ecosystem
stringclasses 14
values | vuln_id
stringlengths 10
19
| summary
stringlengths 4
267
⌀ | details
stringlengths 9
13.5k
| aliases
stringlengths 17
144
⌀ | modified_date
stringdate 2010-05-27 05:47:00
2022-05-10 08:46:52
| published_date
stringdate 2005-12-31 05:00:00
2022-05-10 08:46:50
| severity
stringclasses 5
values | score
float64 0
10
⌀ | cwe_id
stringclasses 988
values | refs
stringlengths 30
17.7k
⌀ | introduced
stringlengths 75
4.26k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
npm
|
GHSA-hhqj-cfjx-vj25
|
Cross site scripting in reveal.js
|
The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on victim's browser window hosting reveal.js
|
{'CVE-2022-0776'}
|
2022-03-10T16:00:14Z
|
2022-03-02T00:00:20Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2', 'https://github.com/hakimel/reveal.js', 'https://huntr.dev/bounties/be2b7ee4-f487-42e1-874a-6bcc410e4001', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'}
| null |
npm
|
GHSA-c35v-qwqg-87jc
|
Timing Attack in express-basic-auth
|
Versions of `express-basic-auth` prior to 1.2.0 are vulnerable to Timing Attacks. The package uses nating string comparison instead of a constant time string compare which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets.
## Recommendation
Upgrade to version 1.2.0 or later.
| null |
2021-08-04T20:58:12Z
|
2019-06-06T15:32:32Z
|
LOW
| null |
{'CWE-208'}
|
{'https://www.npmjs.com/advisories/827', 'https://github.com/LionC/express-basic-auth/pull/20', 'https://github.com/LionC/express-basic-auth/pull/21', 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263', 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f', 'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345'}
| null |
npm
|
GHSA-x56p-c8cg-q435
|
Open Redirect in Next.js versions
|
### Impact
- **Affected**: Users of Next.js between 9.5.0 and 9.5.3
- **Not affected**: Deployments on Vercel ([https://vercel.com](https://vercel.com)) are not affected
- **Not affected**: Deployments using `next export`
We recommend everyone to upgrade regardless of whether you can reproduce the issue or not.
### Patches
https://github.com/vercel/next.js/releases/tag/v9.5.4
### References
https://github.com/vercel/next.js/releases/tag/v9.5.4
|
{'CVE-2020-15242'}
|
2021-10-06T21:27:19Z
|
2020-10-08T19:28:07Z
|
MODERATE
| null |
{'CWE-601'}
|
{'https://github.com/vercel/next.js', 'https://github.com/vercel/next.js/security/advisories/GHSA-x56p-c8cg-q435', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15242', 'https://github.com/zeit/next.js/releases/tag/v9.5.4'}
| null |
npm
|
GHSA-qjfh-xc44-rm9x
|
Path Traversal in file-static-server
|
All versions of `file-static-server` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files by using relative paths when fetching files.
## Recommendation
No fix is currently available. Consider using an alternative module until a fix is made available.
| null |
2020-08-31T18:43:54Z
|
2020-09-03T16:49:43Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://hackerone.com/reports/310671', 'https://www.npmjs.com/advisories/1008'}
| null |
npm
|
GHSA-6c3f-p5wp-34mh
|
OS Command Injection in async-git
|
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
|
{'CVE-2021-3190'}
|
2022-05-03T02:56:05Z
|
2021-01-29T18:14:00Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://github.com/omrilotan/async-git/pull/14', 'https://github.com/omrilotan/async-git/pull/13', 'https://advisory.checkmarx.net/advisory/CX-2021-4772', 'https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a', 'https://www.npmjs.com/package/async-git', 'https://github.com/omrilotan/async-git', 'https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3190'}
| null |
npm
|
GHSA-cwg9-c9cr-p5fq
|
Improper Neutralization of Input in Theia console
|
In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected.
|
{'CVE-2021-28161'}
|
2021-03-26T23:20:56Z
|
2021-04-13T15:18:53Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/eclipse-theia/theia/issues/8794', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28161'}
| null |
npm
|
GHSA-x3wr-v4wx-5qpc
|
Prototype Pollution
|
Prototype pollution vulnerability in ‘expand-hash’ versions 0.1.0 through 1.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25948'}
|
2021-10-21T13:56:14Z
|
2021-06-21T17:14:01Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25948', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25948', 'https://github.com/doowb/expand-hash/blob/556913f6c2f05848110b5b8261cfc78e5ce3dc77/index.js#L19', 'https://github.com/doowb/expand-hash'}
| null |
npm
|
GHSA-8796-gc9j-63rv
|
File upload local preview can run embedded scripts after user interaction
|
### Impact
When uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file, but only after several user interactions to open the preview in a separate tab. This only impacts the local user while in the process of uploading. It cannot be exploited remotely or by other users.
### Patches
This has been fixed by https://github.com/matrix-org/matrix-react-sdk/pull/5981, which is included in 3.21.0.
### Workarounds
There are no known workarounds.
| null |
2021-10-05T16:31:48Z
|
2021-05-17T20:51:16Z
|
MODERATE
| null |
{'CWE-74'}
|
{'https://github.com/matrix-org/matrix-react-sdk', 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}
| null |
npm
|
GHSA-m25q-fwg4-9v2p
|
Malicious Package in awesome_react_utility
|
Version 1.0.2 of `awesome_react_utility` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 1.0.2 of this module is found installed you will want to replace it with a version before or after 1.0.2. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T16:36:57Z
|
2020-09-01T19:47:07Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/618', 'https://github.com/kooinam/awesome_react_utility'}
| null |
npm
|
GHSA-qfh2-6f7q-gr86
|
Cross-Site Scripting in sexstatic
|
All versions of `sexstatic` are vulnerable to stored cross-site scripting (xss). This is exploitable if an attacker can control a filename that is served by `sexstatic`.
## Recommendation
As there is no fix is currently available for this vulnerability it is our recommendation to not install or used this module at this time.
|
{'CVE-2018-3755'}
|
2021-01-08T18:15:58Z
|
2018-10-01T16:30:38Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/advisories/GHSA-qfh2-6f7q-gr86', 'https://hackerone.com/reports/328210', 'https://www.npmjs.com/advisories/671', 'https://nvd.nist.gov/vuln/detail/CVE-2018-3755'}
| null |
npm
|
GHSA-wx69-rvg3-x7fc
|
XSS via prototype pollution in NodeBB
|
### Impact
A prototype pollution vulnerability in the uploader module allowed a malicious user to inject arbitrary data (i.e. javascript) into the DOM, theoretically allowing for an account takeover when used in conjunction with a path traversal vulnerability disclosed at the same time as this report.
### Patches
The vulnerability has been patched as of v1.18.5.
### Workarounds
Cherry-pick commit hash 1783f918bc19568f421473824461ff2ed7755e4c to receive this patch in lieu of a full upgrade.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@nodebb.org](mailto:security@nodebb.org)
|
{'CVE-2021-43787'}
|
2021-12-01T15:07:01Z
|
2021-11-30T22:21:01Z
|
CRITICAL
| null |
{'CWE-79'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43787', 'https://github.com/NodeBB/NodeBB', 'https://github.com/NodeBB/NodeBB/releases/tag/v1.18.5', 'https://github.com/NodeBB/NodeBB/commit/1783f918bc19568f421473824461ff2ed7755e4c', 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-wx69-rvg3-x7fc'}
| null |
npm
|
GHSA-rgfv-v3jh-7ffp
|
Prototype Pollution in deeps
|
All versions of package deeps up to and including version 1.4.5 are vulnerable to Prototype Pollution via the set function.
|
{'CVE-2020-7716'}
|
2021-05-05T18:56:42Z
|
2021-05-06T18:11:52Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7716', 'https://snyk.io/vuln/SNYK-JS-DEEPS-598667'}
| null |
npm
|
GHSA-whcm-29f4-j4mx
|
Directory Traversal in zwserver
|
Affected versions of `zwserver` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16149'}
|
2020-08-31T18:20:46Z
|
2020-09-01T16:56:50Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nodesecurity.io/advisories/372', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/zwserver', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16149', 'https://www.npmjs.com/advisories/372'}
| null |
npm
|
GHSA-w83x-fp72-p9qc
|
Command Injection in geojson2kml
|
All versions up to and including version 0.1.1 of package geojson2kml are vulnerable to Command Injection via the index.js file. PoC: var a =require("geojson2kml"); a("./","& touch JHU",function(){})
|
{'CVE-2020-28429'}
|
2021-05-07T20:58:30Z
|
2021-05-10T15:59:33Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-28429', 'https://snyk.io/vuln/SNYK-JS-GEOJSON2KML-1050412'}
| null |
npm
|
GHSA-4m3p-x2hp-2pgx
|
Malicious Package in bitcroe-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:44:10Z
|
2020-09-04T16:45:23Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1371'}
| null |
npm
|
GHSA-84p7-fh9c-6g8h
|
Prototype Pollution in mixme
|
### Impact
When copying properties from a source object to a target object, the target object can gain access to certain properties of the source object and modify their content.
### Patches
The problem was patch with a more agressive discovery of secured properties to filter out.
| null |
2021-09-16T21:30:18Z
|
2021-09-20T19:52:24Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://github.com/adaltas/node-mixme/issues/1', 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-84p7-fh9c-6g8h', 'https://github.com/advisories/GHSA-79jw-6wg7-r9g4', 'https://github.com/adaltas/node-mixme/commit/db70fe9bcbba451e9f8bd794a9fa7cdfa00125ad', 'https://github.com/adaltas/node-mixme/issues/2', 'https://github.com/adaltas/node-mixme'}
| null |
npm
|
GHSA-8rxg-9g6f-vq9p
|
Malicious Package in another-date-range-picker
|
Version 4.1.48 of `another-date-range-picker` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
If version 4.1.48 of this module is found installed you will want to replace it with a version before or after 4.1.48. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.
| null |
2021-09-24T16:18:50Z
|
2020-09-01T19:46:01Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/617', 'https://github.com/bi-a/mydaterangepicker', 'https://snyk.io/vuln/SNYK-JS-ANOTHERDATERANGEPICKER-451011', 'https://github.com/kekeh/mydaterangepicker'}
| null |
npm
|
GHSA-756f-6j3f-48q9
|
Directory Traversal in calmquist.static-server
|
Affected versions of `calmquist.static-server` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16165'}
|
2020-08-31T18:21:48Z
|
2018-07-23T20:45:51Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/calmquist.static-server', 'https://nodesecurity.io/advisories/398', 'https://github.com/advisories/GHSA-756f-6j3f-48q9', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16165', 'https://www.npmjs.com/advisories/398'}
| null |
npm
|
GHSA-94xh-2fmc-xf5j
|
command injection vulnerability
|
### Impact
command injection vulnerability
### Patches
Problem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.27.11
### Workarounds
If you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetChecksite()
### References
_Are there any links users can visit to find out more?_
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md)
|
{'CVE-2020-7752'}
|
2021-10-08T21:15:35Z
|
2020-10-27T20:30:20Z
|
HIGH
| null |
{'CWE-78'}
|
{'https://github.com/sebhildebrandt/systeminformation/blob/master/lib/internet.js', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7752', 'https://github.com/sebhildebrandt/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-94xh-2fmc-xf5j', 'https://www.npmjs.com/package/systeminformation', 'https://github.com/sebhildebrandt/systeminformation/commit/931fecaec2c1a7dcc10457bb8cd552d08089da61', 'https://snyk.io/vuln/SNYK-JS-SYSTEMINFORMATION-1021909'}
| null |
npm
|
GHSA-xf64-2f9p-6pqq
|
Information Exposure in type-graphql
|
Versions of `type-graphql` prior to 0.17.6 are vulnerable to Information Exposure. The package leaks the resolver source code in an error message. It is possible to force this error when no subscription topics are provided in the request.
## Recommendation
Upgrade to version 0.17.6 or later.
| null |
2020-08-31T18:59:32Z
|
2020-09-04T17:24:08Z
|
LOW
| null |
{'CWE-209'}
|
{'https://github.com/MichalLytek/type-graphql/issues/489', 'https://www.npmjs.com/advisories/1444'}
| null |
npm
|
GHSA-7q9f-x6rm-qmxr
|
Command Injection in compass-compile
|
compass-compile through 0.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
|
{'CVE-2020-7635'}
|
2022-02-24T18:19:11Z
|
2021-12-09T19:27:46Z
|
CRITICAL
| null |
{'CWE-74'}
|
{'https://github.com/quaertym/compass-compile', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7635', 'https://github.com/quaertym/compass-compile/blob/master/lib/compass.js#L25', 'https://snyk.io/vuln/SNYK-JS-COMPASSCOMPILE-564429'}
| null |
npm
|
GHSA-f2rc-6xjq-95gq
|
Directory Traversal in shenliru
|
Affected versions of `shenliru` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16161'}
|
2020-08-31T18:21:26Z
|
2020-09-01T17:24:57Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16161', 'https://nodesecurity.io/advisories/389', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/shenliru', 'https://www.npmjs.com/advisories/389'}
| null |
npm
|
GHSA-jh67-3wqw-cvhr
|
Malicious Package in js-sxa3
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-10-01T14:35:02Z
|
2020-09-03T23:13:52Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1293'}
| null |
npm
|
GHSA-qj73-v688-wqxf
|
Hijacked Environment Variables in proxy.js
|
The `proxy.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16076'}
|
2020-08-31T18:26:04Z
|
2018-08-29T23:19:13Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://github.com/advisories/GHSA-qj73-v688-wqxf', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16076', 'https://nodesecurity.io/advisories/515', 'https://www.npmjs.com/advisories/515'}
| null |
npm
|
GHSA-pgmg-gf5p-54j8
|
Prototype Pollution in gammautils
|
"All versions of package gammautils up to and including version 0.0.81 are vulnerable to Prototype Pollution via the deepSet and deepMerge functions."
|
{'CVE-2020-7718'}
|
2021-05-05T18:05:47Z
|
2021-05-06T18:26:14Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-GAMMAUTILS-598670', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7718'}
| null |
npm
|
GHSA-rjf2-j2r6-q8gr
|
Prototype Pollution in vm2
|
This affects the package vm2 before 3.9.4. Prototype Pollution attack vector can lead to sandbox escape and execution of arbitrary code on the host machine.
|
{'CVE-2021-23449'}
|
2021-10-19T14:18:05Z
|
2021-10-19T15:28:45Z
|
CRITICAL
| null |
{'CWE-915', 'CWE-1321'}
|
{'https://github.com/patriksimek/vm2/releases/tag/3.9.4', 'https://security.netapp.com/advisory/ntap-20211029-0010/', 'https://github.com/patriksimek/vm2/issues/363', 'https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886', 'https://snyk.io/vuln/SNYK-JS-VM2-1585918', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23449', 'https://github.com/patriksimek/vm2'}
| null |
npm
|
GHSA-cpgr-wmr9-qxv4
|
Cross-Site Scripting in serve
|
Versions of `serve` prior to 10.0.2 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
Upgrade to version 10.0.2 or later.
| null |
2020-08-31T18:43:20Z
|
2020-09-11T21:20:14Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/992', 'https://hackerone.com/reports/398285'}
| null |
npm
|
GHSA-3vg2-4qxc-ch4j
|
Directory Traversal in unicorn-list
|
Affected versions of `unicorn-list` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16131'}
|
2020-08-31T18:24:38Z
|
2018-07-23T20:49:38Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/unicorn-list', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16131', 'https://github.com/advisories/GHSA-3vg2-4qxc-ch4j', 'https://www.npmjs.com/advisories/477', 'https://nodesecurity.io/advisories/477'}
| null |
npm
|
GHSA-m52x-29pq-w3vv
|
Cross-Site Scripting in pannellum
|
Versions of `pannellum ` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser.
## Recommendation
Upgrade to version 2.5.6 or later.
|
{'CVE-2019-16763'}
|
2021-01-08T18:31:10Z
|
2019-11-22T18:18:03Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914', 'https://www.npmjs.com/advisories/1418', 'https://github.com/advisories/GHSA-m52x-29pq-w3vv', 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763'}
| null |
npm
|
GHSA-646x-m363-9rh4
|
Hijacked Environment Variables in node-opensl
|
The `node-opensl` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16063'}
|
2020-08-31T18:25:36Z
|
2018-10-03T20:27:55Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/502', 'https://nodesecurity.io/advisories/502', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16063', 'https://github.com/advisories/GHSA-646x-m363-9rh4'}
| null |
npm
|
GHSA-gf8v-vxf9-7c66
|
Downloads Resources over HTTP in cloudpub-redis
|
Affected versions of `cloudpub-redis` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cloudpub-redis`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10672'}
|
2021-01-08T18:47:43Z
|
2019-02-18T23:44:26Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/282', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10672', 'https://nodesecurity.io/advisories/282', 'https://github.com/advisories/GHSA-gf8v-vxf9-7c66'}
| null |
npm
|
GHSA-2f29-pmpx-vj62
|
Directory Traversal in serverwg
|
`serverwg` is a simple http server.
`serverwg` is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL.
Example request:
```
GET /../../../../../../../../../../etc/passwd HTTP/1.1
host:foo
```
and response:
```
HTTP/1.1 200 OK
Date: Wed, 17 May 2017 22:52:08 GMT
Connection: keep-alive
{contents of /etc/passwd}
```
## Recommendation
No patch is available for this vulnerability.
It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
{'CVE-2017-16101'}
|
2020-08-31T18:20:32Z
|
2020-09-01T16:52:33Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16101', 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwg', 'https://nodesecurity.io/advisories/364', 'https://www.npmjs.com/advisories/364'}
| null |
npm
|
GHSA-3rh7-vm4x-q2hp
|
Hijacked Environment Variables in sqlserver
|
The `sqlserver` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16055'}
|
2020-08-31T18:24:59Z
|
2018-11-09T17:49:22Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/486', 'https://nodesecurity.io/advisories/486', 'https://github.com/advisories/GHSA-3rh7-vm4x-q2hp', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16055'}
| null |
npm
|
GHSA-8j65-4pcq-xq95
|
Options structure open to XSS if passed unfiltered
|
### Impact
In Highcharts versions 8 and earlier, the chart options structure was not systematically filtered for XSS vectors. The potential impact was that content from untrusted sources could execute code in the end user's browser. Especially when using the `useHTML` flag, HTML string options would be inserted unfiltered directly into the DOM. When `useHTML` was false, malicious code could be inserted by using various character replacement tricks or malformed HTML.
If your chart configuration comes from a trusted source like a static setup or pre-filtered HTML (or no markup at all in the configuration), you are not impacted.
### Patches
In version 9, the whole rendering layer was refactored to use an DOMParser, an AST and tag and HTML allow-listing to make sure only safe content entered the DOM. In addition, prototype pollution was stopped.
### Workarounds
Implementers who are not able to upgrade may apply [DOMPurify](https://github.com/cure53/DOMPurify) recursively [to the options structure](https://jsfiddle.net/highcharts/zd3wcm5L/) to filter out malicious markup.
### References
* Details on the improved [Highcharts security](https://www.highcharts.com/docs/chart-concepts/security)
* [The AST and TextBuilder refactoring](https://github.com/highcharts/highcharts/pull/14913)
* [The fix for prototype pollution](https://github.com/highcharts/highcharts/pull/14884)
### For more information
If you have any questions or comments about this advisory:
* Visit our [support page](https://www.highcharts.com/blog/support/)
* For more Email us at [security@highcharts.com](mailto:security@highcharts.com)
|
{'CVE-2021-29489'}
|
2021-05-05T15:37:11Z
|
2021-05-06T15:45:03Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/package/highcharts', 'https://security.netapp.com/advisory/ntap-20210622-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29489', 'https://github.com/highcharts/highcharts/security/advisories/GHSA-8j65-4pcq-xq95'}
| null |
npm
|
GHSA-wg5r-c793-w5w2
|
Downloads Resources over HTTP in mystem-wrapper
|
Affected versions of `mystem-wrapper` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem-wrapper`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10671'}
|
2021-01-08T01:56:50Z
|
2019-02-18T23:44:28Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10671', 'https://www.npmjs.com/advisories/280', 'https://github.com/advisories/GHSA-wg5r-c793-w5w2', 'https://nodesecurity.io/advisories/280'}
| null |
npm
|
GHSA-3ww4-cp53-6g2x
|
Cross Site Request Forgery in kindeditor
|
Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:/examples/uploadbutton.html) and then use the authority of this website to trick users into clicking your malicious html link.
|
{'CVE-2021-42228'}
|
2021-10-21T14:56:51Z
|
2021-10-18T19:44:06Z
|
HIGH
| null |
{'CWE-352'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-42228', 'https://github.com/kindsoft/kindeditor', 'https://github.com/kindsoft/kindeditor/issues/337'}
| null |
npm
|
GHSA-vx3p-948g-6vhq
|
Regular Expression Denial of Service (ReDoS)
|
npm `ssri` 5.2.2-6.0.1 and 7.0.0-8.0.0, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option.
|
{'CVE-2021-27290'}
|
2021-10-21T17:38:11Z
|
2021-03-19T21:24:36Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/yetingli/SaveResults/blob/main/pdf/ssri-redos.pdf', 'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/npm/ssri/commit/b30dfdb00bb94ddc49a25a85a18fb27afafdfbb1', 'https://github.com/npm/ssri/pull/20#issuecomment-842677644', 'https://doyensec.com/resources/Doyensec_Advisory_ssri_redos.pdf', 'https://github.com/npm/ssri/commit/76e223317d971f19e4db8191865bdad5edee40d2', 'https://github.com/npm/ssri', 'https://npmjs.com', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27290', 'https://www.npmjs.com/package/ssri'}
| null |
npm
|
GHSA-j6x7-42x2-hpcf
|
Malicious Package in buffer-xoz
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:15:09Z
|
2020-09-03T22:14:20Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1253'}
| null |
npm
|
GHSA-4q2f-8g74-qm56
|
Cross-Site Scripting in takeapeek
|
All versions of `takeapeek` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code.
## Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
| null |
2020-08-31T18:45:01Z
|
2020-09-03T17:18:05Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/1038', 'https://hackerone.com/reports/490728'}
| null |
npm
|
GHSA-9mmw-3fmh-96g3
|
Malicious Package in calk
|
All versions of `calk` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.
## Recommendation
Remove the package from your dependencies and always ensure package names are typed correctly upon installation.
| null |
2021-10-01T14:03:32Z
|
2020-09-02T20:23:38Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/855'}
| null |
npm
|
GHSA-43f8-2h32-f4cj
|
Regular Expression Denial of Service in hosted-git-info
|
The npm package `hosted-git-info` before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity
|
{'CVE-2021-23362'}
|
2022-03-18T20:25:44Z
|
2021-05-06T16:10:39Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf', 'https://github.com/npm/hosted-git-info/commit/bede0dc38e1785e732bf0a48ba6f81a4a908eba3', 'https://github.com/npm/hosted-git-info/pull/76', 'https://github.com/npm/hosted-git-info/commits/v2', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1088356', 'https://github.com/npm/hosted-git-info/commit/29adfe5ef789784c861b2cdeb15051ec2ba651a7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23362', 'https://github.com/npm/hosted-git-info', 'https://github.com/npm/hosted-git-info/commit/8d4b3697d79bcd89cdb36d1db165e3696c783a01', 'https://snyk.io/vuln/SNYK-JS-HOSTEDGITINFO-1088355'}
| null |
npm
|
GHSA-67mq-h2r9-rh2m
|
Prototype pollution in multi-ini
|
This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448.
|
{'CVE-2020-28460'}
|
2021-04-07T23:23:09Z
|
2021-04-13T15:23:41Z
|
HIGH
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28460', 'https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde'}
| null |
npm
|
GHSA-mw6q-98mp-g8g8
|
Cross-site Scripting in bootstrap-table
|
This affects all versions of package bootstrap-table. A type confusion vulnerability can lead to a bypass of input sanitization when the input provided to the escapeHTML function is an array (instead of a string) even if the escape attribute is set.
|
{'CVE-2021-23472'}
|
2021-11-04T17:00:48Z
|
2021-11-08T17:54:46Z
|
LOW
| null |
{'CWE-79', 'CWE-843'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23472', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBWENZHIXIN-1910687', 'https://github.com/wenzhixin/bootstrap-table', 'https://security.snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1910688', 'https://snyk.io/vuln/SNYK-JS-BOOTSTRAPTABLE-1657597', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1910690', 'https://github.com/wenzhixin/bootstrap-table/blob/develop/src/utils/index.js%23L218', 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1910689'}
| null |
npm
|
GHSA-4whq-r978-2x68
|
Arbitrary code execution in ExifTool
|
### Impact
Arbitrary code execution can occur when running `exiftool` against files with hostile metadata payloads.
### Patches
ExifTool has already been patched in version 12.24. exiftool-vendored, which vendors ExifTool, includes this patch in v14.3.0.
### Workarounds
No.
### References
https://twitter.com/wcbowling/status/1385803927321415687
https://nvd.nist.gov/vuln/detail/CVE-2021-22204
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [exiftool-vendored](https://github.com/photostructure/exiftool-vendored.js)
| null |
2021-10-08T21:20:43Z
|
2021-05-04T17:43:52Z
|
HIGH
| null |
{'CWE-74'}
|
{'https://github.com/photostructure/exiftool-vendored.js/security/advisories/GHSA-4whq-r978-2x68', 'https://github.com/photostructure/exiftool-vendored.js'}
| null |
npm
|
GHSA-v6wh-2wvh-c8x5
|
Regular Expression Denial of Service in djvalidator
|
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, --@------------------------------------------------------------------------------------------------------------------------!.
|
{'CVE-2020-7779'}
|
2022-02-09T23:15:46Z
|
2022-02-09T23:15:46Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7779', 'https://snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709'}
| null |
npm
|
GHSA-5rrq-pxf6-6jx5
|
Prototype Pollution in node-forge debug API.
|
### Impact
The `forge.debug` API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable way.
### Patches
The `forge.debug` API and related functions were removed in 1.0.0.
### Workarounds
Don't use the `forge.debug` API directly or indirectly with untrusted input.
### References
- https://www.huntr.dev/bounties/1-npm-node-forge/
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [forge](https://github.com/digitalbazaar/forge).
* Email us at support@digitalbazaar.com.
| null |
2022-01-07T22:20:53Z
|
2022-01-08T00:22:42Z
|
LOW
| null |
{'CWE-1321'}
|
{'https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5', 'https://github.com/digitalbazaar/forge'}
| null |
npm
|
GHSA-8v38-pw62-9cw2
|
Incorrect returned href via an '@' sign but no user info and hostname
|
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,
`````
parse(\"http://@/127.0.0.1\")
`````
Will return:
`````
{
slashes: true,
protocol: 'http:',
hash: '',
query: '',
pathname: '/127.0.0.1',
auth: '',
host: '',
port: '',
hostname: '',
password: '',
username: '',
origin: 'null',
href: 'http:///127.0.0.1'
}
`````
If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.
|
{'CVE-2022-0639'}
|
2022-03-11T22:48:39Z
|
2022-02-18T00:00:33Z
|
MODERATE
| null |
{'CWE-639'}
|
{'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639', 'https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155', 'https://github.com/unshiftio/url-parse'}
| null |
npm
|
GHSA-48hw-37g6-3gw4
|
Malicious Package in mx-nested-menu
|
Version 0.1.30 of `mx-nested-menu` contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=`
## Recommendation
Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.
| null |
2020-08-31T18:41:33Z
|
2020-09-03T02:35:41Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/947'}
| null |
npm
|
GHSA-7wpw-2hjm-89gp
|
Prototype Pollution in merge
|
All versions of package merge <2.1.1 are vulnerable to Prototype Pollution via _recursiveMerge .
|
{'CVE-2020-28499'}
|
2021-05-04T20:20:28Z
|
2021-05-04T20:18:47Z
|
HIGH
| null |
{'CWE-915'}
|
{'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1071049', 'https://github.com/yeikos/js.merge/blob/master/src/index.ts%23L64', 'https://vuldb.com/?id.170146', 'https://github.com/yeikos/js.merge/blob/56ca75b2dd0f2820f1e08a49f62f04bbfb8c5f8f/src/index.ts#L64', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28499', 'https://github.com/yeikos/js.merge/commit/7b0ddc2701d813f2ba289b32d6a4b9d4cc235fb4', 'https://snyk.io/vuln/SNYK-JS-MERGE-1042987'}
| null |
npm
|
GHSA-wjpc-cgvw-xx23
|
Prototype Pollution in sey
|
All versions of package `sey` are vulnerable to Prototype Pollution via the deepmerge() function.
|
{'CVE-2021-23663'}
|
2021-12-15T15:26:31Z
|
2021-12-16T14:29:34Z
|
MODERATE
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-SEY-1727592', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23663', 'https://github.com/eserozvataf/sey'}
| null |
npm
|
GHSA-pv55-r6j3-wp94
|
Malicious Package in eslint-config-eslint
|
Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server.
## Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
| null |
2020-08-31T18:32:17Z
|
2020-09-01T20:45:57Z
|
CRITICAL
| null | null |
{'https://www.npmjs.com/advisories/674'}
| null |
npm
|
GHSA-6956-83fg-5wc5
|
Prototype Pollution in set-in
|
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
|
{'CVE-2022-25354'}
|
2022-03-29T21:05:15Z
|
2022-03-18T00:01:11Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://snyk.io/vuln/SNYK-JS-SETIN-2388571', 'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354', 'https://github.com/ahdinosaur/set-in/blob/dfc226d95cce8129de6708661e06e0c2c06f3490/index.js%23L5', 'https://github.com/ahdinosaur/set-in'}
| null |
npm
|
GHSA-p9f8-gqjf-m75j
|
Uncontrolled Resource Consumption in fastify-multipart
|
Prototype pollution vulnerability in `fastify-multipart` < 1.0.5 allows an attacker to crash fastify applications parsing multipart requests by sending a specially crafted request.
|
{'CVE-2020-8136'}
|
2021-05-26T20:05:47Z
|
2021-05-06T17:28:36Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://hackerone.com/reports/804772', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8136'}
| null |
npm
|
GHSA-3r9x-mjrm-2725
|
Prototype pollution vulnerability in 'libnested'
|
Prototype pollution vulnerability in 'libnested' versions 0.0.0 through 1.5.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2020-28283'}
|
2021-10-08T22:09:39Z
|
2021-10-12T16:27:02Z
|
CRITICAL
| null | null |
{'https://github.com/dominictarr/libnested/blob/d028a1b0f2e5f16fc28e568f52b936ae0bca0647/index.js#L27', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2020-28284', 'https://github.com/dominictarr/libnested', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28283'}
| null |
npm
|
GHSA-cxmj-qjv6-vx9p
|
Low severity vulnerability that affects mcstatic
|
A server directory traversal vulnerability was found on node module mcstatic <=0.0.20 that would allow an attack to access sensitive information in the file system by appending slashes in the URL path.
|
{'CVE-2018-16482'}
|
2020-06-16T21:33:14Z
|
2019-02-07T18:15:44Z
|
LOW
| null |
{'CWE-22'}
|
{'https://github.com/advisories/GHSA-cxmj-qjv6-vx9p', 'https://nvd.nist.gov/vuln/detail/CVE-2018-16482', 'https://hackerone.com/reports/330285'}
| null |
npm
|
GHSA-wgfq-7857-4jcc
|
Uncontrolled Resource Consumption in json-bigint
|
Prototype pollution in json-bigint npm package < 1.0.0 may lead to a denial-of-service (DoS) attack.
|
{'CVE-2020-8237'}
|
2021-04-28T16:57:11Z
|
2021-05-07T16:47:19Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8237', 'https://hackerone.com/reports/916430'}
| null |
npm
|
GHSA-qx2f-477c-35rq
|
Regular Expression Denial of Service in method-override
|
Affected versions of `method-override` are vulnerable to a regular expression denial of service vulnerability when untrusted user input is passed into the `X-HTTP-Method-Override` header.
## Recommendation
Update to version 2.3.10 or later
|
{'CVE-2017-16136'}
|
2020-08-31T18:26:56Z
|
2018-07-24T20:06:04Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/advisories/GHSA-qx2f-477c-35rq', 'https://nodesecurity.io/advisories/538', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16136', 'https://www.npmjs.com/advisories/538'}
| null |
npm
|
GHSA-hwh3-fhf6-73x9
|
Malicious Package in bictoinjs-lib
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:38:19Z
|
2020-09-04T15:36:09Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1356'}
| null |
npm
|
GHSA-4xcv-9jjx-gfj3
|
Denial of Service in mem
|
Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging.
## Recommendation
Upgrade to version 4.0.0 or later.
| null |
2021-08-17T15:44:45Z
|
2019-07-05T21:07:58Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://snyk.io/vuln/npm:mem:20180117', 'https://www.npmjs.com/advisories/1084', 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744', 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}
| null |
npm
|
GHSA-8gc6-65mm-xr6r
|
Malicious Package in bp66
|
All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-10-01T20:44:26Z
|
2020-09-04T16:46:28Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1372'}
| null |
npm
|
GHSA-rc4q-9m69-gqp8
|
Lack of protection against cookie tossing attacks in fastify-csrf
|
### Impact
Users that used fastify-csrf with the "double submit" mechanism using cookies with an application deployed across multiple subdomains, e.g. "heroku"-style platform as a service.
### Patches
Version 3.1.0 of the fastify-csrf fixes it.
See https://github.com/fastify/fastify-csrf/pull/51 and https://github.com/fastify/csrf/pull/2.
The user of the module would need to supply a `userInfo` when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains.
### Workarounds
None available.
### References
1. https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
2. https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf
### Credits
This vulnerability was found by Xhelal Likaj <xhelallikaj20@gmail.com>.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [fastify-csrf](https://github.com/fastify/fastify-csrf)
* Email us at [hello@matteocollina.com](mailto:hello@matteocollina.com)
|
{'CVE-2021-29624'}
|
2021-05-17T20:29:48Z
|
2021-05-17T20:53:30Z
|
MODERATE
| null |
{'CWE-352', 'CWE-565'}
|
{'https://github.com/fastify/fastify-csrf/releases/tag/v3.1.0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29624', 'https://github.com/fastify/csrf/pull/2', 'https://github.com/fastify/fastify-csrf/security/advisories/GHSA-rc4q-9m69-gqp8', 'https://owasp.org/www-pdf-archive/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf', 'https://github.com/fastify/fastify-csrf/pull/51', 'https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html'}
| null |
npm
|
GHSA-f7ph-p5rv-phw2
|
Cross-Site Scripting in nunjucks
|
Affected versions of `nunjucks` do not properly escape specially structured user input in template vars when in auto-escape mode, resulting in a cross-site scripting vulnerability.
## Proof of Concept
By using an array for the keys in a template var, escaping is bypassed.
```javascript
name[]=<script>alert(1)</script>
```
A full PoC is available in the references section.
## Recommendation
Update to version 2.4.3 or later.
|
{'CVE-2016-10547'}
|
2020-08-31T18:12:27Z
|
2018-11-06T23:13:37Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/147', 'https://github.com/advisories/GHSA-f7ph-p5rv-phw2', 'https://github.com/matt-/nunjucks_test', 'https://github.com/mozilla/nunjucks/issues/835', 'https://nodesecurity.io/advisories/147', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10547'}
| null |
npm
|
GHSA-6vwx-mwp8-fh44
|
Cross-site Scripting in reveal.js
|
Insufficient validation in cross-origin communication (postMessage) in reveal.js version 3.9.1 and earlier allow attackers to perform cross-site scripting attacks.
|
{'CVE-2020-8127'}
|
2021-04-20T22:02:07Z
|
2021-05-10T18:47:10Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://hackerone.com/reports/691977', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8127'}
| null |
npm
|
GHSA-qg8p-v9q4-gh34
|
Potential Command Injection in shell-quote
|
Affected versions of `shell-quote` do not properly escape command line arguments, which may result in command injection if the library is used to escape user input destined for use as command line arguments.
## Proof of Concept:
The following characters are not escaped properly: `>`,`;`,`{`,`}`
Bash has a neat but not well known feature known as "Bash Brace Expansion", wherein a sub-command can be executed without spaces by running it between a set of `{}` and using the `,` instead of ` ` to seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible.
```
const quote = require('shell-quote').quote;
console.log(quote(['a;{echo,test,123,234}']));
// Actual "a;{echo,test,123,234}"
// Expected "a\;\{echo,test,123,234\}"
// Functional Equivalent "a; echo 'test' '123' '1234'"
```
## Recommendation
Update to version 1.6.1 or later.
|
{'CVE-2016-10541'}
|
2020-08-31T18:11:23Z
|
2019-02-18T23:58:29Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2016-10541', 'https://www.npmjs.com/advisories/117', 'https://github.com/advisories/GHSA-qg8p-v9q4-gh34', 'https://nodesecurity.io/advisories/117'}
| null |
npm
|
GHSA-5327-gfq5-8f4m
|
Malicious Package in buffer-xmr
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:04:17Z
|
2020-09-03T21:56:23Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1246'}
| null |
npm
|
GHSA-27gm-ghr9-4v95
|
Cross-site scripting vulnerability in TinyMCE
|
### Impact
A cross-site scripting (XSS) vulnerability was discovered in: the core parser, `paste` and `visualchars` plugins. The vulnerability allowed arbitrary JavaScript execution when inserting a specially crafted piece of content into the editor via the clipboard or APIs. This impacts all users who are using TinyMCE 4.9.6 or lower and TinyMCE 5.1.3 or lower.
### Patches
This vulnerability has been patched in TinyMCE 4.9.7 and 5.1.4 by improved parser logic and HTML sanitization.
### Workarounds
The workarounds available are:
- disable the impacted plugins
- manually sanitize the content using the `BeforeSetContent` event (see below)
- upgrade to either TinyMCE 4.9.7 or TinyMCE 5.1.4
#### Example: Manually sanitize content
```js
editor.on('BeforeSetContent', function(e) {
var sanitizedContent = ...; // Manually sanitize content here
e.content = sanitizedContent;
});
```
### Acknowledgements
Tiny Technologies would like to thank Michał Bentkowski for discovering this vulnerability.
### References
https://www.tiny.cloud/docs/release-notes/release-notes514/#securityfixes
### For more information
If you have any questions or comments about this advisory:
* Open an issue in the [TinyMCE repo](https://github.com/tinymce/tinymce/issues)
* Email us at [infosec@tiny.cloud](mailto:infosec@tiny.cloud)
| null |
2021-10-08T21:26:37Z
|
2020-01-30T21:22:15Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/tinymce/tinymce', 'https://github.com/tinymce/tinymce/security/advisories/GHSA-27gm-ghr9-4v95'}
| null |
npm
|
GHSA-cr56-66mx-293v
|
Cross-Site Scripting in @toast-ui/editor
|
Versions of `@toast-ui/editor` prior to 2.2.0 are vulnerable to Cross-Site Scripting (XSS). There are multiple bypasses to the package's built-in XSS sanitization. This may allow attackers to execute arbitrary JavaScript on a victim's browser.
## Recommendation
Upgrade to version 2.2.0 or later.
| null |
2021-10-04T21:12:14Z
|
2020-09-03T15:53:50Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://github.com/nhn/tui.editor', 'https://www.npmjs.com/advisories/1521', 'https://github.com/nhn/tui.editor/pull/1010', 'https://github.com/nhn/tui.editor/issues/733'}
| null |
npm
|
GHSA-333x-9vgq-v2j4
|
Directory Traversal in geddy
|
Versions 13.0.8 and earlier of geddy are vulnerable to a directory traversal attack via URI encoded attack vectors.
### Proof of Concept
```
http://localhost:4000/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd
```
## Recommendation
Update geddy to version >= 13.0.8
|
{'CVE-2015-5688'}
|
2021-08-31T20:33:50Z
|
2017-10-24T18:33:36Z
|
HIGH
| null |
{'CWE-22'}
|
{'https://github.com/geddy/geddy/issues/697', 'https://www.npmjs.com/advisories/10', 'https://github.com/advisories/GHSA-333x-9vgq-v2j4', 'https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231', 'https://nodesecurity.io/advisories/geddy-directory-traversal', 'https://github.com/geddy/geddy/releases/tag/v13.0.8', 'https://github.com/geddy/geddy', 'https://github.com/geddy/geddy/pull/699', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5688'}
| null |
npm
|
GHSA-32x6-qvw6-mxj4
|
Forwarding of confidentials headers to third parties in fluture-node
|
### Impact
Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing.
### Patches
The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin.
### Workarounds
Use a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2.
### References
- This vulnerability was discovered after the announcement of similar vulnerabilities in the `follow-redirects` package. There is more information there: https://github.com/advisories/GHSA-74fj-2j2h-c42q and https://huntr.dev/bounties/7cf2bf90-52da-4d59-8028-a73b132de0db/
- Fixed in 125e4474f910c1507f8ec3232848626fbc0f55c4 and 0c99bc511533d48be17dc6bfe641f7d0aeb34d77
|
{'CVE-2022-24719'}
|
2022-03-15T18:05:24Z
|
2022-03-01T22:14:57Z
|
LOW
| null |
{'CWE-359', 'CWE-601', 'CWE-200'}
|
{'https://github.com/fluture-js/fluture-node/commit/0c99bc511533d48be17dc6bfe641f7d0aeb34d77', 'https://github.com/fluture-js/fluture-node/commit/125e4474f910c1507f8ec3232848626fbc0f55c4', 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4', 'https://github.com/psf/requests/pull/4718', 'https://github.com/fluture-js/fluture-node', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719'}
| null |
npm
|
GHSA-6chw-6frg-f759
|
Regular Expression Denial of Service in Acorn
|
Affected versions of acorn are vulnerable to Regular Expression Denial of Service.
A regex in the form of /[x-\ud800]/u causes the parser to enter an infinite loop.
The string is not valid UTF16 which usually results in it being sanitized before reaching the parser.
If an application processes untrusted input and passes it directly to acorn,
attackers may leverage the vulnerability leading to Denial of Service.
| null |
2021-08-23T15:10:32Z
|
2020-04-03T21:48:38Z
|
HIGH
| null |
{'CWE-400'}
|
{'https://github.com/acornjs/acorn/commit/793c0e569ed1158672e3a40aeed1d8518832b802', 'https://github.com/acornjs/acorn/issues/929', 'https://www.npmjs.com/advisories/1488', 'https://snyk.io/vuln/SNYK-JS-ACORN-559469'}
| null |
npm
|
GHSA-8xwg-wv7v-4vqp
|
Code Execution by Re-enabling Node.js integration in electron
|
Versions of electron
A vulnerability has been discovered which allows Node.js integration to be re-enabled in some Electron applications that disable it.
For the application to be impacted by this vulnerability it must meet all of these conditions
- Runs on Electron 1.7, 1.8, or a 2.0.0-beta
- Allows execution of arbitrary remote code
- Disables Node.js integration
- Does not explicitly declare webviewTag: false in its webPreferences
- Does not enable the nativeWindowOption option
- Does not intercept new-window events and manually override event.newGuest without using the supplied options tag
## Recommendation
Update to `electron` version 1.7.13, 1.8.4, or 2.0.0.beta.5 or later
If you are unable to update your Electron version can mitigate the vulnerability with the following code.
```
app.on('web-contents-created', (event, win) => {
win.on('new-window', (event, newURL, frameName, disposition,
options, additionalFeatures) => {
if (!options.webPreferences) options.webPreferences = {};
options.webPreferences.nodeIntegration = false;
options.webPreferences.nodeIntegrationInWorker = false;
options.webPreferences.webviewTag = false;
delete options.webPreferences.preload;
})
})
// and *IF* you don't use WebViews at all,
// you might also want
app.on('web-contents-created', (event, win) => {
win.on('will-attach-webview', (event, webPreferences, params) => {
event.preventDefault();
})
})
```
|
{'CVE-2018-1000136'}
|
2021-06-11T15:17:23Z
|
2018-03-26T16:41:17Z
|
HIGH
| null |
{'CWE-20'}
|
{'https://github.com/advisories/GHSA-8xwg-wv7v-4vqp', 'https://www.trustwave.com/Resources/SpiderLabs-Blog/CVE-2018-1000136---Electron-nodeIntegration-Bypass/', 'https://www.npmjs.com/advisories/574', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000136', 'https://www.electronjs.org/blog/webview-fix', 'https://electronjs.org/blog/webview-fix'}
| null |
npm
|
GHSA-3qh4-r86r-grvm
|
Arbitrary JavaScript Execution in typed-function
|
Versions of `typed-function` prior to 0.10.6 are vulnerable to Arbitrary JavaScript Execution. Function names are not properly sanitized and may allow an attacker to execute arbitrary code.
## Recommendation
Upgrade to version 0.10.6 or later.
|
{'CVE-2017-1001004'}
|
2020-08-31T18:36:57Z
|
2020-09-02T18:24:39Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe?diff=split#diff-9e1f22c2954a38db1fdf444dbc74e0a8', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1001004', 'https://www.npmjs.com/advisories/819', 'https://github.com/josdejong/typed-function/commit/6478ef4f2c3f3c2d9f2c820e2db4b4ba3425e6fe', 'https://github.com/josdejong/typed-function/blob/master/HISTORY.md#2017-11-18-version-0106', 'https://snyk.io/vuln/SNYK-JS-TYPEDFUNCTION-174139'}
| null |
npm
|
GHSA-9r3m-mhfm-39cm
|
Incorrect Calculation in bigint-money
|
Versions of `bigint-money` prior to 0.6.2 are vulnerable to an Incorrect Calculation. The package incorrectly rounded certain numbers, which could have drastic consequences due to its usage in financial systems.
## Recommendation
Upgrade to version 0.6.2 or later.
| null |
2020-08-31T18:42:08Z
|
2020-09-11T21:10:29Z
|
LOW
| null |
{'CWE-682'}
|
{'https://www.npmjs.com/advisories/962'}
| null |
npm
|
GHSA-33rv-m2gp-mm2r
|
Prototype pollution in safe-flat
|
Prototype pollution vulnerability in 'safe-flat' versions 2.0.0 through 2.0.1 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25927'}
|
2021-05-20T21:34:56Z
|
2021-06-21T17:18:29Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25927', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25927', 'https://github.com/jessie-codes/safe-flat/commit/4b9b7db976bba8c968354f4315f5f9c219b7cbf3'}
| null |
npm
|
GHSA-6226-h7ff-ch6c
|
Widget feature vulnerability allowing to execute JavaScript code using undo functionality
|
### Affected packages
The vulnerability has been discovered in [Widget](https://ckeditor.com/cke4/addon/clipboard) plugin if used alongside [Undo](https://ckeditor.com/cke4/addon/undo) feature.
### Impact
A potential vulnerability has been discovered in CKEditor 4 [Widget](https://ckeditor.com/cke4/addon/widget) package. The vulnerability allowed to abuse undo functionality using malformed widget HTML, which could result in executing JavaScript code. It affects all users using the CKEditor 4 plugins listed above at version >= 4.13.0.
### Patches
The problem has been recognized and patched. The fix will be available in version 4.16.2.
### For more information
Email us at security@cksource.com if you have any questions or comments about this advisory.
### Acknowledgements
The CKEditor 4 team would like to thank Anton Subbotin ([skavans](https://github.com/skavans)) for recognizing and reporting this vulnerability.
|
{'CVE-2021-32808'}
|
2022-02-08T21:01:57Z
|
2021-08-23T19:40:48Z
|
HIGH
| null |
{'CWE-79'}
|
{'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYA354LJP47KCVJMTUO77ZCX3ZK42G3T/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32808', 'https://github.com/ckeditor/ckeditor4/releases/tag/4.16.2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WAGNWHFIQAVCP537KFFS2A2GDG66J7XD/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVOYN2WKDPLKCNILIGEZM236ABQASLGW/', 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/ckeditor/ckeditor4'}
| null |
npm
|
GHSA-8jf2-cq6v-w234
|
Malicious Package in uglyfi.js
|
Version 0.17.3 of `uglyfi.js` contains malicious code as a preinstall script. The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. When installed, the package downloads a file from a remote server, executes it and opens a backdoor.
## Recommendation
Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.
The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
| null |
2021-09-29T20:47:08Z
|
2020-09-03T21:10:53Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1202'}
| null |
npm
|
GHSA-hhfg-6hfc-rvxm
|
Regular Expression Denial of Service in jsoneditor
|
JSON Editor is a web-based tool to view, edit, format, and validate JSON. It has various modes such as a tree editor, a code editor, and a plain text editor. The jsoneditor package is vulnerable to ReDoS (regular expression denial of service). An attacker that is able to provide a crafted element as input to the getInnerText function may cause an application to consume an excessive amount of CPU. Below pinned line using vulnerable regex.
|
{'CVE-2021-3822'}
|
2022-05-04T03:39:38Z
|
2021-09-29T17:15:55Z
|
MODERATE
| null |
{'CWE-400', 'CWE-697', 'CWE-1333'}
|
{'https://github.com/josdejong/jsoneditor', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3822', 'https://huntr.dev/bounties/1e3ed803-b7ed-42f1-a4ea-c4c75da9de73', 'https://github.com/josdejong/jsoneditor/commit/092e386cf49f2a1450625617da8e0137ed067c3e'}
| null |
npm
|
GHSA-hvgc-mggg-pxr2
|
Malicious Package in js-sha7
|
Version 0.8.0 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-30T17:12:40Z
|
2020-09-03T23:02:33Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1284'}
| null |
npm
|
GHSA-gjwp-7v3g-99pj
|
Cross-site Request Forgery (CSRF) in joplin
|
The package joplin before 2.3.2 are vulnerable to Cross-site Request Forgery (CSRF) due to missing CSRF checks in various forms.
|
{'CVE-2021-23431'}
|
2021-08-25T18:00:40Z
|
2021-09-02T17:09:05Z
|
MODERATE
| null |
{'CWE-352'}
|
{'https://github.com/laurent22/joplin', 'https://github.com/laurent22/joplin/commit/19b45de2981c09f6f387498ef96d32b4811eba5e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23431', 'https://snyk.io/vuln/SNYK-JS-JOPLIN-1325537'}
| null |
npm
|
GHSA-4xg9-g7qj-jhg4
|
Malicious Package in comander
|
All versions of `comander` contains malicious code . The package is malware designed to take advantage of users making a mistake when typing the name of a module to install. Upon require the package attempts to start a cryptocurrency miner using coin-hive.
## Recommendation
Remove the package from your environment and verify whether your system is running the cryptocurrency miner.
| null |
2021-09-29T20:33:40Z
|
2020-09-03T20:46:36Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1193'}
| null |
npm
|
GHSA-4r62-v4vq-hr96
|
Regular Expression Denial of Service (REDoS) in Marked
|
### Impact
_What kind of vulnerability is it? Who is impacted?_
[Regular expression Denial of Service](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS)
A Denial of Service attack can affect anyone who runs user generated code through `marked`.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
patched in v2.0.0
### Workarounds
_Is there a way for users to fix or remediate the vulnerability without upgrading?_
None.
### References
_Are there any links users can visit to find out more?_
https://github.com/markedjs/marked/issues/1927
https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [marked](https://github.com/markedjs/marked/issues)
|
{'CVE-2021-21306'}
|
2021-02-08T21:17:26Z
|
2021-02-08T21:17:58Z
|
MODERATE
| null |
{'CWE-400'}
|
{'https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21306', 'https://github.com/markedjs/marked/pull/1864', 'https://www.npmjs.com/package/marked', 'https://github.com/markedjs/marked/issues/1927', 'https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96'}
| null |
npm
|
GHSA-4p55-xj37-fx7g
|
Improper Authorization in Strapi
|
In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes.
|
{'CVE-2020-27665'}
|
2020-10-29T16:25:47Z
|
2020-10-29T18:29:31Z
|
MODERATE
| null |
{'CWE-276'}
|
{'https://github.com/strapi/strapi/releases/tag/v3.2.5', 'https://github.com/strapi/strapi/pull/8439', 'https://snyk.io/vuln/SNYK-JS-STRAPIPLUGINCONTENTTYPEBUILDER-1021616', 'https://github.com/strapi/strapi/commit/3cdd73987950d5c7976701047b38203e902007bb', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27665'}
| null |
npm
|
GHSA-28xh-wpgr-7fm8
|
Command Injection in open
|
Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in.
The package does come with the following warning in the readme:
```
The same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell.
```
## Recommendation
`open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.
| null |
2020-08-31T18:31:51Z
|
2019-06-20T15:35:49Z
|
CRITICAL
| null |
{'CWE-77'}
|
{'https://github.com/pwnall/node-open/issues/69', 'https://www.npmjs.com/advisories/663', 'https://github.com/pwnall/node-open/issues/68', 'https://nodesecurity.io/advisories/663', 'https://hackerone.com/reports/319473'}
| null |
npm
|
GHSA-fvq6-55gv-jx9f
|
SQL Injection in mysql
|
Versions of `mysql` prior to 2.0.0-alpha8 are affected by a SQL Injection vulnerability in the `mysql.escape()` function, which does not properly escape object keys.
## Recommendation
Update to version 2.0.0-alpha8 or later.
|
{'CVE-2015-9244'}
|
2020-08-31T18:09:53Z
|
2020-09-01T15:21:05Z
|
MODERATE
| null |
{'CWE-89'}
|
{'https://nodesecurity.io/advisories/66', 'https://nvd.nist.gov/vuln/detail/CVE-2015-9244', 'https://www.npmjs.com/advisories/66', 'https://github.com/felixge/node-mysql/issues/342'}
| null |
npm
|
GHSA-6c3j-c64m-qhgq
|
XSS in jQuery as used in Drupal, Backdrop CMS, and other products
|
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
|
{'CVE-2019-11358'}
|
2022-02-08T22:08:08Z
|
2019-04-26T16:29:11Z
|
MODERATE
| null |
{'CWE-79', 'CWE-1321'}
|
{'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html', 'https://lists.apache.org/thread.html/r7d64895cc4dff84d0becfc572b20c0e4bf9bfa7b10c6f5f73e783734@%3Cdev.storm.apache.org%3E', 'https://access.redhat.com/errata/RHBA-2019:1570', 'https://www.tenable.com/security/tns-2019-08', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/88fb0362fd40e5b605ea8149f63241537b8b6fb5bfa315391fc5cbb7@%3Ccommits.airflow.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11358', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00006.html', 'https://backdropcms.org/security/backdrop-sa-core-2019-009', 'https://github.com/jquery/jquery/pull/4333', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLXRX23725JL366CNZGJZ7AQQB7LHQ6F/', 'https://www.debian.org/security/2019/dsa-4434', 'https://lists.apache.org/thread.html/08720ef215ee7ab3386c05a1a90a7d1c852bf0706f176a7816bf65fc@%3Ccommits.airflow.apache.org%3E', 'https://www.drupal.org/sa-core-2019-006', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00024.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b736d0784cf02f5a30fbb4c5902762a15ad6d47e17e2c5a17b7d6205@%3Ccommits.airflow.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html', 'https://github.com/jquery/jquery', 'http://seclists.org/fulldisclosure/2019/May/13', 'https://lists.apache.org/thread.html/r41b5bfe009c845f67d4f68948cc9419ac2d62e287804aafd72892b08@%3Cissues.flink.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190919-0001/', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.synology.com/security/advisory/Synology_SA_19_19', 'https://blog.jquery.com/2019/04/10/jquery-3-4-0-released/', 'http://www.securityfocus.com/bid/108023', 'https://lists.apache.org/thread.html/r2baacab6e0acb5a2092eb46ae04fd6c3e8277b4fd79b1ffb7f3254fa@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/ba79cf1658741e9f146e4c59b50aee56656ea95d841d358d006c18b6@%3Ccommits.roller.apache.org%3E', 'http://seclists.org/fulldisclosure/2019/May/10', 'https://lists.apache.org/thread.html/6097cdbd6f0a337bedd9bb5cc441b2d525ff002a96531de367e4259f@%3Ccommits.airflow.apache.org%3E', 'https://seclists.org/bugtraq/2019/May/18', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZW27UCJ5CYFL4KFFFMYMIBNMIU2ALG5/', 'https://access.redhat.com/errata/RHSA-2019:2587', 'http://seclists.org/fulldisclosure/2019/May/11', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r7aac081cbddb6baa24b75e74abf0929bf309b176755a53e3ed810355@%3Cdev.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3024', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QV3PKZC3PQCO3273HAT76PAQZFBEO4KP/', 'https://seclists.org/bugtraq/2019/Apr/32', 'https://lists.apache.org/thread.html/5928aa293e39d248266472210c50f176cac1535220f2486e6a7fa844@%3Ccommits.airflow.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00029.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KYH3OAGR2RTCHRA5NOKX2TES7SNQMWGO/', 'http://packetstormsecurity.com/files/152787/dotCMS-5.1.1-Vulnerable-Dependencies.html', 'https://lists.apache.org/thread.html/rac25da84ecdcd36f6de5ad0d255f4e967209bbbebddb285e231da37d@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://seclists.org/bugtraq/2019/Jun/12', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5IABSKTYZ5JUGL735UKGXL5YPRYOPUYI/', 'https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601', 'https://access.redhat.com/errata/RHSA-2019:3023', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/jquery/jquery/commit/753d591aea698e57d6db58c9f722cd0808619b1b', 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html', 'http://packetstormsecurity.com/files/153237/RetireJS-CORS-Issue-Script-Execution.html', 'http://www.openwall.com/lists/oss-security/2019/06/03/2', 'https://www.tenable.com/security/tns-2020-02', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.debian.org/security/2019/dsa-4460', 'https://lists.apache.org/thread.html/r2041a75d3fc09dec55adfd95d598b38d22715303f65c997c054844c9@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://snyk.io/vuln/SNYK-JS-JQUERY-174006', 'https://www.privacy-wise.com/mitigating-cve-2019-11358-in-old-versions-of-jquery/', 'https://lists.apache.org/thread.html/r38f0d1aa3c923c22977fe7376508f030f22e22c1379fbb155bf29766@%3Cdev.syncope.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4UOAZIFCSZ3ENEFOR5IXX6NFAD3HV7FA/', 'https://lists.apache.org/thread.html/r7e8ebccb7c022e41295f6fdb7b971209b83702339f872ddd8cf8bf73@%3Cissues.flink.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1456'}
| null |
npm
|
GHSA-x5ph-4fr4-g7fw
|
Downloads Resources over HTTP in galenframework-cli
|
Affected versions of `galenframework-cli` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `galenframework-cli`.
## Recommendation
Update to version 2.3.1 or later.
|
{'CVE-2016-10560'}
|
2021-01-08T00:47:45Z
|
2019-02-18T23:54:21Z
|
HIGH
| null |
{'CWE-311'}
|
{'https://www.npmjs.com/advisories/170', 'https://nodesecurity.io/advisories/170', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10560', 'https://github.com/advisories/GHSA-x5ph-4fr4-g7fw'}
| null |
npm
|
GHSA-x3w4-mrmv-cw2x
|
Malicious Package in buffev-xor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.
## Recommendation
Remove the package from your environment. Ensure no Ethereum funds were compromised.
| null |
2021-09-29T21:26:19Z
|
2020-09-03T22:19:44Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1258'}
| null |
npm
|
GHSA-2v5f-23xc-v9qr
|
Cross-site scripting
|
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
|
{'CVE-2021-3377'}
|
2021-03-11T22:49:55Z
|
2021-03-11T22:50:39Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://github.com/drudru/ansi_up/commit/c8c726ed1db979bae4f257b7fa41775155ba2e27', 'https://doyensec.com/resources/Doyensec_Advisory_ansi_up4_XSS.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3377'}
| null |
npm
|
GHSA-cqr7-78pj-3g7j
|
File Descriptor Leak Can Cause DoS Vulnerability in hapi
|
Versions 2.0.x and 2.1.x of hapi are vulnerable to a denial of service attack via a file descriptor leak.
When triggered repeatedly, this leak will cause the server to run out of file descriptors and the node process to die. The effort required to take down a server depends on the process file descriptor limit. No other side effects or exploits have been identified.
## Recommendation
- Please upgrade to version 2.2.x or above as soon as possible.
|
{'CVE-2014-3742'}
|
2021-09-09T20:31:02Z
|
2017-10-24T18:33:36Z
|
HIGH
| null | null |
{'http://www.openwall.com/lists/oss-security/2014/05/15/2', 'https://nodesecurity.io/advisories/hapi_File_descriptor_leak_DoS_vulnerability', 'https://www.npmjs.com/advisories/11', 'http://www.openwall.com/lists/oss-security/2014/05/13/1', 'https://github.com/spumko/hapi/issues/1427', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3742', 'https://github.com/spumko/hapi', 'https://github.com/advisories/GHSA-cqr7-78pj-3g7j'}
| null |
npm
|
GHSA-xc6g-ggrc-qq4r
|
Cross-Site Scripting in sanitize-html
|
Affected versions of `sanitize-html` are vulnerable to cross-site scripting when allowedTags includes at least one `nonTextTag`.
## Proof of Concept
```
var sanitizeHtml = require('sanitize-html');
var dirty = '!<textarea></textarea><svg/onload=prompt`xs`></textarea>!';
var clean = sanitizeHtml(dirty, {
allowedTags: [ 'textarea' ]
});
console.log(clean);
// !<textarea></textarea><svg/onload=prompt`xs`></textarea>!
```
## Recommendation
Update to version 1.11.4 or later.
|
{'CVE-2017-16016'}
|
2020-08-31T18:12:43Z
|
2018-11-09T17:47:23Z
|
MODERATE
| null |
{'CWE-79'}
|
{'https://www.npmjs.com/advisories/154', 'https://github.com/advisories/GHSA-xc6g-ggrc-qq4r', 'https://github.com/punkave/sanitize-html/issues/100', 'https://nvd.nist.gov/vuln/detail/CVE-2017-16016', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403', 'https://nodesecurity.io/advisories/154', 'https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag', 'https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))'}
| null |
npm
|
GHSA-5mhv-9qw8-j63g
|
Hijacked Environment Variables in mssql.js
|
The `mssql.js` package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
## Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should:
1. Delete the package
2. Clear your npm cache
3. Ensure it is not present in any other package.json files on your system
4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
|
{'CVE-2017-16056'}
|
2020-08-31T18:24:57Z
|
2018-11-09T17:43:03Z
|
MODERATE
| null |
{'CWE-506'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2017-16056', 'https://www.npmjs.com/advisories/485', 'https://github.com/advisories/GHSA-5mhv-9qw8-j63g', 'https://nodesecurity.io/advisories/485'}
| null |
npm
|
GHSA-wj6h-7chw-x4h2
|
Command injection in get-git-data
|
get-git-data through 1.3.1 is vulnerable to Command Injection. It is possible to inject arbitrary commands as part of the arguments provided to get-git-data.
|
{'CVE-2020-7619'}
|
2021-07-28T21:53:39Z
|
2021-05-10T15:59:14Z
|
CRITICAL
| null |
{'CWE-78'}
|
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7619', 'https://github.com/chardos/get-git-data/blob/master/index.js#L7,', 'https://snyk.io/vuln/SNYK-JS-GETGITDATA-564222'}
| null |
npm
|
GHSA-gh78-48h3-frjq
|
Improper exception handling in Aedes
|
An issue was discovered in MoscaJS Aedes 0.42.0 and fixed in 0.42.1. lib/write.js does not properly consider exceptions during the writing of an invalid packet to a stream.
|
{'CVE-2020-13410'}
|
2021-05-05T20:02:28Z
|
2021-05-06T18:10:46Z
|
HIGH
| null |
{'CWE-755'}
|
{'https://payatu.com/advisory/dos-in-aedes-mqtt-broker', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13410', 'https://github.com/moscajs/aedes/commit/8d34ee5819cfc983d57e49b45d8c5ef70a76d79b', 'https://github.com/moscajs/aedes/pull/493'}
| null |
npm
|
GHSA-4v9q-hm2p-68c4
|
Spoofing attack due to unvalidated KDC in node-krb5
|
Affected versions of `node-krb5` do not validate the KDC prior to authenticating, which might allow an attacker with network access and enough time to spoof the KDC and impersonate a valid user without knowing their credentials.
## Recommendation
It appears that this will remain unfixed indefinitely, as the Github issue for this vulnerability has been open since 2015, with no work on it since then.
At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=kerberos).
|
{'CVE-2016-1000238'}
|
2021-09-23T21:35:22Z
|
2020-09-01T15:57:01Z
|
MODERATE
| null | null |
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000238', 'https://www.npmjs.com/advisories/136', 'https://github.com/qesuto/node-krb5/issues/13', 'https://github.com/qesuto/node-krb5', 'http://archive.hack.lu/2010/Bouillon-Stealing-credentials-for-impersonation.pdf'}
| null |
npm
|
GHSA-8j8c-7jfh-h6hx
|
Code Injection in js-yaml
|
Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected.
An example payload is
`{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1`
which returns the object
{
"1553107949161": 1
}
## Recommendation
Upgrade to version 3.13.1.
| null |
2020-08-31T18:36:43Z
|
2019-06-04T20:14:07Z
|
HIGH
| null |
{'CWE-94'}
|
{'https://www.npmjs.com/advisories/813', 'https://github.com/nodeca/js-yaml/pull/480'}
| null |
npm
|
GHSA-g4m3-rpxr-h7vg
|
Malicious Package in mogodb-core
|
This package contained malicious code. The package uploaded system information such as OS and hostname to a remote server.
## Recommendation
Remove the package from your environment. There are no indications of further compromise.
| null |
2021-09-30T20:26:34Z
|
2020-09-03T19:52:25Z
|
CRITICAL
| null |
{'CWE-506'}
|
{'https://www.npmjs.com/advisories/1134'}
| null |
npm
|
GHSA-4j59-hfw6-6w7h
|
Downloads Resources over HTTP in cmake
|
Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`.
## Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
{'CVE-2016-10642'}
|
2021-09-16T20:54:42Z
|
2018-08-15T19:30:48Z
|
HIGH
| null |
{'CWE-269', 'CWE-311'}
|
{'https://nodesecurity.io/advisories/233', 'https://www.npmjs.com/advisories/233', 'https://github.com/advisories/GHSA-4j59-hfw6-6w7h', 'https://github.com/stanley-gu/cmake', 'https://nvd.nist.gov/vuln/detail/CVE-2016-10642'}
| null |
npm
|
GHSA-q4h8-7qff-gh6c
|
Server-side request forgery in Ghost CMS
|
Server-side request forgery (SSRF) vulnerability in Ghost CMS < 3.10.0 allows an attacker to scan local or external network or otherwise interact with internal systems.
|
{'CVE-2020-8134'}
|
2021-05-04T22:08:54Z
|
2021-05-06T18:28:08Z
|
MODERATE
| null |
{'CWE-918'}
|
{'https://hackerone.com/reports/793704', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8134'}
| null |
npm
|
GHSA-4rgj-8mq3-hggj
|
Denial of Service in @hapi/subtext
|
Versions of `@hapi/subtext` prior to 6.1.2 are vulnerable to Denial of Service (DoS). The package fails to enforce the `maxBytes` configuration for payloads with chunked encoding that are written to the file system. This allows attackers to send requests with arbitrary payload sizes, which may exhaust system resources leading to Denial of Service.
## Recommendation
Upgrade to version 6.1.2 or later.
| null |
2020-08-31T18:49:38Z
|
2020-09-03T20:32:11Z
|
HIGH
| null | null |
{'https://www.npmjs.com/advisories/1165', 'https://github.com/hapijs/subtext/issues/72'}
| null |
npm
|
GHSA-m7rg-8wvq-846v
|
Prototype pollution
|
Prototype pollution vulnerability in 'nestie' versions 0.0.0 through 1.0.0 allows an attacker to cause a denial of service and may lead to remote code execution.
|
{'CVE-2021-25947'}
|
2021-06-14T21:47:44Z
|
2021-06-07T21:49:14Z
|
CRITICAL
| null |
{'CWE-1321'}
|
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25947', 'https://github.com/lukeed/nestie/commit/bc80d5898d1e5e8a3d325d355eda0c325c8dcfc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25947'}
| null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.