ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-5h9g-x5rv-25wg
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in the schema validation logic of the core parser. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor using the clipboard or editor APIs. This malicious content could then end up in content published outside the editor, if no server-side sanitization was performed. This impacts all users who are using TinyMCE 5.8.2 or lower.
### Patches
This vulnerability has been patched in TinyMCE 5.9.0 by ensuring schema validation was still performed after unwrapping invalid elements.
### Workarounds
To work around this vulnerability, either:
- Upgrade to TinyMCE 5.9.0 or higher
- Manually sanitize the content using the `BeforeSetContent` event (see below)
#### Example: Manually sanitize content
```js
editor.on('BeforeSetContent', function(e) {
var sanitizedContent = ...; // Manually sanitize content here
e.content = sanitizedContent;
});
```
### Acknowledgements
Tiny Technologies would like to thank William Bowling for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
| null |
2022-03-03T05:13:16.708960Z
|
2021-10-22T16:24:02Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce/security/advisories/GHSA-5h9g-x5rv-25wg', 'https://www.tiny.cloud/docs/release-notes/release-notes59/#securityfixes', 'https://github.com/tinymce/tinymce'}
| null |
npm
|
GHSA-whq6-mj2r-mjqc
|
OS Command Injection in lsof
|
All versions including 0.0.4 of lsof npm module are vulnerable to Command Injection. Every exported method used by the package uses the exec function to parse user input.
|
{'CVE-2019-10783'}
|
2021-03-29T22:11:57Z
|
2021-04-13T15:17:53Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://snyk.io/vuln/SNYK-JS-LSOF-543632', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10783'}
| null |
npm
|
GHSA-4m8h-h59m-m34j
|
Prototype Pollution in bmoor
|
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
|
{'CVE-2021-23558'}
|
2022-02-07T21:21:00Z
|
2022-02-01T00:50:09Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23558', 'https://snyk.io/vuln/SNYK-JS-BMOOR-2342622', 'https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664', 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b', 'https://github.com/b-heilman/bmoor/', 'https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation/'}
| null |
npm
|
GHSA-9829-jj5p-j6hf
|
Prototype Pollution in worksmith
|
All versions up to and including 1.0.0 of the package worksmith are vulnerable to Prototype Pollution via the setValue function.
|
{'CVE-2020-7725'}
|
2021-05-05T17:39:52Z
|
2021-05-06T18:26:30Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-WORKSMITH-598798', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7725'}
| null |
npm
|
GHSA-428f-mh7w-6w2x
|
Infecting Module in pandora-doomsday
|
The `pandora-doomsday` package is a malicious package that adds itself to the package.json of other packages discovered on the victim host and attempts to publish the package.
It has been removed from the npm registry.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
|
{'CVE-2017-16127'}
|
2020-08-31T18:24:50Z
|
2020-09-01T18:56:40Z
|
MODERATE
| null |
{'CWE-509'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16127', 'https://www.npmjs.com/advisories/482', 'https://nodesecurity.io/advisories/482'}
| null |
npm
|
GHSA-wmx6-vxcf-c3gr
|
Validation Bypass in slp-validate
|
Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus.
## Recommendation
Upgrade to version 1.0.1 or later.
|
{'CVE-2019-16761'}
|
2021-01-08T20:11:31Z
|
2019-11-15T23:10:19Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr', 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123', 'https://www.npmjs.com/advisories/1422', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761', 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr'}
| null |
npm
|
GHSA-6cj2-92m5-7mvp
|
Improperly Controlled Modification of Object Prototype Attributes
|
### Impact
The software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
### Patches
`think-config@1.1.3` patched it, anyone used `think-config` should upgrade to `>=1.1.3` version.
### References
https://cwe.mitre.org/data/definitions/1321.html
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [thinkjs/thinkjs](https://github.com/thinkjs/thinkjs)
* Email us at [i@imnerd.org](mailto:i@imnerd.org)
| null |
2021-10-08T21:20:09Z
|
2021-08-03T16:48:46Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/thinkjs/think-config/', 'https://github.com/thinkjs/think-config/security/advisories/GHSA-6cj2-92m5-7mvp'}
| null |
npm
|
GHSA-9pr3-7449-977r
|
Cross-Site Scripting in express-cart
|
All versions of `harp` are vulnerable to Cross-Site Scripting. In the admin page it is possible to inject arbitrary JavaScript as a new product option, allowing attackers to execute arbitrary code. This is limited to the admin page and does not affect other pages.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:36:31Z
|
2020-09-02T18:21:26Z
|
LOW
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/808', 'https://hackerone.com/reports/395944'}
| null |
npm
|
GHSA-77jf-fjjf-xcww
|
Invalid Curve Attack in openpgp
|
Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key.
## Recommendation
Upgrade to version 4.3.0 or later.
If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0
|
{'CVE-2019-9155'}
|
2021-07-27T21:15:18Z
|
2019-08-23T21:42:22Z
|
MODERATE
| null |
{'CWE-327'}
|
{'https://www.npmjs.com/advisories/1159', 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225', 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html', 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0', 'https://github.com/openpgpjs/openpgpjs/pull/853', 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e', 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/', 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'}
| null |
npm
|
GHSA-v8v8-6859-qxm4
|
Arbitrary shell command execution in logkitty
|
Lack of output sanitization allowed an attack to execute arbitrary shell commands via the logkitty npm package before version 0.7.1.
|
{'CVE-2020-8149'}
|
2020-06-04T19:33:24Z
|
2020-06-05T14:47:02Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://hackerone.com/reports/825729', 'https://github.com/zamotany/logkitty/pull/18', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8149', 'https://github.com/zamotany/logkitty/commit/ef2f673e25c629544dd3de6429999318447dd6bf'}
| null |
npm
|
GHSA-jjhg-qw5v-r8xx
|
Malicious Package in anarchy
|
All versions of `anarchy` contain malicious code. The package ran `rm - rf /` as an install script.
## Recommendation
Remove the package from your environment.
| null |
2021-09-30T20:06:04Z
|
2020-09-03T19:01:20Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1089'}
| null |
npm
|
GHSA-74cr-77xc-8g6r
|
Prototype Pollution in @apollo/gateway
|
Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution.
## Recommendation
Upgrade to version 0.6.2 or later.
| null |
2021-08-16T15:28:22Z
|
2019-06-13T20:37:39Z
|
HIGH
| null |
{'CWE-400', 'CWE-1321'}
|
{'https://www.npmjs.com/advisories/917', 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1', 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915', 'https://github.com/apollographql/apollo-server/pull/2779'}
| null |
npm
|
GHSA-wpfc-3w63-g4hm
|
Malicious Package in axois
|
All versions of `axois` are considered malicious. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When executed, the package calls home to a Command and Control server to execute arbitrary commands.
## Recommendation
This package was published to the npm Registry for a very short period of time. If you happen to find it in your environment you should revoke and rotate all credentials found on the compromised machine, as well as completely erase the affected machine and reinstall your Operating System.
| null |
2021-10-01T13:28:35Z
|
2020-09-01T21:09:48Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/683'}
| null |
npm
|
GHSA-gf7h-vg5v-cch6
|
Directory Traversal in ritp
|
Affected versions of `ritp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16198'}
|
2021-09-10T20:50:55Z
|
2018-08-06T20:03:21Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/432', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16198', 'https://github.com/JacksonGL/NPM-Vuln-PoC', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ritp', 'https://github.com/advisories/GHSA-gf7h-vg5v-cch6', 'https://nodesecurity.io/advisories/432'}
| null |
npm
|
GHSA-x2mc-8fgj-3wmr
|
Improper Input Validation in tar-fs
|
A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.
|
{'CVE-2018-20835'}
|
2021-08-03T21:27:51Z
|
2019-05-01T18:37:18Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://hackerone.com/reports/344595', 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2', 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'}
| null |
npm
|
GHSA-w46j-8hm6-h8mm
|
XSS in apexcharts
|
The package apexcharts before 3.24.0 are vulnerable to Cross-site Scripting (XSS) via lack of sanitization of graph legend fields.
|
{'CVE-2021-23327'}
|
2021-02-10T18:18:38Z
|
2021-02-11T20:47:34Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1070616', 'https://snyk.io/vuln/SNYK-JS-APEXCHARTS-1062708', 'https://github.com/apexcharts/apexcharts.js/pull/2158', 'https://github.com/apexcharts/apexcharts.js/commit/68f3f34d125719b4767614fe0a595cc65bde1d19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23327', 'https://www.npmjs.com/package/apexcharts'}
| null |
npm
|
GHSA-hjcp-j389-59ff
|
Regular Expression Denial of Service in marked
|
Versions 0.3.3 and earlier of `marked` are affected by a regular expression denial of service ( ReDoS ) vulnerability when passed inputs that reach the `em` inline rule.
## Recommendation
Update to version 0.3.4 or later.
|
{'CVE-2015-8854'}
|
2021-09-14T17:23:54Z
|
2017-10-24T18:33:36Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/23', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/', 'https://nodesecurity.io/advisories/23', 'https://support.f5.com/csp/article/K05052081?utm_source=f5support&utm_medium=RSS', 'https://github.com/chjj/marked/issues/497', 'http://www.openwall.com/lists/oss-security/2016/04/20/11', 'https://github.com/chjj/marked', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/', 'https://github.com/advisories/GHSA-hjcp-j389-59ff', 'https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS', 'https://nvd.nist.gov/vuln/detail/CVE-2015-8854'}
| null |
npm
|
GHSA-38fc-wpqx-33j7
|
Uncontrolled Resource Consumption in trim-off-newlines
|
All versions of package trim-off-newlines are vulnerable to Regular Expression Denial of Service (ReDoS) via string processing.
|
{'CVE-2021-23425'}
|
2021-08-26T14:52:19Z
|
2021-09-02T17:15:42Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23425', 'https://github.com/stevemao/trim-off-newlines/blob/master/index.js%23L6', 'https://github.com/stevemao/trim-off-newlines', 'https://github.com/stevemao/trim-off-newlines/pull/3', 'https://snyk.io/vuln/SNYK-JS-TRIMOFFNEWLINES-1296850', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1567197'}
| null |
npm
|
GHSA-gqgv-6jq5-jjj9
|
Prototype Pollution Protection Bypass in qs
|
Affected version of `qs` are vulnerable to Prototype Pollution because it is possible to bypass the protection. The `qs.parse` function fails to properly prevent an object's prototype to be altered when parsing arbitrary input. Input containing `[` or `]` may bypass the prototype pollution protection and alter the Object prototype. This allows attackers to override properties that will exist in all objects, which may lead to Denial of Service or Remote Code Execution in specific circumstances.
## Recommendation
Upgrade to 6.0.4, 6.1.2, 6.2.3, 6.3.2 or later.
|
{'CVE-2017-1000048'}
|
2021-08-25T21:03:56Z
|
2020-04-30T17:16:47Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000048', 'https://www.npmjs.com/advisories/1469', 'https://snyk.io/vuln/npm:qs:20170213', 'https://github.com/ljharb/qs', 'https://github.com/ljharb/qs/commit/beade029171b8cef9cee0d03ebe577e2dd84976d', 'https://access.redhat.com/errata/RHSA-2017:2672', 'https://github.com/ljharb/qs/issues/200'}
| null |
npm
|
GHSA-7wgh-5q4q-6wx5
|
Malicious Package in 1337qq-js
|
All versions of `1337qq-js` contain malicious code. The package exfiltrates sensitive information through install scripts. It targets UNIX systems. The information exfiltrated includes:
- Environment variables
- Running processes
- /etc/hosts
- uname -a
- npmrc file
## Recommendation
Remove the package from your system and rotate any compromised credentials.
| null |
2020-08-31T18:59:53Z
|
2020-09-04T17:30:39Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1455'}
| null |
npm
|
GHSA-66ww-999q-mffq
|
Arbitrary code execution in post-loader
|
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround or patch available.
|
{'CVE-2022-0748'}
|
2022-03-25T14:29:33Z
|
2022-03-18T00:01:11Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0748', 'https://github.com/egoist/post-loader', 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737'}
| null |
npm
|
GHSA-hf55-c445-2w97
|
Cross-site Scripting in @rocket.chat/livechat
|
A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance.
|
{'CVE-2022-21830'}
|
2022-04-15T16:57:07Z
|
2022-04-03T00:01:00Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/1091118', 'https://github.com/RocketChat/Rocket.Chat.Livechat', 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21830', 'https://github.com/RocketChat/Rocket.Chat.Livechat/releases/tag/v1.9.0'}
| null |
npm
|
GHSA-v39p-96qg-c8rf
|
Prototype Pollution in object-path
|
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
|
{'CVE-2021-23434'}
|
2021-08-30T18:16:08Z
|
2021-09-01T18:37:11Z
|
MODERATE
| null |
{'CWE-843', 'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23434', 'https://github.com/mariocasciaro/object-path#0116', 'https://github.com/mariocasciaro/object-path/commit/7bdf4abefd102d16c163d633e8994ef154cab9eb', 'https://github.com/mariocasciaro/object-path%230116', 'https://snyk.io/vuln/SNYK-JS-OBJECTPATH-1569453', 'https://github.com/mariocasciaro/object-path', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1570423'}
| null |
npm
|
GHSA-gg6m-fhqv-hg56
|
Denial of Service in yar
|
Versions of `yar` prior to 2.2.0 are affected by a denial of service vulnerability related to an invalid encrypted session cookie value.
When an invalid encryped session cookie value is provided, the process will crash.
## Recommendation
Update to version 2.2.0 or later.
|
{'CVE-2014-4179'}
|
2021-09-23T21:04:51Z
|
2020-09-01T15:15:36Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2014-4179', 'https://github.com/spumko/yar/', 'https://www.npmjs.com/advisories/44', 'https://github.com/spumko/yar/issues/34'}
| null |
npm
|
GHSA-8h8v-6qqm-fwpq
|
Path Traversal in express-cart
|
Versions of `express-cart` before 1.1.7 are vulnerable to Path Traversal.
## Recommendation
Update to version 1.1.7 or later.
| null |
2020-08-31T18:32:22Z
|
2020-09-01T21:06:38Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/676', 'https://hackerone.com/reports/343726'}
| null |
npm
|
GHSA-jp46-fw6c-3pm9
|
Directory Traversal in scott-blanch-weather-app
|
Affected versions of `scott-blanch-weather-app` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16184'}
|
2020-08-31T18:23:44Z
|
2020-09-01T18:46:58Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/453', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/scott-blanch-weather-app', 'https://www.npmjs.com/advisories/453', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16184'}
| null |
npm
|
GHSA-76wf-2xcf-6wmx
|
Malicious Package in ngx-pica
|
Version 1.1.5 of `ngx-pica` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:36Z
|
2020-09-03T00:31:28Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/948'}
| null |
npm
|
GHSA-rvcw-f68w-8h8h
|
Padding Oracle Attack due to Observable Timing Discrepancy in jose-node-cjs-runtime
|
### Impact
[AES_CBC_HMAC_SHA2 Algorithm](https://tools.ietf.org/html/rfc7518#section-5.2) (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDecryptionFailed` would be thrown. But a possibly observable difference in timing when padding error would occur while decrypting the ciphertext makes a padding oracle and an adversary might be able to make use of that oracle to decrypt data without knowing the decryption key by issuing on average 128*b calls to the padding oracle (where b is the number of bytes in the ciphertext block).
### Patches
A patch was released which ensures the HMAC tag is verified before performing CBC decryption. The fixed versions are `>=3.11.4`.
Users should upgrade to `^3.11.4`.
### Credits
Thanks to Morgan Brown of Microsoft for bringing this up and Eva Sarafianou (@esarafianou) for helping to score this advisory.
|
{'CVE-2021-29446'}
|
2021-04-16T22:57:33Z
|
2021-04-19T15:00:05Z
|
MODERATE
| null |
{'CWE-696', 'CWE-203', 'CWE-208'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29446', 'https://github.com/panva/jose/security/advisories/GHSA-rvcw-f68w-8h8h', 'https://www.npmjs.com/package/jose-node-cjs-runtime'}
| null |
npm
|
GHSA-qv2v-m59f-v5fw
|
Insecure randomness in socket.io
|
Affected versions of `socket.io` depend on `Math.random()` to create socket IDs, and therefore the IDs are predictable. With enough information on prior IDs, an attacker may be able to guess the socket ID and gain access to socket.io servers without authorization.
## Recommendation
Update to v0.9.7 or later.
|
{'CVE-2017-16031'}
|
2021-09-16T21:04:32Z
|
2018-11-07T00:29:37Z
|
HIGH
| null |
{'CWE-330'}
|
{'https://github.com/socketio/socket.io/issues/856', 'https://nodesecurity.io/advisories/321', 'https://github.com/socketio/socket.io', 'https://github.com/socketio/socket.io/pull/857', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16031', 'https://github.com/advisories/GHSA-qv2v-m59f-v5fw', 'https://www.npmjs.com/advisories/321', 'https://github.com/socketio/socket.io/commit/67b4eb9abdf111dfa9be4176d1709374a2b4ded8'}
| null |
npm
|
GHSA-pr49-5hhf-6mm6
|
Directory Traversal in serverabc
|
Affected versions of `serverabc` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16180'}
|
2020-08-31T18:23:55Z
|
2018-07-23T20:44:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/459', 'https://www.npmjs.com/advisories/459', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16180', 'https://github.com/advisories/GHSA-pr49-5hhf-6mm6', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/serverabc'}
| null |
npm
|
GHSA-9mr8-6prp-gwjv
|
SQL Injection in query-mysql
|
All versions of `query-mysql` are vulnerable to SQL injection due to lack of user input sanitization allows to run arbitrary SQL queries when fetching data from database.
## Recommendation
No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is passed into this module.
|
{'CVE-2018-3754'}
|
2021-09-08T20:06:59Z
|
2018-09-10T15:20:30Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/advisories/GHSA-9mr8-6prp-gwjv', 'https://www.npmjs.com/advisories/666', 'https://hackerone.com/reports/311244', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3754'}
| null |
npm
|
GHSA-6fvw-7vch-x489
|
Downloads Resources over HTTP in selenium-portal
|
Affected versions of `selenium-portal` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-portal`.
## Recommendation
No patch is currently available for this vulnerability, and the package has not seen an update since 2014.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10667'}
|
2021-01-08T19:44:43Z
|
2019-02-18T23:44:36Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-6fvw-7vch-x489', 'https://nodesecurity.io/advisories/260', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10667', 'https://www.npmjs.com/advisories/260'}
| null |
npm
|
GHSA-73qr-pfmq-6rp8
|
Embedded malware in coa
|
The npm package `coa` had versions published with malicious code. Users of affected versions (2.0.3 and above) should downgrade to 2.0.2 as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/veged/coa/issues/99) for details as they unfold.
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-11-04T18:48:35Z
|
2021-11-04T16:22:28Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://github.com/veged/coa/issues/99', 'https://www.virustotal.com/gui/file/26451f7f6fe297adf6738295b1dcc70f7678434ef21d8b6aad5ec00beb8a72cf?nocache=1', 'https://github.com/veged/coa'}
| null |
npm
|
GHSA-r4r9-mgjc-g6q3
|
Path Traversal in 626
|
All versions of `626` are vulnerable to path traversal. This enables a remote attacker to read arbitrary files from the remote server using this module.
## Recommendation
No fix is currently available for this vulnerability.
It is our recommendation to not install or use this module at this time.
|
{'CVE-2018-3727'}
|
2020-08-31T18:28:44Z
|
2020-09-01T19:06:15Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-3727', 'https://hackerone.com/reports/311216', 'https://www.npmjs.com/advisories/583'}
| null |
npm
|
GHSA-g9wf-393q-4w38
|
Malicious Package in only-test-not-install
|
All versions of `only-test-not-install` contain malicious code. The package deletes the folder `~/test` from the system as a postinstall script.
## Recommendation
Remove the package from your environment. There are no further signs of compromise.
| null |
2021-09-30T17:44:24Z
|
2020-09-03T17:28:26Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1044'}
| null |
npm
|
GHSA-vc9j-fhvv-8vrf
|
Remote Code Execution in scratch-vm
|
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented.
NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.
|
{'CVE-2020-14000'}
|
2021-09-22T21:24:07Z
|
2020-07-27T19:55:52Z
|
CRITICAL
| null |
{'CWE-502'}
|
{'https://github.com/LLK/scratch-vm/pull/2476', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14000', 'https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443', 'https://github.com/LLK/scratch-vm', 'https://github.com/LLK/scratch-vm/pull/2476/commits/90b9da45f4084958535338d1c4d71a22d6136aab'}
| null |
npm
|
GHSA-fj59-f6c3-3vw4
|
Command Injection in systeminformation
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.26.2
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to `is.services()`, `is.inetChecksite()`, `si.inetLatency()`, `si.networkStats()`, `is.services()` and `si.processLoad()`
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation)
|
{'CVE-2020-26300'}
|
2021-09-10T14:54:48Z
|
2020-10-27T20:40:00Z
|
MODERATE
| null |
{'CWE-78'}
|
{'https://github.com/sebhildebrandt/systeminformation', 'https://github.com/advisories/GHSA-fj59-f6c3-3vw4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26300', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-fj59-f6c3-3vw4', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/bad372e654cdd549e7d786acbba0035ded54c607'}
| null |
npm
|
GHSA-m8fw-534v-xm85
|
Cross-Site Scripting (XSS) in cloudcmd
|
Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable.
## Recommendation
Update to version 9.1.6 or later.
| null |
2020-08-31T18:31:00Z
|
2019-06-04T15:43:29Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/341044)', 'https://hackerone.com/reports/341044', 'https://www.npmjs.com/advisories/642', 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'}
| null |
npm
|
GHSA-mf7c-58q5-7v65
|
Downloads Resources over HTTP in npm-test-sqlite3-trunk
|
Affected versions of `npm-test-sqlite3-trunk` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `npm-test-sqlite3-trunk`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10695'}
|
2021-01-14T15:56:03Z
|
2020-09-01T16:15:28Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10695', 'https://www.npmjs.com/advisories/297', 'https://nodesecurity.io/advisories/297'}
| null |
npm
|
GHSA-pw54-mh39-w3hc
|
Regular expression denial of service in npm-user-validate
|
This affects the package npm-user-validate before 1.0.1. The regex that validates user emails took exponentially longer to process long input strings beginning with @ characters.
|
{'CVE-2020-7754'}
|
2021-04-20T17:21:44Z
|
2021-05-10T19:08:15Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7754', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1019353', 'https://github.com/npm/npm-user-validate/commit/c8a87dac1a4cc6988b5418f30411a8669bef204e', 'https://github.com/npm/npm-user-validate/security/advisories/GHSA-xgh6-85xh-479p', 'https://snyk.io/vuln/SNYK-JS-NPMUSERVALIDATE-1019352'}
| null |
npm
|
GHSA-h97g-4mx7-5p2p
|
Open Redirect in apostrophe
|
Versions of `apostrophe` prior to 2.92.0 are vulnerable to Open Redirect. The package redirected requests to third-party websites if escaped URLs followed by a trailing `/` were appended at the end.
## Recommendation
Update to version 2.92.0 or later.
| null |
2021-09-28T21:18:57Z
|
2020-09-03T17:11:36Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/apostrophecms/apostrophe/commit/1eba144bb82bd43dab72ce36cfbd593361b6d9b7', 'https://github.com/apostrophecms/apostrophe', 'https://www.npmjs.com/advisories/1029', 'https://snyk.io/vuln/SNYK-JS-APOSTROPHE-451089'}
| null |
npm
|
GHSA-5w4p-h4gm-3w26
|
Downloads Resources over HTTP in jser-stat
|
Affected versions of `jser-stat` insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10592'}
|
2021-01-08T19:47:58Z
|
2019-02-18T23:50:53Z
|
MODERATE
| null |
{'CWE-311'}
|
{'https://github.com/advisories/GHSA-5w4p-h4gm-3w26', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10592', 'https://github.com/jser/stat-js/blob/master/data/url-mapping.js', 'https://nodesecurity.io/advisories/188', 'https://www.npmjs.com/advisories/188'}
| null |
npm
|
GHSA-rwv8-jvff-jq28
|
Path Traversal in public
|
Versions of `public` before 0.1.3 are vulnerable to path traversal. This is due to lack of file path sanitization which could lead to any file the parent process has access to on the server to be read by malicious user.
## Recommendation
Update to version 0.1.3 or later.
|
{'CVE-2018-3731'}
|
2020-08-31T18:28:14Z
|
2018-07-18T21:20:30Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/571', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3731', 'https://github.com/advisories/GHSA-rwv8-jvff-jq28', 'https://github.com/tnantoka/public/commit/eae8ad8017b260f8667ded5e12801bd72b877af2', 'https://hackerone.com/reports/312918'}
| null |
npm
|
GHSA-rgq8-25qc-h54q
|
Directory Traversal in myserver.alexcthomas18
|
Affected versions of `myserver.alexcthomas18` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16144'}
|
2020-08-31T18:24:19Z
|
2018-07-23T20:48:05Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/469', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16144', 'https://nodesecurity.io/advisories/469', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/myserver.alexcthomas18', 'https://github.com/advisories/GHSA-rgq8-25qc-h54q'}
| null |
npm
|
GHSA-52rh-5rpj-c3w6
|
Improper handling of multiline messages in node-irc
|
node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to the IRC server verbatim rather than as a message to the channel.
The vulnerability has been patched in node-irc version 1.2.1.
| null |
2022-05-05T16:00:50Z
|
2022-05-05T16:00:50Z
|
HIGH
| null | null |
{'https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6', 'https://matrix.org/blog/2022/05/04/0-34-0-security-release-for-matrix-appservice-irc-high-severity', 'https://github.com/matrix-org/node-irc'}
| null |
npm
|
GHSA-7r5f-7qr4-pf6q
|
Sandbox Breakout / Arbitrary Code Execution in notevil
|
Versions of `notevil` prior to 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to prevent access to the `Function` constructor by not checking the return values of function calls. This allows attackers to access the Function prototype's constructor leading to the Sandbox Escape. An example payload is:
```
var safeEval = require('notevil')
var input = "" +
"function fn() {};" +
"var constructorProperty = Object.getOwnPropertyDescriptors(fn.__proto__).constructor;" +
"var properties = Object.values(constructorProperty);" +
"properties.pop();" +
"properties.pop();" +
"properties.pop();" +
"var Function = properties.pop();" +
"(Function('return this'))()";
safeEval(input)```
## Recommendation
Upgrade to version 1.3.2 or later.
| null |
2020-08-31T18:47:00Z
|
2020-09-03T19:03:33Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1093'}
| null |
npm
|
GHSA-7g2w-6r25-2j7p
|
Command Injection in libnmap
|
Versions of `libnmap` before 0.4.16 are vulnerable to command injection.
Proof of concept
```
const nmap = require('libnmap');
const opts = {
range: [
'scanme.nmap.org',
"x.x.$(touch success.txt)"
]
};
nmap.scan(opts, function(err, report) {
if (err) throw new Error(err);
for (let item in report) {
console.log(JSON.stringify(report[item]));
}
});
```
## Recommendation
Update to version 0.4.16 or later
|
{'CVE-2018-16461'}
|
2020-08-31T18:33:16Z
|
2018-11-01T14:51:33Z
|
MODERATE
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16461', 'https://github.com/advisories/GHSA-7g2w-6r25-2j7p', 'https://hackerone.com/reports/390865', 'https://www.npmjs.com/advisories/719', 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/474.json'}
| null |
npm
|
GHSA-j4ch-mw66-xmqv
|
Malicious Package in pensi-scheduler
|
Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:47:31Z
|
2020-09-03T19:16:44Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/1107'}
| null |
npm
|
GHSA-p493-635q-r6gr
|
Remote code execution via the `pretty` option.
|
### Impact
If a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend.
### Patches
Upgrade to `pug@3.0.1` or `pug-code-gen@3.0.2` or `pug-code-gen@2.0.3`, which correctly sanitise the parameter.
### Workarounds
If there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade.
### References
Original report: https://github.com/pugjs/pug/issues/3312
### For more information
If you believe you have found other vulnerabilities, please **DO NOT** open an issue. Instead, you can follow the instructions in our [Security Policy](https://github.com/pugjs/pug/blob/master/SECURITY.md)
|
{'CVE-2021-21353'}
|
2021-03-03T01:49:22Z
|
2021-03-03T02:03:52Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21353', 'https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0', 'https://www.npmjs.com/package/pug-code-gen', 'https://github.com/pugjs/pug/pull/3314', 'https://github.com/pugjs/pug/releases/tag/pug%403.0.1', 'https://www.npmjs.com/package/pug', 'https://github.com/pugjs/pug/issues/3312'}
| null |
npm
|
GHSA-7jh9-6cpf-h4m7
|
XSS in hello.js
|
This affects the package hello.js before 1.18.6. The code get the param oauth_redirect from url and pass it to location.assign without any check and sanitisation. So we can simply pass some XSS payloads into the url param oauth_redirect, such as javascript:alert(1).
|
{'CVE-2020-7741'}
|
2021-01-13T19:06:37Z
|
2021-01-13T19:07:01Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://github.com/MrSwitch/hello.js/commit/d6f5137f30de6e0ef7048191ee6ae575fdc2f669', 'https://github.com/MrSwitch/hello.js/blob/3b79ec93781b3d7b9c0b56f598e060301d1f3e73/dist/hello.all.js%23L1545', 'https://snyk.io/vuln/SNYK-JS-HELLOJS-1014546', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7741'}
| null |
npm
|
GHSA-4j46-mp85-mv8c
|
Path traversal in rollup-plugin-serve
|
Path traversal in npm package `rollup-plugin-serve` before version 1.0.2. There is no path sanitization in `readFile` operation.
|
{'CVE-2020-7684'}
|
2021-05-18T01:51:52Z
|
2021-05-18T01:52:24Z
|
CRITICAL
| null |
{'CWE-22'}
|
{'https://vuldb.com/?id.158745', 'https://github.com/thgh/rollup-plugin-serve/commit/3d144f2f47e86fcba34f5a144968da94220e3969', 'https://github.com/thgh/rollup-plugin-serve/releases/tag/v1.0.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7684'}
| null |
npm
|
GHSA-xxvw-45rp-3mj2
|
Deserialization Code Execution in js-yaml
|
Versions 2.0.4 and earlier of `js-yaml` are affected by a code execution vulnerability in the YAML deserializer.
## Proof of Concept
```
const yaml = require('js-yaml');
const x = `test: !!js/function >
function f() {
console.log(1);
}();`
yaml.load(x);
```
## Recommendation
Update js-yaml to version 2.0.5 or later, and ensure that all instances where the `.load()` method is called are updated to use `.safeLoad()` instead.
|
{'CVE-2013-4660'}
|
2021-09-22T18:27:56Z
|
2017-10-24T18:33:37Z
|
CRITICAL
| null |
{'CWE-20'}
|
{'https://nealpoole.com/blog/2013/06/code-execution-via-yaml-in-js-yaml-nodejs-module/', 'http://portal.nodesecurity.io/advisories/js-yaml', 'https://www.npmjs.com/advisories/16', 'https://nvd.nist.gov/vuln/detail/CVE-2013-4660', 'https://github.com/advisories/GHSA-xxvw-45rp-3mj2'}
| null |
npm
|
GHSA-qc65-cgvr-93p6
|
Code injection in kill-process-by-name
|
This affects all versions of package kill-process-by-name. If (attacker-controlled) user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file.
|
{'CVE-2021-23356'}
|
2021-03-25T00:17:45Z
|
2021-03-19T21:19:18Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23356', 'https://snyk.io/vuln/SNYK-JS-KILLPROCESSBYNAME-1078534'}
| null |
npm
|
GHSA-7qmm-q394-fmch
|
Command Injection in ps-kill
|
This affects all versions of package ps-kill. If (attacker-controlled) user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization in the index.js file. PoC (provided by reporter): var ps_kill = require('ps-kill'); ps_kill.kill('$(touch success)',function(){});
|
{'CVE-2021-23355'}
|
2021-03-25T00:17:34Z
|
2021-03-19T21:19:29Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23355', 'https://snyk.io/vuln/SNYK-JS-PSKILL-1078529'}
| null |
npm
|
GHSA-2mp5-m968-gwr2
|
Path Traversal in http-file-server
|
All versions of `http-file-server` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
|
{'CVE-2019-5447'}
|
2020-08-31T18:46:30Z
|
2019-07-16T00:41:34Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2019-5447', 'https://www.npmjs.com/advisories/1077', 'https://hackerone.com/reports/570133'}
| null |
npm
|
GHSA-2m96-9w4j-wgv7
|
Prototype Pollution in lodash.merge
|
Versions of `lodash.merge` before 4.6.1 are vulnerable to Prototype Pollution. The function 'merge' may allow a malicious user to modify the prototype of `Object` via `__proto__` causing the addition or modification of an existing property that will exist on all objects.
## Recommendation
Update to version 4.6.1 or later.
| null |
2020-08-31T18:46:06Z
|
2020-09-03T18:06:00Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1067'}
| null |
npm
|
GHSA-2fwq-wx47-hm6x
|
Malicious Package in bcion
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:30:20Z
|
2020-09-04T15:31:39Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1352'}
| null |
npm
|
GHSA-wch2-46wj-6x5j
|
Malicious Package in bip30
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:38:52Z
|
2020-09-04T15:37:15Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1358'}
| null |
npm
|
GHSA-3cgg-gh9j-w8vm
|
Directory Traversal in iter-http
|
Affected versions of `iter-http` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16094'}
|
2020-08-31T18:20:01Z
|
2018-07-24T13:58:10Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/343', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16094', 'https://github.com/advisories/GHSA-3cgg-gh9j-w8vm', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/iter-http', 'https://www.npmjs.com/advisories/343'}
| null |
npm
|
GHSA-hjhr-r3gq-qvp6
|
Timing Attack in csrf-lite
|
Affected versions of `csrf-lite` are vulnerable to timing attacks as a result of testing CSRF tokens via a fail-early comparison instead of a constant-time comparison.
Timing attacks remove the exponential increase in entropy gained from increased secret length, by providing per-character feedback on the correctness of a guess via miniscule timing differences.
Under favorable network conditions, an attacker can exploit this to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.
## Recommendation
Update to version 0.1.2 or later.
|
{'CVE-2016-10535'}
|
2020-08-31T18:10:37Z
|
2019-02-18T23:39:44Z
|
HIGH
| null |
{'CWE-208'}
|
{'https://nodesecurity.io/advisories/94', 'https://github.com/advisories/GHSA-hjhr-r3gq-qvp6', 'https://github.com/isaacs/csrf-lite/pull/1', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10535', 'https://www.npmjs.com/advisories/94'}
| null |
npm
|
GHSA-2j2j-8rrv-264g
|
Cross-Site Scripting in exceljs
|
Versions of `exceljs` before 1.6.0 are vulnerable to cross-site scripting.
This vulnerability is due to `exceljs` does not validate data from parsed XLSX file and allows to embed HTML tags, like `<script>`, directly in the sheet cells. Because of this it's possible to inject malicious JavaScript code and execute it when data from the sheet were displayed in the browser.
## Recommendation
Update to version 1.6.0 or later.
|
{'CVE-2018-16459'}
|
2020-08-31T18:33:49Z
|
2018-09-11T18:58:40Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/nodejs/security-wg/blob/master/vuln/npm/464.json', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16459', 'https://www.npmjs.com/advisories/733', 'https://hackerone.com/reports/356809', 'https://github.com/advisories/GHSA-2j2j-8rrv-264g'}
| null |
npm
|
GHSA-3pxp-6963-46r9
|
Command Injection in pdfinfojs
|
Versions of `pdfinfojs` before 0.4.1 are vulnerable to command injection. This is exploitable if an attacker can control the filename parameter that is passed into the `pdfinfojs` constructor.
## Recommendation
Update to version 0.4.1 or later.
|
{'CVE-2018-3746'}
|
2020-08-31T18:31:03Z
|
2018-06-07T19:43:00Z
|
HIGH
| null |
{'CWE-77'}
|
{'https://github.com/fagbokforlaget/pdfinfojs/commit/5cc59cd8aa13ca8d16bb41da8affdfef370ad4fd', 'https://hackerone.com/reports/330957', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3746', 'https://www.npmjs.com/advisories/643', 'https://github.com/advisories/GHSA-3pxp-6963-46r9'}
| null |
npm
|
GHSA-vrc7-6g8w-jh56
|
Improper Input Validation in xdLocalStorage
|
An issue was discovered in xdLocalStorage through 2.0.5. The receiveMessage() function in xdLocalStoragePostMessageApi.js does not implement any validation of the origin of web messages. Remote attackers who can entice a user to load a malicious site can exploit this issue to impact the confidentiality and integrity of data in the local storage of the vulnerable site via malicious web messages.
|
{'CVE-2015-9544'}
|
2022-03-11T22:59:06Z
|
2021-12-09T19:29:36Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/ofirdagan/cross-domain-local-storage/issues/17', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9544', 'https://grimhacker.com/exploiting-xdlocalstorage-localstorage-and-postmessage/#Missing-Origin-Magic-iframe', 'https://github.com/ofirdagan/cross-domain-local-storage', 'https://github.com/ofirdagan/cross-domain-local-storage/pull/19'}
| null |
npm
|
GHSA-6866-x7cf-rmh5
|
Directory Traversal in sencisho
|
Affected versions of `sencisho` are vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16092'}
|
2020-08-31T18:19:54Z
|
2018-07-24T13:50:01Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/340', 'https://www.npmjs.com/advisories/340', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16092', 'https://github.com/advisories/GHSA-6866-x7cf-rmh5', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/sencisho'}
| null |
npm
|
GHSA-rch9-xh7r-mqgw
|
Cross-Site Scripting in simple-server
|
Versions of `simple-server` before 1.1.0 are vulnerable to stored cross-site scripting (XSS). This is exploitable if an attacker can control a filename on the server.
## Recommendation
Update to version 1.1.0 or later.
|
{'CVE-2018-3717'}
|
2020-08-31T18:29:12Z
|
2018-07-26T15:08:05Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/595', 'https://hackerone.com/reports/309641', 'https://github.com/JacksonTian/anywhere/issues/33#issuecomment-366527448', 'https://github.com/advisories/GHSA-rch9-xh7r-mqgw', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3717', 'https://www.npmjs.com/advisories/584', 'https://github.com/senchalabs/connect/commit/6d5dd30075d2bc4ee97afdbbe3d9d98d8d52d74b', 'https://hackerone.com/reports/309394'}
| null |
npm
|
GHSA-jfcc-rm7f-xgf8
|
Cross-Site Scripting in mavon-editor
|
All versions of `mavon-editor` are vulnerable to Cross-Site Scripting. The package fails to sanitize entered input, allowing attackers to execute arbitrary JavaScript in a victim's browser.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2021-09-29T18:37:46Z
|
2020-09-03T20:36:35Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/hinesboy/mavonEditor/issues/472', 'https://www.npmjs.com/advisories/1169', 'https://www.npmjs.com/package/mavon-editor', 'https://github.com/hinesboy/mavonEditor', 'https://github.com/hinesboy/mavonEditor/commit/5592ec3761bd3b5a12ba6f99ce3c4057c6e33f72', 'https://snyk.io/vuln/SNYK-JS-MAVONEDITOR-459108', 'https://github.com/hinesboy/mavonEditor/pull/548'}
| null |
npm
|
GHSA-9chw-xrwx-f86j
|
Downloads Resources over HTTP in frames-compiler
|
Affected versions of `frames-compiler` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `frames-compiler`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10649'}
|
2021-01-14T15:57:35Z
|
2020-09-01T16:07:53Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10649', 'https://www.npmjs.com/advisories/247', 'https://nodesecurity.io/advisories/247'}
| null |
npm
|
GHSA-hj5w-xgw9-w4rj
|
Malicious Package in coinstrng
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:58:49Z
|
2020-09-03T19:41:44Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1385'}
| null |
npm
|
GHSA-7fw7-gh23-f832
|
Vulnerability in singleCrunch function leads to arbitrary code execution via filePath parameters
|
aaptjs is a node wraper for aapt. An issue was discovered in the singleCrunch function in shenzhim aaptjs 1.3.1, allows attackers to execute arbitrary code via the filePath parameters.
|
{'CVE-2020-36381'}
|
2022-05-04T03:47:21Z
|
2021-11-01T19:19:29Z
|
CRITICAL
| null |
{'CWE-77', 'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36381', 'https://github.com/shenzhim/aaptjs/issues/2', 'https://github.com/shenzhim/aaptjs'}
| null |
npm
|
GHSA-cxcf-78mr-wpg7
|
Malicious Package in oauth-validator
|
Version 1.0.2 of `oauth-validator` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:30:37Z
|
2020-09-01T20:29:59Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/632'}
| null |
npm
|
GHSA-hx5x-49mm-vmhw
|
SQL Injection in sails-mysql
|
Versions of `sails-mysql` prior to 0.10.8 are vulnerable to SQL Injection. The `sort` keyword is not properly sanitized and may allow attackers to inject SQL statements and execute arbitrary SQL queries
## Recommendation
Upgrade to version 0.10.8 or later.
| null |
2021-09-27T22:39:39Z
|
2020-09-03T02:36:43Z
|
HIGH
| null |
{'CWE-89'}
|
{'https://github.com/balderdashy/sails', 'https://snyk.io/vuln/SNYK-JS-SAILSMYSQL-174916', 'https://github.com/balderdashy/sails/issues/6679', 'https://www.npmjs.com/advisories/950'}
| null |
npm
|
GHSA-8j49-49jq-vwcq
|
Prototype Pollution in getsetdeep
|
All versions of `getsetdeep` are vulnerable to prototype pollution. The `setDeep()` function does not restrict the modification of an Object's prototype, which may allow an attacker to add or modify an existing property that will exist on all objects.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:55:30Z
|
2020-09-04T15:15:34Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://www.npmjs.com/advisories/1334'}
| null |
npm
|
GHSA-6f34-pq9f-36vf
|
Hijacked Environment Variables in sqlite.js
|
The `sqlite.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16050'}
|
2020-08-31T18:25:11Z
|
2018-07-23T20:50:29Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/491', 'https://github.com/advisories/GHSA-6f34-pq9f-36vf', 'https://nodesecurity.io/advisories/491', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16050'}
| null |
npm
|
GHSA-3fjq-93xj-3f3f
|
Cross-Site Scripting in serialize-to-js
|
Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications.
## Recommendation
Upgrade to version 3.0.1 or later.
|
{'CVE-2019-16772'}
|
2021-01-08T20:02:20Z
|
2019-12-06T23:20:26Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f', 'https://www.npmjs.com/advisories/1429', 'https://github.com/advisories/GHSA-3fjq-93xj-3f3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772', 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}
| null |
npm
|
GHSA-r863-p739-275c
|
Malicious Package in reuest
|
All versions of `reuest` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:09:36Z
|
2020-09-11T21:09:24Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/866'}
| null |
npm
|
GHSA-5w4r-wwc3-6qcp
|
Malicious Package in precode.js
|
Version 1.1.1 of `precode.js` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:20Z
|
2020-09-11T21:23:29Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/941'}
| null |
npm
|
GHSA-wm77-q74p-5763
|
Path Traversal in superstatic
|
Affected of `superstatic` are vulnerable to path traversal when used on Windows.
Additionally, it is vulnerable to path traversal on other platforms combined with certain Node.js versions which erroneously normalize `\\` to `/` in paths on all platforms (a known example being Node.js v9.9.0).
## Recommendation
Update to version 5.0.2 or later.
| null |
2021-08-09T22:21:02Z
|
2018-07-27T17:06:03Z
|
HIGH
| null |
{'CWE-177'}
|
{'https://github.com/firebase/superstatic/pull/255', 'https://www.npmjs.com/advisories/652', 'https://github.com/firebase/superstatic/blob/v5.0.1/lib/providers/fs.js#L71', 'https://github.com/firebase/superstatic/commit/e396ff62f588732989137d6c40d46b310e51ef2b'}
| null |
npm
|
GHSA-753c-phhg-cj29
|
Improper Neutralization of Special Elements used in a Command
|
This affects the package madge before 4.0.1. It is possible to specify a custom Graphviz path via the graphVizPath option parameter which when the .image(), .svg() or .dot() functions are called, is executed by the childprocess.exec function.
|
{'CVE-2021-23352'}
|
2021-03-12T21:10:53Z
|
2021-03-12T23:01:49Z
|
HIGH
| null |
{'CWE-77', 'CWE-89'}
|
{'https://snyk.io/vuln/SNYK-JS-MADGE-1082875', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23352', 'https://github.com/pahen/madge/blob/master/lib/graph.js%23L27', 'https://github.com/pahen/madge/commit/da5cbc9ab30372d687fa7c324b22af7ffa5c6332'}
| null |
npm
|
GHSA-f522-ffg8-j8r6
|
Regular Expression Denial of Service in is-my-json-valid
|
Version of `is-my-json-valid` before 1.4.1 or 2.17.2 are vulnerable to regular expression denial of service (ReDoS) via the email validation function.
## Recommendation
Update to version 1.4.1, 2.17.2 or later.
|
{'CVE-2016-2537'}
|
2021-09-09T21:38:37Z
|
2017-10-24T18:33:35Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/mafintosh/is-my-json-valid', 'https://www.npmjs.com/advisories/76', 'https://github.com/mafintosh/is-my-json-valid/pull/159', 'https://www.npmjs.com/advisories/572', 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976', 'https://nvd.nist.gov/vuln/detail/CVE-2016-2537', 'https://hackerone.com/reports/317548', 'https://github.com/mafintosh/is-my-json-valid/commit/eca4beb21e61877d76fdf6bea771f72f39544d9b', 'https://github.com/advisories/GHSA-f522-ffg8-j8r6', 'https://nodesecurity.io/advisories/76'}
| null |
npm
|
GHSA-v8w9-2789-6hhr
|
Deserialization of Untrusted Data in bson
|
All versions of bson before 1.1.4 are vulnerable to Deserialization of Untrusted Data. The package will ignore an unknown value for an object's _bsotype, leading to cases where an object is serialized as a document rather than the intended BSON type.
|
{'CVE-2020-7610'}
|
2021-05-06T23:40:10Z
|
2021-05-07T16:04:54Z
|
HIGH
| null |
{'CWE-502'}
|
{'https://snyk.io/vuln/SNYK-JS-BSON-561052', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7610'}
| null |
npm
|
GHSA-qr28-7j6p-9hmv
|
Content Injection via TileJSON attribute in mapbox.js
|
Versions 1.x prior to 1.6.5 and 2.x prior to 2.1.7 of `mapbox.js` are vulnerable to a cross-site-scripting attack in certain uncommon usage scenarios.
If `L.mapbox.map` or `L.mapbox.tileLayer` are used to load untrusted TileJSON content from a non-Mapbox URL, it is possible for a malicious user with control over the TileJSON content to inject script content into the "attribution" value of the TileJSON which will be executed in the context of the page using Mapbox.js.
## Recommendation
Version 2.x: Update to version 2.1.7 or later.
Version 1.x: Update to version 1.6.5 or later.
|
{'CVE-2017-1000042'}
|
2021-09-16T21:03:23Z
|
2018-11-09T17:47:45Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/49', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000042', 'https://github.com/advisories/GHSA-qr28-7j6p-9hmv', 'https://hackerone.com/reports/54327', 'https://nodesecurity.io/advisories/49'}
| null |
npm
|
GHSA-q43c-g2g7-6gxj
|
Cross-Site Request Forgery (CSRF) in keystone
|
Versions of `keystone` prior to 4.0.0 are vulnerable to Cross-Site Request Forgery (CSRF). The package fails to validate the presence of the `X-CSRF-Token` header, which may allow attackers to carry actions on behalf of other users on all endpoints.
## Recommendation
Update to version 4.0.0 or later.
|
{'CVE-2017-16570'}
|
2021-06-10T21:18:39Z
|
2017-11-30T23:14:47Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://snyk.io/vuln/SNYK-JS-KEYSTONE-449663', 'http://blog.securelayer7.net/keystonejs-open-source-penetration-testing-report/', 'https://www.npmjs.com/advisories/979', 'https://www.exploit-db.com/exploits/43922/', 'https://github.com/advisories/GHSA-q43c-g2g7-6gxj', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16570', 'https://securelayer7.net/download/pdf/KeystoneJS-Pentest-Report-SecureLayer7.pdf', 'https://github.com/keystonejs/keystone/issues/4437', 'https://github.com/keystonejs/keystone/pull/4478'}
| null |
npm
|
GHSA-pch5-whg9-qr2r
|
netmask npm package vulnerable to octal input data
|
The netmask package before 2.0.1 for Node.js mishandles certain unexpected characters in an IP address string, such as an octal digit of 9. This (in some situations) allows attackers to bypass access control that is based on IP addresses. NOTE: this issue exists because of an incomplete fix for CVE-2021-28918.
|
{'CVE-2021-29418'}
|
2021-06-09T23:10:53Z
|
2021-03-29T21:32:05Z
|
MODERATE
| null |
{'CWE-20'}
|
{'https://sick.codes/universal-netmask-npm-package-used-by-270000-projects-vulnerable-to-octal-input-data-server-side-request-forgery-remote-file-inclusion-local-file-inclusion-and-more-cve-2021-28918/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29418', 'https://sick.codes/sick-2021-011', 'https://security.netapp.com/advisory/ntap-20210604-0001/', 'https://github.com/rs/node-netmask/commit/3f19a056c4eb808ea4a29f234274c67bc5a848f4', 'https://vuln.ryotak.me/advisories/6', 'https://www.npmjs.com/package/netmask'}
| null |
npm
|
GHSA-6w83-22gj-5pv9
|
Directory Traversal in cyber-js
|
Affected versions of `cyber-js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16093'}
|
2020-08-31T18:20:10Z
|
2018-07-27T14:06:00Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-6w83-22gj-5pv9', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/cyber-js', 'https://nodesecurity.io/advisories/347', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16093', 'https://www.npmjs.com/advisories/347'}
| null |
npm
|
GHSA-h73q-5wmj-q8pj
|
Cross site scripting in datatables.net
|
This affects the package datatables.net before 1.11.3. If an array is passed to the HTML escape entities function it would not have its contents escaped.
|
{'CVE-2021-23445'}
|
2021-10-13T17:26:00Z
|
2021-09-29T17:11:28Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://snyk.io/vuln/SNYK-JS-DATATABLESNET-1540544', 'https://github.com/DataTables/Dist-DataTables', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1715371', 'https://cdn.datatables.net/1.11.3/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23445', 'https://github.com/DataTables/Dist-DataTables/commit/59a8d3f8a3c1138ab08704e783bc52bfe88d7c9b', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1715376'}
| null |
npm
|
GHSA-mhp6-pxh8-r675
|
Cross site scripting in Angular
|
angular.js prior to 1.8.0 allows cross site scripting. The regex-based input HTML replacement may turn sanitized code into unsanitized one. Wrapping "<option>" elements in "<select>" ones changes parsing behavior, leading to possibly unsanitizing code.
|
{'CVE-2020-7676'}
|
2021-09-22T18:31:00Z
|
2020-06-18T14:19:58Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/angular/angular.js', 'https://lists.apache.org/thread.html/r79e3feaaf87b81e80da0e17a579015f6dcb94c95551ced398d50c8d7@%3Cozone-issues.hadoop.apache.org%3E', 'https://github.com/angular/angular.js/pull/17028,', 'https://lists.apache.org/thread.html/r198985c02829ba8285ed4f9b1de54a33b5f31b08bb38ac51fc86961b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r57383582dcad2305430321589dfaca6793f5174c55da6ce8d06fbf9b@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r3f05cfd587c774ea83c18e59eda9fa37fa9bbf3421484d4ee1017a20@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E', 'https://github.com/angular/angular.js/pull/17028', 'https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E', 'https://snyk.io/vuln/SNYK-JS-ANGULAR-570058', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7676', 'https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/rfa2b19d01d10a8637dc319a7d5994c3dbdb88c0a8f9a21533403577a@%3Cozone-issues.hadoop.apache.org%3E'}
| null |
npm
|
GHSA-cq6w-w5rj-p9x8
|
Cross-site Scripting in Froala Editor
|
Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
|
{'CVE-2021-30109'}
|
2021-10-06T16:55:25Z
|
2021-10-06T17:47:05Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://froala.com', 'https://github.com/froala/wysiwyg-editor-release', 'https://github.com/Hackdwerg/CVE-2021-30109/blob/main/README.md', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30109'}
| null |
npm
|
GHSA-3h9m-9g3g-5wqx
|
Malicious Package in buffer-xov
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:13:02Z
|
2020-09-03T22:13:14Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1252'}
| null |
npm
|
GHSA-qqxp-xp9v-vvx6
|
Moderate severity vulnerability that affects jquery-ui
|
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.
|
{'CVE-2012-6662'}
|
2021-09-16T20:04:38Z
|
2017-10-24T18:33:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'http://bugs.jqueryui.com/ticket/8859', 'http://rhn.redhat.com/errata/RHSA-2015-0442.html', 'http://www.securityfocus.com/bid/71107', 'https://github.com/jquery/jquery', 'http://bugs.jqueryui.com/ticket/8861', 'http://seclists.org/oss-sec/2014/q4/613', 'http://rhn.redhat.com/errata/RHSA-2015-1462.html', 'https://github.com/jquery/jquery-ui/commit/5fee6fd5000072ff32f2d65b6451f39af9e0e39e', 'https://nvd.nist.gov/vuln/detail/CVE-2012-6662', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/98697', 'https://github.com/advisories/GHSA-qqxp-xp9v-vvx6', 'https://github.com/jquery/jquery-ui/commit/f2854408cce7e4b7fc6bf8676761904af9c96bde', 'https://github.com/jquery/jquery/issues/2432', 'http://seclists.org/oss-sec/2014/q4/616'}
| null |
npm
|
GHSA-4hv7-3q38-97m8
|
Arbitrary code execution in djv
|
This affects the package djv before 2.1.4. By controlling the schema file, an attacker can run arbitrary JavaScript code on the victim machine.
|
{'CVE-2020-28464'}
|
2021-04-06T23:35:22Z
|
2021-04-13T15:24:47Z
|
CRITICAL
| null |
{'CWE-94'}
|
{'https://snyk.io/vuln/SNYK-JS-DJV-1014545', 'https://github.com/korzio/djv/pull/98/files', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28464', 'https://github.com/korzio/djv/blob/master/lib/utils/properties.js%23L55'}
| null |
npm
|
GHSA-fvcj-hvfw-7f2v
|
Improper Authentication
|
### Impact
A maliciously crafted claim may be incorrectly authenticated by the bot. Impacts bots that are not configured to be used as a Skill. This vulnerability requires an attacker to have internal knowledge of the bot.
### Patches
The problem has been patched in all affected versions. Please see the list of patched versions for the most appropriate one for your individual case.
### Workarounds
Users who do not wish or are not able to upgrade can add an authentication configuration containing ClaimsValidator, which throws an exception if the Claims are Skill Claims.
For detailed instructions, see the link in the References section.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Microsoft Bot Builder SDK](https://github.com/microsoft/botbuilder-dotnet)
* Email us at [bf-reports@microsoft.com](mailto:bf-reports@microsoft.com)
|
{'CVE-2021-1725'}
|
2021-03-08T15:47:09Z
|
2021-03-08T15:49:53Z
|
HIGH
| null |
{'CWE-287'}
|
{'https://aka.ms/SkillClaimsValidationJavascript', 'https://github.com/microsoft/botbuilder-js/security/advisories/GHSA-fvcj-hvfw-7f2v', 'https://www.npmjs.com/package/botframework-connector'}
| null |
npm
|
GHSA-3c87-r9f7-qfgq
|
Downloads Resources over HTTP in macaca-chromedriver-zxa
|
Affected versions of `macaca-chromedriver-zxa` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver-zxa`.
## Recommendation
The best mitigation is to manually set the download URL to a safe HTTPS server via the `CHROMEDRIVER_CDNURL` environment variable.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10623'}
|
2021-01-08T20:02:32Z
|
2019-02-18T23:56:56Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/221', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10623', 'https://nodesecurity.io/advisories/221', 'https://github.com/advisories/GHSA-3c87-r9f7-qfgq'}
| null |
npm
|
GHSA-rm7c-x424-g2mw
|
Malicious Package in asyync
|
All versions of `asyync` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T13:47:19Z
|
2020-09-02T18:36:31Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/843'}
| null |
npm
|
GHSA-j4vm-hg8g-g9qv
|
Malicious Package in antd-cloud
|
All versions of `antd-cloud` contain malicious code. The package uploads system information to a remote server, downloads a file and executes it.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-30T18:39:55Z
|
2020-09-03T17:33:50Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1049'}
| null |
npm
|
GHSA-h6m3-cx24-9626
|
Malicious Package in js-sla3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:15:57Z
|
2020-09-03T23:11:45Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1292'}
| null |
npm
|
GHSA-g452-6rfc-vrvx
|
Prototype Pollution in open-graph
|
This affects the package open-graph before 0.2.6. The function parse could be tricked into adding or modifying properties of Object.prototype using a __proto__ or constructor payload.
|
{'CVE-2021-23419'}
|
2021-08-30T21:26:46Z
|
2021-09-01T18:31:53Z
|
MODERATE
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JS-OPENGRAPH-1536747', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23419', 'https://github.com/samholmes/node-open-graph', 'https://github.com/samholmes/node-open-graph/commit/a0cef507a90adaac7dbbe9c404f09a50bdefb348'}
| null |
npm
|
GHSA-4j6x-w426-6rc6
|
Default Express middleware security check is ignored in production
|
## Default Express middleware security check is ignored in production
### Impact
All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected.
### Patches
@cubejs-backend/api-gateway@0.11.17
### Workarounds
Override default authentication express middleware: https://cube.dev/docs/@cubejs-backend-server-core#options-reference-check-auth-middleware
### For more information
If you have any questions or comments about this advisory:
* Open an issue in https://github.com/cube-js/cube.js/issues
* Reach out us in community Slack: https://slack.cube.dev/
| null |
2020-06-16T20:58:26Z
|
2019-11-08T17:31:17Z
|
HIGH
| null | null |
{'https://github.com/cube-js/cube.js/security/advisories/GHSA-4j6x-w426-6rc6', 'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}
| null |
npm
|
GHSA-g376-whg7-896m
|
Directory Traversal in yjmyjmyjm
|
Affected versions of `yjmyjmyjm` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
| null |
2020-08-31T18:23:39Z
|
2020-09-01T18:45:53Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://www.npmjs.com/advisories/451', 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/yjmyjmyjm'}
| null |
npm
|
GHSA-g78f-549w-c354
|
Prototype Pollution in multi-ini
|
This affects the package multi-ini before 2.1.1. It is possible to pollute an object's prototype by specifying the proto object as part of an array.
|
{'CVE-2020-28448'}
|
2021-04-07T23:21:37Z
|
2021-04-13T15:23:59Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28448', 'https://snyk.io/vuln/SNYK-JS-MULTIINI-1048969', 'https://github.com/evangelion1204/multi-ini/pull/37'}
| null |
npm
|
GHSA-5xgh-643p-cp2g
|
Moderate severity vulnerability that affects yapi-vendor
|
An issue was discovered in YMFE YApi 1.3.23. There is stored XSS in the name field of a project.
|
{'CVE-2018-17574'}
|
2021-09-01T22:22:29Z
|
2018-11-21T22:19:59Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2018-17574', 'https://github.com/YMFE/yapi', 'https://github.com/YMFE/yapi/issues/520', 'https://github.com/advisories/GHSA-5xgh-643p-cp2g'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.