ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
npm
GHSA-5h9g-x5rv-25wg
Cross-site scripting vulnerability in TinyMCE
### Impact A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower. ### Patches This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements. ### Workarounds To work around this vulnerability, either: - Upgrade to TinyMCE 5.9.0 or higher - Manually sanitize the content using the `BeforeSetContent` event (see below) #### Example: Manually sanitize content ```js editor.on('BeforeSetContent', function(e) { var sanitizedContent = ...; // Manually sanitize content here e.content = sanitizedContent; }); ``` ### Acknowledgements Tiny Technologies would like to thank William Bowling for discovering this vulnerability. ### References https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes ### For more information If you have any questions or comments about this advisory: * Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud) * Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
null
2022-03-03T05:13:16.708960Z
2021-10-22T16:24:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes', 'https://github.com/tinymce/tinymce'}
null
npm
GHSA-whq6-mj2r-mjqc
OS Command Injection in lsof
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.
{'CVE-2019-10783'}
2021-03-29T22:11:57Z
2021-04-13T15:17:53Z
HIGH
null
{'CWE-78'}
{'https://snyk.io/vuln/SNYK-JS-LSOF-543632', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}
null
npm
GHSA-4m8h-h59m-m34j
Prototype Pollution in bmoor
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
{'CVE-2021-23558'}
2022-02-07T21:21:00Z
2022-02-01T00:50:09Z
HIGH
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23558', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://github.com/b-heilman/bmoor/', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/'}
null
npm
GHSA-9829-jj5p-j6hf
Prototype Pollution in worksmith
All versions up to and including 1.0.0 of the package worksmith are vulnerable to Prototype Pollution via the setValue function.
{'CVE-2020-7725'}
2021-05-05T17:39:52Z
2021-05-06T18:26:30Z
CRITICAL
null
{'CWE-1321'}
{'https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7725'}
null
npm
GHSA-428f-mh7w-6w2x
Infecting Module in pandora-doomsday
The `pandora-doomsday` package is a malicious package that adds itself to the package.json of other packages discovered on the victim host and attempts to publish the package. It has been removed from the npm registry. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
{'CVE-2017-16127'}
2020-08-31T18:24:50Z
2020-09-01T18:56:40Z
MODERATE
null
{'CWE-509'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16127', 'https://www.npmjs.com/advisories/482', 'https://nodesecurity.io/advisories/482'}
null
npm
GHSA-wmx6-vxcf-c3gr
Validation Bypass in slp-validate
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus. ## Recommendation Upgrade to version 1.0.1 or later.
{'CVE-2019-16761'}
2021-01-08T20:11:31Z
2019-11-15T23:10:19Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr'}
null
npm
GHSA-6cj2-92m5-7mvp
Improperly Controlled Modification of Object Prototype Attributes
### Impact The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. ### Patches `think-config@1.1.3` patched it, anyone used `think-config` should upgrade to `>=1.1.3` version. ### References https://cwe.mitre.org/data/definitions/1321.html ### For more information If you have any questions or comments about this advisory: * Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs) * Email us at [i@imnerd.org](mailto:i@imnerd.org)
null
2021-10-08T21:20:09Z
2021-08-03T16:48:46Z
HIGH
null
{'CWE-1321'}
{'https://github.com/thinkjs/think-config/', 'https://github.com/thinkjs/think-config/security/advisories/GHSA-6cj2-92m5-7mvp'}
null
npm
GHSA-9pr3-7449-977r
Cross-Site Scripting in express-cart
All versions of `harp` are vulnerable to Cross-Site Scripting. In the admin page it is possible to inject arbitrary JavaScript as a new product option, allowing attackers to execute arbitrary code. This is limited to the admin page and does not affect other pages. ## Recommendation No fix is currently available. Consider using an alternative module until a fix is made available.
null
2020-08-31T18:36:31Z
2020-09-02T18:21:26Z
LOW
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/808', 'https://hackerone.com/reports/395944'}
null
npm
GHSA-77jf-fjjf-xcww
Invalid Curve Attack in openpgp
Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key. ## Recommendation Upgrade to version 4.3.0 or later. If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
{'CVE-2019-9155'}
2021-07-27T21:15:18Z
2019-08-23T21:42:22Z
MODERATE
null
{'CWE-327'}
{'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'}
null
npm
GHSA-v8v8-6859-qxm4
Arbitrary shell command execution in logkitty
Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1.
{'CVE-2020-8149'}
2020-06-04T19:33:24Z
2020-06-05T14:47:02Z
HIGH
null
{'CWE-94'}
{'https://hackerone.com/reports/825729', 'https://github.com/zamotany/logkitty/pull/18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}
null
npm
GHSA-jjhg-qw5v-r8xx
Malicious Package in anarchy
All versions of `anarchy` contain malicious code. The package ran `rm - rf /` as an install script. ## Recommendation Remove the package from your environment.
null
2021-09-30T20:06:04Z
2020-09-03T19:01:20Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1089'}
null
npm
GHSA-74cr-77xc-8g6r
Prototype Pollution in @apollo/gateway
Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. ## Recommendation Upgrade to version 0.6.2 or later.
null
2021-08-16T15:28:22Z
2019-06-13T20:37:39Z
HIGH
null
{'CWE-400', 'CWE-1321'}
{'https://www.npmjs.com/advisories/917', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://github.com/apollographql/apollo-server/pull/2779'}
null
npm
GHSA-wpfc-3w63-g4hm
Malicious Package in axois
All versions of `axois` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands. ## Recommendation This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
null
2021-10-01T13:28:35Z
2020-09-01T21:09:48Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/683'}
null
npm
GHSA-gf7h-vg5v-cch6
Directory Traversal in ritp
Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16198'}
2021-09-10T20:50:55Z
2018-08-06T20:03:21Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/432', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198', 'https://github.com/JacksonGL/NPM-Vuln-PoC', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp', 'https://github.com/advisories/GHSA-gf7h-vg5v-cch6', 'https://nodesecurity.io/advisories/432'}
null
npm
GHSA-x2mc-8fgj-3wmr
Improper Input Validation in tar-fs
A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.
{'CVE-2018-20835'}
2021-08-03T21:27:51Z
2019-05-01T18:37:18Z
HIGH
null
{'CWE-20'}
{'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'}
null
npm
GHSA-w46j-8hm6-h8mm
XSS in apexcharts
The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields.
{'CVE-2021-23327'}
2021-02-10T18:18:38Z
2021-02-11T20:47:34Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327', 'https://www.npmjs.com/package/apexcharts'}
null
npm
GHSA-hjcp-j389-59ff
Regular Expression Denial of Service in marked
Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule. ## Recommendation Update to version 0.3.4 or later.
{'CVE-2015-8854'}
2021-09-14T17:23:54Z
2017-10-24T18:33:36Z
HIGH
null
null
{'https://www.npmjs.com/advisories/23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'https://nodesecurity.io/advisories/23', 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&amp;utm_medium=RSS', 'https://github.com/chjj/marked/issues/497', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://github.com/chjj/marked', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://github.com/advisories/GHSA-hjcp-j389-59ff', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854'}
null
npm
GHSA-38fc-wpqx-33j7
Uncontrolled Resource Consumption in trim-off-newlines
All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.
{'CVE-2021-23425'}
2021-08-26T14:52:19Z
2021-09-02T17:15:42Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23425', 'https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6', 'https://github.com/stevemao/trim-off-newlines', 'https://github.com/stevemao/trim-off-newlines/pull/3', 'https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197'}
null
npm
GHSA-gqgv-6jq5-jjj9
Prototype Pollution Protection Bypass in qs
Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances. ## Recommendation Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.
{'CVE-2017-1000048'}
2021-08-25T21:03:56Z
2020-04-30T17:16:47Z
HIGH
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://www.npmjs.com/advisories/1469', 'https://snyk.io/vuln/npm:qs:20170213', 'https://github.com/ljharb/qs', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs/issues/200'}
null
npm
GHSA-7wgh-5q4q-6wx5
Malicious Package in 1337qq-js
All versions of `1337qq-js` contain malicious code. The package exfiltrates sensitive information through install scripts. It targets UNIX systems. The information exfiltrated includes: - Environment variables - Running processes - /etc/hosts - uname -a - npmrc file ## Recommendation Remove the package from your system and rotate any compromised credentials.
null
2020-08-31T18:59:53Z
2020-09-04T17:30:39Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1455'}
null
npm
GHSA-66ww-999q-mffq
Arbitrary code execution in post-loader
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.
{'CVE-2022-0748'}
2022-03-25T14:29:33Z
2022-03-18T00:01:11Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0748', 'https://github.com/egoist/post-loader', 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737'}
null
npm
GHSA-hf55-c445-2w97
Cross-site Scripting in @rocket.chat/livechat
A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance.
{'CVE-2022-21830'}
2022-04-15T16:57:07Z
2022-04-03T00:01:00Z
MODERATE
null
{'CWE-79'}
{'https://hackerone.com/reports/1091118', 'https://github.com/RocketChat/Rocket.Chat.Livechat', 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21830', 'https://github.com/RocketChat/Rocket.Chat.Livechat/releases/tag/v1.9.0'}
null
npm
GHSA-v39p-96qg-c8rf
Prototype Pollution in object-path
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
{'CVE-2021-23434'}
2021-08-30T18:16:08Z
2021-09-01T18:37:11Z
MODERATE
null
{'CWE-843', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', 'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://github.com/mariocasciaro/object-path', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423'}
null
npm
GHSA-gg6m-fhqv-hg56
Denial of Service in yar
Versions of `yar` prior to 2.2.0 are affected by a denial of service vulnerability related to an invalid encrypted session cookie value. When an invalid encryped session cookie value is provided, the process will crash. ## Recommendation Update to version 2.2.0 or later.
{'CVE-2014-4179'}
2021-09-23T21:04:51Z
2020-09-01T15:15:36Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2014-4179', 'https://github.com/spumko/yar/', 'https://www.npmjs.com/advisories/44', 'https://github.com/spumko/yar/issues/34'}
null
npm
GHSA-8h8v-6qqm-fwpq
Path Traversal in express-cart
Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal. ## Recommendation Update to version 1.1.7 or later.
null
2020-08-31T18:32:22Z
2020-09-01T21:06:38Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/676', 'https://hackerone.com/reports/343726'}
null
npm
GHSA-jp46-fw6c-3pm9
Directory Traversal in scott-blanch-weather-app
Affected versions of `scott-blanch-weather-app` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16184'}
2020-08-31T18:23:44Z
2020-09-01T18:46:58Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/453', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app', 'https://www.npmjs.com/advisories/453', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16184'}
null
npm
GHSA-76wf-2xcf-6wmx
Malicious Package in ngx-pica
Version 1.1.5 of `ngx-pica` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:36Z
2020-09-03T00:31:28Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/948'}
null
npm
GHSA-rvcw-f68w-8h8h
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime
### Impact [AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block). ### Patches A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`. Users should upgrade to `^3.11.4`. ### Credits Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
{'CVE-2021-29446'}
2021-04-16T22:57:33Z
2021-04-19T15:00:05Z
MODERATE
null
{'CWE-696', 'CWE-203', 'CWE-208'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29446', 'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h', 'https://www.npmjs.com/package/jose-node-cjs-runtime'}
null
npm
GHSA-qv2v-m59f-v5fw
Insecure randomness in socket.io
Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization. ## Recommendation Update to v0.9.7 or later.
{'CVE-2017-16031'}
2021-09-16T21:04:32Z
2018-11-07T00:29:37Z
HIGH
null
{'CWE-330'}
{'https://github.com/socketio/socket.io/issues/856', 'https://nodesecurity.io/advisories/321', 'https://github.com/socketio/socket.io', 'https://github.com/socketio/socket.io/pull/857', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://www.npmjs.com/advisories/321', 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}
null
npm
GHSA-pr49-5hhf-6mm6
Directory Traversal in serverabc
Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16180'}
2020-08-31T18:23:55Z
2018-07-23T20:44:34Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/459', 'https://www.npmjs.com/advisories/459', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16180', 'https://github.com/advisories/GHSA-pr49-5hhf-6mm6', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc'}
null
npm
GHSA-9mr8-6prp-gwjv
SQL Injection in query-mysql
All versions of `query-mysql` are vulnerable to SQL injection due to lack of user input sanitization allows to run arbitrary SQL queries when fetching data from database. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is passed into this module.
{'CVE-2018-3754'}
2021-09-08T20:06:59Z
2018-09-10T15:20:30Z
HIGH
null
{'CWE-89'}
{'https://github.com/advisories/GHSA-9mr8-6prp-gwjv', 'https://www.npmjs.com/advisories/666', 'https://hackerone.com/reports/311244', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3754'}
null
npm
GHSA-6fvw-7vch-x489
Downloads Resources over HTTP in selenium-portal
Affected versions of `selenium-portal` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-portal`. ## Recommendation No patch is currently available for this vulnerability, and the package has not seen an update since 2014. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10667'}
2021-01-08T19:44:43Z
2019-02-18T23:44:36Z
HIGH
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-6fvw-7vch-x489', 'https://nodesecurity.io/advisories/260', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10667', 'https://www.npmjs.com/advisories/260'}
null
npm
GHSA-73qr-pfmq-6rp8
Embedded malware in coa
The npm package `coa` had versions published with malicious code. Users of affected versions (2.0.3 and above) should downgrade to 2.0.2 as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/veged/coa/issues/99) for details as they unfold. Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-11-04T18:48:35Z
2021-11-04T16:22:28Z
CRITICAL
null
{'CWE-506'}
{'https://github.com/veged/coa/issues/99', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/veged/coa'}
null
npm
GHSA-r4r9-mgjc-g6q3
Path Traversal in 626
All versions of `626` are vulnerable to path traversal. This enables a remote attacker to read arbitrary files from the remote server using this module. ## Recommendation No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.
{'CVE-2018-3727'}
2020-08-31T18:28:44Z
2020-09-01T19:06:15Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3727', 'https://hackerone.com/reports/311216', 'https://www.npmjs.com/advisories/583'}
null
npm
GHSA-g9wf-393q-4w38
Malicious Package in only-test-not-install
All versions of `only-test-not-install` contain malicious code. The package deletes the folder `~/test` from the system as a postinstall script. ## Recommendation Remove the package from your environment. There are no further signs of compromise.
null
2021-09-30T17:44:24Z
2020-09-03T17:28:26Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1044'}
null
npm
GHSA-vc9j-fhvv-8vrf
Remote Code Execution in scratch-vm
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented. NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.
{'CVE-2020-14000'}
2021-09-22T21:24:07Z
2020-07-27T19:55:52Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/LLK/scratch-vm/pull/2476', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://github.com/LLK/scratch-vm', 'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}
null
npm
GHSA-fj59-f6c3-3vw4
Command Injection in systeminformation
### Impact command injection vulnerability ### Patches Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2 ### Workarounds If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()` ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: * Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)
{'CVE-2020-26300'}
2021-09-10T14:54:48Z
2020-10-27T20:40:00Z
MODERATE
null
{'CWE-78'}
{'https://github.com/sebhildebrandt/systeminformation', 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'}
null
npm
GHSA-m8fw-534v-xm85
Cross-Site Scripting (XSS) in cloudcmd
Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable. ## Recommendation Update to version 9.1.6 or later.
null
2020-08-31T18:31:00Z
2019-06-04T15:43:29Z
HIGH
null
{'CWE-79'}
{'https://hackerone.com/reports/341044)', 'https://hackerone.com/reports/341044', 'https://www.npmjs.com/advisories/642', 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'}
null
npm
GHSA-mf7c-58q5-7v65
Downloads Resources over HTTP in npm-test-sqlite3-trunk
Affected versions of `npm-test-sqlite3-trunk` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `npm-test-sqlite3-trunk`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10695'}
2021-01-14T15:56:03Z
2020-09-01T16:15:28Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10695', 'https://www.npmjs.com/advisories/297', 'https://nodesecurity.io/advisories/297'}
null
npm
GHSA-pw54-mh39-w3hc
Regular expression denial of service in npm-user-validate
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
{'CVE-2020-7754'}
2021-04-20T17:21:44Z
2021-05-10T19:08:15Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352'}
null
npm
GHSA-h97g-4mx7-5p2p
Open Redirect in apostrophe
Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end. ## Recommendation Update to version 2.92.0 or later.
null
2021-09-28T21:18:57Z
2020-09-03T17:11:36Z
MODERATE
null
{'CWE-601'}
{'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7', 'https://github.com/apostrophecms/apostrophe', 'https://www.npmjs.com/advisories/1029', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089'}
null
npm
GHSA-5w4p-h4gm-3w26
Downloads Resources over HTTP in jser-stat
Affected versions of `jser-stat` insecurely downloads resources over HTTP. In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10592'}
2021-01-08T19:47:58Z
2019-02-18T23:50:53Z
MODERATE
null
{'CWE-311'}
{'https://github.com/advisories/GHSA-5w4p-h4gm-3w26', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10592', 'https://github.com/jser/stat-js/blob/master/data/url-mapping.js', 'https://nodesecurity.io/advisories/188', 'https://www.npmjs.com/advisories/188'}
null
npm
GHSA-rwv8-jvff-jq28
Path Traversal in public
Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user. ## Recommendation Update to version 0.1.3 or later.
{'CVE-2018-3731'}
2020-08-31T18:28:14Z
2018-07-18T21:20:30Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/571', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918'}
null
npm
GHSA-rgq8-25qc-h54q
Directory Traversal in myserver.alexcthomas18
Affected versions of `myserver.alexcthomas18` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16144'}
2020-08-31T18:24:19Z
2018-07-23T20:48:05Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/469', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16144', 'https://nodesecurity.io/advisories/469', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/myserver.alexcthomas18', 'https://github.com/advisories/GHSA-rgq8-25qc-h54q'}
null
npm
GHSA-52rh-5rpj-c3w6
Improper handling of multiline messages in node-irc
node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to the IRC server verbatim rather than as a message to the channel. The vulnerability has been patched in node-irc version 1.2.1.
null
2022-05-05T16:00:50Z
2022-05-05T16:00:50Z
HIGH
null
null
{'https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6', 'https://matrix.org/blog/2022/05/04/0-34-0-security-release-for-matrix-appservice-irc-high-severity', 'https://github.com/matrix-org/node-irc'}
null
npm
GHSA-7r5f-7qr4-pf6q
Sandbox Breakout / Arbitrary Code Execution in notevil
Versions of `notevil` prior to 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to prevent access to the `Function` constructor by not checking the return values of function calls. This allows attackers to access the Function prototype's constructor leading to the Sandbox Escape. An example payload is: ``` var safeEval = require('notevil') var input = "" + "function fn() {};" + "var constructorProperty = Object.getOwnPropertyDescriptors(fn.__proto__).constructor;" + "var properties = Object.values(constructorProperty);" + "properties.pop();" + "properties.pop();" + "properties.pop();" + "var Function = properties.pop();" + "(Function('return this'))()"; safeEval(input)``` ## Recommendation Upgrade to version 1.3.2 or later.
null
2020-08-31T18:47:00Z
2020-09-03T19:03:33Z
HIGH
null
null
{'https://www.npmjs.com/advisories/1093'}
null
npm
GHSA-7g2w-6r25-2j7p
Command Injection in libnmap
Versions of `libnmap` before 0.4.16 are vulnerable to command injection. Proof of concept ``` const nmap = require('libnmap'); const opts = { range: [ 'scanme.nmap.org', "x.x.$(touch success.txt)" ] }; nmap.scan(opts, function(err, report) { if (err) throw new Error(err); for (let item in report) { console.log(JSON.stringify(report[item])); } }); ``` ## Recommendation Update to version 0.4.16 or later
{'CVE-2018-16461'}
2020-08-31T18:33:16Z
2018-11-01T14:51:33Z
MODERATE
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16461', 'https://github.com/advisories/GHSA-7g2w-6r25-2j7p', 'https://hackerone.com/reports/390865', 'https://www.npmjs.com/advisories/719', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}
null
npm
GHSA-j4ch-mw66-xmqv
Malicious Package in pensi-scheduler
Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:47:31Z
2020-09-03T19:16:44Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/1107'}
null
npm
GHSA-p493-635q-r6gr
Remote code execution via the `pretty` option.
### Impact If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. ### Patches Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter. ### Workarounds If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade. ### References Original report: https://github.com/pugjs/pug/issues/3312 ### For more information If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md)
{'CVE-2021-21353'}
2021-03-03T01:49:22Z
2021-03-03T02:03:52Z
HIGH
null
{'CWE-74'}
{'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://www.npmjs.com/package/pug-code-gen', 'https://github.com/pugjs/pug/pull/3314', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/issues/3312'}
null
npm
GHSA-7jh9-6cpf-h4m7
XSS in hello.js
This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).
{'CVE-2020-7741'}
2021-01-13T19:06:37Z
2021-01-13T19:07:01Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741'}
null
npm
GHSA-4j46-mp85-mv8c
Path traversal in rollup-plugin-serve
Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation.
{'CVE-2020-7684'}
2021-05-18T01:51:52Z
2021-05-18T01:52:24Z
CRITICAL
null
{'CWE-22'}
{'https://vuldb.com/?id.158745', 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969', 'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7684'}
null
npm
GHSA-xxvw-45rp-3mj2
Deserialization Code Execution in js-yaml
Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer. ## Proof of Concept ``` const yaml = require('js-yaml'); const x = `test: !!js/function > function f() { console.log(1); }();` yaml.load(x); ``` ## Recommendation Update js-yaml to version 2.0.5 or later, and ensure that all instances where the `.load()` method is called are updated to use `.safeLoad()` instead.
{'CVE-2013-4660'}
2021-09-22T18:27:56Z
2017-10-24T18:33:37Z
CRITICAL
null
{'CWE-20'}
{'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/', 'http://portal.nodesecurity.io/advisories/js-yaml', 'https://www.npmjs.com/advisories/16', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660', 'https://github.com/advisories/GHSA-xxvw-45rp-3mj2'}
null
npm
GHSA-qc65-cgvr-93p6
Code injection in kill-process-by-name
This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.
{'CVE-2021-23356'}
2021-03-25T00:17:45Z
2021-03-19T21:19:18Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23356', 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534'}
null
npm
GHSA-7qmm-q394-fmch
Command Injection in ps-kill
This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)',function(){});
{'CVE-2021-23355'}
2021-03-25T00:17:34Z
2021-03-19T21:19:29Z
CRITICAL
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23355', 'https://snyk.io/vuln/SNYK-JS-PSKILL-1078529'}
null
npm
GHSA-2mp5-m968-gwr2
Path Traversal in http-file-server
All versions of `http-file-server` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
{'CVE-2019-5447'}
2020-08-31T18:46:30Z
2019-07-16T00:41:34Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5447', 'https://www.npmjs.com/advisories/1077', 'https://hackerone.com/reports/570133'}
null
npm
GHSA-2m96-9w4j-wgv7
Prototype Pollution in lodash.merge
Versions of `lodash.merge` before 4.6.1 are vulnerable to Prototype Pollution. The function 'merge' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects. ## Recommendation Update to version 4.6.1 or later.
null
2020-08-31T18:46:06Z
2020-09-03T18:06:00Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1067'}
null
npm
GHSA-2fwq-wx47-hm6x
Malicious Package in bcion
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:30:20Z
2020-09-04T15:31:39Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1352'}
null
npm
GHSA-wch2-46wj-6x5j
Malicious Package in bip30
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:38:52Z
2020-09-04T15:37:15Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1358'}
null
npm
GHSA-3cgg-gh9j-w8vm
Directory Traversal in iter-http
Affected versions of `iter-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16094'}
2020-08-31T18:20:01Z
2018-07-24T13:58:10Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/343', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16094', 'https://github.com/advisories/GHSA-3cgg-gh9j-w8vm', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-http', 'https://www.npmjs.com/advisories/343'}
null
npm
GHSA-hjhr-r3gq-qvp6
Timing Attack in csrf-lite
Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison. Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences. Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present. ## Recommendation Update to version 0.1.2 or later.
{'CVE-2016-10535'}
2020-08-31T18:10:37Z
2019-02-18T23:39:44Z
HIGH
null
{'CWE-208'}
{'https://nodesecurity.io/advisories/94', 'https://github.com/advisories/GHSA-hjhr-r3gq-qvp6', 'https://github.com/isaacs/csrf-lite/pull/1', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10535', 'https://www.npmjs.com/advisories/94'}
null
npm
GHSA-2j2j-8rrv-264g
Cross-Site Scripting in exceljs
Versions of `exceljs` before 1.6.0 are vulnerable to cross-site scripting. This vulnerability is due to `exceljs` does not validate data from parsed XLSX file and allows to embed HTML tags, like `<script>`, directly in the sheet cells. Because of this it's possible to inject malicious JavaScript code and execute it when data from the sheet were displayed in the browser. ## Recommendation Update to version 1.6.0 or later.
{'CVE-2018-16459'}
2020-08-31T18:33:49Z
2018-09-11T18:58:40Z
MODERATE
null
{'CWE-79'}
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/464.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16459', 'https://www.npmjs.com/advisories/733', 'https://hackerone.com/reports/356809', 'https://github.com/advisories/GHSA-2j2j-8rrv-264g'}
null
npm
GHSA-3pxp-6963-46r9
Command Injection in pdfinfojs
Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor. ## Recommendation Update to version 0.4.1 or later.
{'CVE-2018-3746'}
2020-08-31T18:31:03Z
2018-06-07T19:43:00Z
HIGH
null
{'CWE-77'}
{'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd', 'https://hackerone.com/reports/330957', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746', 'https://www.npmjs.com/advisories/643', 'https://github.com/advisories/GHSA-3pxp-6963-46r9'}
null
npm
GHSA-vrc7-6g8w-jh56
Improper Input Validation in xdLocalStorage
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
{'CVE-2015-9544'}
2022-03-11T22:59:06Z
2021-12-09T19:29:36Z
HIGH
null
{'CWE-20'}
{'https://github.com/ofirdagan/cross-domain-local-storage/issues/17', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9544', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}
null
npm
GHSA-6866-x7cf-rmh5
Directory Traversal in sencisho
Affected versions of `sencisho` are vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16092'}
2020-08-31T18:19:54Z
2018-07-24T13:50:01Z
HIGH
null
{'CWE-22'}
{'https://nodesecurity.io/advisories/340', 'https://www.npmjs.com/advisories/340', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16092', 'https://github.com/advisories/GHSA-6866-x7cf-rmh5', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho'}
null
npm
GHSA-rch9-xh7r-mqgw
Cross-Site Scripting in simple-server
Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server. ## Recommendation Update to version 1.1.0 or later.
{'CVE-2018-3717'}
2020-08-31T18:29:12Z
2018-07-26T15:08:05Z
HIGH
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/595', 'https://hackerone.com/reports/309641', 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448', 'https://github.com/advisories/GHSA-rch9-xh7r-mqgw', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717', 'https://www.npmjs.com/advisories/584', 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://hackerone.com/reports/309394'}
null
npm
GHSA-jfcc-rm7f-xgf8
Cross-Site Scripting in mavon-editor
All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2021-09-29T18:37:46Z
2020-09-03T20:36:35Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hinesboy/mavonEditor/issues/472', 'https://www.npmjs.com/advisories/1169', 'https://www.npmjs.com/package/mavon-editor', 'https://github.com/hinesboy/mavonEditor', 'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108', 'https://github.com/hinesboy/mavonEditor/pull/548'}
null
npm
GHSA-9chw-xrwx-f86j
Downloads Resources over HTTP in frames-compiler
Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`. ## Recommendation No patch is currently available for this vulnerability. The best mitigation is currently to avoid using this package, using a different package if available. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10649'}
2021-01-14T15:57:35Z
2020-09-01T16:07:53Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10649', 'https://www.npmjs.com/advisories/247', 'https://nodesecurity.io/advisories/247'}
null
npm
GHSA-hj5w-xgw9-w4rj
Malicious Package in coinstrng
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-10-01T20:58:49Z
2020-09-03T19:41:44Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1385'}
null
npm
GHSA-7fw7-gh23-f832
Vulnerability in singleCrunch function leads to arbitrary code execution via filePath parameters
aaptjs is a node wraper for aapt. An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
{'CVE-2020-36381'}
2022-05-04T03:47:21Z
2021-11-01T19:19:29Z
CRITICAL
null
{'CWE-77', 'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36381', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/shenzhim/aaptjs'}
null
npm
GHSA-cxcf-78mr-wpg7
Malicious Package in oauth-validator
Version 1.0.2 of `oauth-validator` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:30:37Z
2020-09-01T20:29:59Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/632'}
null
npm
GHSA-hx5x-49mm-vmhw
SQL Injection in sails-mysql
Versions of `sails-mysql` prior to 0.10.8 are vulnerable to SQL Injection. The `sort` keyword is not properly sanitized and may allow attackers to inject SQL statements and execute arbitrary SQL queries ## Recommendation Upgrade to version 0.10.8 or later.
null
2021-09-27T22:39:39Z
2020-09-03T02:36:43Z
HIGH
null
{'CWE-89'}
{'https://github.com/balderdashy/sails', 'https://snyk.io/vuln/SNYK-JS-SAILSMYSQL-174916', 'https://github.com/balderdashy/sails/issues/6679', 'https://www.npmjs.com/advisories/950'}
null
npm
GHSA-8j49-49jq-vwcq
Prototype Pollution in getsetdeep
All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects. ## Recommendation No fix is currently available. Consider using an alternative package until a fix is made available.
null
2020-08-31T18:55:30Z
2020-09-04T15:15:34Z
HIGH
null
{'CWE-1321'}
{'https://www.npmjs.com/advisories/1334'}
null
npm
GHSA-6f34-pq9f-36vf
Hijacked Environment Variables in sqlite.js
The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{'CVE-2017-16050'}
2020-08-31T18:25:11Z
2018-07-23T20:50:29Z
MODERATE
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/491', 'https://github.com/advisories/GHSA-6f34-pq9f-36vf', 'https://nodesecurity.io/advisories/491', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050'}
null
npm
GHSA-3fjq-93xj-3f3f
Cross-Site Scripting in serialize-to-js
Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. ## Recommendation Upgrade to version 3.0.1 or later.
{'CVE-2019-16772'}
2021-01-08T20:02:20Z
2019-12-06T23:20:26Z
MODERATE
null
{'CWE-79'}
{'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://www.npmjs.com/advisories/1429', 'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}
null
npm
GHSA-r863-p739-275c
Malicious Package in reuest
All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T14:09:36Z
2020-09-11T21:09:24Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/866'}
null
npm
GHSA-5w4r-wwc3-6qcp
Malicious Package in precode.js
Version 1.1.1 of `precode.js` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
null
2020-08-31T18:41:20Z
2020-09-11T21:23:29Z
CRITICAL
null
null
{'https://www.npmjs.com/advisories/941'}
null
npm
GHSA-wm77-q74p-5763
Path Traversal in superstatic
Affected of `superstatic` are vulnerable to path traversal when used on Windows. Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0). ## Recommendation Update to version 5.0.2 or later.
null
2021-08-09T22:21:02Z
2018-07-27T17:06:03Z
HIGH
null
{'CWE-177'}
{'https://github.com/firebase/superstatic/pull/255', 'https://www.npmjs.com/advisories/652', 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}
null
npm
GHSA-753c-phhg-cj29
Improper Neutralization of Special Elements used in a Command
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.
{'CVE-2021-23352'}
2021-03-12T21:10:53Z
2021-03-12T23:01:49Z
HIGH
null
{'CWE-77', 'CWE-89'}
{'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}
null
npm
GHSA-f522-ffg8-j8r6
Regular Expression Denial of Service in is-my-json-valid
Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function. ## Recommendation Update to version 1.4.1, 2.17.2 or later.
{'CVE-2016-2537'}
2021-09-09T21:38:37Z
2017-10-24T18:33:35Z
HIGH
null
{'CWE-20'}
{'https://github.com/mafintosh/is-my-json-valid', 'https://www.npmjs.com/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://www.npmjs.com/advisories/572', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://hackerone.com/reports/317548', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://nodesecurity.io/advisories/76'}
null
npm
GHSA-v8w9-2789-6hhr
Deserialization of Untrusted Data in bson
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
{'CVE-2020-7610'}
2021-05-06T23:40:10Z
2021-05-07T16:04:54Z
HIGH
null
{'CWE-502'}
{'https://snyk.io/vuln/SNYK-JS-BSON-561052', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7610'}
null
npm
GHSA-qr28-7j6p-9hmv
Content Injection via TileJSON attribute in mapbox.js
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios. If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js. ## Recommendation Version 2.x: Update to version 2.1.7 or later. Version 1.x: Update to version 1.6.5 or later.
{'CVE-2017-1000042'}
2021-09-16T21:03:23Z
2018-11-09T17:47:45Z
MODERATE
null
{'CWE-79'}
{'https://www.npmjs.com/advisories/49', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042', 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv', 'https://hackerone.com/reports/54327', 'https://nodesecurity.io/advisories/49'}
null
npm
GHSA-q43c-g2g7-6gxj
Cross-Site Request Forgery (CSRF) in keystone
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints. ## Recommendation Update to version 4.0.0 or later.
{'CVE-2017-16570'}
2021-06-10T21:18:39Z
2017-11-30T23:14:47Z
HIGH
null
{'CWE-352'}
{'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://www.npmjs.com/advisories/979', 'https://www.exploit-db.com/exploits/43922/', 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/keystonejs/keystone/issues/4437', 'https://github.com/keystonejs/keystone/pull/4478'}
null
npm
GHSA-pch5-whg9-qr2r
netmask npm package vulnerable to octal input data
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
{'CVE-2021-29418'}
2021-06-09T23:10:53Z
2021-03-29T21:32:05Z
MODERATE
null
{'CWE-20'}
{'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418', 'https://sick.codes/sick-2021-011', 'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4', 'https://vuln.ryotak.me/advisories/6', 'https://www.npmjs.com/package/netmask'}
null
npm
GHSA-6w83-22gj-5pv9
Directory Traversal in cyber-js
Affected versions of `cyber-js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
{'CVE-2017-16093'}
2020-08-31T18:20:10Z
2018-07-27T14:06:00Z
HIGH
null
{'CWE-22'}
{'https://github.com/advisories/GHSA-6w83-22gj-5pv9', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js', 'https://nodesecurity.io/advisories/347', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16093', 'https://www.npmjs.com/advisories/347'}
null
npm
GHSA-h73q-5wmj-q8pj
Cross site scripting in datatables.net
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
{'CVE-2021-23445'}
2021-10-13T17:26:00Z
2021-09-29T17:11:28Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544', 'https://github.com/DataTables/Dist-DataTables', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371', 'https://cdn.datatables.net/1.11.3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376'}
null
npm
GHSA-mhp6-pxh8-r675
Cross site scripting in Angular
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
{'CVE-2020-7676'}
2021-09-22T18:31:00Z
2020-06-18T14:19:58Z
MODERATE
null
{'CWE-79'}
{'https://github.com/angular/angular.js', 'https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E', 'https://github.com/angular/angular.js/pull/17028,', 'https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://github.com/angular/angular.js/pull/17028', 'https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7676', 'https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E'}
null
npm
GHSA-cq6w-w5rj-p9x8
Cross-site Scripting in Froala Editor
Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
{'CVE-2021-30109'}
2021-10-06T16:55:25Z
2021-10-06T17:47:05Z
MODERATE
null
{'CWE-79'}
{'http://froala.com', 'https://github.com/froala/wysiwyg-editor-release', 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109'}
null
npm
GHSA-3h9m-9g3g-5wqx
Malicious Package in buffer-xov
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-09-29T21:13:02Z
2020-09-03T22:13:14Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1252'}
null
npm
GHSA-qqxp-xp9v-vvx6
Moderate severity vulnerability that affects jquery-ui
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
{'CVE-2012-6662'}
2021-09-16T20:04:38Z
2017-10-24T18:33:37Z
MODERATE
null
{'CWE-79'}
{'http://bugs.jqueryui.com/ticket/8859', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'http://www.securityfocus.com/bid/71107', 'https://github.com/jquery/jquery', 'http://bugs.jqueryui.com/ticket/8861', 'http://seclists.org/oss-sec/2014/q4/613', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697', 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery/issues/2432', 'http://seclists.org/oss-sec/2014/q4/616'}
null
npm
GHSA-4hv7-3q38-97m8
Arbitrary code execution in djv
This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.
{'CVE-2020-28464'}
2021-04-06T23:35:22Z
2021-04-13T15:24:47Z
CRITICAL
null
{'CWE-94'}
{'https://snyk.io/vuln/SNYK-JS-DJV-1014545', 'https://github.com/korzio/djv/pull/98/files', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464', 'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55'}
null
npm
GHSA-fvcj-hvfw-7f2v
Improper Authentication
### Impact A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot. ### Patches The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case. ### Workarounds Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if the Claims are Skill Claims. For detailed instructions, see the link in the References section. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet) * Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
{'CVE-2021-1725'}
2021-03-08T15:47:09Z
2021-03-08T15:49:53Z
HIGH
null
{'CWE-287'}
{'https://aka.ms/SkillClaimsValidationJavascript', 'https://github.com/microsoft/botbuilder-js/security/advisories/GHSA-fvcj-hvfw-7f2v', 'https://www.npmjs.com/package/botframework-connector'}
null
npm
GHSA-3c87-r9f7-qfgq
Downloads Resources over HTTP in macaca-chromedriver-zxa
Affected versions of `macaca-chromedriver-zxa` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver-zxa`. ## Recommendation The best mitigation is to manually set the download URL to a safe HTTPS server via the `CHROMEDRIVER_CDNURL` environment variable. Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
{'CVE-2016-10623'}
2021-01-08T20:02:32Z
2019-02-18T23:56:56Z
HIGH
null
{'CWE-311'}
{'https://www.npmjs.com/advisories/221', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10623', 'https://nodesecurity.io/advisories/221', 'https://github.com/advisories/GHSA-3c87-r9f7-qfgq'}
null
npm
GHSA-rm7c-x424-g2mw
Malicious Package in asyync
All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise. ## Recommendation Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
null
2021-10-01T13:47:19Z
2020-09-02T18:36:31Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/843'}
null
npm
GHSA-j4vm-hg8g-g9qv
Malicious Package in antd-cloud
All versions of `antd-cloud` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it. ## Recommendation Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
null
2021-09-30T18:39:55Z
2020-09-03T17:33:50Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1049'}
null
npm
GHSA-h6m3-cx24-9626
Malicious Package in js-sla3
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user. ## Recommendation Remove the package from your environment. Ensure no Ethereum funds were compromised.
null
2021-10-01T14:15:57Z
2020-09-03T23:11:45Z
CRITICAL
null
{'CWE-506'}
{'https://www.npmjs.com/advisories/1292'}
null
npm
GHSA-g452-6rfc-vrvx
Prototype Pollution in open-graph
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
{'CVE-2021-23419'}
2021-08-30T21:26:46Z
2021-09-01T18:31:53Z
MODERATE
null
{'CWE-915'}
{'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419', 'https://github.com/samholmes/node-open-graph', 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'}
null
npm
GHSA-4j6x-w426-6rc6
Default Express middleware security check is ignored in production
## Default Express middleware security check is ignored in production ### Impact All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected. ### Patches @cubejs-backend/api-gateway@0.11.17 ### Workarounds Override default authentication express middleware: https://cube.dev/docs/@cubejs-backend-server-core#options-reference-check-auth-middleware ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/cube-js/cube.js/issues * Reach out us in community Slack: https://slack.cube.dev/
null
2020-06-16T20:58:26Z
2019-11-08T17:31:17Z
HIGH
null
null
{'https://github.com/cube-js/cube.js/security/advisories/GHSA-4j6x-w426-6rc6', 'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}
null
npm
GHSA-g376-whg7-896m
Directory Traversal in yjmyjmyjm
Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. Example request: ``` GET /../../../../../../../../../../etc/passwd HTTP/1.1 host:foo ``` ## Recommendation No patch is available for this vulnerability. It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
null
2020-08-31T18:23:39Z
2020-09-01T18:45:53Z
HIGH
null
{'CWE-22'}
{'https://www.npmjs.com/advisories/451', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm'}
null
npm
GHSA-g78f-549w-c354
Prototype Pollution in multi-ini
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
{'CVE-2020-28448'}
2021-04-07T23:21:37Z
2021-04-13T15:23:59Z
CRITICAL
null
{'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28448', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969', 'https://github.com/evangelion1204/multi-ini/pull/37'}
null
npm
GHSA-5xgh-643p-cp2g
Moderate severity vulnerability that affects yapi-vendor
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
{'CVE-2018-17574'}
2021-09-01T22:22:29Z
2018-11-21T22:19:59Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17574', 'https://github.com/YMFE/yapi', 'https://github.com/YMFE/yapi/issues/520', 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}
null