. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:36:36Z
2020-09-02T18:22:30Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/404126', 'https://www.npmjs.com/advisories/810'}
null
npm
GHSA-8p9r-f949-699g
Path Traversal in browserless-chrome
This affects all versions of browserless-chrome before 1.43.0. User input flowing from the workspace endpoint gets used to create a file path filePath and this is fetched and then sent back to a user. This can be escaped to fetch arbitrary files from a server.
{'CVE-2020-7758'}
2021-04-20T22:41:52Z
2021-05-10T18:46:48Z
HIGH
null
{'CWE-22'}
{'https://github.com/browserless/chrome/releases/tag/1.40.2-chrome-stable', 'https://github.com/browserless/chrome/blob/master/src/routes.ts%23L175', 'https://github.com/browserless/chrome/commit/848b87e5bea4f8473eea85261a5ff922d6ebd2b6', 'https://snyk.io/vuln/SNYK-JS-BROWSERLESSCHROME-1023657', 'https://www.npmjs.com/package/browserless-chrome', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7758'}
null
npm
GHSA-xqqr-p362-6rmc
Directory Traversal in hostr
Affected versions of `hostr` are vulnerable to directory traversal which allows attackers to read files outside the current directory by sending `../` in the url path for GET requests. ## Recommendation Upgrade to version 2.3.6 or later.
{'CVE-2017-16029'}
2020-08-31T18:18:32Z
2018-11-09T17:44:20Z
MODERATE
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/303', 'https://github.com/henrytseng/hostr/issues/8)', 'https://www.npmjs.com/advisories/303', 'https://github.com/advisories/GHSA-xqqr-p362-6rmc', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16029', 'https://github.com/henrytseng/hostr/issues/8'}
null
npm
GHSA-6c8f-qphg-qjgp
Validation Bypass in kind-of
Versions of `kind-of` 6.x prior to 6.0.3 are vulnerable to a Validation Bypass. A maliciously crafted object can alter the result of the type check, allowing attackers to bypass the type checking validation. ## Recommendation Upgrade to versions 6.0.3 or later.
{'CVE-2019-20149'}
2021-08-23T15:03:55Z
2020-03-31T15:59:54Z
HIGH
null
{'CWE-668'}
{'https://www.npmjs.com/advisories/1490', 'https://github.com/jonschlinkert/kind-of/issues/30', 'https://snyk.io/vuln/SNYK-JS-KINDOF-537849', 'https://github.com/jonschlinkert/kind-of/pull/31', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20149', 'https://github.com/jonschlinkert/kind-of/commit/1df992ce6d5a1292048e5fe9c52c5382f941ee0b'}
null
npm
GHSA-rqjw-p5vr-c695
Basic-auth app bundle credential exposure in gatsby-source-wordpress
### Impact The gatsby-source-wordpress plugin prior to versions 4.0.8 and 5.9.2 leaks .htaccess HTTP Basic Authentication variables into the app.js bundle during build-time. Users who are not initializing basic authentication credentials in the gatsby-config.js are not affected. Example affected gatsby-config.js: ``` resolve: 'gatsby-source-wordpress', auth: { htaccess: { username: leaked_username password: leaked_password, }, }, ``` ### Patches A patch has been introduced in gatsby-source-wordpress@4.0.8 and gatsby-source-wordpress@5.9.2 which mitigates the issue by filtering all variables specified in the `auth: { }` section. Users that depend on this functionality are advised to upgrade to the latest release of gatsby-source-wordpress, run `gatsby clean` followed by a `gatsby build`. ### Workarounds There is no known workaround at this time, other than manually editing the app.js file post-build. ### For more information Email us at [security@gatsbyjs.com](mailto:security@gatsbyjs.com)
{'CVE-2021-32770'}
2021-07-28T15:18:01Z
2021-07-19T15:21:41Z
HIGH
null
{'CWE-522', 'CWE-200'}
{'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-rqjw-p5vr-c695', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32770'}
null
npm
GHSA-6f93-xj8r-jp82
Malicious Package in bunfer-xor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:36:55Z
2020-09-03T22:28:21Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1267'}
null